Hairoladenan Kasim
Universiti Tenaga Nasional (UNITEN)

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

A secured data transform-and-transfer algorithm for energy internet-of-things applications Abbas M. Al-Ghaili; Hairoladenan Kasim; Naif Mohammed Al-Hada
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 6: December 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i6.21665

Abstract

Digital transformation (DT) is one of the key technologies with effective impacts on many traditional processes towards a digital world. DT influences the way other digital services behave. Hence, there is a need to consider DT-related processes carefully specifically while designing phase. DT contributes to many services. It can, for example, contribute to implement security tasks applied to digital contents and therefore can be applied to change contents being secured. One of the transformation ways applied in security is to consider the way those digital contents are being stored or transferred. This paper proposes a DT algorithm (DTA) for energy internet-of-things (EIOT) contents. DTA consists of two steps, to convert original contents to another digital form and to transfer that form utilizing IOT. This paper utilizes DT in term of security. EIOT contents are converted to increase security. It is aimed to transfer EIOT contents to destination safely and efficiently. Thus, EIOT contents are transformed first to hide original contents. To make sure that the transferring process is done safely, DTA is evaluated in terms of efficiency, accuracy, and robustness. Results confirm that DTA is efficient, accurate, and robust against loss of bits caused by transferring.
QR code based authentication method for IoT applications using three security layers Abbas M. Al-Ghaili; Hairoladenan Kasim; Marini Othman; Wahidah Hashim
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.14748

Abstract

A quick response code-based authentication method (QRAM) is proposed. QRAM is applicable for lots of internet of things (IoT) applications. QRAM aims to verify requests of such an access to IoT applications. Requests are made using a quick response code (QRC). To authenticate contents of QRC, users will scan QRC to access IoT applications. To authenticate contents of QRC, three procedures are applied. QRAM contributes to IoT automatic access systems or smart applications in terms of authentication and safety of access. QRAM is evaluated in term of security factors (e.g., authentication). Computation time of authentication procedures for several IoT applications has become a considerable issue. QRAM aims to reduce computation time consumed to authenticate each QRC. Some authentication techniques still face difficulties when an IoT application requires fast response to users; therefore, QRAM aims to enhance so to meet real-time applications. Thus, QRAM is compared to several competitive methods used to verify QRC in term of computation time. Results confirmed that QRAM is faster than other competitive techniques. Besides, results have shown a high level of complexity in term of decryption time needed to deduce private contents of QRC. QRAM also is robust against unauthorized requests of access.