Claim Missing Document
Check
Articles

Found 7 Documents
Search
Journal : Indonesian Journal of Electrical Engineering and Computer Science

Design a sturdy and secure authentication scheme capable of early detection of COVID-19 patients using WBANs Abdulla J. Y. Aldarwish; Ali A. Yassin; Abdullah Mohammed Rashid; Hamid Ali Abed Alasadi; Aqeel Adel Yaseen; Eman Thabet Khalid
Indonesian Journal of Electrical Engineering and Computer Science Vol 27, No 2: August 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v27.i2.pp900-910

Abstract

COVID-19 was first reported in China Wuhan and rapidly grown up to more than 58 countries based on the World Health Organization (WHO). Well ahead of any health emergency, the health care server has the ability to access these data via authorization and then s/he performs necessary actions. In order to protect medical data from malicious activities, authentication is the starting point for this. Authentication systems represent a network support factor to reduce ineffective users and radically eliminate phishing because authentication determines the identity of the real user. Many schemes and technologies have been suggested for authentication in wireless body area networks (WBANs). In this paper, we suggest a strong dynamic password authentication system for WBANs. We adopt a (different/new) way to calculate a password and make it coherent and dynamic for each login session. Our work also provides additional security properties to get rid of hub node impersonation attacks and resolve key escrow issues. Our scheme resist fishing attach which keep patient from any illegal change of drugs. By comparison, the proposed scheme is considered active and has strong security based on formal security analysis tools such as AVISPA.
Sentiment analysis system for COVID-19 vaccinations using data of Twitter Eman Thabet Khalid; Entesar B. Talal; Methaq K. Khamees; Ali A. Yassin
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i2.pp1156-1164

Abstract

COVID-19 vaccination topic has been a hot topic of discussions on social media platforms wondering its effectiveness against the SARS-COV-2 virus. Twitter is one of the social media platforms that people widely lunched to express and share their thoughts about different issues touching their daily life. Though many studies have been undertaken for COVID-19 vaccine sentiment analysis, they are still limited and need to be updated constantly. This paper conducts a system for COVID-19 vaccine sentiment analysis based on data extracted from Twitter platform for the time interval from 1st of January till the 3rd of Sep. 2021, and by using deep learning techniques. The introduced system proposes to develop a model architecture based on a deep bidirectional long short-term memory (LSTM) neural network, to analyze tweets data in the form of positive, neutral, and negative. As a result, the overall accuracy of the developed model based on validation data is 74.92%. The obtained outcomes from the sentiment analysis system on collected tweets-data of COVID-19 vaccine revealed that neutral is the prominent sentiment with a rate of 69.5%, and negative sentiment has less rate of tweets reached 20.75% while the positive sentiment has a lesser rate of tweets reached of 9.67%.
Password authentication scheme based on smart card and QR code Mushtaq Hasson; Ali A. Yassin; Abdulla J. Yassin; Abdullah Mohammed Rashid; Aqeel A. Yaseen; Hamid Alasadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i1.pp140-149

Abstract

As a hopeful computing paradigm, cloud services are obtainable to end users based on pay-as-you-go service. Security is represented one of the vital issues for the extended adoption of cloud computing, with the object of accessing several cloud service providers, applications, and services by using anonymity features to authenticate the user. We present a good authentication scheme based on quick response (QR) code and smart card. Furthermore, our proposed scheme has several crucial merits such as key management, mutual authentication, one-time password, user anonymity, freely chosen password, secure password changes, and revocation by using QR code. The security of proposed scheme depends on crypto-hash function, QR-code validation, and smart card. Moreover, we view that our proposed scheme can resist numerous malicious attacks and are more appropriate for practical applications than other previous works. The proposed scheme has proved as a strong mutual authentication based on burrows-abadi-needham (BAN) logic and security analysis. Furthermore, our proposed scheme has good results compared with related work.
Ensuring Data Integrity Scheme Based on Digital Signature and Iris Features in Cloud Salah H. Abbdal; Thair A. Kadhim; Zaid Ameen Abduljabbar; Zaid Alaa Hussien; Ali A. Yassin; Mohammed Abdulridha Hussain; Salam Waley
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 2: May 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i2.pp452-460

Abstract

Cloud computing is a novel paradigm that allows users to remotely access their data through web- based tools and applications. Later, the users do not have the ability to monitor or arrange their data. In this case, many security challenges have been raised. One of these challenges is data integrity. Contentiously, the user cannot access his data directly and he could not know whether his data is modified or not. Therefore, the cloud service provider should provide efficient ways for the user to ascertain whether the integrity of his data is protected or compromised. In this paper, we focus on the problem of ensuring the integrity of data stored in the cloud. Additionally, we propose a method which combines biometric and cryptography techniques in a cost-effective manner for data owners to gain trust in the cloud. We present efficient and secure integrity based on the iris feature extraction and digital signature.  Iris recognition has become a new, emergent approach to individual identification in the last decade. It is one of the most accurate identity verification systems. This technique gives the cloud user more confidence in detecting any block that has been changed. Additionally, our proposed scheme employs user’s iris features to secure and integrate data in a manner difficult for any internal or external unauthorized entity to take or compromise it. Iris recognition is an internal organ that is well protected against damage and wear by a highly transparent and sensitive membrane. Extensive security and performance analysis show that our proposed scheme is highly efficient and provably secure.
A novel image encryption scheme based on DCT transform and DNA sequence Ali A. Yassin; Abdullah Mohammed Rashid; Abdulla J. Yassin; Hamid Alasadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 3: March 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i3.pp1455-1464

Abstract

Recently, the concept of DNA has been invested in computing technology in different ways which linking information technology and biological sciences. There are several encryption algorithms based on DNA encoding that has been proposed, which leads to generating a new direction in image encryption. However, the DNA encryption scheme has drawbacks such as expensive experimental equipment, difficult operations, and hard to hold its biotechnology. Additionally, during careful cryptanalysis that applied to most of these image encryption schemes, we notice that DNA operators can only influence one DNA base, which causes poor diffusion. Our proposed scheme is not applied complex biological operation but just is given to improve the diffusion ability of image encryption scheme by using DNA sequence and DCT transform. Our works overcome above-aforementioned issues. Furthermore, empirical results on real images and security analysis demonstrate that our proposed scheme not only has flexibility and efficiency encryption scheme but also has the ability to resist well-known attacks such as entropy attack, differential attack, statistical attack, chosen/known plain image attack. Additionally, our work enjoys several strong characteristics as follows: (1) the decryption error is very low to recover the original image; (2) Once key for each encryption process and if the user wants to use the same key in many times, our proposed scheme supports secret key sensitivity; (3) the value of correlation of the encrypted image is null; (4) the scrambling process is good and generate high disorder at the output. As a result, our proposed scheme achieves a good balance between strong security and high performance.
Secure authentication and privacy-preserving to improve video streaming vehicle ad-hoc network Akeel Kassim Leaby; Mustafa Khalefa; Mushtaq A. Hasson; Ali A. Yassin
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 1: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i1.pp480-487

Abstract

In vehicular ad hoc networks (VANET), the privacy of vehicle data symbolizes a big challenge towards malicious attacks. On the other side, vehicles in VANET can play a staple role in monitoring the environment by sensing the surrounding environment, compute the sensing information, and transfer the results if needed to the authorized party. Most of the modern VANETs systems encrypt the information to prevent hacking it but mostly neglect the decryption that occurred when data need to re-processed. In this paper, we try to cover this weak point by using fully homomorphic encryption (FHE) because of its specifications. The proposed work focus on twofold: first, create secure authentication and permission management system. While the second is to preserve the privacy of vehicle data that transferred among VANET infrastructure. This scheme also deals with metric security features, such as data privacy, data integrity, and key management. In the experimental results, there is good advance in the fields of interest comparing with the related works.
Building an efficient content based image retrieval system by changing the database structure Rana Jassim Mohammed; Abdulla J. Y. Aldarwish; Ali A. Yassin
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i3.pp1817-1825

Abstract

The amount of interest in digital images is growing because of the advent of the World Wide Web. Many different industries are making use of digital images today, including medicine, design, journalism, education, and more. Images can be stored and retrieved using a variety of techniques and methods. Nevertheless, the majority of those engines are dependent on Meta data (key-words, descriptions, tags). Although efficient, costly, and able to target keywords and tags with each image, and these engines have their shortcomings. Though it may be possible to use a filtering system to give more accurate results, there are additional issues.