Match!
Syed Farid Syed Adnan
Universiti Teknologi MARA
EncryptionEmbedded systemComputer networkCryptographic protocolComputer science
27Publications
5H-index
82Citations
What is this?
Publications 29
Newest
Source
Source
#1Mohd Anuar Mat Isa (UiTM: Universiti Teknologi MARA)H-Index: 6
#2Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
Last. Yasin Fitri Alias (UiTM: Universiti Teknologi MARA)H-Index: 1
view all 5 authors...
The advancing of Key Exchange Protocol (KEP) is compulsory to secure the connected world via Internet of Thing (IoT), cryptocurrency and blockchain, virtual intelligent, smart computing etc. To address the security issues in the Internet based computing systems, this paper explores the side-channel security for KEP, namely timing and relay attacks. Nowadays, various KEP variances are used by internet protocol such as IKEv2/3. The purpose of KEP is to enable a secret key(s) sharing between two or...
Source
#2Mohd Anuar Mat Isa (UiTM: Universiti Teknologi MARA)H-Index: 6
Last. Habibah HashimH-Index: 11
view all 3 authors...
Internet of Things (IoT) is a way of providing data with the physical thing that interconnected to the network, which is the Internet. The IoT devices connected to the internet, broadcast of the data to the broker or a server, becomes an open route for attackers to gain the data and making the data becomes vulnerable. Thus, the data could be altered or spoofed by an attacker which led to security issues especially on data integrity. Therefore, the data security collected from the sensors is as i...
Source
#1Mohd Anuar Mat Isa (UiTM: Universiti Teknologi MARA)H-Index: 6
#2Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
Last. Nur Nabila Mohamed (UiTM: Universiti Teknologi MARA)H-Index: 3
view all 5 authors...
Keyless go, automotive keyless systems (AKS), passive keyless entry and start (PKES) are names given to smart systems that allow a driver to unlock a car without pressing any key, and drive the car without inserting a smart key for starting or stopping the car engine. It is one of the debutant IoT applications in automotive sector. This work presents a 128-bit pairing security protocol (PSP 128 bits) lightweight cryptographic protocol as a security protocol authentication between owner and car. ...
Source
#1Syed Farid Syed Adnan (UiTM: Universiti Teknologi MARA)H-Index: 5
#2Mohd Anuar Mat Isa (UiTM: Universiti Teknologi MARA)H-Index: 6
Last. Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
view all 3 authors...
Security protection is a concern for the Internet of Things (IoT) which performs data exchange autonomously over the internet for remote monitoring, automation and other applications. IoT implementations has raised concerns over its security and various research has been conducted to find an effective solution for this. Thus, this work focus on the analysis of an asymmetric encryption scheme, AA-Beta (AA β ) on a platform constrained in terms of processor capability, storage and random access Me...
1 CitationsSource
#1Norhaflyza Marbukhari (UiTM: Universiti Teknologi MARA)
#2Yusnani Mohd Yusoff (UiTM: Universiti Teknologi MARA)H-Index: 1
Last. Nazhatul Hafizah Kamarudin (UiTM: Universiti Teknologi MARA)H-Index: 2
view all 5 authors...
This paper presents a new technique in preventing node cloning attack. The significant contribution of this method or technique is in preventing node impersonation attack in Wireless Sensor Network (WSN). The new method named as Chain Identity Attestation Method (CIA) was developed on the basis of Diffie-Hellman hard problem algorithm. The exclusivity of CIA method is in the generation of node identity. In this method, the node identity is in each session. In other words, node identity is no lon...
#1Syed Farid Syed Adnan (UiTM: Universiti Teknologi MARA)H-Index: 5
#2Mohd Anuar Mat Isa (UiTM: Universiti Teknologi MARA)H-Index: 6
Last. Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
view all 3 authors...
Lightweight cryptography offers energy-efficient cryptographic capabilities on low powered devices such as those commonly found in the Internet of Things (IoT). One such lightweight scheme is the AA-Beta (AAs) asymmetric cryptographic scheme which is based on the Diophantine Equation Hard Problem (DEHP) and whose algorithm consists of only basic arithmetic operations of addition and subtraction for both the encryption and decryption process. In a previous work we have shown that the implementati...
1 CitationsSource
#2Mohd Anuar Mat Isa (UiTM: Universiti Teknologi MARA)H-Index: 6
Last. Habibah HashimH-Index: 11
view all 3 authors...
4 CitationsSource
#1Syed Farid Syed Adnan (UiTM: Universiti Teknologi MARA)H-Index: 5
#2Mohd Anuar Mat Isa (UiTM: Universiti Teknologi MARA)H-Index: 6
Last. Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
view all 3 authors...
Internet of Things (IoT) is an interconnection of physical objects to the Internet which enables data exchange. When things are connected to the internet it becomes an open path for adversaries to unlawfully gain data over the internet leading to unaccountable security issues pertaining to data integrity and privacy. The need to secure the data gathered from sensors is important as this eventually gives trust to the larger data, the big data. Furthermore, connected objects in IoT are resource co...
2 CitationsSource
123