Abdelbasset Trad
University of Sousse
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Abdelbasset Trad.
Wireless Personal Communications | 2015
Soufiene Ben Othman; Abdullah Ali Bahattab; Abdelbasset Trad; Habib Youssef
Data aggregation is an important method to reduce the energy consumption in wireless sensor networks (WSNs), however, performing data aggregation while preserving data confidentiality and integrity is mounting a challenge. The existing solutions either have large communication and computation overheads or produce inaccurate results. This paper proposes a novel secure data aggregation scheme based on homomorphic encryption in WSNs. The scheme adopts a symmetric-key homomorphic encryption to protect data privacy and combines it with homomorphic signature to check the aggregation data integrity. In addition, during the decryption of aggregated data, the base station is able to classify the encrypted and aggregated data based on the encryption keys. Simulation results and performance analysis show that our mechanism requires less communication and computation overheads than previously known methods. It can effectively preserve data privacy, check data integrity, and achieve high data transmission efficiency. Also, it performs accurate data aggregation rate while consuming less energy to prolong network lifetime.
annual mediterranean ad hoc networking workshop | 2013
Soufiene Ben Othman; Abdelbasset Trad; Habib Youssef; Hani Alzaid
In-network data aggregation is an effective method to reduce the amount of data transmitted and therefore saves energy consumption in sensor networks. However, an adversary may compromise some sensor nodes, and use them to forge false values as the aggregation result. Previous secure data aggregation schemes have tackled this problem from different angles. The goal of those algorithms is to ensure that the Base Station (BS) does not accept any forged aggregation results. Based on our survey of existing research efforts for ensuring secure data aggregation, a novel approach that uses homomorphic encryption and Message Authentication Codes (MAC) to achieve confidentiality, authentication and integrity for secure data aggregation in wireless sensor networks is proposed. Our experiments show that our proposed secure aggregation method significantly reduces computation and communication overhead.
high performance computing and communications | 2014
Fatma Hendaoui; Hamdi Eltaief; Habib Youssef; Abdelbasset Trad
Secure communication in Wireless Sensor Networks (WSN) is usually based on symmetric cryptographic approaches, whose robustness relies on an efficient key management protocol. Most of the reported key management protocols follow either a centralized approach where a single node has the authority of distributing the global shared key, or a partially collaborative approach where key distribution is guaranteed by some master nodes. In this paper, a novel collaborative key management approach is proposed, where the whole network members participate in the key agreement task, thus, avoiding the existence of a master node, such as cluster head or BS that holds special information. Moreover, the global key is no longer propagated over the radio channel. Performance comparison with a well-known efficient scheme [1] as well as a recently reported scheme [3]shows that the proposed CGK approach reduces communication and storage overhead. Further, the analytical study of CGK is validated with simulation results.
Computer Applications and Information Systems (WCCAIS), 2014 World Congress on | 2014
Abdelbasset Trad; Abdullah Ali Bahattab; Soufiene Ben Othman
Several security mechanisms have been introduced to address the need for reliable and efficient security schemes in resource limited Wireless Sensor Networks (WSNs). Limitations in processing speed, battery power, bandwidth and memory constrain the applicability of existing cryptographic Algorithms in WSNs. Accordingly, it is necessary to assess the performance tradeoffs of the cryptographic algorithms to provide a better understanding of the security cost. In this paper, we have studied three block cipher algorithms: Advanced Encryption Standard (AES), RC5, and RC6. We have measured and compared their memory and energy consumption in the Mica2 sensor motes. Experimentation results show that AES has higher memory and energy requirements than RC5 and RC6. RC6 has higher operation time and power consumption while RC5 is the most time- and energy-efficient block cipher and thus the best cipher solution for devices with limited resources.
trust security and privacy in computing and communications | 2013
Soufiene Ben Othman; Abdelbasset Trad; Habib Youssef; Hani Alzaid
Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the ciphertexts without decryption; consequently, transmission overhead is reduced. Based on our survey of existing research efforts for ensuring secure data aggregation, a novel approach that uses homomorphic encryption and Message Authentication Codes (MAC) to achieve confidentiality, authentication and integrity for secure data aggregation in wireless sensor networks is proposed. Our experiments show that our proposed secure aggregation method significantly reduces computation and communication overhead and can be practically implemented in on-the-shelf sensor platforms.
transactions on emerging telecommunications technologies | 2016
Ben Othman Soufiene; Abdullah Ali Bahattab; Abdelbasset Trad; Habib Youssef
Medical wireless sensor networks MWSNs provide efficient solutions to the ubiquitous healthcare systems. Deployment of MWSNs for healthcare monitoring minimizes the need for healthcare professionals and helps the patients and elderly people to safely maintain an independent life. In hospitals, medical data sensors on patients produce an enormous volume of increasingly diverse real-time data. However, it is still critical to efficiently aggregate the different types of MWSNs data to the central servers. The security of collected and transmitted data from medical sensors is critical, whether inside the network or when stored at central servers. Efficient and secure aggregation of data is thus very essential to ensure integrity of data delivery, as well as the privacy of these data. In this research, we propose a priority-based compressed data aggregation scheme with integrity preservation to improve the aggregation efficiency of different types of health data. We use compressed sensing as a sampling procedure to reduce the communication overhead and minimize power consumption. Then, the compressed data are encrypted, and integrity is protected by a cryptographic hash algorithm to preserve data integrity. Finally, according to different data priorities, we apply an aggregation function and then send the data for diagnosis. The security analysis focuses on security properties assured by our scheme. Then, we will present experimental results for the evaluation of the proposed system on e-health sensor platform. Copyright
international conference on information intelligence systems and applications | 2013
Soufiene Ben Othman; Hani Alzaid; Abdelbasset Trad; Habib Youssef
Wireless sensor networks (WSNs) often consists of a large number of low-cost sensor nodes that have strictly limited sensing, computation, and communication capabilities. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. As wireless sensor networks are usually deployed in remote and hostile environments and used to transmit sensitive information, sensor nodes are prone to node compromise attacks and hence security issues such as data confidentiality and integrity are extremely important. A novel approach, which uses homomorphic encryption and additive digital signatures, is proposed to provide confidentiality, integrity for secure data aggregation in WSNs. The performance evaluation shows that the proposed scheme is efficient and scalable for large WSNs.
international conference on wireless communications and mobile computing | 2014
Soufiene Ben Othman; Abdelbasset Trad; Habib Youssef
Distributed wireless sensor network technologies have become one of the major research areas in healthcare industries due to rapid maturity in improving the quality of life. Medical Wireless Sensor Network (MWSN) via continuous monitoring of vital health parameters over a long period of time can enable physicians to make more accurate diagnosis and provide better treatment. The MWSNs provide the options for flexibilities and cost saving to patients and healthcare industries. Medical data sensors on patients produce an increasingly large volume of increasingly diverse real-time data. The transmission of this data through hospital wireless networks becomes a crucial problem, because the health information of an individual is highly sensitive. It must be kept private and secure. In this paper, we propose a security model to protect the transfer of medical data in hospitals using MWSNs. We propose Compressed Sensing + Encryption as a strategy to achieve low-energy secure data transmission in sensor networks.
International Journal of Mobile Network Design and Innovation | 2013
Sofiene Ben Othman; Abdelbasset Trad; Hani Alzaid; Habib Youssef
Wireless sensor networks are now in widespread use to monitor regions, detect events and acquire information. Since the deployed nodes are separated, they need to cooperatively communicate sensed data to the base station. To maximise WSN lifetime, it is essential to minimise the number of bits sent and received by each device. To reduce the amount of sending data, an aggregation approach can be applied along the path from sensors to the sink. Data aggregation in wireless sensor networks is employed to reduce the communication overhead and prolong the network lifetime. However, an adversary may compromise some sensor nodes, and use them to forge false values as the aggregation result. In this paper two secure and energy-efficient data aggregation schemes have been proposed; these schemes can detect the malicious nodes. The goal of the algorithms used in these schemes is to ensure that the base station BS does not accept any forged aggregation results. The proposed two protocols present different trade-offs between computations, communication, and security and can fit a wide variety of application areas.
international conference on wireless mobile communication and healthcare | 2012
Soufiene Ben Othman; Abdelbasset Trad; Hani Alzaid; Habib Youssef
The rapid development in the Wireless Sensor Networks (WSNs) filed has allowed this technology to be used in many applications. In some of these applications, wireless sensor devices must be secured, especially when the captured information is valuable, sensitive, or for military usage. However, the implementation of security mechanisms on WSNs is a non-trivial task. Limitations in processing speed, battery power, bandwidth and memory constrain the applicability of existing cryptography algorithms for WSNs. The security of WSNs poses challenges because of the criticality of the data sensed by a node and in turn the node meets severe constraints like minimal energy, computational and communicational capabilities. Taking all the above said challenges energy efficiency or battery life time plays a major role in network lifetime. Providing security consumes some energy used by a node, so there is a need to minimize the energy consumption of any security algorithm that will be implemented in WSNs. As a solution, we apply an additive homomorphic encryption scheme, namely the elliptic curve ElGamal (EC-ElGamal) cryptosystem, and present the performance results of our implementation for the prominent sensor platform MicaZ mote.