scispace - formally typeset
Search or ask a question
Author

M. W. Youssef

Bio: M. W. Youssef is an academic researcher. The author has contributed to research in topics: Challenge–response authentication & Chip Authentication Program. The author has an hindex of 2, co-authored 4 publications receiving 9 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The communication protection mechanism modifies the Challenge-Handshake Authentication Protocol (CHAP) which is responsible for the authentication of communication of layer two High-level Data Link Control (HDLC) protocol.
Abstract: Computer communications have been playing a vital role in the world economy. Government organizations, large companies and banks are using those networks in trading their data. This imposed a challenge due to the increasing need for protecting the sensitive data traded over those networks. This research presents a mechanism to protect computers communication over open un-trusted networks, primarily, that mechanism relies on securing communication authentication. In order to do that, the communication protection mechanism modifies the Challenge-Handshake Authentication Protocol (CHAP ) which is responsible for the authentication of communication of layer two High-level Data Link Control (HDLC ) protocol.

4 citations

Proceedings ArticleDOI
27 Oct 2011
TL;DR: This work presents a scrambling and encrypting mechanism to authenticate information in packet headers of the data link layer, HDLC — PPP protocol.
Abstract: Information exchanged over open networks in many cases contain sensitive data, accordingly, security became an important issue to many people. Authentication has proven to be a deterrent to intruders and ensures that information is transmitted from trusted senders to a trusted receiver. This work is an extension of previous authentication work. It presents a scrambling and encrypting mechanism to authenticate information in packet headers of the data link layer, HDLC — PPP protocol. HDLC was selected for many reasons one of which is being secured by nature.

3 citations

01 Jan 2011
TL;DR: This paper presents a scrambling and encrypting mechanism to authenticate information in packet headers of the data link layer, HDLC – PPP protocol.
Abstract: Summary: With the increase in the importance and utilization of information, grows the importance of developing security mechanisms for the information exchanged over various types of communications networks. In this paper, we present a novel method to authenticate open communications systems by using scrambling and encryption. It involves the enhancement to the data link layer format that involves utilization of unused segments. Authentication has proven to be a deterrent to intruders and ensures that information is transmitted from trusted senders to a trusted receiver. It presents a scrambling and encrypting mechanism to authenticate information in packet headers of the data link layer, HDLC – PPP protocol.

2 citations

Journal ArticleDOI
TL;DR: This paper presents a methodology of securing computer communication based on identifying typical communication behavior of each system user based on the dominant set of protocols utilized between the network nodes.
Abstract: Communication security has become the keynote of the "e" world. Industries like eComm, eGov were built on the technology of computer networks. Those industries cannot afford security breaches. This paper presents a methodology of securing computer communication based on identifying typical communication behavior of each system user based on the dominant set of protocols utilized between the network nodes.

Cited by
More filters
Book ChapterDOI
01 Apr 2012
TL;DR: A simple protocol based on zero knowledge proof by which the user can prove to the authentication server that he has the password without having to send the password to the server as either cleartext or in encrypted format is presented.
Abstract: In many applications, the password is sent as cleartext to the server to be authenticated thus providing the eavesdropper with opportunity to steal valuable data. This paper presents a simple protocol based on zero knowledge proof by which the user can prove to the authentication server that he has the password without having to send the password to the server as either cleartext or in encrypted format. Thus the user can authenticate himself without having to actually reveal the password to the server. Also, another version of this protocol has been proposed which makes use of public key cryptography thus adding one more level of security to the protocol and enabling mutual authentication between the client & server.

7 citations

Book ChapterDOI
01 Jan 2017
TL;DR: Light weight system is proposed to characterize the data loss and to minimize the performance degradation in ad hoc networks, which includes the concept of cryptography and routing protocol implementation at different stages of data transfer.
Abstract: In the field of wireless networks, Mobile Ad hoc Network (MANET) is one of the most unique applications due to mobility and scalability. As it is vulnerable to malicious attackers with the open medium and wide distribution, network performance is degraded with the behavior attacks in MANET’s, which makes protection most important. In any ad hoc networks, one of the situations is that, when a data distributor possesses sensitive data destined to a set of supposedly trusted parties, some data can be leaked at an authorized place. With the introduction of fake objects the data allocation strategies gives a path in identifying leakages ensuring more security with encryption. In this context, light weight system is proposed to characterize the data loss and to minimize the performance degradation in such networks. The light weight system includes the concept of cryptography and routing protocol implementation at different stages of data transfer. A social network is taken as a challenging issue to achieve the proposed scheme.

6 citations

Journal ArticleDOI
TL;DR: The communication protection mechanism modifies the Challenge-Handshake Authentication Protocol (CHAP) which is responsible for the authentication of communication of layer two High-level Data Link Control (HDLC) protocol.
Abstract: Computer communications have been playing a vital role in the world economy. Government organizations, large companies and banks are using those networks in trading their data. This imposed a challenge due to the increasing need for protecting the sensitive data traded over those networks. This research presents a mechanism to protect computers communication over open un-trusted networks, primarily, that mechanism relies on securing communication authentication. In order to do that, the communication protection mechanism modifies the Challenge-Handshake Authentication Protocol (CHAP ) which is responsible for the authentication of communication of layer two High-level Data Link Control (HDLC ) protocol.

4 citations

Journal ArticleDOI
TL;DR: The password required for authentication of members of group communication is securely delivered by the source or initiator of the group using zero knowledge proof and sent to the group member in an encrypted format using cipher block mode encryption.
Abstract: The password which is a more secure and valuable data should be highly protected from eavesdropper. This paper presents how password required for authentication of members of group communication is securely delivered by the source or initiator of the group. The password delivery uses zero knowledge proof and sent to the group member in an encrypted format using cipher block mode encryption. The password delivered is a One Time Password which can be used for certain amount of time in order to ensure a highly secure communication environment among the group.

3 citations

27 Apr 2018
TL;DR: An optimized WRED is one of the improved mechanisms that can contribute to an increased performance of devices in a network for any communication established.
Abstract: Weighted Random Early detection (WRED) is a mechanism that is responsible to avoid congestion in a network, by sensing the movement of nodes, on the basis of analyzed value for multiple queues of data packets. Numbers of devices always try to transmit data packets for certain time span, there would be an issue of consumed bandwidth, delay, media access delay, load in a network; and these factors can conclude to an increased queuing delay, decreased throughput, long queues, increased number of retransmissions for particular device in a network. So an optimized WRED is one of the improved mechanisms that can contribute to an increased performance of devices in a network for any communication established. To attain a comparative analysis of performance OPNET IT GURU EDUCATIONAL VERSION 14.5 Modeler is used.

1 citations