
Mohamed Amine FerragUniversité 8 mai 1945 - Guelma · Department of Computer Science
Mohamed Amine Ferrag
(Ph.D. & Hab.; SIEEE) in Cyber Security- Top 2% scientists (2020,2021,2022)
(PhD , Hab) in Cyber Security - IEEE Senior Member - Top 2% scientists (2020,2021,2022)
About
165
Publications
151,916
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,872
Citations
Citations since 2017
Introduction
Dr. Mohamed Amine Ferrag received the Bachelor's degree (June, 2008), Master's degree (June, 2010), Ph.D. degree (June, 2014), and HDR degree (April 2019) from Badji Mokhtar- Annaba University, Algeria, all in Computer Science. Since October 2014, he is an assistant professor at the Department of Computer Science, Guelma University, Algeria. His research interests include wireless network security, network coding security, and applied cryptography.
Additional affiliations
October 2010 - October 2014
Publications
Publications (165)
In this article, we review the state of the art of privacy-preserving schemes for ad hoc social networks, including, mobile social networks (MSNs) and vehicular social networks (VSNs). Specifically, we select and in-detail examine thirty-three privacy-preserving schemes developed for or applied in the context of ad hoc social networks. Based on nov...
In this paper, we propose an Efficient Secure routing Scheme based on searchable encryption with vehicle Proxy Re-encryption, called ESSPR, for achieving privacy preservation of message in vehicular peer-to-peer social network (VP2PSN). Specifically, the proposed ESSPR scheme consists of six phases: system initializations phase, peer registration p...
In this paper, we propose an efficient privacy-preserving energy consumption scheme with updating certificates, called EPEC, for secure smart grid communications. Specifically, the proposed EPEC scheme consists of four phases: gateways initialization, party registration, privacy-preserving energy consumption, and updating certificates. Based on the...
This paper presents a comprehensive survey of existing authentication and
privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a
classification of threat models in 4G and 5G cellular networ...
Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing towards the edge of the networks while offloading the cloud data centers and reducing service latency to the end users. However, the characteristics of fog computing arise new security and privacy challenges. The existing security and privacy mea...
In this article, we are trying to bridge the gap between cybersecurity and the reliability of Critical National Infrastructures (CNIs). We are discussing new methodologies that could map better the system requirements by incorporating security (and privacy) with reliability (and safety), introducing a new research area under the broad term of secur...
Federated edge learning can be essential in supporting privacy-preserving, artificial intelligence (AI)-enabled activities in digital twin 6G-enabled Internet of Things (IoT) environments. However, we need to also consider the potential of attacks targeting the underlying AI systems (e.g., adversaries seek to corrupt data on the IoT devices during...
The next generation of cellular technology, 6G, is being developed to enable a wide range of new applications and services for the Internet of Things (IoT). One of 6G's main advantages for IoT applications is its ability to support much higher data rates and bandwidth as well as to support ultra-low latency. However, with this increased connectivit...
Electricity theft, known as "Non-Technical Loss" (NTL) is certainly one of the priorities of power distribution utilities. Indeed, NTL could lead to serious damage ranging from massive financial losses to loss of reputation resulting from poor power quality. With advances in metering infrastructure technologies, the availability of user data has fu...
The digital revolution has taken business sectors to a new height through the advancement of technology. The healthcare sector also embraced digital technology to facilitate technological change from mechanical and analogue electronic devices to the digital technology that is available today. The common use of digital technology in the healthcare s...
Unmanned Aerial Vehicles (UAVs), also known as drones, have recently become one of the most important technological breakthroughs. They have opened the horizon for a vast array of applications and paved the way for a diversity of innovative solutions. Integrating drones with the Internet has led to the emergence of a new paradigm named the Internet...
Cloud Computing is a paradigm allowing access to physical and application resources online via the Internet. These resources are virtualized using virtualization software to make them available to users as a service. Virtual machines (VMs) migration technique provided by virtualization technology impacts the performance of the cloud. It is a signif...
Advanced technologies, such as the Internet of Things (IoT) and Artificial Intelligence (AI), underpin many of the innovations in Industry 4.0. However, the interconnectivity and open nature of such systems in smart industrial facilities can also be targeted and abused by malicious actors, which reinforces the importance of cyber security. In this...
In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. Moreover, we analyze security threats, and general implementation problems, presenting several sectors that can benefit the most from IoT development. Discussion over the findings...
By leveraging the conventional Vehicular Ad-hoc Networks (VANETs), the Internet of Vehicles (IoV) paradigm has attracted the attention of different research and development bodies. However, IoV deployment is still at stake as many security and privacy issues are looming; location tracking using overheard safety messages is a good example of such is...
The growing reliance of industry 4.0/5.0 on emergent technologies has dramatically increased the scope of cyber threats and data privacy issues. Recently, federated learning (FL) based intrusion detection systems (IDS) promote the detection of large-scale cyber-attacks in resource-constrained and heterogeneous industrial systems without exposing da...
The industrial internet of things (IIoT) is considered a new paradigm in the era of wireless
communication for performing automatic communication in the network. However, automatic
computation and data recognition may invite several security and privacy threats into the system
during the sharing of information. There exist several intrusion detecti...
The increase in electricity theft has become one of the main concerns of power distribution networks. Indeed, electricity theft could not only lead to financial losses but also leads to reputation damage by reducing the quality of supply. With advanced sensing technologies of metering infrastructures, data collection of electricity consumption enab...
The digital revolution has made people more dependent on ICT technology to perform everyday tasks, whether at home or at work [...]
The International Conference on Pattern Analysis and Intelligent Systems would like to become a major point of contact between researchers, engineers, and practitioners from all over the world to share ideas and achievements in the theory and practice of intelligent control, artificial intelligence and decision support concerned with systems, neura...
Computer systems rely heavily on passwords their safety for unreasonable long time, compared to the rapid progress and development of technology. Although insufficient authenti-cation mechanisms were enhanced by the use of two or more factors that resulted in new multi factor authentication schemes, more sophisticated and targeted attacks have show...
Federated learning (FL) is a data-privacy-preserving, decentralized process that allows local edge devices of smart infrastructures to train a collaborative model independently while keeping data localized. FL algorithms, encompassing a well-structured average of the training parameters (e.g., the weights and biases resulting from training-based st...
The use of Internet key exchange protocols in IP Security architecture and IoT environments has vulnerable to various malicious attacks and affects communication efficiency. To address these weaknesses, we propose a novel efficient and secure Internet key exchange protocol (ESIKE), which achieves a high level of security along with low computationa...
Agricultural advancement over time has been an essential component of human civilization's evolution. The rapid progress of emerging technologies is driving digital empowerment in nearly every industry, including the agricultural sector. Regardless of the benefits derived from this evolution, there are several security threats involved, which can h...
Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provid...
As we move from traditional power grids to smart grids, new threats arise. We focus on cybersecurity in power grids, highlighting the threats to and vulnerabilities of those cyberphysical systems and presenting future solutions.
This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government, and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16...
This editorial presents the manuscripts accepted, after a careful peer-review process,
for publication in the topic “Cyber Security and Critical Infrastructures” of the MDPI journals Applied Sciences, Electronics, Future Internet, Sensors and Smart Cities. The first volume includes sixteen articles: one editorial article, fifteen original research...
Cloud Computing is a paradigm allowing access to physical and application resources online via the Internet. These resources are virtualized using virtualization software to make them available to users as a service. In this environment, the migration of virtual machines (VMs) is a significant concern these days. This technique provided by virtuali...
In recent years, the large amount of heterogeneous data generated by the Internet of Things (IoT) sensors and devices made recording and research tasks much more difficult, and most of the state-of-the-art methods have failed to deal with the new IoT requirements. This article proposes a new efficient method that simplifies data indexing and enhanc...
The continuous production of heterogeneous IoT data created a new challenge, which is their storage and retrieve efficiently. In this work, a new method of indexing, called Threshold Distance (TD), is proposed in the fog‐cloud architecture. In this method, the fog layer is divided into two levels: a clustering level and an indexing level. In the cl...
Healthcare is one of the most targeted industries by cybercriminals. The healthcare sector is far behind in cybersecurity as compared to other organizations. The vulnerabilities in the system open the door for cybercriminals to exploit it and get unauthorized access into the system or network to do a malicious activity. Healthcare should have to ta...
Unmanned Aerial Vehicles (UAVs) have been progressively used in environmental monitoring and disaster sensing. The drones fly over a set of waypoints in the area to achieve their surveillance task. Despite their potential advantages, UAVs have several drawbacks, including a limited energy supply and a short operational duration which make all attem...
In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and federated learning. Specifically, the dataset has been generated using a purpose-built IoT/IIoT test...
In this paper, we propose a federated learning-based intrusion detection system, named FELIDS, for securing agricultural-IoT infrastructures. Specifically, the FELIDS system protects data privacy through local learning, where devices benefit from the knowledge of their peers by sharing only updates from their model with an aggregation server that p...
The quick revolution on the wireless communication technologies had opened the gate towards promising implementations; Vehicular-Ad-hoc Networks (VANETs) and the safety-enhancing applications provided by the Internet of Vehicles (IoV) paradigm are one of them. By periodically broadcasting safety-beacons, vehicles can ensure a better safety-driving...
div>In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and federated learning. Specifically, the proposed testbed is organized into seven layers, including...
div>In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and federated learning. Specifically, the proposed testbed is organized into seven layers, including...
The connectivity and intelligence of IoT equipment offer improved services, but several technical challenges have emerged in recent years that hinder the widespread application of IoT, e.g., security and safety. Cyber-security and privacy countermeasures are widely used in IoT equipment, and many studies have been conducted. However, an important a...
The past decade has been characterized by the growing volumes of data due to the widespread use of the Internet of Things (IoT) applications, which introduced many challenges for efficient data storage and management. Thus, the efficient indexing and searching of large data collections is a very topical and urgent issue. Such solutions can provide...
In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity a...
Although sufficient authentication mechanisms were enhanced by the use of two or more factors that resulted in new multi factor authentication schemes, more sophisticated and targeted attacks have shown they are also vulnerable. This research work proposes a novel two factor authentication system that incorporates honeytokens into the two factor au...
Industrial Internet of Things (IIoT) applies Internet of Things (IoT) technology in industrial systems, to optimize business processes efficiency, service quality, and reliability. However, with a large of isolated IoT networks deployed in various industries, many vulnerabilities have been exposed to security incidents and posed threats to IIoT sec...
As blockchain technology has already become a critical priority for enterprises, it is acknowledged that it might be as much important as to reform and reconstruct businesses in the near future. In this paper we review the strengths and weaknesses of the blockchain technology, and present an example application in supply chain management. We start...
The quick revolution on the wireless communication technologies had opened the gate towards promising implementations; Vehicular-Ad-hoc Networks (VANETs) and the safety-enhancing applications provided by the Internet of Vehicles (IoV) paradigm are one of them. By periodically broadcasting safety-beacons, vehicles can ensure a better safety-driving...
In this article, we present a comprehensive study with an experimental analysis of federated deep learning approaches for cyber security in the Internet of Things (IoT) applications. Specifically, we first provide a review of the federated learning-based security and privacy systems for several types of IoT applications, including, Industrial IoT,...
It is a well known fact that the weakest link in a cyber secure system is the people who configure, manage or use it. Security breaches are persistently being attributed to human error. Social engineered based attacks are becoming more sophisticated to such an extent where they are becoming increasingly more difficult to detect. Companies implement...
Due to the blooming trend of information technologies, attacks have become widespread and sophisticated, which calls to build a strong defense design that works with the attack evolution. The countermeasure selection enables the system to retrieve its health. However, privacy concerns are also introduced in the selection process, which makes the bu...
Critical National Infrastructures (CNIs) are vital assets for public safety, economic welfare and the national security of countries. Vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. Moreover, during the COVID-19 crisis, the workforce is being encouraged to continue teleworking while mo...
Critical infrastructures are vital assets for public safety, economic welfare, and the national security of nations [...]
Over the years, the digitization of all aspects of life in modern societies is considered an acquired advantage. However, like the terrestrial world, the digital world is not perfect and many dangers and threats are present. In the present work, we conduct a systematic review on the methods of network detection and cyber attacks that can take place...
Over the years the digitization of all aspects of life in the modern societies is considered
an acquired advantage. But like the terrestrial world, the digital world is not angelic and they lurk many dangers and threats. In the present work we conduct a systematic review to the methods of network detection and cyber attacks that can take place on a...
Digital twin technology today is diverse and emerging and its full potential is not yet widely understood. The concept of a digital twin allows for the analysis, design, opti-misation and evolution of systems to take place fully digital, or in conjunction with a cyber-physical system to improve speed, accuracy and efficiency when compared to tradit...
The use of Internet key exchange protocols in IP Security architecture and in IoT environments has vulnerabilities against various malicious attacks and affects communication efficiency. To address these weaknesses, we propose a novel efficient and secure Internet key exchange protocol (ESIKE), which achieves a high level of security along with low...
The speed and pace of the transmission of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2; also referred to as novel Coronavirus 2019 and COVID-19) have resulted in a global pandemic, with significant health, financial, political and other implications. There have been various attempts to manage COVID-19 and other pandemics using techno...
In this paper, we review and analyze intrusion detection systems for Agriculture 4.0 cyber security. Specifically, we present cyber security threats and evaluation metrics used in the performance evaluation of an intrusion detection system for Agriculture 4.0. Then, we evaluate intrusion detection systems according to emerging technologies, includi...
This article is about quantum cryptography in Maritime Telecommunications. Cryptography is necessary for the security of online communications, transportations, medicine, and other significant fields. This new research area has been fruitful in recognizing mathematical operations that quantum algorithms lack in speed and build cryptographic systems...
Smart Agriculture or Agricultural Internet of things, consists of integrating advanced technologies (e.g., NFV, SDN, 5G/6G, Blockchain, IoT, Fog, Edge, and AI) into existing farm operations to improve the quality and productivity of agricultural products. The convergence of Industry 4.0 and Intelligent Agriculture provides new opportunities for mig...
This paper presents research challenges and a tutorial on performance evaluation of blockchain-based security and privacy systems for the internet of things (IoT). We start by summarizing the existing surveys that deal with blockchain security for IoT networks. Then, we review the blockchain-based security and privacy systems for seventeen types of...
ABSTRACT
Nowadays, the number of services is increasing which allows users
to perform their tasks easily. A huge amount of data is published
regularly where the personal data takes the lion’s share. In fact,
personal data protection remains a big issue as far as how the
service provider collected the data and for what purpose. Therefore,
the privac...
The majority of systems rely on user authentication
on passwords, but passwords have so many weaknesses and
widespread use that easily raises significant security concerns,
regardless of their encrypted form. Users hold the same password
for different accounts, administrators never check password files
for flaws that might lead to a successful crac...
Internet of Vehicles (IoV) has the potential to enhance road-safety with environment sensing features provided by embedded devices and sensors. This benignant feature also raises privacy issues as vehicles announce their fine-grained whereabouts mainly for safety requirements, adversaries can leverage this to track and identify users. Various priva...
Citation: Babaghayou, M.; Labraoui, N.; Abba Ari, A.A.; Ferrag, M.A.; Maglaras, L.; Janicke, H. WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicle. Sensors 2021, 21, 2443. https://doi.
The concept of the Internet of Vehicles (IoV) has attracted the attention of many sectors such as the automotive industry, academia, engineering, etc., offering a wide variety of benefits, such as reduced congestion, safer driving, and less pollution. However, since the deployment of IoT-based devices is in an open field, the IoV environments can b...
Ce polycopié pédagogique en Sécurité Informatique fournit des bases solides dans l'ingénierie de la sécurité et permet aux étudiants de suivre facilement d'autres modules en sécurité et en cryptographie. À la fin de ce cours, les étudiants pourront: ‐ Indiquer les concepts de base en matière de sécurité de l'information, y compris les politiques de...
Current developments in information technology and increased inclination towards smart cities have led to the initiation of a plethora of features by technology-oriented companies (i.e., car manufacturers) to improve users’ privacy and comfort. The invention of smart vehicle technology paved the way for the excessive use of machine-to-machine techn...
Distributed Ledger and Blockchain technology decentralise the way we store data and manage information. Blockchain technology is the backbone of most cryptocurrencies, but also is being explored in other serious fields, such as new governance systems with more participatory decision-making, and decentralised autonomous organisations that can operat...
This paper presents a comprehensive review of emerging technologies for the Internet of Things-based smart agriculture. We begin by summarizing the existing surveys and describing emergent technologies for the agricultural Internet of Things (IoT), such as unmanned aerial vehicles, wireless technologies, open-source IoT platforms, Software Defined...
In recent years, there has been a growing demand for cybersecurity experts, and, according to predictions, this demand will continue to increase. Cyber Ranges can fill this gap by combining hands-on experience with educational courses, and conducting cybersecurity competitions. In this paper, we conduct a systematic survey of ten Cyber Ranges that...