Research Papers - Dept of Information Technology
Permanent URI for this collectionhttps://rda.sliit.lk/handle/123456789/593
Browse
3 results
Search Results
Publication Embargo Enhancing the security of online banking systems via keystroke dynamics(IEEE, 2013-04-26) Gunathilake, N. M; Padikaraarachchi, A. P. B; Koralagoda, S. P; Jayasundara, M. G; Paliyawadana, P. A. I. M; Manawadu, C. D; Rajapaksha, S. KSecurity is one of the key components of a computer system. The critical aspects become higher when it comes to online solutions that have millions of secure transactions occurring. Once the user credentials are passed to unintended user, the security of that particular entity is vulnerable harmful events could occur in different magnitudes. What is required is a reliable, efficient and hardware independent solution to authenticate online systems from intruders and hackers. In our research we have provided evidence that a complete platform independent online solution based on a methodology called Keystroke Dynamics which extract detailing timing information of user, and create a bio-matric template for each can be used to handle these treats. Comparing with other existing method this is more productive and efficient manner to authenticate online systems.Publication Embargo Operational Performance and Security Improvement Approach for Integrated BigData and Industrial IoT in Cyber-Physical Communication Systems(IEEE, 2019-05-09) Jayawardena, C; Sen, SWell-performed secure computing and communication are at the forefront for Internet of Things (IoT) and Cyber-Physical Systems (CPS). By using these innovative technologies, Industrial-IoT (IIoT) has revolutionized the smart industrial processes while this evolution imposes mandatory requirements of reliable, cybersecure and well performed network. This implants adopting effective approaches of improving performance and cybersecurity in IIoT networks towards building a trusted cyber-physical communication. IIoT generates huge data of which some are real-time and rest are big data which needs assurance of delivery without loss. This report has modeled the performance and security issues of intelligent physical systems. While demonstrating the performance and security strategies of improving them, this paper addresses issues for consideration to overcome the security and performance improvement bottlenecks.Publication Embargo Reliability and Cybersecurity Improvement Strategies in Wireless Sensor Networks for IoT-enabled Smart Infrastructures(IEEE, 2019-10-18) Sen, S; Jayawardena, CIoT-enabled smart applications and infrastructures use low power wireless sensor networks widely. But due to low energy and lack of computing capabilities, the comprehensive use of such devices result in reliability and security vulnerabilities. Therefore, the lower capability of sensor devices need to operate wisely with careful technical considerations to maximize their capabilities. This paper proposes a new technique to improve reliability and cybersecurity by balanced use of sensor energy while maintaining the quality of communication. The simulation result shows that the strategy proposed is effective. A hacking strategy has also been detailed so that the security experts can consider those while designing a security suite for IoT-enabled infrastructures.
