Thesis Title: Detecting malicious behaviors in AODV ad hoc networks through implicit trust analysis
Keywords: Security, Ad hoc networks, Routing protocols, implicit trust, Intruision detection, Misbehavior detection.
Biography I began my studies in Computer Science at ISG Tunis and graduated with the diploma degree in 2002. I obtained two master degrees in telecommunication systems from ENIT (Tunisia) in 2004 and 2006 respectively. I joined then Digital Security reasearch unit (Sup'Com Tunisia) and Network and Information System Security Group (Supélec France) as a PhD Student. My thesis focus on the detection of nodes misbehavior using implicit trust relations in routing ad hoc protocols.
During my studies (between 2004 and 2006), i worked as a project manager supervising the development of a platform of telecommunication value-added services. Since I am involved in research activities within the PhD degree and teaching at the Institute of Computer Science and Management of Kairouan (ISIG-K), where I taught a number of courses in design méthodologies, software engineering and networks.
Publications
Keywords: Security, Ad hoc networks, Routing protocols, implicit trust, Intruision detection, Misbehavior detection.
Biography I began my studies in Computer Science at ISG Tunis and graduated with the diploma degree in 2002. I obtained two master degrees in telecommunication systems from ENIT (Tunisia) in 2004 and 2006 respectively. I joined then Digital Security reasearch unit (Sup'Com Tunisia) and Network and Information System Security Group (Supélec France) as a PhD Student. My thesis focus on the detection of nodes misbehavior using implicit trust relations in routing ad hoc protocols.
During my studies (between 2004 and 2006), i worked as a project manager supervising the development of a platform of telecommunication value-added services. Since I am involved in research activities within the PhD degree and teaching at the Institute of Computer Science and Management of Kairouan (ISIG-K), where I taught a number of courses in design méthodologies, software engineering and networks.
Publications
Author | Title | Year | Journal/Proceedings | Reftype | DOI/URL |
---|---|---|---|---|---|
Ayachi, M., Bidan, C., Abbes, T. & Bouhoula, A. | Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol
[BibTeX]
|
2009 | Proc. 12th IEEE International Conference on Computational Science and Engineering (CSE'09), pp. 802-808 | inproceedings | |
BibTeX:
@inproceedings{ayachi2009-1, author = {Ayachi, M.A. and Bidan, C. and Abbes, T. and Bouhoula, A.}, title = {Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol}, booktitle = {Proc. 12th IEEE International Conference on Computational Science and Engineering (CSE'09)}, publisher = {IEEE Computer Society}, year = {2009}, pages = {802--808} } |
|||||
Ayachi, M., Bidan, C., Abbes, T. & Bouhoula, A. | Analyse de la confiance dans AODV
[BibTeX]
|
2009 | Proc.4ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR-SSI'09), pp. 31-45 | inproceedings | |
BibTeX:
@inproceedings{ayachi2009-2, author = {Ayachi, M.A. and Bidan, C. and Abbes, T. and Bouhoula, A.}, title = {Analyse de la confiance dans AODV}, booktitle = {Proc.4ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR-SSI'09)}, publisher = {Editions Publibook}, year = {2009}, pages = {31--45} } |
|||||
Ayachi, M., Bidan, C., Abbes, T. & Bouhoula, A. | Implicit Trust Analysis of the AODV Routing Protocol
[BibTeX]
|
2009 | Proc. of the 2009 Workshop on Symbolic Computation in Software Science (SCSS 2009) | inproceedings | |
BibTeX:
@inproceedings{ayachi2009-3, author = {Ayachi, MA. and Bidan, C. and Abbes, T. and Bouhoula, A.}, title = {Implicit Trust Analysis of the AODV Routing Protocol}, booktitle = {Proc. of the 2009 Workshop on Symbolic Computation in Software Science (SCSS 2009)}, publisher = {EasyChair}, year = {2009} } |
|||||
Ayachi, M., Bidan, C. & Prigent, N. | A Trust-Based IDS for the AODV Protocol
[BibTeX]
|
2010 | Vol. LNCS 6476Proc. 12th International Conference on Information and Communications Security (ICICS 2010), pp. 430-444 |
inproceedings | |
BibTeX:
@inproceedings{ayachi2010-2, author = {Ayachi, M.A. and Bidan, C. and Prigent, N.}, title = {A Trust-Based IDS for the AODV Protocol}, booktitle = {Proc. 12th International Conference on Information and Communications Security (ICICS 2010)}, publisher = {Springer, Heidelberg}, year = {2010}, volume = {LNCS 6476}, pages = {430--444} } |
|||||
Ayachi, M., Bidan, C., Prigent, N. & Bouhoula, A. | Expérimentations sur la détection de nœ uds malhonnêtes dans les réseaux ad hoc AODV
[BibTeX]
|
2010 | Proc.5ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR-SSI'10) | inproceedings | |
BibTeX:
@inproceedings{ayachi2010-1, author = {Ayachi, M.A. and Bidan, C. and Prigent, N. and Bouhoula, A.}, title = {Expérimentations sur la détection de nœ uds malhonnêtes dans les réseaux ad hoc AODV}, booktitle = {Proc.5ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR-SSI'10)}, publisher = {Editions Publibook}, year = {2010} } |