Suriani Mohd Sam
Universiti Teknologi Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Suriani Mohd Sam.
international conference on advances in electrical electronic and systems engineering | 2016
Noriani Mohammed Noor; Kamilia Kamardin; Suriani Mohd Sam; Hafiza Abas; Nilam Nur Amir Sjarif; Yusnaidi Md Yusof; Azri Azmi
Radio-frequency identification (RFID) uses electromagnetic fields for wireless communication that automatically recognized target devices with no physical interaction with the purpose of information transmission. The RFID system composed of transponder or tag, interrogator and back-end host system. The services of mobile RFID (M-RFID) networks can be setup by consolidating with current wireless networking for mobile devices and RFID networks whereby these services are aiming for individual and private users using Mobile smart phone or PDA. Even though these systems have the benefits of RFID and mobile technology, it also promotes crucial security and privacy issues. M-RFID inherits all issues that exist in the traditional RFID system, for example, replay attack, denial of service, spoofing, traceability and impersonation. However the severity of these issues intensifies because M-RFID reader is used in the wireless environment with agility in movement and greater scanning zone. Therefore, many security protocols developed to support the security and privacy problems arise in M-RFID systems. Among the famous security protocol for the system is the ultralightweight authentication protocols and this survey focus on the study of these protocols. These protocols are not capable of fulfilling all the security and privacy requirements especially in the mobile wireless environments. As in most of the literatures that described and proposed for the security and privacy authentication protocol of M-RFID, they proved that designing a security and privacy authentication protocol is still a demanding and challenging activities. Although many authentication protocols have been developed over the years, none can be considered as perfect and supreme. Based on the review of the authentication protocols, the well-chosen protocol always depends on the context and scenario for the security and privacy efficiency requirements of the M-RFID system.
international conference on digital information processing and communications | 2015
Sharizal Fadlie Sabri; Salwani Mohd Daud; Suriani Mohd Sam; Kamilia Kamardin; Nor'asnilawati Salleh
Computer Designated Mode (CDM) plays an important role during tracking ISROs launch vehicle, GSLV D5. It allows tracking data to be transferred from Satish Dhawan Space Centre, India to Malaysia Space Centre, Malaysia. The data are used for real time tracking. This paper looks into the development of CDM that is based on functional requirement whereas the security measure is not considered at the moment. This paper explains the architecture of CDM and how the security will be implemented on the systems. RSA algorithm is chosen as the encryption technique which will be applied in the system. Simulation result shows that this technique is feasible for the mentioned implementation.
Jurnal Teknologi | 2016
Sharizal Fadlie Sabri; Suriani Mohd Sam; Kamilia Kamardin; Salwani Mohd Daud; Nor’asnilawati Salleh
soft computing | 2017
Nurulhuda Firdaus Mohd Azmi; Suriani Mohd Sam; Saiful Adli Ismail; Nilam Nur Amir Sjarif
Advanced Science Letters | 2017
Faizura Haneem; Nazri Kama; Azri Azmi; Azizul Azizan; Suriani Mohd Sam; Othman Mohd Yusop; Hafiza Abas
Archive | 2016
Faizura Haneem; Nazri Kama; Azri Azmi; Azizul Azizan; Suriani Mohd Sam
Archive | 2016
Nurazean Maarop; Erfan Ayazia; Suriani Mohd Sam; Othman Mohd Yusop; Azrina Hani Azmi; Rosmah Alia
Jurnal Teknologi | 2016
Atabak Kheirkhah; Salwani Mohd Daud; Suriani Mohd Sam; Hafiza Abas; Sya Azmeela Shariff; Yusnaidi Md Yusof
Indian journal of science and technology | 2016
Suriani Mohd Sam; Salwani Mohd Daud; Kamilia Kamardin; Nurazean Maarop
ARPN journal of engineering and applied sciences | 2016
Nor'asnilawati Salleh; Salwani Mohd Daud; Sharizal Fadlie Sabri; Suriani Mohd Sam; Mohamad Zulkefli Adam