Ruhma Tahir

Learn More
Wireless Sensor Networks (WSNs) have the potential of being employed in a variety of applications ranging from battlefield surveillance to everyday applications such as smart homes and patient monitoring. Security is a major challenge that all applications based on WSNs are facing nowadays. Firstly, due to the wireless nature of WSNs, and secondly due to(More)
This paper presents a scheme for the generation of strong session based ICMetrics key pairs for security critical embedded system applications. ICMetrics generates the security attributes of the sensor node based on measurable hardware and software characteristics of the integrated circuit. In the proposed scheme a random session ID is assigned by a trusted(More)
The advent of embedded systems has completely transformed the information landscape. With the explosive growth in the use of interactive real-time technologies, this internet landscape aims to support an even broader range of application domains. The large amount of data that is exchanged by these applications has made them an attractive target for attacks.(More)
—In this paper we propose a Lightweight Encryption Mechanism based on the Rabbit stream cipher for providing confidentiality in Wireless Sensor Networks (WSNs) that fulfils both requirements of security as well as energy efficiency. Our proposed security protocol is an idea for resource constrained WSNs, and can be widely used in the applications of secure(More)
Security schemes are rendered impractical if their cryptographic keys are compromised. ICMetric technology is an innovation in the field of cryptography that generates a device identification based on the inherent features of a device. Devices in the internet of things (IoT) are cyber physical systems with varying purpose and platforms. Since these devices(More)
This paper proposes a novel architecture that offers features for a truly interactive yet private document archival cloud. The proposed secure document archival system has been specifically designed for the elimination of paper based systems in organization. The architecture attempts to shift paper based systems to an electronic archival system where the(More)
This paper presents a scheme for the generation of strong high entropy keys based on ICMetrics. ICMetrics generates the security attributes of the sensor node based on measurable hardware and software characteristics of the integrated circuit. This work is based on key derivation functions to derive cryptographic key pairs from ICMetrics values. The(More)
Cryptography has become an essential for providing security in embedded system applications. The employed cryptographic primitives should provide strong protection such that the security of the system is not compromised at any point in the lifecycle of a secure operation. This particularly includes the secure generation and maintenance of cryptographic(More)
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the(More)
  • 1