logo EDITE Amira BRADAI
Identité
Amira BRADAI
État académique
Thèse soutenue le 2014-09-29
Sujet: Sécurité des réseaux hétèrogénes
Direction de thèse:
Laboratoire:
Voisinage
Ellipse bleue: doctorant, ellipse jaune: docteur, rectangle vert: permanent, rectangle jaune: HDR. Trait vert: encadrant de thèse, trait bleu: directeur de thèse, pointillé: jury d'évaluation à mi-parcours ou jury de thèse.
Productions scientifiques
oai:hal.archives-ouvertes.fr:hal-00713772
A framework using IBC achieving non-repudiation and privacy in vehicular network.
In vehicular communications, a balance between privacy and anonymity from one side and responsibility and non repudiation from the other side is very important. In this paper, a security framework for VANETs to achieve privacy and non-repudiation is proposed. We present the safety requirements in the context of accident and reporting problem. We build a platform to provide security to safety messages in an accident scenario based on Identity-based cryptography (IBC). An analytical evaluation and performance measurement are achieved to validate this platform. This study confirms that identity-based cryptography and elliptic curves are very useful to make light communications.
Network and Information Systems Security (SAR-SSI), 2011peer-reviewed article 2011-06-27
oai:hal.archives-ouvertes.fr:hal-00740775
Enforcing Trust-based Intrusion Detection in Cloud Computing Using Algebraic Methods
A trust-based intrusion detection scheme for hybrid cloud computing is proposed. We consider a trust metric based on honesty, cooperation and efficiency for detecting malicious machines. We use Perron-Frobenius theorem to detect intrusion based on trust and observations. By statistically analyzing peer-to-peer trust distributed results, we apply trust-based intrusion detection to assess the trustworthiness and maliciousness. An analytical model and simulation for performance are developed. We analyze the sensitivity of false alarms with respect to the minimum trust threshold below where a node is considered malicious. Results confirm that our proposal is flexible enough to detect malicious behaviours in various context of executing application in hybrid cloud. With this work, we can guide future execution in the cloud resource.
Cyberc 2012article in peer-reviewed journal 2012-10-08
Soutenance
Thèse: Gestion de la confiance et de la réputation sécurisée: Analyse des attaques possibles et optimisation
Soutenance: 2014-09-29
Rapporteurs: Ken CHEN    Véronique VÈQUE