Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Chaker Abdelaziz Kerrache is active.

Publication


Featured researches published by Chaker Abdelaziz Kerrache.


IEEE Access | 2016

Trust Management for Vehicular Networks: An Adversary-Oriented Overview

Chaker Abdelaziz Kerrache; Carlos Miguel Tavares Calafate; Juan-Carlos Cano; Nasreddine Lagraa; Pietro Manzoni

Cooperative Intelligent Transportation Systems, mainly represented by vehicular ad hoc networks (VANETs), are among the key components contributing to the Smart City and Smart World paradigms. Based on the continuous exchange of both periodic and event triggered messages, smart vehicles can enhance road safety, while also providing support for comfort applications. In addition to the different communication protocols, securing such communications and establishing a certain trustiness among vehicles are among the main challenges to address, since the presence of dishonest peers can lead to unwanted situations. To this end, existing security solutions are typically divided into two main categories, cryptography and trust, where trust appeared as a complement to cryptography on some specific adversary models and environments where the latter was not enough to mitigate all possible attacks. In this paper, we provide an adversary-oriented survey of the existing trust models for VANETs. We also show when trust is preferable to cryptography, and the opposite. In addition, we show how trust models are usually evaluated in VANET contexts, and finally, we point out some critical scenarios that existing trust models cannot handle, together with some possible solutions.


Vehicular Communications | 2017

TFDD: A trust-based framework for reliable data delivery and DoS defense in VANETs

Chaker Abdelaziz Kerrache; Nasreddine Lagraa; Carlos Miguel Tavares Calafate; Abderrahmane Lakas

Abstract A trust establishment scheme for enhancing inter-vehicular communication and preventing DoS attacks ‘TFDD’ is proposed in this paper. Based on a developed intrusion detection module (IDM) and data centric verification, our framework allows preventing DDoS attacks and eliminating misbehaving nodes in a distributed, collaborative and instantaneous manner. In addition, a trusted routing protocol is proposed that, using context-based information such as link stability and trust information, delivers data through the most reliable way. In this study, the simulation results obtained demonstrate the effectiveness of our trust framework at detecting dishonest nodes, as well as malicious messages that are sent by honest or dishonest nodes, after a very low number of message exchanges. Furthermore, colluding attacks are detected in a small period of time, which results in network resources being released immediately after an overload period. We also show that, in a worst-case scenario, our trust-based framework is able to sustain performance levels, and outperforming existing solutions such as T-CLAIDS and AECFV.


Security and Communication Networks | 2016

RITA: RIsk-aware Trust-based Architecture for collaborative multi-hop vehicular communications

Chaker Abdelaziz Kerrache; Carlos Miguel Tavares Calafate; Nasreddine Lagraa; Juan-Carlos Cano; Pietro Manzoni

Trust establishment over vehicular networks can enhance the security against probable insider attackers. Regrettably, existing solutions assume that the attackers have always a dishonest behavior that remains stable over time. This assumption may be misleading, as the attacker can behave intelligently to avoid being detected. In this paper, we propose a novel solution that combines trust establishment and a risk estimation concerning behavior changes. Our proposal, called risk-aware trust-based architecture, evaluates the trust among vehicles for independent time periods, while the risk estimation computes the behavior variation between smaller, consecutive time periods in order to prevent risks like an intelligent attacker attempting to bypass the security measures deployed. In addition, our proposal works over a collaborative multi-hop broadcast communication technique for both vehicle-to-vehicle and vehicle-to-roadside unit messages in order to ensure an efficient dissemination of both safety and infotainment messages. Simulation results evidence the high efficiency of risk-aware trust-based architecture at enhancing the detection ratios by more than 7% compared with existing solutions, such as T-CLAIDS and AECFV, even in the presence of high ratios of attackers, while offering short end-to-end delays and low packet loss ratios. Copyright


Journal of Advanced Transportation | 2018

UNION: A Trust Model Distinguishing Intentional and Unintentional Misbehavior in Inter-UAV Communication

Ezedin Barka; Chaker Abdelaziz Kerrache; Nasreddine Lagraa; Abderrahmane Lakas; Carlos Miguel Tavares Calafate; Juan-Carlos Cano

Ensuring the desired level of security is an important issue in all communicating systems, and it becomes more challenging in wireless environments. Flying Ad Hoc Networks (FANETs) are an emerging type of mobile network that is built using energy-restricted devices. Hence, the communications interface used and that computation complexity are additional factors to consider when designing secure protocols for these networks. In the literature, various solutions have been proposed to ensure secure and reliable internode communications, and these FANET nodes are known as Unmanned Aerial Vehicles (UAVs). In general, these UAVs are often detected as malicious due to an unintentional misbehavior related to the physical features of the UAVs, the communication mediums, or the network interface. In this paper, we propose a new context-aware trust-based solution to distinguish between intentional and unintentional UAV misbehavior. The main goal is to minimize the generated error ratio while meeting the desired security levels. Our proposal simultaneously establishes the inter-UAV trust and estimates the current context in terms of UAV energy, mobility pattern, and enqueued packets, in order to ensure full context awareness in the overall honesty evaluation. In addition, based on computed trust and context metrics, we also propose a new inter-UAV packet delivery strategy. Simulations conducted using NS2.35 evidence the efficiency of our proposal, called , at ensuring high detection ratios > 87% and high accuracy with reduced end-to-end delay, clearly outperforming previous proposals known as , - , and .


personal, indoor and mobile radio communications | 2016

Hierarchical adaptive trust establishment solution for vehicular networks

Chaker Abdelaziz Kerrache; Carlos Miguel Tavares Calafate; Nasreddine Lagraa; Juan-Carlos Cano; Pietro Manzoni

Cooperative intelligent transportation systems (CITS), mainly represented by Vehicular Ad Hoc Networks (VANETs), were developed to enhance safety on roads before being generalized to support other comfort and efficiency applications. Most VANET applications, including safety ones, are based on multi-hop communications. Hence, a certain trustworthiness should exist among vehicles to ensure a reliable and trusted communication excluding dishonest peers from all network operations. In this paper we propose an hierarchical trust establishment solution able to cope with VANET applications and their requirements. Our solution is based on a three-level architecture, which enables it to adapt to the communication scenario and the required security level. Simulation results conducted done NS2 tool evidence that our solution is able to reach almost optimal attacker detection ratios (more than 90%) even in the presence of a significant number of attackers in the network (25%) while reducing the wrong relay decision ratios.


international conference on electronic devices systems and applications | 2016

Detection of intelligent malicious and selfish nodes in VANET using threshold adaptive control

Chaker Abdelaziz Kerrache; Abderrahmane Lakas; Nasreddine Lagraa

Detecting malicious and selfish nodes is an important task in Vehicular Adhoc NETworks (VANETs). Various proposals adopted trust management as an alternative solution for it is less costly in terms of computation delay and mobility adaptation, compared to the cryptography-based solutions. However, the existing solutions assume that in general the attackers have always a dishonest behavior that persists over time. This assumption may be misleading, as the attackers can behave intelligently to avoid being detected. In this paper we propose a new solution for the detection of intelligent malicious behaviors based on the adaptive detection threshold. In addition to the detection of malicious nodes, our solution incite attackers to behave well since any malicious behavior will be immediately detected thanks to the adaptive detection threshold. We present simulations results which show the high efficiency of our proposal at ensuring high ratios for both detection and packet delivery.


Sensors | 2018

A Trusted Lightweight Communication Strategy for Flying Named Data Networking

Ezedin Barka; Chaker Abdelaziz Kerrache; Rasheed Hussain; Nasreddine Lagraa; Abderrahmane Lakas; Safdar Hussain Bouk

Flying Ad hoc Network (FANET) is a new resource-constrained breed and instantiation of Mobile Ad hoc Network (MANET) employing Unmanned Aerial Vehicles (UAVs) as communicating nodes. These latter follow a predefined path called ’mission’ to provide a wide range of applications/services. Without loss of generality, the services and applications offered by the FANET are based on data/content delivery in various forms such as, but not limited to, pictures, video, status, warnings, and so on. Therefore, a content-centric communication mechanism such as Information Centric Networking (ICN) is essential for FANET. ICN addresses the problems of classical TCP/IP-based Internet. To this end, Content-centric networking (CCN), and Named Data Networking (NDN) are two of the most famous and widely-adapted implementations of ICN due to their intrinsic security mechanism and Interest/Data-based communication. To ensure data security, a signature on the contents is appended to each response/data packet in transit. However, trusted communication is of paramount importance and currently lacks in NDN-driven communication. To fill the gaps, in this paper, we propose a novel trust-aware Monitor-based communication architecture for Flying Named Data Networking (FNDN). We first select the monitors based on their trust and stability, which then become responsible for the interest packets dissemination to avoid broadcast storm problem. Once the interest reaches data producer, the data comes back to the requester through the shortest and most trusted path (which is also the same path through which the interest packet arrived at the producer). Simultaneously, the intermediate UAVs choose whether to check the data authenticity or not, following their subjective belief on its producer’s behavior and thus-forth reducing the computation complexity and delay. Simulation results show that our proposal can sustain the vanilla NDN security levels exceeding the 80% dishonesty detection ratio while reducing the generated end-to-end delay to less than 1 s in the worst case and reducing the average consumed energy by more than two times.


Computer Networks | 2018

A Distributed Time-limited multicast algorithm for VANETs using incremental power strategy

Fatima Zohra Bousbaa; Nasreddine Lagraa; Chaker Abdelaziz Kerrache; Fen Zhou; Mohamed Bachir Yagoubi; Rasheed Hussain

Abstract Efficient information dissemination is the pinnacle of Vehicular Ad-hoc Networks (VANETs). In case of delay-sensitive information such as safety-related messages, it is imperative to minimize the transmission delay and increase the message reliability in VANETs. In a previous work, we proposed a Time-Limited Reliable Broadcast Incremental Power (TRBIP) algorithm, which is a centralized heuristic to reduce transmission interferences for safety message dissemination in VANETs. By reducing the total transmission energy and the number of hops, TRBIP is able to reduce the transmission interference and thus-forth maximizes the reliability. Furthermore, in TRBIP, VANETs’ features such as vehicle mobility and frequent network fragmentation are also taken into account through store-carry-and-forward and the periodic multicast tree reconstruction strategies. However, multicast tree management is hard to maintain in urban environments due to the high density of nodes in VANETs (large trees), and is affected by the city streets organizations (intersections, roundabout, ... etc.). To address the afore-mentioned issues, in this paper we propose a Distributed version of Time-Limited Reliable Broadcast Incremental Power (DTRBIP) based on a road segmentation technique. Our proposal is extended to handle both delay-sensitive and delay-tolerant applications, and also both low and high dynamic VANETs scenarios respectively urban and highway environments. The results of the simulation conducted using NS-2 simulator advocate for the efficiency of our proposed method in term of reducing the total emission energy (at least by 150 dBm), reducing the average delay by 52%, increasing the packet delivery ratio by more than to 5%, and reducing the protocol overhead up to 3%. Obtained results show a clear enhancement compared to the previous solutions (i.e, RGRP-SA, RBIP, and TRBIP).


international conference on wireless communications and mobile computing | 2017

An energy-efficient technique for MANETs distributed monitoring

Chaker Abdelaziz Kerrache; Andrea Lupia; Floriano De Rango; Carlos Miguel Tavares Calafate; Juan-Carlos Cano; Pietro Manzoni

Dishonesty detection in mobile and wireless networks is a task that typically relies on watchdog techniques. However, these medium overhearing-based techniques are prone to cause a high energy consumption. In an attempt to address this problem, several proposals adopted trust management as an alternative solution that is able to overcome the shortcomings of cryptography-based solutions when facing inside attacks. Unfortunately, these trust-based solutions remain mostly unable to reduce energy consumption. In this paper we propose a distributed time division-based monitoring strategy to achieve the required security levels while optimizing the energy consumption. Our proposal accounts for both trust and link duration among honest peers to fairly divide the monitoring period, and takes advantage of the periodically exchanged hello messages to make this solution fully distributed. Simulations results evidence the energy efficiency achieved by our proposal, especially for high density scenarios (>120 nodes) where the consumption becomes stable and does not increase with the number of nodes, while ensuring high detection ratios of malicious nodes (>85%).


international conference on communications | 2017

WeiSTARS: A weighted trust-aware relay selection scheme for VANET

Sofiane Dahmane; Chaker Abdelaziz Kerrache; Nasreddine Lagraa; Pascal Lorenz

Considered as a primordial component of Cooperative Intelligent Transportation Systems (C-ITS), Vehicular Ad Hoc Network (VANET) plays a weighty role to facilitate different on-road applications, most of which primary rely on multi hop communications. To ensure reliability and security of such communication, it is very pertinent to guarantee that the most proper and trustworthy vehicles are selected as relays. This paper takes up this challenge by introducing a weighted probabilistic and trust-aware strategy called WeiSTARS, to ensure high delivery ratios within reduced delays. Simulation results conducted using NS2 tool depicted that our technique enhances the delivery ratio by more than 8% with around 30% less delay compared to both GytAR and GPSR routing protocols even in the presence of high ratios of dishonest vehicles.

Collaboration


Dive into the Chaker Abdelaziz Kerrache's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Juan-Carlos Cano

Polytechnic University of Valencia

View shared research outputs
Top Co-Authors

Avatar

Pietro Manzoni

Polytechnic University of Valencia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge