12 research outputs found

    Identity-based threshold group signature scheme based on multiple hard number theoretic problems

    Get PDF
    We introduce in this paper a new identity-based threshold signature (IBTHS) technique, which is based on a pair of intractable problems, residuosity and discrete logarithm. This technique relies on two difficult problems and offers an improved level of security relative to an individual hard problem. The majority of the denoted IBTHS techniques are established on an individual difficult problem. Despite the fact that these methods are secure, however, a prospective solution of this sole problem by an adversary will enable him/her to recover the entire private data together with secret keys and configuration values of the associated scheme. Our technique is immune to the four most familiar attack types in relation to the signature schemes. Enhanced performance of our proposed technique is verified in terms of minimum cost of computations required by both of the signing algorithm and the verifying algorithm in addition to immunity to attacks

    A new RSA public key encryption scheme with chaotic maps

    Get PDF
    Public key cryptography has received great attention in the field of information exchange through insecure channels. In this paper, we combine the Dependent-RSA (DRSA) and chaotic maps (CM) to get a new secure cryptosystem, which depends on both integer factorization and chaotic maps discrete logarithm (CMDL). Using this new system, the scammer has to go through two levels of reverse engineering, concurrently, so as to perform the recovery of original text from the cipher-text has been received. Thus, this new system is supposed to be more sophisticated and more secure than other systems. We prove that our new cryptosystem does not increase the overhead in performing the encryption process or the decryption process considering that it requires minimum operations in both. We show that this new cryptosystem is more efficient in terms of performance compared with other encryption systems, which makes it more suitable for nodes with limited computational ability

    Probable Accumulation of Heavy Metals in Some Long-Term Irrigated Soils with Zarga River Water in Jordan

    Get PDF
    Heavy metals are bio-accumulated and bio-transferred both by natural and anthropogenic sources. The contamination by heavy metals in plants and water is one of the major issues to be faced throughout the world and requires attention because heavy metals above their normal ranges are extremely threatened to both plant and animal life. It was therefore of interest to conduct study to estimate levels of heavy metals in water and soil at Zarga River. Soil and water samples were also analyzed for physico-chemical parameters such as pH, and electrical conductivity. The aims of this study were to determine level of some heavy metals in water of Zarga River and to examine the probable accumulation of heavy metals in soils irrigated with Zarga river water in contrast with adjacent soils in the area. Results showed that the pH, EC, and water electrolytes (Ca, Mg, Na, K, Cl, HCO3, SO4) of water samples at the middle of the river (B) were higher than that at the beginning or at the end of the river . On the other hand, it was shown that the pH, EC, Cd, Pb, and Ni values of soil samples near the river (location A) were higher than other samples that were away including (B location) and (C location). Keywords: Soil, Heavy metals, Water, pH, Electrical conductivit

    Mobile Messaging Services-Based Personal Electrocardiogram Monitoring System

    Get PDF
    A mobile monitoring system utilizing Bluetooth and mobile messaging services (MMS/SMSs) with low-cost hardware equipment is proposed. A proof of concept prototype has been developed and implemented to enable transmission of an Electrocardiogram (ECG) signal and body temperature of a patient, which can be expanded to include other vital signs. Communication between a mobile smart-phone and the ECG and temperature acquisition apparatus is implemented using the popular personal area network standard specification Bluetooth. When utilizing MMS for transmission, the mobile phone plots the received ECG signal and displays the temperature using special application software running on the client mobile phone itself, where the plot can be captured and saved as an image before transmission. Alternatively, SMS can be selected as a transmission means, where in this scenario, dedicated application software is required at the receiving device. The experimental setup can be operated for monitoring from anywhere in the globe covered by a cellular network that offers data services

    Methods for Multi-User Broadband Wireless Channel Estimation

    No full text
    A system and method of channel estimation for a multi-user broadband wireless channel estimation in multiple antenna receiver systems use a specifically selected delay in the pilot symbol sequence portion of the transmission which is a multiple of the minimum Cyclic Prefix delay length. This insures that the time-frequency slot information bursts will always be separated in the time domain. A matched filter output in the receiver is formed by multiplying each pilot symbol by the conjugate of the training symbols of the first user. Estimation of the channel response may include three different versions of the efficient estimation calculations, namely Constrained Inverse Deconvolution, Iterative Low Complexity, and Extrapolated Matched Filter estimations. The first two methods do not require matrix multiplication (using only Fourier transforms), while the third method utilizes a smaller matrix multiplication than previously taught. Hardware considerations are also reduced due to the lack of a need for extensive matrix by matrix calculations.Sponsorship: Illinois Institute of TechnologyUnited States Paten

    Relevance Vector Machines for Enhanced BER Probability in DMT-Based Systems

    Get PDF
    A new channel estimation method for discrete multitone (DMT) communication system based on sparse Bayesian learning relevance vector machine (RVM) method is presented. The Bayesian frame work is used to obtain sparse solutions for regression tasks with linear models. By exploiting a probabilistic Bayesian learning framework, sparse Bayesian learning provides accurate models for estimation and consequently equalization. We consider frequency domain equalization (FEQ) using the proposed channel estimate at both the transmitter (preequalization) and receiver (postequalization) and compare the resulting bit error rate (BER) performance curves for both approaches and various channel estimation techniques. Simulation results show that the proposed RVM-based method is superior to the traditional least squares technique

    Path loss and propagation models at 3.5 GHz using deployed WiMAX network

    No full text
    WiMAX carries the promise of ubiquitous broadband wireless access enabling real-time and multimedia applications. WiMAX networks are being deployed worldwide to bridge the digital divide and to help countries with no previous infrastructure provide broadband access to users. This paper studies path loss and propagation models using deployed WiMAX network operating at a frequency of 3.5 GHz. The study is conducted in Amman, Jordan, which provides a unique and different construction material. Over 500 measurements are collected of received signal power using 3 base stations. The collected measurements are then compared to different propagation models including: SUI, ECC-33, and COST-231.Conference PresentationConference PaperPublishe

    Authenticated Encryption Scheme Based on ECDLP and DLP

    No full text
    This paper presents a new authenticated encryption scheme (AES) based on elliptic curve discrete logarithm problem (ECDLP) and discrete logarithm problem (DLP). Assume that we have one signer, and a set of U = (u1,u2,...,ul), which represents the verifiers group of L members. A single signer can encrypt and sign the message only if k (1 ≤ k ≤ l) or more verifiers agree to recover the message m on behalf of the whole verifier group U. In addition, we need a system authority with the task of generating the parameter, while a trusted clerk selected by the signer is needed to verify the signature’s validity. This scheme aims to overcome the modular exponentiation problem utilizing elliptic curve cryptography (ECC). To attain the desired benefit of enhanced performance and improved security, the presented technique is established based on the elliptic curve cryptosystem and discrete logarithm problems. Moreover, it resists strong attacks and operates efficiently. Compared to similar functional techniques, it requires a lower number of exponential and module operations

    Efficient Pilot Decontamination Schemes in 5G Massive MIMO Systems

    No full text
    Massive Multiple-input Multiple-output (MIMO) is an emerging technology for the 5G wireless communication systems which has the potential to provide high spectral efficient and improved link reliability and accommodate large number of users. Aiming at the problem of pilot contamination in massive MIMO systems, this paper proposes two algorithms to mitigate it. The first algorithm is depending on the idea of Path Loss to perform User Grouping (PLUG) which divide the users into the center and edge user groups depending on different levels of pilot contamination. It assigns the same pilot sequences to the center users which slightly suffer from pilot contamination and assign orthogonal pilot sequences to the edge users which severely suffer from pilot contamination. It is assumed that the number of users at the edge of each cell is the same. Therefore, to overcome such limitations of PLUG algorithm, we propose an improved PLUG (IPLUG) algorithm which provides the decision parameters for user grouping and selects the number of central and edge users in each cell in a dynamic manner. Thus, the algorithm prevents the wrong division of users in good channel conditions being considered as an edge user which causes large pilot overhead, and also identifies the users with worst channel conditions and prevents the wrong division of such users from the center user group. The second algorithm for pilot decontamination utilizes the idea of pseudo-random codes in which orthogonal pilot are assigned to different cells. Such codes are deployed to get a transmission pilot by scrambling the user pilot in the cell. Since the pilot contamination is generated because different cells multiplex the same set of orthogonal pilots and the pseudo-random sequences have good cross-correlation characteristics, this paper uses this feature to improve the orthogonality of pilots between different cells. Simulation results show that the proposed algorithms can effectively improve channel estimation performance and achievable rate as compared with other schemes

    A Bachelor Degree Program in IoT Engineering: Accreditation Constraints and Market Demand

    No full text
    In the era of the fourth industrial revolution, technology is advancing at a pace much faster than what individuals, societies and nations can cope with. Internet of Things (IoT) is one such technology that is sweeping the economic, business and service landscapes with its disruption mechanisms that influence areas such as smart homes, hospitals, cities, as well as transportation and energy utilization with many exciting and novel applications. Additionally, the job market is evolving at a rate that makes it difficult for universities to sustain a stable programme structure, especially in engineering and information and communication technology disciplines as well as specializations and domains associated with technology. While several universities worldwide have established IoT degree programs at bachelor and master levels, institutions in developing countries are still contemplating the idea of pioneering such venture due to a number of reasons related to technology vacillation as well as market and social acceptance.  Princess Sumaya University for Technology has therefore designed a bachelor degree programme on IoT Engineering in order to bridge the gap in the Jordanian ICT market and to meet demands for specialized engineers in this rapidly evolving area. The university adapted an optimization design process of the program including a cycle of consultation with stakeholders, followed by a formal procedure of rectification and accreditation. The proposed program was successfully a launched at the beginning of the academic year 2021/2022 with an intake cohort of 50 students
    corecore