2024/12/10 更新

写真a

サムスル フダ
SAMSUL HUDA
Samsul Huda
所属
グリーンイノベーションセンター 助教(特任)
職名
助教(特任)
連絡先
メールアドレス

学位

  • 博士(工学) ( 2020年9月   岡山大学 )

  • Master of Applied Science in Information and Computer Engineering ( 2016年9月   Politeknik Elektronika Negeri Surabaya )

  • Bachelor of Applied Science in Telecommunication engineering ( 2014年9月   Politeknik Elektronika Negeri Surabaya )

研究キーワード

  • Network Security

  • Internet of Things (IoT)

  • Computer Networks

研究分野

  • 情報通信 / 計算機システム  / Network Security

  • 情報通信 / 計算機システム  / Internet of Things (IoT)

  • 情報通信 / 計算機システム  / Computer Networks

学歴

  • 岡山大学   Industrial and Innovation Science   Industrial and Innovation Science

    2017年10月 - 2020年9月

      詳細を見る

    国名: 日本国

    備考: Ph.D in Engineering

    researchmap

  • Politeknik Elektronika Negeri Surabaya   Information and Computer Engineering   Information and Computer Engineering

    2014年10月 - 2016年9月

      詳細を見る

    国名: インドネシア共和国

    備考: Master of Applied Science

    researchmap

  • Politeknik Elektronika Negeri Surabaya   Telecommunication engineering   Telecommunication engineering

    2010年8月 - 2014年9月

      詳細を見る

    国名: インドネシア共和国

    備考: Bachelor of Applied Science

    researchmap

所属学協会

  • IEEE (Institute of Electrical and Electronics Engineers)

    2024年2月 - 現在

      詳細を見る

  • 電子情報通信学会

    2019年2月 - 2020年3月

      詳細を見る

  • IAENG (International Association of Engineers)

    2018年1月 - 現在

      詳細を見る

 

論文

  • The Design and Implementation of Kerberos-Blockchain Vehicular Ad-Hoc Networks Authentication Across Diverse Network Scenarios

    Maya Rahayu, Md. Biplob Hossain, Samsul Huda, Yuta Kodera, Md. Arshad Ali, Yasuyuki Nogami

    Sensors   2024年11月

     詳細を見る

    掲載種別:研究論文(学術雑誌)  

    DOI: 10.3390/s24237428

    researchmap

  • Optimizing IoT Intrusion Detection Using Balanced Class Distribution, Feature Selection, and Ensemble Machine Learning Techniques

    Muhammad Bisri Musthafa, Samsul Huda, Yuta Kodera, Md Arshad Ali, Shunsuke Araki, Jedidah Mwaura, Yasuyuki Nogami

    Sensors   24 ( 13 )   2024年7月

     詳細を見る

    掲載種別:研究論文(学術雑誌)  

    Internet of Things (IoT) devices are leading to advancements in innovation, efficiency, and sustainability across various industries. However, as the number of connected IoT devices increases, the risk of intrusion becomes a major concern in IoT security. To prevent intrusions, it is crucial to implement intrusion detection systems (IDSs) that can detect and prevent such attacks. IDSs are a critical component of cybersecurity infrastructure. They are designed to detect and respond to malicious activities within a network or system. Traditional IDS methods rely on predefined signatures or rules to identify known threats, but these techniques may struggle to detect novel or sophisticated attacks. The implementation of IDSs with machine learning (ML) and deep learning (DL) techniques has been proposed to improve IDSs’ ability to detect attacks. This will enhance overall cybersecurity posture and resilience. However, ML and DL techniques face several issues that may impact the models’ performance and effectiveness, such as overfitting and the effects of unimportant features on finding meaningful patterns. To ensure better performance and reliability of machine learning models in IDSs when dealing with new and unseen threats, the models need to be optimized. This can be done by addressing overfitting and implementing feature selection. In this paper, we propose a scheme to optimize IoT intrusion detection by using class balancing and feature selection for preprocessing. We evaluated the experiment on the UNSW-NB15 dataset and the NSL-KD dataset by implementing two different ensemble models: one using a support vector machine (SVM) with bagging and another using long short-term memory (LSTM) with stacking. The results of the performance and the confusion matrix show that the LSTM stacking with analysis of variance (ANOVA) feature selection model is a superior model for classifying network attacks. It has remarkable accuracies of (Formula presented.) and (Formula presented.) and overfitting values of (Formula presented.) and (Formula presented.) on the two datasets, respectively. The model’s ROC is also shaped with a sharp bend, with AUC values of (Formula presented.) and (Formula presented.) for the UNSW-NB15 dataset and the NSL-KD dataset, respectively.

    DOI: 10.3390/s24134293

    Scopus

    PubMed

    researchmap

  • A Secure Authentication for Plant Monitoring System Sensor Data Access

    Samsul Huda, Yasuyuki Nogami, Md. Biplob Hossain, Yang Jie, Le Hoang Anh, Muhammad Bisri Musthafa, Maya Rahayu, Takuma Akada

    2024 IEEE International Conference on Consumer Electronics (ICCE)   2024年1月

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)   出版者・発行元:IEEE  

    To encourage effective monitoring in plant agriculture, we have studied an IoT application for plant agriculture monitoring systems. This application helps users monitor and track plant environmental conditions through the user's device. It uses login and token-based authentication for security. However, it may introduce potential vulnerabilities that may arise from intercepting passwords due to the inherent insecurity of HTTP communication for data transmission in the development environment and token inexpiration. To address these security concerns, we propose secure authentication for accessing the plant monitoring system's sensor data. The proposed solution incorporates two-factor authentication (2FA) and JSON web tokens (JWT) approaches to enhance security. The 2FA requires users to provide an additional verification step beyond username and password to access the application. Additionally, JWT enhances security of token-based authentication. By introducing an expiration time to the tokens, the vulnerability associated with token reuse is minimized. Then, we implement and verify the functionality of the proposed solution through system testing.

    DOI: 10.1109/icce59016.2024.10444465

    Scopus

    researchmap

  • Evaluation of IDS model by improving accuracy and reducing overfitting using stacking LSTM

    Muhammad Bisri Musthafa, Samsul Huda, Md Arshad Ali, Yuta Kodera, Yasuyuki Nogami

    Digest of Technical Papers - IEEE International Conference on Consumer Electronics   2024年

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)  

    Utilizing Machine Learning (ML) techniques to construct models for Intrusion Detection Systems (IDS) has emerged as a leading strategy to enhance security measures. Previously, we applied an ensemble of Support Vector Machines (SVM) for model training, achieving an accuracy detection rate of 88.6% on familiar datasets. However, it performs poorly on unknown datasets due to overfitting problems. This work aims to improve accuracy and tackle overfitting problems by implementing stacked Long Short-Term Memory (LSTM) networks. Furthermore, analysis of variance (ANOVA) with F-test is used to find the important feature. The synthetic minority oversampling technique (SMOTE) algorithm is applied to obtain balanced data. Several experiments were conducted to analyze the performance of the proposed approach, including investigating stacked LSTM with tuning hyperparameters. The proposed method achieved the highest prediction accuracy of 97.23% and an overfitting value of 0.24%.

    DOI: 10.1109/ICCE59016.2024.10444231

    Scopus

    researchmap

  • A Blockchain-based Approach with zk-SNARKs for Secure Email Applications.

    Md. Biplob Hossain, Maya Rahayu, Md. Arshad Ali, Samsul Huda, Yuta Kodera, Yasuyuki Nogami

    Int. J. Netw. Comput.   14 ( 2 )   225 - 247   2024年

     詳細を見る

    掲載種別:研究論文(学術雑誌)  

    researchmap

    その他リンク: https://dblp.uni-trier.de/db/journals/ijnc/ijnc14.html#HossainRAHKN24

  • ELiPS-based Ciphertext-Policy Attribute-Based Encryption.

    Le Hoang Anh, Yuta Kawada, Samsul Huda, Md. Arshad Ali, Yuta Kodera, Yasuyuki Nogami

    Int. J. Netw. Comput.   14 ( 2 )   186 - 205   2024年

     詳細を見る

    掲載種別:研究論文(学術雑誌)  

    researchmap

    その他リンク: https://dblp.uni-trier.de/db/journals/ijnc/ijnc14.html#AnhKHAKN24

  • Optimizing CRYSTALS-Dilithium in Rust: Radix-4 NTT and Assembly-level Comparison with Official C Implementation

    Shunri Kudo, Yasuyuki Nogami, Samsul Huda, Yuta Kodera

    11th IEEE International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2024   395 - 396   2024年

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)  

    Post-Quantum Cryptography (PQC) is becoming popular since it offers protection against quantum attacks. CRYSTALS-Dilithium is being considered as a promising NIST PQC standard candidate. It utilizes the Radix-2 Number Theoretic Transform (NTT). Its reliance on lattice-based cryptography and number-theoretic principles positions CRYSTALS-Dilithium as a strong contender for providing robust security in the era of quantum computing. Besides, the Radix-4 NTT divides polynomials into more parts than the Radix-2 NTT, making calculations more efficient by reusing values. In this paper, we improve the computational efficiency of CRYSTALS-Dilithium by implementing the Radix-4 NTT algorithm in both C and Rust programming languages. We verified the effectiveness through experiments in terms of signature and verification speeds. Additionally, we analyzed the assembly code generated by both languages to understand the performance differences.

    DOI: 10.1109/ICCE-Taiwan62264.2024.10674226

    Scopus

    researchmap

  • Investigating Vulnerabilities in RSA-like Cryptosystems Through Lattice-based Attacks on Small Exponent Keys

    Sou Kumagai, Shota Kanzawa, Samsul Huda, Yuta Kodera, Yasuyuki Nogami

    11th IEEE International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2024   585 - 586   2024年

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)  

    RSA-like cryptosystems, based on the original RSA algorithm, are gaining attention as potential alternatives to traditional techniques. They offer better security, efficiency, flexibility, and compatibility in cryptography. However, recent studies have uncovered vulnerabilities in these variants, particularly to Wiener-type attacks, despite initial expectations of security comparable to RSA. In this paper, we further investigate the security vulnerabilities of a variant of this technique, namely the Murru-Saettone (MS) cryptosystem. Our investigation employs lattice-based attacks to exploit weaknesses in systems with small private keys. It demonstrates that if the private exponent is smaller than N1/4, where N is the product of two distinct balanced primes, the small exponent of the cryptosystem can be recovered.

    DOI: 10.1109/ICCE-Taiwan62264.2024.10674633

    Scopus

    researchmap

  • Performance Analysis of ELiPS-Based CP-ABE with Optimized Decryption Functions

    Le Hoang Anh, Yuta Kawada, Samsul Huda, Yuta Kodera, Yasuyuki Nogami

    Smart Innovation, Systems and Technologies   404 SIST   345 - 354   2024年

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)  

    CP-ABE emerges as an advanced cryptographic method that offers secure and precise access control in Internet of Things and cloud storage applications. Nevertheless, the original CP-ABE algorithm relied on the PBC library with a security level limited to 80 bits and is now outdated, making it vulnerable to attacks. To address this issue, we have introduced ELiPS-based CP-ABE, which boosts the level of security to 128 bits using the ELiPS library. While this enhancement improved the overall performance, the decryption functions remained computationally intensive. To tackle this, we previously optimized the decryption function by minimizing final exponentiations and inversions. In this paper, we evaluate and analyze the impact of these optimizations on decryption efficiency. Moreover, we compare the ELiPS-based CP-ABE with these improvements to the initial version and the original PBC-based CP-ABE. As a result, the combination of both optimization techniques resulted in an average 43.06% overall reduction in decryption time compared to the initial version of the ELiPS-based CP-ABE scheme, while in total execution, it led to a 25.27% improvement. Furthermore, there was an average 53.81% overall reduction in total execution time compared to the original PBC-based CP-ABE method.

    DOI: 10.1007/978-981-97-5810-4_30

    Scopus

    researchmap

  • A Study to Improve Calculation Efficiency of CKKS Encoding with Parallelization

    Taichi Saito, He Yixuan, Samsul Huda, Junting Xiao, Yuta Kodera, Yasuyuki Nogami

    11th IEEE International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2024   397 - 398   2024年

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)  

    CKKS homomorphic encryption is frequently utilized in cloud-based applications due to its ability to handle both real and complex numbers, ensuring the protection of sensitive data. However, the security of CKKS encryption relies on an encoding process to convert input data into a polynomial. While this process involves the Inverse Fast Fourier Transform (IFFT), there are two notable issues with IFFT: first, most multiplications between complex numbers require four multiplications between real numbers, and second, there are delays in processing due to data hazards. In this paper, we propose an effective way to handle these issues by substituting them using parallelization based on the sum of complex conjugates. This approach aims to reduce the multiplication cost, thereby improving processing time compared to IFFT.

    DOI: 10.1109/ICCE-Taiwan62264.2024.10674426

    Scopus

    researchmap

  • A Highly Secure and Accurate System for COVID-19 Diagnosis from Chest X-Ray Images

    Tuy Tan Nguyen, Tianyi Chen, Ian Philippi, Quoc Bao Phan, Shunri Kudo, Samsul Huda, Yasuyuki Nogami

    Midwest Symposium on Circuits and Systems   980 - 984   2024年

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)  

    Global healthcare systems face growing pressure as populations rise. This can lead to longer wait times and an increased risk of treatment delays or misdiagnosis. Artificial intelligence (AI) diagnostic systems are being developed to address these challenges, but concerns exist about their accuracy and data security. This study introduces a robust AI telehealth system that offers a two-pronged approach. It utilizes a cutting-edge image analysis method, vision transformer, to enhance diagnostic accuracy, while also incorporating post-quantum cryptography algorithm, Kyber, to ensure patient privacy. Furthermore, an interactive visualization tool aids in interpreting the diagnostic results, providing valuable insights into the model's decisionmaking process. This translates to faster diagnoses and potentially shorter wait times for patients. Extensive testing with various datasets has demonstrated the system's effectiveness. The optimized model achieves a remarkable 95.79% accuracy rate in diagnosing COVID-19 from chest X-rays, with the entire process completed in under five seconds.

    DOI: 10.1109/MWSCAS60917.2024.10658795

    Scopus

    researchmap

  • Reducing Fruitless Cycles in Pollard's Rho Method with SFM for Efficient ECDLP Attacks on BN Curves

    Ryuichi Kato, Takuro Manabe, Shota Kanzawa, Samsul Huda, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    2024 International Technical Conference on Circuits/Systems, Computers, and Communications, ITC-CSCC 2024   2024年

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)  

    Pollard's rho method is a widely used probabilistic algorithm for solving the Elliptic Curve Discrete Logarithm Problem (ECDLP). To enhance its efficiency, the skew Frobenius mapping (SFM) has been incorporated into the method, reducing the average number of steps required to find a collision. However, the combination of Pollard's rho method with SFM introduces the occurrence of fruitless cycles, which are computational loops that do not contribute to solving the ECDLP and hinder the overall attacking efficiency. This paper presents a comprehensive analysis of fruitless cycles in Pollard's rho method with SFM, focusing on their impact when applied to Barreto-Naehrig (BN) curves. We propose a scheme to mitigate the occurrence of fruitless cycles by optimizing the seed point selection to be adaptive according to situation. To validate the effectiveness of our proposed method, we perform comprehensive experiments and compare the results with the conventional Pollard's rho method with SFM. The results indicate that the proposed approach significantly reduces the occurrence of fruitless cycles, leading to faster and more efficient ECDLP attacks on BN curves.

    DOI: 10.1109/ITC-CSCC62988.2024.10628268

    Scopus

    researchmap

  • An In-depth Analysis of Kerberos and Blockchain Integration on VANETs' Security and Performance

    Maya Rahayu, Md Biplob Hossain, Samsul Huda, Md Arshad Ali, Yuta Kodera, Yasuyuki Nogami

    11th IEEE International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2024   391 - 392   2024年

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)  

    Vehicular Ad-Hoc Networks (VANETs) are essential for modern transportation systems, but their openness exposes them to cyber threats. Authentication in VANETs is challenged by dynamic topology and high mobility, requiring robust mechanisms. Previously, we proposed an authentication system for VANETs using blockchain and Kerberos. Kerberos authenticator messages are stored in a blockchain ledger accessible to the Trusted Authentication Server (TAS) and Roadside Units (RSUs), resulting in minimal signaling overhead and authentication delay. However, the performance of the blockchain itself was not evaluated. In this paper, we investigate the blockchain's performance in a simulated VANET environment with 100 vehicles, 4 RSUs, and 1 TAS. Using Ethereum blockchain and Omnet++ simulation, we assess the blockchain feasibility in VANET authentication scenarios.

    DOI: 10.1109/ICCE-Taiwan62264.2024.10674056

    Scopus

    researchmap

  • Securing Data Transmission in Noisy Channels: A Synergistic Approach using Kyber and BCH Codes

    Linh Nguyen, Andri Santoso, Samsul Huda, Yasuyuki Nogami, Tuy Tan Nguyen

    11th IEEE International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2024   399 - 400   2024年

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)  

    The proliferation of the Internet of Things leads to the sharing of more data among diverse stakeholders, ranging from individual users to large enterprises. However, ensuring the security of this data exchange while simultaneously minimizing errors during transmission presents a complex challenge. Due to the involvement of numerous devices and users capable of data sharing, the dynamic and heterogeneous nature of the environment leads to constant changes. In this paper, we integrate the Kyber algorithm for post-quantum security with Bose-Chaudhuri-Hocquenghem (BCH) codes for error correction. We validate our approach by transmitting images from the widely- used CIFAR-10 dataset in encrypted mode over noisy communication channels. The system demonstrates effective image encryption and robust error correction capabilities.

    DOI: 10.1109/ICCE-Taiwan62264.2024.10674282

    Scopus

    researchmap

  • SnapSafe: Enabling Selective Image Privacy Through YOLO and AES-Protected Facial Encryption with QR Code

    Andri Santoso, Samsul Huda, Tuy Tan Nguyen, Yuta Kodera, Yasuyuki Nogami

    2024 International Technical Conference on Circuits/Systems, Computers, and Communications, ITC-CSCC 2024   2024年

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)  

    In the digital age, organizations commonly use photos to share their activities for brand visibility. However, it is crucial to safeguard the facial information of individuals depicted in these photos to prevent potential misuse. In this paper, we propose a single-party security system for enabling selective image privacy with a focus on facial regions, called SnapSafe. It adopts the YOLOv8 deep learning model for face detection, AES encryption for security, and QR technology to store the encrypted face region coordinates. Our evaluation assesses the effectiveness of the system through the usability of its face locking and unlocking processes, alongside an analysis of its running time. The results demonstrate the system's proficiency in executing face protection tasks with high accuracy and minimal time overhead, thus indicating its suitability for real-time applications.

    DOI: 10.1109/ITC-CSCC62988.2024.10628222

    Scopus

    researchmap

  • IoT-Enabled Plant Monitoring System with Power Optimization and Secure Authentication

    Samsul Huda, Yasuyuki Nogami, Maya Rahayu, Takuma Akada, Md Biplob Hossain, Muhammad Bisri Musthafa, Yang Jie, Le Hoang Anh

    Computers, Materials and Continua   81 ( 2 )   3165 - 3187   2024年

     詳細を見る

    掲載種別:研究論文(学術雑誌)  

    Global food security is a pressing issue that affects the stability and well-being of communities worldwide. While existing Internet of Things (IoT) enabled plant monitoring systems have made significant strides in agricultural monitoring, they often face limitations such as high power consumption, restricted mobility, complex deployment requirements, and inadequate security measures for data access. This paper introduces an enhanced IoT application for agricultural monitoring systems that address these critical shortcomings. Our system strategically combines power efficiency, portability, and secure access capabilities, assisting farmers in monitoring and tracking crop environmental conditions. The proposed system includes a remote camera that captures images of surrounding plants and a sensor module that regularly monitors various environmental factors, including temperature, humidity, and soil moisture. We implement power management strategies to minimize energy consumption compared to existing solutions. Unlike conventional systems, our implementation utilizes the Amazon Web Services (AWS) cloud platform for reliable data storage and processing while incorporating comprehensive security measures, including Two-Factor Authentication (2FA) and JSON Web Tokens (JWT), features often overlooked in current agricultural IoT solutions. Users can access this secure monitoring system via a developed Android application, providing convenient mobile access to the gathered plant data. We validate our system’s advantages by implementing it with two potted garlic plants on Okayama University’s rooftop. Our evaluation demonstrates high sensor reliability, with strong correlations between sensor readings and reference data, achieving determination coefficients (R2) of 0.979 for temperature and 0.750 for humidity measurements. The implemented power management strategies extend battery life to 10 days on a single charge, significantly outperforming existing systems that typically require daily recharging. Furthermore, our dual-layer security implementation utilizing 2FA and JWT successfully protects sensitive agricultural data from unauthorized access.

    DOI: 10.32604/cmc.2024.058144

    Scopus

    researchmap

  • An implementation of ELiPS-based Ciphertext-Policy Attribute-Based Encryption

    Le Hoang Anh, Yuta Kawada, Samsul Huda, Md. Arshad Ali, Yuta Kodera, Yasuyuki Nogami

    2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW)   220 - 226   2023年11月

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)   出版者・発行元:IEEE  

    Pairing-based cryptography serves as a fundamental building block for a wide range of advanced cryptographic protocols, including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), blockchain, zero-knowledge Succinct Non-interactive ARgument of Knowledge (zk-SNARKs), and Homomorphic Encryption (HE). A well-designed pairing library would catalyze progress in these specific applications and encourage innovation across various cryptographic protocols that rely on pairing. However, the CP-ABE framework relies on the PBC library, which has not been updated for a long time, needs higher security levels, and is vulnerable to multiple attacks, making it less practical. In contrast, the ELiPS library offers efficient operations related to pairing-based cryptography, delivering high performance while upholding a substantial security standard. To address the issues above, enhance performance, and strengthen security in CP-ABE, we adopt and implement the ELiPS as an efficient library for pairing systems into the CP-ABE framework, namely ELiPS-based CP-ABE. First, we generate a generator g. Then, we employ Shirase's technique to convert asymmetric to symmetric pairing as the precondition of ELiPS. After that, we make several modifications to the CP-ABE framework and choose the appropriate ELiPS functions for integration. Finally, we validate our proposal through experiments involving data access authorization scenarios. The results confirm the effectiveness of our proposal, showcasing reduced computational costs for almost all functions except for the decryption cost.

    DOI: 10.1109/candarw60564.2023.00044

    Scopus

    researchmap

  • A Smart Contract Based Blockchain Approach Integrated with Elliptic Curve Cryptography for Secure Email Application

    Md Biplob Hossain, Maya Rahayu, Md Arshad Ali, Samsul Huda, Yuta Kodera, Yasuyuki Nogami

    Proceedings - 2023 11th International Symposium on Computing and Networking Workshops, CANDARW 2023   195 - 201   2023年

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)  

    In today's interconnected digital era, email stands as a primary platform for communication across various fields, such as business, academia, and personal interactions. Since it operates on shared mediums, email is inherently susceptible to interception and misuse of sensitive information. To cover this issue, Pretty Good Privacy (PGP) ensures the confidentiality of email contents. However, while PGP effectively encrypts the body of messages, a significant vulnerability emerges during key sharing. Blockchain technology comes with its immutability aspect. Once data is embedded into the blockchain, modifying it becomes exceedingly challenging. This makes it a potential safeguard against the vulnerabilities in PGP's key sharing mechanism. Additionally, smart contracts remove the requirement of a Man-in-the-Middle for sharing key, which enhances the sharing key's security and builds trust among users. In this paper, we integrate the strengths of blockchain into the PGP encryption process, specifically targeting the key sharing vulnerability. Also, we adopt Elliptic Curve Cryptography (ECC) to ensure the confidentiality of the PGP's key. First, generate the PGP's key. Then, encrypt it using ECC. After that, deploy a smart contract and continue with the encrypted PGP's key transactions in blockchain networks. Through this integration, we aim to enhance the security, ensuring both confidentiality and integrity of the PGP's key. We demonstrated that the proposed system is workable by experimental observation.

    DOI: 10.1109/CANDARW60564.2023.00040

    Scopus

    researchmap

  • An integrated secured vehicular ad-hoc network leveraging Kerberos authentication and Blockchain technology

    Maya Rahayu, Md Biplob Hossain, Md Arshad Ali, Samsul Huda, Yuta Kodera, Yasuyuki Nogami

    Proceedings - 2023 11th International Symposium on Computing and Networking Workshops, CANDARW 2023   260 - 266   2023年

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)  

    Vehicular Ad-Hoc Networks (VANETs) are a prominent technology in the drive towards establishing smart transportation systems in the Digital Transformation (DX) era. These networks provide users with critical road information for optimal route selection and accident avoidance. However, the openness of VANETs environment makes them susceptible to various cyber threats. Therefore, authenticating the entities that join the network is necessary and crucial for ensuring the security and integrity of VANET communications. Kerberos is one of the authentication protocols that ensure security, as the password and key are never directly sent among the entities. However, ensuring secure and efficient authentication, especially in VANET handovers, remains a challenge. This paper introduces an innovative authentication system for VANETs that leverages the combined power of blockchain and Kerberos. The system stores Kerberos authenticator messages in a distributed ledger within the blockchain, accessible to Trusted Authorities (TAS) and all RSUs. This approach streamlines vehicle handovers and safeguards authenticator messages against adversarial tampering. It exhibits minimal signalling overhead and authentication delay, ensuring swift and secure authentication processes. We verify the proposal's effectiveness by simulating the VANETs environment with 100 vehicles, 4 RSUs, and 1 TAS using Omnet++ with the Tsushima, Japan area map.

    DOI: 10.1109/CANDARW60564.2023.00050

    Scopus

    researchmap

  • Evaluation of machine learning based optimized feature selection approaches and classification methods for Intrusion Detection System.

    Muhammad Bisri Musthafa, Ali Md. Arshad, Samsul Huda, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    ICCE-Taiwan   285 - 286   2023年

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)  

    An Intrusion Detection System (IDS) is used in the field of cyber security to prevent and mitigate threats during transmitting data between the devices and server. An IDS using Machine Learning (ML) can be applied to identify and classify security threats. Various ML techniques have been applied to improve the model performance of IDS. In addition, the quality of the dataset is also an important determinant that can greatly improve the detection accuracy. The authors propose an IDS framework based on SVM ensemble with feature selection and balancing dataset. The experiment results show that the proposed model can achieve a high detection performance.

    DOI: 10.1109/ICCE-Taiwan58799.2023.10226697

    Scopus

    researchmap

    その他リンク: https://dblp.uni-trier.de/db/conf/icce-tw/icce-tw2023.html#MusthafaAHKKN23

  • A Proposal of IoT Application for Plant Monitoring System with AWS Cloud Service.

    Samsul Huda, Yasuyuki Nogami, Takuma Akada, Maya Rahayu, Md. Biplob Hossain, Muhammad Bisri Musthafa, Le Hoang Anh, Yang Jie

    SmartNets   1 - 5   2023年

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)  

    Recently, food security has become a significant concern worldwide as a serious risk to sustainable societies. One of the key challenges facing food security is ensuring that plants are grown in optimal conditions. Therefore, it is important to implement effective monitoring systems in plant agriculture. In this paper, we present an Internet of Things (IoT) application for plant agriculture monitoring systems to help farmers monitor and track plant environmental conditions. The system consists of a remote camera, power source, a sensor module, and an AWS cloud platform. To reduce power consumption, it periodically measures various environmental parameters such as temperature, humidity, and soil moisture with power management configured. Then, it sends them to AWS securely with token-based authentication. It also captures the plant using a remote camera and sends it to a cloud. Finally, users can monitor and track the collected plant information through our system's user interface from Android application on their mobile phones. We implement and verify the functionality of the proposed system through applications in a potted garlic plant on the rooftop at Okayama University.

    DOI: 10.1109/SmartNets58706.2023.10215620

    Scopus

    researchmap

    その他リンク: https://dblp.uni-trier.de/db/conf/smartnets/smartnets2023.html#HudaNARHMAJ23

  • Pengenalan Pemanfaatan Cloud Computing dalam Pengembangan Desa Wisata Budaya di Desa Plunturan

    Samsul Huda, Samsul Huda

    Parta: Jurnal Pengabdian Kepada Masyarakat   3 ( 1 )   14 - 18   2022年6月

     詳細を見る

    掲載種別:研究論文(学術雑誌)   出版者・発行元:Universitas Pendidikan Nasional  

    <jats:p>Pemanfaatan teknologi internet sudah menjadi kebutuhan di era ini. Bahkan, cloud computing menggabungkan teknologi komputer dengan jaringan berbasis internet. Cloud Computing memudahkan pengguna untuk menjalankan program tanpa menginstal aplikasi terlebih dahulu dan lebih mudah untuk mengakses informasi melalui internet. Kelompok masyarakat dapat menggunakan teknologi ini untuk memajukan desa. Desa Plunturan merupakan salah satu desa yang berada di Kabupaten Ponorogo yang memiliki banyak produk budaya. Reyog adalah ikon seni desa Plunturan. Selain reyog, masih ada beberapa produk budaya, seperti gajah, jathilan, ganongan, tledekan, dan karawitan. Potensi Desa Plunturan dapat menarik perhatian wisatawan. Namun, masyarakat desa Plunturan masih belum memaksimalkan potensi seni tersebut. Seni pertunjukan belum mampu menarik wisatawan untuk datang ke desa Plunturan. Cloud computing berpotensi dapat meningkatkan pengenalan wisata budaya Plunturan. Dalam pelaksanaan pengabdian masyarakat bekerjasama dengan NGO ULAP dari Denmark, masyarakat dan pengelola desa wisata budaya Plunturan. Desa Plunturan dapat mengadopsi beberapa keuntungan layanan cloud sehingga publikasi desa wisata budaya dapat dimaksimalkan. Layanan cloud yang diadopsi meliputi desain, manajemen dokumen, dan website.</jats:p>

    DOI: 10.38043/parta.v3i1.3590

    researchmap

  • Prototipe Monitoring Kebocoran dan Ketersediaan Gas pada APAR (Alat Pemadam Api Ringan) Jenis CO2

    Samsul Huda, Muh. Bahrul Ilmi Khoiruddin

    Energy - Jurnal Ilmiah Ilmu-Ilmu Teknik   12 ( 1 )   25 - 30   2022年5月

     詳細を見る

    掲載種別:研究論文(学術雑誌)   出版者・発行元:Universitas Panca Marga  

    DOI: 10.51747/energy.v12i1.1083

    researchmap

  • INSTALASI SISTEM TANDON AIR OTOMATIS UNTUK KEBUTUHAN PASOKAN AIR BERSIH RUANG ISOLASI DAN PERAWATAN PASIEN COVID-19 DI RSUD RA. BASOENI MOJOKERTO

    Samsul Huda, Elvianto Dwi Hartono

    JMM - Jurnal Masyarakat Merdeka   4 ( 2 )   2021年11月

     詳細を見る

    掲載種別:研究論文(学術雑誌)   出版者・発行元:{LPPM} Universitas Merdeka Pasuruan  

    DOI: 10.51213/jmm.v4i2.87

    researchmap

  • A Proposal of Air-Conditioning Guidance System Using Discomfort Index

    Samsul Huda, Nobuo Funabiki, Minoru Kuribayashi, Rahardhita Widyatra Sudibyo, Nobuya Ishihara, Wen Chun Kao

    Lecture Notes in Networks and Systems   159 LNNS   154 - 165   2021年

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)   出版者・発行元:Springer  

    Nowadays, global warming has considered a key environmental issue associated with the pursuit of sustainable societies around the world. Therefore, it appears to be critical how to achieve the best usage of an air conditioner (AC) to reduce unnecessary energy consumption. In addition, it would be beneficial to elders who tend to suffer from heatstroke in hot summers. However, the AC can be overused or underused, while the indoor temperature is adjusted without considering the outdoor condition. If the weather is cool outside, the AC should be turned off and the windows in the room should be opened. On the contrary, if the outdoor temperature is high, the AC should be turned on. In this paper, we propose an air-conditioning guidance system (AC-Guide) to optimize the use of the AC. This system periodically, 1) samples the temperature and humidity of the room with the sensor, 2) obtains the outdoor weather data from an API, 3) calculates the discomfort index (DI) for the indoor and outdoor, 4) detects the on/off state of the AC using the image, and 5) sends a message of requesting turning on/off the AC when the DI is outside/inside the comfortable range. For evaluations, we implement the AC-Guide using Raspberry Pi, and verify the effectiveness through simulations and applications in two rooms at Okayama University.

    DOI: 10.1007/978-3-030-61108-8_15

    Scopus

    researchmap

    その他リンク: https://dblp.uni-trier.de/db/conf/bwcca/bwcca2020.html#HudaFKSIK20

  • A proposal of calligraphy learning assistant system with letter portion practice function using projection mapping

    Samsul Huda, Nobuo Funabiki, Minoru Kuribayashi, Wen Chung Kao

    International Journal of Web Information Systems   16 ( 2 )   137 - 149   2020年6月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)   出版者・発行元:EMERALD GROUP PUBLISHING LTD  

    Purpose: For several decades, calligraphy has been popular among people in Japan, China, and even in the world. Traditionally, a teacher teaches how to write letters on a paper with a brush, and a student will imitate them by referring to the model letters. However, if a teacher is not available, this method will not be applicable either. This study aims to propose a calligraphy learning assistant system (CLAS) using projection mapping, which allows a student to learn calligraphy by him/herself. Design/methodology/approach: By following the letter writing video of a teacher that is directly projected on the paper, a student is able to learn the stroke order and writing speed in addition to the letter shape. Moreover, the letter portion practice function is incorporated in CLAS to allow a learner to repeat practicing hard portions of each letter. Findings: For evaluations, the authors implemented CLAS using Raspberry Pi and open-source software and asked students to use it. The results confirmed that CLAS is effective in improving calligraphy skills of novice students. Originality/value: With CLAS, a student can practice calligraphy using a conventional brush, ink and paper at a desk while looking at the model letter writing of a teacher projected on the paper using projection mapping.

    DOI: 10.1108/IJWIS-07-2019-0032

    Web of Science

    Scopus

    researchmap

  • 投影マッピングを用いた文字部分実行機能を持つ書道学習支援システム【JST・京大機械翻訳】

    Huda Samsul, Funabiki Nobuo, Kuribayashi Minoru, Kao Wen-Chung

    IEEE Conference Proceedings   2020-January ( ICCE )   489 - 490   2020年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

    DOI: 10.1109/ICCE46568.2020.9043042

    Web of Science

    Scopus

    J-GLOBAL

    researchmap

    その他リンク: https://dblp.uni-trier.de/db/conf/iccel/icce2020.html#HudaFKK20

  • Walking Pattern for Quadruped as Observer Robot

    Nuril Esti Khomariah, Samsul Huda

    Journal of Physics: Conference Series   1201 ( 1 )   2019年5月

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)  

    This paper explains about the walking patterns of quadruped robots. This robot was made to be an observer robot. Therefore, being slick in movement is the main feature that must be owned by this robot. As a four-legged robot, the movement (forward, backward, shift left, shift right, rotate) requires an algorithm to control the synchronization movements of each leg. This algorithm consists of several poses (including the body, as well as all legs) and if arranged in sequence it will form a certain pattern of movement. Each leg has 3 DOF. The pose of each leg is represented in the cartesian coordinates (x, y, z axis), while the movement of each joint is represented in angular. It has solved using the inverse kinematics formula which is useful for converting leg coordinates into angular for each leg joint. By defining the walking pattern, the robot can more easily controlled by the direction and speed of its movement.

    DOI: 10.1088/1742-6596/1201/1/012010

    Scopus

    researchmap

  • WSN(無線センサネットワーク)に基づくモニタリング精密農業システムのプロトタイプ【Powered by NICT】

    Fahmi Nurul, Huda Samsul, Prayitno Eko, Rasyid M. Udin Harun Al, Roziqin M. Choirur, Pamenang M. Unggul

    IEEE Conference Proceedings   2017-January ( ISITIA )   323 - 328   2017年11月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

    DOI: 10.1109/ISITIA.2017.8124103

    Web of Science

    Scopus

    J-GLOBAL

    researchmap

  • Fuzzy logic for an implementation environment health monitoring system based on wireless sensor network

    Nurul Fahmi, Samsul Huda, Amang Sudarsono, M. Udin Harun Al Rasyid

    Journal of Telecommunication, Electronic and Computer Engineering   9 ( 2-4 )   119 - 122   2017年

     詳細を見る

    掲載種別:研究論文(学術雑誌)  

    Internet of Things (IoT) has become popular with the development of technology, which allows each physical device identified, managed and recorded by computer. In the context of Wireless Sensor Networks (WSNs), it is important for everyone to know the latest information of the status of human health, for example the condition of the surrounding environment. In the paper, we proposed an implementation of environmental health conditions monitoring through WSN with fuzzy logic that could be monitored in real time anywhere and anytime. In our proposed system, we used a sensor temperature, humidity, Carbon Monoxide (CO) and Carbon Dioxide (CO2), luminosity, noise for node sensors. For decision-making environmental health conditions with fuzzy logic, we have 5 categories, such as Very Good (VG), Good (G), Medium (M), Bad (B) and the last is Dangerous (D). The data were sent from the sensor node to the gateway using ZigBee IEEE 802.15.4 standard. The data received from the sensor node were stored into the database provided by the gateway and to be synchronized with external databases (database server) using TCP/IP. Users can access the data sensor via the website or mobile application such as Desktop, PCs, Laptop, and Smartphones.

    Scopus

    researchmap

  • Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

    Samsul Huda, Amang Sudarsono, Tri Harsono

    EMITTER International Journal of Engineering Technology   4 ( 1 )   2016年8月

     詳細を見る

    掲載種別:研究論文(学術雑誌)   出版者・発行元:{EMITTER} International Journal of Engineering Technology  

    DOI: 10.24003/emitter.v4i1.116

    researchmap

  • An Embedded System for applying High Performance Computing in Educational Learning Activity

    Irene Erlyn Wina Rachmawan, Nurul Fahmi, Edi Wahyu Widodo, Samsul Huda, M. Unggul Pamenang, M. Choirur Roziqin, Andri Permana W., Stritusta Sukaridhoto, Dadet Pramadihanto

    EMITTER International Journal of Engineering Technology   4 ( 1 )   2016年8月

     詳細を見る

    掲載種別:研究論文(学術雑誌)   出版者・発行元:{EMITTER} International Journal of Engineering Technology  

    DOI: 10.24003/emitter.v4i1.113

    researchmap

  • Secure data exchange using authenticated Ciphertext-Policy Attributed-Based Encryption

    Samsul Huda, Amang Sudarsono, Tri Harsono

    Proceedings - 2015 International Electronics Symposium: Emerging Technology in Electronic and Information, IES 2015   134 - 139   2016年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)   出版者・発行元:IEEE  

    Easy sharing files in public network that is intended only for certain people often resulting in the leaking of sharing folders or files and able to be read also by others who are not authorized. Secure data is one of the most challenging issues in data sharing systems. Here, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a reliable asymmetric encryption mechanism which deals with secure data and used for data encryption. It is not necessary encrypted to one particular user, but recipient is only able to decrypt if and only if the attribute set of his private key match with the specified policy in the ciphertext. In this paper, we propose a secure data exchange using CP-ABE with authentication feature. The data is attribute-based encrypted to satisfy confidentiality feature and authenticated to satisfy data authentication simultaneously.

    DOI: 10.1109/ELECSYM.2015.7380829

    Web of Science

    Scopus

    researchmap

  • Secure data exchange in environmental health monitoring system through wireless sensor network

    Amang Sudarsono, Samsul Huda, Nurul Fahmi, M. Udin Harun Al-Rasyid, Prima Kristalina

    International Journal of Engineering and Technology Innovation   6 ( 2 )   103 - 122   2016年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)   出版者・発行元:TAIWAN ASSOC ENGINEERING & TECHNOLOGY INNOVATION  

    Recently, disseminating latest sensory information regarding the status of environmental health in the surroundings of human life is one of very important circumstances which must be known by everyone. These circumstances should be accessible at anytime and anywhere by everyone through any type of end-user devices, both fixed and mobile devices, i.e., Desktop PCs, Laptop PCs, and Smartphones. Wireless Sensor Network (WSN) is one of the networks which deals with data sensors distribution from sensor nodes to the gateway node toward a Data Center Server. However, there is a big possibility for many adversaries to intercept and even manipulate data sensors crossing the network. Hence, a secure data sensor exchange in the system would be strongly desirable. In this research, we propose an environmental health conditions monitoring system through WSN and its implementation with considering secure data sensor exchange within the network and secure data sensor access. This work may contribute to support a part of smart cities and take in part the Internet of Thing (IoT) technology. In our proposed system, we collect some environmental health information such as temperature, humidity, luminosity, noise, carbon monoxide (CO) and carbon dioxide (CO2) from sensor nodes. We keep the confidentiality and integrity of transmitted data sensors propagating through IEEE802.15.4-based communication toward a gateway node. Further, the collected data sensors in the gateway are synchronized to the Data Center Server through a secure TCP/IP connection for permanently storing. At anytime and anywhere, only legitimated users who successfully pass-through an attribute-based authentication system are able to access the data sensors.

    Web of Science

    Scopus

    researchmap

  • Secure data sensor sharing on ubiquitous environmental health monitoring application

    Samsul Huda, Nurul Fahmi, Amang Sudarsono, M. Udin Harun Al Rasyid

    Jurnal Teknologi   78 ( 6-3 )   53 - 58   2016年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)   出版者・発行元:PENERBIT UTM PRESS  

    In Internet of Things (IoT) era, The limitation storage on Wireless Sensor Network (WSN) can be solved by synchronized data sensors from the gateway node to the data center server. Data in the data center can be remotely accessed by the user at any time and anywhere from end user devices such as PCs, laptop PCs, and smart phones., and data should be accessed securely. The Only legitimated user can access the data sensor from an environmental health data center. CP-ABE (Ciphertext-Policy Attribute-Based Encryption) is becoming a robust cryptographic scheme solution to this issue. To enable a secure data sensor sharing and access on an environmental health data center, we propose a secure system model using CP-ABE which ensures confidentiality, integrity, and user privacy features. Experimental results prove that the implementation of CP-ABE does not overload the system.

    DOI: 10.11113/jt.v78.8928

    Web of Science

    Scopus

    researchmap

▼全件表示

MISC

  • Raspberry Piを用いた空調機使用警報システムの提案【JST・京大機械翻訳】

    HUDA Samsul, FUNABIKI Nobuo, KURIBAYASHI Minoru, SUDIBYO Rahardhita Widyatra, ISHIHARA Nobuya

    電子情報通信学会大会講演論文集(CD-ROM)   2020   2020年

     詳細を見る

  • 誤ったメッセージを避けるための屋外不快指数を用いたエアコンディショニングガイダンスシステムの改善

    HUDA Samsul, FUNABIKI Nobuo, KURIBAYASHI Minoru, WIDYATRA SUDIBYO Rahardhita, ISHIHARA Nobuya

    電子情報通信学会技術研究報告(Web)   120 ( 69(NS2020 22-30) )   2020年

     詳細を見る

  • プロジェクションマッピングを用いた書道学習支援システムの評価

    HUDA Samsul, FUNABIKI Nobuo, KURIBAYASHI Minoru, KYAW Htoo Htoo Sandi

    電子情報通信学会大会講演論文集(CD-ROM)   2019   2019年

     詳細を見る

  • プロジェクションマッピングを用いた習字学習支援システムの文字位置実習機能の実装

    HUDA Samsul, FUNABIKI Nobuo, KURIBAYASHI Minoru

    情報科学技術フォーラム講演論文集   18th   2019年

     詳細を見る

  • 射影写像を用いた書道学習支援システムの提案

    HUDA Samsul, XIQIN Lu, FUNABIKI Nobuo, KURIBAYASHI Minoru

    電子情報通信学会技術研究報告   118 ( 211(MVE2018 12-24) )   2018年

     詳細を見る

  • IEEE802.11n無線ネットワークのアクセスポイントのためのラズベリーパイ設定とスループット測定

    KUMAR DEBNATH Sumon, FUNABIKI Nobuo, SOE LWIN Kyaw, SELIM AL MAMUN Md., WIDYATRA SUDIBYO Rahardhita, HUDA Samsul

    電子情報通信学会技術研究報告   116 ( 382(NS2016 118-140) )   2016年

     詳細を見る

▼全件表示