Norziana Jamil
Universiti Tenaga Nasional
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Norziana Jamil.
international conference on computer and communication engineering | 2016
Mohd Ezanee Rusli; Mohammad Ali; Norziana Jamil; Marina Md Din
Indoor positioning system (IPS) allows an object to be located and tracked within an indoor environment. With the introduction of Internet of Things (IoT), the business interest in location-based application and services has also increased. Hence, the demand for accurate indoor localization services has become important. Until now, researches related to IPS are still being conducted with the objective to improve the performance of positioning techniques. Trilateration is one of the techniques available to determine the location of an object. This paper proposes an improved WiFi trilateration-based method for indoor positioning system. The improved model is based on the test results which was conducted by using Intel Galileo (Gen2) board as an access point. The signal blocking problem caused by obstacles existed inside the building is resolved by improving received signal strength measurement. The proposed model includes implementation of trilateration technique to determine the position of users and then using specific reference points to improve the positioning results.
Laser Physics | 2010
Faisal A. A. El-Orany; Mohamed Ridza Wahiddin; M. A. Mat-Nor; Norziana Jamil; I. Bahari
In this paper, we develop, a quantum key distribution protocol based on the Greenberger-Horne-Zeilinger states (GHZs). The particles are exchanged among the users in blocks through two steps. In this protocol, for three-particle GHZs three keys can be simultaneously generated. The advantage of this is that the users can select the most suitable key for communication. The protocol can be generalized to N users to provide N keys. The protocol has two levels for checking the eavesdroppers. Moreover, we discuss the security of the protocol against different attacks.
security of information and networks | 2013
Herman Isa; Norziana Jamil; Muhammad Reza Z'aba
A substitution box (s-box) is a nonlinear component function used in most block ciphers. It must fulfill several cryptographic properties such as high nonlinearity, low differential uniformity and complex algebraic expression to resist against linear, differential and interpolation attacks. In this paper, we extend and improve the s-box construction method proposed by Mamadolimov et al. [26, 27] which construct an s-box from power and binomial functions over the finite field F28. We study the cryptographic properties exhibited from our s-box and do a comparative analysis with several known 8X8 bijective s-boxes. Our analysis shows that our proposed s-box is ranked seventh compared to known 8X8 bijective s-boxes in terms of strong cryptographic properties. It even surpasses some known s-boxes used in popular block ciphers.
New Generation Computing | 2016
Herman Isa; Norziana Jamil; Muhammad Reza Z’aba
In this paper, we explore a heuristic method called the bee waggle dance to construct cryptographically strong S-boxes. The S-boxes exhibit good cryptographic properties such as high nonlinearity, low differential uniformity and high algebraic degree. The method involves the use of a trinomial power function as the initial S-box. The elements in the S-box are then permuted using the bee waggle dance algorithm. The S-boxes produced using this method are found to compare reasonably well with other existing S-boxes constructed using alternative heuristic methods. To the best of our knowledge, this is the first attempt to construct cryptographically strong S-boxes using the bee waggle dance algorithm.
2010 Second International Conference on Network Applications, Protocols and Services | 2010
Norziana Jamil; Sera Syarmila Sameon; Ramlan Mahmood
Wireless sensor networks have received a great attention since they emerged as new ways of communicating and distributing information in wireless network. However the security aspect of wireless sensor network remains an issue, namely authentication, key management and secure localization. Since the communication of wireless sensor is on broadcast basis, researchers are focusing on how to design an efficient authentication scheme since the data might lost during the transmission and this is crucial for entity authentication prior the actual communication. Entity or user authenticity is important to avoid forgery and replay attack. This paper will focus on authentication by investigating three authentication schemes based on user authentication for Wireless Sensor Network. We identify their weakness and we finally introduce a new scheme which is based on identity-bits commitment for authentication that overcomes problems identified in studied schemes. A basic security analysis is followed to support the strength of the scheme in a real deployment.
international conference on information technology | 2014
Hidayah Sulaiman; Norziana Jamil
Zakat or better known as almsgiving is one of the major Islamic principles which is obligated to qualified Muslims. The almsgiving principle aims to assist the needy and eliminate poverty in the society whilst promoting the elimination of greed and selfishness among the Muslim community. The government also holds the responsibility of creating a zakat institution to ensure effective management of the zakat distribution and management. However, due to the growing number of working Muslims and various sources of zakat providers to be managed, this creates an overwhelming amount of information to be carefully managed by the zakat institution and its appointed zakat fund trustee. There exist and information gap when the public demands the zakat institutions to have better transparency in the distribution of zakat especially when various issues are identified with the validity of the zakat information. Hence, there is a need for the zakat institution to have better information security mechanism between the zakat institution and the zakat fund trustee offices. This study proposes an information security governance model for the management of zakat information by testing the correlation between human behavior traits and security governance mechanism with goal congruence and reduction of information asymmetry. The proposed model also aims to provide the zakat institution with a more structured processes of managing the security of the information in order to provide better reporting transparency, making well-informed decisions and instill better trust from the Islamic community with regard to better zakat management and distribution.
ieee international conference on communication software and networks | 2011
Norziana Jamil; Ramlan Mahmood
In Wireless Sensor Network (WSN) communication, authentication between the communicating nodes is an important aspect and has gained intensive interest from the researcher all around the world. With the advance of the technology where the communication devices are all in small form factor, high speed and low cost authentication scheme for generating Message Authentication Code (MAC) is definitely a demand. This paper introduces a new fast and lightweight authentication scheme based on Cellular Automata (CA) utilizing a so called Identity-bits Commitment embedded in a temper resistance chip inside the wireless sensors. The security analysis shows that our scheme is secure against thwart replay attack and lightweight for fast implementation.
International Conference on Informatics Engineering and Information Science, ICIEIS 2011 | 2011
Norziana Jamil; Ramlan Mahmood; Muhammad Reza Z'aba; Zuriati Ahmad Zukamaen; Nur Izura Udzir
The robustness of a cryptographic system substantially depends on its underlying elements. Boolean functions are the most frequently used elements in various cryptographic systems, be it block ciphers, stream ciphers and hash functions. However, constructing Boolean functions satisfying all fundamental cryptographic properties are not trivial. We study the cryptographic properties of Boolean functions of biological system namely one-dimensional Cellular Automata (CA) and show that some of its Boolean functions satisfy all mentioned properties on levels very close to optimal and therefore can be recommended as cryptographically strong Boolean function.
International Conference of Reliable Information and Communication Technology | 2017
A. Amini; Norziana Jamil; Abdul Rahim Ahmad; Hidayah Sulaiman
Cloud computing is an innovative and popular paradigm in information technology. It delivers on-demand services by offering numerous advantages such as reduced management effort and efficient resource usage which would lead to economic saving. However, the associated flexibility and elasticity have caused many information security issues in a business environment. In such scenarios, all risk factors must be managed based on their probable effects on assets. Moreover, risk assessment as a core of risk management, estimates and prioritizes risks to reduce their impact and maximize the benefits of cloud computing for system providers and clients. In this paper, we adopt fuzzy logic to deal with insufficient information and estimate the severity and the likelihood of each risk mathematically. The aim of this paper is to develop a conceptual model to prioritize risks based on severity and probability. For estimating risk, human knowledge and expertise need to be integrated into role based circumstance. As a result, fuzzy logic is presented in this paper and the incenter on centroid method is proposed to convert linguistics data to numerical value in order to quantify the rate of risk. On the other hand, fuzzy logic has been used to deal with human experience as insufficient information to obtain the quantitative data due to the risk characterizing factors.
international conference on information technology | 2014
Yasir Amer Abbas; Razali Jidin; Norziana Jamil; Muhammad Reza Z'aba; Mohd Ezanee Rusli; Baraa Tariq
This paper presents a hardware implementation of the PRINCE block cipher in Field Programmable Gate Array (FPGA). In many security applications, the software implementations of cryptographic algorithms are slow and inefficient. In order to solve the problems, a new FPGA architecture was proposed to speed up the performance and flexibility of PRINCE algorithm. The concurrent computing design allows an encryption block data of 64 bits within one clock cycle, reducing the hardware area and producing a high throughput and low latency. It also showed high speed processing and consumed low power. To do this, firstly, the encryption, decryption and key schedule are all implemented with small hardware resources, Next, an efficient hardware architectural model for PRINCE algorithms was developed using very high speed integrated circuit hardware description language (VHDL). Finally, the VHDL design for PRINCE algorithm was synthesized in FPGA boards. Two FPGA boards were used in this study, which are Virtex-4 and Virtex-6. The results show a throughput of 2.03 Gbps and efficiency of 2.126 Mbps/slice for Virtex-4, whereas a throughput of 4.18 Gbps and efficiency of 8.681 Mbps/slice for Virtex-6.