أبحاث أعضاء هيئة التدريس

أنت هنا

An Efficient RSA Public Key Encryption Scheme مصطفى احمد الفيومي

In this paper, we propose an efficient RSA public key encryption scheme, which is an improved version of original RSA scheme. The proposed RSA encryption scheme is based on linear group over the ring of integer mod a composite modulus n which is the product of two distinct prime numbers. In the proposed scheme the original message and the encrypted message are h h square matrices with entities in zn indicated via l(h, zn ) . Since the original RSA Scheme is a block cipher in which the original message and cipher message are integer in the interval [0, n 1] for some integer modulus n .Therefore, in this paper, we generalize RSA encryption scheme in order to be implemented in the general linear group on the ring of integer mod n . Furthermore, the suggested encryption scheme has no restriction in encryption and decryption order and is claimed to be efficient, scalable and dynamic.

...
A New Routing Area Displacement Prediction for Location-Based Services based on an Enhanced Ant Colony مصطفى احمد الفيومي

In Location-Based Services (LBSs), the service is provided based on the users’ locations through location determination and mobility anticipation. Most of the current location prediction research focuses on generalised location models, where the geographic extent is divided into regular shape cells. One such technique is the Mobility Prediction based on an Ant System (MPAS), which depends on the earlier Ant Colony Optimisation (ACO) that suffers from problems such as search stagnation and pheromone update. In this paper, a New Routing Area Displacement Prediction (NRADP) is introduced, which works on the routing-area level instead of the cell level. Experimental results show that the NRADP offers improved effectiveness, higher prediction rate, and a reduced search stagnation ratio in comparison with the MPAS.

...
An Enhancement Ant Colony Optimization for Routing Area Mobility Prediction over Cellular Communication Network مصطفى احمد الفيومي

Cellular communication networks have become medium to provide various services. Most of the services
provided are based on the users’ locations, as in location-based services (LBSs); these services include both
common voice services as well as multimedia and integrated data services. Used techniques mostly suffered
from complex computation, accuracy rate regression and insufficient accuracy. Nevertheless, in the cell side,
reducing the complexity cost and preventing the prediction algorithm to perform in two closer time slot. That’s
why using routing area should be able to avoid the cell side problems. This paper discusses An Enhanced Ant
Colony Optimization for Routing Area Mobility Prediction over Cellular Communications Network (EACORA)
which is based on developed ant colony Optimization.

...
A New Digital Signature Scheme Based on Integer Factoring and Discrete Logarithm Problem مصطفى احمد الفيومي

A new idea for digital signature scheme is suggested. The suggested scheme employs a composite modulus that is a product of two distinct prime numbers. There is a similarity with the most widely used digital signature schemes such as RSA  regarding the algebraic background. The new scheme uses operations in prime integer order a characteristic that is similar to Digital Signature Standard (DSS) scheme. Thus the proposed signature scheme is deterministic. The new scheme is competitive and more efficient in time complexity compared with DSS and RSA schemes regarding measurement over both key generation and key verification.

...
Practical E-Payment Scheme مصطفى احمد الفيومي

E-payment is now one of the most central research areas in ecommerce, mainly regarding online and offline payment scenarios. Customers are generally passive in e-commerce transaction. Relied on a blind signature, this paper introduces an e-payment protocol, in which customers have more initiative, and can terminate the transaction before possible cheats, its security is enhanced. Moreover, the cost of workers and communications falls down considerably while the cost of trusted authority and protecting information is increased. As there is no trusted authority in the proposed scheme, network overcrowding and conspiracy problems can be avoided. Furthermore, the protocol satisfies fairness and non-repudiation. This helps merchant and bank to speed up the financial transaction process and to give user instant services at any time. Also, in this paper, we will discuss an important e-payment protocol namely pay-word scheme and examine its advantages and limitations, which encourages the authors to improve the scheme that keeps all characteristics intact without compromise of the security robustness. The suggested protocol employs the idea of blind signature with the thought of hash chain. We will compare the proposed protocol with pay-word protocol and demonstrate that the proposed protocol offers more security and efficiency, which makes the protocol workable for real world services.

...
A New Splitting-based Displacement Prediction Approach for Location-Based Services مصطفى احمد الفيومي

In location-based services (LBSs), the service is provided based on the users’ locations through location determination and mobility realization. Several location prediction models have been proposed to enhance and increase the relevance of the information retrieved by users of mobile information systems, but none of them studied the relationship between accuracy rate of prediction and the performance of the model in terms of consuming resources and constraints of mobile devices. Most of the current location prediction research is focused on generalized location models, where the geographic extent is divided into regular-shape cells. These models are not suitable for certain LBSs where the objectives are to compute and present on-road services. One such technique is the Prediction Location Model (PLM), which deals with inner cell structure. The PLM technique suffers from memory usage and poor accuracy. The main goal of this paper is to propose a new path prediction technique for Location-Based Services. The new approach is competitive and more efficient compared to PLM regarding measurements such as accuracy rate of location prediction and memory usage

...
A New Hybrid Approach of Symmetric/Asymmetric Authentication Protocol for Future Mobile Networks مصطفى احمد الفيومي

Most of current authentication schemes for mobile systems have some weaknesses; such as leakage of UE identities and high update overhead of temporary identities. This paper proposes a secure authentication mechanism for mobile communication systems that satisfies the security requirements of the third generation mobile systems. In this proposed protocol, the number of messages between authentication entities of the network is reduced to four messages instead of five in initial authentication procedure. The subsequent authentication procedure only contains two message exchanges. Therefore, the bottleneck at authentication center is avoided by reducing the number of messages between mobile and authentication center. The authentication time delay, call setup time and signaling traffic are minimized. Also, this proposed protocol is designed to be secure against network attacks, such as replay attacks and Guessing attacks and others attacks. Consequently, this approach is secure and practical as it can satisfy the security requirements of the third generation mobile communication systems based on hybrid asymmetric and symmetric cryptosystem, and can save up to 20% of the authentication traffic delay time.

...
An Enhancement of Authentication Protocol and Key Agreement (AKA) for 3G Mobile Networks مصطفى احمد الفيومي

This paper proposes a secure authentication mechanism by integrating the public key with the hash-chaining technique. The propose protocol satisfies the security requirements of third generation (3G) mobile networks. Also provide the protection of the international mobile subscriber identity (IMSI) to ensure subscriber un-traceability, key refreshment periodically, strong key management and a new non-repudiation service in a simple and elegant way. The proposed protocol is more secure protocol than the other available authentication protocols. To avoid the complicated synchronization as in universal mobile telecommunications system (UMTS) the proposed protocol does not use sequence number (SEQ), the management of a hash chain is simple and elegant compared to that of SEQ. This proposed protocol is secure against network attacks, such as replay attacks, guessing attacks, and other attacks.

...
Location Prediction based on a Sector Snapshot for Location-Based Services مصطفى احمد الفيومي

 In location-based services (LBSs), the service is provided based on the users’ locations through location determination and mobility realization. Most of the current location prediction research is focused on generalized location models, where the geographic extent is divided into regular-shaped cells. These models are not suitable for certain LBSs where the objectives are to compute and present on-road services. Such techniques are the new Markov-based mobility prediction (NMMP) and prediction location model (PLM) that deal with inner cell structure and different levels of prediction, respectively. The NMMP and PLM techniques suffer from complex computation, accuracy rate regression, and insufficient accuracy. In this paper, a novel cell splitting algorithm is proposed. Also, a new prediction technique is introduced. The cell splitting is universal so it can be applied to all types of cells. Meanwhile, this algorithm is implemented to the Micro cell in parallel with the new prediction technique. The prediction technique, compared with two classic prediction techniques and the experimental results, show the effectiveness and robustness of the new splitting algorithm and prediction technique.

...
Cloning SIM Cards Usability Reduction in Mobile Networks مصطفى احمد الفيومي

This paper studies the probability of using cloning subscriber identity module (SIM) cards in Universal Mobile Telecommunications Systems. It also explores how the mobile system can discover the cloning SIM cards as soon as possible and how to reduce the probability of using cloning SIM cards in mobile networks. The illegal mobile station attached to mobile networks can be detected by a Normal Location Area Update, a periodic area location update, and by outgoing calls that are issued from genuine mobiles. An analytical model is developed to investigate the effects of a location area update and outgoing calls issued by genuine mobiles on the use of illegal mobiles. Mobility management, such as registration, cancellation, and outgoing and incoming procedures for legal and illegal users are investigated and analysed. An analytical model to investigate the effect of outgoing call arrival rates, and location area residence time on the detected illegal user has been presented. This paper seeks to increase the security of communication by avoiding fraud of cloned mobile phones by proposing a solution to speed up the detection of cloning SIM cards.

...
QR Code for https://cces.psau.edu.sa/ar/sources/research/4