Yusnani Mohd Yussoff
Universiti Teknologi MARA
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yusnani Mohd Yussoff.
international colloquium on signal processing and its applications | 2009
Faieza Hanum Yahaya; Yusnani Mohd Yussoff; Ruhani Ab Rahman; Nur Hafizah Abidin
This project presents the performance analysis of Wireless Sensor Network (WSN) used in the high-end applications such as weapons sensor ship, biomedical applications, habitat sensing and seismic monitoring. Recently WSN also focuses on national security applications and consumer applications. This project shall demonstrate the performance of WSN models, which are created and simulated using QualNet Developer software simulator. Several sensor nodes were uniformly deployed in the networks to create sensing phenomena. The simulation results recorded were the amount of data packets sent and received by each node, the throughput and the delay. All these graphical simulation results from several WSN models will be compared and analyzed separately. Therefore, the important factors and issues pertaining to the WSN performance will also be determined and describe briefly.
ieee international conference on information management and engineering | 2010
Yusnani Mohd Yussoff; Husna Zainol Abidin; Ruhani Ab Rahman; Faieza Hanum Yahaya
This paper presents the performance analysis of Wireless Sensor Network (WSN) used in the high-end applications such as weapons sensor ship, biomédical applications, habitat sensing and seismic monitoring. Recently WSN also focuses on national security applications and consumer applications. This project shall demonstrate the performance of WSN models, which have been developed using PIC. Temperature sensor nodes were deployed in the networks to create sensing phenomena. The results recorded that successful throughput from sensor node, strongly depends on the delay setting. Therefore, the important factors and issues pertaining to the WSN performance will also be determined and describe briefly.
2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) | 2016
Madzirin Masirap; Mohd Harith Amaran; Yusnani Mohd Yussoff; Ruhani Ab Rahman; Habibah Hashim
For IoT applications that require near real-time wireless connections, the traditional TCP protocol is not adept enough due to the size of its packet header, its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and its slow start strategy. This paper mainly evaluates three kinds of reliable UDP-based transport protocols namely, RUBDP, UDT, and PA-UDP, for use in IoT applications. The evaluation was done on a test bed that consists of two machines connected by wireless ad-hoc network. We consider the effect of data size by monitoring throughput of the implemented protocol. This paper also discusses the CPU usage on the sender and receiver side of each protocol. The paper findings are, PA-UDP protocol has the best throughput performance but requires high CPU utilization during the start and end of transmission at the receiver side. Meanwhile, UDT protocol is most efficient in term of CPU usage although it provides lesser throughput. RBUDP, on the other hand, performed consistently in wireless network but CPU usage is very high at the sender side. The conclusion drawn on this paper is UDT protocol is the most suitable protocol of the three for IoT applications because it has consistent performance and is CPU friendly.
control and system graduate research colloquium | 2013
Nur Nabila Mohamed; Habibah Hashim; Yusnani Mohd Yussoff; Anuar Mat Isa
With the advent of pervasive computing nowadays, there is a need to deal with security including integrity and confidentiality to maintain the accuracy, and distribute data safely and efficiently. Therefore, it is important to find the best solution for protecting sensitive information through encryption in constrained environment. However, due to the limitation of resources, it is difficult to implement common cryptographic functions on this type of environment. In addition, an ideal encryption algorithm which is suitable for this environment would need to be lightweight. In this paper, a preliminary study on encrypting data is carried out using two lightweight symmetric algorithms, AES and DES. We also identify an experiment of transferring variable size of encrypted data using symmetric encryption, AES which utilizes 256 bits key size. The data is transferred in local network between two computers using TFTP (Trivial File Transfer Protocol). Finally key exchange concept is proposed based on Diffie Hellman Key Exchange (DHKE) which improves the security of TFTP. From the result, it showed that AES is faster to encrypt files although its key size is bigger compared to DES. Besides, it took less time to send normal packet through TFTP compared to encrypted packet as the file size changed after encryption.
asia-pacific conference on communications | 2011
L. H. Adnan; Habibah Hashim; Yusnani Mohd Yussoff; M. U. Kamaluddin
As wireless sensor network (WSN) becomes more popular in environmental, business and military applications, security issues emerge with critical concerns because it is exposed to various types of physical attacks. The key factor for preventing from physical attacks is the security they provide at the platform level. A promising approach for providing a high-level security is by a trusted boot process; constructing a chain of trust just after the platform is booted-up. This paper presents a root of trust (ROT) at the 1st level boot-up platform to construct a chain of trust at the hardware layer using an embedded secured ROM inside the processor. This platform uses one of the most popular verification algorithms as part of the 1st level boot process. It was found that the proposed system can support any application that needs a high speed processing power because it uses a 32-bit processor.
2015 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) | 2015
Nazhatul Hafizah Kamarudin; Yusnani Mohd Yussoff; Habibah Hashim
Authentication in e-Health is a very important aspect to analyze when we deal with security of the whole e-Health system. It deals with the connection from body sensor network to mobile device and server. By integrating Wireless Sensor Networks (WSN) in the e-health system, it will be able to exchange medical information seamlessly and continuously in real time connection. This paper proposes a password less authentication in mobile e-Health network and introduces a unique identity-based authentication scheme and thus eliminating the need for a third party user which is the e-Health service provider in the e-Health network system.
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) | 2014
Nur Nabila Mohamed; Habibah Hashim; Yusnani Mohd Yussoff; Mohd Anuar Mat Isa; Syed Farid Syed Adnan
Data compression technique such as Huffman coding, arithmetic coding, Lempel-Ziv-Welch (LZW) method and others has been playing a vital role in the area of data transmission for reducing time usage during retrieving and transmitting data. However, this technique does not prevent data which contain secret information from being tampered or hacked by malicious attacks even in limited area network environment. Apart from the need of reducing data volume, an implementation of encryption is an important concern in order to transmit data over perfect security. This paper presents feasible approach in minimizing quantity of data and ensuring its security; data is compressed using a lossless algorithm, i.e. Huffman coding and then the compressed data is encrypted using symmetric encryption, AES algorithm. In this work, key exchange concept is also proposed based on Diffie Hellman Key Exchange (DHKE) which is used to exchange secret key for data encryption and decryption. The data is transferred in a local network between two computers through simple file transfer protocol known as Trivial File Transfer Protocol (TFTP). This protocol has been used widely for updating and transferring files especially to embedded devices and it would provide more benefit if security features were incorporated into this protocol. Thus, a lightweight security strategy which includes compression and encryption is an efficient solution to the security issue and to reducing file sizes in this type of environment. Experimental results based on proposed methodology are provided to analyze execution time of transmitting compressed-encrypted data and percentage reduction of file space.
2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) | 2016
Yusnani Mohd Yussoff; Mustaffa Samad
The paper presents the development of a low cost sensor node for street lighting based on the criteria needed by the industry. The function of the sensor node is to sense or detect the motion or movement of an object or a car. The sensor node will act or response when it detects an object moving past its position or location. The street light will turn on and transmit data to another pole. Once the object has passed the sensor node, the light will turn off. The paper focuses on the development of a cost effective sensor node. This sensor node will save the power supplied to the light by preventing it from turning on all night. This will also help to reduce maintenance cost and save on power consumption.
control and system graduate research colloquium | 2012
Yusnani Mohd Yussoff; Habibah Hashim; Mohd Dani Baba
The peculiarity of Wireless Sensor Networks demands extra consideration during the design of the security protocol. One of the most challenging yet important security features in Wireless Sensor Network is in establishing trusted communication between sensor node and base station. While the term trusted has been widely used referring to valid nodes in the group, this paper discusses the term trusted based on the specifications of Trusted Computing Group (TCG) and presents an IBE-Trust security protocol utilizing well-known identity-based encryption scheme. The protocol incorporates ideas from Trusted Computing Group and Identity-based cryptosystem by Boneh Franklin in ensuring trusted and secured communications between sender and receiver. The proposed protocols were then modeled using the high-level formal language HLPSL and verified using the model checking tool AVISPA. Analysis on the proposed protocols is presented at the end of this paper.
local computer networks | 2017
Nazhatul Hafizah Kamarudin; Yusnani Mohd Yussoff; Nurhaflyza Marbukhari; Mustaffa Samad; Habibah Hashim
Mobile e-health is one of the Internet of Things application that assists the healthcare organization in providing better healthcare services. Development of wireless sensor networking area has greatly increased the feasibility of a mobile e-health system since it provides wireless communication technology with promising sensor network applications. However, mobile e-health is subjected to a lot of security attacks such as sensor node cloning attack and man-in-the-middle attack. A secure e-health authentication system is one of the important approaches in order to provide high security for the whole e-health monitoring system. Considering the potential security attacks in mobile e-health application, a development of a unique identity of the e-health sensor node is proposed to provide a highly secure authentication protocol in mobile e-health. The identity of the e-health sensor node is a very important element in the proposed authentication protocol to ensure the confidentiality and the authenticity of transmitted e-health data.