NOUREDDINE Chikouche
شيكوش نورالدين
noureddine.chikouche@univ-msila.dz
06 62 07 93 66
- Informatics Department
- Faculty of Mathematics and Informatics
- Grade Prof
About Me
HDR. in University of M'sila
Research Domains
IoT Security Cryptography Cryptography
LocationM´sila, Msila
Msila, ALGERIA
Code RFIDE- 2024
-
Encaderement Doctorat soutenu
Bahache Anwar Noureddine
Security of Health Applications in The IoT Environment
- 2024
-
Encaderement Doctorat soutenu
Benaissi Sellami
Contribution au développement d’une méthode hybride pour le cryptage d’image numérique
- 2023
-
Encaderement Doctorat soutenu
Moussaoui Boubakeur
Sécurité et protection de la vie privée dans les réseaux véhiculaires
- 2023
-
Encaderement master
Marrok Abderrahman; , Boukhelef Safaa
Integrating post-quantum cryptography into VPN protocol
- 2022
-
Encaderement master
LAGUEGUE SIF ELISLAM , CHEIKHAOUI NAIMA
LIGHTWEGHT AUTHENTICATION SCHEME FOR PATIENT MONITORING BASED ON POST-QUANTUM CRYPTOGRAPHY
- 2022
-
Encaderement master
BACHIRI Achouak , LEMOUNES Ahlam
Authentication Scheme using RFID for Healthcare Applications
- 2021
-
Encaderement master
Hanane Seghiri , Rima Belguidoum
Development of a Secure Messaging App for Android Mobile
- 2021
-
Encaderement master
TALLAB Lebna
Security Techniques for Protecting Patient Data in Healthcare Applications
- 2020
-
Encaderement master
Chennouf Fatima Ezzahra , Kouidri Soumia
Sécurité des données médicales en appliquant le tatouage numérique
- 2019
-
Encaderement master
Walid Doucene
Etude comparative entre la PKI conventionnelle et la PKI basée sur la blockchain
- 2019
- 2018
-
Encaderement master
Herizi Maria
Simulation des Algorithmes Cryptographiques Basés sur les Courbes Elliptiques en Cooja Contiki
- 2018
-
Encaderement master
GHADBANE ABDERRAHMEN
Benchmarking Study of Post-Quantum Schemes in Smartphones
- 2018
-
Encaderement master
Gherabi Charaf Eddine
Détection des spams se basant sur les techniques de classification
- 19-04-2018
- 17-03-2016
- 1977-03-18 00:00:00
-
NOUREDDINE Chikouche birthday
- 2025-01-28
-
2025-01-28
An Efficient ECC-Based Authentication Protocol for Secure RFID Healthcare Applications
As Internet and Communication Technologies (ICT) evolve, RFID (Radio Frequency Identification) has become essen- tial in healthcare for efficiently tracking and managing tagged medical devices. While RFID tags are extensively used on various healthcare assets, they are exposed to serious security and privacy risks, such as eavesdropping, data tampering, and interception, which threaten the confidentiality of healthcare professionals and patients. Despite the development of multiple lightweight RFID authentication schemes, many still suffer from vulnerabilities like replay, impersonation, and de-synchronization attacks. To address these limitations, we present a robust and efficient RFID authentication scheme designed specifically for IoT-enabled healthcare applications. By integrating Elliptic Curve Cryptog- raphy (ECC), our scheme delivers strong security with a low computational footprint, ensuring resilience against all evaluated attack types. Comprehensive security and performance testing demonstrate that our protocol offers an effective balance of security and efficiency, making it an ideal and secure choice for real-time healthcare environments.
Citation
Mohamed Bahache , Anwar Nour Eddine Bahache , NOUREDDINE Chikouche , FARES Mezrag , ,(2025-01-28), An Efficient ECC-Based Authentication Protocol for Secure RFID Healthcare Applications,THE INTERNATIONAL SYMPOSIUM ON INNOVATIVE INFORMATICS OF BISKRA,universite de Biskra
- 2024-12-10
-
2024-12-10
A new Authentication Protocol for RFID-based healthcare Application
With the rise of Internet and Communication Technologies (ICT), RFID (Radio Frequency Identification) technology has become indispensable in healthcare for tracking and managing tagged medical devices. Widely deployed across numerous healthcare assets, RFID tags face critical security and privacy challenges, as adversaries can eavesdrop, alter, or intercept transmitted data, compromising the confidentiality of healthcare personnel and patients. Although various lightweight RFID authentication schemes have been proposed to address these risks, many remain vulnerable to attacks, including replay, impersonation, and de-synchronization. To overcome these security limitations, we propose a resilient and efficient RFID authentication scheme tailored for IoT-enabled healthcare applications. Leveraging Elliptic Curve Cryptography (ECC) to ensure high security with minimal computational load, our scheme demonstrates strong resistance to all assessed attack vectors. Rigorous security and performance evaluations confirm that our protocol achieves an optimal balance of security and efficiency, positioning it as a practical and secure solution for real-time healthcare environments.
Citation
NOUREDDINE Chikouche , Noureddine Anwar HEBICHE , FARES Mezrag , Mohamed Bahache , ,(2024-12-10), A new Authentication Protocol for RFID-based healthcare Application,ISIA 2024,Msila
- 2024-11-01
-
2024-11-01
Emas: an efficient MLWE-based authentication scheme for advanced metering infrastructure in smart grid environment
Advanced metering infrastructure (AMI) plays a critical role in the smart grid by integrating metering systems with communication capabilities, especially for the industrial internet of things. However, existing authentication protocols have proven ineffective against quantum computing attacks and are computationally intensive since AMI contains limited computing components, such as smart meters. In this paper, we present a novel, efficient module learning with errors-based authentication and key agreement system for AMI, which we call EMAS. As part of the security measures of EMAS, Kyber Post-Quantum Public Key Encryption, a one-time pad mechanism, and hash functions are used. A formal and informal analysis of the security features is presented, showing that the proposed system is secure and resistant to known attacks. The performance analysis of our proposed EMAS on a B-L475E-IOT01A node equipped with a ARM Cortex M4 microcontroller shows that EMAS is more efficient than existing relevant schemes. About the computation time, EMAS takes 15.693 ms. This result is lower than other existing relevant schemes.
Citation
NOUREDDINE Chikouche , , (2024-11-01), Emas: an efficient MLWE-based authentication scheme for advanced metering infrastructure in smart grid environment, ournal of Ambient Intelligence and Humanized Computing, Vol:15, Issue:0, pages:3759–3775, Springer
- 2024-07-01
-
2024-07-01
Securing Cloud-based Healthcare Applications with a Quantum-resistant Authentication and Key Agreement Framework
A biosensor is a method for transmitting various physical phenomena, such as body temperature, electrocardiogram (ECG), pulse, blood pressure, electroencephalogram (EEG), and respiratory rate. This transmission occurs through the utilization of a Wireless Body Area Network (WBAN) when remotely diagnosing patients via Internet-of-Medical-Things (IoMT). However, the transmission of sensitive data from IoMT through WBAN via an insecure channel exposes it to various threats, necessitating the implementation of robust measures to guarantee security against potential adversaries. To address the security concerns associated with patient monitoring in healthcare systems and achieve the necessary security and privacy requirements during communication, a robust authentication framework is indispensable. Hence, it introduces an agile and robust post-quantum authentication framework for cloud-based healthcare applications, effectively mitigating the vulnerabilities identified in the recent literature. This framework is designed to protect against quantum attacks using the Kyber. A formal security verification of the proposed protocol is presented using AVISPA, as well as informally. Additionally, a comparison with the previous works is made regarding both performance and security. The comparison results conclusively show that our proposed framework is better regarding both measures.
Citation
NOUREDDINE Chikouche , Anwar Nour Eddine Bahache , Sedat Akleylek, , (2024-07-01), Securing Cloud-based Healthcare Applications with a Quantum-resistant Authentication and Key Agreement Framework, Internet of Things, Vol:26, Issue:0, pages:101200, Elseivier
- 2023
-
2023
A novel image encryption algorithm based on hybrid chaotic maps using a key image
One of the most important data currently shared on the Internet is images of various sizes and types, gray and color, private and public, civilian and military, medical and scientific, commercial, and others. The biggest challenge and problem is the secure transmission of these images in this insecure environment. In this context, this paper proposes a new image encryption algorithm using a hybrid of three modified and improved chaotic one-dimensional (1D) maps to avoid the shortcomings of 1D maps and multidimensional (MD) maps. A key image is used to initialize the chaotic maps and is also used as a mask in the diffusion phase with the eXclusive OR (XOR) operator. The encryption process uses ExtraParam extracted from the original image, which is very sensitive to bit changes during the initialization of the chaotic maps. The proposed encryption process consists of two main phases: confusion and diffusion processes. The proposed image encryption algorithm has successfully passed numerous tests and cryptanalysis. We also measure the proposed algorithm with various analysis experiments such as histogram and entropy analysis, the number of pixel change rate (NPCR), the unified average changing intensity (UACI), the mean square error(MSE), the peak signal-to-noise ratio (PSNR) and Key Space. The experimental results and comparative analysis show that the proposed encryption algorithm has excellent performance, is strong enough to withstand various attacks, and provides excellent privacy to digital images.
Citation
NOUREDDINE Chikouche , , (2023), A novel image encryption algorithm based on hybrid chaotic maps using a key image, Optik, Vol:272, Issue:, pages:170316, Urban & Fischer
- 2023
-
2023
An efficient privacy scheme for C-ITS stations
In Cooperative Intelligent Transport Systems (C-ITS), vehicles and Road Side Units (RSU) exchange various messages about safety, traffic control, and weather conditions. These messages are broadcast to all neighbors. Each message should be authenticated and should protect users’ privacy, mainly by hiding their locations. The authentication is achieved by signing messages using a private key related to the Pseudonym Certificate (PC), provided by a Trusted Authority (TA). The PC is delivered together with messages so that receivers can authenticate the messages. Privacy is ensured by changing PCs many times during a journey, so that trackers cannot get drivers’ traces. This paper proposes a novel approach to manage PC switching periods between vehicles. The proposed method uses a Common PC (CPC) during a short period before switching to a new PC. Vehicles use the same shared PC during this period to sign their messages. Simulations have been conducted in an OMNET++ environment, showing significant improvement in privacy protection compared to well-known privacy schemes.
Citation
NOUREDDINE Chikouche , boubakeur.moussaoui@univ-msila.dz, Hacène Fouchal, , (2023), An efficient privacy scheme for C-ITS stations, Computers and Electrical Engineering, Vol:107, Issue:, pages:108613, Elsevier
- 2022
-
2022
Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks: A Survey
Many applications are developed with the quick emergence of the Internet of things (IoT) and wireless sensor networks (WSNs) in the health sector. Healthcare applications that use wireless medical sensor networks (WMSNs) provide competent communication solutions for enhancing people life. WMSNs rely on highly sensitive and resource-constrained devices, so-called sensors, that sense patients’ vital signs then send them through open channels via gateways to specialists. However, these transmitted data from WMSNs can be manipulated by adversaries without data security, resulting in crucial consequences. In light of this, efficient security solutions and authentication schemes are needed. Lately, researchers have focussed highly on authentication for WMSNs, and many schemes have been proposed to preserve privacy and security requirements. These schemes face a lot of security and performance issues due to the constrained devices used. This paper presents a new classification of authentication schemes in WMSNs based on its architecture; as far as we know, it is the first of its kind. It also provides a comprehensive study of the existing authentication schemes in terms of security and performance. The performance evaluation is based on experimental results. Moreover, it identifies some future research directions and recommendations for designing authentication schemes in WMSNs.
Citation
NOUREDDINE Chikouche , , (2022), Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks: A Survey, SN Computer Science, Vol:3, Issue:5, pages:0, Springer
- 2021
-
2021
2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP)
With the progression in sensor technology and the low-cost electronic circuits’ proliferation, the Internet of Things (IoT) is emerging as a promising technology for enhancing people life in terms of making decisions and communicating with ease, especially in the healthcare domain, the IoT technology transforms the traditional hospital into a smart hospital enhanced with the benefit of using the sensors to get better diagnosis and monitoring to the patients, the patient data are collected and are sent through the internet to be analysed in the cloud, This produces growth in privacy and security risks such as sensitive data disclosure and using it in a bad way. Thus, privacy and security are considered as a challenge that needs to be addressed. In this paper, we present a new taxonomy of privacy preservation techniques in healthcare systems. In addition, we analyse and discuss several recent approaches that base on existing privacypreserving techniques.
Citation
bouchra-rekia louassef , NOUREDDINE Chikouche , ,(2021), 2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP),Privacy preservation in healthcare systems,El Oued, Algeria
- 2020
-
2020
EAP-SRES: An Enhanced Authentication Protocol for Secure Remote Education Systems Using NFC Technology
Radio Frequency Identification (RFID) and Near Field Communication (NFC) are wireless technologies applied in several domains, among which, remote education. The communication between different components of this system is unsecured, which may lead to several security and privacy problems. Designing authentication protocols to protect a remote education system in an open environment (e.g. NFC, RFID, and Internet) is a challenging task. Recently, Yang et al. proposed a mutual authentication protocol based on the hash function for RFID systems to secure this system. Yang et al. showed that their protocol is secure and can resist various attacks. This work proves that Yang et al.’s protocol does not achieve reader authentication, location privacy, and security forward. Furthermore, we propose an enhanced authentication protocol for secure remote education systems (EAP-SRES) using NFC technology. Our protocol is based on post-quantum cryptosystem to resist quantum attacks. Security analysis by using CL-AtSe (Constraint Logic based Attack Searcher) tool and Ouafi-Phan privacy model shows that the EAP-SRES protocol achieves the requirements of mutual authentication, untraceability and resists different possible attacks. In addition, EAP-SRES protocol is very efficient in term of performance.
Citation
NOUREDDINE Chikouche , , (2020), EAP-SRES: An Enhanced Authentication Protocol for Secure Remote Education Systems Using NFC Technology, International Journal of Computing and Digital Systems, Vol:9, Issue:3, pages:0, University of Bahrain
- 2019
-
2019
A privacy-preserving code-based authentication protocol for Internet of Things
The Internet of Things (IoT) is an upcoming technology that permits to interconnect different devices and machines using heterogeneous networks. One of the most critical issues in IoT is to secure communication between IoT components. The communication between the different IoT components is insecure, which requires the design of a secure authentication protocol and uses hardness cryptographic primitives. In 2017, Wang et al. proposed an improved authentication protocol based on elliptic curve cryptography for IoT. In this paper, we demonstrate that Wang et al.’s protocol is not secure. Additionally, we propose a privacy-preserving authentication protocol using code-based cryptosystem for IoT environments. The code-based cryptography is an important post-quantum cryptography that can resist quantum attacks. It is agreed in design several cryptographic schemes. To assess the proposed protocol, we carry out a security and performance analysis. Informal security analysis and formal security validation show that our protocol achieves different security and privacy requirements and can resist several common attacks, such as desynchronization attacks, quantum attacks, and replay attacks. Moreover, the performance evaluation indicates that our protocol is compatible with capabilities of IoT devices.
Citation
NOUREDDINE Chikouche , Pierre-Louis Cayrel, El Hadji Modou Mboup, Brice Odilon Boidje, , (2019), A privacy-preserving code-based authentication protocol for Internet of Things, The Journal of Supercomputing, Vol:75, Issue:12, pages:8231–8261, Springer US
- 2019
-
2019
Performance Evaluation and Analysis of Encryption Schemes for Wireless Sensor Networks
Wireless sensor networks (WSNs) technology is one of the most important technologies of the Internet of things. It is effectively applied within several applications in the actual world, including health care, environmental monitoring, tracking, etc. WSNs consist of small sensor nodes having limited resources. The communication between the components of WSNs is unsecured though. Therefore, in order to secure the exchanged data, it is crucial to implement efficient and lightweight cryptographic schemes. In this paper, we evaluate the performance of different cryptosystems for WSNs. Our paper includes a comparison study between the studied encryption algorithms in terms of power consumption, required space memory, and computational time.
Citation
NOUREDDINE Chikouche , Amar Abdelmalek Ghehioueche, Fares Mezrag, ,(2019), Performance Evaluation and Analysis of Encryption Schemes for Wireless Sensor Networks,International Conference on Digitization (ICD-2019) Landscaping Artificial Intelligence,Skyline University College, Shareja, UAE
- 2019
-
2019
Privacy Analysis of a New Authentication Protocol for Internet of Things
Nowadays, the Internet of Things (IoT) is an important technology that is applied in different applications, such as smart cities, supply chain, digital health monitors, etc. One of the most important challenges related to IoT technology is privacy. Recently, Wang et al. proposed a mutual authentication protocol in IoT environment, it was based on elliptic curve cryptography (ECC) and hash function. Wang et al. claimed that their protocol is secure against different attacks possible in IoT environment. In this paper, we prove that their protocol does not provide untraceability and device anonymity. Moreover, we propose an improved protocol to eliminate the detected weaknesses. Using AVISPA simulation tool, we prove that our improved protocol satisfies security and privacy requirements.
Citation
NOUREDDINE Chikouche , ,(2019), Privacy Analysis of a New Authentication Protocol for Internet of Things,International Workshop on Cryptography and its Applications (2’IWCA’19),Oran
- 2019
-
2019
Simulation of Attacks on Authentication Protocols for Near Field Communications
Field Communication (NFC) technology is steadily becoming paramount due to its vast applications in domain of mobile services such as, payment, marketing, etc. The communication between the NFC tag and the NFC device is based on radio frequency which is unsecured. Several authentication protocols have been proposed to achieve the security requirements and to avoid different existing attacks (e.g. spoofing, denial of service, etc.). Recently, Beak and Youm proposed two versions of authentication protocol for NFC tag based services. Firstly, an NFC tag authentication protocol and the second is a NFC-enabled device authentication protocol. In this paper, we analyse the security of these protocols using the automated tool. Through an automated security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications) simulation tool, we prove that these protocols are not secure.
Citation
NOUREDDINE Chikouche , ,(2019), Simulation of Attacks on Authentication Protocols for Near Field Communications,2nd International Workshop on Cryptography and its Applications (2’IWCA’19),Oran
- 2018
-
2018
Code-Based Cryptosystems: A Comparative Study
1994, P.W. Shor showed that quantum computers will be able to break this class of cryptosystems. To avoid this weakness, we must use the post-quantum cryptography (PQC). PQC includes several categories: code-based cryptography, lattice-based cryptography, hash-based cryptography, multivariate-based cryptography, and isogeny-based cryptography. Code-based cryptography is employed in construction of diverse cryptographic schemes and it does not need any cryptographic processor. In this work, we review three important cryptosystems based on coding theory: McEliece, Niederreiter, and QC-MDPC McEliece cryptosystem. Our work includes a study comparative between the reviewed code-based encryption algorithms in terms of security and performance.
Citation
NOUREDDINE Chikouche , ,(2018), Code-Based Cryptosystems: A Comparative Study,Workshops on Pure and Applied Mathematics (WPAM'2018),M´sila
Default case...