12 research outputs found

    Performance Analysis of SAP-NFC Protocol

    Get PDF
    The operations cost of authentication session is considered as strict indicator to evaluate the authentication protocols side by side with the security requirements achievements in the Near Field Communication (NFC) technology. The secure authentication protocol for the NFC mobile payment systems (SAP-NFC) one of the recent authentication protocols that have proposed to achieve high level of security features such as the fully mutual authentication, anonymity and untraceability. Moreover, the SAP-NFC protocol can prevent the current security attacks. This paper, analyzes the performance of the SAP-NFC protocol comparing with the other recent NFC mobile payment protocols in the NFC devices that are included in the system. The performance analysis has illustrated that the SAP-NFC protocol not only supports strong security features, but also offers low cost in term of amount of computations

    A new splitting-based displacement prediction approach for location-based services

    Get PDF
    In location-based services (LBSs), the service is provided based on the users' locations through location determination and mobility realization. Several location prediction models have been proposed to enhance and increase the relevance of the information retrieved by users of mobile information systems, but none of them studied the relationship between accuracy rate of prediction and the performance of the model in terms of consuming resources and constraints of mobile devices. Most of the current location prediction research is focused on generalized location models, where the geographic extent is divided into regular-shape cells. These models are not suitable for certain LBSs where the objectives are to compute and present on-road services. One such technique is the Prediction Location Model (PLM), which deals with inner cell structure. The PLM technique suffers from memory usage and poor accuracy. The main goal of this paper is to propose a new path prediction technique for Location-Based Services. The new approach is competitive and more efficient compared to PLM regarding measurements such as accuracy rate of location prediction and memory usage

    Location prediction based on a sector snapshot for location-based services

    Get PDF
    In location-based services (LBSs), the service is provided based on the users' locations through location determination and mobility realization. Most of the current location prediction research is focused on generalized location models, where the geographic extent is divided into regular-shaped cells. These models are not suitable for certain LBSs where the objectives are to compute and present on-road services. Such techniques are the new Markov-based mobility prediction (NMMP) and prediction location model (PLM) that deal with inner cell structure and different levels of prediction, respectively. The NMMP and PLM techniques suffer from complex computation, accuracy rate regression, and insufficient accuracy. In this paper, a novel cell splitting algorithm is proposed. Also, a new prediction technique is introduced. The cell splitting is universal so it can be applied to all types of cells. Meanwhile, this algorithm is implemented to the Micro cell in parallel with the new prediction technique. The prediction technique, compared with two classic prediction techniques and the experimental results, show the effectiveness and robustness of the new splitting algorithm and prediction technique

    Security performance analysis and enhancement of wireless authentication protocol based on digital signature scheme

    No full text
    One of the most challenging problems introduced by mobile networking is security. Therefore, a secure and efficient authentication mechanism is especially needed for mobile communication systems. The authentication protocol incurs overheads on the transmission process. These overheads affect the mobile network performance such as delay and bandwidth.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Capturing low-rate DDoS attack based on MQTT protocol in software Defined-IoT environment

    No full text
    The MQTT (Message Queue Telemetry Transport) protocol has recently been standardized to provide a lightweight open messaging service over low-bandwidth and resource-constrained communication environments. Hence, it is the primary messaging protocol used by Internet of Things (IoT) devices to disseminate telemetry data in a machine-to-machine approach. Despite its advantages in providing reliable, scalable, and timely delivery, the MQTT protocol is widely vulnerable to flooding and denial of service attacks, specifically, the low-rate distributed denial of services (LR-DDoS). Unlike conventional DDoS, the LR-DDoS attack tends to appear as normal traffic at a very slow rate, which makes it difficult to differentiate from legitimate packets, allowing the packets to move undetected by traditional detection policies. This paper presents an intelligent lightweight detection scheme that can capture LR-DDoS attacks based on MQTT protocol in a software-defined IoT environment. The proposed scheme examines the performance of four machine learning models on a modern dataset (LRDDoS-MQTT-2022) with a minimum feature set (i.e., two features only) and a balanced dataset, namely: decision tree classifier (DTC), multilayer perceptron (MLP), artificial neural networks (ANN), and naïve Bayes classifier (NBC). Our exploratory assessment demonstrates the arrogance of the DTC detection scheme achieving an accuracy of 99.5% with peak detection speed. Eventually, our best outcomes outdo existing models with higher prediction rates

    An efficient RSA public key encryption scheme

    No full text
    In this paper, we propose an efficient RSA public key encryption scheme, which is an improved version of original RSA scheme. The proposed RSA encryption scheme is based on linear group over the ring of integer mod a composite modulus n which is the product of two distinct prime numbers. In the proposed scheme the original message and the encrypted message are h x h square matrices with entities in z(n) indicated via l(h,z(n)). Since the original RSA Scheme is a block cipher in which the original message and cipher message are integer in the interval [0,n-1] for solve integer modulus n. Therefore, in this paper, we generalize RSA encryption scheme in order to be implemented in the general linear group on the ring of integer mod n. Furthermore, the suggested encryption scheme has no restriction in encryption and decryption order and is claimed to be efficient, scalable and dynamic

    A new splitting-based displacement prediction approach for location-based services. In:

    No full text
    . A new splitting-based displacement prediction approach for location-based services. In: IEEE international conference on systems, man, and cybernetics 2011. IEEE Xplore, 392-397. Abstract-In location-based services (LBSs), the service is provided based on the users' locations through location determination and mobility realization. Several location prediction models have been proposed to enhance and increase the relevance of the information retrieved by users of mobile information systems, but none of them studied the relationship between accuracy rate of prediction and the performance of the model in terms of consuming resources and constraints of mobile devices. Most of the current location prediction research is focused on generalized location models, where the geographic extent is divided into regular-shape cells. These models are not suitable for certain LBSs where the objectives are to compute and present on-road services. One such technique is the Prediction Location Model (PLM), which deals with inner cell structure. The PLM technique suffers from memory usage and poor accuracy. The main goal of this paper is to propose a new path prediction technique for Location-Based Services. The new approach is competitive and more efficient compared to PLM regarding measurements such as accuracy rate of location prediction and memory usage. Copyright and re-use polic
    corecore