Wiem Tounsi

Learn More
We address security solutions to protect the communication of the wireless components of a home health care system. We analyze especially the problem of exchanging secrets to satisfy authentication of entities. We outline some important aspects that must be guaranteed given the existence of low-cost and resource-constrained RFID components. Appropriate(More)
The EPC Class-1 Generation-2 (Gen2 for short) is a Radio Frequency IDentification (RFID) technology that is gaining a prominent place in several domains. However, the Gen2 standard lacks of verifiable security functionalities. Eavesdropping attacks can, for instance, affect the security of applications based on the Gen2 technology. To address this problem,(More)
The EPC Class-1 Generation-2 (Gen2 for short) is a standard Radio Frequency Identification (RFID) technology that has gained a prominent place on the retail industry. The Gen2 standard lacks, however, of verifiable security func-tionalities. Eavesdropping attacks can, for instance, affect the security of monitoring applications based on the Gen2 technology.(More)
Collection and distribution of Radio Frequency IDentification (RFID) data are subject to various privacy concerns. These concerns are of paramount importance when sensitive data are processed (e.g., medical data). Therefore, it is crucial to treat sensitive data privacy in early stages to master the data view for upper layers and to minimize, as soon as(More)
The Electronic Product Code (EPC) is a Radio Frequency IDentification (RFID) that offers a new way of automating identification. However, once RFID tags carry more than just an identifier, privacy may be violated. Treating the privacy in early stages helps to master the data view before interpreting and storing it in databases. An RFID middleware is the(More)
Nowadays, network infrastructures are supervised by human operators. These operators are submerged by a massive surcharge of information and alerts caused by security mechanisms. In this paper, we focus particularly in anomalies detection systems and propose a multi-levels architecture allowing in one hand, the enhancement of the diagnosis' quality for(More)
Pencil-and-paper ciphers are plausible solutions that could provide lightweight protection to the communication of resource-constrained devices. A good example in this category is Schneier's Solitaire cipher. In this paper, we propose a probabilistic solution that is able to estimate Solitaire's keystream cycle length. We also present a variation of(More)
Radio Frequency IDentification (RFID) technology offers a new way of automating the identification and storing of information in RFID tags. The emerging opportunities for the use of RFID technology in human centric applications like monitoring and indoor guidance systems indicate how important this topic is in term of privacy. Holding privacy issues from(More)
Dans cet article, nous nous intéressons à la protection des communications entre les composants d'un système de surveillance médicale à domicile. Nous examinons partic-ulièrement le problème d'échange de clés secrètes entre des entités hétérogènes d'un réseau comptant en plus des capteurs actifs, un nombre de capteurs passifs RFID (Radio Frequency(More)