تجاوز إلى المحتوى الرئيسي
User Image

Abdelouahid Derhab

Associate Professor

Faculty member

علوم الحاسب والمعلومات
Address: Office No. 4, Center of Excellence in Information Assurance (CoEIA), Building No. 31, King Saud University
المنشورات
ورقة مؤتمر
2014

Low Delay and Secure M2M Communication Mechanism for eHealthcare

Saleem, Kashif, Abdelouahid Derhab, Jalal Al-Muhtadi . 2014

Currently, the eHealthcare information management is the most critical and hot research topic. Especially with the involvement of new and promising telecommunication technologies like Machine to Machine (M2M) Communication. In M2M communication the devices interact and exchange information with each other in an autonomous manner to accomplish the required tasks. Mostly machine communicate to another machine wirelessly. The wireless communication opens the medium for enormous vulnerabilities and make it very easy for hackers to access the confidential information and can perform malicious activities. In this paper, we propose a Machine to Machine (M2M) Low Delay and Secure (LDS) communication system for e-healthcare community based on random distributive key management scheme and modified Kerberos realm to ensure data security. The system is capable to perform the tasks in an autonomous and intelligent manner that minimizes the workload of medical staffs, and improves the quality of patient care as well as the system performance. We show how the different actors in the e-healthcare community can interact with each other in a secure manner. The system handles dynamic assignments of doctors to specific patients. The proposed architecture further provides security against false attack, false triggering and temper attack. Finally, the simulation type implementation is performed on Visual Basic .net 2013 that shows the feasibility of the proposed Low Delay and Secure (LDS) algorithm. 

اسم المؤتمر
IEEE HealthCom
مزيد من المنشورات
publications

In this paper, we inspire from two analogies: the warfare kill zone and the airport check-in system, to design and deploy a new line in the defense-in-depth strategy, called the third line.

بواسطة Abdelouahid, Kashif Saleem, Ahmed Youssef Derhab
2014
publications

In this paper, we adopt the divide-and-conquer strategy to propose a lightweight design for an intrusion detection system in wireless sensor networks, lIghtweiGht aNomaly-based Intrusion deTection…

بواسطة Abdelouahid, Abdelghani Bouras Derhab
2014
publications

In this paper, we propose an intrusion detection system (IDS) based on four approaches: (i) statistical-based IDS to reduce detection time; (ii) intertwining data acquisition phase and data…

بواسطة Abdelouahid, Abdelghani Bouras Derhab
2014