-
Collaborative Driving Support System in Mobile Pervasive Environments
Authors:
Nevin Vunka Jungum,
Razvi M. Doomun,
Soulakshmee D. Ghurbhurrun,
Sameerchand Pudaruth
Abstract:
The Bluetooth protocol can be used for intervehicle communication equipped with Bluetooth devices. This work investigates the challenges and feasibility of develo** intelligent driving system providing timesensitive information about traffic conditions and roadside facilities. The architecture for collaborative vehicle communication system is presented using the concepts of wireless networks and…
▽ More
The Bluetooth protocol can be used for intervehicle communication equipped with Bluetooth devices. This work investigates the challenges and feasibility of develo** intelligent driving system providing timesensitive information about traffic conditions and roadside facilities. The architecture for collaborative vehicle communication system is presented using the concepts of wireless networks and Bluetooth protocol. We discuss how vehicles can form mobile ad-hoc networks and exchange data by the on-board Bluetooth sensors. The key design concepts of the intelligent driving service infrastructure are analyzed showing collaborative fusion of multiple positional data could give a better understanding of the surrounding traffic conditions for collaborative driving. The technical feasibility of using Bluetooth for data exchange among moving vehicles is evaluated.
△ Less
Submitted 9 May, 2014;
originally announced May 2014.
-
Integrated Green Cloud Computing Architecture
Authors:
M. N. Hulkury,
M. R. Doomun
Abstract:
Arbitrary usage of cloud computing, either private or public, can lead to uneconomical energy consumption in data processing, storage and communication. Hence, green cloud computing solutions aim not only to save energy but also reduce operational costs and carbon footprints on the environment. In this paper, an Integrated Green Cloud Architecture (IGCA) is proposed that comprises of a client-orie…
▽ More
Arbitrary usage of cloud computing, either private or public, can lead to uneconomical energy consumption in data processing, storage and communication. Hence, green cloud computing solutions aim not only to save energy but also reduce operational costs and carbon footprints on the environment. In this paper, an Integrated Green Cloud Architecture (IGCA) is proposed that comprises of a client-oriented Green Cloud Middleware to assist managers in better overseeing and configuring their overall access to cloud services in the greenest or most energy-efficient way. Decision making, whether to use local machine processing, private or public clouds, is smartly handled by the middleware using predefined system specifications such as service level agreement (SLA), Quality of service (QoS), equipment specifications and job description provided by IT department. Analytical model is used to show the feasibility to achieve efficient energy consumption while choosing between local, private and public Cloud service provider (CSP).
△ Less
Submitted 6 December, 2012;
originally announced December 2012.
-
Modified Temporal Key Integrity Protocol For Efficient Wireless Network Security
Authors:
M. Razvi Doomun,
KM Sunjiv Soyjaudah
Abstract:
Temporal Key Integrity Protocol (TKIP) is the IEEE TaskGroupi solution for the security loop holes present in the already widely deployed 802.11 hardware. It is a set of algorithms that wrap WEP to give the best possible solution given design constraints such as paucity of the CPU cycles, hardwiring of the WEP encryption algorithm and software upgrade dependent. Thus, TKIP is significantly more di…
▽ More
Temporal Key Integrity Protocol (TKIP) is the IEEE TaskGroupi solution for the security loop holes present in the already widely deployed 802.11 hardware. It is a set of algorithms that wrap WEP to give the best possible solution given design constraints such as paucity of the CPU cycles, hardwiring of the WEP encryption algorithm and software upgrade dependent. Thus, TKIP is significantly more difficult and challenging to implement and optimise than WEP. The objective of this research is to examine the cost and benefit of TKIP security mechanisms and optimise its implementation to reduce security overhead for better performance. We propose a modified TKIP (MoTKIP) with improved packet encapsulation and decapsulation procedure that reduces computation and packet overhead in classic TKIP substantially and optimises total wireless network throughput rates.
△ Less
Submitted 28 August, 2012;
originally announced August 2012.
-
Route Extrapolation for Source and Destination Camouflage in Wireless Ad Hoc Networks
Authors:
M. Razvi Doomun,
K. M. Sunjiv Soyjaudah
Abstract:
In wireless ad hoc networks, protecting source and destination nodes location privacy is a challenging task due to malicious traffic analysis and privacy attacks. Existing solutions, such as incorporating fake source destination pairs in the network, provide some privacy of real source and destination nodes against attackers. Moreover, ad hoc networks need stronger privacy protection against power…
▽ More
In wireless ad hoc networks, protecting source and destination nodes location privacy is a challenging task due to malicious traffic analysis and privacy attacks. Existing solutions, such as incorporating fake source destination pairs in the network, provide some privacy of real source and destination nodes against attackers. Moreover, ad hoc networks need stronger privacy protection against powerful global attacker which has knowledge of overall network topology and, that can also eavesdrop and visualize network wide data transmissions. In this paper, we present a novel privacy technique, (EXTROUT) Route Extrapolation to camouflage the real source and destination nodes along an extended path in an ad hoc network. We demonstrate that the privacy level achieved with EXTROUT is higher and more effective against a global attacker, when compared to fake source destination nodes privacy scheme.
△ Less
Submitted 28 August, 2012;
originally announced August 2012.
-
AES CCMP Algorithm with N-Way Interleaved Cipher Block Chaining
Authors:
Zadia Codabux-Rossan,
M. Razvi Doomun
Abstract:
Nowadays, the increased use of battery-powered mobile appliances and the urge to access time-sensitive data anytime anywhere has fuelled a high demand for wireless networks. However, wireless networks are susceptible to intrusion and security problems. There is an inherent need to secure the wireless data communication to ensure the confidentiality, authenticity, integrity and non repudiation of t…
▽ More
Nowadays, the increased use of battery-powered mobile appliances and the urge to access time-sensitive data anytime anywhere has fuelled a high demand for wireless networks. However, wireless networks are susceptible to intrusion and security problems. There is an inherent need to secure the wireless data communication to ensure the confidentiality, authenticity, integrity and non repudiation of the data being exchanged. On the other hand, the computation and the resultant energy consumption to achieve sufficient security can be high. Encryption algorithms are generally computationally intensive, and consume a significant amount of computing resources (such as CPU time, memory, and battery power). Considering the limited resources on wireless devices, it is crucial that security protocols be implemented efficiently. This manuscript focuses on how energy consumption is impacted by the use of unoptimised AES-CCMP algorithms and proposes an optimized AES CCMP algorithm using 2-way interleaving that does not compromise the security of wireless communication sessions. There is also analysis of the performance of AES (a.k.a. Rijndael) in its AES-CCMP implementation. The 2-way interleaving technique is an optimization of the CBC-MAC that is investigated using two performance metrics (namely encryption time and throughput).
△ Less
Submitted 17 August, 2012;
originally announced August 2012.
-
AES-CBC Software Execution Optimization
Authors:
Razvi Doomun,
Jayramsingh Doma,
Sundeep Tengur
Abstract:
With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process. This paper investigates the performance and efficiency of IEEE 802.11i approved Advanced Encryption Standard (AES)-Rijndael ciphering/deciphering software in Cipher Block Chaining (CBC) mode…
▽ More
With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process. This paper investigates the performance and efficiency of IEEE 802.11i approved Advanced Encryption Standard (AES)-Rijndael ciphering/deciphering software in Cipher Block Chaining (CBC) mode. Simulations are used to analyse the speed, resource consumption and robustness of AES-CBC to investigate its viability for image encryption usage on common low power devices. The detailed results presented in this paper provide a basis for performance estimation of AES cryptosystems implemented on wireless devices. The use of optimized AES-CBC software implementation gives a superior encryption speed performance by 12 - 30%, but at the cost of twice more memory for code size.
△ Less
Submitted 15 August, 2012;
originally announced August 2012.
-
LOTKIP: Low Overhead TKIP Optimization for Ad Hoc Wireless Network
Authors:
M. Razvi Doomun,
K. M. Sunjiv Soyjaudah
Abstract:
Temporal Key Integrity Protocol (TKIP) is a provisional solution for Wired Equivalent Privacy (WEP) security loopholes present in already widely deployed legacy 802.11 wireless devices. In this work, we model and analyse the computational complexity of TKIP security mechanism and propose an optimised implementation, called LOTKIP, to decrease processing overhead for better energy efficient securit…
▽ More
Temporal Key Integrity Protocol (TKIP) is a provisional solution for Wired Equivalent Privacy (WEP) security loopholes present in already widely deployed legacy 802.11 wireless devices. In this work, we model and analyse the computational complexity of TKIP security mechanism and propose an optimised implementation, called LOTKIP, to decrease processing overhead for better energy efficient security performance. The LOTKIP improvements are based on minimising key mixing redundancy and a novel frame encapsulation with low overhead. We simulate and compare LOTKIP with baseline TKIP in terms of complexity and energy consumption for ad hoc wireless network security. From simulation results, we demonstrate that LOTKIP executes with lower computational complexity, hence, with faster encryption time and more energy-efficient.
△ Less
Submitted 10 August, 2012;
originally announced August 2012.
-
Low-Cost Bluetooth Mobile Positioning for Location-based Application
Authors:
Zaafir Barahim,
M. Razvi Doomun,
Nazrana Joomun
Abstract:
Bluetooth is a promising short-range radio network technology. We present a low cost and easily deployed, scalable infrastructure for indoor location-based computing of mobile devices based on Bluetooth technology. The system consists of 2 main components, namely the Bluetooth (BT) Sensor System and the Central Navigation System which have been developed using the JDK 6.0. The Bluetooth Sensor Sys…
▽ More
Bluetooth is a promising short-range radio network technology. We present a low cost and easily deployed, scalable infrastructure for indoor location-based computing of mobile devices based on Bluetooth technology. The system consists of 2 main components, namely the Bluetooth (BT) Sensor System and the Central Navigation System which have been developed using the JDK 6.0. The Bluetooth Sensor System allows mobile devices whose Bluetooth mode is set to discoverable, to be scanned and detected, and they receive customizable text message of their positioning information, e.g. room identity. The positioning information is also sent to the Central Navigation System which in turn displays and updates the navigation map. The system is also used to track the movement of different BT mobile devices within the implemented environment.
△ Less
Submitted 8 August, 2012;
originally announced August 2012.
-
Classified Ads Harvesting Agent and Notification System
Authors:
Razvi Doomun,
Lollmahamod N.,
Auleear Nadeem,
Mozafar Aukin
Abstract:
The shift from an information society to a knowledge society require rapid information harvesting, reliable search and instantaneous on demand delivery. Information extraction agents are used to explore and collect data available from Web, in order to effectively exploit such data for business purposes, such as automatic news filtering, advertisement or product searching and price comparing. In t…
▽ More
The shift from an information society to a knowledge society require rapid information harvesting, reliable search and instantaneous on demand delivery. Information extraction agents are used to explore and collect data available from Web, in order to effectively exploit such data for business purposes, such as automatic news filtering, advertisement or product searching and price comparing. In this paper, we develop a real-time automatic harvesting agent for adverts posted on Servihoo web portal and an SMS-based notification system. It uses the URL of the web portal and the object model, i.e., the fields of interests and a set of rules written using the HTML parsing functions to extract latest adverts information. The extraction engine executes the extraction rules and stores the information in a database to be processed for automatic notification. This intelligent system helps to tremendously save time. It also enables users or potential product buyers to react more quickly to changes and newly posted sales adverts, paving the way to real-time best buy deals.
△ Less
Submitted 13 March, 2010;
originally announced March 2010.