Dr. Mohamed Abid

Assistant Professor in Security & Network Engineering

Biography:

Dr Mohamed Abid did his Phd in 2011 in the field of “Computer Science and Networks” from Pierre and Marie Curie University (Sorbonne University since 1 January 2018), FRANCE. Currently, he is Assistant Professor in Department of Computer Engineering (DoCE) in College of Engineering and Architecture (CoEA), Al-Yamamah University (YU), Riyadh since September 01, 2025.

Before joining Al Yamamah University, Dr. Mohamed was an assistant professor of Computer Sciences (Computer Networks and Network Security) in National School of Engineering of Gabes ENIG, TUNISIA, since September 2012. He was the Director of studies and the Vice Director of ENIG from December 2020 to July 2024. He was also the chair of the “Communication and Network Department” in ENIG from December 2017 to December 2020. He served in key administrative and leadership positions, such as a member in ENIG Council, the chair of ENIG’s Quality assurance committee and member of University of Gabes’s Quality Assurance Committee.

Dr Mohamed ABID is also CISCO instructor (CCNA Routing and Switching 1, 2, 3) in ENIG CISCO Academy since 2013. He is also CISCO instructor (Cyberops Associate) since 2022. He obtained CCNP Core Networking certificate in February 2023.

He is also HUAWEI instructor (HCIA datacom) in ENIG Huawei Academy since 2018. He obtained HCIP Datacom Fast-track certification in August 2020.

Dr Mohamed ABID is a Member of the IRESCOMATH (Hatem Bettaher Computer Sciences, Network, Communication and Mathematics) research laboratory, Gabes, Tunisia since 2013.

His research interests are in Network Security and privacy. He focuses his works on data protection and privacy in Vehicular Network, Internet of Thing, Fog/Cloud Computing, Service Function Chain SFC, Blockchain and Intrusion Detection using Artificial Intelligence. He is particularly interested in the design of efficient, reliable and secure communication protocols and new methods of authentication. He participated in many Tunisians and international research projects with French universities. He is a referee for several peer-reviewed journals and research conferences.

Publications:

Ben Amor, A., Jebri, S., Abid, M. et al. A secure lightweight mutual authentication scheme in Social Industrial IoT environment. J Supercomput 79, 13578–13600 (2023).

Jebri, S., Ben Amor, A., Abid, M. et al. Enhanced Lightweight Algorithm to Secure Data Transmission in IoT Systems. Wireless Pers Commun 116, 2321–2344 (2021).

A. Ben Amor, M. Abid and A. Meddeb, "Secure Fog-Based E-Learning Scheme," in IEEE Access, vol. 8, pp. 31920-31933, 2020

Ibrahim A.Gomaa, Emad Abd-Elrahman and Mohamed Abid, “Virtual Identity Approaches Evaluation for Anonymous Communication in Cloud Environments” International Journal of Advanced Computer Science and Applications(IJACSA), 7(2), 2016.

Song, S., Abid, M., Moustafa, H. et al. Performance evaluation of an authentication solution for IMS services access. Telecommun Syst 52, 2205–2218 (2013)

Renault, E., Ahmad, A., & Abid, M. (2010). Access Control to Objects and their Description in the Future Network of Information. JIPS (Journal of Information Processing Systems), 6(3), 359-374.

Mohamed Abid,Songbo Song,Hassnaa Moustafa and Hossam Afifi , “Integrating Identity-Based Cryptography in IMS Service Authentication”, IJNSA Journal (International Journal of Network Security & Its Applications), Vol.1, No.3, October 2009, PP. 1-13

Abid, M., & Afifi, H. (2009). Towards a secure e-passport protocol based on biometrics. Journal of Information Assurance and Security (JIAS), 4(4), 338–345

Conferences:

S. I. Kaddida, M. Abid and S. Zidi, "STFT and CNN-1D for Mechanical Anomaly Detection in Electrical Machines," 2024 IEEE International Multi-Conference on Smart Systems & Green Process (IMC-SSGP), Djerba, Tunisia, 2024, pp. 1-6

S. Jebri, A. Ben Amor, M. Abid and A. Bouallegue, "Light Automatic Authentication of Data Transmission in 6G/IoT Healthcare System," 2023 IEEE Symposium on Computers and Communications (ISCC), Gammarth, Tunisia, 2023

S. Jebri, A. B. Amor, M. Abid and A. Bouallegue, "Data Security and Anonymous Mutual Authentication in 6G/IoT Healthcare System: Emergency Case," 2023 International Wireless Communications and Mobile Computing (IWCMC), Marrakesh, Morocco, 2023, pp. 1082-1087

K. Assafra, B. Alaya and M. Abid, "Privacy preservation and security management in VANET based to Software Defined Network," 2022 IEEE Wireless Communications and Networking Conference (WCNC), Austin, TX, USA, 2022, pp. 96-101

Sassi, M., Abid, M. (2022). Security and Privacy Protection in the e-Health System: Remote Monitoring of COVID-19 Patients as a Use Case. In: Ben Ahmed, M., Teodorescu, HN.L., Mazri, T., Subashini, P., Boudhir, A.A. (eds) Networking, Intelligent Systems and Security. Smart Innovation, Systems and Technologies, vol 237. Springer, Singapore

Dadi, S., Abid, M. (2022). Enhanced Intrusion Detection System Based on AutoEncoder Network and Support Vector Machine. In: Ben Ahmed, M., Teodorescu, HN.L., Mazri, T., Subashini, P., Boudhir, A.A. (eds) Networking, Intelligent Systems and Security. Smart Innovation, Systems and Technologies, vol 237. Springer, Singapore

Kharouf, W., Abid, M. (2020). EAP-NOOB-KRB for Mutual Authentication in IoT Environment. In: Jemili, I., Mosbah, M. (eds) Distributed Computing for Emerging Smart Networks. DiCES-N 2020. Communications in Computer and Information Science, vol 1348. Springer, Cham.

Yahmed, F., Abid, M. (2020). Trust Execution Environment and Multi-party Computation for Blockchain e-Health Systems. In: Jmaiel, M., Mokhtari, M., Abdulrazak, B., Aloulou, H., Kallel, S. (eds) The Impact of Digital Technologies on Public Health in Developed and Developing Countries. ICOST 2020. Lecture Notes in Computer Science(), vol 12157. Springer

A. B. AMOR, M. ABID and A. MEDDEB, "SAMAFog: Service-Aware Mutual Authentication Fog-based Protocol," 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco, 2019, pp. 1049-1054

S. Jebri, M. Abid and A. Bouallegue, "LTAMA-Algorithm: Light and Trust Anonymous Mutual Authentication Algorithm for IoT," 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal, 2018, pp. 1-5

S. Jebri, M. Abid and A. Bouallegue, "LTKA-AC: Lightweight and Trusted Key Agreement Based on IBE with Anonymous Communication," 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), Hammamet, Tunisia, 2017, pp. 1293-1298

A. Ben Amor, M. Abid and A. Meddeb, "A Privacy-Preserving Authentication Scheme in an Edge-Fog Environment," 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), Hammamet, Tunisia, 2017, pp. 1225-1231

A. Ben Amor, M. Abid and A. Meddeb, "A secure fog-based communication scheme," 2017 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC), Gafsa, Tunisia, 2017, pp. 146-151

S. Jebri, M. Abid and A. Bouallegue, "STAC-protocol: Secure and Trust Anonymous Communication protocol for IoT," 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, 2017, pp. 365-370

I. El Haj Hamad and M. Abid, "BTRMC, a bio-inspired trust and reputation model using clustering in WSNs," 2017 International Conference on Smart, Monitored and Controlled Cities (SM2C), Sfax, Tunisia, 2017, pp. 5-11

S. Jebri, M. Abid and A. Bouallegue, "An efficient scheme for anonymous communication in IoT," 2015 11th International Conference on Information Assurance and Security (IAS), Marrakech, Morocco, 2015, pp. 7-12

E. Abd-Elrahman, M. Abid and H. Afifi, "Video Streaming Security: Window-Based Hash Chain Signature Combines with Redundancy Code - YouTube Scenario as an Internet Case Study," 2010 IEEE International Symposium on Multimedia, Taichung, Taiwan, 2010, pp. 33-40

M. Abid, S. Kanade, D. Petrovska-Delacrétaz, B. Dorizzi and H. Afifi, "Iris based authentication mechanism for e-Passports," 2010 2nd International Workshop on Security and Communication Networks (IWSCN), Karlstad, Sweden, 2010, pp. 1-5

E. Renault, A. Ahmad and M. Abid, "Toward a Security Model for the Future Network of Information," Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications, Fukuoka, Japan, 2009, pp. 1-6

Abid, M., Song, S., Afifi, H., & Moustafa, H. (2009, December). Efficient identity based authentication for IMS based services access. In MoMM 2009: 7th International Conference on Advances in Mobile Computing and Multimedia (pp. 260-266). ACM

M. Abid and H. Afifi, "Secure E-Passport Protocol Using Elliptic Curve Diffie-Hellman Key Agreement Protocol," 2008 The Fourth International Conference on Information Assurance and Security, Naples, Italy, 2008, pp. 99-102

M. Abid, H. Afifi, H. Moustafa and G. Bourdon, "Fuzzy biometric authentication in Home Networks for personalized users’ access," 2008 International Conference on Telecommunications, St. Petersburg, Russia, 2008, pp. 1-6

Mohamed Abid, Hossam Afifi, Farouk Kamoun, Walid Dabbous, “A new method to improve Network Selection”, The 2nd Joint Conference on Security in Network Architectures and Information Systems (SAR-SSI'07), June 2007, pp. 351-362

Internet Draft (IETF)

Mohamed Abid, Hossam Afifi, Kamoun Farouk, Golmie Nada, “OSFR (Optimized network Selection for Fast Roaming)”, 2005/7/11, ietf.org/archive/id/draft-abid-eap-osfr-00.txt

Teaching:

Current teaching

  • NES212: Data Communication & Computer Networks
  • NES341 : Computer Networks
  • CYB516 : Advanced Cryptography

Graduate Teaching

  • Security Basics
  • Cryptography and Network Security
  • Linux certification (LPI-102)

Undergraduate Teaching

  • Networking Fundamentals I
  • Networking Fundamentals II (Switching)
  • Networking Fundamentals III (Routing)
  • Cryptography
  • Network Security
  • Routing & Switching labs (Hardware: CISCO router and switch + Simulation Packet Tracer and eNSP Huawei)
  • Network Administration labs (Hardware: Fortigate firewall + Simulation: Kali Linux + VM)
  • Algorithmic I : fundamentals of algorithms
  • Algorithmic II : Advanced data structure in algorithmic

Courses in CISCO Academy

  • CCNA 1 R&S: Introduction to Networks (IN)
  • CCNA 2 R&S: Switching, Routing, and Wireless Essentials (SRWE)
  • CCNA 3 R&S: Enterprise Networking, Security, and Automation (ENSA)
  • CCNA Cyberops Associate

Course in HUAWEI Academy

  • HCIA Datacom

Services:

The director of Studies and The Vice director, National School of Engineering of Gabes ENIG, Tunisia, December 2020- July 2024

The Chair of the Quality Assurance Committee, National School of Engineering of Gabes ENIG December 2021-December 2024

Member of University of Gabes’s Quality Assurance Committee, November 2023-December 2024

Member of School Council of ENIG, December 2017-July 2024

The coordinator of project PAQ-Covid19, University of Gabes, Tunisa, November 2020-August 2025

The administrator of the CISCO Academy of ENIG, March 2024-August 2025

The administrator of the HUAWEI Academy of ENIG, April 2018-August 2025

Member of Accreditation Committee of ENIG, (CTI Commission Titre Ingenieur), November 2019-June 2022

The Chair of the Communication and Network Department, National School of Engineering of Gabes, ENIG, December 2017- December 2020.

Member of the committee evaluating applications for grants for Master's and Doctoral Studies in Cybersecurity in CANADA, Ministry of Higher Education and Scientific Research, TUNISA, years 2020, 2021, 2022.

Member of the IRESCOMATH (Hatem Bettaher Computer Sciences, Network, Communication and Mathematics) research laboratory, Gabes, Tunisia since 2013.

Computer Network Security Consultant in Telecom SudParis for the French ANR Project VELCRI. Participation in the design of a new authentication method for the Renault electric vehicles, France, September 2009 - December 2010

A referee for several peer-reviewed journals among them:

  • Journal of Network and Computer Applications (Elsevier)
  • Transactions on Emerging Telecommunications Technologies TETT (Wiley)
  • IEEE Access

A referee for several research conferences