Mohamed Amine Ferrag

Mohamed Amine Ferrag
Université 8 mai 1945 - Guelma · Department of Computer Science

(Ph.D. & Hab.; SIEEE) in Cyber Security- Top 2% scientists (2020,2021,2022)
(PhD , Hab) in Cyber Security - IEEE Senior Member - Top 2% scientists (2020,2021,2022)

About

165
Publications
151,916
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,872
Citations
Citations since 2017
144 Research Items
4834 Citations
201720182019202020212022202305001,0001,500
201720182019202020212022202305001,0001,500
201720182019202020212022202305001,0001,500
201720182019202020212022202305001,0001,500
Introduction
Dr. Mohamed Amine Ferrag received the Bachelor's degree (June, 2008), Master's degree (June, 2010), Ph.D. degree (June, 2014), and HDR degree (April 2019) from Badji Mokhtar- Annaba University, Algeria, all in Computer Science. Since October 2014, he is an assistant professor at the Department of Computer Science, Guelma University, Algeria. His research interests include wireless network security, network coding security, and applied cryptography.
Additional affiliations
October 2010 - October 2014
Badji Mokhtar - Annaba University
Position
  • Research Assistant

Publications

Publications (165)
Article
In this article, we review the state of the art of privacy-preserving schemes for ad hoc social networks, including, mobile social networks (MSNs) and vehicular social networks (VSNs). Specifically, we select and in-detail examine thirty-three privacy-preserving schemes developed for or applied in the context of ad hoc social networks. Based on nov...
Article
Full-text available
In this paper, we propose an Efficient Secure routing Scheme based on searchable encryption with vehicle Proxy Re-encryption, called ESSPR, for achieving privacy preservation of message in vehicular peer-to-peer social network (VP2PSN). Specifically, the proposed ESSPR scheme consists of six phases: system initializations phase, peer registration p...
Article
Full-text available
In this paper, we propose an efficient privacy-preserving energy consumption scheme with updating certificates, called EPEC, for secure smart grid communications. Specifically, the proposed EPEC scheme consists of four phases: gateways initialization, party registration, privacy-preserving energy consumption, and updating certificates. Based on the...
Technical Report
Full-text available
This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a classification of threat models in 4G and 5G cellular networ...
Article
Full-text available
Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing towards the edge of the networks while offloading the cloud data centers and reducing service latency to the end users. However, the characteristics of fog computing arise new security and privacy challenges. The existing security and privacy mea...
Preprint
In this article, we are trying to bridge the gap between cybersecurity and the reliability of Critical National Infrastructures (CNIs). We are discussing new methodologies that could map better the system requirements by incorporating security (and privacy) with reliability (and safety), introducing a new research area under the broad term of secur...
Preprint
Full-text available
Federated edge learning can be essential in supporting privacy-preserving, artificial intelligence (AI)-enabled activities in digital twin 6G-enabled Internet of Things (IoT) environments. However, we need to also consider the potential of attacks targeting the underlying AI systems (e.g., adversaries seek to corrupt data on the IoT devices during...
Preprint
Full-text available
The next generation of cellular technology, 6G, is being developed to enable a wide range of new applications and services for the Internet of Things (IoT). One of 6G's main advantages for IoT applications is its ability to support much higher data rates and bandwidth as well as to support ultra-low latency. However, with this increased connectivit...
Article
Electricity theft, known as "Non-Technical Loss" (NTL) is certainly one of the priorities of power distribution utilities. Indeed, NTL could lead to serious damage ranging from massive financial losses to loss of reputation resulting from poor power quality. With advances in metering infrastructure technologies, the availability of user data has fu...
Article
Full-text available
The digital revolution has taken business sectors to a new height through the advancement of technology. The healthcare sector also embraced digital technology to facilitate technological change from mechanical and analogue electronic devices to the digital technology that is available today. The common use of digital technology in the healthcare s...
Article
Unmanned Aerial Vehicles (UAVs), also known as drones, have recently become one of the most important technological breakthroughs. They have opened the horizon for a vast array of applications and paved the way for a diversity of innovative solutions. Integrating drones with the Internet has led to the emergence of a new paradigm named the Internet...
Article
Full-text available
Cloud Computing is a paradigm allowing access to physical and application resources online via the Internet. These resources are virtualized using virtualization software to make them available to users as a service. Virtual machines (VMs) migration technique provided by virtualization technology impacts the performance of the cloud. It is a signif...
Article
Advanced technologies, such as the Internet of Things (IoT) and Artificial Intelligence (AI), underpin many of the innovations in Industry 4.0. However, the interconnectivity and open nature of such systems in smart industrial facilities can also be targeted and abused by malicious actors, which reinforces the importance of cyber security. In this...
Article
Full-text available
In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. Moreover, we analyze security threats, and general implementation problems, presenting several sectors that can benefit the most from IoT development. Discussion over the findings...
Article
Full-text available
By leveraging the conventional Vehicular Ad-hoc Networks (VANETs), the Internet of Vehicles (IoV) paradigm has attracted the attention of different research and development bodies. However, IoV deployment is still at stake as many security and privacy issues are looming; location tracking using overheard safety messages is a good example of such is...
Article
The growing reliance of industry 4.0/5.0 on emergent technologies has dramatically increased the scope of cyber threats and data privacy issues. Recently, federated learning (FL) based intrusion detection systems (IDS) promote the detection of large-scale cyber-attacks in resource-constrained and heterogeneous industrial systems without exposing da...
Article
Full-text available
The industrial internet of things (IIoT) is considered a new paradigm in the era of wireless communication for performing automatic communication in the network. However, automatic computation and data recognition may invite several security and privacy threats into the system during the sharing of information. There exist several intrusion detecti...
Conference Paper
The increase in electricity theft has become one of the main concerns of power distribution networks. Indeed, electricity theft could not only lead to financial losses but also leads to reputation damage by reducing the quality of supply. With advanced sensing technologies of metering infrastructures, data collection of electricity consumption enab...
Article
Full-text available
The digital revolution has made people more dependent on ICT technology to perform everyday tasks, whether at home or at work [...]
Cover Page
Full-text available
The International Conference on Pattern Analysis and Intelligent Systems would like to become a major point of contact between researchers, engineers, and practitioners from all over the world to share ideas and achievements in the theory and practice of intelligent control, artificial intelligence and decision support concerned with systems, neura...
Conference Paper
Computer systems rely heavily on passwords their safety for unreasonable long time, compared to the rapid progress and development of technology. Although insufficient authenti-cation mechanisms were enhanced by the use of two or more factors that resulted in new multi factor authentication schemes, more sophisticated and targeted attacks have show...
Article
Full-text available
Federated learning (FL) is a data-privacy-preserving, decentralized process that allows local edge devices of smart infrastructures to train a collaborative model independently while keeping data localized. FL algorithms, encompassing a well-structured average of the training parameters (e.g., the weights and biases resulting from training-based st...
Article
Full-text available
The use of Internet key exchange protocols in IP Security architecture and IoT environments has vulnerable to various malicious attacks and affects communication efficiency. To address these weaknesses, we propose a novel efficient and secure Internet key exchange protocol (ESIKE), which achieves a high level of security along with low computationa...
Article
Agricultural advancement over time has been an essential component of human civilization's evolution. The rapid progress of emerging technologies is driving digital empowerment in nearly every industry, including the agricultural sector. Regardless of the benefits derived from this evolution, there are several security threats involved, which can h...
Article
Full-text available
Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provid...
Article
As we move from traditional power grids to smart grids, new threats arise. We focus on cybersecurity in power grids, highlighting the threats to and vulnerabilities of those cyberphysical systems and presenting future solutions.
Book
Full-text available
This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government, and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16...
Article
Full-text available
This editorial presents the manuscripts accepted, after a careful peer-review process, for publication in the topic “Cyber Security and Critical Infrastructures” of the MDPI journals Applied Sciences, Electronics, Future Internet, Sensors and Smart Cities. The first volume includes sixteen articles: one editorial article, fifteen original research...
Preprint
Cloud Computing is a paradigm allowing access to physical and application resources online via the Internet. These resources are virtualized using virtualization software to make them available to users as a service. In this environment, the migration of virtual machines (VMs) is a significant concern these days. This technique provided by virtuali...
Article
Full-text available
In recent years, the large amount of heterogeneous data generated by the Internet of Things (IoT) sensors and devices made recording and research tasks much more difficult, and most of the state-of-the-art methods have failed to deal with the new IoT requirements. This article proposes a new efficient method that simplifies data indexing and enhanc...
Article
The continuous production of heterogeneous IoT data created a new challenge, which is their storage and retrieve efficiently. In this work, a new method of indexing, called Threshold Distance (TD), is proposed in the fog‐cloud architecture. In this method, the fog layer is divided into two levels: a clustering level and an indexing level. In the cl...
Chapter
Healthcare is one of the most targeted industries by cybercriminals. The healthcare sector is far behind in cybersecurity as compared to other organizations. The vulnerabilities in the system open the door for cybercriminals to exploit it and get unauthorized access into the system or network to do a malicious activity. Healthcare should have to ta...
Article
Unmanned Aerial Vehicles (UAVs) have been progressively used in environmental monitoring and disaster sensing. The drones fly over a set of waypoints in the area to achieve their surveillance task. Despite their potential advantages, UAVs have several drawbacks, including a limited energy supply and a short operational duration which make all attem...
Article
Full-text available
In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and federated learning. Specifically, the dataset has been generated using a purpose-built IoT/IIoT test...
Article
In this paper, we propose a federated learning-based intrusion detection system, named FELIDS, for securing agricultural-IoT infrastructures. Specifically, the FELIDS system protects data privacy through local learning, where devices benefit from the knowledge of their peers by sharing only updates from their model with an aggregation server that p...
Chapter
The quick revolution on the wireless communication technologies had opened the gate towards promising implementations; Vehicular-Ad-hoc Networks (VANETs) and the safety-enhancing applications provided by the Internet of Vehicles (IoV) paradigm are one of them. By periodically broadcasting safety-beacons, vehicles can ensure a better safety-driving...
Article
Full-text available
div>In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and federated learning. Specifically, the proposed testbed is organized into seven layers, including...
Preprint
Full-text available
div>In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and federated learning. Specifically, the proposed testbed is organized into seven layers, including...
Article
The connectivity and intelligence of IoT equipment offer improved services, but several technical challenges have emerged in recent years that hinder the widespread application of IoT, e.g., security and safety. Cyber-security and privacy countermeasures are widely used in IoT equipment, and many studies have been conducted. However, an important a...
Article
Full-text available
The past decade has been characterized by the growing volumes of data due to the widespread use of the Internet of Things (IoT) applications, which introduced many challenges for efficient data storage and management. Thus, the efficient indexing and searching of large data collections is a very topical and urgent issue. Such solutions can provide...
Book
Full-text available
In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity a...
Preprint
Full-text available
Although sufficient authentication mechanisms were enhanced by the use of two or more factors that resulted in new multi factor authentication schemes, more sophisticated and targeted attacks have shown they are also vulnerable. This research work proposes a novel two factor authentication system that incorporates honeytokens into the two factor au...
Conference Paper
Industrial Internet of Things (IIoT) applies Internet of Things (IoT) technology in industrial systems, to optimize business processes efficiency, service quality, and reliability. However, with a large of isolated IoT networks deployed in various industries, many vulnerabilities have been exposed to security incidents and posed threats to IIoT sec...
Conference Paper
As blockchain technology has already become a critical priority for enterprises, it is acknowledged that it might be as much important as to reform and reconstruct businesses in the near future. In this paper we review the strengths and weaknesses of the blockchain technology, and present an example application in supply chain management. We start...
Conference Paper
The quick revolution on the wireless communication technologies had opened the gate towards promising implementations; Vehicular-Ad-hoc Networks (VANETs) and the safety-enhancing applications provided by the Internet of Vehicles (IoV) paradigm are one of them. By periodically broadcasting safety-beacons, vehicles can ensure a better safety-driving...
Article
Full-text available
In this article, we present a comprehensive study with an experimental analysis of federated deep learning approaches for cyber security in the Internet of Things (IoT) applications. Specifically, we first provide a review of the federated learning-based security and privacy systems for several types of IoT applications, including, Industrial IoT,...
Article
Full-text available
It is a well known fact that the weakest link in a cyber secure system is the people who configure, manage or use it. Security breaches are persistently being attributed to human error. Social engineered based attacks are becoming more sophisticated to such an extent where they are becoming increasingly more difficult to detect. Companies implement...
Conference Paper
Due to the blooming trend of information technologies, attacks have become widespread and sophisticated, which calls to build a strong defense design that works with the attack evolution. The countermeasure selection enables the system to retrieve its health. However, privacy concerns are also introduced in the selection process, which makes the bu...
Research Proposal
Full-text available
Critical National Infrastructures (CNIs) are vital assets for public safety, economic welfare and the national security of countries. Vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. Moreover, during the COVID-19 crisis, the workforce is being encouraged to continue teleworking while mo...
Article
Full-text available
Critical infrastructures are vital assets for public safety, economic welfare, and the national security of nations [...]
Article
Full-text available
Over the years, the digitization of all aspects of life in modern societies is considered an acquired advantage. However, like the terrestrial world, the digital world is not perfect and many dangers and threats are present. In the present work, we conduct a systematic review on the methods of network detection and cyber attacks that can take place...
Article
Full-text available
Over the years the digitization of all aspects of life in the modern societies is considered an acquired advantage. But like the terrestrial world, the digital world is not angelic and they lurk many dangers and threats. In the present work we conduct a systematic review to the methods of network detection and cyber attacks that can take place on a...
Conference Paper
Full-text available
Digital twin technology today is diverse and emerging and its full potential is not yet widely understood. The concept of a digital twin allows for the analysis, design, opti-misation and evolution of systems to take place fully digital, or in conjunction with a cyber-physical system to improve speed, accuracy and efficiency when compared to tradit...
Preprint
Full-text available
The use of Internet key exchange protocols in IP Security architecture and in IoT environments has vulnerabilities against various malicious attacks and affects communication efficiency. To address these weaknesses, we propose a novel efficient and secure Internet key exchange protocol (ESIKE), which achieves a high level of security along with low...
Article
Full-text available
The speed and pace of the transmission of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2; also referred to as novel Coronavirus 2019 and COVID-19) have resulted in a global pandemic, with significant health, financial, political and other implications. There have been various attempts to manage COVID-19 and other pandemics using techno...
Article
In this paper, we review and analyze intrusion detection systems for Agriculture 4.0 cyber security. Specifically, we present cyber security threats and evaluation metrics used in the performance evaluation of an intrusion detection system for Agriculture 4.0. Then, we evaluate intrusion detection systems according to emerging technologies, includi...
Conference Paper
This article is about quantum cryptography in Maritime Telecommunications. Cryptography is necessary for the security of online communications, transportations, medicine, and other significant fields. This new research area has been fruitful in recognizing mathematical operations that quantum algorithms lack in speed and build cryptographic systems...
Article
Full-text available
Smart Agriculture or Agricultural Internet of things, consists of integrating advanced technologies (e.g., NFV, SDN, 5G/6G, Blockchain, IoT, Fog, Edge, and AI) into existing farm operations to improve the quality and productivity of agricultural products. The convergence of Industry 4.0 and Intelligent Agriculture provides new opportunities for mig...
Article
This paper presents research challenges and a tutorial on performance evaluation of blockchain-based security and privacy systems for the internet of things (IoT). We start by summarizing the existing surveys that deal with blockchain security for IoT networks. Then, we review the blockchain-based security and privacy systems for seventeen types of...
Conference Paper
ABSTRACT Nowadays, the number of services is increasing which allows users to perform their tasks easily. A huge amount of data is published regularly where the personal data takes the lion’s share. In fact, personal data protection remains a big issue as far as how the service provider collected the data and for what purpose. Therefore, the privac...
Conference Paper
The majority of systems rely on user authentication on passwords, but passwords have so many weaknesses and widespread use that easily raises significant security concerns, regardless of their encrypted form. Users hold the same password for different accounts, administrators never check password files for flaws that might lead to a successful crac...
Article
Full-text available
Internet of Vehicles (IoV) has the potential to enhance road-safety with environment sensing features provided by embedded devices and sensors. This benignant feature also raises privacy issues as vehicles announce their fine-grained whereabouts mainly for safety requirements, adversaries can leverage this to track and identify users. Various priva...
Article
Full-text available
Citation: Babaghayou, M.; Labraoui, N.; Abba Ari, A.A.; Ferrag, M.A.; Maglaras, L.; Janicke, H. WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicle. Sensors 2021, 21, 2443. https://doi.
Article
The concept of the Internet of Vehicles (IoV) has attracted the attention of many sectors such as the automotive industry, academia, engineering, etc., offering a wide variety of benefits, such as reduced congestion, safer driving, and less pollution. However, since the deployment of IoT-based devices is in an open field, the IoV environments can b...
Book
Full-text available
Ce polycopié pédagogique en Sécurité Informatique fournit des bases solides dans l'ingénierie de la sécurité et permet aux étudiants de suivre facilement d'autres modules en sécurité et en cryptographie. À la fin de ce cours, les étudiants pourront: ‐ Indiquer les concepts de base en matière de sécurité de l'information, y compris les politiques de...
Article
Full-text available
Current developments in information technology and increased inclination towards smart cities have led to the initiation of a plethora of features by technology-oriented companies (i.e., car manufacturers) to improve users’ privacy and comfort. The invention of smart vehicle technology paved the way for the excessive use of machine-to-machine techn...
Chapter
Distributed Ledger and Blockchain technology decentralise the way we store data and manage information. Blockchain technology is the backbone of most cryptocurrencies, but also is being explored in other serious fields, such as new governance systems with more participatory decision-making, and decentralised autonomous organisations that can operat...
Article
This paper presents a comprehensive review of emerging technologies for the Internet of Things-based smart agriculture. We begin by summarizing the existing surveys and describing emergent technologies for the agricultural Internet of Things (IoT), such as unmanned aerial vehicles, wireless technologies, open-source IoT platforms, Software Defined...
Article
Full-text available
In recent years, there has been a growing demand for cybersecurity experts, and, according to predictions, this demand will continue to increase. Cyber Ranges can fill this gap by combining hands-on experience with educational courses, and conducting cybersecurity competitions. In this paper, we conduct a systematic survey of ten Cyber Ranges that...