Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ndibanje Bruce is active.

Publication


Featured researches published by Ndibanje Bruce.


Archive | 2015

Side Channel Attacks on Cryptographic Module: EM and PA Attacks Accuracy Analysis

HyunHo Kim; Ndibanje Bruce; Hoon Jae Lee; Yong-Je Choi; Dooho Choi

Extensive research on modern cryptography ensures significant mathematical immunity to conventional cryptographic attacks. However, different side channel techniques such as power analysis and electromagnetic attacks are such a powerful tool to extract the secret key from cryptographic devices. These techniques bring serious threat on hardware implementations of cryptographic algorithms. In this paper an extensive analysis of side channel analysis on cryptographic device is presented where we study on the EM and PA attacks methods as sideways attacks on the hardware implementation of the crypto-module. Finally we establish a comparison table among different attacks tools methods for the accuracy analysis.


advanced information networking and applications | 2015

Hybrid Cloud Service Based Healthcare Solutions

Young Sil Lee; Ndibanje Bruce; Thiranant Non; Esko Alasaarela; Hoon Jae Lee

In many countries, the increasing longevity and declining fertility rates have contributed to aging populations and thus increased medical needs. The traditional healthcare methodology is being replaced by smarter healthcare (a.k.a. E-healthcare, u-healthcare, m-healthcare or cloud-healthcare). The cloud computing has gained more and more popularity in recent years. Several cloud based healthcare solutions have been proposed in previous publication. However, even though cloud computing gives many benefits for healthcare system, is not without its risks. In this paper, we are introducing few security requirements for healthcare system and propose a hybrid cloud service based healthcare solution. We also propose secure sensor module to protect the sensed patient biological data during transmit.


international conference on information networking | 2014

Cryptographic computation of private shared key based mutual authentication protocol: Simulation and modeling over wireless networks

Ndibanje Bruce; Hoon Jae Lee

Protecting communication among sender and receiver over a public channel network requires for the most part an important security mechanism to provide two parties with the property that they can authenticate each others identification parameters which are indispensable to construct a common private key. Based on the decisional Diffie-Hellman assumptions, this paper presents a cryptographic calculation of the shared secret key enabling mutual authentication and confidentiality services over public, insecure networks. This protocol is efficient than “classical” Diffe-Hellman key exchange which provides no authentication at all. To attain this, we first model the scheme with mathematical concept for exponential calculation using entity parameters and finally we simulate the work by CrypTool 2.0 to verify the feasibility and shared secret value sameness. The resultant shows that the protocol is practical and provably-secure in regards with standard cryptographic assumptions. Moreover, the value that would be exchanged can be used as secret key for further encrypted symmetric communication. The proposed method is awfully straightforward, valuable, and resilient to know attacks.


advances in social networks analysis and mining | 2015

An Approach to Designing a Network Security-based Application for Communications Safety

Ndibanje Bruce; Young-Jin Kang; Mangal Sain; Hoon Jae Lee

The evolution of digital communication includes both applications and devices running them. In this context, specific applications are needed to enhance a safeguard communication ensuring protection and trust services to the users. The growing need to address privacy concerns when social network data is released for mining purposes has recently led to considerable interest in various network security-based applications. In this paper, we develop an efficiency and adaptive network security-based application to ensure the privacy and data integrity across channel communications. This approach is designed on a model of clustering configuration of the involved members. The cluster members interact with the cluster leader for data exchange and sends to the base station. This scheme provides a strong mutual authentication framework that suits for real heterogeneous wireless applications. In addition, we contribute with a mathematical analysis to the delay and optimization analysis in a clustering topology node-based, also we compared the scheme with existing ones using security standards services. Finally, performance of this scheme is evaluated in term of computation and communication overhead; results show the present framework is efficiency and can be safeguard for Network Security-based applications.


high performance computing and communications | 2015

A Privacy Preserving Security Protocol-Based Application for Wireless Communication System

Ndibanje Bruce; Young-Sil Lee; Sanggon Lee; Hoon Jae Lee

The evolution of digital communication era includes both devices and applications running on different platforms. Specifics applications are needed for a safeguard communication ensuring protection and trust services to the users. The growing need to address privacy concerns when social network data is released for mining purposes has recently led to considerable interest in various network security-based applications. This paper presents a privacy preservation security protocol-based that enabling mutual authentication procedure between involved entities. This scheme provides specific security standards such as data integrity, message confidentiality and session key establishment to ensure security and privacy of both data and network. An extensive analysis shows that the proposed scheme achieves efficiency and can be safeguard to real wireless communication applications. Finally, a performance evaluation and comparison shows that our proposed framework is lightweight and resilient to various kinds of attacks.


advanced information networking and applications | 2015

Correlation Power Analysis Attack on the Ping Pong-128 Key Stream Generator

Young-Jin Kang; Hyun Ho Kim; Ndibanje Bruce; Young-Goo Park; Hoon Jae Lee

Power analysis attack on cryptographic hardware device aims to study the power consumption while performing operations using secrets keys. Power analysis is a form of Side Channel Attack (SCA) which allows an attacker to compute the key encryption from algorithm using Simple Power Analysis (SPA), Differential Power Analysis (DPA) or Correlation Power Analysis (CPA). The theoretical weaknesses in algorithms or leaked information from physical implementation of a cryptosystem are usually used to break the system. In this paper proved the weakness of PingPong-128 key stream generator which increased outputs key stream of specific non-linearity by adding mutual clock-control structure to previous summation generator through Correlation power analysis attack.


Archive | 2015

A Security Protocol based-on Mutual Authentication Application toward Wireless Sensor Network

Ndibanje Bruce; Young-Jin Kang; Hyeong Rag Kim; SuHyun Park; Hoon Jae Lee

This paper presents an application of security protocol based-on mu-tual authentication procedure between involved entities that providing data and network security in wireless sensor environment communication. Through WSN, a user can access base station of wireless sensor networks and gets the data. This paper proposes a secure authentication protocol where involved enti-ties are mutual strongly verified before accessing the data. The proposal pro-vides secure features standards such as data integrity, mutual authentication and session key establishment. Furthermore, an extensive analysis shows that the proposed scheme possesses many advantages against popular attacks, achieves better efficiency and can be safeguard to real wireless sensor network applications.


ieee global conference on consumer electronics | 2014

An enhanced passivation layer for secure consumer integrated circuit devices

Ndibanje Bruce; Hoon Jae Lee

Consumer electronics devices have a common point called integrated circuit (IC). Among the most advanced integrated circuits are the microprocessors which control everything from computers and cellular phones to the USB. In this paper, a novel manufacturing technique to enhance the passivation layer which protects the ICs is presented where a stronger passivation layer is made from Ni-TiO2 composite coating and Tetraethyl orthosilicate compound (TEOS/O2). The Ni-TiO2 will provide a high wear resistance and improve the hardness while the Tetraethyl orthosilicate will protect the microprocessor against ultraviolet attack on the ICs passivation layer.


International Journal of Distributed Sensor Networks | 2013

Improved Security Patch on Secure Communication among Cell Phones and Sensor Networks

Ndibanje Bruce; Tae Yong Kim; Hoon Jae Lee

The communication between cell phones and sensor networks involves strong user authentication protocols to ensure the data and network security. Generally, in order to obtain the relevant information, cell phones interact with sensor networks via gateways. In 2009, according to Arjan Durresi and Vamsi Paruchuri scheme, this unique ability is used to provide better authentication and security protocols that can be used to establish secure communications among cell phones and sensor networks. In this paper, we show that their scheme is vulnerable to known attacks such as man-in-the-middle attack and reply attack, and it does not provide mutual authentication between gateway node and cell phone. In addition, it does not establish session key after the authentication phase. To fill this security gap, we proposed security patches and improvements, which overcome the weak features in the scheme of Arjan Durresi and Vamsi Paruchuri. Finally, we came out with results which show that our improved security patch establishes trust between the cell phone and gateway in the form of mutual authentication and provides the session key establishment after the authentication phase.


international conference on hybrid information technology | 2011

An Efficient Hardware Countermeasure against Differential Power Analysis Attack

Amlan Jyoti Choudhury; Beum Su Park; Ndibanje Bruce; Young Sil Lee; Hyotaek Lim; Hoon Jae Lee

Extensive research on modern cryptography ensures significant mathematical immunity to conventional cryptographic attacks. However, power consumption in cryptographic hardware leak secret information. Differential power analysis attack (DPA) is such a powerful tool to extract the secret key from cryptographic devices. To defend against these DPA attacks, hiding and masking methods are widely used. But these methods increase high area overhead and performance degradation in hardware implementation. In this aspect, this paper proposes a hardware countermeasure circuit, which, is integrated hardware module with the intermediate stages in S-Box. The countermeasure circuit utilizes the dynamic power dissipation characteristics of CMOS and provides countermeasure against DPA attacks.

Collaboration


Dive into the Ndibanje Bruce's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge