@conference {Maarof2018, title = {Authentication protocol for securing internet of things}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, doi = {10.1145/3234698.3234727}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85052520501\&doi=10.1145\%2f3234698.3234727\&partnerID=40\&md5=aa4a50dc34245080536baf0939bbbde6}, author = {Maarof, A. and Senhadji, M. and Labbi, Z. and Belkasmi, M.} } @conference {Labbi2018, title = {IoT smart homes based on RFID technology: Localization systems review}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, doi = {10.1145/3234698.3234700}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85052532882\&doi=10.1145\%2f3234698.3234700\&partnerID=40\&md5=3e4d0d9d2a265066d022bd7c80c257b8}, author = {Labbi, Z. and Senhadji, M. and Maarof, A. and Belkasmi, M.} } @book {Maarof2018105, title = {Security in the internet of things}, series = {Security and Privacy in Smart Sensor Networks}, year = {2018}, pages = {105-121}, doi = {10.4018/978-1-5225-5736-4.ch006}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85049817262\&doi=10.4018\%2f978-1-5225-5736-4.ch006\&partnerID=40\&md5=80e4b7c3b0310d29dc82712e2dc2e6bc}, author = {Maarof, A. and Senhadji, M. and Labbi, Z. and Belkasmi, M.} } @conference {Maarof2017, title = {Authentication protocol conforming to EPC class-1 Gen-2 standard}, booktitle = {2016 International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016 - Proceedings}, year = {2017}, note = {cited By 0}, abstract = {A Radio Frequency Identification (RFID) system is a contactless automatic identification system that uses small and low-cost tags. The restricted computation ability and limited memory space of low-cost tags make existing RFID systems vulnerable. EPC Class 1 Generation 2 (EPC-C1G2) is the most popular standard for low cost passive RFID tags. For improving security of this standard; many security schemes are designed for RFID system since the release of the EPC-C1G2. In 2012, Yoon et al. proposed a new RFID authentication protocol conforming to EPC-C1G2 standard. This paper discuss Yoon et al.{\textquoteright}s protocol, which is conforming to EPC-C1G2 standard, and shows that it suffers from common attack and computational and communication cost. Then we present our enhanced protocol which improves the security, reduce the complexity and increase the performance of identification systems efficiently. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ACOSIS.2016.7843915}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85015189847\&doi=10.1109\%2fACOSIS.2016.7843915\&partnerID=40\&md5=497b5f1e05260548d29eb5491926b3ce}, author = {Maarof, A. and Senhadji, M. and Labbi, Z. and Belkasmi, M.} } @conference {Labbi2017, title = {A novel efficient ultralightweight authentication algorithm for RFID systems}, booktitle = {2016 International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016 - Proceedings}, year = {2017}, note = {cited By 0}, abstract = {The security and privacy of RFID (Radio Frequency Identification) systems becomes an important subject especially for low cost RFID tags. A lot of authentication protocols were proposed to insure the security and in the same time meet the resource limitations. In this paper, we proposed an ultralight weight authentication approach based on permutation, XOR and rotation functions. As a result, the computational complexity and communication cost will be reduced as well as increase performance. Finally, our approach proves that the protocol is a lightweight, resistant to known attacks and has an effective security mechanism based on an analytical method. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ACOSIS.2016.7843920}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85015208818\&doi=10.1109\%2fACOSIS.2016.7843920\&partnerID=40\&md5=4252c34bda296ca38939e93620bb3164}, author = {Labbi, Z. and Senhadji, M. and Maarof, A. and Belkasmi, M.} } @article {Labbi201645, title = {Cryptographic algorithm approach for low cost RFID systems}, journal = {Lecture Notes in Electrical Engineering}, volume = {380}, year = {2016}, note = {cited By 0}, pages = {45-54}, abstract = {Today the security of RFID systems is a very important issue especially for low cost RFID tags. Then, it is difficult for several researchers to adopt a strong encryption algorithm due to the extremely limited computational, storage and communication abilities of the tag. So, the priority in RFID systems is to ensure the integrity, confidentiality and authentication of messages using different algorithms (such as encryption and hashing algorithm). In this paper, we propose a lightweight symmetric key encryption approach that includes integrity as part of the encryption process in order to meet the resource limitations of low cost RFID tags. Furthermore we do not need to use separate hash functions to verify message integrity, thus leading to increase the computational efficiency of the system. {\textcopyright} Springer International Publishing Switzerland 2016.}, doi = {10.1007/978-3-319-30301-7_6}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84964556474\&doi=10.1007\%2f978-3-319-30301-7_6\&partnerID=40\&md5=f73dc7340fe5d1492eb5cf9011c70a9e}, author = {Labbi, Z. and Maarof, A. and Senhadji, M. and Belkasmi, M.} } @article {Labbi2016244, title = {Hybrid encryption approach using dynamic key generation and symmetric key algorithm for RFID systems}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {9944 LNCS}, year = {2016}, note = {cited By 0}, pages = {244-249}, abstract = {The security of RFID systems become an important subject especially for low cost RFID tags. A lot of Cryptographic algorithms were proposed to insure the security and in the same time meet the resource limitations. In this paper, we proposed a hybrid cryptographic approach as symmetric key encryption technique which generate the key dynamically, together with integrity check parameters. The generation of key stream follows the chained approach, beginning from the initial key pre-shared. As a result, the computational complexity will be reduced as well as increase performance. {\textcopyright} Springer International Publishing AG 2016.}, doi = {10.1007/978-3-319-46140-3_20}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84990041918\&doi=10.1007\%2f978-3-319-46140-3_20\&partnerID=40\&md5=d8545d3fd6f2b1f8b844953b422053cf}, author = {Labbi, Z. and Maarof, A. and Senhadji, M. and Belkasmi, M.} } @conference {Maarof2016240, title = {A novel mutual authentication scheme for low-cost RFID systems}, booktitle = {Proceedings - 2016 International Conference on Wireless Networks and Mobile Communications, WINCOM 2016: Green Communications and Networking}, year = {2016}, note = {cited By 0}, pages = {240-245}, abstract = {The importance of radio frequency identification (RFID) increases for its powerful capabilities for identifying, locating and automatic access control objects. Electronic Product Code Class 1 Generation 2 (EPC-C1G2) is served as the most popular standard for passive RFID tags. In the last year several schemes were proposed to improve security of EPC-C1G2, most of these schemes still vulnerable and cannot resist some attacks and others schemes exceeds the powerful computing capacity of passive tag. In this paper, we propose a new authentication mutual scheme compliant to EPC-C1G2 standard. The proposed scheme uses only ultra-lightweight operations, Cyclic Redundancy Code (CRC), exclusive OR (XOR) and Pseudo Random Number Generators (PRNG). We have demonstrated that proposed scheme resist against security attacks and more that is better than the previous schemes in terms of the communication and computation cost. {\textcopyright} 2016 IEEE.}, doi = {10.1109/WINCOM.2016.7777221}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85010332933\&doi=10.1109\%2fWINCOM.2016.7777221\&partnerID=40\&md5=1fff563fec3d60d322be588205c273c3}, author = {Maarof, A. and Labbi, Z. and Senhadji, M. and Belkasmi, M.} } @conference {Maarof201411, title = {Security analysis of low cost RFID systems}, booktitle = {WCCCS 2014 - Proceedings; 2014 5th Workshop on Codes, Cryptography and Communication Systems}, year = {2014}, note = {cited By 2}, pages = {11-16}, abstract = {RFID technology attracts strong interest worldwide; it provides a means for automatic identification of objects and is regarded as an indispensable part in the vision of the Internet of things. With the aid of RFID systems, life shall become more convenient and businesses shall become more productive. The low cost RFID technology faces serious security and privacy threats, wireless communication and cost-down consideration on RFID systems are the two main factors that cause these security threats. In order to comply with the resource constraint, a few new authentication protocols with lightweight encryptions are invented to fit the physical limitation of a passive tag. However, those proposed schemes cannot provide enough security level in general; more specifically, they cannot prevent all major or general attacks such as eavesdropping, tracking, replay attack and Denial of Service, and preserve the forward secrecy of tagged object at the same time. {\textcopyright} 2014 IEEE.}, doi = {10.1109/WCCCS.2014.7107902}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84949928462\&doi=10.1109\%2fWCCCS.2014.7107902\&partnerID=40\&md5=6a46bc68b72d6d71ccd82de1c152cc52}, author = {Maarof, A. and Senhadji, M. and Labbi, Z. and Belkasmi, M.} }