×
The submission system is temporarily under maintenance. Please send your manuscripts to
Go to Editorial ManagerVehicular network security had spanned and covered a wide range of security related issues. However solar energy harvesting Road Side Unit (RSU) security was not defined clearly, it is this aspect that is considered in this paper. In this work, we will suggest an RSU security model to protect it against different internal and external threats. The main goal is to protect RSU specific data (needed for its operation) as well as its functionality and accessibility. The suggested RSU security model must responds to many objectives, it should ensure that the administrative information exchanged is correct and undiscoverable (information authenticity and privacy), the source (e.g., VANET server) is who he claims to be (message integrity and source authentication) and the system is robust and available (using Intrusion Detection System (IDS)). In this paper, we suggest many techniques to strength RSU security and they were prototyped using an experimental model based on Ubicom IP2022 network processor development kit .
The incredible growth of FPGA capabilities in recent years and the new included features have made them more and more attractive for numerous embedded systems. There is however an important shortcoming concerning security of data and design. Data security implies the protection of the FPGA application in the sense that the data inside the circuit and the data transferred to/from the peripheral circuits during the communication are protected. This paper suggests a new method to support the security of any FPGA platform using network processor technology. Low cost IP2022 UBICOM network processor was used as a security shield in front of any FPGA device. It was supplied with the necessary security methods such as AES ciphering engine, SHA-1, HMAC and an embedded firewall to provide confidentiality, integrity, authenticity, and packets filtering features.
In this paper, Mosul University Wireless Local Area Network (MUWLAN) security will be evaluated. The evaluation was made to test the confidentiality, integrity and availability of the MUWLAN. Addressing these issues will help in ensuring tighter security. After the evaluation, serious security pitfalls were found that can allow any attacker to have access to the MUWLAN and uses their internet service. Based on the obtained results, suggestions for improvement were made to tighten the security of Mosul University wireless local area network. Keyword : - WLAN security, WEP encryption, PTW attack, Wireshark, MITM attack, SSLStrip attack.
Nowadays, multimedia communication has become very widespread and this requires it to be protected from attackers and transmitted securely for reliability. Encryption and decryption techniques are useful in providing effective security for speech signals to ensure that these signals are transmitted with secure data and prevent third parties or the public from reading private messages. Due to the rapid improvement in digital communications over the recent period up to the present, the security of voice data transmitted over various networks has been classified as a favored field of study in earlier years. The contributions to audio encryption are discussed in this review. This Comprehensive review mainly focuses on presenting several kinds of methods for audio encryption and decryption the analysis of these methods with their advantages and disadvantages have been investigated thoroughly. It will be classified into encryption based on traditional methods and encryption based on advanced chaotic systems. They are divided into two types, continuous-time system, and discrete-time system, and also classified based on the synchronization method and the implementation method. In the fields of information and communications security, system designers face many challenges in both cost, performance, and architecture design, Field Programmable gate arrays (FPGAs) provide an excellent balance between computational power and processing flexibility. In addition, encryption methods will be classified based on Chaos-based Pseudo Random Bit Generator, Fractional-order systems, and hybrid chaotic generator systems, which is an advantageous point for this review compared with previous ones. Audio algorithms are presented, discussed, and compared, highlighting important advantages and disadvantages. Audio signals have a large volume and a strong correlation between data samples. Therefore, if traditional cryptography systems are used to encrypt such huge data, they gain significant overhead. Standard symmetric encryption systems also have a small key-space, which makes them vulnerable to attacks. On the other hand, encryption by asymmetric algorithms is not ideal due to low processing speed and complexity. Therefore, great importance has been given to using chaotic theory to encode audio files. Therefore, when proposing an appropriate encryption method to ensure a high degree of security, the key space, which is the critical part of every encryption system, and the key sensitivity must be taken into account. The key sensitivity is related to the initial values and control variables of the chaotic system chosen as the audio encryption algorithm. In addition, the proposed algorithm should eliminate the problems of periodic windows, such as limited chaotic range and non-uniform distribution, and the quality of the recovered audio signal remains good, which confirms the convenience, reliability, and high security.
Lately, image encryption has stand out as a highly urgent demand to provide high security for digital images against use and unauthorized distribution. A lot of existing researches use chaotic systems, symmetric or asymmetric schemes for image encryption, but cryptosystem based on one encryption technique only, faces many challenges like weak security and low complexity. Therefore, incorporating two or more different ciphering methods yields a secure and efficient algorithm to protect image information. In this work, a new image cryptosystem is suggested by joining zigzag scan technique, RSA algorithm and chaotic systems. These three security factors introduce Triple Incorporated Ciphering stages system (TIC). Initially, the plaintext image is divided into 8 × 8 non-overlapping blocks, then the odd blocks are isolated from the even blocks. After that, a new modified zigzag scan in two different directions is adopted for shuffling pixels in the odd and even blocks. This operation effectively enhances the shuffling degree. Next, the RSA algorithm is utilized after combining the scrambled blocks in one matrix. Finally, chaotic systems are implemented on the resultant encrypted matrix to complete the ciphering process. The chaos is implemented in two steps; confusion and diffusion. Duffing map is exploited in the confusion stage, whereas L¨u system is adopted on the shuffled matrix in the diffusion stage. The simulation results show the superiority of TIC in both security and attacks robustness compared to other cryptographic algorithms. Therefore, TIC can be exploited in real-time communication systems for secure image transmission.
Experts and researchers in the field of information security have placed a high value on the security of image data in the last few years. They have presented several image encryption techniques that are more secure. To increase the security level of image encryption algorithms, this article offers an efficient diffusion approach for image encryption methods based on one- dimensional Logistic, three-dimensional Lorenz, DNA encoding and computing, and SHA-256. The encryption test demonstrates that the method has great security and reliability. This article, also, examines the security of encryption methods, such as secret key space analysis, key sensitivity test, histogram analysis, information entropy process, correlation examination, and differential attack. When the image encryption method described in this article is compared to several previous image encryption techniques, the encryption algorithm has higher information entropy and a lower correlation coefficient.
Recently, the incorporation of state-of-the-art technology such as Electronic Healthcare Records (EHRs), networks, and cloud computing has transformed the traditional healthcare system. However, security problems have arisen as a result of the integration of technology. Secure remote user authentication is a core part of the healthcare system to validate the user's identification via an unsecure communication network. Since then, several remote user authentication schemes have been presented, each with its own set of pros and limitations. As a result, security, malicious attacks and privacy concerns are considered one of the main challenges related to the healthcare system. In this paper, we propose a safe user authentication scheme for patients in the healthcare system that overcomes these flaws and confirms the security of the proposed work using scyther, a formal security tool. In the healthcare environment, our work provides an effective means to construct an environment capable of setting, registering, storing, searching, analyzing, authentication, and verifying electronic healthcare information in order to protect the information of patients. Furthermore, our suggested scheme uses symmetric encryption based on the crypto- hash function for accessing the anomaly of the patient's identity and One-Time Password (OTP). Towards the end of the study, the performance analysis results indicate a delicate balance of security and performance that is frequently lacking in previous works.
In the world of modern technology and the huge spread of its use, it has been combined with healthcare systems and the establishment of electronic health records (EHR) to follow up on patients. This merging of technology with healthcare has allowed for more accurate EHRs that follow a patient to different healthcare facilities. Timely exchange of electronic health information (EHR) between providers is critical for aiding medical research and providing fast patient treatment. As a result, security issues and privacy problems are viewed as significant difficulties in the healthcare system. Several remote user authentication methods have been suggested. In this research, we present a feasible patient EHR migration solution for each patient. finally, each patient may securely delegate their current hospital’s information system to a hospital certification authority in order to receive migration proof that can be used to transfer their EHR to a different hospital. In addition, the proposed scheme is based on crypto-hash functions and asymmetric cryptosystems by using homomorphic cryptography. The proposed scheme carried out two exhaustive formal security proofs for the work that was provided. Using Scyther, a formal security tool, we present a secure user authentication technique in the proposed healthcare scheme that ensures security and informal analysis.
In the era of modern trends such as cloud computing, social media applications, emails, mobile applications, and URLs that lead to increased risks for defrauding authorized users, and then the attackers try to gain illegal access to accounts of users through a malicious attack. The phishing attack is one of the dangerous attacks caused to access of authorized account illegally way. The finances, business, banking, and other sensitive in states are faces by this type of attacks due to the important information they have. In this paper, we propose a secure verification scheme that can overcome the above-mentioned issues. Additionally, the proposed scheme can resist famous cyberattacks such as impersonate attacks, MITM attacks. Moreover, the proposed scheme has security features like strong verification, forward secrecy, user’s identity anomaly. The security analysis and the experimental results proved the strongest of the proposed scheme compared with other related works. Finally, our proposed scheme balanced between the performance and the security merits.
This work addresses the critical need for secure and patient-controlled Electronic Health Records (EHR) migration among healthcare hospitals’ cloud servers (HHS). The relevant approaches often lack robust access control and leave data vulnerable during transfer. Our proposed scheme empowers patients to delegate EHR migration to a trusted Third-Party Hospital (TTPH); which is the Certification Authority (CA) while enforcing access control. The system leverages asymmetric encryption utilizing the Elliptic Curve Digital Signature Algorithm (ECDSA), EEC and ECDSA added robust security and lightness EHR sharing. Patient and user privacy is managed due to anonymity through cryptographic hashing for data protection and utilizes mutual authentication for secure communication. Formal security analysis using the Scyther tool and informal analysis was conducted to validate the system’s robustness. The proposed scheme achieved EHR integrity due to the verification of the communicated HHS and ensuring the integrity of the HHS digital certificate during EHR migration. Ultimately, the result achieved in the proposed work demonstrated the scheme’s high balance between data security and accuracy of communication, where the best result obtained represented 7.7/ ms as computational cost and 1248 /bits as communication cost compared with the relevant approaches.
The security of communications in various transmitted information’s forms such as video, audio, image, and even text and preserving them from attackers has become of great importance in the age of the Internet and cellular networks. Perhaps one of the most important media used to transmit information is digital images. They are distinguished from video and audio by their lack of complexity, and at the same time they are distinguished from text by the possibility of containing more information. Due to the necessity of transmitting huge amounts of information via digital images through additive white Gaussian noise (AWGN) channels for various applications. This transmission of images over unsecured channels is vulnerable to many attacks that must be protected by information security tools. In this research, a hybrid chaos-based system was developed to encrypt and secure images and send them via an orthogonal frequency division multiplexing (OFDM) channel, which leads to transferring large amounts of transmitted information in a short time, with very little interference between the data, and maintaining the transfer rate. Two chaotic techniques, Rossler and Modified Chau system, are used together to create a secret encryption key. This combination of chaotic systems provides highly random sensitive keys with amplitude of 10252 that are difficult to predict by the attacker and which makes restoring the original image very difficult in the event of a very small change in the chaotic parameters. Many tests were conducted to determine the strength of the proposed system, including statistical and differential analysis and entropy to verify the strength of the image security approach, in addition to applying some types of attacks to the encrypted image, such as noise and cropping different parts of the image. It is clear that the proposed scheme has strong immunity to these attacks. This was proven by the comparative experimental results. The entropy ratio was very excellent compared to the rest of the results obtained in the rest of the research. This was also the case with the values of (NPCR), (UACI), (NPCR), and Mean Square Error (MSE) was also very good as compared with other researches in the literature. The proposed security approach for OFDM gave a low link and a low bit error rate. And a higher signal-to-noise ratio (PSNR).
IoHT has several benefits for real-time smart healthcare, but because of its limited processing power, storage capacity, and self-defense capabilities, security issues are growing. Although newer blockchain-based authentication solutions have strong security features due to their tamper-resistant decentralized architecture, they come with a high resource cost, requiring a lot of processing power, more storage, and time-consuming authentication procedures. As such, these difficulties provide barriers to reaching the ideal levels of scalability and temporal efficiency, which are essential for the efficient functioning of large-scale, time-sensitive IoHT systems. To solve these challenges, this paper presents an authentication approach designed especially for IoHT systems. Our work consists four-phase process, which includes setting, registration, login and authentication, and HERs Exchange data. To enhance both efficiency and scalability, the proposed scheme employs a combination of 3-D map dimensions chaotic-based public key cryptosystems, and blockchain-based, fog computing technologies and IPFS. We simulate the proposed work to implement health electronic record (HER) by the Ethereum platform and solidity language, the simulation experiments were tested using the JMeter tool. Showed that the key generation time for chaotic-based is faster than (ECC)—furthermore, the average latency ≈ 3.7 ms. A security analysis of the proposed scheme was implemented by the Scyther tool. The formal security analysis demonstrated that the proposed scheme is secured against potential attacks and supports the scalability of the IoHT system.
Because elliptic curve cryptography offers a promising trade-off between security and computational performance, the field of current cryptographic techniques has taken a particular interest in it. Two basic digital signature algorithms—the Elliptic Curve Diffie-Hellman Algorithm (ECDH) and the Elliptic Curve Digital Signature Algorithm (ECDSA) are the subject of this performance analysis and comparison. These methods are based on elliptic curve cryptography. The analysis takes into consideration realistic application demands as well as factors like key length and security level. The results provide useful information on trade-offs between performance and security. A list of acceptable ECDSA requirements for digital signatures was used for the comparison. These characteristics are sign, sign/s, no PC verify, no PC verify/s, siglen, keygen, keygen/s, verify, and verify/s.
Radio frequency identification (RFID) technology is being used widely in the last few years. Its applications classifies into auto identification and data capturing issues. The purpose of this paper is to design and implement RFID active tags and reader using microcontroller ATmega328 and 433 MHz RF links. The paper also includes a proposed mutual authentication protocol between RFID reader and active tags with ownership transfer stage. Our protocol is a mutual authentication protocol with tag’s identifier updating mechanism. The updating mechanism has the purpose of providing forward security which is important in any authentication protocol to prevent the attackers from tracking the past transactions of the compromised tags. The proposed protocol gives the privacy and security against all famous attacks that RFID system subjected for due to the transfer of data through unsecure wireless channel, such as replay, denial of service, tracking and cloning attacks. It also ensures ownership privacy when the ownership of the tag moves to a new owner.
Audio encryption has gained popularity in a variety of fields including education, banking over the phone, military, and private audio conferences. Data encryption algorithms are necessary for processing and sending sensitive information in the context of secure speech conversations. In recent years, the importance of security in any communications system has increased. To transfer data securely, a variety of methods have been used. Chaotic system-based encryption is one of the most significant encryption methods used in the field of security. Chaos-based communication is a promising application of chaos theory and nonlinear dynamics. In this research, a chaotic algorithm for the new chaotic chameleon system was proposed, studied, and implemented. The chameleon chaotic system has been preferred to be employed because it has the property of changing from self-excited (SA) to hidden-attractor (HA) which increases the complexity of the system dynamics and gives strength to the encryption algorithm. A chaotic chameleon system is one in which, depending on the parameter values, the chaotic attractor alternates between being a hidden attractor and a self-excited attractor. This is an important feature, so it is preferable to use it in cryptography compared to other types of chaotic systems. This model was first implemented using a Field Programmable Gate Array (FPGA), which is the first time it has been implemented in practical applications. The chameleon system model was implemented using MATLAB Simulink and the Xilinx System Generator model. Self-excited, hidden, and coexisting attractors are shown in the proposed system. Vivado software was used to validate the designs, and Xilinx ZedBoard Zynq-7000 FPGA was used to implement them. The dynamic behavior of the proposed chaotic system was also studied and analysis methods, including phase portrait, bifurcation diagrams, and Lyapunov exponents. Assessing the quality of the suggested method by doing analyses of many quality measures, including correlation, differential signal-to-noise ratio (SNR), entropy, histogram analysis, and spectral density plot. The numerical analyses and simulation results demonstrate how well the suggested method performs in terms of security against different types of cryptographic assaults.
The phenomenal rise of the Internet in recent years, as well as the expansion of capacity in today’s networks, have provided both inspiration and incentive for the development of new services that combine phone, video, and text ”over IP.” Although unicast communications have been prevalent in the past, there is an increasing demand for multicast communications from both Internet Service Providers (ISPs) and content or media providers and distributors. Indeed, multicasting is increasingly being used as a green verbal exchange mechanism for institution-oriented programmers on the Internet, such as video conferencing, interactive college games, video on demand (VoD), TV over the Internet, e-learning, software programme updates, database replication, and broadcasting inventory charges. However, the lack of security within the multicast verbal exchange model prevents the effective and large-scale adoption of such important company multi-celebration activities. This situation prompted a slew of research projects that addressed a variety of issues related to multicast security, including confidentiality, authentication, watermarking, and access control. These issues should be viewed within the context of the safety regulations that work in the specific conditions. For example, in a public inventory charge broadcast, while identification is a vital necessity, secrecy is not. In contrast, video-convention programme requires both identification and confidentiality. This study gives a complete examination and comparison of the issues of group key management. Both network-dependent and network-independent approaches are used. The study also addresses the advantages, disadvantages, and security problems of various protocols.
The demand for a secured web storage system is increasing daily for its reliability which ensures data privacy and confidentiality. The proposed paper aims to find the most secure ways to maintain integrity and protect privacy and security in healthcare management systems. The Advanced Encryption Standard (AES) algorithm is used to encrypt data transferred by providing a means to check the integrity of information transmitted and make it more immune to cyberattack techniques, this was implemented by using Keyed-Hash Message Authentication Code (HMAC) and Secured Hash Algorithm-256 (SHA-256). The risk of exposure to attackers can be avoided by using honeypot systems combined with Intrusion detection systems (IDSs) as a firewall system is not effective against such attacks alone. The experimental results evaluate the proposed security health information management system by comparing the performance of the encryption algorithm based on encryption time, memory and CPU usage, and entropy for different plaintext lengths. In addition, it can be seen that when changing the AES key size, more memory and time are required the longer the key size is used. The 128 bits AES key is therefore advised if the system must operate in hard real-time.
Preserving privacy and security plays a key role in allowing each component in the healthcare system to access control and gain privileges for services and resources. Over recent years, there have been several role-based access control and authentication schemes, but we noticed some drawbacks in target schemes such as failing to resist well-known attacks, leaking privacy-related information, and operational cost. To defeat the weakness, this paper proposes a secure electronic healthcare record scheme based on Schnorr Signcryption, crypto hash function, and Distributed Global Database (DGDB) for the healthcare system. Based on security theories and the Canetti-Krawczyk model (CK), we notice that the proposed scheme has suitable matrices such as scalability, privacy preservation, and mutual authentication. Furthermore, findings from comparisons with comparable schemes reveal that the suggested approach provides greater privacy and security characteristics than the other schemes and has enough efficiency in computational and communicational aspects.
A wireless body area network (WBAN) connects separate sensors in many places of the human body, such as clothes, under the skin. WBAN can be used in many domains such as health care, sports, and control system. In this paper, a scheme focused on managing a patient’s health care is presented based on building a WBAN that consists of three components, biometric sensors, mobile applications related to the patient, and a remote server. An excellent scheme is proposed for the patient’s device, such as a mobile phone or a smartwatch, which can classify the signal coming from a biometric sensor into two types, normal and abnormal. In an abnormal signal, the device can carry out appropriate activities for the patient without requiring a doctor as a first case. The patient does not respond to the warning message in a critical case sometimes, and the personal device sends an alert to the patient’s family, including his/her location. The proposed scheme can preserve the privacy of the sensitive data of the patient in a protected way and can support several security features such as mutual authentication, key management, anonymous password, and resistance to malicious attacks. These features have been proven depending on the Automated Validation of Internet Security Protocols and Applications. Moreover, the computation and communication costs are efficient compared with other related schemes.
The use of smart network applications based on the Internet of Things is increasing, which increases the attractiveness of malicious activities, leading to the need to increase the adequate security of these networks. In this paper, the latest recent breakthroughs in blockchain for the Internet of Things are examined in the context of electronic health (e-health), smart cities, smart transportation, and other applications in this article. Research gaps and possible solutions are discussed, such as security, connection, transparency, privacy, and the IoT's blockchain regulatory challenges. In addition, the most important consensus algorithms used in the blockchain have been discussed, including Proof of Work, Proof of Stake, and Proof of Authority, each of which operates within certain rules.
Real-time detection and recognition systems for vehicle license plates present a significant design and implementation challenge, arising from factors such as low image resolution, data noise, and various weather and lighting conditions.This study presents an efficient automated system for the identification and classification of vehicle license plates, utilizing deep learning techniques. The system is specifically designed for Iraqi vehicle license plates, adapting to various backgrounds, different font sizes, and non-standard formats. The proposed system has been designed to be integrated into an automated entrance gate security system. The system’s framework encompasses two primary phases: license plate detection (LPD) and character recognition (CR). The utilization of the advanced deep learning technique YOLOv4 has been implemented for both phases owing to its adeptness in real-time data processing and its remarkable precision in identifying diminutive entities like characters on license plates. In the LPD phase, the focal point is on the identification and isolation of license plates from images, whereas the CR phase is dedicated to the identification and extraction of characters from the identified license plates. A substantial dataset comprising Iraqi vehicle images captured under various lighting and weather circumstances has been amassed for the intention of both training and testing. The system attained a noteworthy accuracy level of 95.07%, coupled with an average processing time of 118.63 milliseconds for complete end-to-end operations on a specified dataset, thus highlighting its suitability for real-time applications. The results suggest that the proposed system has the capability to significantly enhance the efficiency and reliability of vehicle license plate recognition in various environmental conditions, thus making it suitable for implementation in security and traffic management contexts.
In this work, a new image encryption method using a combined multilevel permutation with stream cipher is proposed. In the permutation algorithm, image is divided into blocks in each level and its blocks are rearranged by using pseudorandom permutation method. A new non linear stream cipher algorithm is also proposed that is based on combining several keys generated by Linear Feedback Shift Register (LFSR). The results shown that the proposed algorithm has a high security feature and it is efficient for image encryption. Practical tests proved that the proposed encryption algorithm is robust, provides high level of security and gives perfect reconstruction of the decrypted image.
Searchable encryption (SE) is an interesting tool that enables clients to outsource their encrypted data into external cloud servers with unlimited storage and computing power and gives them the ability to search their data without decryption. The current solutions of SE support single-
Recently, chaos theory has been widely used in multimedia and digital communications due to its unique properties that can enhance security, data compression, and signal processing. It plays a significant role in securing digital images and protecting sensitive visual information from unauthorized access, tampering, and interception. In this regard, chaotic signals are used in image encryption to empower the security; that’s because chaotic systems are characterized by their sensitivity to initial conditions, and their unpredictable and seemingly random behavior. In particular, hyper-chaotic systems involve multiple chaotic systems interacting with each other. These systems can introduce more randomness and complexity, leading to stronger encryption techniques. In this paper, Hyper-chaotic Lorenz system is considered to design robust image encryption/ decryption system based on master-slave synchronization. Firstly, the rich dynamic characteristics of this system is studied using analytical and numerical nonlinear analysis tools. Next, the image secure system has been implemented through Field-Programmable Gate Arrays (FPGAs) Zedboard Zynq xc7z020-1clg484 to verify the image encryption/decryption directly on programmable hardware Kit. Numerical simulations, hardware implementation, and cryptanalysis tools are conducted to validate the effectiveness and robustness of the proposed system.
Nowadays, the Wireless Sensor Network (WSN) has materialized its working areas, including environmental engineering, agriculture sector, industrial, business applications, military, intelligent buildings, etc. Sensor networks emerge as an attractive technology with great promise for the future. Indeed, issues remain to be resolved in the areas of coverage and deployment, scalability, service quality, size, energy consumption and security. The purpose of this paper is to present the integration of WSNs for IoT networks with the intention of exchanging information, applying security and configuration. These aspects are the challenges of network construction in which authentication, confidentiality, availability, integrity, network development. This review sheds some light on the potential integration challenges imposed by the integration of WSNs for IoT, which are reflected in the difference in traffic features.
Software Defined Wireless Sensor Networks (SDWSN) has emerged as a contemporary model to achieve dynamic and secure control in the realm of Internet of Things (IoT) applications. By leveraging the benefits of Software Defined Networks (SDN), SDWSN enables ease of management and configuration of wireless networks, thereby overcoming the challenges associated with traditional Wireless Sensor Networks (WSN). However, SDWSN networks are susceptible to emerging network intrusion and threats, particularly Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, which can significantly impact the network’s performance and cause operational losses. This study proposes a machine learning based algorithm for detecting and preventing DoS and DDoS attacks in SDWSN networks. The proposed algorithm uses various features to distinguish between benign traffic and malicious traffic generated by attacks. The results demonstrate that the proposed algorithm can effectively detect and prevent DoS attacks, significantly contributing to the security of SDWSN networks.
in recent years popularity of smart Home has been increasing due to low price and simplicity through tablet and Smartphone connectivity. It is an automation of house or home activity. Raspberry Pi3 is a small computer with digital input output capability and it was introduced in 2016; input/output ability besides the availability of all computer features make this system very suitable to be central unit can for smart home. Smart Home may contain centralize controller which control heating, lightning, ventilation in the home, HAVC( Heating, Ventilation and air conditioning),Safety locks of gates, doors and other system to provide improve comfort, better energy efficiency and security. The aim of this Paper is to develop a smart home application using RPi3, wemose-d1 and GSM. Programming has been developed in C++ in wemose-d1 and Python environment for RPi3 operation. The MQTT (Message Queuing Telemetry Transport protocol) technologic used to connect between raspberry pi3 and nodes.
Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, security, and copyright. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. Digital audio provides a suitable cover for high-throughput steganography. In this paper a high robustness system against the attackers in hiding of color images is presented. We used the multi-resolution discrete wavelet transform in hiding process. The JPEG format type for color images and WAV format for speech cover signal that used in test of system. Programs and graphics are executed by using MATLAB version 6.5 programs.
Aircraft detection is a vital and significant field within object detection that has garnered considerable attention from academics, particularly following the advancement of deep learning methods. Aircraft detection has recently become widely utilized in several civil and military fields. This comprehensive survey meticulously categorizes and evaluates diverse deep learning methodologies in airplane detection research. Encompassing radar-based, image-based, and multimodal approaches, the paper presents a structured framework to enhance understanding of the evolving research landscape within this domain. The survey critically identifies gaps and discerns emerging trends, offering valuable insights into standard datasets of aircraft images, performance metrics, real-world applications, and challenges and limitations encountered by aircraft detection systems. Its potential contributions are underscored as pivotal for advancing the safety and security of air travel. This research paper is the inaugural publication of its kind in the domain of aircraft detection review papers, establishing itself as an all-encompassing reference for subsequent scholars.
Present study develops short term electric load forecasting using neural network; based on historical series of power demand the neural network chosen for this network is feed forward network, this neural network has five input variables ( hour of the day, the day of the week, the load for the previous hour, the load of the pervious day, the load for the previous week). Short term load forecast is very important due to accurate for power system operation and analysis system security among other mandatory function. The trained artificial neural network shows good accuracy and robust in forecasting future load demands for the daily operation, mean absolute percentage error (MAPE) was calculated and it is maximum value is 0.75% in load forecasting on Monday.
With the development of cyber security and multimedia forensics, digital image manipulation has recently been recognized as one of the major challenges in forensic image analysis. Therefore, selecting an image area and then copying and pasting it into the same image is the hardest process in passive image forgery. This act violates privacy and secrecy of authenticity of digital image. The attacker exploits the available tools of editing image program to make the fake image similar to the original one. This paper presents a proposed fast and efficient passive Copy-move forgery detection scheme. Hessian- Affine and Harris-Affine detectors, and Shift Invariant Feature Transform (SIFT) descriptor, are employed in the proposed scheme. These detectors provide sufficient key points for detecting the duplicated regions in the case of small or invisible regions. The experimental results show that the proposed scheme is invariant against simple and hard attacks like uniform or non-uniform transformation. The proposed scheme was evaluated using standard data sets (GRIP, MICC 220, and F8 Multi). Resulted True Positive Rate (TPR) was 0.98 and False Positive Rate (FPR) was 0.035. Thus, the scheme is effective and providing valuable results compared to recent passive image authentication schemes.
In recent years, self-driving cars and reducing the number of accident casualties have drawn a lot of attention. Although it is crucial to increase driver awareness on the road, autonomous vehicles can emulate human driving and guarantee improved levels of road safety. Artificial intelligence (AI) technologies are often employed for this purpose. However, deep learning, a subset of AI, is prone to numerous errors, a wide range of threats, and needs to handle vast amounts of data, which imposes high-performance hardware requirements. This study suggests a deep learning model for object recognition that employs characteristics to describe data rather than images. Our model employs the COCO dataset as the training foundation, and it was suggested that the features be retrieved using the principal component analysis PCA extraction method. The current results demonstrate the efficacy and precision of our model, with an accuracy of 99.96 %. Furthermore, the performance indices, i.e., recall, precision, and F1-score, achieved about 1 for most of the COCO classes in training phase and promising results in testing phase.
Address Resolution Protocol (ARP) is used to resolve a host’s MAC address, given its IP address. ARP is stateless, as there is no authentication when exchanging a MAC address between the hosts. Hacking tactics using ARP spoofing are constantly being abused differently; many previous studies have prevented such attacks. However, prevention requires modification of the underlying network protocol or additional expensive equipment, so applying these methods to the existing network can be challenging. In this paper, we examine the limitations of previous research in preventing ARP spoofing. In addition, we propose a defence mechanism that does not require network protocol changes or expensive equipment. Before sending or receiving a packet to or from any device on the network, our method checks the MAC and IP addresses to ensure they are correct. It protects users from ARP spoofing. The findings demonstrate that the proposed method is secure, efficient, and very efficient against various threat scenarios. It also makes authentication safe and easy and ensures data and users’ privacy, integrity, and anonymity through strong encryption techniques.
Nonlinear stream ciphers have become a viable alternative to traditional cryptosystems in response to the growing need for secure communication. These ciphers generate a keystream via feedback mechanisms and nonlinear functions, which are then utilized for encryption. Geffe generator system is one of the most keystream generators. Also, these systems have many benefits, like being fast, flexible, and able to create unpredictable and non-repeating keystreams, these systems are susceptible to cryptanalysis attacks, which have the potential to compromise their security. This paper presents the first study of applying chicken swarm optimization (CSO) algorithm in the field of cryptanalysis based on cipher only attack. The standard CSO algorithm and an adaptive multi points CSO (AMPCSO) algorithm are proposed to cryptanalysis nonlinear stream cipher based on Geffe keystream generator. Firstly, the traditional CSO is used to reveal the secret initial values of the Geffe generator. Secondly, an adaptive multi points chicken swarm optimization (AMPCSO) has been proposed to enhance the traditional CSO algorithm to attack Geffe generator systems. The AMPCSO is a new idea to advance the CSO search abilities and improve the foraging behavior of hens and chicks by allowing hens to be influenced by other individuals within the same or different groups and affected by the best individual in the population and enable chicks to learn from four reference points rather than learn from their respective mothers only. Lastly, a new criterion is used to estimate the value of fitness by utilizing a multi-objective fitness function (MOFF), which is grounded on Pareto dominance. The experimental results showed that the CSO and AMPCSO are very effective tools in terms of accuracy, information required, and CPU times when applied to the analysis of nonlinear stream cipher. The AMPCSO required a few characters from ciphertext to attack systems with total LFSRs length up to 59 bits with an appropriate CPU time.
The Permanent Magnet Synchronous Motor (PMSM) is commonly used as traction motors in the electric traction applications such as in subway train. The subway train is better transport vehicle due to its advantages of security, economic, health and friendly with nature. Braking is defined as removal of the kinetic energy stored in moving parts of machine. The plugging braking is the best braking offered and has the shortest time to stop. The subway train is a heavy machine and has a very high moment of inertia requiring a high braking torque to stop. The plugging braking is an effective method to provide a fast stop to the train. In this paper plugging braking system of the PMSM used in the subway train in normal and fault-tolerant operation is made. The model of the PMSM, three-phase Voltage Source Inverter (VSI) controlled using Space Vector Pulse Width Modulation technique (SVPWM), Field Oriented Control method (FOC) for independent control of two identical PMSMs and fault-tolerant operation is presented. Simulink model of the plugging braking system of PMSM in normal and fault tolerant operation is proposed using Matlab/Simulink software. Simulation results for different cases are given.
In this paper, a robust wavelet based watermarking scheme has been proposed for digital audio. A single bit is embedded in the approximation part of each frame. The watermark bits are embedded in two subsets of indexes randomly generated by using two keys for security purpose. The embedding process is done in adaptively fashion according to the mean of each approximation part. The detection of watermark does not depend on the original audio. To measure the robustness of the algorithm, different signal processing operations have been applied on the watermarked audio. Several experimental results have been conducted to illustrate the robustness and efficiency of the proposed watermarked audio scheme.
Searchable symmetric encryption (SSE) enables clients to outsource their encrypted documents into a remote server and allows them to search the outsourced data efficiently without violating the privacy of the documents and search queries. Dynamic SSE schemes (DSSE) include performing update queries, where documents can be added or removed at the expense of leaking more information to the server. Two important privacy notions are addressed in DSSE schemes: forward and backward privacy. The first one prevents associating the newly added documents with previously issued search queries. While the second one ensures that the deleted documents cannot be linked with subsequent search queries. Backward has three formal types of leakage ordered from strong to weak security: Type-I, Type-II, and Type-III. In this paper, we propose a new DSSE scheme that achieves Type-II backward and forward privacy by generating fresh keys for each search query and preventing the server from learning the underlying operation (del or add) included in update query. Our scheme improves I/O performance and search cost. We implement our scheme and compare its efficiency against the most efficient backward privacy DSSE schemes in the literature of the same leakage: MITRA and MITRA*. Results show that our scheme outperforms the previous schemes in terms of efficiency in dynamic environments. In our experiments, the server takes 699ms to search and return (100,000) results.
Blockchain innovation is gaining attention in fields like monetary exchange, edge computing, medical care, and datasecurity. Consortium chains, using lightweight consensus algorithms like PBFT, offer alternatives to proof-based mechanisms while maintaining decentralization, security, and scalability. However, it also has some limitations and challenges that need to be addressed to improve its performance and scalability. PBFT is a classical algorithm with high complexity due to three-stage broadcasting and arbitrary selection of master nodes. Its communication efficiency is low, and scalability issues arise when nodes are large, causing significant delays and performance degradation in unstable networks. Furthermore, the requirement for every node to bundle, check, and broadcast the exchange list in the pre-prepared, prepared and commit stages diminishes the efficiency of consensus and performance between nodes and comes down on network correspondence. The research proposes a new methodology for the consensus algorithm, focusing on high-trust nodes to protect the network from malicious actors and reducing computational overhead and latency by eliminating Byzantian nodes and grouping the remaining nodes into groups, each of which has a main node selected based on a higher trust score. According to the results, the suggested methodology leads to significant improvements in communication complexity and Byzantine fault tolerance compared to standard PBFT networks and previous works. This indicates a substantial enhancement in network efficiency and scalability, offering promising prospects for blockchain applications in various fields.
Cybersecurity awareness has a huge impact on individuals and an even bigger impact on firms, universities, and institutes to those individuals belong. Consequently, it is essential to explore and asses the factors affecting the awareness level of cybersecurity. More specifically this research study examines the impact of demographic features of individuals on cybersecurity awareness. The Studied literature’s limitations have been addressed and overcome in our research from the variability, and ambiguity aspects. A questionnaire was developed and responses were collected from 613 participants. Reliability and validity tests as well as correlations have been applied for the instruments and data employed in this study. Coefficients were calculated via multiple linear regression for the weights of each of the cybersecurity components. Data reliability test showed that Cronbach’s Alpha value of 0.707 for the used data which is acceptable for research purposes. Results analysis showed r-value for each of the questions is greater than the r table which was 0.07992. Examining the proposed hypotheses showed that there is a difference as the null hypothesis is rejected for one of the demographic features being tested namely, gender. While there is no significant difference when it comes to the other two factors, education level, and age. Using the weight for each of the components, password security, technical behavior, and social influence could provide a solid base for decision-makers to focus on and implement the available resources for gender-specific developments to raise the cybersecurity awareness level..
Face recognition is the technology that verifies or recognizes faces from images, videos, or real-time streams. It can be used in security or employee attendance systems. Face recognition systems may encounter some attacks that reduce their ability to recognize faces properly. So, many noisy images mixed with original ones lead to confusion in the results. Various attacks that exploit this weakness affect the face recognition systems such as Fast Gradient Sign Method (FGSM), Deep Fool, and Projected Gradient Descent (PGD). This paper proposes a method to protect the face recognition system against these attacks by distorting images through different attacks, then training the recognition deep network model, specifically Convolutional Neural Network (CNN), using the original and distorted images. Diverse experiments have been conducted using combinations of original and distorted images to test the effectiveness of the system. The system showed an accuracy of 93% using FGSM attack, 97% using deep fool, and 95% using PGD.
In this paper, a new nonlinear dynamic system, new three-dimensional fractional order complex chaotic system, is presented. This new system can display hidden chaotic attractors or self-excited chaotic attractors. The Dynamic behaviors of this system have been considered analytically and numerically. Different means including the equilibria, chaotic attractor phase portraits, the Lyapunov exponent, and the bifurcation diagrams are investigated to show the chaos behavior in this new system. Also, a synchronization technique between two identical new systems has been developed in master- slave configuration. The two identical systems are synchronized quickly. Furthermore, the master-slave synchronization is applied in secure communication scheme based on chaotic masking technique. In the application, it is noted that the message is encrypted and transmitted with high security in the transmitter side, in the other hand the original message has been discovered with high accuracy in the receiver side. The corresponding numerical simulation results proved the efficacy and practicability of the developed synchronization technique and its application
This paper focuses on designing distributed wireless sensor network gateways armed with Intrusion Detection System (IDS). The main contribution of this work is the attempt to insert IDS functionality into the gateway node (UBICOM IP2022 network processor chip) itself. This was achieved by building a light weight signature based IDS based on the famous open source SNORT IDS. Regarding gateway nodes, as they have limited processing and energy constrains, the addition of further tasks (the IDS program) may affects seriously on its performance, so that, the current design takes these constrains into consideration as a priority and use a special protocol to achieve this goal. In order to optimize the performance of the gateway nodes, some of the preprocessing tasks were offloaded from the gateway nodes to a suggested classification and processing server and a new searching algorithm was suggested. Different measures were taken to validate the design procedure and a detailed simulation model was built to discover the behavior of the system in different environments.
Vehicle Ad-hoc Network (VANET) is a type of wireless network that enables communication between vehicles and Road Side Units (RSUs) to improve road safety, traffic efficiency, and service delivery. However, the widespread use of vehicular networks raises serious concerns about users’ privacy and security. Privacy in VANET refers to the protection of personal information and data exchanged between vehicles, RSUs, and other entities. Privacy issues in VANET include unauthorized access to location and speed information, driver and passenger identification, and vehicle tracking. To ensure privacy in VANET, various technologies such as pseudonymization, message authentication, and encryption are employed. When vehicles frequently change their identity to avoid tracking, message authentication ensures messages are received from trusted sources, and encryption is used to prevent unauthorized access to messages. Therefore, researchers have presented various schemes to improve and enhance the privacy efficiency of vehicle networks. This survey article provides an overview of privacy issues as well as an in-depth review of the current state-of-the-art pseudonym-changing tactics and methodologies proposed.
The paper presents a novel approach that merges the abilities of the biological environment with the concept of hierarchical trees to attack a specific stream cipher. The model being presented introduces a systematic method that targets a group of stream ciphers, such as the GCM family, these devices are composed of components that are suitable for the proposed method. A restricted set of binaries for the final key sequence is required to implement this technique as an input. The attacked algorithm comprises feedback shift registers, memories, delays, and so on. The stream ciphers are widely used in modern encryption to secure communication devices, so any attempt to analyze or attack it is of the utmost importance. The results of this method have been confirmed to lead to the destruction of the cipher’s security. Many novelties and contributions of the present work can be summarized as follows: firstly, the key generator’s components are attacked individually, disrupting the cohesion between them. This was not possible previously except in rare cases and under difficult conditions. Secondly, the method of verifying the correct initial values is unrelated to the generator’s operation. Thirdly, the technique applies biological concepts and processes to laboratory test tubes for genetic engineering, it can be said that the prepared model targets a broad class of stream key generators, rather than a single algorithm. The proposed technique requires a specific and deterministic number of final key sequence bits, which are easy to provide. The proposed technique creates a search E -tree in the style of hierarchical clusters, in which the first level containsE nodes. Then each successive level contains the square of E nodes of the number of nodes in the previous level, and the root is composed of the total solution space of the stream key generator and produces the nodes of each level from the intersection of the cluster contents in the test tubes for all clusters in the level above it. The contribution and novelty of the present work is cryptanalyzing and attacking shift register-based stream key generators involves fragmentation. The attacking principle entails disassembling generator components from registers and individually attacking them. DNA logic clustering aids in this process, as the strength of these generators relies on component cohesion. Because the components are cryptanalyzed individually, the time complexity of the attack is equal to O(C2N) , where N is the length of the largest component, and C is a constant.
The problem of outlier detection is one of the most important issues in the field of analysis due to its applicability in several famous problem domains, including intrusion detection, security, banks, fraud detection, and discovery of criminal activities in electronic commerce. Anomaly detection comprises two main approaches: supervised and unsupervised approach. The supervised approach requires pre-defined information, which is defined as the type of outliers, and is difficult to be defined in some applications. Meanwhile, the second approach determines the outliers without human interaction. A review of the unsupervised approach, which shows the main advantages and the limitations considering the studies performed in the supervised approach, is introduced in this paper. This study indicated that the unsupervised approach suffers from determining local and global outlier objects simultaneously as the main problem related to algorithm parameterization. Moreover, most algorithms do not rank or identify the degree of being an outlier or normal objects and required different parameter settings by the research. Examples of such parameters are the radius of neighborhood, number of neighbors within the radius, and number of clusters. A comprehensive and structured overview of a large set of interesting outlier algorithms, which emphasized the outlier detection limitation in the unsupervised approach, can be used as a guideline for researchers who are interested in this field.
Cryptography is one of the technological means to provide security to data being transmitted on information and communication systems. When it is necessary to securely transmit data in limited bandwidth, both compression and encryption must be performed. Researchers have combined compression and encryption together to reduce the overall processing time. In this paper, new partial encryption schemes are proposed to encrypt only part of the compressed image. Soft and hard threshold compression methods are used in the compression step and the Advanced Encryption Standard (AES) cipher is used for the encryption step. The effect of different threshold values on the performance of the proposed schemes are studied. The proposed partial encryption schemes are fast, secure, and do not reduce the compression performance of the underlying selected compression methods.
The reliance on networks and systems has grown rapidly in contemporary times, leading to increased vulnerability to cyber assaults. The Distributed Denial-of-Service (Distributed Denial of Service) attack, a threat that can cause great financial liabilities and reputation damage. To address this problem, Machine Learning (ML) algorithms have gained huge attention, enabling the detection and prevention of DDOS (Distributed Denial of Service) Attacks. In this study, we proposed a novel security mechanism to avoid Distributed Denial of Service attacks. Using an ensemble learning methodology aims to it also can differentiate between normal network traffic and the malicious flood of Distributed Denial of Service attack traffic. The study also evaluates the performance of two well-known ML algorithms, namely, the decision tree and random forest, which were used to execute the proposed method. Tree in defending against Distributed Denial of Service (DDoS) attacks. We test the models using a publicly available dataset called TIME SERIES DATASET FOR DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION. We compare the performance of models using a list of evaluation metrics developing the Model. This step involves fetching the data, preprocessing it, and splitting it into training and testing subgroups, model selection, and validation. When applied to a database of nearly 11,000 time series; in some cases, the proposed approach manifested promising results and reached an Accuracy (ACC) of up to 100 % in the dataset. Ultimately, this proposed method detects and mitigates distributed denial of service. The solution to securing communication systems from this increasing cyber threat is this: preventing attacks from being successful.
The last few years Quadrotor became an important topic, many researches have implemented and tested concerning that topic. Quadrotor also called an unmanned Aerial Vehicle (UAV), it's highly used in many applications like security, civil applications, aid, rescue and a lot of other applications. It’s not a conventional helicopter because of small size, low cost and the ability of vertical and takeoff landing (VTOL). The models kept an eye on quadrotors were presented, the advancement of this new kind of air vehicle is hindered for a very long while because of different reasons, for example, mechanical multifaceted nature, enormous size and weight, and challenges in charge particularly. Just as of late a lot of interests and endeavors have been pulled in on it; a quadrotor has even become a progressively discretionary vehicle for useful application. Quadrotor can be used in variable, different , outdoor and indoor missions; these missions should be implemented with high value of accuracy and quality. In this work two scenarios suggested for different two missions. First mission the quadrotor will be used to reach different goals in the simulated city for different places during one flight using path following algorithm. The second mission will be an indoor arrival mission, during that mission quadrotor will avoid obstacles by using only Pure pursuit algorithm (PPA). To show the benefit of using the new strategy it will compare with a victor field histogram algorithm (VFH) which is used widely in robotics for avoiding obstacles, the comparison will be in terms of reaching time and distance of reaching the goal. The Gazebo Simulator (GS) is used to visualize the movement of the quadrotor. The gazebo has another preferred position it helps to show the motion development of the quadrotor without managing the mathematical model of the quadrotor. The Robotic Operating System (ROS) is used to transfer the data between the MATLAB Simulink program and the Gazebo Simulator. The diversion results show that, the proposed mission techniques win to drive the quarter on the perfect route similarly at the limit with regards to the quadrotor to go without hitting any obstacle in the perfect way.
Kinship (Familial relationships) detection is crucial in many fields and has applications in biometric security, adoption, forensic investigations, and more. It is also essential during wars and natural disasters like earthquakes since it may aid in reunion, missing person searches, establishing emergency contacts, and providing psychological support. The most common method of determining kinship is DNA analysis which is highly accurate. Another approach, which is noninvasive, uses facial photos with computer vision and machine learning algorithms for kinship estimation. Each part of the Human -body has its own embedded information that can be extracted and adopted for identification, verification, or classification of that person. Kinship recognition is based on finding traits that are shared by every family. We investigate the use of hand geometry for kinship detection, which is a new approach. Because of the available hand image Datasets do not contain kinship ground truth; therefore, we created our own dataset. This paper describes the tools, methodology, and details of the collected MKH, which stands for the Mosul Kinship Hand, images dataset. The images of MKH dataset were collected using a mobile phone camera with a suitable setup and consisted of 648 images for 81 individuals from 14 families (8 hand situations per person). This paper also presents the use of this dataset in kinship prediction using machine learning. Google MdiaPipe was used for hand detection, segmentation, and geometrical key points finding. Handcraft feature extraction was used to extract 43 distinctive geometrical features from each image. A neural network classifier was designed and trained to predict kinship, yielding about 93% prediction accuracy. The results of this novel approach demonstrated that the hand possesses biometric characteristics that may be used to establish kinship, and that the suggested method is a promising way as a kinship indicator.
This work implying the design of hiding system that hides a gray scale image into another gray scale image using two-dimensional wavelet packet transform. The proposed hiding scheme uses Wavelet Packet Transform (WPT) to embed data elements of the secret image in different frequency bands of the cover image. The data elements of the secrete image are placed within DWT subspaces after simple treatment in order to reduce its significance on the resulting image and to increase security. The resulting image (the cover image within which the secret image is hidden) is called stego_image. Stego_image is closely related to the cover image and does not show any details of the secret image. The proposed system achieves perfect reconstruction of the secret image. All programs in this work is written by MATLAB 7.
Global agriculture employs central pivot irrigation system(CPIS) as a highly significant method for intelligent irrigation. Cultivating crucial crops like wheat and other strategically important crops that occupy extensive land areas contributes to global food security. The Central Pivot Irrigation System encounters technical issues that result in malfunctions in its automatic control system. These malfunctions occasionally cause damage to the primary pipes and towers that operate the system, resulting in significant material losses for farmers and agricultural crops. Moreover, the repair process is time-consuming. Therefore, to address this issue, this study employed the YOLOv5 models to accurately identify and detect defects in the CPIS machine by determining whether they are in a safe or dangerous state. The dataset that was used in this study was gathered from agricultural areas in Salah al-Din Governorate. The CPIS detection model yielded the following results: the grayscale color system with Yolov5n achieved a 98 % detection rate with accuracy and F1-score values of 0.866. Similarly, Yolov5m achieved a 98 % detection rate with accuracy and F1-score values of 0.804. In the RGB color system, the maximum results achieved with Yolov5n are 97 % for accuracy and 0.812 for F1-score. On the other hand, Yolov5s6 achieves a result of 95 % for accuracy and 0.82 for both F1-score and accuracy. Based on the aforementioned outcome, we can infer that yolov5s6 accurately detects the CPIS in both its safe and dangerous states. Therefore, they can be deployed in a real-time system for CPIS defect monitoring and control systems.
Gait as a biometric can be used to identify subjects at a distance and thus it receives great attention from the research community for security and surveillance applications. One of the challenges that affects gait recognition performance is view variation. Much work has been done to tackle this challenge. However, the majority of the work assumes that gait silhouettes are captured by affine cameras where only the height of silhouettes changes and the difference in viewing angle of silhouettes in one gait cycle is relatively small. In this paper, we analyze the variation in gait recognition performance when using silhouettes from projective cameras and from affine cameras with different distance from the center of a walking path. This is done by using 3D models of walking people in the gallery set and 2D gait silhouettes from independent (single) cameras in the probe set. Different factors that affect matching 3D human models with 2D gait silhouettes from single cameras for view-independent gait recognition are analyzed. In all experiments, we use 258 multi-view sequences belong to 46 subjects from Multi-View Soton gait dataset. We evaluate the matching performance for 12 different views using Gait Energy Image (GEI) as gait features. Then, we analyze the effect of using different camera configurations for 3D model reconstruction, the GEI from cameras with different settings, the upper and lower body parts for recognition and different GEI resolutions. The results illustrate that low recognition performance is achieved when using gait silhouettes from affine cameras while lower recognition performance is obtained when using gait silhouettes from projective cameras.