• Home
  • Vahid Khajehvand

    List of Articles Vahid Khajehvand


  • Article

    1 - SMAK-IOV: Secure Mutual Authentication Scheme and Key Exchange Protocol in Fog Based IoV
    Journal of Computer & Robotics , Issue 1 , Year , Winter 2020
    Internet of Vehicles (IOV) is a section of the Internet of Things (IoT) which makes road transportation smart and provides security for the passengers traveling along the roads. Fog computation can be considered as a complement for IOV because it is close to the user an More
    Internet of Vehicles (IOV) is a section of the Internet of Things (IoT) which makes road transportation smart and provides security for the passengers traveling along the roads. Fog computation can be considered as a complement for IOV because it is close to the user and can communicate with Road Side Units (RSU) and process information with low latency. IOV employs a wireless network for message exchange which is a security flaw and an opportunity for the adversaries since that can modify the transmitted data. Thus, data authentication between the transmitter and the receiver has become a challenge in this context. We propose a secure mutual authentication protocol with the ability to key exchange in this paper, which does not use the hash function. We compared this design with other protocols in terms of security requirements and communication and processing costs. To the security analysis of the proposed Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is used. The results show that the proposed protocol is more resistant to other methods of active and passive attacks but Computation and communication costs have increased. Manuscript profile

  • Article

    2 - A MAPE-K Loop Based Model for Virtual Machine Consolidation in Cloud Data Centers
    Journal of Computer & Robotics , Issue 1 , Year , Spring 2020
    Today, with the rise of cloud data centers, power consumption has increased and cloud infrastructure management has become more complex. On the other hand, meeting the needs of cloud users is an important goal in the cloud infrastructure. To solve such problems, an auto More
    Today, with the rise of cloud data centers, power consumption has increased and cloud infrastructure management has become more complex. On the other hand, meeting the needs of cloud users is an important goal in the cloud infrastructure. To solve such problems, an autonomous model with predictive capability is needed to do virtual machine consolidation at runtime effectively. In fact, using the feedback system of autonomous systems can make this process simpler and more optimized. The goal of this research is to propose a cloud resource management model that makes the virtual machine consolidation process autonomous, and by using a prediction method compromises between service level agreement violations and energy consumption reduction. In this research, an autonomous model is presented which detects overloaded servers in the analysis phase by a prediction algorithm. Also, at the planning phase, a multi heuristic algorithm based on learning automata is proposed to find proper servers for virtual machine placement. Cloudsim version 3.0.3 was used to evaluate the proposed model. The results show that the proposed model has reduced averagely the service level agreement violations, energy and migration counts by 67.08%, 11.61% and 70.64% respectively, compared to other methods. Manuscript profile

  • Article

    3 - Cryptographic Algorithms: A Review of the Literature, Weaknesses and Open Challenges
    Journal of Computer & Robotics , Issue 1 , Year , Spring 2023
    Information security has become an important issue in the modern world due to its increasing popularity in Internet commerce and communication technologies such as the Internet of Things. Future media actors are considered a threat to security. Therefore, the need to us More
    Information security has become an important issue in the modern world due to its increasing popularity in Internet commerce and communication technologies such as the Internet of Things. Future media actors are considered a threat to security. Therefore, the need to use different levels of information security in different fields is more needed. Advanced information security methods are vital to prevent this type of threat. Cryptography is a valuable and efficient component for the safe transfer or storage of information in the cyber world. Familiarity with all types of encryption models is an essential need for cybersecurity experts. This paper separates Cryptographic algorithms into symmetric (SYM) and asymmetric (ASYM) categories based on the type of cryptographic structure. SYM algorithms mostly use the Feistel network (FN) structure, Substitution-Permutation Network (SPN), and the ASYM algorithms follow the mathematical structures. Based on this, we examined different encryption methods in terms of performance and detailed comparison of key size, block size, and the number of rounds. In continuation of the weakness of each algorithm against attacks and open challenges in each category, to study more is provided. Manuscript profile

  • Article

    4 - Blockchain-Based Internet of Vehicles in Green Smart City: Applications and Challenges and Solutions
    Anthropogenic Pollution , Issue 1 , Year , Winter 2023
    The ever-increasing growth of the population and their concentration in cities has destructive and often catastrophic effects on natural habitats and human life and exposes cities to painful crises, including environmental and human destruction, which has caused humans More
    The ever-increasing growth of the population and their concentration in cities has destructive and often catastrophic effects on natural habitats and human life and exposes cities to painful crises, including environmental and human destruction, which has caused humans to turn to technologies emerging to reduce environmental risks. Blockchain is a new and revolutionary technology in the world's management systems. The blockchain network allows individuals, governments, and organizations to implement any transaction securely on this network. With the Internet of Things expansion and the emergence of the Internet of Vehicles, green smart cities, and integration of these technologies with the blockchain network, human life quality has increased. However, new technical and environmental challenges have emerged by combining IoV applications with the blockchain network in expanding green smart cities. This article examines the concepts and advantages of the blockchain network, and then the applications of IoV in green smart cities are analyzed. Then the technical and environmental challenges of IoV are discussed, and finally, solutions for the environmental and technical challenges are presented. Manuscript profile