Samir OuchaniCentre d'Etudes Superieures Industrielles · CESI LINEACT UR7527
Samir Ouchani
Ph.D.
About
110
Publications
33,596
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
886
Citations
Introduction
My ongoing research focuses on advancing the state of the art related to formal methods and data mining approaches to enhance security and resiliency of heterogeneous systems with application on networking, blockchains, cps, and IoT.
Additional affiliations
January 2009 - October 2013
Education
May 2009 - September 2013
Publications
Publications (110)
Embedded system design is a complex process that demands an extensive system level modeling. Its implementation encompasses software and hardware components and its interconnections. In such systems, it is widely recognized that safety should be considered at the design stage itself, particularly at the architectural level to minimize the design ef...
Recent initiatives that evaluate the security of physical systems with objects as assets and people as agents – here called socio-technical physical systems – have limitations: their agent behavior is too simple, they just estimate feasibility and not the likelihood of attacks, or they do estimate likelihood but on explicitly provided attacks only....
Recent research initiatives dedicated to formal modeling, functional
correctness and security analysis of IoT systems, are generally limited to, model abstract behavioral patterns and look forward possible attacks beneath gauging and providing feasible attacks. This research considers the complementary problem by looking for more accurate attacks i...
This work contributes to reduce the cost of the verification process of model-based systems, especially the ones designed as SysML activity diagrams, by relying on the concept of diagram calls defined in SysML standard. By exploiting the diagram calls concept, we propose a mechanism to transform a given diagram into its equivalent fractal (hierarch...
The supply chain (SC) comprises all the vital stages a product goes through to its final destination, forming a value chain. In this article, our primary focus is on integrating Internet of Things, artificial intelligence, and blockchain technology to design secure and smart SC systems.
Message from the Chairs,
The 5th Summer School on Cyber-Physical Systems and Internet of Things (SS-CPS&IoT’2024) is the fifth school in a series, organized in Budva, Montenegrin andMediterranean pearl.We were pleased to continue the tradition of hosting the SS-CPS&IoT’2024 in a hybrid format, accommodating both online and in-person participation.S...
The prevalence of phishing attacks has exhibited a marked rise in recent years, posing significant threats to the confidentiality, integrity, and availability of sensitive data at both individual and organizational levels. This escalating threat underscores the critical need for automated and real-time detection of phishing web pages. This paper pr...
The integration of emerging technologies into industrial systems is essential for facilitating collaboration among diverse stakeholders and optimizing the management of extensive assets. Efficient decision-making processes in contemporary autonomous systems greatly benefit from the substantial volumes of collected data. Addressing the challenges of...
The advent of Industry 4.0 and propelled the application of Artificial Intelligence in different industrial fields and contexts, such as predictive maintenance (PdM). Through its ability to assess the condition of equipment to detect signs of failure and anticipate them, PdM brings several potential benefits in terms of reliability, safety and main...
In recent years, there has been growing concern among experts regarding the risks of hacking autonomous vehicles. As these vehicles become increasingly complex, the number of potential vulnerabilities and challenges associated with securing them also rises. This paper presents a model checking-based framework that utilizes a predefined set of attac...
EXtended Reality (XR) alongside the Digital Twin (DT) in Industrial Internet of Things (IIoT) emerges as a promising next-generation technology. Its diverse applications hod the potential to revolutionize multiple facets of Industry 4.0 and serve as a cornerstone for the rise of Industry 5.0. However, current systems are still not effective in prov...
Nowadays, healthcare takes a great attention from people and governments due to the emergence of new diseases and viruses. Health Information Exchange (HIE) allows doctors, clinicians, and healthcare facilities (HCF) to exchange and share patient records according to patient permission. Unfortunately, the HIE systems suffer from several challenges...
The emergence of Industry 4.0 has heralded notable progress in manufacturing processes, utilizing sophisticated sensing and data analytics technologies to maximize efficiency. A vital component within this model is predictive maintenance, which is instrumental in ensuring the dependability and readiness of production systems. Nonetheless, the heter...
In this paper, we aim to advance the state of the art in the verification process of systems, predominantly modeled as Probabilistic Automata (PA). This model accommodates both nondeterministic and probabilistic behaviors. Our primary strategy to address the notorious state space explosion problem inherent in model checking is the adoption of abstr...
This article presents a novel approach to enhancing asset management and resource sharing in intelligent systems with a focus on the industrial ones using Blockchain. We introduce a hybrid network architecture—termed the Hybrid Cyber-Physical System (HyCPS)—designed to facilitate decentralized, trustworthy data sharing across all layers. Central to...
The advent of industry 4.0 (I4.0) has brought about significant advancements in manufacturing processes, leveraging advanced sensing and data analytics technologies to optimize efficiency. Within this paradigm, predictive maintenance (PdM) plays a crucial role in ensuring the reliability and availability of production systems. There are several exi...
The emergence of Industry 4.0 has heralded notable progress in manufacturing processes , utilizing sophisticated sensing and data analytics technologies to maximize efficiency. A vital component within this model is predictive maintenance, which is instrumental in ensuring the dependability and readiness of production systems. Nonetheless, the hete...
In Industry 4.0, factories encounter significant challenges in making informed decisions to maintain or enhance their industry standing. By utilizing machine learning (ML), they can improve product quality, decrease production downtime, and boost operational efficiency. However, acquiring datasets with sufficient variation and diversity to train a...
Since its inception in 2016, federated learning has evolved into a highly promising decentral-ized machine learning approach, facilitating collaborative model training across numerous devices while ensuring data privacy. This survey paper offers an exhaustive and systematic review of federated learning, emphasizing its categories, challenges, aggre...
Federated learning is a form of distributed learning in which each participating node is handled as a client and is responsible for the training of a model using only its local data. The participation of inappropriate clients, on the other hand, may have a substantial impact on reliability, which would entail a significant consumption of resources....
Over the last few years, the web of data has been evolved. Indeed, it allows sharing of a significant interconnection of a huge amount of data in several domains and it keeps increasing continuously. Due to the confidential nature of some data, sectors such as health, financial, and government, it have limited participation with fewer data to publi...
Recently, Industry 4.0 has emerged to be integral with the optimal use and integration of digital technologies within different industries and characterized by an exponential increase in the number of sensors deployed, data collected and the use of advanced analytics. In the supply chain (SC) context, these advances are marked by the introduction o...
Nowadays, health care has become a constant concern of all countries around the world, especially after the emergence of the Coronavirus (COVID-19) and all its variants. Billions of dollars are being paid through the World Health Organization to improve health care. Scientific research laboratories play a pioneering role in this area as well. Due t...
A system based on the internet of things (IoT) consists of services deployed across several devices that collaborate to fulfil IoT system goals. The growth in the number of IoT services that has occurred concurrently with the growth in the number of IoT devices is posing a significant difficulty for the process of service composition. In order to s...
Cyber-physical systems (CPS) have been used in many applications, especially in smart cities and industrial systems. As a result of the exponential development of CPSs connected components, cyber-attacks against CPSs have exploded. Moreover, new critical CPS have high-security constraints that must be detected and predicted at an early stage of the...
During the last decade, Industrial Cyber-Physical Systems (ICPS) have attracted a significant amount of interest from industries as well as academic institutions. These kinds of systems have proved to be very complicated, and it may be a difficult task to get a handle on their architecture and make sure everything works properly. By putting up a fr...
Emerging technologies utilised in building modern systems make them inter-operable but potentially exposed to security threats. Thus, engineers need to consider the system structure and behaviour at the design level. This paper addresses the security risk assessment of inter-operable IoT systems designed in BIP (Behaviour-Interaction-Priority). For...
During the last decade, industry, agriculture, healthcare, transport, and academics have gained interested in industrial-cyber-physical systems (ICPSs). Due to the complexity of these systems, it is difficult to maintain control over their components, design and ensure their functional correctness. Especially, ICPSs have gotten more intelligente in...
Industry, agriculture, healthcare, transport, and academics have gained interested in cyber-physical systems (CPS) during the last decade. Because of the complexity of these systems, it is difficult to maintain control over their design and ensure their functioning. Especially, CPS have gotten more intelligente in controlling their operations as a...
Producing a large family of resource-constrained multi-processing systems on chips (MPSoC) is challenging, and the existing techniques are generally geared toward a single product. When they are leveraged for a variety of products, they are expensive and complex. Further in the industry, a considerable lack of analysis support at the architectural...
The Internet of things (IoT) is an indispensable part of our daily lives, bringing us many conveniences, including e-commerce and m-commerce services. Unfortunately, IoT networks suffer from several security issues, such as privacy, access control, and authentication. However, due to the limited computation resources, remote authentication between...
In this Master, we investigate how enhancing the usage of Blockchain technology in smart systems might help organizations share their services and manage their enormous assets more effectively. The use of a Blockchain architecture as a solution to this problem will make it feasible to exchange data in a decentralized setting in a manner that is bot...
Cite as:
Author/s, “Title of contribution-presentation”, in Proceedings of the 3rd Summer School on Cyber-Physical Systems and Internet-of Things, Editors: Lech Jozwiak, Radovan Stojanovic and Nikolaos Voros, Vol. III, June 2022, pp. xx-yy, DOI: https://doi.org/10.5281/zenodo.6698644
Citation example:
Lech Jóźwiak, Green CPS and IoT for Green Wo...
Deriving an accurate behavior model from historical data of a black box for verification and feature forecasting is seen by industry as a challenging issue especially for a large featured dataset. This paper focuses on an alternative approach where stochastic automata can be learned from time-series observations captured from a set of deployed sens...
Integrated Circuits (ICs) and electronic devices have become an integral part of daily human life (mobile, home, car, etc.). However, specific security measures should be taken to protect the communicated information to and from these devices. However, the existing conventional security primitives require large amounts of memory capacity, processin...
The distributed devices in a smart city are characterized by different degrees of sensitivity. Some of them can be accessed by everyone whereas others are limited to a specific class of users (subjects). Therefore, we created an access control system named SOT-S (Subject-Object-Task System) supported by blockchains that sort processes applied by su...
One of the major security issues in the Internet of Things (IoT) is maintaining the network availability against attacks and traffic congestion. In practice, the greedy behavioral attack is considered as an intelligent Denial of Service (DoS), which aims to compromise the availability of the network by consuming as much as possible the bandwidth of...
Among the possible conversion processes for biomass is Anaerobic Digestion (AD) that produces a valuable energy known as biogas. However, the instability of biogas production is challenging due to the complex process of the AD that requires a precise environmental conditions as well as different bacteria populations. Hence, monitoring and controlli...
After two years of COVID-19 first infection and its speedy propagation, death and infection cases are till exponentially increasing. Unfortunately, during this a non-fully controlled situation, we noticed that the existing solutions for COVID-19 detection based on chest X-ray were not reliable enough in relation to the number of infected patients a...
Integrated Circuits (ICs) and electronic devices became the main part of human daily life (mobile, home, car, etc.). However, for the safety of the transported information to and from these devices, some specifics security measures should be taken. In general, ICs are a source of high randomness due to the manufacturing variation process which elec...
With the immense increase of population density, many challenges facing organizations and governments. Thus, it has become mandatory to turn up our cities to be intelligent by introducing IoT and smart grids to build smart buildings, smart communication technologies, smart healthcare systems, smart transportation, etc. Smart cities guarantee the he...
Modern systems are heterogeneous inter-operating subsystems of different aspects that can be physical, technical, cybernetics, and even social like agent operators in smart grids or smart transportations. With the social dimension, we name these systems by Socio-Cyber-Physical Systems (SCPS). However, ensuring safety, correctness, and security agai...
Given the threats that the smart city faces especially tampering the integrity of information, it has become necessary to integrate more robust and decentralized technologies that ensure transparency and sustainability of the system. Blockchain is a technology initially directed to limit the manipulation in financial transactions. One of the most p...
Integrated Circuits (ICs) and electronic devices become part of human daily life (mobile, home, car, etc.) and for the safety of the information transported to and from these devices, some specifics security measures are proposed. Some ICs are a source of high randomness due to the manufacturing variation of these ICs and exploited as physically un...
In recent years, experts have noted the risks of hacking the autonomous vehicles. Since the latter become more complex, the number of potential vulnerabilities and the constraints on security algorithms increase. This paper proposes a model checking based framework that relies on a set of predefined attacks and counter measures from where the secur...
ADTrees (Attack-Defense Trees) are graphical security modeling tools used to logically represent attack scenarios along with their corresponding countermeasures in a user-friendly way. Many researchers nowadays use ADTrees to represent attack scenarios and perform quantitative as well as qualitative security assessment. Among all different existing...
Embedded systems span a wide range from a small platform of sensors and actuators to distributed systems combining several interacting nodes. Designing such systems includes hardware parts and software parts. The software part acquires in importance since it handles the resources and services to interact with the hardware part. The paper introduces...
Physical Unclonable Functions (PUFs) are innovative hardware security primitives that extract secret information from physical characteristics of a device, a chip, or integrated circuits; where different instances of the same PUF device will produce different secret keys. PUFs are used a lot in authentification and secret key generation depending o...
Nowadays the resiliency is the main property in any system especially communication infrastructures. Unfortunately, many developers are working on making programs more resilient and reliable, facing people who want to use leaks in an unethical way, and breaking (or trying to break) largely used one-way functions such as MD5, SHA-1, or RSA based alg...
This book constitutes the thoroughly refereed papers of the workshops held at the 10th International Conference on New Trends in Model and Data Engineering, MEDI 2021, held in Tallinn, Estonia, in June 2021: Workshop on moDeling, vErification and Testing of dEpendable CriTical systems, DETECT 2021; Symposium on Intelligent and Autonomous Systems, S...
Industrial cyber-physical systems (ICPS) are heterogeneous inter-operating parts that can be physical, technical, networking, and
even social like agent operators. Incrementally, they perform a central role in critical and industrial infrastructures, governmental, and
personal daily life. Especially with the Industry 4.0 revolution, they became mor...
Wireless Sensors Network (WSN) are essential to ensure data collection and monitor in real time buildings and their environments. In general, the collected data are of paramount importance especially to optimize resource consumption and to improve the indoor user's comfort. However, the reliability of smart buildings depends on the completeness and...
Recent research focus more and more on IoT systems and their applications in order to make people life easier and controllable. The main aim is to expand IoT applications and services into various domains while ensuring communication and automated exchange between them. Recent research handles many issues related to IoT especially implementation, m...
Cyber-physical systems (CPS) are heterogeneous inter-operating parts of different aspects that can be physical, technical, networking, and even social like agent operators in smart grids. The main concerns of CPS are ensuring security and well-functioning against attacks that can either be technical or socio-technical based threats. To detail how w...
The increasing proliferation of Cyber-Physical Systems (CPS) in industry and academia bring researchers to work on CPS architectures and models seeking for enhancing the performance and gaining the full potential of the system. This work aims to provide a holistic view of the initiatives done during the last five years in modeling and designing CPS...
One of the main challenges in the development process of secure systems is how to detect as early as possible the system’s vulnerabilities and weaknesses, and also how to quantify the severity of attacks through them. In this paper, we rely on the concept of attack surfaces to implement a secure cyber physical system in Java. Attack surfaces can be...
SysML activity diagram is a standard modeling language for complex systems. It supports systems’ composition by providing the operator ‘call behavior’. In general, the verification of systems modeled with those diagram inherit the limitations of the developed built-in tools, especially the case of model checking. To address this shortcoming, we pro...
Indoor environments play a main role on people living, work, social life, and health. Especially, recent statistics show that people who are often most susceptible to the adverse health effects tend to spend more time indoors. To overcome these issues, modern rooms are well equipped with different kind of connected objects (IoT) in order to facilit...
The expansion of social utilization within web applications provides a set of social media that allows users to contribute freely and interact with each other. Consequently, E-learning systems have benefited greatly from the concepts of the social web and the emerging technologies of the web semantic, where students and teachers are living and inte...
Last decade recognizes a high job demand, more specialized trainings with very oriented jobs offers. This situation makes hiring and recruitments officers in the difficulty to select and find easily the appropriate candidate as well for candidates to choose the best practices and trainings to find later a respectable position. This work aims to hel...
Last decade recognizes a high job demand, more specialized trainings with very oriented jobs offers. This situation makes hiring and recruitments officers in the difficulty to select and find easily the appropriate candidate as well for candidates to choose the best practices and trainings to find later a respectable position. This work aims to hel...
A crucial question for an ICT organization wishing to improve its security is whether a security policy together with physical access controls protects from socio-technical threats. We study this question formally. We model the information flow defined by what the organization’s employees do (copy, move, and destroy information) and propose an algo...
Availability is one of the crucial characteristics that measures the system quality and influences the users and system designers. The aim of this work is to provide an approach to improve the system availability by taking into account different system situations at design step using SysML state machine diagram. We construct a formal model of state...