Behnam Rahnama
Eastern Mediterranean University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Behnam Rahnama.
computer software and applications conference | 2005
Atilla Elçi; Behnam Rahnama
Distributed processing environments such as that of a traffic management network system (TMS) can be implemented easier, faster, and secure and perform better through use of autonomous semantic agents (ASAs). For an ASA can then be realized as a semantic Web service, a whole TMS is easily implemented through a collection of semantic Web services agents arranged according to the topology of the traffic network. It would suffice to develop a generic ASA Web service class, instantiate individual ASAs from it in numbers as required one per junction, and supply specific intersection data in semantically-enriched representation to each. Should advanced information support and control services be required, one of the ASAs may be configured slightly differently in that it acts as the operational overseer and repository for aggregated data and ASA class code. Once created, this facilitator ASA knows the topology of the whole traffic network, identifies each intersection (and its associated ASA), can interrogate and instruct individual ASAs, aspects of ASA design, operation, and application development using ASAs are taken into consideration. Simulations show high performance and the benefits of load distribution using ASAs.
international conference on technological advances in electrical electronics and computer engineering | 2013
Behnam Rahnama; Arif Sari; Reza Makvandi
In high-speed data links, serial communications are replacing parallel communications rapidly. High-speed serial data links include backplane links such as PCI express and computer networking including Ethernet interfaces. This study tries to propose new solution for interconnection switches which use specially in HPC systems using a new jitter free data transfer technique for Serialization and Deserialization channels instead of PC Ie conventional links.
security of information and networks | 2010
Behnam Rahnama; Atilla Elçi; Selcuk Celik
Currently RFID authentication systems rely only on matching tag ID with the one kept in database. Additionally, an alphanumerical password might be matched as extra security. However, tag ID and information inside can be compromised. Therefore, a more secure scheme is required in order to enhance safety of access control through RFID tags in particularly highly secure environments such as secure virtual meetings or authentication and access control to access high security locals. We wish to present attendance control system which is more like access control in general as an application of our novel security enhancement on RFID based access control systems. The security enhancement utilizes partial ParseKey+ multi-way authentication scheme. ParseKey+ scatters randomly divided sub-keys into uniformly distributed noise. Generated file is encrypted using AES256 and then it is written into RFID device. Each successful login changes the key and its trace kept in DB in addition to updating the device for future login.
Complex Systems in Knowledge-based Environments | 2009
Atilla Elçi; Behnam Rahnama
This chapter focuses on design, implementation, and utilization of semantic robots dealing with cooperative problem solving in a natural setting such as discovery of exit from a labyrinth. In our approach to realize this goal, a new modular architecture for designing and implementation of cooperative labyrinth discovery robots (CLDRs) is devised. Both hardware and software aspects are considered in detail. Robot and agent ontology aspects are treated in detail with examples. Likewise, labyrinth data structure (Maze Set) is represented in Notation 3 and OWL standard formats useful for purposes of semantic logic data processing in scientific software environments such as Prolog, Protege, and MATLAB. Concepts of Semantic Web technology are introduced leading to a working understanding of semantic Web services (SWS). A CLDR acts as an agent offering SWS. Each agent is an autonomous complex system, which acts based on its sensory input, information retrieved from other agents, and ontology files for agent and domain. CLDR decision making was introduced based on either of the principles of open/closed World assumptions. Messaging and coordination aspects are addressed. The approach is to create semantic robotic agents based on SWS to implement autonomous semantic agents (ASAs). Several applications can be built based on ASA architecture, where semantic robotics can play a vital part: traffic management, interactive traffic information dissemination, creating intelligent environment through intelligent intersections, dispatching vehicular services, and homeland security.
computer software and applications conference | 2012
Behnam Rahnama; Atilla Elçi; Shadi Metani
Maze solving using multiple algorithms is one of the important problems in the last years, maze solving problem is to determine the path of a mobile robot from its source position to a destination position through a workspace populated with obstacles, in addition to finding the shortest path among the solutions. Autonomous robotics is a field with wide-reaching applications, from bomb-sniffing robots to autonomous devices for finding humans in wreckage to home automation; many people are interested in low-power, high speed, reliable solutions. we will introduce an algorithm to solve mazes and avoid robots to go through the long process, this algorithm is based on image processing and shortest path algorithm, the algorithm will work efficiently because of the preprocessing on mazes image data rather than going through the maze cell by cell. Therefore, it focuses on the entire maze rather than the current part that an agent is in it. This approach will give the robot preplanning time before falling in mistakes like loops and being trapped in a local minimum of dead ends of labyrinth besides saving time, because the entire maze map will be known before the navigation starts.
computer software and applications conference | 2009
Behnam Rahnama; Atilla Elçi; Ramin Bakhshi; Alirad Malek; Arjang Ahmadi
In this paper, a microcontroller-based Additive White Gaussian Noise Generator (AWGNG) for security enhancement of embedded real-time web services running on embedded boards is presented. The scheme utilizes combination of Windows Embedded Standard based Web Service on Vortex86 based embedded system connected to Atmega128 microcontroller generating Additive White Gaussian Noise stream. The real time generated stream can be used as seed for random number generators in many security algorithms. Such algorithms benefit from independently generated random numbers.
security of information and networks | 2009
Atilla Elçi; Behnam Rahnama
This research presents an enhancement in the ParseKey+ authentication scheme presented in an earlier research. Basically, ParseKey+ relies on scattering sub-keys in a block of uniformly created random noise. The sequence of noise is created using the same hash function used to create the sub-key itself. Using timestamp as seed does not help in countering replay attack in one-way encryption functions as it cannot be discovered to be compared in sequence. However, its imperfect usage causes discovering the sequence of generated random noise so that sub-keys are distinguishable. We require a pure uniform random noise to be used as seed of hash function. In this respect, Additive White Gaussian Noise (AWGN) is used to provide sequence of seeds for hash function in generating ParseKey+ noise file. Similarly, such random noise can be applied in all security schemes relying on one-way encryption algorithms or in those which need instant update of the key without having any dependency in key sequence.
2006 International Symposium on Computer Networks | 2006
Behnam Rahnama; Atilla Elçi
We consider recovery techniques for packet-loss in the multimedia streams at both sender- and receiver-sides. We investigate recovery techniques as bases of useless packet transmission avoidance in order to release bandwidth by avoiding sending unintelligible packets. At times, packet-loss exceeds a given threshold such that recovery techniques are not able to cope with packet-losses. Therefore, algorithms supplying lower latency and higher degree of recovery are needed. Moreover, faster algorithms for generating packets, transmitting, and recovering from losses in the streams, help managing unintelligible flow for the various multimedia streams. Here, we propose the fast forward algorithm (FFA) that removes latency in packet generation, is practical, and is very simple to implement. FFA is equally suitable for interactive and non-interactive applications. Simulation is used to show that FFA is superior to other interleaving methods
security of information and networks | 2012
Behnam Rahnama; Atilla Elçi; Ibukun Eweoya
The Advanced Encryption Standard has been playing a prominent role in embedded systems security for a decade after being announced by the National Institute of Standards and Technology (NIST). However, vulnerabilities have emerged, especially timing attacks, that challenges its security. This paper demonstrates the introduction of a unique diffusion and confusion scheme in Rijndael by incorporating ASCII codes manipulations using playfair ciphering into the algorithm; it is not dependent on the key and input thereby making it a constant time module in AES algorithm. The concept counters possible leakages from the S-box lookups; intermediary operations (SubstituteByte, ShiftRows, MixColumns, AddRoundKey) of the AES are still applicable but it becomes impossible for cryptanalysis discovery of enciphering method and ciphertext bits. Success of cracking efforts will be beyond human patience as it avoids statistical precision, thereby curbing timing attacks.
Journal of Information Science and Engineering | 2010
Atilla Elçi; Behnam Rahnama; Amirhasan Amintabar
This study highlights a security scenario involving vehicles in a Traffic Management and Information System (TMIS) network. TMIS and its nodal architecture, nicknamed Intelligent Junction (IJ), are summarized from our recent work. System design sets an example to a software architecture implementing autonomous semantic agents through semantic web services, junction-based sensor networks, local- and wide-area networking through wire/wireless integrated communication infrastructure. It is so construed as to provide (near-) real-time services throughout the network. This introduction is with reference to the SOA of Cooperative Labyrinth Discovery Robotics and Traffic Management and Information System Projects. This also takes up several issues including realtime goal-oriented coordination of semantic web services. Especially described are its essential functions crucial to aid security applications. A security scenario concerning tracking and routing reported, say missing, vehicles is considered and shown how to graft it onto TMIS network. Simulation results show promising outcomes. Performance of the system in terms of mean response time is analytically derived. Simulation and analytical results agree. Research involving similar development base is suggested.