80 research outputs found

    A Light-Weight Group Signature Scheme for Wireless Networks Based-on BBS Short Group Signature

    Get PDF
    In the natural context of wireless network environment, the communications between wireless nodes are more easily observed for the goal of the network traffic analysis. Thus, to enable a secure and anonymous communication system from thwarting of such analysis attacks would be strongly desirable. In this paper, we propose a secure and anonymous communication system using pairing-based group signatures. The achievement of secure and anonymous communication is performed by allowing all valid member wireless nodes of a particular privilege group to authenticate each other without revealing their own identitie

    An Implementation of Digital Signature and Key Agreement on IEEE802.15.4 WSN Embedded Device

    Get PDF
    A wireless sensor network (WSN) now becomes popular in context awareness development to distribute critical information and provide knowledge services to everyone at anytime and anywhere. However, the data transfer in a WSN potentially encounters many threats and attacks. Hence, particular security schemes are required to prevent them. A WSN usually uses low power, low performance, and limited resources devices. One of the most promising alternatives to public key cryptosystems is Elliptic Curve Cryptography (ECC), due to it pledges smaller keys size. This implies the low cost consumption to calculate arithmetic operations in cryptographic schemes and protocols. Therefore, ECC would be strongly required to be implemented in WSN embedded devices with limited resources (i.e., processor speed, memory, and storage). In this paper, we present an implementation of security system on IEEE802.15.4 WSN device with the employment of Elliptic Curve Digital Signature Algorithm (ECDSA) and Elliptic Curve Diffie-Hellman (ECDH) key exchange protocol. Our experimental results on Intel Mote2 showed that the total time for signature generation is 110 ms, signature verification is 134 ms, and ECDH shared key generation is 69 ms on the setting of 160-bit security level

    SDN-Based Network Intrusion Detection as DDoS defense system for Virtualization Environment

    Get PDF
    Nowadays, DDoS attacks are often aimed at cloud computing environments, as more people use virtualization servers. With so many Nodes and distributed services, it will be challenging to rely solely on conventional networks to control and monitor intrusions. We design and deploy DDoS attack defense systems in virtualization environments based on Software-defined Networking (SDN) by combining signature-based Network Intrusion Detection Systems (NIDS) and sampled flow (sFlow). These techniques are practically tested and evaluated on the Proxmox production Virtualization Environment testbed, adding High Availability capabilities to the Controller. The evaluation results show that it promptly detects several types of DDoS attacks and mitigates their negative impact on network performance. Moreover, it also shows good results on Quality of Service (QoS) parameters such as average packet loss about 0 %, average latency about 0.8 ms, and average bitrate about 860 Mbit/s

    Secure Real-time Data Transmission for Drone Delivery Services using Forward Prediction Scheduling SCTP

    Get PDF
    Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time.  However, because the data transmission process occurs in a wireless network, data will be sent over a channel that is more unstable and vulnerable to attack. Thus, this research, purposes a  Forward Prediction Scheduling-based Stream Control Transmission Protocol (FPS-SCTP) scheme that is implemented on drone data transmission system. This scheme supports piggybacking, multi-streaming, and Late Messages Filter (LMF) which will improve the real-time transmission process in IEEE 802.11 wireless network. Meanwhile, on the cybersecurity aspect, this scheme provides the embedded option feature to enable the encryption mechanism using AES and the digital signatures mechanism using ECDSA. The results show that the FPS-SCTP scheme has better network performance than the default SCTP, and provides full security services with low computation time. This research contributes to providing a communication protocol scheme that is suitable for use on the internet of drones’ environment, both in real-time and reliable security levels

    Secure e-Health Record System Using Identity-based Encryption with Embedded Key

    Get PDF
    The existence of electronic health record in the Internet world can result in the emergence of potentially unauthorized users to access and abuse the data. Therefore, it is necessary to have a high level of security that can maintain the confidentiality of electronic health record data. In cryptography, the longer the key then, the higher the level of security achieved. However, this can lead to slow computing time. Therefore, we propose a security method with an identity-based encryption scheme that is built hybrid using elliptic curve cryptography (ECC) and elliptic curve integrated encryption system (ECIES) algorithms or can be abbreviated as IBE-ECC-ECIES. An additional feature of the proposed method is the creation of key pairs generated by the ECC algorithm and there is an identity that has been embedded in the key pair in order to increase the level of security and uniqueness of the key. This method has been compared based on analysis of performance, computation time and the level of security in the same environment. This method is another IBE hybrid scheme called IBE-ECC-AES. The results of the test showed that the proposed method was superior to 0.3 seconds compared to the comparison method in the key pair generation process. In addition, security in the proposed method can overcome sniffing and chosen-plaintext attacks

    Automatic Cluster-oriented Seismicity Prediction Analysis of Earthquake Data Distribution in Indonesia

    Get PDF
    Many researchers have analyzed the earthquakes to predict the earthquake period occurrences. However, they commonly faced the difficulty to project the prediction into the region adjusted to the earthquake data distribution and to provide an interpretation of the prediction for the region. This paper presents a new system for cluster-oriented seismicity prediction analysis, and semantic interpretation of the prediction result projected to the region. The system applies our automatic clustering algorithm to detect some clusters automatically depending on the earthquake data distribution and create clusters of the earthquake data for the prediction. The semantic interpretation is presented in the system to provide easier information from the seismicity prediction analysis. The system consists of four main computational functions: (1) Data acquisition and pre-processing, (2) Automatic clustering of earthquake data distribution, (3) Seismicity prediction of earthquake time period occurrence based on cluster with confidence levels of seismic event using the Guttenberg-Richter law, and (4) Region-based seismicity prediction analysis and semantic interpretation of the prediction for each cluster. For experiments, we use earthquake data series provided by the Advanced National Seismic System (ANSS) in the year 1963-2015 with the location of Indonesia. We made a series of experiments for earthquakes in Nias (2005), Yogyakarta (2006), and Padang (2009), with respectively 6.3, 7.6 and 8.7 Richter magnitude level. Our system presented the seismicity prediction analysis from each earthquake cluster and provided an easy interpretation of the prediction probability

    Modified Iterated Extended Kalman Filter for Mobile Cooperative Tracking System

    Get PDF
    Tracking a mobile node using wireless sensor network (WSN) under cooperative system among anchor node and mobile node, has been discussed in this work, interested to the indoor positioning applications. Developing an indoor location tracking system based on received signal strength indicator (RSSI) of WSN is considered cost effective and the simplest method. The suitable technique for estimating position out of RSSI measurements is the extended Kalman filter (EKF) which is especially used for non linear data as RSSI. In order to reduce the estimated errors from EKF algorithm, this work adopted forward data processing of the EKF algorithm to improve the accuracy of the filtering output, its called iterated extended Kalman filter (IEKF). However, using IEKF algorithm should know the stopping criterion value that is influenced to the maximum number iterations of this system. The number of iterations performed will be affected to the computation time although it can improve the estimation position. In this paper, we propose modified IEKF for mobile cooperative tracking system within only 4 iterations number. The ilustrated results using RSSI measurements and simulation in MATLAB show that our propose method have capability to reduce error estimation percentage up to 19.3% , with MSE (mean square error) 0.88 m compared with conventional IEKF algorithm with MSE 1.09 m. The time computation perfomance of our propose method achived in 3.55 seconds which is better than adding more iteration process.     

    Secure Ubiquitous Sensor Network based on Elliptic Curve MenezesQu Vanstoneas Status Data Supply of EnvironmentinDisaster Management

    Get PDF
    oai::article/1Along with the many environmental changes, it enables a disaster either natural or man-made objects. One of the efforts made to prevent disasters from happening is to make a system that is able to provide information about the status of the environment that is around. Many developments in the sensor system makes it possible to load a system that will supply real-time on the status of environmental conditions with a good security system. This study created a supply system status data of environmental conditions, especially on bridges by using Ubiquitous Sensor Network. Sensor used to detect vibrations are using an accelerometer. Supply of data between sensors and servers using ZigBee communication protocol wherein the data communication will be done using the Elliptic Curve Integrated security mechanisms Encryption Scheme and on the use of Elliptic Curve key aggrement Menezes-Qu-Vanstone. Test results show the limitation of distance for communication is as far as 55 meters, with the computation time for encryption and decryption with 97 and 42 seconds extra time for key exchange is done at the beginning of communication .Keywords: Ubiquitous Sensor Network, Accelerometer, ZigBee,Elliptic Curve Menezes-Qu-Vanston

    Indonesian Automatic Speech Recognition For Command Speech Controller Multimedia Player

    Get PDF
    The purpose of multimedia devices development is controlling through voice. Nowdays voice that can be recognized only in English. To overcome the issue, then recognition using Indonesian language model and accousticc model and dictionary. Automatic Speech Recognizier is build using engine CMU Sphinx with modified english language to Indonesian Language database and XBMC used as the multimedia player. The experiment is using 10 volunteers testing items based on 7 commands. The volunteers is classifiedd by the genders, 5 Male & 5 female. 10 samples is taken in each command, continue with each volunteer perform 10 testing command. Each volunteer also have to try all 7 command that already provided. Based on percentage clarification table, the word “Kanan†had the most recognize with percentage 83% while “pilih†is the lowest one. The word which had the most wrong clarification is “kembali†with percentagee 67%, while the word “kanan†is the lowest one. From the result of Recognition Rate by male there are several command such as “Kembaliâ€, “Utamaâ€, “Atas “ and “Bawah†has the low Recognition Rate. Especially for “kembali†cannot be recognized as the command in the female voices but in male voice that command has 4% of RR this is because the command doesn’t have similar word in english near to “kembali†so the system unrecognize the command. Also for the command “Pilih†using the female voice has 80% of RR but for the male voice has only 4% of RR. This problem is mostly because of the different voice characteristic between adult male and female which male has lower voice frequencies (from 85 to 180 Hz) than woman (165 to 255 Hz).The result of the experiment showed that each man had different number of recognition rate caused by the difference tone, pronunciation, and speed of speech. For further work needs to be done in order to improving the accouracy of the Indonesian Automatic Speech Recognition system.Keywords: Automatic Speech Recognizer, Indonesian Acoustic Model, CMU Sphinx, indonesian Language Model, Recognition Rate, XBMC
    corecore