Data load process of large-sized media for avionics using FTP and JSON

JH Choi, NM Choi, JK Shin - Journal of Advanced Navigation …, 2023 - koreascience.kr
The interest in the aircraft interior market is gradually growing due to technological
development based on the 4th industrial revolution and competition for airlines to attract …

Extending hybrid approach to secure Trivial File Transfer Protocol in M2M communication: a comparative analysis

NN Mohamed, Y Mohd Yussoff, MA Mat Isa… - Telecommunication …, 2019 - Springer
Abstract Embedded Machine-to-Machine (M2M) is one of the hottest research topics in
recent industrial Internet of Things. In order to serve the communication to effectively transfer …

RF simulator for cryptographic protocol

MAM Isa, H Hashim, SFS Adnan… - … Conference on Control …, 2014 - ieeexplore.ieee.org
Advances in embedded RF devices and sensor nodes have witnessed major expansion of
end user services such as Internet of Things (IoT) and Cloud Computing. These prospective …

Performance measurement of secure TFTP protocol for smart embedded devices

NFS Pauzi, MAM Isa, H Hashim… - 2014 IEEE Asia …, 2014 - ieeexplore.ieee.org
Trivial File Transfer Protocol (TFTP) is a client server protocol for transferring files between
networked devices. A TFTP client can upload or download files to or from a remote server …

FLEX-IoT: Secure and Resource-Efficient Network Boot System for Flexible-IoT Platform

KH Park, SJ Kim, J Yun, SH Lim, KW Park - Sensors, 2021 - mdpi.com
In an internet of things (IoT) platform with a copious number of IoT devices and active
variation of operational purpose, IoT devices should be able to dynamically change their …

A Series of Secret Keys in a Key Distribution Protocol

MA Mat Isa, H Hashim, J Ab Manan… - … : World Congress on …, 2015 - Springer
In this chapter, we present a series of secret keys distribution in a key exchange protocol that
incorporates protection against side channel attacks using Indistinguishability Experiment …

An automobile security protocol: side-channel security against timing and relay attacks

MAM Isa, H Hashim, SFS Adnan… - International …, 2017 - inderscienceonline.com
Keyless go, automotive keyless systems (AKS), passive keyless entry and start (PKES) are
names given to smart systems that allow a driver to unlock a car without pressing any key …

Cryptographic adversary model: Timing and power attacks

MA Mat Isa, H Hashim, AH Abd Ghafar… - … : World Congress on …, 2015 - Springer
In this work, we present an adversary model that incorporates side channel attacks in the
Indistinguishability Experiment for Adaptive Chosen Ciphertext Attack (CCA2). We propose …

Simulation of RSA and ElGamal encryption schemes using RF simulator

SFS Adnan, MAM Isa, KSA Rahman… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Sensor nodes commonly rely on wireless transmission media such as radio frequency (RF)
and typically run on top of CoAP and TFTP protocols which do not provide any security …

[PDF][PDF] New packet header support and key exchange mechanism for secure trivial file transfer protocol

NN Mohamed, Y Mohd Yussoff… - Journal of Electrical …, 2017 - ir.uitm.edu.my
—TFTP has received a significant demand in recent years because of its lightweight feature
and compatibility on limited low-level embedded system. Nevertheless, as it provides no …