Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mostafa Azizi is active.

Publication


Featured researches published by Mostafa Azizi.


international conference on multimedia computing and systems | 2009

Implementation of secure key distribution based on quantum cryptography

Mohamed Elboukhari; Abdelmalek Azizi; Mostafa Azizi

The two models of traditional cryptography (symmetric encryption and asymmetric encryption) are confronted, in addition to the difficulty in creating credible keys of encoding/decoding, to the problem of distributing keys with perfect security. We present in this article results of a simulation of successful eavesdropping when exchanging keys with RSA algorithm. A solution to this problem is proposed by quantum physics. In this case, the security of the exchanged keys is not based on algorithmic complexity but rather on the laws of the quantum physics. Many quantum protocols are elaborated to exchange keys with unconditionally security. We are interested here in simulation of the protocol BB84 which the security is unconditional due to Heisenbergs Uncertainty Principle.


International Journal of Network Security & Its Applications | 2010

ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING

Mohamed Elboukhari; Mostafa Azizi; Abdelmalek Azizi

Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was noted that quantum computers could break public key cryptosystems based on number theory extensive studies have been undertaken on QKD. Based on quantum mechanics, QKD offers unconditionally secure communication. Now, the progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years. Efforts are made to improve the performance and reliability of the implemented technologies. But several challenges remain despite this big progress. The task of how to test the apparatuses of QKD For example did not yet receive enough attention. These devises become complex and demand a big verification effort. In this paper we are interested in an approach based on the technique of probabilistic model checking for studying quantum information. Precisely, we use the PRISM tool to analyze the security of BB84 protocol and we are focused on the specific security property of eavesdropping detection. We show that this property is affected by the parameters of quantum channel and the power of eavesdropper.


international conference on multimedia computing and systems | 2012

QDGRP : A hybrid QoS Distributed Genetic routing protocol for Wireless Sensor Networks

Mohammed-Amine Koulali; Abdellatif Kobbane; Mohammed El Koutbi; Mostafa Azizi

Nature-inspired routing protocols have been subject to a great research activity. Their decentralized nature and low requirements make them highly suitable for Wireless Sensor Networks (WSN) where individual nodes operate without central control and without global overview of the network status to achieve global tasks. This paper proposes a hybrid QoS routing protocol for WSN based on a customized Distributed Genetic Algorithm (DGA) that accounts for delay and energy constraints. The proposed protocol (QDGRP) is compared to AODV w.r.t several performance metrics : end-to-end delay, throughput, packet delivery ratio and energy efficiency. The realized simulations show that QDGRP outperforms AODV and manages to achieve very good performances for various deployment scenarios.


International Journal of Network Security & Its Applications | 2010

VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING

Mohamed Elboukhari; Mostafa Azizi; Abdelmalek Azizi

Unlike classical cryptography which is based on mathematical functions, Quantum Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to offer unconditionally secure communication. The progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years and efforts are made to improve the performance and reliability of the implemented technologies. But despite this big progress, several challenges remain. For example the task of how to test the devices of QKD did not yet receive enough attention. These apparatuses become heterogeneous, complex and so demand a big verification effort. In this paper we propose to study quantum cryptography protocols by applying the technique of probabilistic model checking. Using PRISM tool, we analyze the security of BB84 protocol and we are focused on the specific security property of eavesdroppers information gain on the key derived from the implementation of this protocol. We show that this property is affected by the parameters of the eavesdropper’s power and the quantum channel.


international conference on multimedia computing and systems | 2012

Detection of smart card attacks using neural networks

Mostafa Azizi; Mimoun Moussaoui

The classification of the smartcard attacks is part of learning process used for understanding the different ways of breaking the system security. In fact, these classification methods can be applied for improving the system security, especially the smartcard one. In the paper, we study one of the smart classification methods, able to learn from data patterns and classify the attacks intelligently in order to respond as an appropriate case previously identified. According to this methodology, we develop first a neural network via the simulator JavaNNS, then we create a training database which contains attacks and classs models that the network must learn and then it must be able to classify other models contained in the test database and finally install the network generated in a javacard in order to get a smart one.


international symposium on visual computing | 2010

A QoS-geographic and energy aware routing protocol for Wireless Sensor Networks

M. A. Koulali; A. Kobbane; M. Elkoutbi; Mostafa Azizi

Recent technological advances in miniaturization and wireless communication have made Wireless Sensor Networks an active research field. The increasing number of multimedia and real-time applications for Wireless Sensor Networks has led to a growing interest in Quality of Service for this category of networks. In this paper, we propose a QoS-geographic and energy aware routing protocol for Wireless Sensor Networks. The proposed protocol performs admission control, accounts for bandwidth requirements and considers the sensors residual energy while taking routing decisions. The protocol also optimizes the delay of carried flows by adopting a selective forwarding approach based on sensor location.


2014 5th Workshop on Codes, Cryptography and Communication Systems (WCCCS) | 2014

Intrusion Detection Systems in mobile ad hoc networks: A survey

Mohamed Elboukhari; Mostafa Azizi; Abdelmalek Azizi

Due to its unique characteristics, mobile ad hoc networks (MANETs) are more vulnerable to malicious attack and the absolute security in the mobile ad hoc network is very hard to achieve. Prevention methods as cryptographic techniques alone are not sufficient to make them secure; therefore, efficient intrusion detection must be deployed and elaborated to facilitate the identification of attacks. An Intrusion Detection System (IDS) aims to detect malicious and selfish nodes in a network. The intrusion detection techniques used for wired networks may no longer be effective and sufficient when adapted directly to a wireless ad-hoc network, thus existing methods of intrusion detection have to be modified and new methods have to be defined in order to work effectively and efficiency in this new network architecture. In this paper we give a survey of different architectures and methods of intrusion detection systems (IDSs) for MANETs accordingly to the recent literature.


international symposium on visual computing | 2010

Quantum Key Distribution in practice: The state of art

Mohamed Elboukhari; Abdelmalek Azizi; Mostafa Azizi

Since it was noted that quantum computers could break public key cryptosystems based on number theory, extensive studies have been undertaken on Quantum Key Distribution (QKD). QKD or Quantum Cryptography solves the key distribution problem by allowing the exchange of a cryptographic key between two remote parties with absolute security, guaranteed by the laws of physics. Actually, the progress of research in this field allows the implementation of Quantum Cryptography outside of laboratories. Efforts are made to exploit this technology in the existing communication networks and to improve the performance and reliability of the implemented technologies. The cryptosystems based on QKD are very promising and also the technology is improving more and more to fulfill requirements. In this paper, we provide a state-of-the-art of practical Quantum Cryptography by exposing the popular works and projects on QKD implementation.


new technologies, mobility and security | 2008

Security Oriented Analysis of B92 by Model Checking

Mohamed Elboukhari; Abdelmalek Azizi; Mostafa Azizi

This paper presents a methodology for analyzing quantum information systems, based on model checking; particularly we are interested in the protocol of quantum key distribution B92. It has been proved that this protocol is unconditionally secure against all kinds of attacks according to the information theory, but this security proof is not easily adaptable to practical scenarios. Our approach is based on probabilistic model checking; using the PRISM tool, we show that the protocol B92 fulfilled specific security properties.


Archive | 2016

MDA Approach to Automate Code Generation for Mobile Applications

Hanane Benouda; Mostafa Azizi; Redouane Esbai; Mimoun Moussaoui

The development of mobile applications is increasingly growing up in our environment due to the intensive use of applications in mobile devices with touch screens. However, the diversity of mobile operating systems (iOS, Windows Phone, Android, etc.), requires additional cares like code efficiency, interaction with device resources, as well as short time to market. What makes developers facing a big challenge of developing the same application for different platforms. Considering this development complexity, we directed our work to platforms using Model Driven Architecture (MDA) combined with UML, as previously used in software engineering, can offer abstraction and automation for mobile applications developers. This paper presents a MDA approach for mobile applications development including UML based modeling and code generation according to the principal (Develop Once, Use Everywhere) in order to facilitate and accelerate the development of mobile applications.

Collaboration


Dive into the Mostafa Azizi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge