Displaying all 2 publications

Abstract:
Sort:
  1. Nur Nabila Mohamed, Mohd Anuar Mat Isa, Yusnani Mohd Yussoff, Habibah Hashim
    MyJurnal
    Implementation of Trivial File Transfer Protocol (TFTP) in embedded system is significant because of the
    speed and simplicity. However, no security service in TFTP marks its major limitations. In this work, a
    pre-shared Diffie Hellman Key Exchange (DHKE) technique was proposed for mutual authentication to
    achieve the same secret key in TFTP communication protocol. We also integrated the system with feasible
    compression and encryption process to significantly improve the TFTP communication performance.
    The DHKE proof of concept is discussed briefly to show the feasibility of the pre-shared technique
    on the protocol. Also, the experiment was performed on constrained embedded devices to analyse the
    performance of compression/encryption scheme in TFTP. From the results obtained, the combined
    encryption and compression process is able to reduce the time by about 30% compared to the original
    file transmission time. Thus, the proposed work presents both advantages to reduce file size and provide
    security for the data. This is a preliminary work to provide a secure T
  2. Norhaflyza Marbukhari, Yusnani Mohd Yussoff, Murizah Kassi, Mohd Anuar Mat Isa, Habibah Hashim
    MyJurnal
    This paper presents a study on node impersonation attack in Wireless Sensor Networks (WSN)
    environment. Node cloning is a major attack among sensor where the leak of node identity is easy to clone
    if it is not secured. For this purpose, an analysis that explores techniques to prevent node cloning attack
    was done using a unique node identity. An algorithm to generate the unique identity was developed on
    high performance ARM hardware and programmed the data authentication together with sensor nodes.
    Communication among the sensor nodes and base station depends on a successful authentication using the
    unique identity (UID). The sensor nodes are resistant against node cloning attack when the UID identity
    is unequal. Results present successful generation of the UID, while execution time between two nodes
    is faster and low power consumption is used on the technique. The analysis has proven that the unique
    UID is secured by the developed node identity algorithms and against cloning attack. This outcome is
    significant for new development of secured WSN sensor hardware, which can be implemented in new
    network technology.
Related Terms
Filters
Contact Us

Please provide feedback to Administrator ([email protected])

External Links