Zolidah Kasiran
Universiti Teknologi MARA

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Randomize IPv6 Stateless Address Autoconfiguration in None-stable Storage Arduino Devices Zolidah Kasiran; Rizaki Napi
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i1.pp254-260

Abstract

The pervasiveness of IoT device requires each device to have a unique address number in order to communicate. Internet Standard specified in RFC4941-Privacy Extension for SLAAC had question raised on the randomness of the IPv6 address generated due to the shortcoming of device random generator algorithm. Improvements to the RFC’s have been proposed and Arduino Uno had been selected as IoT platform since it currently supports IPv6 implementation. An enhancement algorithm was developed. The generated IPv6 address is then tested against ENT Random Test tool for observation and conclusion.
An advance encryption standard cryptosystem in IoT transaction Zolidah Kasiran; Shapina Abdullah; Normazlie Mohd Nor
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 3: March 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v17.i3.pp1548-1554

Abstract

IoT create an ecosystem that can be useful to the world with its various services. That make the security of IoT is more important. This paper presents a proposed technique to secure data transaction from IoT device to other node using cryptography technique. AES cryptography and IoT device model ESP8266 is used as a client to send data to a server via HTTP protocol. Security performance matrices used eavesdropping attack with Wireshark sniffing and brute-force attack. will be simulated to the proposed method in order to ensure if there is any possibility it can be cracked using those attacks and to evaluate the performance of ESP8266, several experiments were be conducted. Result gather from this experiment was evaluated based on processing time to see the effectiveness of the platform compare to different data size used while adapting this technique.
Time performance analysis of advanced encryption standard and data encryption standard in data security transaction Zolidah Kasiran; Hikma Farah Ali; Noorhayati Mohamed Noor
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i2.pp988-994

Abstract

The advancement of the data communication technologies has increased the traffic of data exchange over the internet and at the same time created the opportunity of data attack by various party.  This paper present  Time Performance Analysis Of Advanced Encryption Standard And Data Encryption Standard  in Data Security Transaction. In this study we proposed an AES algorithm with  different key size, and different file format. Our aim is to safely to transfer the file for using the AES algorithm. Proposed algorithm has done by analyzing the different time taken for both AES and DES, experiments were done by three different file  format which were text, image, and voice. Each file format type was tested with five different file sizes. The result of each experiments were analysed and it was confirmed that  the AES algorithm have better performance in term of time taken as compared to DES.