Hella Kaffel-Ben Ayed
Tunis University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Hella Kaffel-Ben Ayed.
Procedia Computer Science | 2015
Bilel Zaghdoudi; Hella Kaffel-Ben Ayed; Imen Riabi
Abstract Mobile and wireless networks permit to widen traditional internet applications to this kind of networks. Furthermore, with the dramatic increase in their capabilities, mobile devices are becoming one of the main processing devices for users. However, they still lack resources compared to traditional processing devices. Integration between mobile devices over mobile ad hoc networks and Cloud computing is addressed in various studies. The goal of this paper is to propose a protocol for the deployment of an ad hoc mobile cloud over MANETs. This scenario has multiple advantages such as ubiquity, availability, affordability, opportunity and spontaneity. The proposed system is composed of two types of nodes: Providers and Customers. A group of nodes with sufficient resources (Providers) collaborate to set up an IAAS like cloud and provides their services to a set of nodes (Customers) requesting resources. The protocol permits a dynamic management of provider and customer nodes.
international conference for internet technology and secured transactions | 2013
Asma Hamed; Hella Kaffel-Ben Ayed; Mohamed Ali Kaafar; Ahmed Kharraz
In this paper our goal is to measure the presence of trackers and tracking components in websites to identify their dangerousness to privacy.We propose an intuitive privacy scoring model to quantify the use of tracking techniques and identify how users activities are tracked when they are online. We developeded and distributed a firefox add-on that collects the web browsing history of our volunteers along with the detected tracking components and computes the scores of the visited web page. Using our collected dataset, we examine the tracking capabilities in the wild. Our findings show that while cookies-based tracking is present in almost all websites, independently from the content and from the audience, JavaScripts are also present and can also be a major vector of web tracking. We demonstrate that the trackers dangerousness for the users privacy should not be measured by the number of components but by their presence through the websites and the domains. Correlation was also found between scores and tracking components which confirms that our intuitive scoring model is realistic.
acs/ieee international conference on computer systems and applications | 2015
Hajer Boujezza; Modher Al-Mufti; Hella Kaffel-Ben Ayed; Leïla Azouz Saïdane
Internet of Things viewed as Future Internet aims to provide the capacities for each physical entity to be connected to the Internet and to establish its requirements services or to be attached to a distributed system computing. Therefore, each object must have its identity (ies) that permits accomplishing the authentication and authorization phases before beginning every secure transaction. Hence, the number of identities increase at least according to the number of connected object. Today, several challenges such as security, privacy and identities management must be taken into account. In this paper, we propose a taxonomy of identities management systems (IDMS) in Internet of Things (IOT) relying on the viewpoint of paradigms and models. We present the core components of an Identity management system. Discuss the different types of IDMS paradigms such as User Centric, Application and Network Centric. Also, we present a comparative analysis of Identity management models: - user model, service provider (SP) model, Combining user and SP model in the form of Taxonomy and we discussed the Related Works of IDMS of IOT.
international conference on wireless communications and mobile computing | 2017
Hella Kaffel-Ben Ayed; Hajer Boujezza; Imen Riabi
Identities are known as the most sensitive information. With the increasing number of connected objects and identities (a connected object may have one or many identities), the computing and communication capabilities improved to manage these connected devices and meet the needs of this progress. Therefore, new IoT Identity Management System (IDMS) requirements have been introduced. In this work, we suggest an IDMS approach to protect private information and ensures domain change in IoT for mobile clients using a personal authentication device. Firstly, we present basic concepts, existing requirements and limits of related works. We also propose new requirements and show our motivations. Next, we describe our proposal. Finally, we give our security approach validation, perspectives, and some concluding remarks.
International Journal of Information Security and Privacy | 2014
Hella Kaffel-Ben Ayed; Asma Hamed
This paper presents an experimental study on mobile Web and mobile applications tracking. The study on Mobile Web tracking has been conducted on datasets collected by TrackScoreMobile, a Firefox add-on that has been developed and distributed to a set of Tunisian students and researchers. Results identify the factors that increase the privacy risk. The study on mobile applications tracking focuses on the permissions required by android applications. The findings point out on the mostly required permissions and the mostly tracked application categories. The originality of this work is summarized as follows: 1 identification and measurement of the parameters to quantify Web tracking, 2 identification of risky association between mobile applications permissions and associations between permissions and tracking components. The goal of this paper is to better understand how trackers rely on tracking components and on permissions for the purpose of tracking mobile users.
international conference on wireless communications and mobile computing | 2017
Hajer Boujezza; Hella Kaffel-Ben Ayed; Leila Azouz Saodane
Vulnerability(s) and attack(s) can occur on the proxy or during translation protocol of secure transport protocols in Constrained Application Protocol (CoAP). Existing security countermeasure deploys Datagram Transport Security layer (DTLS) and Transport Security layer (TLS) between client and server as IoT (Internet of Things) communicating entities. Proxy plays the role of interface between client and Server. It can also decrypt the received message and encrypt data according to the used security transport protocol of the other side. The vulnerability appears during this phase, especially, where the proxy is not confident or supervised by an illegitimate entity. Consequently, passing through the proxy communication node, security services like confidentiality and integrity can easily be compromised. Exploiting advantages of studied cryptographic algorithms, we focus on our customized security objectives regarding proxy element and DTLS-TLS translation. We detail, in this paper, the algorithm and the sequence diagram of secure communication of our proposal adapted for CoAP architecture. As an encryption strategy, we follow the cryptographic envelope principle based on ID-KEM and Three-pass Protocol. As a hypothesis, we assumed that the communication deploys our recent IDMS (Identity management System) contribution for IoT, relying on the EAP_OAuth2.0 (Extensible Authentication Protocol and Open Authorization Protocol) protocols via DTLS, as the starting phase in order to keep authentication and authorization services. Finally, we describe the security validation, present our perspectives and conclude our work.
the internet of things | 2016
Bilel Zaghdoudi; Hella Kaffel-Ben Ayed; Islem Gnichi
The research community is interested in the use of shared, heterogeneous resources. The numerous benefits that distributed computing can provide in different fields led to the emergence of new distributed computing paradigms namely ad hoc mobile cloud computing, Cloud of Things, Jungle and Fog computing. The goal of this paper is to present a deep study and a comparison of the new distributed computing paradigms. We also present a proof of concept study of a proposed protocol for the deployment and the management of a resource sharing architecture composed of interconnected mobile nodes. We implemented our solution and tested it over small sized spontaneous networks. From the experiments, we obtained detailed measurements of the time required for the architectures setup and the customers or providers nodes joining. This permits to prove the protocol feasibility in real distributed environment with acceptable times.
cryptology and network security | 2016
Bilel Zaghdoudi; Hella Kaffel-Ben Ayed; Wafa Harizi
The goal of this paper is to propose an approach based on DHT toward access control for ad hoc MCC and Fog computing. We rely on Chord DHTs to create a scalable, generic and robust access control solution. We use simulations to evaluate the performances of the proposal. We focus on a set of metrics to measure the overhead of the system. We considered a variable network size, a variable responsible nodes percentage and different hash function as simulation parameter. The obtained results show acceptable overhead for relatively average networks sizes. Simulations show that all the metrics increase with the nodes number and the number of responsible nodes.
International Journal of Wireless and Mobile Computing | 2016
Bilel Zaghdoudi; Hella Kaffel-Ben Ayed
Ad hoc mobile clouds would be suitable for spontaneous ad hoc networks created in situations where the mobile infrastructures are very pervasive and where the interconnection to an infrastructure network is very costly. The advantages of ad hoc mobile clouds are ubiquity, affordability, availability and spontaneity. The provision of an reliable ad hoc MCC framework has to cope with the specific features of spontaneous networks such as the dynamic topology and the scarcity of mobile device resources. The goal of this paper is to propose a protocol handling the setting up and the management of an ad hoc MCC over mobile ad hoc networks. We show by simulations that our proposal has acceptable overhead and energy consumption especially for small networks. The originality of this work consists in providing seamless communication services to mobile cloud frameworks regarding the underlying ad hoc network technology.
2015 6th International Conference on Information and Communication Systems (ICICS) | 2015
Asma Hamed; Hella Kaffel-Ben Ayed
Collaboration
Dive into the Hella Kaffel-Ben Ayed's collaboration.
Commonwealth Scientific and Industrial Research Organisation
View shared research outputs