31 research outputs found
Fog computing, applications , security and challenges, review
The internet of things originates a world where on daily basis objects can join the internet and interchange information and in addition process, store, gather them from the nearby environment, and effectively mediate on it. A remarkable number of services might be imagined by abusing the internet of things. Fog computing which is otherwise called edge computing was introduced in 2012 as a considered is a prioritized choice for the internet of things applications. As fog computing extend services of cloud near to the edge of the network and make possible computations, communications, and storage services in proximity to the end user. Fog computing cannot only provide low latency, location awareness but also enhance real-time applications, quality of services, mobility, security and privacy in the internet of things applications scenarios. In this paper, we will summarize and overview fog computing model architecture, characteristic, similar paradigm and various applications in real-time scenarios such as smart grid, traffic control system and augmented reality. Finally, security challenges are presented
Omega network hash construction
Cryptographic hash functions are very common and important cryptographic primitives.
They are commonly used for data integrity checking and data authentication. Their
architecture is based on the Merkle-Damgard construction, which takes in a variablelength
input and produces a fixed-length hash value. The basic Merkle-Damgard
construction runs over the input sequentially, which can lead to problems when the input
size is large since the computation time increases linearly. Therefore, an alternative
architecture which can reduce the computation time is needed, especially in today's
world where multi-core processors and multithreaded programming are common. An
Omega Network Hash Construction that can run parallel on multi-core machine has been
proposed as alternative hash function's construction. The Omega Network Hash
Construction performs better than the Merkle-Damgard construction, and its permutation
architecture shows that its security level in term of producing randomness digest value is
better than Merkle-Damgard construction
A robust security framework with bit-flipping attack and timing attack for key derivation functions
A Key Derivation Function (KDF) derives cryptographic keys from private string and public information. The security property for the cryptographic keys is indistinguishable from the random strings of equal length. The security analysis of KDFs has received increasing attention. The practice important of KDFs are reflected in the adoption of industry standards such as NIST800-135 and PKCS5. This paper proposes a robust security framework which takes into consideration the side channel attacks. The robust security framework consists of the proposed security model and existing security models. The proposed security model is known as Adaptive Chosen All Inputs Model (CAM) which analyses the security of KDFs in terms of the bit-flipping attack and timing attack. The existing security model is the Adaptive Chosen Public Inputs Model (CPM). This research shows the implication relationship and non-implication relationship between CAM and CPM. The simulation of security models is according to the indistinguishable game played between a challenger and an adversary. These security models are used to evaluate existing KDFs. The result shows that none of the existing KDFs are secure in CAM for both the bit-flipping attack and timing attack. Hence, this research introduces an alternative KDF that is proven secure in CAM
Smart indoor home surveillance monitoring system using raspberry pi
Internet of Things (IoTs) are internet computing devices which are connected to everyday objects that can receive and transmit data intelligently. IoTs allow human to interact and control everyday objects wirelessly to provide more convenience in their lifestyle. The Raspberry Pi is a small, lightweight and cheap single board computer that can fit on human’s palm. Security plays a big role in a home. People concern about security by preventing any intruders to enter their home. This is to prevent loss of privacy and assets. The closed-circuit television (CCTV) is one of the device used to monitor the secured area for any intruders. The use of traditional CCTV to monitor the secured area have three limitations, which are requiring a huge volume of storage to store all the videos regardless there are intruders or not, does not notify the users immediately when there are motions detected, and users must always check the CCTV recorded videos regularly to identity any intruders. Therefore, a smart surveillance monitoring system is proposed to solve this problem by detecting intruders and capturing image of the intruder. Notifications will also be sent to the user immediately when motions are detected. This smart surveillance monitoring system only store the images of the intruders that triggered the motion sensor, making this system uses significantly less storage space. The proposed Raspberry Pi is connected with a passive infrared (PIR) motion sensor, a webcam and internet connection, the whole device can be configured to carry out the surveillance tasks. The objectives of this project are to design, implement and test the surveillance system using the Raspberry Pi. This proposed surveillance system provides the user with live stream of video feed for the user. Whenever a motion is detected by the PIR motion sensor, the web camera may capture an image of the intruder and alert the users (owners) through Short Message Service (SMS) and email notifications. The methodology used to develop this system is by using the object-oriented analysis and design (OOAD) model
Blockchain-based electronic voting protocol
Current electronic voting protocol require a centralized system to control the whole procedure from ballot inputs to result outputs and election monitoring. Meanwhile, blockchain technology provide a decentralized system which open across the whole network of untrusted participants. Applying blockchain technology into electronic voting protocol through a proper architecture can instil characteristic such as data confidentiality, data integrity and data authenticity. In this paper, we going to discuss a proposed method on how to leverage the advantages from blockchain into electronic voting protocol. This blockchain-based electronic voting protocol promise to provide a secure electronic election process given the proposed system works. We implement a protocol using blockchain to turn election protocol into an automated control system without relying any single point of entity. Lastly, we discuss the characteristics of our proposed blockchain-based electronic voting protocol in this paper. However, there are also emerging challenges and limitations awaiting to overcome. This paper gives a comprehensive overview of our proposed protocol
Staff attendance system using RFID
Attendance system University Tun Hussien Onn Malaysia is the system to record, and monitor the staff attendance to the daily work. This project is to design develop and implement attendance system using radio frequency identification technology. This technology is divided into two types which are system passive and system active. The proposed system used the system passive to record staff attendance. Frequency identification technology will read the staffs tag and the attendance are recorded automatically and store it in database. The proposed system has several securities feature that can prevent security breaches which is captcha and audit trail. The advantage of proposed system is can differentiate between the human input and robot input and record all the user activity when access to the system
Minimizing information asymmetry interference using optimal channel assignment strategy in wireless mesh networks
Multi-radio multi-channel wireless mesh networks (MRMC-WMNs) in recent years are considered as the prioritized choice for users due to its low cost and reliability. MRMCWMNs is recently been deployed widely across the world but still these kinds of networks face interference problems among WMN links. One of the well-known interference issue is information asymmetry (IA). In case of information asymmetry interference the source mesh nodes of different mesh links cannot sense each other before transmitting data on the same frequency channel. This non-coordination leads to data collision and packet loss of data flow and hence degrades the network capacity. To maximize the MRMC-WMN capacity and minimize IA interference, various schemes for optimal channel assignment have been proposed already. In this research a novel and near-optimal channel assignment model called Information Asymmetry Minimization (IAM) model is proposed based on integer linear programming. The proposed IAM model optimally assigns orthogonal or non-overlapping channels from IEEE 802.11b technology to various MRMC-WMN links. Through extensive simulations we show that our proposed model gives 28.31% network aggregate network capacity improvement over the existing channel assignment model
Review on Leakage Resilient Key Exchange Security Model
In leakage resilient cryptography, leakage resilient key exchange protocols are constructed to defend against leakage attacks. Then, the key exchange protocol is proved with leakage resilient security model to determine whether its security proof can provide the security properties it claimed or to find out any unexamined flaw during protocol building. It is an interesting work to review the meaningful security properties provided by these security models. This work review how a leakage resilient security model for a key exchange protocol has been evolved over years according to the increasing security requirement which covers a different range of attacks. The relationship on how an adversary capability in the leakage resilient security model can be related to real-world attack scenarios is studied. The analysis work for each leakage resilient security model here enables a better knowledge on how an adversary query addresses different leakage attacks setting, thereby understand the motive of design for a cryptographic primitive in the security model
Delivery Route Management based on Dijkstra Algorithm
بالنسبة للشركات التي تقدم خدمات التوصيل، فإن كفاءة عملية التسليم من حيث الالتزام بالمواعيد مهمة للغاية. بالإضافة إلى زيادة ثقة العملاء ، فإن الإدارة الفعالة للمسار والاختيار مطلوبة لتقليل تكاليف وقود السيارة وتسريع التسليم. لا تزال بعض الشركات الصغيرة والمتوسطة تستخدم الأساليب التقليدية لإدارة طرق التسليم. لا تستخدم قرارات إدارة جداول التسليم والمسارات أي طرق محددة لتسريع عملية تسوية التسليم. هذه العملية غير فعالة وتستغرق وقتًا طويلاً وتزيد التكاليف وتكون عرضة للأخطاء. لذلك ، تم استخدام خوارزمية Dijkstra لتحسين عملية إدارة التسليم. تم تطوير نظام إدارة التسليم لمساعدة المديرين والسائقين على جدولة طرق فعالة لتسليم طلبات المنتجات إلى المستلمين. بناءً على الاختبار ، عملت خوارزمية Dijkstra التي تم تضمينها في أقرب وظيفة بحث عن المسار لعملية التسليم بشكل جيد. من المتوقع أن يؤدي هذا النظام إلى تحسين الإدارة الفعالة وتسليم الطلبات.For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers schedule efficient ways to deliver product orders to recipients. Based on testing, the Dijkstra algorithm that has been included in the nearest route search function for the delivery process has worked well. This system is expected to improve the efficient management and delivery of orders
Parallel Omega Network Hash Construction
Cryptography hash function is important to ensure data integrity when the data is transmitting in the insecure connections. Merkle-Damgård construction is the well-known architecture for most hash function algorithm. This construction will take arbitrary length of input and generate a fixed length of output which best known as hash value. The process of producing the hash value is executing sequentially. The implication of this is the computation time will increase linearly when the size of input increase. Therefore, an alternative architecture that can reduce the computation time when input size is increase is needed especially in the today world where multi-core processors and multithreading programming are common. Hence, in this research an alternative Parallel Omega Network Hash Construction that can execute in multi-core machine is propose