FARES Mezrag
مزراق فارس
fares.mezrag@univ-msila.dz
0656312446
- Informatics Department
- Faculty of Mathematics and Informatics
- Grade MCB
About Me
PhD in computer science. in University of biskra
DomainMathématiques et Informatique
Research Domains
Post-quantum cryptography Routing in WSN Identity-based cryptography IoT security
LocationMsila, Msila
Msila, ALGERIA
Code RFIDE- 2024
-
Encaderement master
KHENNOUF, AbdelMonaim , BENMERZOUG, Mohammed
Coception et réalisation d'une application web pour le suivi pédagogique
- 2023
-
Encaderement master
dilmi sara , DELLOUM, Zohra
DEVELOPPEMENT D’UN CARTABLE NUMERIQUE POUR LES ETUDIANTS EN UTILISANT PYTHON ET DJANGO
- 2022
-
Encaderement master
BENKHALED Marwa , ZEBBAR Sihem
Development of a web application for park ticketing management
- 2022
-
Encaderement master
TERKI Souad , HAMRIT Karima
Conception d’une application web pour la gestion des examens en ligne
- 2020
-
Encaderement master
ZAITAR HICHAM , MAMMERI SAMIR
Réalisation et developpement d’une application wab pour suivi les colis
- 2020
-
Encaderement master
SALEM Warda , MESSEGUEM Karima
Réalisation d’une application sous Android pour le suivi des diabétiques
- 2020
-
Encaderement master
LAGHOUEG Roumaissa , BELKAIBECH Dounia
Secure Data Transmission Based on Elliptic Curve Cryptography for WSN
- 2018
-
Encaderement master
DOUMI Abdelmoumain
La Sécurité des Communications dans les Réseaux de Capteurs sans Fils
- 2016
-
Co-Encaderement Master
Ghehioueche Amar Abdelmalek
Implémentation des primitives cryptographiques dans les réseaux de capteurs sans fil
- 16-06-2022
-
PhD in computer science
Identity-Based Security for Clustered Wireless Sensor Networks - 01-01-2015
- 01-01-2003
- 1980-07-27 00:00:00
-
FARES Mezrag birthday
- 2025-01-28
-
2025-01-28
An Efficient ECC-Based Authentication Protocol for Secure RFID Healthcare Applications
As Internet and Communication Technologies (ICT) evolve, RFID (Radio Frequency Identification) has become essential in healthcare for efficiently tracking and managing tagged medical devices. While RFID tags are extensively used on various healthcare assets, they are exposed to serious security and privacy risks, such as eavesdropping, data tampering, and interception, which threaten the confidentiality of healthcare professionals and patients. Despite the development of multiple lightweight RFID authentication schemes, many still suffer from vulnerabilities like replay, impersonation, and de-synchronization attacks. To address these limitations, we present a robust and efficient RFID authentication scheme designed specifically for IoT-enabled healthcare applications. By integrating Elliptic Curve Cryptography (ECC), our scheme delivers strong security with a low computational footprint, ensuring resilience against all evaluated attack types. Comprehensive security and performance testing demonstrate that our protocol offers an effective balance of security and efficiency, making it an ideal and secure choice for real-time healthcare environments.
Citation
FARES Mezrag , ,(2025-01-28), An Efficient ECC-Based Authentication Protocol for Secure RFID Healthcare Applications,THE IEEE-INTERNATIONAL SYMPOSIUM ON INNOVATIVE INFORMATICS OF BISKRA,Biskra
- 2025-01-28
-
2025-01-28
An Efficient ECC-Based Authentication Protocol for Secure RFID Healthcare Applications
As Internet and Communication Technologies (ICT) evolve, RFID (Radio Frequency Identification) has become essen- tial in healthcare for efficiently tracking and managing tagged medical devices. While RFID tags are extensively used on various healthcare assets, they are exposed to serious security and privacy risks, such as eavesdropping, data tampering, and interception, which threaten the confidentiality of healthcare professionals and patients. Despite the development of multiple lightweight RFID authentication schemes, many still suffer from vulnerabilities like replay, impersonation, and de-synchronization attacks. To address these limitations, we present a robust and efficient RFID authentication scheme designed specifically for IoT-enabled healthcare applications. By integrating Elliptic Curve Cryptog- raphy (ECC), our scheme delivers strong security with a low computational footprint, ensuring resilience against all evaluated attack types. Comprehensive security and performance testing demonstrate that our protocol offers an effective balance of security and efficiency, making it an ideal and secure choice for real-time healthcare environments.
Citation
Mohamed Bahache , Anwar Nour Eddine Bahache , NOUREDDINE Chikouche , FARES Mezrag , ,(2025-01-28), An Efficient ECC-Based Authentication Protocol for Secure RFID Healthcare Applications,THE INTERNATIONAL SYMPOSIUM ON INNOVATIVE INFORMATICS OF BISKRA,universite de Biskra
- 2024-12-10
-
2024-12-10
A new Authentication Protocol for RFID-based healthcare Application
With the rise of Internet and Communication Technologies (ICT), RFID (Radio Frequency Identification) technology has become indispensable in healthcare for tracking and managing tagged medical devices. Widely deployed across numerous healthcare assets, RFID tags face critical security and privacy challenges, as adversaries can eavesdrop, alter, or intercept transmitted data, compromising the confidentiality of healthcare personnel and patients. Although various lightweight RFID authentication schemes have been proposed to address these risks, many remain vulnerable to attacks, including replay, impersonation, and de-synchronization. To overcome these security limitations, we propose a resilient and efficient RFID authentication scheme tailored for IoT-enabled healthcare applications. Leveraging Elliptic Curve Cryptography (ECC) to ensure high security with minimal computational load, our scheme demonstrates strong resistance to all assessed attack vectors. Rigorous security and performance evaluations confirm that our protocol achieves an optimal balance of security and efficiency, positioning it as a practical and secure solution for real-time healthcare environments.
Citation
NOUREDDINE Chikouche , Noureddine Anwar HEBICHE , FARES Mezrag , Mohamed Bahache , ,(2024-12-10), A new Authentication Protocol for RFID-based healthcare Application,ISIA 2024,Msila
- 2024-11-27
-
2024-11-27
Implementation and Performance Evaluation of Public-Key Algorithms in Constrained Devices
Designing efficient and lightweight cryptographic schemes is crucial for resource-constrained devices. This research paper evaluates the performance of five well-established public-key cryptographic schemes on three such devices: IOTLAB-M3, Arduino-Zero, and Decawave DWM1001. The evaluated schemes fall into two categories: integer factorization-based (RSA and Rabin) and elliptic curve-based (ECIES, ECDH, and ECDSA). Through comprehensive experiments, the paper compares the computational time and energy consumption of these schemes. The findings provide valuable insights for selecting the optimal cryptographic schemes to use in resource-limited environments.
Citation
FARES Mezrag , ,(2024-11-27), Implementation and Performance Evaluation of Public-Key Algorithms in Constrained Devices,Second National Conference on Mathematics and Applications,M'Sila
- 2024-11-01
-
2024-11-01
Emas: an efficient MLWE-based authentication scheme for advanced metering infrastructure in smart grid environment
Advanced metering infrastructure (AMI) plays a critical role in the smart grid by integrating metering systems with communication capabilities, especially for the industrial internet of things. However, existing authentication protocols have proven ineffective against quantum computing attacks and are computationally intensive since AMI contains limited computing components, such as smart meters. In this paper, we present a novel, efficient module learning with errors-based authentication and key agreement system for AMI, which we call EMAS. As part of the security measures of EMAS, Kyber Post-Quantum Public Key Encryption, a one-time pad mechanism, and hash functions are used. A formal and informal analysis of the security features is presented, showing that the proposed system is secure and resistant to known attacks. The performance analysis of our proposed EMAS on a B-L475E-IOT01A node equipped with a ARM Cortex M4 microcontroller shows that EMAS is more efficient than existing relevant schemes. About the computation time, EMAS takes 15.693 ms. This result is lower than other existing relevant schemes.
Citation
FARES Mezrag , , (2024-11-01), Emas: an efficient MLWE-based authentication scheme for advanced metering infrastructure in smart grid environment, journal of Ambient Intelligence and Humanized Computing, Vol:15, Issue:0, pages:3759–3775, springer
- 2024-09-17
-
2024-09-17
Performance evaluation and analysis of public-key schemes in embedded IoT devices
The Internet of Things (IoT) is considered one of the emerging technologies that have attracted widespread attention from industry and academia as a result of their ability to usethem in many applications, including military, healthcare, and industrial control. The inherent vulnerabilities in communications of IoT networks, which consist of resource-constraineddevices, pose significant security challenges. To protect sensitive data exchanged within thesenetworks, it is necessary to design and implement lightweight and efficient cryptographicschemes that consider resource-constrained IoT devices. This paper evaluates the performanceof five well-known public-key schemes on three real-world IoT devices including IOTLAB-M3,Arduino-Zero, and Decawave DWM1001. The examined public-key schemes arecategorizedinto two classes: integer factorization-based (RSA and Rabin schemes) and elliptic curve-based (ECIES, ECDH, and ECDSA schemes). By conducting comprehensive experiments, wecompare these schemes in terms of computational time and energy consumption, providingvaluable insights for selecting optimal public-key schemes in resource-constrained IoT environments.
Citation
FARES Mezrag , , (2024-09-17), Performance evaluation and analysis of public-key schemes in embedded IoT devices, Studies in Engineering and Exact Sciences, Vol:5, Issue:2, pages:1-17, STUDIES
- 2024-08-25
-
2024-08-25
Enhanced Security for IoT Data Transmission
There has a remarkable amount of progress in the Internet of Things (IoT) in terms of healthcare applications and everyday activities. IoT enables everyday objects to be connected to the Internet. These devices are equipped with sensors and actuators that enable data collection and sharing. However, the transmission of this data may be subject to several security and privacy concerns. To secure data transmission in IoT networks, a mutual authentication and key management scheme (SDTS) has proposed recently. However, this scheme suffers from security flaws such as Man-in-the-Middle (MITM) attack vulnerabilities and a lack of mutual authentication between IoT devices. As a result of these weaknesses, this paper proposes an enhanced scheme to address these vulnerabilities. By utilizing the cryptographic library RELIC, the proposed scheme is implemented and evaluated through experiments using IoTLAB-M3 devices equipped with ARM Cortex M3 micro-controllers. Compared to SDTS, the proposed scheme achieves improved security and performance, as well as lower computational, communication, and energy costs.
Citation
FARES Mezrag , ABDERRAHIM Zemmit , ,(2024-08-25), Enhanced Security for IoT Data Transmission,5 TH INTERNATIONAL CONFERENCE ON ENGINEERING AND APPLIED NATURAL SCIENCES,Konya/Turkey.
- 2024-08-25
-
2024-08-25
New Direct Torque Control of Dual Star Induction Motor using modified Grey Wolf Optimization Technique (mGWO)
This document compares two ways for direct torque management of the dual star induction motor drive (DSIM): standard PID and innovative heuristic optimization based on the modified grey wolf optimizer mGWO-PID. DSIM speed control loop issues can be reduced by this combination. Programming and MATLAB implementation of the mGWO algorithm. The most important mGWO-PID method reduces high torque ripple, steady-state error, rising time, and drive performance disturbances.
Citation
FARES Mezrag , ABDERRAHIM Zemmit , ,(2024-08-25), New Direct Torque Control of Dual Star Induction Motor using modified Grey Wolf Optimization Technique (mGWO),5 TH INTERNATIONAL CONFERENCE ON ENGINEERING AND APPLIED NATURAL SCIENCES,Konya/Turkey.
- 2022
-
2022
An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks
Clustered Wireless Sensor Networks (CWSNs) are typically deployed in unsecured or even hostile areas, making them vulnerable to many cyber-attacks and security threats that adversely affect their performance. Furthermore, the design of an efficient cryptographic scheme for CWSN is challenging due to the dynamic nature of the network and resource-constrained sensor devices. The paper presents a new identity-based authentication and key agreement scheme for CWSNs called IBAKAS, which combines Elliptic Curve Cryptography (ECC) and Identity-Based Cryptography (IBC) to provide mutual authentication and establish secret session keys over insecure channels. IBAKAS achieves all desirable security properties of key agreement and prevents specific cyber-attacks on CWSN. Moreover, the formal security of the proposed scheme is verified using the AVISPA tool. Comparison with existing relevant schemes shows that the proposed scheme decreases computational and communication overheads, saves keys storage space and prolongs the network lifetime by reducing the energy consumption of the sensor node.
Citation
FARES Mezrag , , (2022), An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks, Journal of Network and Computer Applications, Vol:200, Issue:0, pages:6, Elsevier
- 2019
-
2019
IDSP: A New Identity-Based Security Protocol for Cluster-Based Wireless Sensor Networks
Communication security in Cluster-Based Wireless Sensor Network (CWSN) is considered as a challenging task facing this type of network. The dynamic nature of CWSN and its deployment in open areas making these networks vulnerable to different kinds of cyber-attacks that can adversely affect its own functioning. Moreover, the resource-constrained nature of sensor devices make it impractical to apply conventional security schemes in CWSN, which require high overhead of computation, communication and memory storage. To deal with this issue of communication security, we propose an efficient secure protocol in CWSN called IDentity-based Security Protocol (IDSP), which guarantees secure communication between Cluster Head (CH) and Base Station (BS), as well as communication between CH and Sensor Node (SN). IDSP is based on Identity-Based Cryptography (IBC) that doesn’t require Public Key Infrastructure (PKI) or complicated certificate management. The cornerstone of our protocol is to provide a perfect trade-off between three key factors: (i) ensuring a good protection level, especially against various cyber-attacks that may target CWSN, (ii) proposing an efficient process regarding energy consumption and key storage, (iii) introducing a key exchange mechanism in IDSP which is lightweight and uncomplicated. Moreover, our protocol treats public key authentication problem. The proposed protocol is tested in Cooja network simulator with WiSMote platform, and the performance results showed that IDSP is efficient, lightweight and secure.
Citation
FARES Mezrag , ,(2019), IDSP: A New Identity-Based Security Protocol for Cluster-Based Wireless Sensor Networks,IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC),Istanbul, Turkey
- 2017
-
2017
Secure Routing in Cluster-Based Wireless Sensor Networks
One of the most important source of WSN vulnerability is the forwarding process between the nodes. In fact, routing protocols are often based on clustering principle, where a set of clusters represented by a Cluster Head (CH) for each cluster, is conceived to rely fundamentally data packets between the network nodes. These protocols are vulnerable to several attacks affecting different routing processes such as hello flooding, selective forwarding, replay process. These attacks are more damaging if the CH is corrupted by a malicious node playing CH role. This paper proposes a new secure protocol based on the wellknown LEACH routing protocol named Hybrid Cryptography- Based Scheme for secure data communication in cluster-based WSN (HCBS). As a multi-constrained criteria approach, HCBS is built on a combination of the cryptography technique based on Elliptic Curves to exchange keys that uses symmetric keys for data encryption and MAC operations. After a set of tests on TOSSIM simulator, the results obtained showed that our proposal achieves good performances in terms of energy consumption, loss rate and end-to-end delay. In addition, HCBS guaranties a high level of security.
Citation
FARES Mezrag , ,(2017), Secure Routing in Cluster-Based Wireless Sensor Networks,GLOBECOM 2017 - 2017 IEEE Global Communications Conference,Singapore, Singapore
- 2017
-
2017
Sécurité du Routage Hiérarchique Basé sur les Clusters dans les RCSFs
Les RCSFs connaissent actuellement une grande extension et une large utilisation dans différents types d’applications exigeant une grande sécurité. Ils sont typiquement déployés dans des zones hostiles, ce qui les rend vulnérables à plusieurs attaques dans lesquelles l’intrus peut prendre le contrôle d’un ou plusieurs nœuds capteurs pour perturber le bon fonctionnement du réseau. Les protocoles de routage hiérarchique dans les réseaux de capteurs sont spécifiés sans aucune mesure de sécurité (LEACH, TEEN, PEGASIS...). Pourtant, les services de sécurité sont identifiés comme essentiels pour assurer un déploiement large de ces réseaux. Dans ce livre, nous nous sommes intéressés à proposer une version sécurisée de protocole LEACH, l’idée consiste à intégrer dans ce protocole un mécanisme de sécurité qui tient compte, d’une part, des ressources limités des nœuds de capteurs et d’autre part, pour faire face aux attaques qui sont fréquemment menées contre le protocole LEACH
Citation
FARESMezrag , ,(2017); Sécurité du Routage Hiérarchique Basé sur les Clusters dans les RCSFs,,Editions universitaires europeennes
- 2014
-
2014
Sécurité du Routage Hiérarchique Basé sur les Clusters dans les Réseaux de Capteurs sans Fil
Les réseaux de capteurs sans fil connaissent actuellement une grande extension et une large utilisation dans différents types d’applications exigeant une grande sécurité. Ils sont typiquement déployés dans des zones hostiles, ce qui les rend vulnérables à plusieurs attaques dans lesquelles l’intrus peut prendre le contrôle d’un ou plusieurs noeuds capteurs pour perturber le bon fonctionnement du réseau. Les protocoles de routage hiérarchique dans les réseaux de capteurs sont spécifiés sans aucune mesure de sécurité (LEACH, TEEN, PEGASIS). Pourtant, les services de sécurité sont identifiés comme essentiels pour assurer un déploiement large de ces réseaux. Nous proposons dans cet article, un protocole sécurisé basé sur le protocole LEACH afin que notre protocole résiste contre les attaques auxquelles LEACH est vulnérable.
Citation
FARES Mezrag , Mohamed Benmohammed, ,(2014), Sécurité du Routage Hiérarchique Basé sur les Clusters dans les Réseaux de Capteurs sans Fil,The First International Symposium on Informatics and its Applications,M’Sila University