7 research outputs found

    Security Evaluation of Pailiar Homormophic Encryption Scheme

    No full text
    In modern days of information security, much attention is drifted towards achieving the major security triad of privacy, authentication and availability. Pailiar homormophic encryption is one of the most widely area of pubic key encryption schemes researchers are exploring to enhance information security. In this paper, we presented an overview of the Pailiar cryptosystem. We further evaluated the security vulnerabilities in the cryptosystem. This was achieved through mathematical theorems and inductions. This is to present some open issues for further research to propose and implement a more robust security system based on the Pailiar homormophic encryption scheme.&nbsp

    Residue Number System-Based Approach to Minimise Energy Consumption in Wireless Sensor Networks

    No full text
    This study harnesses the useful number properties of the residue number system (RNS) to minimise energy consumption in a wireless sensor network. In a traditional cluster-based wireless sensor network, large bit representations of aggregated packets are transmitted to the base station. However, large bit patterns of packets are slower compared to smaller bits. The proposed approach splits aggregated data into a pre-specified number of transmission channels using a moduli set. Cheap energy cost routes from the cluster heads are computed to deliver the chunked aggregated data to the base station. Forward and reverse converters are proposed to encode data into RNS and decode the RNS data that reaches the base station. MATLAB simulation is used to implement the proposed data splitting method and to evaluate network performance. The experimental results suggest that the proposed method is more effective at minimising transmission energy when compared with traditional approaches in which complete packets are transmitted

    Cross-Layer Energy Efficient (CLEE) Routing Algorithm for Mobile Ad-Hoc Networks

    No full text
    Ad-hoc routing algorithms in Wireless Sensor Networks (WSN) rely on nodes’ position awareness by regularly updating routing data of neighbouring nodes. Meanwhile, the transmission energy usage is not optimised as a result of this repeated updates and routing table deployment. Therefore, it is very critical to consider techniques of optimising or conserving energy in the design of wireless sensor networks (WSNs) in order to prolong the lifetime of the individual nodes. One of these techniques is the Cross-layer design which, is considered as an efficient method for addressing this challenge with WSNs. In this paper, we propose a Cross-Layer Energy Efficient (CLEE) routing algorithm to establish an optimal route from the source node to the destination node by selecting candidate nodes from neighbouring nodes based on the distance between these nodes and the rate of energy consumption by a possible candidate node. Then to select a designated node from the candidate nodes, the algorithm further computes the Signal Strength Quality (SQS) and the Link Lifetime (LL) as well as the Throughput (TH) rate of selected nodes. The proposed algorithm was simulated with a network size of 600 X 600 on Network Simulator 3 (NS3) in order to analyse its performance. An evaluation of the performance of the proposed CLEE protocol with existing similar protocols such as Ad-hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) reveals that CLEE outperformes AODV and DSR by conserving about 44% of available energy.

    Identifying and Isolating Zombie Attack in Cloud Computing

    No full text
    The cloud computing architecture is a berth in which third party, virtual machine and cloud service providers are involved in data uploading and downloading. A major challenge in this architecture, however, is the security of the data as there exist various forms of attacks from malicious peopleand devices. Among these security attacks, the zombie attack is the most advance type of attack. The zombie attack reduces network performance in terms of delay and bandwidth consumption. With zombie attack, some malicious users may join the network which, in turn takes off the data of legitimate users and at the same time enable zombie nodes to communicate with a virtual machine on behalf of the legitimate user. In this paper, a technique based on strong authentication which, is able to detect malicious users from a network and isolates them from the cloud architecture is proposed

    Development of a Web-Based Kasem Language Learning System

    No full text
    The concept of language involves using words in an organized and traditional way, be it through speaking, writing, or gesturing, as a means of human communication. The inability to communicate efficiently in a specific language is known as language barrier. Such limitation can result in difficulties performing everyday tasks and create challenges on a global levels, such as when businesses move to other nations or on a local level, like when a family or student moves to a region where English is not the primary language. The effects of linguistic barriers can negatively impact the quality of life for everyone involved, regardless of the context. In this paper, the researchers have designed and implemented a web-based Kasem language learning system (KLLS). The technology provides audio output, with corresponding text in the Kasem language to the end user, allowing them to study and become fluent in it. High-level Python web framework, Django, was used to develop and implement the system. Finally, a series of tests were conducted by different levels of users. Each end user reported a high level of satisfaction with the system after navigating through and receiving a clear audio output

    An Electronic Payment System for Revenue Collection in the Kassena Nankana Municipality

    No full text
    Traditionally, revenue collection in Kassena-Nankana Municipal Assembly (KNMA), as in Ghana, was manual, with some ICT systems employed recently.This study designed an E-payment system for revenue collection in the KNMA. The research focused on the development and implementation of an electronic payment system, to facilitate revenue mobilization. The study utilizes tools such as HTML, CSS, PHP, JavaScript, MYSQL, SQL, and other resources like VS Code, and payment APIs for the development of the system as well as azure key vaut and secureauth for incription and muti-factor authentication( MFA).As part of the research, it is revealed that, there is a strong willingness among people to embrace electronic  payment methods for their taxes, finding it convenient to pay via the internet from anywhere. The E- system developed during this study demonstrated the flexibility expected of an Electronic Payment System, allowing users to create and update accounts, make payments in instalment or in full in any location using their phones. The study establishes a positive impact between the electronic systems and improved revenue generation processes which support the notion that there is indeed a correlation between ICT systems and revenue generation processes, against the notion that there is no correlation
    corecore