Demo Image

P5: Algebraic-Structure-Based Lightweight Security Technique

Project Leader

Demo Image


. Assoc. Prof. Dr. Habibah Hashim
. Associate Professor
. Faculty of Electrical Engineering
  Universiti Teknologi MARA (UiTM)
  Shah Alam, Selangor, 40450, Malaysia
. habib350@salam.uitm.edu.my
. +603-55436101 /  +603-55435044

Research Members

In this work an important requirement of ubiquitous networked embedded systems will be addressed, namely the security of real time data communications appropriate for real-time cyber-physical system communications. Such communication protocols require low-latency deportment, and need also to surmount reliability and security issues necessary in maintaining the integrity of the data. The main problem lies in finding a suitable cryptographic algorithm to establish public key signatures on the embedded components, such that it does not create performance problems for real time communications of sensitive data. The processing capability of the energy constrained in embedded devices requires that a low-power, real-time computing solution be found for this problem. This research project will formulate a security technique specifically to secure real time traffic, based on the algebraic structure of elliptic curves over finite fields, leading to public-key cryptography. Computational savings and hardness accorded to this approach provides the motivation for this work.

A Secure TFTP Protocol with Security Proofs

Compression and Encryption Technique on Securing TFTP Packet

Performance Measurement of Secure TFTP protocol for Smart Embedded Devices

Cryptographic Key Exchange Protocol with Message Authentication Codes (MAC) using Finite State Machine (Journal Procedia Computer Science by Elsevier)

 
Publication

 

2017


 
Analysis of asymmetric encryption scheme, AA & Performance on Arm Microcontroller
Computer Applications & Industrial Electronics (ISCAIE), 2017 IEEE Symposium on
Access to document: https://doi.org/10.1109/ISCAIE.2017.8074967


 
Lightweight block cipher on VHDL
Computer Applications & Industrial Electronics (ISCAIE), 2017 IEEE Symposium on
Access to document: https://doi.org/10.1109/ISCAIE.2017.8074955


 
Symmetric Encryption Using Pre-Shared Public Parameters for A Secure Tftp Protocol
Journal of Engineering Science and technology
Access to document: http://jestec.taylors.edu.my/Vol%2012%20issue%201%20January%202017/12_1_8.pdf

 

 2016


 
Lightweight encryption for High-Efficiency Cideo Coding (HEVC)
Journal of Telecommunication, Electronic and Computer Engineering
Access to document: http://journal.utem.edu.my/index.php/jtec/article/view/998/579


 
Moving Objects Encryption of High-Efficiency Video Coding (HEVC) using AES Algorithm
Journal of Telecommunication, Electronic and Computer Engineering
Access to document: http://journal.utem.edu.my/index.php/jtec/article/view/998/579


Evaluation of Reliable UDP-Based Transport Protocols for Internet of Things (IoT)
Computer Applications & Industrial Electronics (ISCAIE),2016 IEEE Symposium on
Access to document: https://doi.org/10.1109/ISCAIE.2016.7575063

 

2015


 
An analysis and comparison for popular video encryption algorithms
Computer Applications & Industrial Electronics (ISCAIE), 2015 IEEE Symposium on
Access to document: https://doi.org/10.1109/ISCAIE.2015.7298334


 
Lightweight Cryptography on Programmable System on Chip: Standalone Software Implementation
Computer Applications & Industrial Electronics (ISCAIE), 2015 IEEE Symposium on
Access to document: https://doi.org/10.1109/ISCAIE.2015.7298346


 
A Comparison of Lightweight Communication Protocols in Robotic Applications
2015 IEEE International Symposium on Robotics and Intelligent Sensors (IEEE IRIS2015)
Access to document: https://doi.org/10.1016/j.procs.2015.12.318



Cryptographic Adversary Model: Timing and Power Attacks, Transactions on Engineering Technologies
Transactions on Engineering Technologies
Access to document: https://doi.org/ 10.1007/978-94-017-9804-4_41



Real-Time FPGA Communication System Using Ethernet for Robotics
2015 IEEE International Symposium on Robotics and Intelligent Sensors (IEEE IRIS2015)
Access to document: https://doi.org/10.1016/j.procs.2015.12.320

 

2014


 
A Secure TFTP Protocol with Security Proofs
Proceedings of the World Congress on Engineering 2014 Vol I, WCE 2014
Access to document: https://arxiv.org/ftp/arxiv/papers/1409/1409.0060.pdf



Compression and encryption technique on securing TFTP packet         
    
Computer Applications and Industrial Electronics (ISCAIE), 2014 IEEE Symposium on
Access to document: https://doi.org/10.1109/ISCAIE.2014.7010237



Performance measurement of secure TFTP protocol for smart embedded devices

Wireless and Mobile, 2014 IEEE Asia Pacific Conference on
Access to document: https://doi.org/10.1109/APWiMob.2014.6920276



Cryptographic key exchange protocol with message authentication codes (mac) using finite state machine

Medical and Rehabilitation Robotics and Instrumentation (MRRI2013)
Access to document: https://doi.org/10.1016/j.procs.2014.11.061