Youssef Bentaleb

Work place: Ibn Tofail University/Engineering sciences laboratory, Kenitra, Morocco

E-mail: youssef.bentaleb@uit.ac.ma

Website:

Research Interests: Image Processing, Data Structures and Algorithms, Analysis of Algorithms

Biography

Pr. Youssef BENTALEB, He is a Professor researcher, entitled to direct research, holder of a Ph.D. in applied mathematics and computer science, a researcher in the fields related to modeling and digital simulation, signal and image processing, security, and analysis of massive data. He has a professional experience of ten years in the field of human resources management (administration and computer management of databases), President of the Moroccan Center for Polytechnic Research and Innovation (CMRPI), Director of the International Journal of Scientific Research and Innovation IJRSI-CMRPI, Editor-in-Chief of JCCE Journal, Member of the research laboratory EECOMAS, Guest Speaker

Author Articles
An improved IOT Authentication Process based on Distributed OTP and Blake2

By Hind EL Makhtoum Youssef Bentaleb

DOI: https://doi.org/10.5815/ijwmt.2021.05.01, Pub. Date: 8 Oct. 2021

The Internet of Things operates in vital areas and involves people, objects, and networks. Indeed, it ensures the interconnection and exchange of critical information that does not tolerate flaws. A successful attack on an object in one of these fields will cause fatal damage. Therefore, securing IOTs requires particular attention to the used protocols. It is essential to choose adapted protocols to the requirements of the objects and provide maximum security. Authentication is the first entry to IOTs that must be optimal and secure, without encumbering objects with limited capacities. To address this issue and to avoid concentration points, we present an improved authentication protocol based on the Blake2 hash function and the distribution of calculating OTP function. We will then evaluate, in terms of spatial and temporal complexity, the improvement brought to the IOT authentication process by the proposed process. We will prove that the use of these technics ensure a secure authentication that consumes less time and less memory.

[...] Read more.
Other Articles