31 research outputs found

    Fog computing, applications , security and challenges, review

    Get PDF
    The internet of things originates a world where on daily basis objects can join the internet and interchange information and in addition process, store, gather them from the nearby environment, and effectively mediate on it. A remarkable number of services might be imagined by abusing the internet of things. Fog computing which is otherwise called edge computing was introduced in 2012 as a considered is a prioritized choice for the internet of things applications. As fog computing extend services of cloud near to the edge of the network and make possible computations, communications, and storage services in proximity to the end user. Fog computing cannot only provide low latency, location awareness but also enhance real-time applications, quality of services, mobility, security and privacy in the internet of things applications scenarios. In this paper, we will summarize and overview fog computing model architecture, characteristic, similar paradigm and various applications in real-time scenarios such as smart grid, traffic control system and augmented reality. Finally, security challenges are presented

    Omega network hash construction

    Get PDF
    Cryptographic hash functions are very common and important cryptographic primitives. They are commonly used for data integrity checking and data authentication. Their architecture is based on the Merkle-Damgard construction, which takes in a variablelength input and produces a fixed-length hash value. The basic Merkle-Damgard construction runs over the input sequentially, which can lead to problems when the input size is large since the computation time increases linearly. Therefore, an alternative architecture which can reduce the computation time is needed, especially in today's world where multi-core processors and multithreaded programming are common. An Omega Network Hash Construction that can run parallel on multi-core machine has been proposed as alternative hash function's construction. The Omega Network Hash Construction performs better than the Merkle-Damgard construction, and its permutation architecture shows that its security level in term of producing randomness digest value is better than Merkle-Damgard construction

    A robust security framework with bit-flipping attack and timing attack for key derivation functions

    Get PDF
    A Key Derivation Function (KDF) derives cryptographic keys from private string and public information. The security property for the cryptographic keys is indistinguishable from the random strings of equal length. The security analysis of KDFs has received increasing attention. The practice important of KDFs are reflected in the adoption of industry standards such as NIST800-135 and PKCS5. This paper proposes a robust security framework which takes into consideration the side channel attacks. The robust security framework consists of the proposed security model and existing security models. The proposed security model is known as Adaptive Chosen All Inputs Model (CAM) which analyses the security of KDFs in terms of the bit-flipping attack and timing attack. The existing security model is the Adaptive Chosen Public Inputs Model (CPM). This research shows the implication relationship and non-implication relationship between CAM and CPM. The simulation of security models is according to the indistinguishable game played between a challenger and an adversary. These security models are used to evaluate existing KDFs. The result shows that none of the existing KDFs are secure in CAM for both the bit-flipping attack and timing attack. Hence, this research introduces an alternative KDF that is proven secure in CAM

    Smart indoor home surveillance monitoring system using raspberry pi

    Get PDF
    Internet of Things (IoTs) are internet computing devices which are connected to everyday objects that can receive and transmit data intelligently. IoTs allow human to interact and control everyday objects wirelessly to provide more convenience in their lifestyle. The Raspberry Pi is a small, lightweight and cheap single board computer that can fit on human’s palm. Security plays a big role in a home. People concern about security by preventing any intruders to enter their home. This is to prevent loss of privacy and assets. The closed-circuit television (CCTV) is one of the device used to monitor the secured area for any intruders. The use of traditional CCTV to monitor the secured area have three limitations, which are requiring a huge volume of storage to store all the videos regardless there are intruders or not, does not notify the users immediately when there are motions detected, and users must always check the CCTV recorded videos regularly to identity any intruders. Therefore, a smart surveillance monitoring system is proposed to solve this problem by detecting intruders and capturing image of the intruder. Notifications will also be sent to the user immediately when motions are detected. This smart surveillance monitoring system only store the images of the intruders that triggered the motion sensor, making this system uses significantly less storage space. The proposed Raspberry Pi is connected with a passive infrared (PIR) motion sensor, a webcam and internet connection, the whole device can be configured to carry out the surveillance tasks. The objectives of this project are to design, implement and test the surveillance system using the Raspberry Pi. This proposed surveillance system provides the user with live stream of video feed for the user. Whenever a motion is detected by the PIR motion sensor, the web camera may capture an image of the intruder and alert the users (owners) through Short Message Service (SMS) and email notifications. The methodology used to develop this system is by using the object-oriented analysis and design (OOAD) model

    Blockchain-based electronic voting protocol

    Get PDF
    Current electronic voting protocol require a centralized system to control the whole procedure from ballot inputs to result outputs and election monitoring. Meanwhile, blockchain technology provide a decentralized system which open across the whole network of untrusted participants. Applying blockchain technology into electronic voting protocol through a proper architecture can instil characteristic such as data confidentiality, data integrity and data authenticity. In this paper, we going to discuss a proposed method on how to leverage the advantages from blockchain into electronic voting protocol. This blockchain-based electronic voting protocol promise to provide a secure electronic election process given the proposed system works. We implement a protocol using blockchain to turn election protocol into an automated control system without relying any single point of entity. Lastly, we discuss the characteristics of our proposed blockchain-based electronic voting protocol in this paper. However, there are also emerging challenges and limitations awaiting to overcome. This paper gives a comprehensive overview of our proposed protocol

    Staff attendance system using RFID

    Get PDF
    Attendance system University Tun Hussien Onn Malaysia is the system to record, and monitor the staff attendance to the daily work. This project is to design develop and implement attendance system using radio frequency identification technology. This technology is divided into two types which are system passive and system active. The proposed system used the system passive to record staff attendance. Frequency identification technology will read the staffs tag and the attendance are recorded automatically and store it in database. The proposed system has several securities feature that can prevent security breaches which is captcha and audit trail. The advantage of proposed system is can differentiate between the human input and robot input and record all the user activity when access to the system

    Minimizing information asymmetry interference using optimal channel assignment strategy in wireless mesh networks

    Get PDF
    Multi-radio multi-channel wireless mesh networks (MRMC-WMNs) in recent years are considered as the prioritized choice for users due to its low cost and reliability. MRMCWMNs is recently been deployed widely across the world but still these kinds of networks face interference problems among WMN links. One of the well-known interference issue is information asymmetry (IA). In case of information asymmetry interference the source mesh nodes of different mesh links cannot sense each other before transmitting data on the same frequency channel. This non-coordination leads to data collision and packet loss of data flow and hence degrades the network capacity. To maximize the MRMC-WMN capacity and minimize IA interference, various schemes for optimal channel assignment have been proposed already. In this research a novel and near-optimal channel assignment model called Information Asymmetry Minimization (IAM) model is proposed based on integer linear programming. The proposed IAM model optimally assigns orthogonal or non-overlapping channels from IEEE 802.11b technology to various MRMC-WMN links. Through extensive simulations we show that our proposed model gives 28.31% network aggregate network capacity improvement over the existing channel assignment model

    Review on Leakage Resilient Key Exchange Security Model

    Get PDF
    In leakage resilient cryptography, leakage resilient key exchange protocols are constructed to defend against leakage attacks. Then, the key exchange protocol is proved with leakage resilient security model to determine whether its security proof can provide the security properties it claimed or to find out any unexamined flaw during protocol building. It is an interesting work to review the meaningful security properties provided by these security models. This work review how a leakage resilient security model for a key exchange protocol has been evolved over years according to the increasing security requirement which covers a different range of attacks. The relationship on how an adversary capability in the leakage resilient security model can be related to real-world attack scenarios is studied. The analysis work for each leakage resilient security model here enables a better knowledge on how an adversary query addresses different leakage attacks setting, thereby understand the motive of design for a cryptographic primitive in the security model

    Delivery Route Management based on Dijkstra Algorithm

    Get PDF
    بالنسبة للشركات التي تقدم خدمات التوصيل، فإن كفاءة عملية التسليم من حيث الالتزام بالمواعيد مهمة للغاية. بالإضافة إلى زيادة ثقة العملاء ، فإن الإدارة الفعالة للمسار والاختيار مطلوبة لتقليل تكاليف وقود السيارة وتسريع التسليم. لا تزال بعض الشركات الصغيرة والمتوسطة تستخدم الأساليب التقليدية لإدارة طرق التسليم. لا تستخدم قرارات إدارة جداول التسليم والمسارات أي طرق محددة لتسريع عملية تسوية التسليم. هذه العملية غير فعالة وتستغرق وقتًا طويلاً وتزيد التكاليف وتكون عرضة للأخطاء. لذلك ، تم استخدام خوارزمية Dijkstra لتحسين عملية إدارة التسليم. تم تطوير نظام إدارة التسليم لمساعدة المديرين والسائقين على جدولة طرق فعالة لتسليم طلبات المنتجات إلى المستلمين. بناءً على الاختبار ، عملت خوارزمية Dijkstra التي تم تضمينها في أقرب وظيفة بحث عن المسار لعملية التسليم بشكل جيد. من المتوقع أن يؤدي هذا النظام إلى تحسين الإدارة الفعالة وتسليم الطلبات.For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers schedule efficient ways to deliver product orders to recipients. Based on testing, the Dijkstra algorithm that has been included in the nearest route search function for the delivery process has worked well. This system is expected to improve the efficient management and delivery of orders

    Parallel Omega Network Hash Construction

    Get PDF
    Cryptography hash function is important to ensure data integrity when the data is transmitting in the insecure connections. Merkle-Damgård construction is the well-known architecture for most hash function algorithm. This construction will take arbitrary length of input and generate a fixed length of output which best known as hash value. The process of producing the hash value is executing sequentially. The implication of this is the computation time will increase linearly when the size of input increase. Therefore, an alternative architecture that can reduce the computation time when input size is increase is needed especially in the today world where multi-core processors and multithreading programming are common. Hence, in this research an alternative Parallel Omega Network Hash Construction that can execute in multi-core machine is propose
    corecore