Skip to main content

Showing 1–9 of 9 results for author: Doomun, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:1405.6218  [pdf

    cs.NI

    Collaborative Driving Support System in Mobile Pervasive Environments

    Authors: Nevin Vunka Jungum, Razvi M. Doomun, Soulakshmee D. Ghurbhurrun, Sameerchand Pudaruth

    Abstract: The Bluetooth protocol can be used for intervehicle communication equipped with Bluetooth devices. This work investigates the challenges and feasibility of develo** intelligent driving system providing timesensitive information about traffic conditions and roadside facilities. The architecture for collaborative vehicle communication system is presented using the concepts of wireless networks and… ▽ More

    Submitted 9 May, 2014; originally announced May 2014.

    Comments: pp 358-363

    Journal ref: Nevin Vunka Jungum, R. Doomun, S. D. Ghurbhurrun, S. Pudaruth, "Collaborative Driving Support System in Mobile Pervasive Environments", The 4th Intl' Conference on Wireless and Mobile Communications, pp 358-363, 2008

  2. arXiv:1212.1284  [pdf

    cs.DC

    Integrated Green Cloud Computing Architecture

    Authors: M. N. Hulkury, M. R. Doomun

    Abstract: Arbitrary usage of cloud computing, either private or public, can lead to uneconomical energy consumption in data processing, storage and communication. Hence, green cloud computing solutions aim not only to save energy but also reduce operational costs and carbon footprints on the environment. In this paper, an Integrated Green Cloud Architecture (IGCA) is proposed that comprises of a client-orie… ▽ More

    Submitted 6 December, 2012; originally announced December 2012.

    Comments: 6 pages, International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2012

  3. arXiv:1208.5571  [pdf

    cs.CR

    Modified Temporal Key Integrity Protocol For Efficient Wireless Network Security

    Authors: M. Razvi Doomun, KM Sunjiv Soyjaudah

    Abstract: Temporal Key Integrity Protocol (TKIP) is the IEEE TaskGroupi solution for the security loop holes present in the already widely deployed 802.11 hardware. It is a set of algorithms that wrap WEP to give the best possible solution given design constraints such as paucity of the CPU cycles, hardwiring of the WEP encryption algorithm and software upgrade dependent. Thus, TKIP is significantly more di… ▽ More

    Submitted 28 August, 2012; originally announced August 2012.

    Comments: 6 pages, International Conference on Security and Cryptography (SECRYPT) 2007

  4. arXiv:1208.5569  [pdf

    cs.NI cs.CR

    Route Extrapolation for Source and Destination Camouflage in Wireless Ad Hoc Networks

    Authors: M. Razvi Doomun, K. M. Sunjiv Soyjaudah

    Abstract: In wireless ad hoc networks, protecting source and destination nodes location privacy is a challenging task due to malicious traffic analysis and privacy attacks. Existing solutions, such as incorporating fake source destination pairs in the network, provide some privacy of real source and destination nodes against attackers. Moreover, ad hoc networks need stronger privacy protection against power… ▽ More

    Submitted 28 August, 2012; originally announced August 2012.

    Comments: 7 pages, 19th International Conference on Computer Communications and Networks (ICCCN 2010), Zurich

  5. arXiv:1208.3576  [pdf

    cs.CR

    AES CCMP Algorithm with N-Way Interleaved Cipher Block Chaining

    Authors: Zadia Codabux-Rossan, M. Razvi Doomun

    Abstract: Nowadays, the increased use of battery-powered mobile appliances and the urge to access time-sensitive data anytime anywhere has fuelled a high demand for wireless networks. However, wireless networks are susceptible to intrusion and security problems. There is an inherent need to secure the wireless data communication to ensure the confidentiality, authenticity, integrity and non repudiation of t… ▽ More

    Submitted 17 August, 2012; originally announced August 2012.

    Comments: 18 pages, University of Mauritius Research Journal - Volume 15 - 2009

  6. AES-CBC Software Execution Optimization

    Authors: Razvi Doomun, Jayramsingh Doma, Sundeep Tengur

    Abstract: With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process. This paper investigates the performance and efficiency of IEEE 802.11i approved Advanced Encryption Standard (AES)-Rijndael ciphering/deciphering software in Cipher Block Chaining (CBC) mode… ▽ More

    Submitted 15 August, 2012; originally announced August 2012.

    Comments: 8 pages, IEEE 2008

  7. arXiv:1208.2305  [pdf

    cs.CR

    LOTKIP: Low Overhead TKIP Optimization for Ad Hoc Wireless Network

    Authors: M. Razvi Doomun, K. M. Sunjiv Soyjaudah

    Abstract: Temporal Key Integrity Protocol (TKIP) is a provisional solution for Wired Equivalent Privacy (WEP) security loopholes present in already widely deployed legacy 802.11 wireless devices. In this work, we model and analyse the computational complexity of TKIP security mechanism and propose an optimised implementation, called LOTKIP, to decrease processing overhead for better energy efficient securit… ▽ More

    Submitted 10 August, 2012; originally announced August 2012.

    Comments: 31 pages, journal paper IJNS

    Journal ref: International Journal of Network Security, Vol.10, No.3, PP.225-237, May 2010

  8. Low-Cost Bluetooth Mobile Positioning for Location-based Application

    Authors: Zaafir Barahim, M. Razvi Doomun, Nazrana Joomun

    Abstract: Bluetooth is a promising short-range radio network technology. We present a low cost and easily deployed, scalable infrastructure for indoor location-based computing of mobile devices based on Bluetooth technology. The system consists of 2 main components, namely the Bluetooth (BT) Sensor System and the Central Navigation System which have been developed using the JDK 6.0. The Bluetooth Sensor Sys… ▽ More

    Submitted 8 August, 2012; originally announced August 2012.

    Comments: 4 pages 3rd IEEE/IFIP International Conference in Central Asia on Internet 2007, ICI 2007

  9. arXiv:1003.2677  [pdf

    cs.IR

    Classified Ads Harvesting Agent and Notification System

    Authors: Razvi Doomun, Lollmahamod N., Auleear Nadeem, Mozafar Aukin

    Abstract: The shift from an information society to a knowledge society require rapid information harvesting, reliable search and instantaneous on demand delivery. Information extraction agents are used to explore and collect data available from Web, in order to effectively exploit such data for business purposes, such as automatic news filtering, advertisement or product searching and price comparing. In t… ▽ More

    Submitted 13 March, 2010; originally announced March 2010.

    Comments: International Conference on Information and Communication Technology for the Muslim World (ICT4M 2006), 21-23 November 2006, Kuala Lumpur, Malaysia