Papers by Haider Mashhadi

Wireless sensor networks (WSNs) are used in many applications to gather sensitive information whi... more Wireless sensor networks (WSNs) are used in many applications to gather sensitive information which is then
forwarded to an analysis center. Resource limitations have to be taken into account when designing a WSN infrastructure.
Authentication in WSNs is critical, as they are often deployed
unattended in hostile environments and must transmit
information over unsecured mediums. However, the cost of
performing cryptographic operations is an extremely limiting
factor because sensor devices and related equipment are
constrained by storage and computational ability. Hash functions are the most widespread among all Authentication primitives, and are currently used in multiple cryptographic schemes and in security protocols. This paper presents a new Secure Hash Algorithm called (2AMD-160) which uses a famous structure of hash algorithm given by the MIT Laboratory for Computer Science and RSA Data Security, Inc. To demonstrate the effectiveness of 2AMD-l60 in terms of security and execution time, we compare our approach with two methods namely, MD5 and SHAl hash function algorithms. Simulation results demonstrate that the execution time and the security achieved by the proposed method are more effective than the MD5 and SHAI.

In last years, many cryptosystems relay on the chaotic maps
have been proposed. Many significant ... more In last years, many cryptosystems relay on the chaotic maps
have been proposed. Many significant features of chaotic systems can be exploited in cryptography like: ergodicity, instability to initial condition, and confusion feature. These features lead to a significant relationship between cryptography and chaos. Because of widely usage of WSNs in variety environments, it is important to save the transferred
messages from unwanted access. Security of these data while
transferring through the network happens to be more critical. In this study, a new cryptosystem called Hybrid Chaotic Cryptosystem Tent-PWLCM (HCCTPWLCM) have been suggested, based on two chaotic methods to create keys and encrypt the WSN's data in a multistep manner to enhance the security of WSN's. The analysis and experimental results show that the execution time and the security achieved by the proposed method are very suitable for securing communications in a variety of WSNs applications, and real-time applications.
Many important features of chaotic systems can be exploited in cryptography such as: ergodicity, ... more Many important features of chaotic systems can be exploited in cryptography such as: ergodicity, sensitivity to initial
condition, mixing property. These features lead to a significant relationship between cryptography and chaos. Sensor nodes in a wireless sensor network (WSN) are affected with resource constrained; they have limited processing speed, storage capacity, energy, and communication bandwidth. This paper proposes a new encryption scheme called Chaotic Block Cipher (CBC) to encrypt the message digest MD for WSNs data. The proposed method uses logistic chaotic method to create a number of chaotic
values and treats these values to obtain the encryption/decryption keys then mixing them with a plaintext to get a ciphertext. Simulation results demonstrate that, the execution time and the security achieved by the proposed method are very suitable for WSNs.
Uploads
Papers by Haider Mashhadi
forwarded to an analysis center. Resource limitations have to be taken into account when designing a WSN infrastructure.
Authentication in WSNs is critical, as they are often deployed
unattended in hostile environments and must transmit
information over unsecured mediums. However, the cost of
performing cryptographic operations is an extremely limiting
factor because sensor devices and related equipment are
constrained by storage and computational ability. Hash functions are the most widespread among all Authentication primitives, and are currently used in multiple cryptographic schemes and in security protocols. This paper presents a new Secure Hash Algorithm called (2AMD-160) which uses a famous structure of hash algorithm given by the MIT Laboratory for Computer Science and RSA Data Security, Inc. To demonstrate the effectiveness of 2AMD-l60 in terms of security and execution time, we compare our approach with two methods namely, MD5 and SHAl hash function algorithms. Simulation results demonstrate that the execution time and the security achieved by the proposed method are more effective than the MD5 and SHAI.
have been proposed. Many significant features of chaotic systems can be exploited in cryptography like: ergodicity, instability to initial condition, and confusion feature. These features lead to a significant relationship between cryptography and chaos. Because of widely usage of WSNs in variety environments, it is important to save the transferred
messages from unwanted access. Security of these data while
transferring through the network happens to be more critical. In this study, a new cryptosystem called Hybrid Chaotic Cryptosystem Tent-PWLCM (HCCTPWLCM) have been suggested, based on two chaotic methods to create keys and encrypt the WSN's data in a multistep manner to enhance the security of WSN's. The analysis and experimental results show that the execution time and the security achieved by the proposed method are very suitable for securing communications in a variety of WSNs applications, and real-time applications.
condition, mixing property. These features lead to a significant relationship between cryptography and chaos. Sensor nodes in a wireless sensor network (WSN) are affected with resource constrained; they have limited processing speed, storage capacity, energy, and communication bandwidth. This paper proposes a new encryption scheme called Chaotic Block Cipher (CBC) to encrypt the message digest MD for WSNs data. The proposed method uses logistic chaotic method to create a number of chaotic
values and treats these values to obtain the encryption/decryption keys then mixing them with a plaintext to get a ciphertext. Simulation results demonstrate that, the execution time and the security achieved by the proposed method are very suitable for WSNs.
forwarded to an analysis center. Resource limitations have to be taken into account when designing a WSN infrastructure.
Authentication in WSNs is critical, as they are often deployed
unattended in hostile environments and must transmit
information over unsecured mediums. However, the cost of
performing cryptographic operations is an extremely limiting
factor because sensor devices and related equipment are
constrained by storage and computational ability. Hash functions are the most widespread among all Authentication primitives, and are currently used in multiple cryptographic schemes and in security protocols. This paper presents a new Secure Hash Algorithm called (2AMD-160) which uses a famous structure of hash algorithm given by the MIT Laboratory for Computer Science and RSA Data Security, Inc. To demonstrate the effectiveness of 2AMD-l60 in terms of security and execution time, we compare our approach with two methods namely, MD5 and SHAl hash function algorithms. Simulation results demonstrate that the execution time and the security achieved by the proposed method are more effective than the MD5 and SHAI.
have been proposed. Many significant features of chaotic systems can be exploited in cryptography like: ergodicity, instability to initial condition, and confusion feature. These features lead to a significant relationship between cryptography and chaos. Because of widely usage of WSNs in variety environments, it is important to save the transferred
messages from unwanted access. Security of these data while
transferring through the network happens to be more critical. In this study, a new cryptosystem called Hybrid Chaotic Cryptosystem Tent-PWLCM (HCCTPWLCM) have been suggested, based on two chaotic methods to create keys and encrypt the WSN's data in a multistep manner to enhance the security of WSN's. The analysis and experimental results show that the execution time and the security achieved by the proposed method are very suitable for securing communications in a variety of WSNs applications, and real-time applications.
condition, mixing property. These features lead to a significant relationship between cryptography and chaos. Sensor nodes in a wireless sensor network (WSN) are affected with resource constrained; they have limited processing speed, storage capacity, energy, and communication bandwidth. This paper proposes a new encryption scheme called Chaotic Block Cipher (CBC) to encrypt the message digest MD for WSNs data. The proposed method uses logistic chaotic method to create a number of chaotic
values and treats these values to obtain the encryption/decryption keys then mixing them with a plaintext to get a ciphertext. Simulation results demonstrate that, the execution time and the security achieved by the proposed method are very suitable for WSNs.