Aymen Boudguiga
Telecom SudParis
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Aymen Boudguiga.
Computers & Security | 2010
Tony Cheneau; Aymen Boudguiga; Maryline Laurent
Cryptographically Generated Addresses (CGA) are today mainly used with the Secure Neighbor Discovery Protocol (SEND). Despite CGA generalization, current standards only show how to construct CGA with the RSA algorithm and SHA-1 hash function. This limitation may prevent new usages of CGA and SEND in mobile environments where nodes are energy and storage limited. In this paper, we present the results of a performance and security study of the CGA and SEND. To significantly improve the performances of the CGA, we investigate first replacing RSA with ECC (Elliptic Curve Cryptography) and ECDSA (Elliptic Curve DSA), and second using the General-Purpose computing on Graphical Processing Units (GPGPU). Finally, a performance comparison between different hash algorithms (SHA-256, WHIRLPOOL,...) allows to prepare a better transition for the CGA when SHA-1 will be deprecated.
international conference on cloud computing | 2013
Nesrine Kaaniche; Aymen Boudguiga; Maryline Laurent
This paper addresses the security issues of storing sensitive data in a cloud storage service and the need for users to trust the commercial cloud providers. It proposes a cryptographic scheme for cloud storage, based on an original usage of ID-Based Cryptography. Our solution has several advantages. First, it provides secrecy for encrypted data which are stored in public servers. Second, it offers controlled data access and sharing among users, so that unauthorized users or untrusted servers cannot access or search over data without clients authorization.
wireless and mobile computing, networking and communications | 2010
Aymen Boudguiga; Maryline Laurent
Nowadays authentication in Wireless Mesh Networks (WMN) refers to the 802.1X authentication methods or a Preshared key authentication, and makes use of certificates or shared secrets. In wireless environments, management of certificates is disadvantageous. Certificates require deploying a Public Key Infrastructure (PKI) and Certification Authorities (CA) and they require defining a certificate management policy to control the generation, transmission and revocation of certificates. Management of certificates is a cumbersome task and does not match the limited (power and memory) resources available at wireless nodes. Moreover it does not match the non permanent connectivity to CA. In this paper, we propose an ID-based method, as an alternative to the PKI, to provide nodes with private and public keys, and we present an authentication scheme that uses the ID-based cryptographic concepts. As illustrated in the paper, the authentication scheme is shown as suitable to the WMN networks.
wireless communications and networking conference | 2011
Aymen Boudguiga; Maryline Laurent
Nowadays, ID-based cryptography is reported as an alternative to Public Key Infrastructures (PKI). It proposes to derive the public key from the nodes identity directly. As such, there is no need for public key certifcates, and direct beneft of this is to remove the burdensome management of certifcates. However, the drawback is the need for a Private Key Generator (PKG) entity which can perform a key escrow attack. In this article, we present an ID-based authentication scheme that is adapted to the IEEE 802.11s mesh networks and resistant against key escrow attacks.
international conference on communications | 2016
Aymen Boudguiga; Witold Klaudel; Antoine Boulanger; Pascale Chiron
The Controller Area Network (CAN) is established as the main communication channel inside vehicles. CAN relies on frame broadcast to share data between different microcontrollers managing critical or comfort functions such as cruise control or air conditioning. CAN is distinguished by its simplicity, its real-time application compatibility and its low deployment cost. However, CAN major drawback is its lack of security support. That is, CAN fails to provide protections against attacks such as intrusion, denial of service or impersonation. We propose in this work a simple intrusion detection method for CAN. Our main idea is to make each microcontroller monitor the CAN bus to detect malicious frames.
international conference for internet technology and secured transactions | 2011
Aymen Boudguiga; Maryline Laurent
international conference on communications | 2018
Hichem Sedjelmaci; Fateh Guenab; Aymen Boudguiga; Yohann Petiot
consumer communications and networking conference | 2018
Hichem Sedjelmaci; Imane Horiya Brahmi; Aymen Boudguiga; Witold Klaudel
8th European Congress on Embedded Real Time Software and Systems (ERTS 2016) | 2016
Jimmy Durand Wesolowsk; Aymen Boudguiga; Anup Patel; Julien Viard de Galbert; Matthieu Donain; Witold Klaudel; Guillaume Scigala
Archive | 2014
Aymen Boudguiga; Maryline Laurent