Welcome...

dr.ing. M. Elhajj (Mohammed)

Lecturer

About Me

I am Mohammed El-hajj, a dedicated professional with a robust academic background and a fervent commitment to advancing the field of network security. My journey commenced with the attainment of my B.S. from the School of Computer Science at IUL University in Lebanon in 2004, followed by an M.S. from Kingston University in London in 2008. This journey culminated in the completion of my Ph.D. in network security at the University Saint-Joseph in Lebanon in 2020.

My career initiated as an Assistant Professor in the Department of Computer Science at the University of Sciences and Arts in Lebanon. Here, I cultivated expertise in software development, IoT, network security, programming, and teaching. Throughout this period, I showcased my dedication to research and education within this domain.

Recently, I transitioned to a new role as a Lecturer at the University of Twente, where my focus extends toward securing critical infrastructures. At the University of Twente, I am actively engaged in pioneering research initiatives that center on the security aspects of critical infrastructures, employing digital twins and harnessing advanced technologies like generative AI and federated learning within machine learning to fortify security measures.

My research interests revolve around enhancing the understanding, design, and performance of authentication protocols for IoT ecosystems. I have particularly focused on developing a hardware security platform based on Physical Un-clonable Functions (PUF) to mitigate machine learning attacks and provide robust authentication for IoT devices. Additionally, I explore the use of digital twins to bolster the security of diverse IoT applications, contributing significantly to the evolving landscape of network and IoT security.

With a proven track record in higher education and a diverse skill set encompassing software development, IoT, network security, and teaching, I continue to lead groundbreaking research in securing critical infrastructures. I embrace innovative technologies and contribute to advancing security within IoT ecosystems.


 

Expertise

Engineering & Materials Science
Authentication
Cryptography
Hardware Security
Internet Of Things
Machine Learning
Network Protocols
Taxonomies
Business & Economics
Authentication

Research

I specialize in IoT and network security, focusing on enhancing authentication protocols in IoT ecosystems using Distributed Ledger Technologies like Ethereum Blockchain and IOTA. Additionally, I'm developing a hardware security platform based on Physical Unclonable Functions (PUF) for IoT device authentication, addressing vulnerabilities to machine learning attacks.

I explore the application of digital twins to bolster Critical Infrastructure (CI) security and integrate generative AI and federated learning. Digital twins offer preemptive defense by simulating systems, while generative AI and federated learning contribute to identifying threats and strengthening CI security.

My research aims to synergize these elements—DLTs, hardware security, digital twins, generative AI, and federated learning—to fortify comprehensive security frameworks for Critical Infrastructures against evolving cyber threats.

 

Publications

Recent
Melero Martinez, D. , & Elhajj, M. (2023). IOTA-MSS: A Pay-per-Play Music Streaming System based on IOTA. In 2023 9th International Conference on Computer and Communication Engineering (ICCCE) (pp. 46-51) https://doi.org/10.1109/ICCCE58854.2023.10246055
Fneish, Z. A-A. M. , El-Hajj, M., & Samrouth, K. (2023). Survey on IoT Multi-Factor Authentication Protocols: A Systematic Literature Review. In A. Varol, M. Karabatak, C. Varol, & A. Nasab (Eds.), 2023 11th International Symposium on Digital Forensics and Security (ISDFS) https://doi.org/10.1109/ISDFS58141.2023.10131870
Gomez, N. R. , & El-Hajj, M. (2023). An end-to-end Approach to a Reinforcement Learning in Transport Logistics: An end-to-end Approach to a Reinforcement Learning in Transport Logistics. In B. J. Wysocki, & T. A. Wysocki (Eds.), 2023 16th International Conference on Signal Processing and Communication System (ICSPCS) https://doi.org/10.1109/ICSPCS58109.2023.10261141
El-hajj, M., & Fadlallah, A. (2023). Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platforms. In 2022 32nd International Telecommunication Networks and Applications Conference (ITNAC) (pp. 121-126) https://doi.org/10.1109/ITNAC55475.2022.9998413
Rus, C. , Sarmah, D. K. , & El-hajj, M. (2023). Defeating MageCart Attacks in a NAISS Way. In Proceedings of the 20th International Conference on Security and Cryptography (SECRYPT 2023) (Vol. 1, pp. 691-697). SCITEPRESS. https://doi.org/10.5220/0012079300003555
El-hajj, M. , & Hahn, F. (2023). Security Aspects of Digital Twins in IoT. 560-567. Paper presented at 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, Lisbon, Portugal. https://doi.org/10.5220/0011714500003405
van der Wal, E. W. , & El-hajj, M. (2023). Securing Networks of IoT Devices with Digital Twins and Automated Adversary Emulation. 241 - 246. Paper presented at 26th International Computer Science and Engineering Conference, ICSEC 2022, Sakon Nakhon , Thailand. https://doi.org/10.1109/ICSEC56337.2022.10049355
El-hajj, M., Mousawi, H., & Fadlallah, A. (2023). Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform. Future Internet, 15(2), Article 54. Advance online publication. https://doi.org/10.3390/fi15020054
El-hajj, M. (2022). Performance analysis of Signcryption and Sign-then-Encrypt schemes for resource-constrained IoT devices. In Proceedings of the Interdisciplinary Conference on Mechanics, Computers and Electrics (ICMECE 2022)
El-hajj, M. (2022). Comparative Analysis between the Fast and Basic Scalar Multiplication Used in Elliptic Curve Cryptography. In Proceedings of the Interdisciplinary Conference on Mechanics, Computers and Electrics (ICMECE 2022)
El-Hajj, M., & Mulder, P. (2022). A comparative analysis of the computation cost and energy consumption of relevant curves of ECC presented in literature. Paper presented at Interdisciplinary Conference on Mechanics, Computers and Electrics, ICMECE 2022, Barcelona, Spain.
El-hajj, M., Jradi, H., Chamoun, M., & Fadlallah, A. (2022). LASII : Lightweight Authentication Scheme using IOTA in IoT Platforms. In 20th Mediterranean Communication and Computer Networking Conference, MedComNet (pp. 74-83). Article 21846116 https://doi.org/10.1109/MedComNet55087.2022.9810397
El-Hajj, M., Fadlallah, A., Chamoun, M., & Serhrouchni, A. (2021). A taxonomy of PUF Schemes with a novel Arbiter-based PUF resisting machine learning attacks. Computer networks, 194, Article 108133. https://doi.org/10.1016/j.comnet.2021.108133
Elhajj, M., Fadlallah, A., Chamoun, M., & Serhrouchni, A. (2019). Secure PUF: Physically unclonable function based on arbiter with enhanced resistance against machine learning (ML) attacks. In Sensors and electronic Instrumentation Advances (19 ed., pp. 216-220). Article 82 International Frequency Sensor Association. https://books.google.nl/books?hl=en&lr=&id=ZMbKDwAAQBAJ&oi=fnd&pg=PA216&ots=JXBPzHMBy0&sig=KmEOoVLi2qnu4h2zOmrRf47QYlI&redir_esc=y#v=onepage&q&f=false
El-Hajj, M., Fadlallah, A., Chamoun, M., & Serhrouchni, A. (2019). Ethereum for Secure Authentication of IoT using Pre-Shared Keys (PSKs). In 2019 International Conference on Wireless Networks and Mobile Communications (WINCOM) (pp. 1-7). Article 8942487 IEEE. https://doi.org/10.1109/WINCOM47513.2019.8942487
El-Haii, M., Chamoun, M., Fadlallah, A., & Serhrouchni, A. (2019). Analysis of Cryptographic Algorithms on IoT Hardware platforms. In 2018 2nd Cyber Security in Networking Conference (CSNet) (pp. 1-5). Article 8602942 IEEE. https://doi.org/10.1109/CSNET.2018.8602942
Other Contributions

Recent:

Elhajj, M., Jradi, H., Chamoun, M. and Fadlallah, A., 2022, June. LASII: Lightweight Authentication Scheme using IOTA in IoT Platforms. In 2022 20th Mediterranean Communication and Computer Networking Conference (MedComNet) (pp. 74-83). IEEE.

El-Hajj, M., Fadlallah, A., Chamoun, M. and Serhrouchni, A., 2021. A taxonomy of PUF Schemes with a novel Arbiter-based PUF resisting machine learning attacks. Computer Networks, p.108133.

UT Research Information System

Google Scholar Link

Media

I did more than 24 interviews talking about privacy, security, and IoT.

Have a look at my Link-in Account

https://www.linkedin.com/in/mohammed-elhajj-0b88b0156/

Contact Details

Visiting Address

University of Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling (building no. 11), room 2031
Hallenweg 19
7522NH  Enschede
The Netherlands

Navigate to location

Mailing Address

University of Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling  2031
P.O. Box 217
7500 AE Enschede
The Netherlands

Working days

Week Monday Tuesday Wednesday Thursday Friday
Even
Odd

Social Media