Table of Contents

Preface...... xvi

Acknowledgment...... xxii

Section 1 Smart Sensor Protocols and Cryptographic Algorithms

Chapter 1 Key Management Protocols for Smart Sensor Networks...... 1 Yassine Maleh, University Hassan I, Abdelkbir Sahid, University Hassan I, Morocco Abdellah Ezzati, University Hassan I, Morocco Mustapha Belaissaoui, University Hassan I, Morocco

Chapter 2 Secure and Energy-Efficient Routing for Cluster-Based Wireless Sensor Networks...... 24 Meenakshi Tripathi, Malaviya National Institute of Technology, India M. S. Gaur, Indian Institute of Technology Jammu, India Vijay Laxmi, Malaviya National Institute of Technology, India Ramesh Battula, Malaviya National Institute of Technology, India

Chapter 3 Trust Management in Vehicular Ad hoc NETwork...... 47 Ryma Abassi, University of Carthage,

Chapter 4 An Optimized Reputation-Based Trust Management Scheme for MANET Security...... 63 Aida Ben Chehida Douss, University of Carthage, Tunisia Ryma Abassi, University of Carthage, Tunisia Sihem Guemara El Fatmi, University of Carthage, Tunisia

Chapter 5 Trust Management Issues for Sensors Security and Privacy in the Smart Grid...... 86 Nawal Ait Aali, National Institute of Posts and Telecommunications, Morocco Amine Baina, National Institute of Posts and Telecommunications, Morocco Loubna Echabbi, National Institute of Posts and Telecommunications, Morocco   

Section 2 Security and Privacy in the Internet of Things (IoT)

Chapter 6 Security in the Internet of Things...... 105 Ahmed Maarof, , Morocco Mohamed Senhadji, Mohammed V University Morocco Zouheir Labbi, Mohammed V University, Morocco Mostafa Belkasmi, Mohammed V University, Morocco

Chapter 7 Trust Management in the Internet of Things...... 122 Nabil Djedjig, Research Center on Scientific and Technical Information (CERIST), & University Abderrahamane Mira, Algeria Djamel Tandjaoui, Research Center on Scientific and Technical Information (CERIST), Algeria Imed Romdhani, Edinburgh Napier University, UK Faiza Medjek, Research Center on Scientific and Technical Information (CERIST), Algeria & University Abderrahamane Mira, Algeria

Chapter 8 Security Threats in the Internet of Things: RPL’s Attacks and Countermeasures...... 147 Faiza Medjek, Research Center on Scientific and Technical Information (CERIST), Algeria & University Abderrahamane Mira, Algeria Djamel Tandjaoui, Research Center on Scientific and Technical Information (CERIST), Algeria Imed Romdhani, Edinburgh Napier University, UK Nabil Djedjig, Research Center on Scientific and Technical Information (CERIST), Algeria & University Abderrahamane Mira, Algeria

Chapter 9 IoT Security Based on Content-Centric Networking Architecture...... 179 Mohamed Labbi, Mohammed I University, Morocco Nabil Kannouf, Mohammed I University, Morocco Mohammed Benabdellah, Mohammed I University, Morocco

Section 3 Smart Networks: Access Control and Intrusion Detection Systems

Chapter 10 Network Access Control and Collaborative Security Against APT and AET...... 201 Ghizlane Orhanou, Mohammed V University, Morocco Abdelmajid Lakbabi, Mohammed V University, Morocco Nabil Moukafih, Mohammed V University, Morocco Said El Hajji, Mohammed V University, Morocco 

Chapter 11 A Novel Real-Time Lighting-Invariant Lane Departure Warning System...... 231 Yassin Kortli, University of Monastir, Tunisia Mehrez Marzougui, King Khalid University, & University of Monastir, Tunisia Mohamed Atri, University of Monastir, Tunisia

Chapter 12 A Review of Intrusion Detection Systems in Cloud Computing...... 253 Chiba Zouhair, Hassan II University of Casablanca, Morocco Noreddine Abghour, Hassan II University of Casablanca, Morocco Khalid Moussaid, Hassan II University of Casablanca, Morocco Amina El Omri, Hassan II University of Casablanca, Morocco Mohamed Rida, Hassan II University of Casablanca, Morocco

Chapter 13 A Secure Routing Scheme Against Malicious Nodes in Ad Hoc Networks...... 284 Abdelaziz Amara Korba, Badji Mokhtar-Annaba University, Algeria Mohamed Amine Ferrag, Guelma University, Algeria

Section 4 Smart Networks: Security Management and Methods

Chapter 14 A State-of-the-Art Assessment of US and EU C-ITS Security Solutions...... 309 Yessenia Berenice Llive, Budapest University of Technology and Economics, Hungary Norbert Varga, Budapest University of Technology and Economics, Hungary László Bokor, Budapest University of Technology and Economics, Hungary

Chapter 15 Security in 4G: IP Multimedia Subsystem (IMS) Use Case...... 338 Elmostafa Belmekki, National Institute of Posts and Telecommunications, Morocco Raouyane Brahim, Faculty of Science Ain Chock, Morocco Abdelhamid Belmekki, National Institute of Posts and Telecommunications, Morocco Mostafa Bellafkih, National Institute of Posts and Telecommunications, Morocco

Chapter 16 Security of Information Exchange Between Readers and Tags...... 368 Nabil Kannouf, Mohammed I University, Morocco Mohamed Labbi, Mohammed I University, Morocco Mohammed Benabdellah, Mohammed I University, Morocco Abdelmalek Azizi, Mohammed I University, Morocco

Compilation of References...... 397

About the Contributors...... 431

Index...... 439