Preferred Language
Articles
/
ijs-5647
Secure Location Privacy Transmitting Information on Cellular Networks

      As smartphones incorporate location data, there is a growing concern about location  privacy as smartphone technologies advance. Using a remote server, the mobile applications are able to capture the current location coordinates at any time and store them. The client awards authorization to an outsider. The outsider can gain admittance to area information on the worker by JSON Web Token (JWT). Protection is giving cover to clients, access control, and secure information stockpiling. Encryption guarantees the security of the location area on the remote server using the Rivest Shamir Adleman (RSA) algorithm. This paper introduced two utilizations of cell phones (tokens, and location). The principal application can give area information by means of the geographic position method of these gadgets. Every cell phone can create a token. The token holds secret keys got from versatile fixed identifiers for the most part of the Social Security Number (SSN) for each SIM (Endorser Personality Module) Chronic Number) and IMEI (Global Portable Hardware Character) by RSA calculation. The token is going through the short and informative administration of Short Message Service (SMS) from the client to the outsider. Information is scrambled before being stored on a faraway worker. The actual worker can't comprehend the area’s information. The third-party cannot follow the area if the client utilizes distinctive mystery keys. The client’s data and area information are saved by the various workers. The proposed application offers a mysterious sharing instrument that uses token verification to grant clients access to scrambled area data and provides encryption data in a remote server with an authentication token, achieving mutual authentication on each mobile device and user concealment.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 01 2012
Journal Name
2012 8th International Conference On Wireless Communications, Networking And Mobile Computing
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Sat Jan 26 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi

... Show More
Publication Date
Wed Jun 27 2018
Journal Name
Wireless Communications And Mobile Computing
Developing a Video Buffer Framework for Video Streaming in Cellular Networks

This work proposes a new video buffer framework (VBF) to acquire a favorable quality of experience (QoE) for video streaming in cellular networks. The proposed framework consists of three main parts: client selection algorithm, categorization method, and distribution mechanism. The client selection algorithm was named independent client selection algorithm (ICSA), which is proposed to select the best clients who have less interfering effects on video quality and recognize the clients’ urgency based on buffer occupancy level. In the categorization method, each frame in the video buffer is given a specific number for better estimation of the playout outage probability, so it can efficiently handle so many frames from different video

... Show More
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
Scopus (1)
Crossref (17)
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jan 01 2019
Journal Name
Wireless Communications And Mobile Computing
Scopus Clarivate Crossref
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Real-time control for the transmission of information in wireless networks

Wireless  lietworking is·  constantly improving,  changing  and

though  ba ic  principle  is the same.  ['nstead of  using standard  cables  to transmit information fmm one point to another (qr more), it .uses  radio signals.  This paper  presents .a case  study considedng real-time remote

cqntroJ using Wireless UDP/JP-based networks,. The aim of-this werk is to

reduce  real-time· remote control  system  based upon a simulatio.n  model,

which can operate via general communication  l"]etworks, whieh on bodies. modern wireles  tcchnolqgy.

The  first  part includes· a  brief

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 25 2023
Journal Name
Journal Of Legal Sciences
Privacy Of Jurisdiction

The right of jurisdiction is one of the legal systems related to the guarantee, which aims to give the creditor a position that favors him over other creditors. Jurisdiction in bona fide is a consequential real right over the real estate subject of jurisdiction, enabling him to collect his right ahead of all other ordinary creditors and owners of ancillary real rights, from the price of the real estate or any money that replaces it, and in whatever hands it is.

The right of jurisdiction, like the ancillary rights in rem, provides confidence to the creditor through his jurisdiction with a special guarantee that encourages him to grant credit to the debtor, by giving him a sufficient period for fulfillment, which is reflected in th

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Al–bahith Al–a'alami
Privacy Violation in Social Media Sites

Technological superiority of the means of communication and media has allowed these methods to dominate and are replaced by alternative positon of traditional media. The internet with its advantages and benefits benefited in various areas of life, especially media and achieve what no previous technology could achieve and any technology what comes after it can't be isolated from the internet. Today, the internet is the cornerstone of communication and connection in the world and the most important means of public and personal communication at the same time. The interactive feature of the internet and the cancelation of space and time restrictions create a new media that allowed everyone to express what they wanted freely. The internet app

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
A Secure Session Management Based on Threat Modeling

A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Network Authentication Protocol Based on Secure Biometric NIDN

In this paper an authentication based finger print biometric system is proposed with personal identity information of name and birthday. A generation of National Identification Number (NIDN) is proposed in merging of finger print features and the personal identity information to generate the Quick Response code (QR) image that used in access system. In this paper two approaches are dependent, traditional authentication and strong identification with QR and NIDN information. The system shows accuracy of 96.153% with threshold value of 50. The accuracy reaches to 100% when the threshold value goes under 50.

Scopus Crossref
View Publication Preview PDF