Thesis Title: Detecting malicious behaviors in AODV ad hoc networks through implicit trust analysis
Keywords: Security, Ad hoc networks, Routing protocols, implicit trust, Intruision detection, Misbehavior detection.
Biography I began my studies in Computer Science at ISG Tunis and graduated with the diploma degree in 2002. I obtained two master degrees in telecommunication systems from ENIT (Tunisia) in 2004 and 2006 respectively. I joined then Digital Security reasearch unit (Sup'Com Tunisia) and Network and Information System Security Group (Supélec France) as a PhD Student. My thesis focus on the detection of nodes misbehavior using implicit trust relations in routing ad hoc protocols.
During my studies (between 2004 and 2006), i worked as a project manager supervising the development of a platform of telecommunication value-added services. Since I am involved in research activities within the PhD degree and teaching at the Institute of Computer Science and Management of Kairouan (ISIG-K), where I taught a number of courses in design méthodologies, software engineering and networks.
Publications
Keywords: Security, Ad hoc networks, Routing protocols, implicit trust, Intruision detection, Misbehavior detection.
Biography I began my studies in Computer Science at ISG Tunis and graduated with the diploma degree in 2002. I obtained two master degrees in telecommunication systems from ENIT (Tunisia) in 2004 and 2006 respectively. I joined then Digital Security reasearch unit (Sup'Com Tunisia) and Network and Information System Security Group (Supélec France) as a PhD Student. My thesis focus on the detection of nodes misbehavior using implicit trust relations in routing ad hoc protocols.
During my studies (between 2004 and 2006), i worked as a project manager supervising the development of a platform of telecommunication value-added services. Since I am involved in research activities within the PhD degree and teaching at the Institute of Computer Science and Management of Kairouan (ISIG-K), where I taught a number of courses in design méthodologies, software engineering and networks.
Publications
| Author | Title | Year | Journal/Proceedings | Reftype | DOI/URL |
|---|---|---|---|---|---|
| Ayachi, M., Bidan, C., Abbes, T. & Bouhoula, A. | Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol
[BibTeX]
|
2009 | Proc. 12th IEEE International Conference on Computational Science and Engineering (CSE'09), pp. 802-808 | inproceedings | |
BibTeX:
@inproceedings{ayachi2009-1,
author = {Ayachi, M.A. and Bidan, C. and Abbes, T. and Bouhoula, A.},
title = {Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol},
booktitle = {Proc. 12th IEEE International Conference on Computational Science and Engineering (CSE'09)},
publisher = {IEEE Computer Society},
year = {2009},
pages = {802--808}
}
|
|||||
| Ayachi, M., Bidan, C., Abbes, T. & Bouhoula, A. | Analyse de la confiance dans AODV
[BibTeX]
|
2009 | Proc.4ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR-SSI'09), pp. 31-45 | inproceedings | |
BibTeX:
@inproceedings{ayachi2009-2,
author = {Ayachi, M.A. and Bidan, C. and Abbes, T. and Bouhoula, A.},
title = {Analyse de la confiance dans AODV},
booktitle = {Proc.4ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR-SSI'09)},
publisher = {Editions Publibook},
year = {2009},
pages = {31--45}
}
|
|||||
| Ayachi, M., Bidan, C., Abbes, T. & Bouhoula, A. | Implicit Trust Analysis of the AODV Routing Protocol
[BibTeX]
|
2009 | Proc. of the 2009 Workshop on Symbolic Computation in Software Science (SCSS 2009) | inproceedings | |
BibTeX:
@inproceedings{ayachi2009-3,
author = {Ayachi, MA. and Bidan, C. and Abbes, T. and Bouhoula, A.},
title = {Implicit Trust Analysis of the AODV Routing Protocol},
booktitle = {Proc. of the 2009 Workshop on Symbolic Computation in Software Science (SCSS 2009)},
publisher = {EasyChair},
year = {2009}
}
|
|||||
| Ayachi, M., Bidan, C. & Prigent, N. | A Trust-Based IDS for the AODV Protocol
[BibTeX]
|
2010 | Vol. LNCS 6476Proc. 12th International Conference on Information and Communications Security (ICICS 2010), pp. 430-444 |
inproceedings | |
BibTeX:
@inproceedings{ayachi2010-2,
author = {Ayachi, M.A. and Bidan, C. and Prigent, N.},
title = {A Trust-Based IDS for the AODV Protocol},
booktitle = {Proc. 12th International Conference on Information and Communications Security (ICICS 2010)},
publisher = {Springer, Heidelberg},
year = {2010},
volume = {LNCS 6476},
pages = {430--444}
}
|
|||||
| Ayachi, M., Bidan, C., Prigent, N. & Bouhoula, A. | Expérimentations sur la détection de nœ uds malhonnêtes dans les réseaux ad hoc AODV
[BibTeX]
|
2010 | Proc.5ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR-SSI'10) | inproceedings | |
BibTeX:
@inproceedings{ayachi2010-1,
author = {Ayachi, M.A. and Bidan, C. and Prigent, N. and Bouhoula, A.},
title = {Expérimentations sur la détection de nœ uds malhonnêtes dans les réseaux ad hoc AODV},
booktitle = {Proc.5ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR-SSI'10)},
publisher = {Editions Publibook},
year = {2010}
}
|
|||||