• Home
  • Vahid Khajehvand
  • OpenAccess
    • List of Articles Vahid Khajehvand

      • Open Access Article

        1 - SMAK-IOV: Secure Mutual Authentication Scheme and Key Exchange Protocol in Fog Based IoV
        Yashar Salami Vahid Khajehvand
        Internet of Vehicles (IOV) is a section of the Internet of Things (IoT) which makes road transportation smart and provides security for the passengers traveling along the roads. Fog computation can be considered as a complement for IOV because it is close to the user an More
        Internet of Vehicles (IOV) is a section of the Internet of Things (IoT) which makes road transportation smart and provides security for the passengers traveling along the roads. Fog computation can be considered as a complement for IOV because it is close to the user and can communicate with Road Side Units (RSU) and process information with low latency. IOV employs a wireless network for message exchange which is a security flaw and an opportunity for the adversaries since that can modify the transmitted data. Thus, data authentication between the transmitter and the receiver has become a challenge in this context. We propose a secure mutual authentication protocol with the ability to key exchange in this paper, which does not use the hash function. We compared this design with other protocols in terms of security requirements and communication and processing costs. To the security analysis of the proposed Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is used. The results show that the proposed protocol is more resistant to other methods of active and passive attacks but Computation and communication costs have increased. Manuscript profile
      • Open Access Article

        2 - A MAPE-K Loop Based Model for Virtual Machine Consolidation in Cloud Data Centers
        Negin Najafizadegan Eslam Nazemi Vahid Khajehvand
        Today, with the rise of cloud data centers, power consumption has increased and cloud infrastructure management has become more complex. On the other hand, meeting the needs of cloud users is an important goal in the cloud infrastructure. To solve such problems, an auto More
        Today, with the rise of cloud data centers, power consumption has increased and cloud infrastructure management has become more complex. On the other hand, meeting the needs of cloud users is an important goal in the cloud infrastructure. To solve such problems, an autonomous model with predictive capability is needed to do virtual machine consolidation at runtime effectively. In fact, using the feedback system of autonomous systems can make this process simpler and more optimized. The goal of this research is to propose a cloud resource management model that makes the virtual machine consolidation process autonomous, and by using a prediction method compromises between service level agreement violations and energy consumption reduction. In this research, an autonomous model is presented which detects overloaded servers in the analysis phase by a prediction algorithm. Also, at the planning phase, a multi heuristic algorithm based on learning automata is proposed to find proper servers for virtual machine placement. Cloudsim version 3.0.3 was used to evaluate the proposed model. The results show that the proposed model has reduced averagely the service level agreement violations, energy and migration counts by 67.08%, 11.61% and 70.64% respectively, compared to other methods. Manuscript profile
      • Open Access Article

        3 - Cryptographic Algorithms: A Review of the Literature, Weaknesses and Open Challenges
        Yashar Salami Vahid Khajevand Esmaeil Zeinali
        Information security has become an important issue in the modern world due to its increasing popularity in Internet commerce and communication technologies such as the Internet of Things. Future media actors are considered a threat to security. Therefore, the need to us More
        Information security has become an important issue in the modern world due to its increasing popularity in Internet commerce and communication technologies such as the Internet of Things. Future media actors are considered a threat to security. Therefore, the need to use different levels of information security in different fields is more needed. Advanced information security methods are vital to prevent this type of threat. Cryptography is a valuable and efficient component for the safe transfer or storage of information in the cyber world. Familiarity with all types of encryption models is an essential need for cybersecurity experts. This paper separates Cryptographic algorithms into symmetric (SYM) and asymmetric (ASYM) categories based on the type of cryptographic structure. SYM algorithms mostly use the Feistel network (FN) structure, Substitution-Permutation Network (SPN), and the ASYM algorithms follow the mathematical structures. Based on this, we examined different encryption methods in terms of performance and detailed comparison of key size, block size, and the number of rounds. In continuation of the weakness of each algorithm against attacks and open challenges in each category, to study more is provided. Manuscript profile