0000000000762853

AUTHOR

Maissa Dammak

0000-0002-8815-6194

showing 2 related works from this author

Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments

2020

Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the emergence of new access control technologies in order to maintain this data safe from unauthorized use. In particular, a dynamic IoT environment, characterized by a high signaling overhead caused by subscribers' mobility, presents a significant concern to ensure secure data distribution to legitimate subscribers. Hence, for such dynamic environments, group key management (GKM) represents the fundamental mechanism for managing the dissemination of keys for access control and secure data distribution. However, existing access control schemes based on GKM and dedicated to IoT are mainly based on ce…

PROTOCOLSCRYPTOGRAPHYComputer Networks and CommunicationsComputer scienceGROUP COMMUNICATIONKey distributionCore networkRESEAU INFORMATIQUEAccess control02 engineering and technologySCALABILITYTECHNOLOGIE SANS FIL[SPI]Engineering Sciences [physics][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]TELECOMMUNICATIONForward secrecy0202 electrical engineering electronic engineering information engineeringRekeyingINTERNET OF THINGSElectrical and Electronic EngineeringINTERNETSECURITEDYNAMIC ENVIRONMENTSECURITYIOTTRAITEMENT DES DONNEESbusiness.industryKey distribution center020206 networking & telecommunicationsWIRELESS SENSOR NETWORKSRESEAU DE TELECOMMUNICATIONSGROUP KEY MANAGEMENTINFORMATIQUECommunication in small groupsScalabilityARCHITECTURE CLIENT-SERVEURbusinessCOMPUTER ARCHITECTUREACCESS CONTROLComputer network
researchProduct

Authentication and authorization security solution for the internet of thing

2021

The Internet of Things (IoT) represents the interconnection between the Internet and physical objects, places and environments. However, this extensive connectivity of IoT can be hampered by malicious interventions from cyber attackers. Thus, ensuring security for users and IoT devices remains a challenge, especially authentication and authorization, which are essential building blocks of the security process. This is due to the unconventional IoT characteristics, including scalability, heterogeneity, interoperability, and dynamic changes, which make the existing security measures inadequate. Indeed, these characteristics bring up several security requirements to consider when defining a se…

[INFO.INFO-OH] Computer Science [cs]/Other [cs.OH]AuthenticationHôtel intelligent[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]SecurityAuthorizationSécuritéSmart HotelAuthentification
researchProduct