Papers by Oussama Harbouche

Research paper thumbnail of Conception de systèmes multi-agents basée sur La démarche MDA
Résumé De nombreuses recherches et contributions sont apportées aux méthodologies orientées agent... more Résumé De nombreuses recherches et contributions sont apportées aux méthodologies orientées agent et sur les plate-formes de développement de systèmes multi-agents. Mais chacune de ces méthodologies définit ses propres concepts et la structure du système. Ces méthodologies permettent d'analyser des problèmes de différents domaines et développer des systèmes multi-agents mais la plupart d'entre elles ne fournissent pas un processus complet de développement (analyse, conception, implémentation et déploiement). Les plate-formes de développement de systèmes multi-agents fournissent un environnement d'exécution et de déploiement de ces systèmes. Mais nous remarquons que les plates-formes multi-agents ont des représentations et des concepts différents que celles adoptés par les méthodologies. Par conséquent, le développeur utilisant une méthodologie doit fournir un effort supplémentaire pour implémenter le système sur une plate-forme. En général, la majorité des méthodologies ...

In this paper, a secure and efficient protocol for vehicular ad hoc networks has been proposed th... more In this paper, a secure and efficient protocol for vehicular ad hoc networks has been proposed that ensures both message authentication and privacy preservation. As safety related message may contain life critical information, it is a necessity that the sender as well as the message are authentic. The proposed scheme is based on a secure elliptic curve digital signature algorithm approach. The proposed scheme supports conditional privacy, where the user's location can be revealed at the willingness of the user. Apart from this, the scheme is secure against attacks like DoS, Sybil and Grey/Black Hole attacks. From the comparison with previously proposed schemes, it is found that the proposed scheme as based on elliptic curve discrete logarithmic problem, outperforms existing algorithms based on integer factoring and discrete logarithmic problem.

Research paper thumbnail of Securing Location-Aware Services Based on Online/Offline Signatures in VANETs
In this paper, we propose a novel privacy-preserving location assurance protocol for secure locat... more In this paper, we propose a novel privacy-preserving location assurance protocol for secure location-aware services over vehicular ad hoc networks (VANETs). In particular, we introduce the notion of location-aware credentials based on “hash-sign-switch” paradigm so as to guarantee the trustworthiness of location in location-aware services while providing conditional privacy preservation which is a desirable property for secure vehicular communications. Furthermore, the proposed protocol provides efficient procedures that alleviate a burden of computation for location-aware signature generation and verification on vehicles in VANETs. In order to achieve these goals, we consider online/offline signature scheme and identity-based aggregate signature scheme as our building blocks. Finally, we demonstrate experimental results to confirm the efficiency and effectiveness of the proposed protocol.

A practical security framework for a VANET-based entertainment service

Abstract In this paper, we propose a secure multimedia resource trading system in a vehicular ad ... more Abstract In this paper, we propose a secure multimedia resource trading system in a vehicular ad hoc network, leveraging a short-time self-certificate signature scheme. The short-time self-certificate signature does not need certificate verification overhead. Thus, it ...

A Robust Detection of the Sybil Attack in Urban VANETs

The Sybil attack is one of the serious attacks to Vehicular Ad Hoc Networks (VANETs), because it ... more The Sybil attack is one of the serious attacks to Vehicular Ad Hoc Networks (VANETs), because it severely damages the security of VANETs and, even leads to a threat to lives of drivers and passengers. In this paper, we propose a solution to detect the Sybil attack based on the ...

Cognitive security protocol for sensor based VANET using swarm intelligence

... In sensor based VANET (S-VANET) issues like response time, data aging, bandwidth, packet deli... more ... In sensor based VANET (S-VANET) issues like response time, data aging, bandwidth, packet delivery, message prioritization and ... information using distributed sensor technology while prioritizing prevention of data aging, efficient quality-of-service (QoS) and robustness against ...

Vehicle ad-hoc networks (VANETs) are a prominent form of mobile ad-hoc networks. This paper outli... more Vehicle ad-hoc networks (VANETs) are a prominent form of mobile ad-hoc networks. This paper outlines the architecture of VANETs and discusses the security and privacy challenges that need to be overcome to make such networks practically viable. It compares the various security schemes that were suggested for VANETs. It then proposes an efficient implementation of an identity based cryptosystem that is robust and computationally secure.

Research paper thumbnail of Secured Communication in Real Time VANET
Among civilian communication systems, vehicular networks emerge as one of the most is convincing ... more Among civilian communication systems, vehicular networks emerge as one of the most is convincing and yet most challenging instantiations of the mobile ad hoc networking technology. Towards the deployment of vehicular communication systems, security and privacy are critical factors and significant challenges to be met. This Vehicular communication (VC) system has the potential to improve road safety and driving comfort. Nevertheless, securing the operation is a prerequisite for deployment Nevertheless, Currently, Inter-Vehicle Communication systems (IVC) as well as vehicle to infrastructure communication is an emerging class of wireless communication, attracting considerable attention from the research community and the automotive industry also enabling mobile users in their vehicles to communicate to the road and with the roadside infrastructure. In this paper we are focusing on infrastructure to vehicle commutation. So in this paper we are focusing on real time experimental design of infrastructure to vehicle communication. We outline how VANET will be a better option than GPS technology. We also try to discuss IP address passing using DHCP in the network and the security issues.

Research paper thumbnail of SPECS: Secure and privacy enhancing communications schemes for VANETs

SPECS: Secure and privacy enhancing communications schemes for VANETs

Ad Hoc Networks, 2010

Vehicular ad hoc network (VANET) is an emerging type of networks which facilitates vehicles on ro... more Vehicular ad hoc network (VANET) is an emerging type of networks which facilitates vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. traffic accidents) to other vehicles. However, this raises the concern of security and privacy. Messages should be signed and verified before they are trusted while the real identity of vehicles should not be revealed, but traceable by authorized party. Existing solutions either rely heavily on a tamper-proof hardware device, or cannot satisfy the privacy requirement and do not have an effective message verification scheme. In this paper, we provide a software-based solution which makes use of only two shared secrets to satisfy the privacy requirement (with security analysis) and gives lower message overhead and at least 45% higher successful rate than previous solutions in the message verification phase using the bloom filter and the binary search techniques (through simulation study). We also provide the first group communication protocol to allow vehicles to authenticate and securely communicate with others in a group of known vehicles.

Vehicular Ad Hoc networks (VA NETs) are fast emerging as the dominant model for intelligent traff... more Vehicular Ad Hoc networks (VA NETs) are fast emerging as the dominant model for intelligent traffic control. In the recent years, increasing number of researchers investigated various privacy and security issues such as key management, TSllCOMS02194 978-1-4244-8943-5/11/$26.00 ©2011 IEEE

Efficient and secure threshold-based event validation for VANETs

... During the Standby phase, there is no active MH-relevant event. In the occurrence of multiple... more ... During the Standby phase, there is no active MH-relevant event. In the occurrence of multiple concur-rent events, the applications maintain per-event phase and synopsis, but broadcast their synopses in the same beacon. Page 4. ...

We present an analysis of and security extensions to the CASCADE (Cluster-based Accurate Syntacti... more We present an analysis of and security extensions to the CASCADE (Cluster-based Accurate Syntactic Compression of Aggregated Data in VANETs) data aggregation technique. CASCADE organizes known vehicles into clusters, the size of which determines both the frame size used to distribute aggregated data and the distance ahead that vehicles are aware of (local view ). We determine the optimal cluster size to balance the trade-off between local view length and expected frame size. The original CASCADE description does not consider security issues, so we present our framework for a secure CASCADE by employing received signal strength and laser rangefinders for position verification.

On the efficiency of secure beaconing in VANETs

International Journal of Molecular Sciences, 2010

Research paper thumbnail of Location security in geographic ad hoc routing for VANETs

Location security in geographic ad hoc routing for VANETs

Vehicle-to-vehicle communication among vehicular ad hoc networks (VANETs) plays an important role... more Vehicle-to-vehicle communication among vehicular ad hoc networks (VANETs) plays an important role in providing a high level of safety and convenience to drivers. Geographic routing protocol has been identified to be suitable for VANETs because of the special nature of such networks, e.g., frequently changed network topology and high dynamic mobility. There is considerable functional research about geographic routing, but the node location security issues have not been vastly concentrated on so far. While selecting every hop, the performance and security can be impacted severely by false position because of the position information importance for geographic routing. Making use of directional antennas, we propose a novel detection mechanism capable of recognizing nodes faking about their positions in beacon message. By checking through which directional antenna beacon messages are received, ones' neighborhood can be easily divided into two groups. In addition, combined with the three malicious node detection rules, nodes can efficiently detect malicious nodes around them after exchanging neighbors grouping information with each others. As the evaluation based on simulations shows, our position verification system can detect malicious nodes successfully and can prevent attacks on geographic routing by false position.

A Security Framework with Strong Non-Repudiation and Privacy in VANETs

Abstract—This paper proposes a security framework with strong non-repudiation and privacy using n... more Abstract—This paper proposes a security framework with strong non-repudiation and privacy using new approach of ID-based cryptosystem in VANETs. To remove the overheads of certificate management in PKI, security frameworks using an ID-based cryptosystem are proposed. ...

Journal of Computer Security, 2007

Vehicular networks are very likely to be deployed in the coming years and thus become the most re... more Vehicular networks are very likely to be deployed in the coming years and thus become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made, which in some cases have more than mere technical implications. We provide a set of security protocols, we show that they protect privacy and we analyze their robustness and efficiency.

GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications

... XX, NO. XX, MONTH 200X 1 GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communi... more ... XX, NO. XX, MONTH 200X 1 GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications Xiaodong Lin, Student Member, IEEE, Xiaoting Sun, Pin-Han Ho, Member, IEEE, and Xuemin (Sherman) Shen, Senior Member, IEEE ...

Security issues and challenges of Vehicular Ad Hoc Networks (VANET)

Abstract-The security of Vehicular Ad Hoc Networks (VANET) has mostly directed the attention of t... more Abstract-The security of Vehicular Ad Hoc Networks (VANET) has mostly directed the attention of today research efforts, while comprehensive solutions to protect the network from adversary and attacks still need to be improved, trying to reach a satisfactory level, for the driver and ...

A Secure and Location Assurance Protocol for Location-Aware Services in VANETs

In this paper, we propose a secure and location assurance protocol in order to guarantee authenti... more In this paper, we propose a secure and location assurance protocol in order to guarantee authentication and to avoid illegal location tracking of vehicles in location-aware services over VANETs. In addition, the proposed protocol enables a message verifier to have confidence that the location-aware information was responded from the vehicles actually passed through the target location area without violating location privacy for responders. To achieve our security objectives, we use pseudonyms for privacy-preserving authentication and deploy a hierarchical identity-based signature scheme to achieve our security objectives. We also evaluate the performance of the proposed protocol.

A Secure Cooperative Approach for Nonline-of-Sight Location Verification in VANET

IEEE Transactions on Vehicular Technology, 2012