on campus
work from home
out of office

I am Mohammed El-hajj, a dedicated professional with a robust academic background and a fervent commitment to advancing the field of network security. My journey commenced with the attainment of my B.S. from the School of Computer Science at IUL University in Lebanon in 2004, followed by an M.S. from Kingston University in London in 2008. This journey culminated in the completion of my Ph.D. in network security at the University Saint-Joseph in Lebanon in 2020.

My career initiated as an Assistant Professor in the Department of Computer Science at the University of Sciences and Arts in Lebanon. Here, I cultivated expertise in software development, IoT, network security, programming, and teaching. Throughout this period, I showcased my dedication to research and education within this domain.

Recently, I transitioned to a new role as a Lecturer at the University of Twente, where my focus extends toward securing critical infrastructures. At the University of Twente, I am actively engaged in pioneering research initiatives that center on the security aspects of critical infrastructures, employing digital twins and harnessing advanced technologies like generative AI and federated learning within machine learning to fortify security measures.

My research interests revolve around enhancing the understanding, design, and performance of authentication protocols for IoT ecosystems. I have particularly focused on developing a hardware security platform based on Physical Un-clonable Functions (PUF) to mitigate machine learning attacks and provide robust authentication for IoT devices. Additionally, I explore the use of digital twins to bolster the security of diverse IoT applications, contributing significantly to the evolving landscape of network and IoT security.

With a proven track record in higher education and a diverse skill set encompassing software development, IoT, network security, and teaching, I continue to lead groundbreaking research in securing critical infrastructures. I embrace innovative technologies and contribute to advancing security within IoT ecosystems.


  • Computer Science

    • Internet of Things
    • Attack
    • Internet of Things Device
    • Survey
    • authentication scheme
    • Machine Learning
    • Authentication
    • Authentication Protocol


I specialize in IoT and network security, focusing on enhancing authentication protocols in IoT ecosystems using Distributed Ledger Technologies like Ethereum Blockchain and IOTA. Additionally, I'm developing a hardware security platform based on Physical Unclonable Functions (PUF) for IoT device authentication, addressing vulnerabilities to machine learning attacks.

I explore the application of digital twins to bolster Critical Infrastructure (CI) security and integrate generative AI and federated learning. Digital twins offer preemptive defense by simulating systems, while generative AI and federated learning contribute to identifying threats and strengthening CI security.

My research aims to synergize these elements—DLTs, hardware security, digital twins, generative AI, and federated learning—to fortify comprehensive security frameworks for Critical Infrastructures against evolving cyber threats.


NAISS: A Reverse Proxy Approach to Mitigate MageCart's E-Skimmers in E-CommerceComputers & Security, 140, Article 103797 (E-pub ahead of print/First online). Rus, A. C., El-hajj, M. & Sarmah, D. K. Insurance Fraud Detection Using Data Mining: A Systematic Literature ReviewIntelligent Systems with Applications, 21, Article 200340. Schrijver, G., Sarmah, D. K. & El-hajj, M. and Security Analysis of Privacy-Preserved IoT ApplicationsIn 2023 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT): IEEE International Conference on Communication, Networks and Satellite (pp. 549-556). IEEE. Drîngă, B. & Elhajj, M. and Performance Analysis of Edge Computing in IoTIn 2023 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT): IEEE International Conference on Communication, Networks and Satellite (pp. 542 - 548). Ghadiri, R. & El-hajj, M. A P2P Music Streaming Service on the IoTA Distributed LedgerIn 2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems, ICETSIS 2024 (pp. 951-956). IEEE. Melero Martinez, D., Elhajj, M. & Sarmah, D. K.
Securing IoT Device Networks: A Digital Twin and Automated Adversary Emulation ApproachIn 2023 IEEE 3rd International Conference on Digital Twins and Parallel Intelligence (DTPI) (pp. 1-6). van der Wal, E. W. & El-hajj, M. Comparison of Authentication Protocols for Unified Client ApplicationsIn 2023 International Symposium on Networks, Computers and Communications (ISNCC) (pp. 1-7). IEEE. Breggeman, F., El-hajj, M. & Hahn, F. IoT Security: Design and Evaluation of a Raspberry Pi-Based Intrusion Detection SystemIn 2023 International Symposium on Networks, Computers and Communications (ISNCC) (pp. 1-7). IEEE. Garalov, T. & El-hajj, M. Number Message Authentication Code in the IoT Landscape. Constantinescu, E.-M., Elhajj, M. & Mariot, L. end-to-end Approach to a Reinforcement Learning in Transport Logistics: An end-to-end Approach to a Reinforcement Learning in Transport LogisticsIn 2023 16th International Conference on Signal Processing and Communication System (ICSPCS). Gomez, N. R. & El-Hajj, M. A Pay-per-Play Music Streaming System based on IOTAIn 2023 9th International Conference on Computer and Communication Engineering (ICCCE) (pp. 46-51). Melero Martinez, D. & Elhajj, M. on IoT Multi-Factor Authentication Protocols: A Systematic Literature ReviewIn 2023 11th International Symposium on Digital Forensics and Security (ISDFS). Fneish, Z. A.-A. M., El-Hajj, M. & Samrouth, K. Networks of IoT Devices with Digital Twins and Automated Adversary Emulation, 241 - 246. van der Wal, E. W. & El-hajj, M. Aspects of Digital Twins in IoT, 560-567. El-hajj, M. & Hahn, F. of Lightweight Cryptographic Algorithms on IoT Hardware PlatformFuture Internet, 15(2), Article 54. El-hajj, M., Mousawi, H. & Fadlallah, A. of Lightweight Cryptographic Algorithms on IoT Hardware PlatformsIn 2022 32nd International Telecommunication Networks and Applications Conference (ITNAC) (pp. 121-126). El-hajj, M. & Fadlallah, A.

Other contributions


Elhajj, M., Jradi, H., Chamoun, M. and Fadlallah, A., 2022, June. LASII: Lightweight Authentication Scheme using IOTA in IoT Platforms. In 2022 20th Mediterranean Communication and Computer Networking Conference (MedComNet) (pp. 74-83). IEEE.

El-Hajj, M., Fadlallah, A., Chamoun, M. and Serhrouchni, A., 2021. A taxonomy of PUF Schemes with a novel Arbiter-based PUF resisting machine learning attacks. Computer Networks, p.108133.

Research profiles

Received a B.S. from IUL at Lebanon in 2004 with GPA of 3.2, and an M.S. from Kingston University at London in 2008 with rank Good. I received my Ph.D. in Network Security from USJ University at Lebanon in 2020 with the highest rank.

Affiliated study programs

Courses academic year 2023/2024

Courses in the current academic year are added at the moment they are finalised in the Osiris system. Therefore it is possible that the list is not yet complete for the whole academic year.

Courses academic year 2022/2023

I did more than 24 interviews talking about privacy, security, and IoT.

Have a look at my Link-in Account


University of Twente

Zilverling (building no. 11), room 2031
Hallenweg 19
7522 NH Enschede

Navigate to location


Scan the QR code or
Download vCard