{"title":"Biometric Blockchain-based Multifactor Privacy Perserving Authentication Scheme for VANETs","authors":"Myra Annatasha Umang Dineal Gumis, Travis Iran Money, Zetty Elica Affandi, Siti Najihah Sapuan, Mastura Tony, Mohd. Haziq Qayyim Safian, Nur Huda Hamka","doi":"10.33736/jita.3851.2021","DOIUrl":"https://doi.org/10.33736/jita.3851.2021","url":null,"abstract":"To provide the most suitable or compatible scheme to work against various attack toward vehicular ad hoc networks (VANETs) is very challenging. Not only that the high authentication and communication overhead also became a problem for VANETs. Thus, in this paper we use multifactor authentication that could resist various attack toward VANETs. A biometric blockchain-based multifactor privacy-preserving authentication scheme for VANETs. This scheme is proposed by using a new robust pseudo-identity multifactor VANET scheme based on Physical Unclonable Functions (PUF) and biometric data of the vehicle’s authorized user. To calculate the computational cost and the authentication overhead, we compare three of our computational cost and authentication overhead below. From the complexity analysis this proposed scheme has a lower authentication overhead and offers better security level and a low computational cost can be achieved. From the perspective of future, we hope that the cost that involve in this scheme still can be reduce as we offer a high security level. Not only that, but we also hope that this scheme can be implemented practically.","PeriodicalId":152019,"journal":{"name":"Journal of IT in Asia","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128291825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jane Yong, Zi Jian Chai, Kah Hao Chin, Christopher Chin Fung Chee, Daniel Soh, Jing Yong Kwong, Wei Yin Ooi
{"title":"An AODV Based Multifactor Authentication Scheme for Wireless Sensor Network","authors":"Jane Yong, Zi Jian Chai, Kah Hao Chin, Christopher Chin Fung Chee, Daniel Soh, Jing Yong Kwong, Wei Yin Ooi","doi":"10.33736/jita.3840.2021","DOIUrl":"https://doi.org/10.33736/jita.3840.2021","url":null,"abstract":"Wireless Sensor Network (WSN) is a type of wireless network that is fast getting a lot of attention in scientific and industrial applications, and it is a network of decentralized autonomous standalone sensor devices. However, WSN is easily prone to malicious attacks as anyone can access the server through the node without a proper security authentication. In this paper, we proposed a secure AODV based multi-factor authentication scheme for WSN to mitigate physical attack, offline guessing attack and replay attack. Our proposed scheme is preferred to keep the scheme lightweight while providing enough security that requires smart card, user identity, password, and OTP. Our proposed scheme has relatively lower computational cost with a total of 10Th than the other compared schemes except for Adil et al.’s scheme. However, we have around 8288 bits of authentication overhead due to the nature of packet and the addition of factors. Hence, our scheme is outperformed from computational cost perspective, but the scheme is slightly higher on authentication overhead perspective. In the future, multiple device authentication, implementation of biometric feature can be added to improve the scheme.","PeriodicalId":152019,"journal":{"name":"Journal of IT in Asia","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132366506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sharon Chan Suet Yan, Alice Tang Su Wei, Jie Hui Bong, Quor Ling Teh, Shanmugapiriya Sivalingam, S. Khoo, Tahmid Mutashim Nafy
{"title":"Authentication of IoT device with the enhancement of One-time Password (OTP)","authors":"Sharon Chan Suet Yan, Alice Tang Su Wei, Jie Hui Bong, Quor Ling Teh, Shanmugapiriya Sivalingam, S. Khoo, Tahmid Mutashim Nafy","doi":"10.33736/jita.3841.2021","DOIUrl":"https://doi.org/10.33736/jita.3841.2021","url":null,"abstract":"The Robust and Energy Efficient Authentication Protocol works for Industrial Internet of Things. The Internet of Things (IoT) is an arising innovation and expected to give answers for different modern fields. The IoT enable connection of physical devices all around the world to the internet by collecting and sharing critical and real-time data among each other. The increment of devices increases the computational cost during data transmission between devices and towards the internet. In this paper we proposed a solution that is a multi-factor authentication protocol to enhance the protocol proposed by Li et al. For Industrial IoT by adding One Time Password (OTP) after the biometric information of the user is checked by the Gateway Node (GWN) to be able to tackle additional network attack aside from those that are overcome by Li et al. scheme. Our contribution for this project is, we proposed the solution that a multi-factor authentication protocol to enhance the protocol proposed. For Industrial IoT by adding One Time Password (OTP) after the biometric information of the user is checked by the Gateway Node (GWN) to be able to tackle additional network attack aside from those that are overcome. The idea of adding OTP is inspired by where they scheme correlates to biometric of user as well. Our proposal is lower cost than the three protocols regarding authentication overhead and computational cost perspectives. Challenges and future directions of this paper examined the security shortcomings of a client confirmation convention for WSN, which is as proposed by Chang and Le. To address the normal security shortcomings of past protocols, we proposed a strong and energy effective three-factor authentication protocol for WSN.","PeriodicalId":152019,"journal":{"name":"Journal of IT in Asia","volume":"102 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120873615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring teachers’ readiness to use technology","authors":"Jecky Misieng, Joseph Ramanair, Souba Rethinasamy","doi":"10.33736/JITA.852.2018","DOIUrl":"https://doi.org/10.33736/JITA.852.2018","url":null,"abstract":"\u0000 \u0000 \u0000Accepted as an integral part of education, technology in teaching and learning can enhance practice not only in the traditional class but also beyond it. Schooling can now be extended to learning beyond the four enclosed walls of the classroom into the almost limitless possibility of education across time and space accessible via the domain of cyber technology. The significant contribution of technology to education has prompted educational bodies like the Malaysian Ministry of Education to prominently point out that online learning becomes the main pedagogical approach in higher learning institutions in the nation’s educational blueprint. The powerful potential of technology however, can only be realised through informed and purposeful use of it by teachers. Integrating technology in the language classroom requires that teachers not only have knowledge about the Technology but interplay between three components of knowledge – Technology, Pedagogy, and Content Knowledge (TPACK) which determines the essential qualities of teacher knowledge that are required when teachers employ technology in their teaching. The main study is therefore designed to measure teachers’ readiness to use technology in teaching English language in tertiary level classrooms to enhance student learning. To serve this purpose, a pilot study was carried out on 20 English language instructors to evaluate the reliability and the validity of a questionnaire that was adapted to gauge instructors’ readiness in carrying out technology-mediated classrooms at a public university in Malaysia. Correlations among items in the current study reveals lower coefficients compared to a previous study on the same instrument probably due to the smaller sample size in the current study but the correlationships are mostly positive which still suggests convergence validity. The internal consistency of the items was mostly better than two previous similar studies. Five items that seemed to be misbehaving in their respective measures were chosen based on their inter-item correlation and the item-total statistics and scrutinized via cognitive interviews with selected respondents to gain insights into the items but the results of the interviews revealed that the items are functioning as intended. \u0000 \u0000 \u0000","PeriodicalId":152019,"journal":{"name":"Journal of IT in Asia","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121604597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust on Knowledge-Sharing Behaviour Among Academicians in Public Universities: A Review","authors":"Arenawati Sehat Omar","doi":"10.33736/JITA.813.2018","DOIUrl":"https://doi.org/10.33736/JITA.813.2018","url":null,"abstract":"\u0000 \u0000 \u0000Universities are probably the places, where knowledge is freely and openly shared among the academicians. Although, the knowledge sharing is hardly presented within the university level these days in reality. Academic institutions, specifically the public universities are now experiencing the ever rising faculty demands for quality expertise and resource sharing. As a consequence, knowledge sharing has become a rising concern in academia. The study has aimed to assess the factors concerned with knowledge sharing among academicians in public universities. The study has reviewed the knowledge-sharing behaviour concept from the academic perspective in terms of written contribution, organizational communications, and communities of practice. Trust based on Social Exchange Theory has also been reviewed along with the association between trusts and knowledge-sharing behaviour. The study has highlighted trust as an essential factor, which makes an organization strive on valuable resources. Knowledge, on the other hand, is deemed as a power and considered as an undeniable aspect. Knowledge-sharing behaviour and humans are the two main constituents of knowledge. The study has presented the theoretical assessment of how the academicians are disposed positively towards the knowledge sharing within an organization. It is essential to assist practitioners to create and promote a knowledge-sharing environment especially within the context of public universities. \u0000 \u0000 \u0000 \u0000Keywords: Trust, knowledge, knowledge-sharing behavior, public universities, Malaysia","PeriodicalId":152019,"journal":{"name":"Journal of IT in Asia","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128042999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}