About
63
Publications
44,112
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,089
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (63)
Key Derivation is an important part of numerous security standards, the importance of using it was discussed throughout the literature and industry standards. On the other hand, web service security is an area that has not seen substantial research and application for Key Derivation techniques. After studying the Key Derivation techniques which are...
Virtualization is an emerging technology which provides organizations with a wide range of benefits. But unluckily, from a security standpoint, functionality often takes precedence over a main area like security, leaving security to be retrofitted in later. This paper mainly emphasizes on several security threats that exists today in a virtualizati...
Mobile communication is expected to boost once again when IPv6 has finally replaced IPv4 as the next Internet addressing protocol. The reason for that is the enhanced capabilities and built-in mobility support provided by IPv6 thorough its dedicated protocol - namely Mobile IPv6 (MIPv6). One of the major improvements for MIPv6 promises is what is r...
Supervisory control and data acquisition (SCADA) are applications that collect
data from a system in order to automate the monitoring and controlling of its activities.
Several industrial fields such as, electric utilities, water supplies and buildings’ facilities have
already adopted SCADA systems to increase the efficiency and reduce cost. Howeve...
This paper adopts the Distributed Lightweight Kerberos (DLK) protocol, which is a result of enhancing the well-known Kerberos protocol. One of the advantages of the DLK protocol is that it addresses mutual authentication and confidentiality challenges while reducing the required number of messages to securely communicate with multiple service provi...
Electronic health is vital for enabling improved access to health records, and boosting the quality of the health services provided. In this paper, a framework for an electronic health record system is to be developed for connecting a nation's health care facilities together in a network using cloud computing technology. Cloud computing ensures eas...
Employing public key-based security architecture is inevitable for the advanced security applications in the mobile networks.
However, key storage management problems have arisen, because the public key computation is still the large overhead to USIM,
and the mobile equipment has potential threats of the key leakage or loss. In order to solve such...
Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are the combined technologies that will spread in the near future to enter all of our everyday activities. However, the security of these technologies is very much vulnerable. Adding some security measures to small computation powered devices that cannot handle the available se...
User authentication scheme is an important issue for providing secure roaming service to users of mobile devices. In 2008, Wu, Lee and Tsaur proposed an enhanced anonymous authentication for roaming environment. In this paper, we show weaknesses of Wu–Lee–Tsaur’s schemes such as failing to achieve anonymity and perfect forward secrecy, and disclosi...
Smart grid is a technological innovation that improves efficiency, reliability, economics, and sustainability of electricity services. It plays a very important role in modern energy infrastructure. The main challenges of smart grids, however, are how to manage different types of front-end intelligent devices such as power assets and smart meters e...
The internet world is continuous revolutions from the World Wide Web and the mobile Internet to the Internet of Things (IoT). IoT is the new world for connecting the object space in the real world with the virtual space in the computer world. Radio Frequency IDentification (RFID) and Wireless Sensors (WS) are technologies that can be used to create...
This paper presents a system that uses cloud computing to deliver a cost effective clinical care to patients. The central component of the proposal is an electronic health record system that acts as a patient centric model, enabling health care providers to access complete patient records from any location anytime. A hybrid cloud computing model is...
Tools that analyse critical business activities such as Business Process Monitoring (BPM) or Business Activity Monitoring (BAM) have been utilised in enterprise operations successfully over the past few years. However, with the increasing demand for more up-to-date information and analysis, real time process and event monitoring are becoming increa...
Key escrowing is one of the core technologies for the lawful interception (LI) of secure communications in the wired and wireless networks. Although many previous studies on the key escrowing have been done before, they are insufficient to be deployed in practical networks due to conflicts with the LI requirements. Moreover, there is lack of consid...
With the rapid growth of GPS-enable Smartphones, the interest on using Location Based Services (LBSs) has increased significantly. The evolution in the functionalities provided by those smartphones has enabled them to accurately pinpoint the location of a user. Because location information is what all LBSs depend on to process user's request, it sh...
The concept of Smart-Homes is becoming more and more popular. It is anticipated that Radio Frequency IDentification (RFID) technology will play a major role in such environments. We can find many previously proposed schemes that focus solely on: authentication between the RFID tags and readers, and user privacy protection from malicious readers. Th...
This paper focuses on an efficient technology for implementing a Mobile Agent System (MAS). The mobile agent is able to hold consumers’ requests, migrates between platforms and executes its code autonomously. The agent is required to return results to its owner, so he or she can make the right decisions. Kerberos protocol is one of the best known a...
The rapid development of technology has resulted in an increase in the need for computing assets and many organizations are
moving in the direction of outsourcing their storage and computing needs. This new trend of outsourcing resources and processes
has been called “Cloud Computing”. The challenge is to provide security for data stored in public...
Cryptographic properties of Boolean functions such as balancedness, high nonlinearity and high algebraic degree play an important role in the design of the symmetric key encryption schemes, especially the design of S-boxes for block ciphers and the design of robust pseudo-random generators for stream ciphers. In this paper, we focus on Boolean func...
Hiding a secret is needed in many situations. One might need to hide a password, an encryption key, a secret recipe, and etc. Information can be secured with encryption, but the need to secure the secret key used for such encryption is important too. Imagine you encrypt your important files with one secret key and if such a key is lost then all the...
Virtualization is an emerging technology which offers organizations with a range of benefits but still suffers from some potential security challenges. This review paper mainly emphasizes on several security challenges that virtualization technology may introduce to an IT environment. However, the main contribution of the paper lies in summarizing...
Security of several cryptosystems rests on different computational hard problems. Many popular cryptographic schemes are based on the intractability of number theoretic problems such as factoring and discrete logarithms. These hard problems are widely believed to be intractable for classical algorithms. However, these problems may turn to be polyno...
This paper presents a formal model for the analysis and verification of a multi-agent system based on the Distributed Lightweight Kerberos (DLK) protocol. Verifying the security protocol exposes security defects and aids in fixing them. The verification process of the DLK protocol uses the ProVerif tool. Based on this tool, the security mechanism o...
In the notion of traditional public key infrastructure (PKI), we need to deliver public keys in an authentic way. More precisely, digital certificate binds a public key with the identity of its owner. However, significant overhead is associated with managing digital certificates. For this reason, the new notion called “identity-based public key cry...
Authentication and privacy-preserving are two important security properties for a cryptographic protocol for RFID tags. However, providing privacy-preserving often increases the cost of looking up a tag in the database. In response to this issue, Ryu and Takagi proposed an RFID authentication protocol which provides a way to trade-off security and...
This paper presents the design and implementation of a prototype secure system to monitor patients in hospitals. The system also enables remote access to the patient database by the appropriate health professional. This system integrates various wireless technologies in a secure framework. The system enables the supervising health professional to s...
Enterprises are seeking toward the cloud horizon to expand their premises facilities. It provides several services in the market, such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). This paper will discuss challenges regarding three information security concerns: confidentiality, integrity and...
Lee et al. [4] proposed two new authenticated multiple key exchange protocols based on Elliptic Curve Cryptography (ECC) and bilinear pairings. In this paper, we show an impersonation attack on their pairing-based authenticated key exchange protocol. We demonstrate that any attacker can impersonate an entity to share multiple session keys with anot...
User authentication scheme with anonymity is one of important issues for wireless sensor network. In this paper, we improve Wu et al.'s scheme providing anonymity and overcome Zeng et al.'s attack. We demonstrate that our enhancement scheme not only provides the same performance as Wu et al.'s scheme, but also provides better security properties by...
One of greatest achievement in television technology is Internet Protocol Television (IPTV). It is an emerging technology that defines mechanisms to deliver digital television over IP network. The security is the most important issue that IPTV service and content providers concern about it. Without it, not only paying subscribers can access content...
Radio frequency identification (RFID) is a technology with a great potential in many industries and a wide spectrum of possible uses. However, it is very much vulnerable as it faces some major security challenges and threats. There currently exist several RFID technologies without proper security enhancement such as privacy and authentication. Thus...
Voice over Internet protocol is the ability of transmitting voice using the Internet protocol. This paper addresses an introduction to VoIP, threats of VoIP and studies previous works of secure VoIP. We also propose practical implementations for securing VoIP by using Java and Android. Finally we give security analysis of our implementation and ana...
The RFID technology is recently predicted to spread in most of our daily lives. However, it is very much vulnerable as it faces some major security challenges and threats. Thus, RFID technology also provides the solutions for the security threats concerned with security, privacy, and authentication. This paper not only addresses security privacy an...
For the lawful interception (LI) of the secure communications, ID-based cryptosystem has the property of key escrow that can be efficiently used for LI. However, it does not prevent the malicious use of the escrowed key by the LEA. Thus, we would like to propose a new key escrow model that enables the limited capability of lawful interception agenc...
The RFID technology is recently predicted to spread in most of our daily lives. However, it is very much vulnerable as it faces some major security challenges and threats. Thus, RFID technology also provides the solutions for the security threats concerned with security, privacy, and authentication. This paper not only addresses security privacy an...
Vehicle ad-hoc networks (VANETs) are a prominent form of mobile ad-hoc networks. This paper outlines the architecture of VANETs and discusses the security and privacy challenges that need to be overcome to make such networks practically viable. It compares the various security schemes that were suggested for VANETs. It then proposes an efficient im...
The design of a secure communication scheme for Radio Frequency IDentification (RFID) systems has been extensively studied in recent years in view of the awareness of individual privacy and the requirement of robust system security. Most of previous works assume the communication channel between an RFID reader and its backend server is secure and c...
Due to dynamic and infrastructure-less nature of Mobile Ad hoc Network (MANET) environment, there exist number of threats as mobile devices and nodes could freely move around in MANET such as eavesdropping of communications channels, modification of sensitive m-commerce transactions, Denial of Service(DoS), vulnerabilities of impersonation by malic...
This paper not only gives an overview of mobile TV technologies standards such as DMB, DVB-H, MediaFLO and ISDB-T but also introduces mobile TV history, business model, some technology challenges and future directions.
Emerging ubiquitous networks will enable interactions between various types of device, in both wired and wireless networks, and among Peer-to-Peer (P2P) overlay networks. Dynamic, heterogeneous and distributed P2P overlay networks will help to create new ubiquitous services, through the convergence of communication technologies and highly adaptive...
To offer location based services, service providers need to have access to Location Information (LI) regarding the users which they wish to serve; this is a potential privacy threat. We propose the use of constraints, i.e. statements limiting the use and distribution of LI, that are securely bound to the LI, as a means to reduce this threat. Constr...
This paper focuses on one of the future applications and services area of mobile communications. Mobile devices like mobile phones and PDAs would very soon allow us to interact with other smart devices around us, thus supporting a ubiquitous society. There would be many competitive service providers selling location-based services to users. To avai...
This paper assesses the possible use of constraints to control the dissemination and use of location information (LI) within a location based service architecture. The various types of constraint which may by required are also considered. Finally, issues and risks with the possible use of constraints are discussed, as are possible solutions to thes...
This paper assesses the possible use of constraints to control the dissemination and use of location information (LI) within a location based service architecture. The various types of constraint which may by required are also considered. Finally, issues and risks with the possible use of constraints are discussed, as are possible solutions to thes...
The main goal of this paper is to address applications of secure mobile delegation for future reconfigurable terminals. Additionally, a general overview will be given on distributed reconfigurable mobile terminals in a personal area network (PAN) context. The PAN may include a number of mobile devices, which need to exchange information with each o...
Since one of the services that delegation offers is a more optimised distribution paradigm, recontigurable terminals are envisaged to be able to show how security can negotiate and adapt itself in a flexible way, in favour of performance, without nevertheless compromising fundamental security requirements. So far we observe that protocols that enab...
At present, both symmetric and asymmetric cryptography have been proposed to provide secure software download. However, these approaches individually have some advantages and disadvantages. Asymmetric approaches are less efficient and more complex and require long key lengths to achieve the same level of security as the symmetric approach. On the o...
Cryptographic techniques, such as encipherment, digital signatures, key management and secret sharing schemes, are important building blocks in the implementation of all security services. In this thesis, we present a general model for online secret sharing schemes and investigate the design of online secret sharing schemes which are derived from t...
The purpose of this Comment is to show that the discrete logarithm based signature scheme proposed by Shao in [1] is subject to homomorphism attacks, despite a claim in [1] to the contrary. 1 Introduction ElGamal [2] and DSS [3] signature schemes are subject to homomorphism attacks. Briefly, the ElGamal signature scheme works as follows. Let p be a...
Chen's scheme (see ibid., vol.34, no.20, p.1934, 1998) is based on the discrete logarithms problem and is claimed to combine the same efficiency as Horster-Michels-Petersen and Lee-Chang with a simpler specification. In addition to a level of message authentication, Chen's scheme also provides message encryption, although this is only apparent from...
C. J. Mitchell and C. Y. Yeun [Comment-signature scheme with message recovery, Elect. Lett. 35, 217 (1999)] showed that K. Chen’s scheme [Signature with message recovery, Elect. Lett. 34, 1934 (1998)] is not a digital signature scheme with message recovery, whereas it should be called an authenticated encryption scheme. The author shows that there...
Contrary to Shao's claim for developing a signature scheme based
on a discrete logarithm without using a one-way hash function (see
ibid., vol.34, no.11, pp.1079-80, 1998), we have shown that Shao's
scheme is vulnerable to homomorphism attacks. The main justification for
the use of Shao's scheme is its resistance to homomorphism and
substitution at...
We consider a recently described attack on a key establishment protocol contained in a draft international standard. Based on an observation as to why the attack is possible, we propose a simple modification to the protocol which avoids the attack.
SIP message authentication and SRTP key agreement are the important issue in the SIP-based VoIP service. Several secure solutions such as HTTP Digest Authentication, SSL/TLS, and S/MIME, are used for the SIP message authentication and key agreement. When the VoIP is used in the wireless environments, the efficiency of security service is one of the...
The main goal of this paper is to address applications of secure mobile delegation for future reconfigurable terminals. Additionally, a general overview will be given on past and present distributed reconfigurable mobile terminals in a Personal Area Network (PAN) context. The PAN may include a number of mobile devices which need to exchange informa...
SIP message authentication and SRTP key agreement are the important issue in the SIP-based VoIP service. Several secure solutions such as HTTP Digest Authentication, SSL/TLS, and S/MIME, are used for the SIP message authentication and key agreement. When the VoIP is used in the wireless environments, the efficiency of security service is one of the...
Intrusion Detection System (IDS) originated as a mechanism for managing the detection of system misuse through the analysis of activity [5]. Despite that the various attacks are occurred by insiders and outsiders, most studied focused on IDS against outsider attacks. However, the loss from insider attacks is more severe than outsider attacks as sho...
The financial loss that suffered from malicious worm is known to be growing annually. In order to deal with this problem many researchers suggested the Network Intrusion Detection System (NIDS) which extracts file signature from the worms. Using the signature the NIDS checks whether received payload is worm or not. Malicious users introduced polymo...