Research Publications Authored by SLIIT Staff
Permanent URI for this communityhttps://rda.sliit.lk/handle/123456789/4195
This collection includes all SLIIT staff publications presented at external conferences and published in external journals. The materials are organized by faculty to facilitate easy retrieval.
Browse
5 results
Filters
Advanced Search
Filter by
Settings
Search Results
Publication Open Access Universal Sinhala Library: Language Specific Encryption Platform for Sinhala Language(researchgate.net, 2022-02) Thelijjagoda, S; Webadu Wedanage, D, K, HSecurity has become a significant challenge in the modern world. Number science and mathematics opened up a vast path to work with programming models to create innovative mechanisms which improve text encryption. Universal Sinhala Library is a Sinhala language-specific text encryption platform. Platform architecture has been designed to demonstrate every possible combination of the Sinhala alphabet, including comma, space and period. The hypothetical architecture includes every book that ever has been written in Sinhala, and every book that ever could be, including every poem, every scientific paper and every piece of document in Sinhala. The main goal of the research is to create an encryption mechanism for the Sinhala language. Linear congruential generator and extended euclidean algorithm have been used along with the Hull–Dobell Theorem to outline the backbone of the encryption platform. At present, it contains all possible combinations of Sinhala characters virtually. Sinhala text to be encrypted should be searched in the platform, and it will return the location of that particular text in the virtual library architecture, which is the encrypted text string for the searched Sinhala text. It is helpful to the people who are using or working with the Sinhala language, moreover for sharing and transferring Sinhala context securely.Publication Embargo Enhancing the security of OLSR protocol using reinforcement learning(IEEE, 2017-09-14) Priyadarshani, H; Jayasekara, N; Chathuranga, L; Kesavan, K; Nawarathna, C; Sampath, K. K; Liyanapathirana, C; Rupasinghe, LMobile ad-hoc networks are used in various institutions such as the military, hospitals, and various businesses. Due to their dynamic mobile structure-free and self-adaptive nature, they are ideal to be used in emergency situations where the resources available are limited. The wireless range of the devices in the MANET is narrow. In order to communicate with the desired device often times it is necessary to use intermediate devices between the source and the destination. Therefore, it is important to secure sensitive information sent through intermediate devices. OLSR is a widely used MANET routing protocol. Although OLSR protocol has excelled in performance and reliability, it is rather poor in security. In this context, we attempt to improve the security of OLSR protocol with the aid of Q-Learning by selecting trustworthy nodes to forward messages. Behavior of the nodes is used to determine the trust of the nodes.Publication Embargo Enhancing the security of online banking systems via keystroke dynamics(IEEE, 2013-04-26) Gunathilake, N. M; Padikaraarachchi, A. P. B; Koralagoda, S. P; Jayasundara, M. G; Paliyawadana, P. A. I. M; Manawadu, C. D; Rajapaksha, S. KSecurity is one of the key components of a computer system. The critical aspects become higher when it comes to online solutions that have millions of secure transactions occurring. Once the user credentials are passed to unintended user, the security of that particular entity is vulnerable harmful events could occur in different magnitudes. What is required is a reliable, efficient and hardware independent solution to authenticate online systems from intruders and hackers. In our research we have provided evidence that a complete platform independent online solution based on a methodology called Keystroke Dynamics which extract detailing timing information of user, and create a bio-matric template for each can be used to handle these treats. Comparing with other existing method this is more productive and efficient manner to authenticate online systems.Publication Embargo Operational Performance and Security Improvement Approach for Integrated BigData and Industrial IoT in Cyber-Physical Communication Systems(IEEE, 2019-05-09) Jayawardena, C; Sen, SWell-performed secure computing and communication are at the forefront for Internet of Things (IoT) and Cyber-Physical Systems (CPS). By using these innovative technologies, Industrial-IoT (IIoT) has revolutionized the smart industrial processes while this evolution imposes mandatory requirements of reliable, cybersecure and well performed network. This implants adopting effective approaches of improving performance and cybersecurity in IIoT networks towards building a trusted cyber-physical communication. IIoT generates huge data of which some are real-time and rest are big data which needs assurance of delivery without loss. This report has modeled the performance and security issues of intelligent physical systems. While demonstrating the performance and security strategies of improving them, this paper addresses issues for consideration to overcome the security and performance improvement bottlenecks.Publication Embargo Reliability and Cybersecurity Improvement Strategies in Wireless Sensor Networks for IoT-enabled Smart Infrastructures(IEEE, 2019-10-18) Sen, S; Jayawardena, CIoT-enabled smart applications and infrastructures use low power wireless sensor networks widely. But due to low energy and lack of computing capabilities, the comprehensive use of such devices result in reliability and security vulnerabilities. Therefore, the lower capability of sensor devices need to operate wisely with careful technical considerations to maximize their capabilities. This paper proposes a new technique to improve reliability and cybersecurity by balanced use of sensor energy while maintaining the quality of communication. The simulation result shows that the strategy proposed is effective. A hacking strategy has also been detailed so that the security experts can consider those while designing a security suite for IoT-enabled infrastructures.
