Dr. Vincent O . Nyangaresi | Jaramogi Oginga Odinga University of Science & Technology (original) (raw)

Papers by Dr. Vincent O . Nyangaresi

Research paper thumbnail of An Adaptive Hybrid (1D-2D) Convolution-based ShuffleNetV2 Mechanism for Irrigation Levels Prediction in Agricultural Fields with Smart IoTs

Research paper thumbnail of Signal propagation parameters estimation through designed multi layer fibre with higher dominant modes using OptiFibre simulation

Journal of Optical Communications

The aim and scope of the paper is to simulate the signal propagation parameters estimation throug... more The aim and scope of the paper is to simulate the signal propagation parameters estimation through designed multi-layer fibre with higher dominant modes by using OptiFibre simulation software. The multi-layer fibre profile has a length of 1000 m is designed and clarified with six layers. RI difference profile variations are clarified with radial distance variations. Modal/group index, group delay, dispersion, mode field diameter and total fibre losses are demonstrated with the fibre wavelength variations. All the dominant mode field distribution for multi-layer fibre are simulated and demonstrated. The other modes for designed multi-layer fibre with the theoretical fibre cutoff values for the different modes based the designed multi-layer fibre are analyzed and clarified clearly in details.

Research paper thumbnail of Multifactor data analysis to forecast an individual's severity over novel COVID‐19 pandemic using extreme gradient boosting and random forest classifier algorithms

Engineering Reports

AI and machine learning are increasingly often applied in the medical industry. The COVID‐19 epid... more AI and machine learning are increasingly often applied in the medical industry. The COVID‐19 epidemic will start to spread quickly over the planet around the start of 2020. At hospitals, there were more patients than there were beds. It was challenging for medical personnel to identify the patient who needed treatment right away. A machine learning approach is used to predict COVID‐19 pandemic patients at high risk. To provide input data and output results that execute the machine learning model on the backend, a straightforward Python Flask web application is employed. Here, the XGBoost algorithm, a supervised machine learning method, is applied. In order to predict high‐risk patients based on their current underlying health issues, the model uses patient characteristics as well as criteria like age, sex, health issues including diabetes, asthma, hypertension, and smoking, among others. The XGBoost model predicts the patient's severity with an accuracy of about 98% after data p...

Research paper thumbnail of Session Key Agreement Protocol for Secure D2D Communication

EAI/Springer Innovations in Communication and Computing, Jun 12, 2022

Research paper thumbnail of Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture

Sustainability, Jun 28, 2023

This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY

Research paper thumbnail of Multifactor data analysis to forecast an individual's severity over novel COVID‐19 pandemic using extreme gradient boosting and random forest classifier algorithms

Engineering reports, May 21, 2023

AI and machine learning are increasingly often applied in the medical industry. The COVID‐19 epid... more AI and machine learning are increasingly often applied in the medical industry. The COVID‐19 epidemic will start to spread quickly over the planet around the start of 2020. At hospitals, there were more patients than there were beds. It was challenging for medical personnel to identify the patient who needed treatment right away. A machine learning approach is used to predict COVID‐19 pandemic patients at high risk. To provide input data and output results that execute the machine learning model on the backend, a straightforward Python Flask web application is employed. Here, the XGBoost algorithm, a supervised machine learning method, is applied. In order to predict high‐risk patients based on their current underlying health issues, the model uses patient characteristics as well as criteria like age, sex, health issues including diabetes, asthma, hypertension, and smoking, among others. The XGBoost model predicts the patient's severity with an accuracy of about 98% after data pre‐processing and training. The most important factors to the models are chosen to be age, diabetes, sex, and obesity. Patients and hospital personnel will benefit from this project's assistance in making timely choices and taking appropriate action. This will let medical personnel decide how much time and space to devote to the COVID‐19 high‐risk patients. providing a treatment that is both efficient and ideal. With this programme and the necessary patient data, hospitals may decide whether a patient need immediate care or not.

Research paper thumbnail of Session Key Agreement Protocol for Secure D2D Communication

EAI/Springer Innovations in Communication and Computing, Jun 12, 2022

Research paper thumbnail of Signal propagation parameters estimation through designed multi layer fibre with higher dominant modes using OptiFibre simulation

Journal of optical communications, Jun 23, 2022

The aim and scope of the paper is to simulate the signal propagation parameters estimation throug... more The aim and scope of the paper is to simulate the signal propagation parameters estimation through designed multi-layer fibre with higher dominant modes by using OptiFibre simulation software. The multi-layer fibre profile has a length of 1000 m is designed and clarified with six layers. RI difference profile variations are clarified with radial distance variations. Modal/group index, group delay, dispersion, mode field diameter and total fibre losses are demonstrated with the fibre wavelength variations. All the dominant mode field distribution for multi-layer fibre are simulated and demonstrated. The other modes for designed multi-layer fibre with the theoretical fibre cutoff values for the different modes based the designed multi-layer fibre are analyzed and clarified clearly in details.

Research paper thumbnail of Trusted authority based session key agreement and authentication algorithm for smart grid networks

Transactions on Emerging Telecommunications Technologies, May 6, 2022

The information exchanged over the smart grid networks is sensitive and private. As such, proper ... more The information exchanged over the smart grid networks is sensitive and private. As such, proper mechanisms must be put in place to protect these messages from security and privacy violations. Although many schemes have been presented in literature to address these challenges, a number of them rarely consider concurrent authentication of smart meters, while some are inefficient or still lack some of the smart grid network security and privacy requirements. In this article, a novel concurrent smart meters authentication algorithm is presented, based on some trusted authority. Formal security analysis of this algorithm is executed using Burrows‐Abadi‐Needham logic, which shows that this algorithm provides strong authentication among the smart meter, utility service provider and trusted authority. In addition, session keys are independently computed and verified between the smart meter and utility service provider with the help of the trusted authority. Informal security analysis shows that this algorithm provides device anonymity, perfect forward key secrecy, strong mutual authentication and is resilient against replay, de‐synchronization, privileged insider, impersonation, eavesdropping, side‐channel, and traceability attacks. In terms of performance, the proposed algorithm exhibits the least communication and computation overheads when compared with other related schemes.

Research paper thumbnail of Extended Chebyshev Chaotic Map Based Message Verification Protocol for Wireless Surveillance Systems

Algorithms for intelligent systems, 2023

Research paper thumbnail of Concurrent pipeline rendering scheme based on GPU multi-queue and partitioning images

International Conference on Optics and Machine Vision (ICOMV 2023)

Research paper thumbnail of Privacy Preserving Three-factor Authentication Protocol for Secure Message Forwarding in Wireless Body Area Networks

Research paper thumbnail of Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography

Journal of Systems Architecture

Radio-frequency identification (RFID) technologies are making their way into retail products, lib... more Radio-frequency identification (RFID) technologies are making their way into retail products, library books, debit cards, passports, driver licenses, car plates, medical devices, and so on. The widespread use of tags in traditional ways of deployment raises a privacy concern: they make their carriers trackable. To protect the privacy of the tag carriers, we need to invent new mechanisms that keep the usefulness of tags while doing so anonymously. Many tag applications, such as toll payment, require authentication. This paper studies the problem of anonymous authentication. Since low-cost tags have extremely limited hardware resource, we propose an asymmetric design principle that pushes most complexity to more powerful RFID readers. With this principle, we develop a lightweight technique that generates dynamic tokens for anonymous authentication. Instead of implementing complicated and hardware-intensive cryptographic hash functions, our authentication protocol only requires tags to perform several simple and hardware-efficient operations such as bitwise XOR, one-bit left circular shift, and bit flip. The theoretical analysis and randomness tests demonstrate that our protocol can ensure the privacy of the tags. Moreover, our protocol reduces the communication overhead and online computation overhead to O(1) per authentication for both tags and readers, which compares favorably with the prior art.

Research paper thumbnail of Terminal independent security token derivation scheme for ultra-dense IoT networks

Research paper thumbnail of Secure Protocol for Resource-Constrained IoT Device Authentication

International Journal of Interdisciplinary Telecommunications and Networking

Wireless sensor networks (WSNs) are crucial components of internet of things (IoT) and have been ... more Wireless sensor networks (WSNs) are crucial components of internet of things (IoT) and have been deployed in numerous fields such as battlefield surveillance. The exploitation of broadcasts in WSNs renders these networks susceptible to numerous attacks. Consequently, to boost security, reliability, and successful cooperation, trust must be established among the sensor nodes. Unfortunately, the current authentication and authorization approaches exhibit high key management overheads, depend on static digital signatures or trusted third parties, and have both high communication latencies and computational complexity that render them inefficient. In this paper, challenge-response mutual authentication protocol is proposed for enhancing security in WSN-based IoT environment. The simulation results showed that the proposed protocol has the least transaction costs, time complexity, end to end delays and energy consumptions. It is also resilient against dictionary, side channel, cloning, m...

Research paper thumbnail of Spatial single mode laser source interaction with measured pulse based parabolic index multimode fiber

Journal of Optical Communications

The study clarified spatial single mode laser interaction with measured pulse based parabolic ind... more The study clarified spatial single mode laser interaction with measured pulse based parabolic index multimode fiber. Peak power level margin, maximum/minimum signal amplitude margin after parabolic index multimode fiber are measured with core radius of 25 µm, cladding thickness of 10 µm, refractive index peak of 1.4142, length of 300 m, and refractive index step of 1%. Maximum signal power margin against spectral frequency after PIN light detector based parabolic fiber properties is tested under the same operating parameters. The signal power amplitude/power within parabolic index multimode fiber is also measured based on variations of fiber lengths and relative refractive index step. The study implies the multimode graded index fibers with parabolic or near parabolic index profile cores have transmission bandwidths than other multimode fibers.

Research paper thumbnail of Secure and Low-Complexity Medical Image Exchange Based on Compressive Sensing and LSB Audio Steganography

Research paper thumbnail of Mutual Authentication Protocol for Secure VANET Data Exchanges

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2021

The initial signaling and data exchanges over open wireless transmission channels in vehicular ad... more The initial signaling and data exchanges over open wireless transmission channels in vehicular ad hoc networks (VANETs) renders these networks susceptible to security and privacy violation attacks such as impersonation and packet replays. To curb this, a number of protocols have been proposed such as Public Key Infrastructure (PKI) based schemes, identity (ID) based schemes, anonymity based approaches and password or biometric based schemes. However, PKI based schemes have high computational overheads while ID based schemes are vulnerable to denial of service attacks (DoS). On the other hand, password and biometric based schemes employ the long term shared secrets stored in tamper proof devices (TPD) as the sole authentication factor, rendering them vulnerable to side-channel attacks. On their part, anonymity based approaches employ either digital certificates, pseudonyms or group signatures. However, these schemes do not offer trajectory privacy, conventional signature signing and verification is inefficient, and certificate storage or revocation leads to high storage and computation costs. In this paper, a multi-factor mutual authentication protocol that addressed some of these attacks is proposed. This scheme eliminates the requirement for long term storage of secret keys on TPD and remained secure even in the face of on-broad unit (OBU) active physical attack. Simulation results showed that the proposed protocol is robust against attacks such as privileged insider, masquerade and packet replay. It also preserved backward key secrecy, forward key secrecy, password secrecy and anonymity. Its performance evaluation revealed that it exhibited average computation and communication overheads, in addition to average beacon generation and verification latencies.

Research paper thumbnail of ECC Based Authentication Scheme for Smart Homes

2021 International Symposium ELMAR, 2021

Smart homes security has attracted a lot of attention from both the industry and academia, leadin... more Smart homes security has attracted a lot of attention from both the industry and academia, leading to the development of numerous schemes for both key management and authentication. However, most of these schemes are either inefficient due to both high communication and computational costs, or do not fully offer the required levels of both privacy and security. To address some of these issues, this paper proposed elliptic curve cryptography (ECC) based lightweight key management and mutual authentication protocol for the smart home environment. The performance evaluation of the proposed protocol was accomplished using communication costs, computation overheads, throughput and end-to-end- delays (EED). On the other hand, widely applied Dolev–Yao and Canetti-Krawczyk models were deployed for security evaluation of the proposed protocol. The simulation results showed that this protocol exhibited the least communication and computation overheads, and had the least impact on both throughput and EED compared with related schemes. Moreover, it was robust against conventional smart home attacks such as replay, forgery, impersonation and man-in-the middle (MitM) attacks.

Research paper thumbnail of On the Security of the Standardized MQV Protocol and Its Based Evolution Protocols

2021 International Conference on Information Technology (ICIT), 2021

The MQV is an authenticated key agreement protocol which does not use any one-way hash functions ... more The MQV is an authenticated key agreement protocol which does not use any one-way hash functions in its block design, and it is standardized in (IEEE, ANSI, and ISO). However, its two-pass form cannot withstand an unknown key share attack. Krawczyk proposed a hashed version of MQV (HMQV) to overcome the attack on MQV, but HMQV is vulnerable to small subgroup attacks. LaMacchia et al presented a strong security definition for authenticated key exchange protocol as extended Canetti-Krawczyk (eCK) to catch new attacks from a strong adversary. Ustaoglu proposed a hashed ephemeral private key with static private key of HMQV (CMQV) to have a security proof in eCK. Sarr et al showed key compromise impersonation and man-in-the-middle attacks on HMQV under revealing a signature of Diffie-Hellman of public keys and proposed fully HMQV (FHMQV) and strengthen MQV (SMQV) to overcome those attacks. In this study, we show the known key security attack on the MQV protocol and its variants (MQV, HMQV, CMQV, FHMQV, eFHMQV and SMQV) protocols, if both ephemeral private keys and the ephemeral session key equation are revealed by an extremely adversary; the extremely adversary is able to obtain the shared static key between two-party participants. As consequence, we show the shared static-key compromise impersonation attack on the MQV protocol and its evolutions protocols. Moreover, we show that the MTI/A(0) key agreement protocol cannot withstand key compromise impersonation attacks against stronger adversary revelation attacks.

Research paper thumbnail of An Adaptive Hybrid (1D-2D) Convolution-based ShuffleNetV2 Mechanism for Irrigation Levels Prediction in Agricultural Fields with Smart IoTs

Research paper thumbnail of Signal propagation parameters estimation through designed multi layer fibre with higher dominant modes using OptiFibre simulation

Journal of Optical Communications

The aim and scope of the paper is to simulate the signal propagation parameters estimation throug... more The aim and scope of the paper is to simulate the signal propagation parameters estimation through designed multi-layer fibre with higher dominant modes by using OptiFibre simulation software. The multi-layer fibre profile has a length of 1000 m is designed and clarified with six layers. RI difference profile variations are clarified with radial distance variations. Modal/group index, group delay, dispersion, mode field diameter and total fibre losses are demonstrated with the fibre wavelength variations. All the dominant mode field distribution for multi-layer fibre are simulated and demonstrated. The other modes for designed multi-layer fibre with the theoretical fibre cutoff values for the different modes based the designed multi-layer fibre are analyzed and clarified clearly in details.

Research paper thumbnail of Multifactor data analysis to forecast an individual's severity over novel COVID‐19 pandemic using extreme gradient boosting and random forest classifier algorithms

Engineering Reports

AI and machine learning are increasingly often applied in the medical industry. The COVID‐19 epid... more AI and machine learning are increasingly often applied in the medical industry. The COVID‐19 epidemic will start to spread quickly over the planet around the start of 2020. At hospitals, there were more patients than there were beds. It was challenging for medical personnel to identify the patient who needed treatment right away. A machine learning approach is used to predict COVID‐19 pandemic patients at high risk. To provide input data and output results that execute the machine learning model on the backend, a straightforward Python Flask web application is employed. Here, the XGBoost algorithm, a supervised machine learning method, is applied. In order to predict high‐risk patients based on their current underlying health issues, the model uses patient characteristics as well as criteria like age, sex, health issues including diabetes, asthma, hypertension, and smoking, among others. The XGBoost model predicts the patient's severity with an accuracy of about 98% after data p...

Research paper thumbnail of Session Key Agreement Protocol for Secure D2D Communication

EAI/Springer Innovations in Communication and Computing, Jun 12, 2022

Research paper thumbnail of Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture

Sustainability, Jun 28, 2023

This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY

Research paper thumbnail of Multifactor data analysis to forecast an individual's severity over novel COVID‐19 pandemic using extreme gradient boosting and random forest classifier algorithms

Engineering reports, May 21, 2023

AI and machine learning are increasingly often applied in the medical industry. The COVID‐19 epid... more AI and machine learning are increasingly often applied in the medical industry. The COVID‐19 epidemic will start to spread quickly over the planet around the start of 2020. At hospitals, there were more patients than there were beds. It was challenging for medical personnel to identify the patient who needed treatment right away. A machine learning approach is used to predict COVID‐19 pandemic patients at high risk. To provide input data and output results that execute the machine learning model on the backend, a straightforward Python Flask web application is employed. Here, the XGBoost algorithm, a supervised machine learning method, is applied. In order to predict high‐risk patients based on their current underlying health issues, the model uses patient characteristics as well as criteria like age, sex, health issues including diabetes, asthma, hypertension, and smoking, among others. The XGBoost model predicts the patient's severity with an accuracy of about 98% after data pre‐processing and training. The most important factors to the models are chosen to be age, diabetes, sex, and obesity. Patients and hospital personnel will benefit from this project's assistance in making timely choices and taking appropriate action. This will let medical personnel decide how much time and space to devote to the COVID‐19 high‐risk patients. providing a treatment that is both efficient and ideal. With this programme and the necessary patient data, hospitals may decide whether a patient need immediate care or not.

Research paper thumbnail of Session Key Agreement Protocol for Secure D2D Communication

EAI/Springer Innovations in Communication and Computing, Jun 12, 2022

Research paper thumbnail of Signal propagation parameters estimation through designed multi layer fibre with higher dominant modes using OptiFibre simulation

Journal of optical communications, Jun 23, 2022

The aim and scope of the paper is to simulate the signal propagation parameters estimation throug... more The aim and scope of the paper is to simulate the signal propagation parameters estimation through designed multi-layer fibre with higher dominant modes by using OptiFibre simulation software. The multi-layer fibre profile has a length of 1000 m is designed and clarified with six layers. RI difference profile variations are clarified with radial distance variations. Modal/group index, group delay, dispersion, mode field diameter and total fibre losses are demonstrated with the fibre wavelength variations. All the dominant mode field distribution for multi-layer fibre are simulated and demonstrated. The other modes for designed multi-layer fibre with the theoretical fibre cutoff values for the different modes based the designed multi-layer fibre are analyzed and clarified clearly in details.

Research paper thumbnail of Trusted authority based session key agreement and authentication algorithm for smart grid networks

Transactions on Emerging Telecommunications Technologies, May 6, 2022

The information exchanged over the smart grid networks is sensitive and private. As such, proper ... more The information exchanged over the smart grid networks is sensitive and private. As such, proper mechanisms must be put in place to protect these messages from security and privacy violations. Although many schemes have been presented in literature to address these challenges, a number of them rarely consider concurrent authentication of smart meters, while some are inefficient or still lack some of the smart grid network security and privacy requirements. In this article, a novel concurrent smart meters authentication algorithm is presented, based on some trusted authority. Formal security analysis of this algorithm is executed using Burrows‐Abadi‐Needham logic, which shows that this algorithm provides strong authentication among the smart meter, utility service provider and trusted authority. In addition, session keys are independently computed and verified between the smart meter and utility service provider with the help of the trusted authority. Informal security analysis shows that this algorithm provides device anonymity, perfect forward key secrecy, strong mutual authentication and is resilient against replay, de‐synchronization, privileged insider, impersonation, eavesdropping, side‐channel, and traceability attacks. In terms of performance, the proposed algorithm exhibits the least communication and computation overheads when compared with other related schemes.

Research paper thumbnail of Extended Chebyshev Chaotic Map Based Message Verification Protocol for Wireless Surveillance Systems

Algorithms for intelligent systems, 2023

Research paper thumbnail of Concurrent pipeline rendering scheme based on GPU multi-queue and partitioning images

International Conference on Optics and Machine Vision (ICOMV 2023)

Research paper thumbnail of Privacy Preserving Three-factor Authentication Protocol for Secure Message Forwarding in Wireless Body Area Networks

Research paper thumbnail of Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography

Journal of Systems Architecture

Radio-frequency identification (RFID) technologies are making their way into retail products, lib... more Radio-frequency identification (RFID) technologies are making their way into retail products, library books, debit cards, passports, driver licenses, car plates, medical devices, and so on. The widespread use of tags in traditional ways of deployment raises a privacy concern: they make their carriers trackable. To protect the privacy of the tag carriers, we need to invent new mechanisms that keep the usefulness of tags while doing so anonymously. Many tag applications, such as toll payment, require authentication. This paper studies the problem of anonymous authentication. Since low-cost tags have extremely limited hardware resource, we propose an asymmetric design principle that pushes most complexity to more powerful RFID readers. With this principle, we develop a lightweight technique that generates dynamic tokens for anonymous authentication. Instead of implementing complicated and hardware-intensive cryptographic hash functions, our authentication protocol only requires tags to perform several simple and hardware-efficient operations such as bitwise XOR, one-bit left circular shift, and bit flip. The theoretical analysis and randomness tests demonstrate that our protocol can ensure the privacy of the tags. Moreover, our protocol reduces the communication overhead and online computation overhead to O(1) per authentication for both tags and readers, which compares favorably with the prior art.

Research paper thumbnail of Terminal independent security token derivation scheme for ultra-dense IoT networks

Research paper thumbnail of Secure Protocol for Resource-Constrained IoT Device Authentication

International Journal of Interdisciplinary Telecommunications and Networking

Wireless sensor networks (WSNs) are crucial components of internet of things (IoT) and have been ... more Wireless sensor networks (WSNs) are crucial components of internet of things (IoT) and have been deployed in numerous fields such as battlefield surveillance. The exploitation of broadcasts in WSNs renders these networks susceptible to numerous attacks. Consequently, to boost security, reliability, and successful cooperation, trust must be established among the sensor nodes. Unfortunately, the current authentication and authorization approaches exhibit high key management overheads, depend on static digital signatures or trusted third parties, and have both high communication latencies and computational complexity that render them inefficient. In this paper, challenge-response mutual authentication protocol is proposed for enhancing security in WSN-based IoT environment. The simulation results showed that the proposed protocol has the least transaction costs, time complexity, end to end delays and energy consumptions. It is also resilient against dictionary, side channel, cloning, m...

Research paper thumbnail of Spatial single mode laser source interaction with measured pulse based parabolic index multimode fiber

Journal of Optical Communications

The study clarified spatial single mode laser interaction with measured pulse based parabolic ind... more The study clarified spatial single mode laser interaction with measured pulse based parabolic index multimode fiber. Peak power level margin, maximum/minimum signal amplitude margin after parabolic index multimode fiber are measured with core radius of 25 µm, cladding thickness of 10 µm, refractive index peak of 1.4142, length of 300 m, and refractive index step of 1%. Maximum signal power margin against spectral frequency after PIN light detector based parabolic fiber properties is tested under the same operating parameters. The signal power amplitude/power within parabolic index multimode fiber is also measured based on variations of fiber lengths and relative refractive index step. The study implies the multimode graded index fibers with parabolic or near parabolic index profile cores have transmission bandwidths than other multimode fibers.

Research paper thumbnail of Secure and Low-Complexity Medical Image Exchange Based on Compressive Sensing and LSB Audio Steganography

Research paper thumbnail of Mutual Authentication Protocol for Secure VANET Data Exchanges

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2021

The initial signaling and data exchanges over open wireless transmission channels in vehicular ad... more The initial signaling and data exchanges over open wireless transmission channels in vehicular ad hoc networks (VANETs) renders these networks susceptible to security and privacy violation attacks such as impersonation and packet replays. To curb this, a number of protocols have been proposed such as Public Key Infrastructure (PKI) based schemes, identity (ID) based schemes, anonymity based approaches and password or biometric based schemes. However, PKI based schemes have high computational overheads while ID based schemes are vulnerable to denial of service attacks (DoS). On the other hand, password and biometric based schemes employ the long term shared secrets stored in tamper proof devices (TPD) as the sole authentication factor, rendering them vulnerable to side-channel attacks. On their part, anonymity based approaches employ either digital certificates, pseudonyms or group signatures. However, these schemes do not offer trajectory privacy, conventional signature signing and verification is inefficient, and certificate storage or revocation leads to high storage and computation costs. In this paper, a multi-factor mutual authentication protocol that addressed some of these attacks is proposed. This scheme eliminates the requirement for long term storage of secret keys on TPD and remained secure even in the face of on-broad unit (OBU) active physical attack. Simulation results showed that the proposed protocol is robust against attacks such as privileged insider, masquerade and packet replay. It also preserved backward key secrecy, forward key secrecy, password secrecy and anonymity. Its performance evaluation revealed that it exhibited average computation and communication overheads, in addition to average beacon generation and verification latencies.

Research paper thumbnail of ECC Based Authentication Scheme for Smart Homes

2021 International Symposium ELMAR, 2021

Smart homes security has attracted a lot of attention from both the industry and academia, leadin... more Smart homes security has attracted a lot of attention from both the industry and academia, leading to the development of numerous schemes for both key management and authentication. However, most of these schemes are either inefficient due to both high communication and computational costs, or do not fully offer the required levels of both privacy and security. To address some of these issues, this paper proposed elliptic curve cryptography (ECC) based lightweight key management and mutual authentication protocol for the smart home environment. The performance evaluation of the proposed protocol was accomplished using communication costs, computation overheads, throughput and end-to-end- delays (EED). On the other hand, widely applied Dolev–Yao and Canetti-Krawczyk models were deployed for security evaluation of the proposed protocol. The simulation results showed that this protocol exhibited the least communication and computation overheads, and had the least impact on both throughput and EED compared with related schemes. Moreover, it was robust against conventional smart home attacks such as replay, forgery, impersonation and man-in-the middle (MitM) attacks.

Research paper thumbnail of On the Security of the Standardized MQV Protocol and Its Based Evolution Protocols

2021 International Conference on Information Technology (ICIT), 2021

The MQV is an authenticated key agreement protocol which does not use any one-way hash functions ... more The MQV is an authenticated key agreement protocol which does not use any one-way hash functions in its block design, and it is standardized in (IEEE, ANSI, and ISO). However, its two-pass form cannot withstand an unknown key share attack. Krawczyk proposed a hashed version of MQV (HMQV) to overcome the attack on MQV, but HMQV is vulnerable to small subgroup attacks. LaMacchia et al presented a strong security definition for authenticated key exchange protocol as extended Canetti-Krawczyk (eCK) to catch new attacks from a strong adversary. Ustaoglu proposed a hashed ephemeral private key with static private key of HMQV (CMQV) to have a security proof in eCK. Sarr et al showed key compromise impersonation and man-in-the-middle attacks on HMQV under revealing a signature of Diffie-Hellman of public keys and proposed fully HMQV (FHMQV) and strengthen MQV (SMQV) to overcome those attacks. In this study, we show the known key security attack on the MQV protocol and its variants (MQV, HMQV, CMQV, FHMQV, eFHMQV and SMQV) protocols, if both ephemeral private keys and the ephemeral session key equation are revealed by an extremely adversary; the extremely adversary is able to obtain the shared static key between two-party participants. As consequence, we show the shared static-key compromise impersonation attack on the MQV protocol and its evolutions protocols. Moreover, we show that the MTI/A(0) key agreement protocol cannot withstand key compromise impersonation attacks against stronger adversary revelation attacks.