Faculty of Computing

Permanent URI for this communityhttps://rda.sliit.lk/handle/123456789/4202

Browse

Search Results

Now showing 1 - 4 of 4
  • Thumbnail Image
    PublicationEmbargo
    Enhancing the security of OLSR protocol using reinforcement learning
    (IEEE, 2017-09-14) Priyadarshani, H; Jayasekara, N; Chathuranga, L; Kesavan, K; Nawarathna, C; Sampath, K. K; Liyanapathirana, C; Rupasinghe, L
    Mobile ad-hoc networks are used in various institutions such as the military, hospitals, and various businesses. Due to their dynamic mobile structure-free and self-adaptive nature, they are ideal to be used in emergency situations where the resources available are limited. The wireless range of the devices in the MANET is narrow. In order to communicate with the desired device often times it is necessary to use intermediate devices between the source and the destination. Therefore, it is important to secure sensitive information sent through intermediate devices. OLSR is a widely used MANET routing protocol. Although OLSR protocol has excelled in performance and reliability, it is rather poor in security. In this context, we attempt to improve the security of OLSR protocol with the aid of Q-Learning by selecting trustworthy nodes to forward messages. Behavior of the nodes is used to determine the trust of the nodes.
  • Thumbnail Image
    PublicationEmbargo
    Enhancing the security of online banking systems via keystroke dynamics
    (IEEE, 2013-04-26) Gunathilake, N. M; Padikaraarachchi, A. P. B; Koralagoda, S. P; Jayasundara, M. G; Paliyawadana, P. A. I. M; Manawadu, C. D; Rajapaksha, S. K
    Security is one of the key components of a computer system. The critical aspects become higher when it comes to online solutions that have millions of secure transactions occurring. Once the user credentials are passed to unintended user, the security of that particular entity is vulnerable harmful events could occur in different magnitudes. What is required is a reliable, efficient and hardware independent solution to authenticate online systems from intruders and hackers. In our research we have provided evidence that a complete platform independent online solution based on a methodology called Keystroke Dynamics which extract detailing timing information of user, and create a bio-matric template for each can be used to handle these treats. Comparing with other existing method this is more productive and efficient manner to authenticate online systems.
  • Thumbnail Image
    PublicationEmbargo
    Operational Performance and Security Improvement Approach for Integrated BigData and Industrial IoT in Cyber-Physical Communication Systems
    (IEEE, 2019-05-09) Jayawardena, C; Sen, S
    Well-performed secure computing and communication are at the forefront for Internet of Things (IoT) and Cyber-Physical Systems (CPS). By using these innovative technologies, Industrial-IoT (IIoT) has revolutionized the smart industrial processes while this evolution imposes mandatory requirements of reliable, cybersecure and well performed network. This implants adopting effective approaches of improving performance and cybersecurity in IIoT networks towards building a trusted cyber-physical communication. IIoT generates huge data of which some are real-time and rest are big data which needs assurance of delivery without loss. This report has modeled the performance and security issues of intelligent physical systems. While demonstrating the performance and security strategies of improving them, this paper addresses issues for consideration to overcome the security and performance improvement bottlenecks.
  • Thumbnail Image
    PublicationEmbargo
    Reliability and Cybersecurity Improvement Strategies in Wireless Sensor Networks for IoT-enabled Smart Infrastructures
    (IEEE, 2019-10-18) Sen, S; Jayawardena, C
    IoT-enabled smart applications and infrastructures use low power wireless sensor networks widely. But due to low energy and lack of computing capabilities, the comprehensive use of such devices result in reliability and security vulnerabilities. Therefore, the lower capability of sensor devices need to operate wisely with careful technical considerations to maximize their capabilities. This paper proposes a new technique to improve reliability and cybersecurity by balanced use of sensor energy while maintaining the quality of communication. The simulation result shows that the strategy proposed is effective. A hacking strategy has also been detailed so that the security experts can consider those while designing a security suite for IoT-enabled infrastructures.