Match!
Mohd Anuar Mat Isa
Universiti Teknologi MARA
EncryptionComputer networkCryptographic protocolComputer securityComputer science
39Publications
6H-index
132Citations
What is this?
Publications 38
Newest
Source
#1Nur Nabila Mohamed (UiTM: Universiti Teknologi MARA)H-Index: 3
#2Yusnani Mohd Yussoff (UiTM: Universiti Teknologi MARA)H-Index: 6
Last. Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
view all 4 authors...
Embedded Machine-to-Machine (M2M) is one of the hottest research topics in recent industrial Internet of Things. In order to serve the communication to effectively transfer data and messages between machines, the system must incorporate a file transfer protocol, known as Trivial File Transfer Protocol (TFTP). However, the main constraint is lack of security mechanism during TFTP Client–Server communication whereby its reliability is questionable as the protocol does not support any authenticatio...
Source
#1Mohd Anuar Mat Isa (UiTM: Universiti Teknologi MARA)H-Index: 6
#2Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
Last. Yasin Fitri Alias (UiTM: Universiti Teknologi MARA)H-Index: 1
view all 5 authors...
The advancing of Key Exchange Protocol (KEP) is compulsory to secure the connected world via Internet of Thing (IoT), cryptocurrency and blockchain, virtual intelligent, smart computing etc. To address the security issues in the Internet based computing systems, this paper explores the side-channel security for KEP, namely timing and relay attacks. Nowadays, various KEP variances are used by internet protocol such as IKEv2/3. The purpose of KEP is to enable a secret key(s) sharing between two or...
Source
#2Mohd Anuar Mat Isa (UiTM: Universiti Teknologi MARA)H-Index: 6
Last. Habibah HashimH-Index: 11
view all 3 authors...
Internet of Things (IoT) is a way of providing data with the physical thing that interconnected to the network, which is the Internet. The IoT devices connected to the internet, broadcast of the data to the broker or a server, becomes an open route for attackers to gain the data and making the data becomes vulnerable. Thus, the data could be altered or spoofed by an attacker which led to security issues especially on data integrity. Therefore, the data security collected from the sensors is as i...
Source
#1Nur Nabila Mohamed (UiTM: Universiti Teknologi MARA)H-Index: 3
#2Mohd Anuar Mat Isa (UiTM: Universiti Teknologi MARA)H-Index: 6
Last. Habibah HashimH-Index: 11
view all 4 authors...
#1Syed Farid Syed Adnan (UiTM: Universiti Teknologi MARA)H-Index: 5
#2Mohd Anuar Mat Isa (UiTM: Universiti Teknologi MARA)H-Index: 6
Last. Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
view all 3 authors...
Security protection is a concern for the Internet of Things (IoT) which performs data exchange autonomously over the internet for remote monitoring, automation and other applications. IoT implementations has raised concerns over its security and various research has been conducted to find an effective solution for this. Thus, this work focus on the analysis of an asymmetric encryption scheme, AA-Beta (AA β ) on a platform constrained in terms of processor capability, storage and random access Me...
1 CitationsSource
#1Nur Nabila Mohamed (UiTM: Universiti Teknologi MARA)H-Index: 3
#2Hanunah Othman (UiTM: Universiti Teknologi MARA)H-Index: 4
Last. Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
view all 5 authors...
Location Based Services (LBS) are any services or software applications that require the geographic location (longitude and latitude) of an entity. Nowadays, with the aid of smartphones, LBSs have improved tremendously in the market with wide range of users. However, in many existing LBSs, the user's information was not private where the service provider is aware with the user's location and may leak this information to any unauthorized entities. To encounter this problem, a symmetric encryption...
Source
#1Yasin Fitri Alias (UiTM: Universiti Teknologi MARA)H-Index: 1
#2Mohd Anuar Mat Isa (UiTM: Universiti Teknologi MARA)H-Index: 6
Last. Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
view all 3 authors...
Timing attacks have caused an unprecedented evolution in the present cryptographic era where more and more cryptographic applications are running on embedded systems in a wireless environment. Paul Kocher, a well-known cryptanalyst was the first to successfully implement a timing attack on a cryptosystem. Subsequently many other timing attacks have been recorded while cryptographers tirelessly work on making the schemes more resistant to these and other side channel attacks. In this work, we exa...
1 Citations
#1Norhaflyza Marbukhari (UiTM: Universiti Teknologi MARA)
#2Yusnani Mohd Yusoff (UiTM: Universiti Teknologi MARA)H-Index: 1
Last. Nazhatul Hafizah Kamarudin (UiTM: Universiti Teknologi MARA)H-Index: 2
view all 5 authors...
This paper presents a new technique in preventing node cloning attack. The significant contribution of this method or technique is in preventing node impersonation attack in Wireless Sensor Network (WSN). The new method named as Chain Identity Attestation Method (CIA) was developed on the basis of Diffie-Hellman hard problem algorithm. The exclusivity of CIA method is in the generation of node identity. In this method, the node identity is in each session. In other words, node identity is no lon...
#1N. N. Mohamed (UiTM: Universiti Teknologi MARA)H-Index: 1
Last. Hashimah HashimH-Index: 1
view all 4 authors...
Advances in the communication technology of embedded systems have led to the situation where nowadays almost all systems should implement security for data safety. Trivial File Transfer Protocol (TFTP) has advantages for use in embedded systems due to its speed and simplicity, however without security mechanisms, it is vulnerable to various attacks. As an example, during upgrading of Wireless Access Points (WAPs), attackers can access the information and modify it, and then install malicious cod...
1 Citations
1234