Table of Contents Preface .................................................................................................................................................xvi Acknowledgment ...............................................................................................................................xxii Section 1 Smart Sensor Protocols and Cryptographic Algorithms Chapter 1 Key Management Protocols for Smart Sensor Networks ........................................................................ 1 Yassine Maleh, University Hassan I, Morocco Abdelkbir Sahid, University Hassan I, Morocco Abdellah Ezzati, University Hassan I, Morocco Mustapha Belaissaoui, University Hassan I, Morocco Chapter 2 Secure and Energy-Efficient Routing for Cluster-Based Wireless Sensor Networks ............................ 24 Meenakshi Tripathi, Malaviya National Institute of Technology, India M. S. Gaur, Indian Institute of Technology Jammu, India Vijay Laxmi, Malaviya National Institute of Technology, India Ramesh Battula, Malaviya National Institute of Technology, India Chapter 3 Trust Management in Vehicular Ad hoc NETwork .............................................................................. 47 Ryma Abassi, University of Carthage, Tunisia Chapter 4 An Optimized Reputation-Based Trust Management Scheme for MANET Security .......................... 63 Aida Ben Chehida Douss, University of Carthage, Tunisia Ryma Abassi, University of Carthage, Tunisia Sihem Guemara El Fatmi, University of Carthage, Tunisia Chapter 5 Trust Management Issues for Sensors Security and Privacy in the Smart Grid ................................... 86 Nawal Ait Aali, National Institute of Posts and Telecommunications, Morocco Amine Baina, National Institute of Posts and Telecommunications, Morocco Loubna Echabbi, National Institute of Posts and Telecommunications, Morocco Section 2 Security and Privacy in the Internet of Things (IoT) Chapter 6 Security in the Internet of Things ....................................................................................................... 105 Ahmed Maarof, Mohammed V University, Morocco Mohamed Senhadji, Mohammed V University Morocco Zouheir Labbi, Mohammed V University, Morocco Mostafa Belkasmi, Mohammed V University, Morocco Chapter 7 Trust Management in the Internet of Things ...................................................................................... 122 Nabil Djedjig, Research Center on Scientific and Technical Information (CERIST), Algeria & University Abderrahamane Mira, Algeria Djamel Tandjaoui, Research Center on Scientific and Technical Information (CERIST), Algeria Imed Romdhani, Edinburgh Napier University, UK Faiza Medjek, Research Center on Scientific and Technical Information (CERIST), Algeria & University Abderrahamane Mira, Algeria Chapter 8 Security Threats in the Internet of Things: RPL’s Attacks and Countermeasures .............................. 147 Faiza Medjek, Research Center on Scientific and Technical Information (CERIST), Algeria & University Abderrahamane Mira, Algeria Djamel Tandjaoui, Research Center on Scientific and Technical Information (CERIST), Algeria Imed Romdhani, Edinburgh Napier University, UK Nabil Djedjig, Research Center on Scientific and Technical Information (CERIST), Algeria & University Abderrahamane Mira, Algeria Chapter 9 IoT Security Based on Content-Centric Networking Architecture ..................................................... 179 Mohamed Labbi, Mohammed I University, Morocco Nabil Kannouf, Mohammed I University, Morocco Mohammed Benabdellah, Mohammed I University, Morocco Section 3 Smart Networks: Access Control and Intrusion Detection Systems Chapter 10 Network Access Control and Collaborative Security Against APT and AET .................................... 201 Ghizlane Orhanou, Mohammed V University, Morocco Abdelmajid Lakbabi, Mohammed V University, Morocco Nabil Moukafih, Mohammed V University, Morocco Said El Hajji, Mohammed V University, Morocco Chapter 11 A Novel Real-Time Lighting-Invariant Lane Departure Warning System ......................................... 231 Yassin Kortli, University of Monastir, Tunisia Mehrez Marzougui, King Khalid University, Saudi Arabia & University of Monastir, Tunisia Mohamed Atri, University of Monastir, Tunisia Chapter 12 A Review of Intrusion Detection Systems in Cloud Computing ........................................................ 253 Chiba Zouhair, Hassan II University of Casablanca, Morocco Noreddine Abghour, Hassan II University of Casablanca, Morocco Khalid Moussaid, Hassan II University of Casablanca, Morocco Amina El Omri, Hassan II University of Casablanca, Morocco Mohamed Rida, Hassan II University of Casablanca, Morocco Chapter 13 A Secure Routing Scheme Against Malicious Nodes in Ad Hoc Networks ....................................... 284 Abdelaziz Amara Korba, Badji Mokhtar-Annaba University, Algeria Mohamed Amine Ferrag, Guelma University, Algeria Section 4 Smart Networks: Security Management and Methods Chapter 14 A State-of-the-Art Assessment of US and EU C-ITS Security Solutions .......................................... 309 Yessenia Berenice Llive, Budapest University of Technology and Economics, Hungary Norbert Varga, Budapest University of Technology and Economics, Hungary László Bokor, Budapest University of Technology and Economics, Hungary Chapter 15 Security in 4G: IP Multimedia Subsystem (IMS) Use Case ............................................................... 338 Elmostafa Belmekki, National Institute of Posts and Telecommunications, Morocco Raouyane Brahim, Faculty of Science Ain Chock, Morocco Abdelhamid Belmekki, National Institute of Posts and Telecommunications, Morocco Mostafa Bellafkih, National Institute of Posts and Telecommunications, Morocco Chapter 16 Security of Information Exchange Between Readers and Tags .......................................................... 368 Nabil Kannouf, Mohammed I University, Morocco Mohamed Labbi, Mohammed I University, Morocco Mohammed Benabdellah, Mohammed I University, Morocco Abdelmalek Azizi, Mohammed I University, Morocco Compilation of References ............................................................................................................... 397 About the Contributors .................................................................................................................... 431 Index ................................................................................................................................................... 439.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages3 Page
-
File Size-