Скачать презентацию ﺭﻭﺵ ﺍﻣﻦ ﻭ ﻧﺎﺷﻨﺎﺱ ﺟﻬﺖ ﺗﺼﺪیﻖ کﺎﺭﺑﺮ Скачать презентацию ﺭﻭﺵ ﺍﻣﻦ ﻭ ﻧﺎﺷﻨﺎﺱ ﺟﻬﺖ ﺗﺼﺪیﻖ کﺎﺭﺑﺮ

2d00e22001f3ebf581adfabc308f0022.ppt

  • Количество слайдов: 45

 ﺭﻭﺵ ﺍﻣﻦ ﻭ ﻧﺎﺷﻨﺎﺱ ﺟﻬﺖ ﺗﺼﺪیﻖ کﺎﺭﺑﺮ ﺩﺭ ﺷﺒکﻪ ﻫﺎی Proxy Mobile IPv ﺭﻭﺵ ﺍﻣﻦ ﻭ ﻧﺎﺷﻨﺎﺱ ﺟﻬﺖ ﺗﺼﺪیﻖ کﺎﺭﺑﺮ ﺩﺭ ﺷﺒکﻪ ﻫﺎی Proxy Mobile IPv 6 ﻣﺠﺘﺒی ﻋﻠیﺰﺍﺩﻩ Information Technology and Multimedia Security Laboratory, Kyushu University 2

 ﻓﻬﺮﺳﺖ ﻣﻄﺎﻟﺐ I II IV V VI VI VI 3 ﻣﻌﺮﻓی ﻭ ﻣﻘﺪﻣﻪ ﻓﻬﺮﺳﺖ ﻣﻄﺎﻟﺐ I II IV V VI VI VI 3 ﻣﻌﺮﻓی ﻭ ﻣﻘﺪﻣﻪ ﺑﺮﺭﺳی ﻣﺸکﻼﺕ ﺍﻣﻨیﺘی ﺭﻭﺷﻬﺎی ﻣﻮﺟﻮﺩ ﺍﻫﺪﺍﻑ ﺗﺤﻘیﻖ ﺭﻭﺵ ﺗﺤﻘیﻖ ﺭﻭﺷﻬﺎی پیﺸﻨﻬﺎﺩی ﺗﺤﻠیﻞ ﻧﺘﺎیﺞ ﻧﺘیﺠﻪ گیﺮی

 ﻣﻌﺮﻓی ﺭﺷﺘﻪ ﺗﺤﺼیﻠی: ﺍﻣﻨیﺖ ﺷﺒکﻪ : ( ﺩﺍﻧﺸگﺎﻫﻬﺎی ﻣﺤﻞ ﺗﺤﺼیﻞ )ﺑﻮﺭﺳیﻪ کﺎﻣﻞ ﻭﺯﺍﺭﺕ ﻣﻌﺮﻓی ﺭﺷﺘﻪ ﺗﺤﺼیﻠی: ﺍﻣﻨیﺖ ﺷﺒکﻪ : ( ﺩﺍﻧﺸگﺎﻫﻬﺎی ﻣﺤﻞ ﺗﺤﺼیﻞ )ﺑﻮﺭﺳیﻪ کﺎﻣﻞ ﻭﺯﺍﺭﺕ ﻋﻠﻮﻡ ژﺎپﻦ-کﺴﺐ ﻋﻨﻮﺍﻥ ﻓﺎﺭﻍ ﺍﻟﺘﺤﺼیﻞ ﻣﻤﺘﺎﺯ 1. Communication Systems and Networks (CSN) i-Kohza, Malaysia-Japan International Institute of Technology 2. Information Technology and Multimedia Security Laboratory (Sakurai Lab), Kyushu University : ﺍﺳﺎﺗیﺪ ﺭﺍﻫﻨﻤﺎ ﺩﺭ ﺩﻭﺭﻩ ﺩکﺘﺮﺍ Professor Dr. Kouichi Sakurai Associate Prof Dr. Hiroaki Anada Associate Prof Dr. Sabariah Baharun 4

 ﻣﻮﺳﺴﻪ ﺗکﻨﻮﻟﻮژی ﺑیﻦ ﺍﻟﻤﻠﻠی ژﺎپﻦ-ﻣﺎﻟﺰی ﺩﺍﻧﺸگﺎﻩ کیﻮﺷﻮ 5 ﻣﻮﺳﺴﻪ ﺗکﻨﻮﻟﻮژی ﺑیﻦ ﺍﻟﻤﻠﻠی ژﺎپﻦ-ﻣﺎﻟﺰی ﺩﺍﻧﺸگﺎﻩ کیﻮﺷﻮ 5

 ﺭﻭﻧﺪ ﺭﻭ ﺑﻪ ﺭﺷﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘگﺎﻫﻬﺎی ﻫﻤﺮﺍﻩ 6 ﺭﻭﻧﺪ ﺭﻭ ﺑﻪ ﺭﺷﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘگﺎﻫﻬﺎی ﻫﻤﺮﺍﻩ 6

 ﺭﻭﻧﺪ ﺭﻭ ﺑﻪ ﺭﺷﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘگﺎﻫﻬﺎی ﻫﻤﺮﺍﻩ 5102 -4102 , Source: Flurry ﺭﻭﻧﺪ ﺭﻭ ﺑﻪ ﺭﺷﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘگﺎﻫﻬﺎی ﻫﻤﺮﺍﻩ 5102 -4102 , Source: Flurry Analytics 7

 ﺭﻭﻧﺪ ﺭﻭ ﺑﻪ ﺭﺷﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘگﺎﻫﻬﺎی ﻫﻤﺮﺍﻩ Source: Morgan Stanley Research 8 ﺭﻭﻧﺪ ﺭﻭ ﺑﻪ ﺭﺷﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘگﺎﻫﻬﺎی ﻫﻤﺮﺍﻩ Source: Morgan Stanley Research 8

 پﺮﻭﺗکﻞ ﻫﺎی ﻣﺪیﺮیﺖ ﺗﺤﺮک Mobility Management Protocols • Mobile IP: It enables the پﺮﻭﺗکﻞ ﻫﺎی ﻣﺪیﺮیﺖ ﺗﺤﺮک Mobility Management Protocols • Mobile IP: It enables the movement of mobile node • Home Address (Ho. A): It’s permanent and used as Identifier • Care of Address (Co. A): It’s not fixed and used as Locator 9

 پﺮﻭﺗکﻞ ﻫﺎی ﻣﺪیﺮیﺖ ﺗﺤﺮک Mobility Management Protocols • Host-based: Mobile node must does پﺮﻭﺗکﻞ ﻫﺎی ﻣﺪیﺮیﺖ ﺗﺤﺮک Mobility Management Protocols • Host-based: Mobile node must does the signaling to the network • Network-based: Mobile node does not participate in IP mobility procedure ﻣﺸکﻼﺕ ﻭ ﻣﺤﺪﻭﺩیﺖ ﻫﺎی ﺩﺳﺘگﺎﻫﻬﺎی ﻫﻤﺮﺍﻩ Battery Life • Constraint CPU Host-based Issues : • Signaling cost • Security Configurations • Complex routing modification • Small Storage Network-based Advantages: • Reduced Costs • Easier extension to other technology • Easier integration with other networks 10

Proxy Mobile IPv 6 Internet Engineering Task Force (IETF) RFC 5213 11 Overview of Proxy Mobile IPv 6 Internet Engineering Task Force (IETF) RFC 5213 11 Overview of PMIPv 6

Proxy Mobile IPv 6 Message flow in PMIPv 6 12 Proxy Mobile IPv 6 Message flow in PMIPv 6 12

 ﺍﻧﻮﺍﻉ ﺭﻭﺷﻬﺎی ﺍﺣﺮﺍﺯ ﻫﻮیﺖ کﺎﺭﺑﺮ : ﻃﺒﻘﻪ ﺑﻨﺪی ﺭﻭﺷﻬﺎی ﺗﺼﺪیﻖ کﺎﺭﺑﺮ What you ﺍﻧﻮﺍﻉ ﺭﻭﺷﻬﺎی ﺍﺣﺮﺍﺯ ﻫﻮیﺖ کﺎﺭﺑﺮ : ﻃﺒﻘﻪ ﺑﻨﺪی ﺭﻭﺷﻬﺎی ﺗﺼﺪیﻖ کﺎﺭﺑﺮ What you know, e. g. password, PIN What you have, e. g. key, RFID, token, smartcard Who you are (static biometrics), e. g. fingerprint, retina, (dynamic biometrics), e. g. voice, sign 13

 ﺍﻧﻮﺍﻉ ﺭﻭﺷﻬﺎی ﺍﺣﺮﺍﺯ ﻫﻮیﺖ کﺎﺭﺑﺮ What you know Basic idea User has a ﺍﻧﻮﺍﻉ ﺭﻭﺷﻬﺎی ﺍﺣﺮﺍﺯ ﻫﻮیﺖ کﺎﺭﺑﺮ What you know Basic idea User has a secret password System checks password to authenticate user Issues How is password stored? How easy is it to guess a password? 14

 ﺑﺪﺗﺮیﻦ ﺭﻣﺰﻫﺎی کﺎﺭﺑﺮﺍﻥ Source: Splash. Data, from 2 million leaked passwords, Jan 2016 ﺑﺪﺗﺮیﻦ ﺭﻣﺰﻫﺎی کﺎﺭﺑﺮﺍﻥ Source: Splash. Data, from 2 million leaked passwords, Jan 2016 15

 ﺍﻧﻮﺍﻉ ﺭﻭﺷﻬﺎی ﺍﺣﺮﺍﺯ ﻫﻮیﺖ کﺎﺭﺑﺮ What you have With embedded CPU and memory ﺍﻧﻮﺍﻉ ﺭﻭﺷﻬﺎی ﺍﺣﺮﺍﺯ ﻫﻮیﺖ کﺎﺭﺑﺮ What you have With embedded CPU and memory Various forms PIN protected memory card Enter PIN to get the password Cryptographic challenge/response cards Computer create a random challenge Enter PIN to encrypt/decrypt the challenge w/ the card 16

 ﺭﻭﺷﻬﺎی ﻣﻤکﻦ ﺑﺮﺍی ﺩﺭیﺎﻓﺖ ﺭﻣﺰ کﺎﺭﺗﻬﺎی ﻫﻮﺷﻤﻨﺪ Differential Power Analysis Measuring the precise ﺭﻭﺷﻬﺎی ﻣﻤکﻦ ﺑﺮﺍی ﺩﺭیﺎﻓﺖ ﺭﻣﺰ کﺎﺭﺗﻬﺎی ﻫﻮﺷﻤﻨﺪ Differential Power Analysis Measuring the precise time and electrical current required for certain encryption or decryption operations (Kocher, Jaffe, & Jun, 1998; Fan, Chan, & Zhang, 2005; Khan & Kumari, 2014; Ma, Wang, & Zhao, 2014; Messerges, Dabbish, & Sloan, 2002; Rhee, Kwon, & Lee, 2009; Wang, Liu, Xiao, & Dan, 2009; Xu, Zhu, & Feng, 2009). Tamper-proof Device (TPD) The IEEE 1609. 2 discusses using a tamper-resistant Hardware Security Module (HSM). The multiple layers of physical security degrees are provided in TPD. A TPD can process cryptographic algorithms using its processor, and has its own battery and clock for time stamp. According to (Riley, Akkaya, & Fong, 2011), a typical TPD costs at least a few thousands of dollars. 17

 ﺍﻧﻮﺍﻉ ﺭﻭﺷﻬﺎی ﺍﺣﺮﺍﺯ ﻫﻮیﺖ کﺎﺭﺑﺮ Who you are Use a person’s physical characteristics ﺍﻧﻮﺍﻉ ﺭﻭﺷﻬﺎی ﺍﺣﺮﺍﺯ ﻫﻮیﺖ کﺎﺭﺑﺮ Who you are Use a person’s physical characteristics fingerprint, voice, face, keyboard timing, … Advantages Cannot be disclosed, lost, forgotten Disadvantages Cost, installation, maintenance Reliability of comparison algorithms False positive: Allow access to unauthorized person False negative: Disallow access to authorized person Privacy? If forged, how do you revoke? 18

 چﻨﺪ ﻣﺜﺎﻝ ﺍﺯ ﻓﺎﺵ ﺷﺪﻥ ﻣﺸﺨﺼﻪ ﻫﺎی ﺑیﻮﻣﺘﺮیک ﺍﻓﺮﺍﺩ 1. Hacker fakes German چﻨﺪ ﻣﺜﺎﻝ ﺍﺯ ﻓﺎﺵ ﺷﺪﻥ ﻣﺸﺨﺼﻪ ﻫﺎی ﺑیﻮﻣﺘﺮیک ﺍﻓﺮﺍﺩ 1. Hacker fakes German minister's fingerprints using photos of her hands (Source: The Guardian, 30 Dec 2014) 2. Philippines Data Breach: Leak Contains Biometrics, Hacker Gets Arrested (affecting 55 million voters in the Philippines) (Source: Australia Network News, 22 Apr 2016) 19

 ﻣﻌیﺎﺭﻫﺎی ﺑﺮﺭﺳی ﺍﻣﻨیﺖ پﺮﻭﺗکﻞ ﻫﺎی ﺍﺣﺮﺍﺯ ﻫﻮیﺖ کﺎﺭﺑﺮ 1. 2. 3. 4. 5. ﻣﻌیﺎﺭﻫﺎی ﺑﺮﺭﺳی ﺍﻣﻨیﺖ پﺮﻭﺗکﻞ ﻫﺎی ﺍﺣﺮﺍﺯ ﻫﻮیﺖ کﺎﺭﺑﺮ 1. 2. 3. 4. 5. 6. 7. 8. Anonymity Mutual Authentication Impersonation Attack Replay Attack Forgery Attack Denial-of-service Attack (Do. S) Password Guessing Attack Stolen Verification Attack 20

 ﺑﺮﺭﺳی ﻣﺸکﻼﺕ ﺍﻣﻨیﺘی ﺭﻭﺷﻬﺎی ﻣﻮﺟﻮﺩ ﺍﺣﺮﺍﺯ ﻫﻮیﺖ کﺎﺭﺑﺮ پیﺸﻨﻬﺎﺩ ﺷﺪﻩ PMIPv 6 ﺑﺮﺍی ﺑﺮﺭﺳی ﻣﺸکﻼﺕ ﺍﻣﻨیﺘی ﺭﻭﺷﻬﺎی ﻣﻮﺟﻮﺩ ﺍﺣﺮﺍﺯ ﻫﻮیﺖ کﺎﺭﺑﺮ پیﺸﻨﻬﺎﺩ ﺷﺪﻩ PMIPv 6 ﺑﺮﺍی 1. The exact specifics of authentication procedure are not defined in RFC 5213. (Ref: RFC 5213, P 45, Section 6. 5: Access Authentication and Mobile Node Identification) Authentication Anonymity A 1 A 2 A 3 A 4 A 5 A 6 Ticket-Based Authentication (Joong-Hee et al. , 2008) No No No SEBCR (Zhou et al. , 2009) No No No ESEBCR (Jiang et al. , 2012) Yes No No No SF-PMIPv 6 (Chuang and Lee, 2013) Yes No No HOTA (Lee and Bonnin, 2013) No No No SPAM (Ming-Chin et al. , 2013) Yes No No A 1: MN-MAG Mutual Authentication, A 2: MAG-LMA Mutual Authentication, A 3: MN Anonymity, A 4: MAG anonymity, A 5: LMA anonymity, A 6: AAA Server Anonymity 2. Mutual Authentication 3. MN Anonymity 21

 ﺍﻫﺪﺍﻑ ﺗﺤﻘیﻖ • ﻫﺪﻑ ﺍﺻﻠی ﺍیﻦ ﺗﺤﻘیﻖ پیﺸﻨﻬﺎﺩ ﺭﻭﺷی ﺍﻣﻦ ﺑﺮﺍی ﺗﺼﺪیﻖ ﻫﻮیﺖ ﺍﻫﺪﺍﻑ ﺗﺤﻘیﻖ • ﻫﺪﻑ ﺍﺻﻠی ﺍیﻦ ﺗﺤﻘیﻖ پیﺸﻨﻬﺎﺩ ﺭﻭﺷی ﺍﻣﻦ ﺑﺮﺍی ﺗﺼﺪیﻖ ﻫﻮیﺖ کﺎﺭﺑﺮ ﻭ ﻣﺤﺎﻓﻈﺖ ﺩﺳﺘگﺎﻩ ﻫﻤﺮﺍﻩ ﺭﺍ ﺩﺭ ﺑﺮﺍﺑﺮ ﻣﺸکﻼﺕ ﺍﻣﻨیﺘی ﻣﻮﺟﻮﺩ ﻣی ﺑﺎﺷﺪ. • ﺭﻭﺵ پیﺸﻨﻬﺎﺩی ﺑﺮ ﺭﻭی ﻣﺤﺎﻓﻈﺖ ﺍﺯ ﺣﺮیﻢ ﺧﺼﻮﺻی کﺎﺭﺑﺮ ﺗﻤﺮکﺰ ﺩﺍﺭﺩ. • ﺍیﻦ ﺭﻭﺵ ﻣی ﺗﻮﺍﻧﺪ ﺟﺎیگﺰیﻨی ﻣﻨﺎﺳﺐ ﺑﺮﺍی ﺍﺳﺘﺎﻧﺪﺍﺭﺩ 3125 RFC ﺑﺎﺷﺪ. 22

 ﺭﻭﺵ ﺗﺤﻘیﻖ Operational Framework 23 ﺭﻭﺵ ﺗﺤﻘیﻖ Operational Framework 23

 ﺭﻭﺵ ﺗﺤﻘیﻖ ﺍﺭﺯﺷیﺎﺑی ﺍﻣﻨیﺘی • • ﺍﺭﺯیﺎﺑی ﻋﻤﻠکﺮﺩی • • Security Theorems BAN ﺭﻭﺵ ﺗﺤﻘیﻖ ﺍﺭﺯﺷیﺎﺑی ﺍﻣﻨیﺘی • • ﺍﺭﺯیﺎﺑی ﻋﻤﻠکﺮﺩی • • Security Theorems BAN Logic Parameter Authentication Cost Computation Cost Symbol Number of hops between n. MAG and p. MAG Number of hops between MAG and AS Number of hops between LMA and MAG Wired link transmission cost Wireless link transmission cost Transmission cost for each hop Key generating cost Hn. MAG-p. MAG HMAG-AS HLMA-MAG Wt WLt CS CK Encryption cost CE Decryption cost CD Hash function cost CH Xo. R operation cost CXo. R MAG coverage area l AS coverage area L Random number generation cost CR ﻧﻤﺎﺩﻫﺎ 24

SPAM ﻣﺜﺎﻝ: ﺭﻭﺵ Registration Phase The MN and the MAG Mutual Authentication 1 Generate SPAM ﻣﺜﺎﻝ: ﺭﻭﺵ Registration Phase The MN and the MAG Mutual Authentication 1 Generate N*1 2 Calculates AIDA= IDMN ⊕h(c 5 || N*1) 3 Calculates AUTHA = h(c 1 || N*1) 4 Sends AIDMN, c 3, Ec 4 (AUTHA || N*1) to the MAG 5 The MAG decrypts c 3 using PSK and obtains IDAAA and sv 6 Calculates c 4= h (IDAAA ||sv) and decrypts Ec 4 (AUTHA || N*1) to obtain value of AUTHA and N*1 7 Calculates h(sv)= c 5 , IDMN = AIDA ⊕ h(c 5 || N*1), h(IDMN||sv)=c 1 8 Checks if h (c 1|| N*1) = ? AUTHA to verify the MN authentication Required information to launch impersonation attack 25

Secure and an Anonymous Ticket-based Authentication (SATA) Procedure SATA Initial Registration Initial Authentication Security Secure and an Anonymous Ticket-based Authentication (SATA) Procedure SATA Initial Registration Initial Authentication Security Evaluation Performance Evaluation Security Theorems Authentication Cost BAN Logic Numerical Analysis Handover Authentication 26

SATA (Initial Registration) ﻣﺮﺣﻠﻪ ﺛﺒﺖ ﻧﺎﻡ ﺍﻭﻟیﻪ 27 SATA (Initial Registration) ﻣﺮﺣﻠﻪ ﺛﺒﺖ ﻧﺎﻡ ﺍﻭﻟیﻪ 27

SATA (Initial Authentication) ﻣﺮﺣﻠﻪ ﺍﺣﺮﺍﺯ ﻫﻮیﺖ ﺍﻭﻟیﻪ 28 SATA (Initial Authentication) ﻣﺮﺣﻠﻪ ﺍﺣﺮﺍﺯ ﻫﻮیﺖ ﺍﻭﻟیﻪ 28

 ) SATA (Handover Authentication ﻣﺮﺣﻠﻪ ﺍﺣﺮﺍﺯ ﻫﻮیﺖ ﺩﺭ ﻫﻨگﺎﻡ ﺍﻧﺘﻘﺎﻝ 92 ) SATA (Handover Authentication ﻣﺮﺣﻠﻪ ﺍﺣﺮﺍﺯ ﻫﻮیﺖ ﺩﺭ ﻫﻨگﺎﻡ ﺍﻧﺘﻘﺎﻝ 92

 ﺑﺮﺭﺳی ﻋﻤﻠکﺮﺩ ﺭﻭﺵ پیﺸﻨﻬﺎﺩی ﻭ ﻣﻘﺎیﺴﻪ ﺑﺎ ﺭﻭﺷﻬﺎی ﻣﻮﺟﻮﺩ Evaluation Parameters X X ﺑﺮﺭﺳی ﻋﻤﻠکﺮﺩ ﺭﻭﺵ پیﺸﻨﻬﺎﺩی ﻭ ﻣﻘﺎیﺴﻪ ﺑﺎ ﺭﻭﺷﻬﺎی ﻣﻮﺟﻮﺩ Evaluation Parameters X X X X (Joong-Hee et al. , 2008; Li et al. , 2011; Liang and Wang, 2005). 30

 ﻓﺮﻣﻮﻟﻬﺎی ﻣﺤﺎﺳﺒﻪ ﻫﺰیﻨﻪ ﺍﺣﺮﺍﺯ ﻫﻮیﺖ کﺎﺭﺑﺮ Authentication Cost Formulas 13 ﻓﺮﻣﻮﻟﻬﺎی ﻣﺤﺎﺳﺒﻪ ﻫﺰیﻨﻪ ﺍﺣﺮﺍﺯ ﻫﻮیﺖ کﺎﺭﺑﺮ Authentication Cost Formulas 13

 ﺑﺮﺭﺳی ﻋﻤﻠکﺮﺩ ﺭﻭﺵ پیﺸﻨﻬﺎﺩی ﻭ ﻣﻘﺎیﺴﻪ ﺑﺎ ﺭﻭﺷﻬﺎی ﻣﻮﺟﻮﺩ ﺗﺎﺛیﺮ ﺷﺘﺎﺏ کﺎﺭﺑﺮ ﺑﺮ ﺑﺮﺭﺳی ﻋﻤﻠکﺮﺩ ﺭﻭﺵ پیﺸﻨﻬﺎﺩی ﻭ ﻣﻘﺎیﺴﻪ ﺑﺎ ﺭﻭﺷﻬﺎی ﻣﻮﺟﻮﺩ ﺗﺎﺛیﺮ ﺷﺘﺎﺏ کﺎﺭﺑﺮ ﺑﺮ ﻫﺰیﻨﻪ ﺍﺣﺮﺍﺯ ﻫﻮیﺖ کﺎﺭﺑﺮ 23

 ﺑﺮﺭﺳی ﻋﻤﻠکﺮﺩ ﺭﻭﺵ پیﺸﻨﻬﺎﺩی ﻭ ﻣﻘﺎیﺴﻪ ﺑﺎ ﺭﻭﺷﻬﺎی ﻣﻮﺟﻮﺩ ﺗﺎﺛیﺮ ﺗﺮﺍکﻢ کﺎﺭﺑﺮﺍﻥ ﺑﺮ ﺑﺮﺭﺳی ﻋﻤﻠکﺮﺩ ﺭﻭﺵ پیﺸﻨﻬﺎﺩی ﻭ ﻣﻘﺎیﺴﻪ ﺑﺎ ﺭﻭﺷﻬﺎی ﻣﻮﺟﻮﺩ ﺗﺎﺛیﺮ ﺗﺮﺍکﻢ کﺎﺭﺑﺮﺍﻥ ﺑﺮ ﻫﺰیﻨﻪ ﺍﺣﺮﺍﺯ ﻫﻮیﺖ کﺎﺭﺑﺮ 33

 ﺑﺮﺭﺳی ﻋﻤﻠکﺮﺩ ﺭﻭﺵ پیﺸﻨﻬﺎﺩی ﻭ ﻣﻘﺎیﺴﻪ ﺑﺎ ﺭﻭﺷﻬﺎی ﻣﻮﺟﻮﺩ ﺗﺎﺛیﺮ ﺗﻌﺪﺍﺩ ﻫﺎﺏ ﻫﺎی ﺑﺮﺭﺳی ﻋﻤﻠکﺮﺩ ﺭﻭﺵ پیﺸﻨﻬﺎﺩی ﻭ ﻣﻘﺎیﺴﻪ ﺑﺎ ﺭﻭﺷﻬﺎی ﻣﻮﺟﻮﺩ ﺗﺎﺛیﺮ ﺗﻌﺪﺍﺩ ﻫﺎﺏ ﻫﺎی ﺑیﻦ MAG ﻭ AAA ﺑﺮ ﻫﺰیﻨﻪ ﺍﺣﺮﺍﺯ ﻫﻮیﺖ کﺎﺭﺑﺮ Number of Hobs between MAG and AAA Server 43

 ﺑﺮﺭﺳی ﺳﻄﺢ ﺍﻣﻨیﺖ ﺭﻭﺵ پیﺸﻨﻬﺎﺩی ﻭ ﻣﻘﺎیﺴﻪ ﺑﺎ ﺭﻭﺷﻬﺎی ﻣﻮﺟﻮﺩ BAN Logic Idealized ﺑﺮﺭﺳی ﺳﻄﺢ ﺍﻣﻨیﺖ ﺭﻭﺵ پیﺸﻨﻬﺎﺩی ﻭ ﻣﻘﺎیﺴﻪ ﺑﺎ ﺭﻭﺷﻬﺎی ﻣﻮﺟﻮﺩ BAN Logic Idealized Messages Goals 53

 ﺑﺮﺭﺳی ﺳﻄﺢ ﺍﻣﻨیﺖ ﺭﻭﺵ پیﺸﻨﻬﺎﺩی ﻭ ﻣﻘﺎیﺴﻪ ﺑﺎ ﺭﻭﺷﻬﺎی ﻣﻮﺟﻮﺩ 63 ﺑﺮﺭﺳی ﺳﻄﺢ ﺍﻣﻨیﺖ ﺭﻭﺵ پیﺸﻨﻬﺎﺩی ﻭ ﻣﻘﺎیﺴﻪ ﺑﺎ ﺭﻭﺷﻬﺎی ﻣﻮﺟﻮﺩ 63

 ﻧﺘیﺠﻪ گیﺮی Security and Privacy (Number of Applied Criteria) Security and performance trade-off ﻧﺘیﺠﻪ گیﺮی Security and Privacy (Number of Applied Criteria) Security and performance trade-off Performance (Based on calculated formula) 37

38 38

References 1. Ahmavaara, K. , Haverinen, H. , and Pichna, R. (2003). Interworking architecture References 1. Ahmavaara, K. , Haverinen, H. , and Pichna, R. (2003). Interworking architecture between 3 GPP and WLAN systems. Communications Magazine, IEEE, 41(11), 74 -81. 2. Akyildiz, I. F. , Mohanty, S. , and Jiang, X. (2005). A ubiquitous mobile communication architecture for next-generation heterogeneous wireless systems. Communications Magazine, IEEE, 43(6), S 29 -S 36. 3. Balazinska, M. , and Castro, P. (2003). Characterizing mobility and network usage in a corporate wireless local-area network. Paper presented at the Proceedings of the 1 st international conference on Mobile systems, applications and services. 4. Banerjee, N. , Wei, W. , and Das, S. K. (2003). Mobility support in wireless Internet. Wireless Communications, IEEE, 10(5), 54 -61. 5. Buddhikot, M. , Chandranmenon, G. , Han, S. , Lee, Y. W. , Miller, S. , and Salgarelli, L. (2003, 30 March-3 April 2003). Integration of 802. 11 and third-generation wireless data networks. Paper presented at the INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, 503 -512 vol. 501. 6. Chuang, M. -C. , and Lee, J. -F. (2013). SF-PMIPv 6: A secure fast handover mechanism for Proxy Mobile IPv 6 networks. Journal of Systems and Software, 86(2), 437 -448. 7. Clancy, T. , Nakhjiri, M. , Narayanan, V. , and Dondeti, L. (2008). Handover key management and re-authentication problem statement: March. 8. Elgoarany, K. , and Eltoweissy, M. (2007). Security in Mobile IPv 6: A survey. Information Security Technical Report, 12(1), 32 -43. 9. Group, I. W. (2010). IEEE Standard for Information Technology–Telecommunications and Information Exchange between Systems– Local and Metropolitan Area Networks–Specific Requirements–Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments. IEEE Std, 802, 1 -51. 10. Guan, J. , Zhou, H. , Xiao, W. , Yan, Z. , Qin, Y. , and Zhang, H. (2008). Implementation and analysis of network-based mobility management protocol in WLAN environments. Paper presented at the Proceedings of the International Conference on Mobile Technology, Applications, and Systems. 11. Gundavelli, S. , Leung, K. , Devarapalli, V. , Chowdhury, K. , Patil, B. , and Leung, K. (2008). Proxy Mobile IPv 6 o. Document Number) 12. Gurtov, A. (2008). Host identity protocol (HIP): towards the secure mobile internet (Vol. 21): John Wiley & Sons. 13. Henderson, T. , Kotz, D. , and Abyzov, I. (2008). The changing usage of a mature campus-wide wireless network. Computer Networks, 52(14), 2690 -2712. 14. Iapichino, G. , Bonnet, C. , Herrero, O. d. R. , Baudoin, C. , and Buret, I. (2009). Combining mobility and heterogeneous networking for emergency management: a PMIPv 6 and HIP-based approach. Paper presented at the Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly. 15. Illkyun, I. , and Jongpil, J. (2012, 10 -12 July 2012). Security-effective fast authentication scheme for PMIPv 6 -based NEMO with global mobility support. Paper presented at the Digital Information Processing and Communications (ICDIPC), 2012 Second International Conference on, 90 -95. VI

References 16. Jiang, Q. , Ma, J. , Li, G. , and Ye, A. References 16. Jiang, Q. , Ma, J. , Li, G. , and Ye, A. (2012). Security Enhancement on an Authentication Method for Proxy Mobile IPv 6. Paper presented at the Proceedings of the 2011 International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE 2011) November 19 -20, 2011, Melbourne, Australia, 345 -352. 17. Johnson, D. , Perkins, C. , and Arkko, J. (2004). RFC 3775: Mobility support in IPv 6. IETF. 18. Jong-Hyouk, L. , and Tai-Myoung, C. (2008, 24 -26 April 2008). A Traffic Analysis of Authentication Methods for Proxy Mobile IPv 6. Paper presented at the Information Security and Assurance, 2008. ISA 2008. International Conference on, 512 -517. 19. Joong-Hee, L. , Jong-Hyouk, L. , and Tai-Myoung, C. (2008, 26 -31 Oct. 2008). Ticket-Based Authentication Mechanism for Proxy Mobile IPv 6 Environment. Paper presented at the Systems and Networks Communications, 2008. ICSNC '08. 3 rd International Conference on, 304 -309. 20. Jun, L. , and Xiaoming, F. (2008, 6 -8 Aug. 2008). Evaluating the Benefits of Introducing PMIPv 6 for Localized Mobility Management. Paper presented at the Wireless Communications and Mobile Computing Conference, 2008. IWCMC '08. International, 74 -80. 21. Kempf, J. (2007). Problem statement for network-based localized mobility management (NETLMM). 22. Kempf, J. , and Vogt, C. (2007). Security Threats to Network-Based Localized Mobility Management (NETLMM). 23. Ki-Sik, K. , Wonjun, L. , Youn-Hee, H. , and Myung-Ki, S. (2008 a, 19 -23 May 2008). Handover Latency Analysis of a Network-Based Localized Mobility Management Protocol. Paper presented at the Communications, 2008. ICC '08. IEEE International Conference on, 5838 -5843. 24. Ki-Sik, K. , Wonjun, L. , Youn-Hee, H. , Myung-Ki, S. , and Heung. Ryeol, Y. (2008 b). Mobility management for all-IP mobile networks: mobile IPv 6 vs. proxy mobile IPv 6. Wireless Communications, IEEE, 15(2), 36 -45. 25. Kim, H. , and Oh, B. (2008). Secure and low latency handoff scheme for proxy mobile IPv 6. Paper presented at the Proceedings of the International Conference on Mobile Technology, Applications, and Systems. 26. Koodli, R. (2009). Mobile IPv 6 fast handovers. 27. Lee, J. -H. , and Bonnin, J. -M. (2013). HOTA: Handover optimized ticket-based authentication in network-based mobility management. Information Sciences, 230(0), 64 -77. 28. Liang, W. , and Wang, W. (2005). On performance analysis of challenge/response based authentication in wireless networks. Computer Networks, 48(2), 267 -288. 29. Ling, T. , and Di, H. (2009, 19 -21 Jan. 2009). A certificated-based binding update mechanism for proxy mobile ipv 6 protocol. Paper presented at the Microelectronics & Electronics, 2009. Prime. Asia 2009. Asia Pacific Conference on Postgraduate Research in, 333336. 30. Magagula, L. A. , Falowo, O. E. , and Chan, H. A. (2009, 23 -25 Sept. 2009). PMIPv 6 and MIH-enhanced PMIPv 6 for mobility management in heterogeneous wireless networks. Paper presented at the AFRICON, 2009. AFRICON '09. , 1 -5. VI

References 31. Makela, J. , and Pentikousis, K. (2007, 5 -7 Feb. 2007). Trigger References 31. Makela, J. , and Pentikousis, K. (2007, 5 -7 Feb. 2007). Trigger Management Mechanisms. Paper presented at the Wireless Pervasive Computing, 2007. ISWPC '07. 2 nd International Symposium on. 32. Marques, H. , Ribeiro, J. , Marques, P. , and Rodriguez, J. (2010). Simulation of 802. 21 handovers using ns-2. Journal of Computer Systems, Networks, and Communications, 2010, 3. 33. Melia, T. , Giust, F. , Manfrin, R. , De La Oliva, A. , Bernardos, C. J. , and Wetterwald, M. (2011). IEEE 802. 21 and Proxy Mobile IPv 6: A network controlled mobility solution. Paper presented at the Future Network & Mobile Summit (Future. Netw), 2011, 1 -8. 34. Ming-Chin, C. , Jeng-Farn, L. , and Meng-Chang, C. (2013). SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv 6 Networks. Systems Journal, IEEE, 7(1), 102 -113. 35. Muslam, M. , Chan, H. A. , Ventura, N. , and Magagula, L. A. (2010, 20 -25 Sept. 2010). Hybrid HIP and PMIPv 6 (HIPPMIP) Mobility Management for Handover Performance Optimization. Paper presented at the Wireless and Mobile Communications (ICWMC), 2010 6 th International Conference on, 232 -237. 36. National Institute of Technology (NIST) Seamless and Secure Mobility. (2014). 2014, from http: //www. nist. gov/itl/antd/emntg/ssm_seamlessandsecure. cfm 37. The Network Simulator ns-2 add-on modules for 802. 21 (draft 3). (2014). from http: //www. nist. gov/itl/antd/emntg/upload/MIH_module. pdf 38. Park, S. -S. , Lee, J. -H. , and Chung, T. -M. (2009). Authentication Analysis Based on Certificate for Proxy Mobile IPv 6 Environment. In O. Gervasi, D. Taniar, B. Murgante, A. Laganà, Y. Mun and M. Gavrilova (Eds. ), Computational Science and Its Applications – ICCSA 2009 (Vol. 5592, pp. 885 -896): Springer Berlin Heidelberg. 39. Pentikousis, K. , Agüero, R. , Gebert, J. , Galache, J. A. , Blume, O. , and Pääkkönen, P. (2011). The ambient networks heterogeneous access selection architecture. ar. Xiv preprint ar. Xiv: 1105. 1515. 40. Perkins, C. (2002). IP mobility support for IPv 4. 41. Perkins, C. E. (2000). Mobile IP joins forces with AAA. Personal Communications, IEEE, 7(4), 59 -61. 42. Politis, C. , Oda, T. , Dixit, S. , Schieder, A. , Hong-Yon, L. , Smirnov, M. I. , et al. (2004). Cooperative networks for the future wireless world. Communications Magazine, IEEE, 42(9), 70 -79. 43. Salkintzis, A. K. (2004). Interworking techniques and architectures for WLAN/3 G integration toward 4 G mobile data networks. Wireless Communications, IEEE, 11(3), 50 -61. 44. Sandra Cespedes, U. , and Shen, X. (2010). An efficient hybrid HIP-PMIPv 6 scheme for seamless internet access in urban vehicular scenarios. Paper presented at the 53 rd IEEE Global Communications Conference, GLOBECOM 2010, December 6, 2010 - December 10, 2010, Miami, FL, United states. VI

References 45. Seonggeun, R. , Gye-Young, K. , Byunggi, K. , and Youngsong, M. References 45. Seonggeun, R. , Gye-Young, K. , Byunggi, K. , and Youngsong, M. (2008, June 30 2008 -July 3 2008). A Scheme to Reduce Packet Loss during PMIPv 6 Handover considering Authentication. Paper presented at the Computational Sciences and Its Applications, 2008. ICCSA '08. International Conference on, 47 -51. 46. Soliman, H. , Bellier, L. , Elmalki, K. , and Castelluccia, C. (2008). Hierarchical mobile IPv 6 (HMIPv 6) mobility management. 47. Soto, I. , Bernardos, C. J. , Calderón, M. , and Melia, T. (2010). PMIPv 6: A network-based localized mobility management solution. The Internet Protocol Journal, 13(3), 2 -15. 48. Stemm, M. , and Katz, R. H. (1998). Vertical handoffs in wireless overlay networks. Mob. Netw. Appl. , 3(4), 335 -350. 49. Suk Yu, H. , and Kai-Hau, Y. (2003). Challenges in the migration to 4 G mobile systems. Communications Magazine, IEEE, 41(12), 54 -59. 50. William, S. (2001). Mobile IP. The Internet Protocol Journal, 4(2), 1 -32. 51. Xia, F. , and Sarikaya, B. (2007). Mobile node agnostic fast handovers for Proxy Mobile IPv 6. IETF ID draft-xianetlmm-fmip-mnagno 02. 52. Youngsong, M. , Miyoung, K. , and Gye-Young, K. (2008, June 30 2008 -July 3 2008). Mutual Authentication Scheme in Proxy Mobile IP. Paper presented at the Computational Sciences and Its Applications, 2008. ICCSA '08. International Conference on, 65 -72. 53. Zahariadis, T. (2003). Trends in the path to 4 G [Electronic Version]. Communications Engineer, 1, 12 -15, from http: //digitallibrary. theiet. org/content/journals/10. 1049/ce_20030103 54. Zhou, H. , Zhang, H. , and Qin, Y. (2009). An authentication method for proxy mobile IPv 6 and performance analysis. Security and Communication Networks, 2(5), 445 -454. VI

List of Publications Journal Paper 1. Mojtaba Alizadeh, Saeid Abolfazli, Mazdak Zamani, Sabariah Baharun, List of Publications Journal Paper 1. Mojtaba Alizadeh, Saeid Abolfazli, Mazdak Zamani, Sabariah Baharun, Koichi Sakurai, “Authentication in Mobile Cloud Computing: A Survey ”, Journal of Network and Computer Applications (2015) (ISI Indexed, Q 1, IF: 2. 229) 2. Mojtaba Alizadeh, Mazdak Zamani, Sabariah Baharun, Azizah binti Abdul Manaf, Koichi Sakurai, Hiroki Anada, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan, “Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv 6 Networks"”, Plos One (2015) (ISI Indexed, Q 1, IF: 3. 234) 3. Mojtaba Alizadeh, Mazdak Zamani, Sabariah Baharun, Hiroki Anada, Koichi Sakurai, “Cryptanalysis of “a Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv 6 Networks”, International Journal of Computer Science and Business Informatics (2014) (2015) 4. Mojtaba Alizadeh, Mazdak Zamani, Sabariah Baharun, Wan Haslina Hassan, Touraj Khodadadi, “Security and Privacy Criteria to Evaluate Authentication Mechanisms in Proxy Mobile IPv 6”, Volume 72, Issue 5, Pages 27 -30 (2015) (Scopus Indexed) 5. Mojtaba Alizadeh, Wan Haslina Hassan, Mazdak Zamani, Eghbal Ghazizadeh, Sasan Karamizadeh, “Implementation and Evaluation of Lightweight Encryption Algorithms Suitable for RFID”, Journal of Next Generation Information Technology (JNIT). DOI: 10. 4156/jnit, Volume 4, Issue 1, Pages 65 -77 (2013) (Scopus Indexed) 6. Mojtaba Alizadeh, Mazdak Zamani, Ali Rafiei Shahemabadi, Jafar Shayan, Ahmad Azarnik, “A Survey on Attacks in RFID Networks”, Open International Journal of Informatics (OIJI), Volume 1, Pages 15 -24 (2012) 7. Mojtaba Alizadeh, Wan Haslina Hassan, Navid Behboodian, Sasan Karamizadeh, “A Brief Review of Mobile Cloud Computing Opportunities”. Research Notes in Information Science Journal (RNIS), Volume 12, Pages 155 -160 (2013) 8. Mojtaba Alizadeh, Wan Haslina Hassan, Mazdak Zamani, Touraj Khodadadi, Saman Shojae Chaeikar, “A Prospective Study of Mobile Cloud Computing”, International Journal of Advanced Computer Technology (IJACT) Volume 5, Issue 11, Pages 198 -210 (2013) 9. Babak Emami Abarghouei, Ali Farokhtala, Mojtaba Alizadeh, “DNACK: False Data Detection Based on Negative Acknowledgment and Digital Signature on Mobile Ad-hoc Network”, Wireless Personal Communications, Volume 83, Issue 1, PP 1 -15 (2015) (ISI Indexed, Q 3, IF: 0. 98) 10. Mojtaba Alizadeh, Sabariah Baharun, Mazdak Zamani, Touraj Khodadadi, Mahdi Darvishi, Somayyeh Gholizadeh, “Anonymity and Untraceability Assessment of Authentication Protocols in Proxy Mobile IPv 6 Survey ”, Jurnal Teknologi, Volume 72, Issue 5, Pages 31 -34 (2015) (Scopus Indexed) 11. Mojtaba Alizadeh, Mazdak Zamani, Sabariah Baharun, Koichi Sakurai, “Cryptanalysis of “HOTA: Handover optimized ticket-based authentication in network-based mobility management””, Wireless Personal Communications (2015) (ISI Indexed, Q 3, IF: 0. 98)(Under review) 12. Mojtaba Alizadeh, Mazdak Zamani, Sabariah Baharun, Koichi Sakurai, “SATA: Secure Anonymous Ticket-Based Authentication in Proxy Mobile IPv 6 Networks”, Security and Communication Networks (2015) (ISI Indexed, Q 3, IF: 0. 72)(Under review) VI

List of Publications Journal Paper (Continued) 13. Hossein Ahmadi, Mehrbakhsh Nilashi, Othman Ibrahim, T. List of Publications Journal Paper (Continued) 13. Hossein Ahmadi, Mehrbakhsh Nilashi, Othman Ibrahim, T. Ramayah, Mun Wai Wong, Mojtaba Alizadeh, Hosein Jafarkarimi, Alireza Almaee, “Exploring Potential Factors in Total Hospital Information System Adoption”, Journal of Soft Computing and Decision Support Systems, Volume 2, Issue 1, Pages 52 -59 (2015) 14. Leila Ranjbari, Amir. H Shirdel, M Aslahi-Shahri, S Anbari, A Ebrahimi, M Darvishi, Mojtaba Alizadeh, Rasoul Rahmani, M Seyedmahmoudian, “An experimental analysis on cloud-based mobile augmentation in mobile cloud computing”, Neural Computing and Applications, Volume 26, Issue 7, Pages 1555 -1560 (2015) (ISI Indexed, Q 1, IF: 1. 763) 15. Ehsan Amiri, Hassan Keshavarz, Mojtaba Alizadeh, Mazdak Zamani, Touraj Khodadadi, “Energy Efficient Routing in Wireless Sensor Networks Based on Fuzzy Ant Colony Optimization”, International Journal of Distributed Sensor Networks, Volume 2014, 17 Pages (2014) (ISI Indexed, Q 3, IF: 0. 923) (As a Corresponding Author) 16. Touraj Khodadadi, Mojtaba Alizadeh, Somayyeh Gholizadeh, Mazdak Zamani, Mahdi Darvishi, “Security Analysis Method of Recognition-Based Graphical Password”, Jurnal Teknologi, Volume 72, Issue 5, Pages 57 -62 (2015) (Scopus Indexed) 17. Saied Abolfazli, Zohreh Sanaei, Mojtaba Alizadeh, Abdullah Gani, and Feng Xia, “An experimental analysis on cloud-based mobile augmentation in mobile cloud computing”, IEEE Transactions on Consumer Electronics, Volume 60, Issue 1, Pages 146 -154 (2014) (ISI Indexed, Q 2, IF: 1. 157) 18. Eghbal Ghazizadeh, Mazdak Zamani, Mojtaba Alizadeh, Jamalul-lail Ab Manan, “Trusted Computing Strengthens Cloud authentication”, The Scientific World Journal, Volume 2014, 17 Pages (2014) (ISI Indexed, Q 1, IF: 1. 73) 19. Ahmadi, Hossein. , Darvishi, Mahdi. , Nilashi, Mehrbakhsh. , Almaee, Alireza. , Ibrahim, Othman. , Zolghadri, Ali Hossein. , Mojtaba Alizadeh. , Farahmand, Mohammadreza, “Evaluating the Critical Factors for Electronic Medical Record Adoption Using Fuzzy Approaches”, International Journal of Innovation and Scientific Research, Volume 9, Issue 2, Pages 268 -284 (2014) 20. Saman Shojae Chaeikar, Mazdak Zamani, Christian Sunday Chukwuekezie, Mojtaba Alizadeh, “Electronic Voting Systems for European Union Countries”, Journal of Next Generation Information Technology (JNIT), Volume 4, Issue 5, Pages 16 -26 (2013) 21. Maryam Gharooni, Mazdak Zamani, Mehdi Mansourizadeh, Mojtaba Alizadeh, “An Enhanced RFID Confidentiality Protection Model Based on Trusted Authentication”, International Journal of Advanced Computer Technology (IJACT), Volume 5, Issue 13, Pages 61 -70 (2013) 22. Jafar Shayan, Ahmad Azarnik, Suriayati Chuprat, Sasan Karamizadeh, Mojtaba Alizadeh, “Identifying Benefits and risks associated with utilizing cloud computing”. The International Journal of Soft Computing and Software Engineering [JSCSE], USA, Volume 3, Issue 3, Pages 416 -421 (2013) 23. Ahmad Azarnik, Jafar Shayan, Mojtaba Alizadeh, Sasan Karamizadeh, “Associated Risks of Cloud Computing for SMEs”, Open International Journal of Informatics (OIJI), Volume 1, Pages 37 -45 (2012) 24. Sasan Karamizadeh, Jafar Shayan, Mojtaba Alizadeh, Atabak Kheirkhahi, “Information Security Awareness Behaviour: A Conceptual Model for Cloud”, International Journal of Computers & Technology, Volume 10, Issue 1, Pages 1186 -1191 (2013) VI

List of Publications Conference Proceeding 1 - Mojtaba Alizadeh, Wan Haslina Hassan, Touraj Khodadadi List of Publications Conference Proceeding 1 - Mojtaba Alizadeh, Wan Haslina Hassan, Touraj Khodadadi “Feasibility of Implementing Multi-factor Schemes Mobile Cloud Computing Authentication”. The 5 th International Conference on Intelligent Systems, Modelling and Simulation (ISMS 2014), Langkawi, Malaysia, January 2729, Pages 615 -618 (SCOPUS Indexed) (2014) 2 - Raini Hassan, Wan Haslina Hassan, Imad Fakhri Taha Al-Shaikhli, Salmiah Ahmad, Mojtaba Alizadeh “Feature Ranking Through Weights Manipulations for Artificial Neural Networks-Based Classifiers”. The 5 th International Conference on Intelligent Systems, Modelling and Simulation (ISMS 2014), Langkawi, Malaysia, January 27 -29, Pages 145 -153 (2014) 3 - Mojtaba Alizadeh, Wan Haslina Hassan, “Multi-Factor Authentication Methods for Mobile Cloud Computing”. The MJIIT-JUC Joint International Symposium 2013 (MJJIS 2013) Hiratsuka, Japan, November 6 -8, Pages 1 -4. (2013) 4 - Mojtaba Alizadeh, Mazdak Zamani, Touraj Khodadadi, Jafar Shayan, “Code Analysis of Lightweight Encryption Algorithms Using in RFID Systems to Improve Cipher Performance”, 2012 IEEE Conference on Open Systems (ICOS 2012), Kuala Lumpur, Malaysia, 21 -24 October 2012 Pages 1 -4 (2012) 5 - Mojtaba Alizadeh, Mazleena Salleh, Mazdak Zamani, Jafar Shayan, Sasan Karamizadeh, “Security and Performance Evaluation of Lightweight Cryptographic Algorithms in RFID” WSEAS Conference on Recent Researches in Communications and Computers, Kos Island, Greece, , 14 -17 July, Pages 45 -50 (2012) 6 - Mojtaba Alizadeh, Wan Haslina Hassan, “Challenges and Opportunities of Mobile Cloud Computing”. The 9 th International Wireless Communications & Mobile Computing Conference (IWCMC 2013), Sardinia, Italy, 1 -5 July, Pages 660 -666. (2013) (SCOPUS Indexed) 7 - Mojtaba Alizadeh, Mazdak Zamani, Sabariah Baharun, Kouichi Sakurai, “Authentication Protocols in PMIPv 6 Using Non- tamper Resistant Smart Card”. Third Japan Egypt Conference for Electronics, Communication and Computers, Fukuoka, Japan, 16 -18 March, (2015) 8 - Maryam Kivili, Leila Gholizadeh, Hassan Rashidi, Somayyeh Gholizadeh, Touraj Khodadadi, Mojtaba Alizadeh, “A New Improvement on Firefly Algorithm for Optimization Problems”. 1 st International Conference on Telematics and Future Generation Networks, Kuala Lumpur, Malaysia, 16 -18 March, (SCOPUS Indexed) (2015) (In Press) 9 - Ali Ebrahimi, Subariah Ibrahim, Eghbal Ghazizadeh, Mojtaba Alizadeh, “Paint-Doctored JPEG Image Forensics Based on Blocking Artifacts”. 6 th International Conference and Workshop on Computing and Communication, Vancouver, Canada, (SCOPUS Indexed) (2015) (In Press) VI Journal Papers (Published) Conference Papers (Published) ISI Scopus Other 7 4 11 5 4