Extending hybrid approach to secure Trivial File Transfer Protocol in M2M communication: a comparative analysis View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2019-04

AUTHORS

Nur Nabila Mohamed, Yusnani Mohd Yussoff, Mohd Anuar Mat Isa, Habibah Hashim

ABSTRACT

Embedded Machine-to-Machine (M2M) is one of the hottest research topics in recent industrial Internet of Things. In order to serve the communication to effectively transfer data and messages between machines, the system must incorporate a file transfer protocol, known as Trivial File Transfer Protocol (TFTP). However, the main constraint is lack of security mechanism during TFTP Client–Server communication whereby its reliability is questionable as the protocol does not support any authentication or encryption methods, also provide no access control and zero protection from Man-In-The-Middle. Hence, in order to enhance the protocol security, hybrid security approach combining Diffie Hellman Key Exchange (DHKE) scheme and Advanced Encryption Standard symmetric encryption algorithm are proposed to be integrated into TFTP packet header. In this work, we present a performance comparison of three different protocols: the original TFTP protocol, TFTP protocol with single security extension, and our proposed TFTP protocol integrated with hybrid security approach to analyse the effectiveness of the method. The finding demonstrates that our proposed secure TFTP protocol generates comparable execution time as when implementing single encryption option, also more reliable to be used in the commercial system especially for low-cost M2M embedded infrastructure. More... »

PAGES

511-523

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/s11235-018-0522-5

DOI

http://dx.doi.org/10.1007/s11235-018-0522-5

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1107828729


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "name": [
            "Computer Engineering Department, Universiti Teknologi, MARA, 40450, Shah Alam, Selangor, Malaysia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Mohamed", 
        "givenName": "Nur Nabila", 
        "id": "sg:person.015250360163.98", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015250360163.98"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "Computer Engineering Department, Universiti Teknologi, MARA, 40450, Shah Alam, Selangor, Malaysia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Mohd Yussoff", 
        "givenName": "Yusnani", 
        "id": "sg:person.010542373667.92", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010542373667.92"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "Computer Engineering Department, Universiti Teknologi, MARA, 40450, Shah Alam, Selangor, Malaysia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Mat Isa", 
        "givenName": "Mohd Anuar", 
        "id": "sg:person.014204350135.48", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014204350135.48"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "Computer Engineering Department, Universiti Teknologi, MARA, 40450, Shah Alam, Selangor, Malaysia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hashim", 
        "givenName": "Habibah", 
        "id": "sg:person.015121662377.74", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015121662377.74"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1016/j.cose.2015.09.006", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1009668658"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.procs.2015.04.109", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1020538334"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-0-387-74390-5_3", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1020818252", 
          "https://doi.org/10.1007/978-0-387-74390-5_3"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-94-017-9804-4_41", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1030004824", 
          "https://doi.org/10.1007/978-94-017-9804-4_41"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.comcom.2008.05.041", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1030143671"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11801412_8", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1041684100", 
          "https://doi.org/10.1007/11801412_8"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11801412_8", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1041684100", 
          "https://doi.org/10.1007/11801412_8"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://app.dimensions.ai/details/publication/pub.1042549680", 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-04101-3", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1042549680", 
          "https://doi.org/10.1007/978-3-642-04101-3"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-04101-3", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1042549680", 
          "https://doi.org/10.1007/978-3-642-04101-3"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tit.1976.1055638", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061647862"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1587/transinf.2013thp0009", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1068092349"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.4316/aece.2013.02004", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1072511618"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.18535/ijecs/v6i4.06", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1084637095"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s11235-017-0340-1", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1085886568", 
          "https://doi.org/10.1007/s11235-017-0340-1"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s11235-017-0340-1", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1085886568", 
          "https://doi.org/10.1007/s11235-017-0340-1"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s11235-017-0345-9", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1085999710", 
          "https://doi.org/10.1007/s11235-017-0345-9"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s11235-017-0345-9", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1085999710", 
          "https://doi.org/10.1007/s11235-017-0345-9"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iscaie.2012.6482117", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093276154"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/wmsvm.2010.48", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093743116"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/siitme.2014.6967021", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093780314"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/eucnc.2014.6882661", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094078990"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icicic.2009.80", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094290791"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/comnet.2014.6840934", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094465119"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/emes.2015.7158440", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094757110"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/trustcom.2012.189", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094779457"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/csnt.2013.97", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094933377"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/csnt.2013.97", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094933377"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/wicom.2008.1223", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095543287"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/apmediacast.2016.7878165", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095792717"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/itnec.2017.8285102", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1100928282"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1063/1.5032036", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1108108164"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2019-04", 
    "datePublishedReg": "2019-04-01", 
    "description": "Embedded Machine-to-Machine (M2M) is one of the hottest research topics in recent industrial Internet of Things. In order to serve the communication to effectively transfer data and messages between machines, the system must incorporate a file transfer protocol, known as Trivial File Transfer Protocol (TFTP). However, the main constraint is lack of security mechanism during TFTP Client\u2013Server communication whereby its reliability is questionable as the protocol does not support any authentication or encryption methods, also provide no access control and zero protection from Man-In-The-Middle. Hence, in order to enhance the protocol security, hybrid security approach combining Diffie Hellman Key Exchange (DHKE) scheme and Advanced Encryption Standard symmetric encryption algorithm are proposed to be integrated into TFTP packet header. In this work, we present a performance comparison of three different protocols: the original TFTP protocol, TFTP protocol with single security extension, and our proposed TFTP protocol integrated with hybrid security approach to analyse the effectiveness of the method. The finding demonstrates that our proposed secure TFTP protocol generates comparable execution time as when implementing single encryption option, also more reliable to be used in the commercial system especially for low-cost M2M embedded infrastructure.", 
    "genre": "research_article", 
    "id": "sg:pub.10.1007/s11235-018-0522-5", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": [
      {
        "id": "sg:journal.1049187", 
        "issn": [
          "1018-4864", 
          "1572-9451"
        ], 
        "name": "Telecommunication Systems", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "4", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "70"
      }
    ], 
    "name": "Extending hybrid approach to secure Trivial File Transfer Protocol in M2M communication: a comparative analysis", 
    "pagination": "511-523", 
    "productId": [
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "2458efc402db261ff67741ac7ed44557389ae64bc3f33df67c748e0866f128ae"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/s11235-018-0522-5"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1107828729"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1007/s11235-018-0522-5", 
      "https://app.dimensions.ai/details/publication/pub.1107828729"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2019-04-11T13:04", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000366_0000000366/records_112035_00000000.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "https://link.springer.com/10.1007%2Fs11235-018-0522-5"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s11235-018-0522-5'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s11235-018-0522-5'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s11235-018-0522-5'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s11235-018-0522-5'


 

This table displays all metadata directly associated to this object as RDF triples.

173 TRIPLES      21 PREDICATES      54 URIs      19 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/s11235-018-0522-5 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N76fe10e310e246e68f0faa4f1b53f493
4 schema:citation sg:pub.10.1007/11801412_8
5 sg:pub.10.1007/978-0-387-74390-5_3
6 sg:pub.10.1007/978-3-642-04101-3
7 sg:pub.10.1007/978-94-017-9804-4_41
8 sg:pub.10.1007/s11235-017-0340-1
9 sg:pub.10.1007/s11235-017-0345-9
10 https://app.dimensions.ai/details/publication/pub.1042549680
11 https://doi.org/10.1016/j.comcom.2008.05.041
12 https://doi.org/10.1016/j.cose.2015.09.006
13 https://doi.org/10.1016/j.procs.2015.04.109
14 https://doi.org/10.1063/1.5032036
15 https://doi.org/10.1109/apmediacast.2016.7878165
16 https://doi.org/10.1109/comnet.2014.6840934
17 https://doi.org/10.1109/csnt.2013.97
18 https://doi.org/10.1109/emes.2015.7158440
19 https://doi.org/10.1109/eucnc.2014.6882661
20 https://doi.org/10.1109/icicic.2009.80
21 https://doi.org/10.1109/iscaie.2012.6482117
22 https://doi.org/10.1109/itnec.2017.8285102
23 https://doi.org/10.1109/siitme.2014.6967021
24 https://doi.org/10.1109/tit.1976.1055638
25 https://doi.org/10.1109/trustcom.2012.189
26 https://doi.org/10.1109/wicom.2008.1223
27 https://doi.org/10.1109/wmsvm.2010.48
28 https://doi.org/10.1587/transinf.2013thp0009
29 https://doi.org/10.18535/ijecs/v6i4.06
30 https://doi.org/10.4316/aece.2013.02004
31 schema:datePublished 2019-04
32 schema:datePublishedReg 2019-04-01
33 schema:description Embedded Machine-to-Machine (M2M) is one of the hottest research topics in recent industrial Internet of Things. In order to serve the communication to effectively transfer data and messages between machines, the system must incorporate a file transfer protocol, known as Trivial File Transfer Protocol (TFTP). However, the main constraint is lack of security mechanism during TFTP Client–Server communication whereby its reliability is questionable as the protocol does not support any authentication or encryption methods, also provide no access control and zero protection from Man-In-The-Middle. Hence, in order to enhance the protocol security, hybrid security approach combining Diffie Hellman Key Exchange (DHKE) scheme and Advanced Encryption Standard symmetric encryption algorithm are proposed to be integrated into TFTP packet header. In this work, we present a performance comparison of three different protocols: the original TFTP protocol, TFTP protocol with single security extension, and our proposed TFTP protocol integrated with hybrid security approach to analyse the effectiveness of the method. The finding demonstrates that our proposed secure TFTP protocol generates comparable execution time as when implementing single encryption option, also more reliable to be used in the commercial system especially for low-cost M2M embedded infrastructure.
34 schema:genre research_article
35 schema:inLanguage en
36 schema:isAccessibleForFree false
37 schema:isPartOf N2619d19c928549598caec19aa0fba5d6
38 N6a822346d73f43cc88009598259b07be
39 sg:journal.1049187
40 schema:name Extending hybrid approach to secure Trivial File Transfer Protocol in M2M communication: a comparative analysis
41 schema:pagination 511-523
42 schema:productId N41b5014e2a4a4aa18da51f88814dfe42
43 N906e38f078d546f9b860864dfefdad86
44 Nfdf43482551441ad838956c3422dd1e4
45 schema:sameAs https://app.dimensions.ai/details/publication/pub.1107828729
46 https://doi.org/10.1007/s11235-018-0522-5
47 schema:sdDatePublished 2019-04-11T13:04
48 schema:sdLicense https://scigraph.springernature.com/explorer/license/
49 schema:sdPublisher N7033610dd33043adbbc2a403aa44d708
50 schema:url https://link.springer.com/10.1007%2Fs11235-018-0522-5
51 sgo:license sg:explorer/license/
52 sgo:sdDataset articles
53 rdf:type schema:ScholarlyArticle
54 N119d63bfed024e429f54bc1ff419508e rdf:first sg:person.015121662377.74
55 rdf:rest rdf:nil
56 N2619d19c928549598caec19aa0fba5d6 schema:issueNumber 4
57 rdf:type schema:PublicationIssue
58 N2f0794a8edc84e1480077d68a34955eb schema:name Computer Engineering Department, Universiti Teknologi, MARA, 40450, Shah Alam, Selangor, Malaysia
59 rdf:type schema:Organization
60 N3a85dcfcc8994b318522bf49a469d3b8 rdf:first sg:person.010542373667.92
61 rdf:rest Nc9c680aa59d24c1cab557a419f61bbcf
62 N41b5014e2a4a4aa18da51f88814dfe42 schema:name dimensions_id
63 schema:value pub.1107828729
64 rdf:type schema:PropertyValue
65 N546aac9914984df882990d825719aac9 schema:name Computer Engineering Department, Universiti Teknologi, MARA, 40450, Shah Alam, Selangor, Malaysia
66 rdf:type schema:Organization
67 N6a822346d73f43cc88009598259b07be schema:volumeNumber 70
68 rdf:type schema:PublicationVolume
69 N7033610dd33043adbbc2a403aa44d708 schema:name Springer Nature - SN SciGraph project
70 rdf:type schema:Organization
71 N76fe10e310e246e68f0faa4f1b53f493 rdf:first sg:person.015250360163.98
72 rdf:rest N3a85dcfcc8994b318522bf49a469d3b8
73 N906e38f078d546f9b860864dfefdad86 schema:name doi
74 schema:value 10.1007/s11235-018-0522-5
75 rdf:type schema:PropertyValue
76 Nc9c680aa59d24c1cab557a419f61bbcf rdf:first sg:person.014204350135.48
77 rdf:rest N119d63bfed024e429f54bc1ff419508e
78 Nca7bf78b10934a61909847c384c5c2ed schema:name Computer Engineering Department, Universiti Teknologi, MARA, 40450, Shah Alam, Selangor, Malaysia
79 rdf:type schema:Organization
80 Nf075158735d34a7c8257cf41f898d16c schema:name Computer Engineering Department, Universiti Teknologi, MARA, 40450, Shah Alam, Selangor, Malaysia
81 rdf:type schema:Organization
82 Nfdf43482551441ad838956c3422dd1e4 schema:name readcube_id
83 schema:value 2458efc402db261ff67741ac7ed44557389ae64bc3f33df67c748e0866f128ae
84 rdf:type schema:PropertyValue
85 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
86 schema:name Information and Computing Sciences
87 rdf:type schema:DefinedTerm
88 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
89 schema:name Data Format
90 rdf:type schema:DefinedTerm
91 sg:journal.1049187 schema:issn 1018-4864
92 1572-9451
93 schema:name Telecommunication Systems
94 rdf:type schema:Periodical
95 sg:person.010542373667.92 schema:affiliation Nf075158735d34a7c8257cf41f898d16c
96 schema:familyName Mohd Yussoff
97 schema:givenName Yusnani
98 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010542373667.92
99 rdf:type schema:Person
100 sg:person.014204350135.48 schema:affiliation N546aac9914984df882990d825719aac9
101 schema:familyName Mat Isa
102 schema:givenName Mohd Anuar
103 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014204350135.48
104 rdf:type schema:Person
105 sg:person.015121662377.74 schema:affiliation N2f0794a8edc84e1480077d68a34955eb
106 schema:familyName Hashim
107 schema:givenName Habibah
108 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015121662377.74
109 rdf:type schema:Person
110 sg:person.015250360163.98 schema:affiliation Nca7bf78b10934a61909847c384c5c2ed
111 schema:familyName Mohamed
112 schema:givenName Nur Nabila
113 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015250360163.98
114 rdf:type schema:Person
115 sg:pub.10.1007/11801412_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041684100
116 https://doi.org/10.1007/11801412_8
117 rdf:type schema:CreativeWork
118 sg:pub.10.1007/978-0-387-74390-5_3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020818252
119 https://doi.org/10.1007/978-0-387-74390-5_3
120 rdf:type schema:CreativeWork
121 sg:pub.10.1007/978-3-642-04101-3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042549680
122 https://doi.org/10.1007/978-3-642-04101-3
123 rdf:type schema:CreativeWork
124 sg:pub.10.1007/978-94-017-9804-4_41 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030004824
125 https://doi.org/10.1007/978-94-017-9804-4_41
126 rdf:type schema:CreativeWork
127 sg:pub.10.1007/s11235-017-0340-1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1085886568
128 https://doi.org/10.1007/s11235-017-0340-1
129 rdf:type schema:CreativeWork
130 sg:pub.10.1007/s11235-017-0345-9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1085999710
131 https://doi.org/10.1007/s11235-017-0345-9
132 rdf:type schema:CreativeWork
133 https://app.dimensions.ai/details/publication/pub.1042549680 schema:CreativeWork
134 https://doi.org/10.1016/j.comcom.2008.05.041 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030143671
135 rdf:type schema:CreativeWork
136 https://doi.org/10.1016/j.cose.2015.09.006 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009668658
137 rdf:type schema:CreativeWork
138 https://doi.org/10.1016/j.procs.2015.04.109 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020538334
139 rdf:type schema:CreativeWork
140 https://doi.org/10.1063/1.5032036 schema:sameAs https://app.dimensions.ai/details/publication/pub.1108108164
141 rdf:type schema:CreativeWork
142 https://doi.org/10.1109/apmediacast.2016.7878165 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095792717
143 rdf:type schema:CreativeWork
144 https://doi.org/10.1109/comnet.2014.6840934 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094465119
145 rdf:type schema:CreativeWork
146 https://doi.org/10.1109/csnt.2013.97 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094933377
147 rdf:type schema:CreativeWork
148 https://doi.org/10.1109/emes.2015.7158440 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094757110
149 rdf:type schema:CreativeWork
150 https://doi.org/10.1109/eucnc.2014.6882661 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094078990
151 rdf:type schema:CreativeWork
152 https://doi.org/10.1109/icicic.2009.80 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094290791
153 rdf:type schema:CreativeWork
154 https://doi.org/10.1109/iscaie.2012.6482117 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093276154
155 rdf:type schema:CreativeWork
156 https://doi.org/10.1109/itnec.2017.8285102 schema:sameAs https://app.dimensions.ai/details/publication/pub.1100928282
157 rdf:type schema:CreativeWork
158 https://doi.org/10.1109/siitme.2014.6967021 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093780314
159 rdf:type schema:CreativeWork
160 https://doi.org/10.1109/tit.1976.1055638 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061647862
161 rdf:type schema:CreativeWork
162 https://doi.org/10.1109/trustcom.2012.189 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094779457
163 rdf:type schema:CreativeWork
164 https://doi.org/10.1109/wicom.2008.1223 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095543287
165 rdf:type schema:CreativeWork
166 https://doi.org/10.1109/wmsvm.2010.48 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093743116
167 rdf:type schema:CreativeWork
168 https://doi.org/10.1587/transinf.2013thp0009 schema:sameAs https://app.dimensions.ai/details/publication/pub.1068092349
169 rdf:type schema:CreativeWork
170 https://doi.org/10.18535/ijecs/v6i4.06 schema:sameAs https://app.dimensions.ai/details/publication/pub.1084637095
171 rdf:type schema:CreativeWork
172 https://doi.org/10.4316/aece.2013.02004 schema:sameAs https://app.dimensions.ai/details/publication/pub.1072511618
173 rdf:type schema:CreativeWork
 




Preview window. Press ESC to close (or click here)


...