@uobasrah.edu.iq
Computer Science / College of Education for Pure Sciences
University of Basrah
Scopus Publications
Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Ismail Yaqub Maolood, Mustafa A. Al Sibahee, Junchao Ma, and Abdulla J. Y. Aldarwish
Springer Nature Switzerland
Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Keyan Abdul-Aziz Mutlaq, Junchao Ma, Dhafer G. Honi, Abdulla J. Y. Aldarwish, and Iman Qays Abduljaleel
MDPI AG
Highly sensitive information about people’s social life and daily activities flows in smart home networks. As such, if attackers can manage to capture or even eavesdrop on this information, the privacy of the users can be compromised. The consequences can be far-reaching, such as knowing the status of home occupancy that can then facilitate burglary. To address these challenges, approaches such as data aggregation and signcryption have been utilized. Elliptic curve cryptography, bilinear pairing, asymmetric key cryptosystem, blockchain, and exponential operations are among the most popular techniques deployed to design these security solutions. However, the computational, storage and communication complexities exhibited by the majority of these techniques are too high. This renders these techniques unsuitable for smart home components such as smart switches and sensors. Some of these schemes have centralized architectures, which present some single points of failure. In this paper, symmetric key authentication procedures are presented for smart home networks. The proposed protocol leverages on cryptographic primitives such as one-way hashing and bitwise exclusive-Or operations. The results indicate that this scheme incurs the lowest communication, storage, and computation costs compared to other related state-of-the-art techniques. Empirically, our protocol reduces the communication and computation complexities by 16.7% and 57.7%, respectively. In addition, it provides backward key secrecy, robust mutual authentication, anonymity, forward key secrecy, and unlinkability. Moreover, it can effectively prevent attacks such as impersonation, session hijacking, denial of service, packet replays, man-in-the-middle, and message eavesdropping.
Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi, Mustafa A. Al Sibahee, Mudhafar Jalil Jassim Ghrabat, Junchao Ma, Iman Qays Abduljaleel, and Abdulla J. Y. Aldarwish
MDPI AG
Wireless networks have continued to evolve to offer connectivity between users and smart devices such as drones and wireless sensor nodes. In this environment, insecure public channels are deployed to link the users to their remote smart devices. Some of the application areas of these smart devices include military surveillance and healthcare monitoring. Since the data collected and transmitted to the users are highly sensitive and private, any leakages can have adverse effects. As such, strong entity authentication should be implemented before any access is granted in these wireless networks. Although numerous protocols have been developed for this purpose, the simultaneous attainment of robust security and privacy at low latencies, execution time and bandwidth remains a mirage. In this paper, a session-dependent token-based payload enciphering scheme for integrity enhancements in wireless networks is presented. This protocol amalgamates fuzzy extraction with extended Chebyshev chaotic maps to boost the integrity of the exchanged payload. The security analysis shows that this scheme offers entity anonymity and backward and forward key secrecy. In addition, it is demonstrated to be robust against secret ephemeral leakage, side-channeling, man-in-the-middle and impersonation attacks, among other security threats. From the performance perspective, the proposed scheme requires the least communication overheads and a relatively low execution time during the authentication process.
Abdulla J. Y. Aldarwish, Ali A. Yassin, Abdullah Mohammed Rashid, Hamid Ali Abed Alasadi, Aqeel Adel Yaseen, and Eman Thabet Khalid
Institute of Advanced Engineering and Science
<p>COVID-19 was first reported in China Wuhan and rapidly grown up to more than 58 countries based on the World Health Organization (WHO). Well ahead of any health emergency, the health care server has the ability to access these data via authorization and then s/he performs necessary actions. In order to protect medical data from malicious activities, authentication is the starting point for this. Authentication systems represent a network support factor to reduce ineffective users and radically eliminate phishing because authentication determines the identity of the real user. Many schemes and technologies have been suggested for authentication in wireless body area networks (WBANs). In this paper, we suggest a strong dynamic password authentication system for WBANs. We adopt a (different/new) way to calculate a password and make it coherent and dynamic for each login session. Our work also provides additional security properties to get rid of hub node impersonation attacks and resolve key escrow issues. Our scheme resist fishing attach which keep patient from any illegal change of drugs. By comparison, the proposed scheme is considered active and has strong security based on formal security analysis tools such as AVISPA.</p>
Ali A. Yassin, Abdullah Mohammed Rashid, Abdulla J. Yassin, and Hamid Alasadi
Institute of Advanced Engineering and Science
Recently, the concept of DNA has been invested in computing technology in different ways which linking information technology and biological sciences. There are several encryption algorithms based on DNA encoding that has been proposed, which leads to generating a new direction in image encryption. However, the DNA encryption scheme has drawbacks such as expensive experimental equipment, difficult operations, and hard to hold its biotechnology. Additionally, during careful cryptanalysis that applied to most of these image encryption schemes, we notice that DNA operators can only influence one DNA base, which causes poor diffusion. Our proposed scheme is not applied complex biological operation but just is given to improve the diffusion ability of image encryption scheme by using DNA sequence and DCT transform. Our works overcome above-aforementioned issues. Furthermore, empirical results on real images and security analysis demonstrate that our proposed scheme not only has flexibility and efficiency encryption scheme but also has the ability to resist well-known attacks such as entropy attack, differential attack, statistical attack, chosen/known plain image attack. Additionally, our work enjoys several strong characteristics as follows: (1) the decryption error is very low to recover the original image; (2) Once key for each encryption process and if the user wants to use the same key in many times, our proposed scheme supports secret key sensitivity; (3) the value of correlation of the encrypted image is null; (4) the scrambling process is good and generate high disorder at the output. As a result, our proposed scheme achieves a good balance between strong security and high performance.
Abdulla J. Y. Aldarwish, Ali A. Yassin, Abdullah Mohammed Rashid, Aqeel A. Yaseen, Hamid Alasadi, and Ahmed A. Alkadhmawee
Springer Singapore
Abdullah Mohammed Rashid, Ali Adil Yassin, Ahmed Adel Abdel Wahed, and Abdulla Jassim Yassin
UUM Press, Universiti Utara Malaysia
Nowadays, a lot of images and documents are saved on data sets and cloud servers such as certificates, personal images, and passports. These images and documents are utilized in several applications to serve residents living in smart cities. Image similarity is considered as one of the applications of smart cities. The major challenges faced in the field of image management are searching and retrieving images. This is because searching based on image content requires a long time. In this paper, the researchers present a secure scheme to retrieve images in smart cities to identify wanted criminals by using the Gray Level Cooccurrence Matrix. The proposed scheme extracts only five features of the query image which are contrast, homogeneity, entropy, energy, and dissimilarity. This work consists of six phases which are registration, authentication, face detection, features extraction, image similarity, and image retrieval. The current study runs on a database of 810 images which was borrowed from face94 to measure the performance of image retrieval. The results of the experiment showed that the average Received: 17/7/2019 Revised: 5/3/2020 Accepted: 6/4/2020 Published: 11/6/2020 Journal of ICT, 19, No. 3 (July) 2020, pp: 437-458 438 precision is 97.6 and average recall is 6.3. Results of the current study have been relatively inspiring compared with the results of two previous studies.
Ali A. Yassin, Abdulla J. Yassin, Abdullah Mohammed Rashid, and Ahmed A. Alkadhmawee
Science Publications
Modern industries for smart mobile devices, such as smartphones, provide end users with interactive features that consider network accessibility, computation performance, storage usage, energy saving and limited battery resources. The combination of cloud and mobile computing capabilities has introduced a new technology called Mobile Cloud Computing (MCC), which has extended smartphones and modern mobile devices beyond their core capacities. Many studies have focused only on offloading virtualised applications whilst granting limited consideration on offloading original codes. Moreover, researchers have ignored the main requirements of multimedia, such as photos and videos, in applying the MCC framework in many applications. In this study, we propose a new scheme in the MCC environment to remove duplicated photos received by the mobile device through social network applications. These repeated photos cause loss of large volumes of mobile memory or cloud storage, which leads to difficulty in communication, loss of flexibility to handle more than one application, slow mobile completion and mobile response to orders from another devices and great power consumption due to slow performance. The proposed scheme can overcome the above-mentioned issues, increase the performance of the mobile device and operate at the rest time of the device without affecting the efficiency of its performance. The proposed architecture is based on the management storage from mobile devices to the cloud and uses an efficient search index file to control the addition and deletion operations for repeated photos. Our experiments show that the proposed scheme increases the performance of a certain mobile’s application from 1,967,708 ns to 1,708,250 ns, saves energy consumption from 68% to 74% and provides storage space from 10,130 MB to 9,130 MB.