Majid Bakhtiari
Universiti Teknologi Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Majid Bakhtiari.
Multimedia Tools and Applications | 2016
Mohammad Sabzinejad Farash; Saru Kumari; Majid Bakhtiari
The session initiation protocol (SIP) has been receiving a lot of attention to provide security in the Voice over IP (VoIP) in Internet and mobility management. Recently, Yeh et al. proposed a smart card-based authentication scheme for SIP using elliptic curve cryptography (ECC). They claimed that their scheme is secure against known security attacks. However, in this paper, we indicate that Yeh et al.’s scheme is vulnerable to off-line password guessing attack, user impersonation attack and server impersonation attack, in the case that the smart card is stolen and the information stored in the smart card is disclosed. As a remedy, we also propose an improved smart card-based authentication scheme which not only conquers the security weaknesses of the related schemes but also provides a reduction in computational cost. The proposed scheme also provides the user anonymity and untraceability, and allows a user to change his/her password without informing the remote server. To show the security of our protocol, we prove its security the random oracle model.
International Journal of Computer Applications | 2014
Mahnoush Babaeizadeh; Majid Bakhtiari; Mohd Aizaini Maarof
Contemporary mobile sets are not used just for making calls and sending messages. They are increasingly being used in Mobile Cloud Computing (MCC) to store sensitive and critical information as well as to access sensitive data using the Internet via Cloud Service Provider (CSP). MCC is combination of Cloud Computing (CC) and mobile communication. Using MCC helps to decrease running cost and expansion of mobile applications. One of the important challenges in MCC is security and privacy. Furthermore, authentication plays an important role in preserving security and privacy of shared information in MCC. In fact, the majority of mobile handsets use inherently weak authentication mechanisms, based upon passwords and Personal Identification Number(PINs). But it is not secure way for authenticating users because of its limitation, as well as it is difficult to confirm that the demand is from the rightful owner. This study focus on a type of behavioral biometric authentication that is called Keystroke Dynamic Authentication (KDA) to identify mobile users and improve the authentication mechanism in cloud server. There are different parameters of measuring keystrokes, we defined keystrokes duration as an attribute to identify user. For implementing this method, we use Android SDK development. It includes mobile device emulator, Android Virtual Device (AVD) that helps to develop and test Android applications without using a physical device. Test of the the application is based on three different approaches (client side, local server, cloud server).In the first approach, experimental results is obtained from mobile device (client side) shows that this method works 94% correctly. In the second approach, application is connected to the php server and obtained results show that the application can works 96:15%correctly. In the last approach, obtained results from cloud server (google drive) show that the application can work 95:34% correctly. The important point in these approaches is that, the username and password were known for people cooperate in testing the proposed application. In addition, KDA is based on unique characteristics of users (here keystrokes duration) and it is hard to pretend as legible user. Therefore, applying KDA in mobile set helps to improve security and privacy of authentication.
international symposium on biometrics and security technologies | 2014
Malek Najib Omar; Mazleena Salleh; Majid Bakhtiari
Virtualization technology is the base technology used in Cloud computing. Therefore, virtualization enables Cloud computing to provide hardware and software services to the users on demand. Actually, many companies migrates to the Cloud computing for many reasons such as capabilities of processor, bus speed, size of storage, memory and managed to reduce the cost of dedicated servers. However, virtualization and Cloud computing contain many security weaknesses that affects the biometric data confidentiality in the Cloud computing. Those security issues are VM ware escape, hopping, mobility, diversity monitoring and etc. Furthermore, the privacy of a particular user is an issue in biometric data i.e. the face reorganization data for a famous and important people. Therefore, this paper proposed biometric encryption to improve the confidentiality in Cloud computing for biometric data. Also, this paper discussed virtualization for Cloud computing, as well as biometrics encryption. Indeed, this paper overviewed the security weaknesses of Cloud computing and how biometric encryption can improve the confidentiality in Cloud computing environment. Apart from this, confidentiality is enhanced in Cloud computing by using biometric encryption for biometric data. The novel approach of biometric encryption is to enhance the biometric data confidentiality in Cloud computing.
international symposium on biometrics and security technologies | 2014
Saeid Bakhtiari; Subariah Ibrahim; Mazleena Salleh; Majid Bakhtiari
Nowadays, the topic of multipurpose use of images is thriving in the fields of security establishment, authentication, watermarking, and etc. Simultaneously, the rise of multidisciplinary fields has drowned more attentions to this topic. Amongst the cryptographic algorithms, Elliptic Curve Cryptography with suitable characteristics such as low bandwidth usage, low computational time and small key size s satisfactory for image encryption. In this paper, image encryption by using ECC during and before image compression is proposed elaborately, as well as the results and analysis of applying ECC for image encryption/decryption, encryption performance and compression performance.
2015 International Conference on Smart Sensors and Application (ICSSA) | 2015
Raja Waseem Anwar; Majid Bakhtiari; Anazida Zainal; Abdul Hanan Abdullah; Kashif Naseer Qureshi
Due to open network nature of wireless sensor networks make them highly vulnerable to a variety of security attacks and easy target for adversaries, which may capture these nodes, analyze and easily insert fake route information. Wireless sensor network is an emerging, cost effective and unsupervised solution for collecting this information from the physical world and sending this information back to centralized authority for further processing. Reliable data gathering and delivery is always a challenging task due to dynamic, unattended and unpredictable behavior of wireless sensor network and its broadcast nature of communication. To protect sensor network from routing attacks in the presence of malicious nodes is always a challenge. In this paper, we propose a trust aware distance vector routing protocol (T-AODV) to protect wireless sensor network from wormhole attacks. Through experimental results, our propose approach proved the network efficiency in terms of improved packet delivery ratio, end-to-end delay and number of node to the destination.
international conference on advanced computer science applications and technologies | 2013
Majid Bakhtiari; Majid Nateghizad; Anazida Zainal
Nowadays cloud computing is widely used by users and organization to get benefit of many services in cloud. Huge datasets in cloud persuade users to outsource their information and documents to the untrusted Cloud Service Provider (CSP). On the other hand, there are some privacy and security problems in cloud storage considering as main drawbacks of extending it among users. One of the solutions for providing confidentiality of data in cloud storage is encrypting data before sending to cloud. This satisfies data confidentiality and makes users feel more confidence on the CSP. However, this prevents user to search the outsourced documents directly. Regular encryption algorithms such as AES, RC4 and DES mechanisms have searching limitation, in which the whole ciphertext needs to be retrieved and then decrypt before search procedure can be performed. Recently a lot of research has been done to enable search capabilities for users. Generally, keyword based search approach is used. This approach allows users to retrieve just those documents contain special keywords. However, searchable encryption algorithms suffer from privacy and security problems. This paper proposes Secure Searchable Based Asymmetric Encryption (SSAE) algorithm that provides Indistinguishability under Adaptive-Chosen Ciphertext Attack. The proposed searchable encryption algorithm is mathematically proven secure and it has the ability to perform a search within encrypted data without decrypting them.
International Conference of Reliable Information and Communication Technology | 2017
Mohammad javad Rajabi; Shahidan M. Abdullah; Majid Bakhtiari; Saeid Bakhtiari
Watermarking is a common technique for authentication and message hiding. Watermarking should be invisible and robust to common processing and attacks. This paper presents a robust DCT based technique for image watermarking against cropping attacks. The proposed watermarking scheme hides watermarked image as logo into a host image. The host image is first divided to 8 × 8 blocks and then DCT transformation has been applied on each block. The method that has been used in this paper is Arnold’s cat map which is embedded in the host image with zigzag symmetric technique. The experimental results show that the proposed algorithm is imperceptible and robust against 50% cropping attack.
world congress on information and communication technologies | 2015
Nurfazrina Mohd Zamry; Anazida Zainal; Murad A. Rassam; Majid Bakhtiari; Mohd Aizaini Maarof
Ganoderma boninense (G. boninense) is one of the critical palm oil diseases that have caused major loss in palm oil production, especially in Malaysia. Current detection methods are based on molecular and non-molecular approaches. Unfortunately, both are expensive and time consuming. Meanwhile, wireless sensor networks (WSNs) have been successfully used in precision agriculture and have a potential to be deployed in palm oil plantation. The success of using WSN to detect anomalous events in other domain reaffirms that WSN could be used to detect the presence of G. boninense, since WSN has some resource constraints such as energy and memory. This paper focuses on feature selection to ensure only significant and relevant data that will be collected and transmitted by the sensor nodes. Sixteen soil features have been collected from the palm oil plantation. This research used rough set technique to do feature selection. Few algorithms were compared in terms of their classification accuracy, and we found that genetic algorithm gave the best combination of feature subset to signify the presence of Ganoderma in soil.
intelligent systems design and applications | 2013
Muhammad Murad Khan; Majid Bakhtiari; Saeid Bakhtiari
Short Messaging Service (SMS) has removed difference between near and far. Because of guaranteed delivery, people use it on daily basis for connectivity. Not only humans but Information Systems have also utilized it to connect, known as automated messaging. Although automated messaging holds prominent SMS market share but full potential was not reached because of the fact that SMS has no security at all. Any SMS sent or received can be intercepted and manipulated by Man In The Middle (MITM). To resist MITM in next generation smartphones we have proposed a new framework which can be used to secure both human and automated messaging. This automated messaging. This new framework use HTTPS for secure key exchange, ECC, RSA as encryption algorithm and GSM network to send and receive encrypted messages.
intelligent systems design and applications | 2013
Saeid Bakhtiari; Subariah Ibrahim; Mazleena Salleh; Majid Bakhtiari
In term of security, elliptic curves (ECs) with prime group orders are absolutely indispensable for cryptosystem construction. This paper is confined to a discussion of benefits and drawbacks of a couple of methods for generating prime order elliptic curves, as well as to delineation of their efficiencies for related cases.