Volume 9, Issue 3, May 2018

Development of an Integrated Navigation System for Visually Impaired Pilgrims (VIPNAV)
Pages: 1-6 (6) | [Full Text] PDF (497K)
S. Alghamdi and A. Al-Shaery
Computers and Information Technology College of Taif University, Taif, KSA
Um Alqura University, Makkah Almukarrama, KSA
Department of Civil Engineering, College of Engineering and Islamic Architecture

Abstract -
Indicating the position for people who are visiting places for the first time is really challenge for drifters' people and more complex task to know the current position for blind people. Reaching a specific destination in unfamiliar environments is a real challenge for people with a vision disability, even if they use a white cane or guide dog, or the sighted people who able to see but they are drifters. The focus of this paper is a survey of exploratory study of the available technologies to come up with applicable suggested technologies which could be used to develop an outdoor/indoor Integrated Navigational System for Sighted or Visually Impaired Pilgrims (VIPNAV). VIPNAV will be composed of two integrated navigation systems: Global Navigation Satellite System (GNSS) and Radio Frequency Identification (RFID) System. The main target of this research is to proof of concept of that VIPNAV is an applicable system that may help blind and visually impaired (BVI) people and drifters sighted people to know their current position precisely which may contribute and used in further research as navigation system to assist any kind of pilgrims to do specific hajj tasks independently even they were blind people. The services that VIPNAV produce for BVI or drifters people include assistance to identify their current position precisely, and it could be used at another research to produce a navigation system that assist pilgrims to guide them to their desired destinations such as Jamarat and their temporary accommodation in Mina (their tents).
 Index Terms - - Navigation, Visually Impaired Pilgrims, RFID and GNSS
Comparative analysis of Forward Error Correction Techniques with Direct Sequence Spread Spectrum for Secure Communication
Pages: 7-14 (8) | [Full Text] PDF (793K)
Fabiha Hashmat, Fatima Hassan Butt and M. Junaid Arshad
Department of Computer Science and Engineering, UET, Lahore-Pakistan

Abstract -
Secure communication is one of the critical research area. A variety of techniques for secure communication are available. Communication insecurity result due to low transfer limit, no built-in redundancy or checking, jamming, interception, cross talk, interference, eavesdrop, masquerade, modification of messages, replay, denial of service and unauthorized traffic analysis. All of the above mentioned factors limit the performance of secure communication. We have addresses direct sequence spread spectrum (DSSS) for secure communication. Now for selecting best error correction technique to be used with direct sequence, analysis of different forward error correction techniques is necessary in order to determine which FEC technique will provide best results in terms of low noise. Firstly we have done Bit Error Rate (BER) analysis of Forward Error Correction (FEC) techniques namely Hamming Code, Reed-Solomon Code and Convolutional Code with the help of MATLAB/Simulink in order to determine the best error correction technique to be used with DSSS. Convolution Coding technique is used as it better withstand noise with low Eb/No as it gave us a BER=0 for Eb/No =12dB. It was also observed that due to spreading technique the signal was transmitted at a strength lower than the noise floor of the system which makes it a secure communication without any unauthorized interceptions. We have analyzed the signal was retrievable at the receiver side with less error rate as result of Convolutional FEC technique used with DSSS and undetectable during transmission as it is transmitted below noise floor of the system. In the end we have calculated system budget from transmitter to the receiver separated by a distance of 1m by taking account of all the gain and losses from transmitter to the receiver end.
 Index Terms - DSSS, Secure, BER, FHSS and Spreading
Fast and Secure Generating and Exchanging a Symmetric Key for TVWS Protocol
Pages: 15-19 (5) | [Full Text] PDF (396K)
Mubark M. A. Elmubark
Department of MIS, Blue Nile University, Sudan

Abstract -
In network security, symmetric key encryption methods are commonly used in order to generate and exchange a secret key between the sender and the receiver. The main drawbacks of this method are that, the attackers might access the transmitted data and use it to obtain the key and even generate new keys. Also, the process of generating the key is inefficient and time consuming. In this paper a new key generation and exchange protocol is proposed to overcome the aforementioned problems in the conventional symmetric key encryption methods. In the proposed protocol, the results show that the protocol is saved.
 Index Terms - Security, Key Generation and Key Exchange
Detection of Emulation Attack in Cognitive Spectrum
Pages: 20-27 (8) | [Full Text] PDF (576K)
Sameen Shaukat and M. Junaid Arshad
CS&E Department, UET, Lahore

Abstract -
Cognitive radio (CR) innovation, proposed by Mitola, permits unlicensed (optional) clients to get to the authorized recurrence groups without meddling with the authorized clients keeping in mind the end goal to acknowledge more successful and solid correspondence. Range detecting, as a principal usefulness of cognitive radio, empowers the optional clients to screen the recurrence range and recognize empty channels to utilize. Among the different detecting plans for CR systems, helpful range detecting strategy emerges because of its high identification execution of range gaps. In the meantime, the security issues of cognitive radio have gotten an ever-increasing number of considerations as of late since the characteristic properties of CR systems would posture new difficulties to remote correspondences. Essential client imitating assault (PUEA), proposed by Chen and Park, recognizes one potential helplessness of range detecting in CR systems where an aggressor involves the unused channels by radiating a motion with comparative frame as the essential client in order to hinder the entrance of the empty channels from other auxiliary clients. In this paper, we will research the location execution of empty diverts in CR organize within the sight of PUEA, endeavoring to moderate the effect of PUEA on the discovery execution of blank areas in CR systems. We will give a short review of cognitive radio technology before presenting our own particular work.
 Index Terms - Cognitive Radio, Spectrum Sensing, Cognitive Network, Energy Detection Technique in Cognitive and Emulation Attacks
Analysis of Symmetric Encryption Algorithms
Pages: 28-33 (6) | [Full Text] PDF (234K)
Muhammad Ahsan Fareed
University of Engineering and Technology, Lahore, Pakistan

Abstract -
With the increasing number of Technology usage in daily life, Encryption of data become most important. Information Encryption is becoming compulsory for communication. Different Encryption algorithm used to protect the data by making it unintelligible that can only be read by the person who have a key to decode the data. Algorithms use computer recourses such as memory, power and CPU etc. Encryption algorithms must be prone to third party attacks. So we need to find the algorithm that is most secure and use less resources. Different algorithms are suitable for different application based on the application type and kind of security communication need. In this paper analysis of different algorithm (AES, DES, RC4, DCA and Modified AES) is done with respect to different parameters.
 Index Terms - AES, DES, RC4, RSA, Encryption, Decryption, Public Key and Private Key