Department of Information Technology- Masters Degrees

Permanent URI for this collection

Browse

Recent Submissions

  • Item
    An enhanced encryption algorithm for free public wireless networks.
    (Tshwane University of Technology, 2023-03-01) Khosa, Christopher; Dr. DP du Plessis; Dr. TE Mathonsi & Dr. TM Tshilongamulenzhe
    Wireless networks afford numerous benefits for productivity, due to the ease of access to information resources. A network can now be set up and changed more quickly, with less effort, and for less money. However, wireless technology also creates new threats; and alerts the existing risk profile for information security. In Wireless Fidelity (Wi-Fi), security mechanisms such as encryption algorithms play a vital role. A large amount of memory and power is consumed by those algorithms. This research study therefore proposed a computation efficient secure algorithm (CESA) that reduces the high consumption of power and memory to efficiently secure public Wi-Fi networks. The proposed CESA was based on a hash-based message authentication algorithm. A digital signature algorithm (DSA) was accomplished to produce and verify signatures using the secure hash algorithm (SHA). The network simulation 2 (NS-2) tool was used to evaluate the various settings of each algorithm, including key generation time, encryption time, and decryption time. Through the simulation, it was demonstrated that the proposed algorithm CESA outperformed both the EDH and AES algorithms in terms of key generation time, encryption time, and decryption time. To generate the key, the proposed CESA algorithm took up to 59 seconds, while the EDH and AES algorithms took almost 90 seconds. To encrypt the data, the proposed CESA algorithm took about 98 seconds, while EDH and AES algorithms took almost 167 seconds. To decrypt the data, the proposed CESA algorithm took about 80 seconds, while EDH and AES algorithms took almost 160 seconds. Thus, the EDH and AES make CESA more robust against attacks and very rapid in handling encryption and decryption processes.
  • Item
    Implementation of a model to amplify transmission quality of satellite television.
    (Tshwane University of Technology, 2023-03-01) Maja, Lebogang M.; Dr. D.P. du Plessis; Dr. T.E. Mathonsi; Dr. T.M. Tshilongamulenzhe
    One of the various applications of communication satellite technology is the broadcasting of satellite television (TV). Communications satellites are used for marine applications, large-scale telephone connections, business systems, the internet, and broadcasting television programming. In TV broadcasting, satellite communication is the easiest way of transmitting many services. Satellite communication offers a variety of choices across different regions, thereby overcoming the complex infrastructure requirements of terrestrial transmitters for terrestrial networks. Such networks are needed for broadcasting signals throughout a wide-ranging area such as a country or across continents, providing quality digital television viewing. However, Satellite TV broadcasting includes the shortcoming of outage effects caused by rain fade. Such interruptions are brought about by rainy weather, which will immediately cut signal transmission from the transmitter satellite to the receiver dish, preventing customer picture viewing. To ameliorate such a shortcoming, this study designed an algorithm to amplify the transmission quality of Satellite TV. The proposed algorithm reduced outages caused by bad weather conditions such as rain and storms, among others. MATLAB was used to simulate and evaluate the Gau-Satcomm algorithm against ITU-R and SAM algorithms. The experimental evaluation was based on the three-performance metrics that we considered; namely, Bit Error Rate (BER) average, average attenuation, and outage probability. The proposed Gau-Satcomm algorithm, ITU-R algorithm, and SAM algorithm reflected an average BER of 5%, 8%, and 10%, respectively. Additionally, the Gau-Satcomm algorithm, SAM algorithm, and ITU-R algorithm experienced 4%, 9%, and 11% attenuation, respectively. Furthermore, we compared outage probability across three algorithms at frequencies over 10 GHz. The proposed Gau-Satcomm algorithm, the ITU-R algorithm, and the SAM algorithm minimized outages by 10%, 7%, and 5%, respectively. Therefore, the proposed Gau-Satcomm algorithm outperformed these traditional algorithms on average BER, reduced average attenuation, and outage probability.
  • Item
    An enhanced cybersecurity algorithm for the smart grid SCADA System.
    (Tshwane University of Technology, 2023-05-01) Halefose, Kholofelo Hope; Dr. T.E. Mathonsi; Dr. T. Muchenje; Dr. D.P. du Plessis
    Smart Grid development is a global initiative to ensure that utilities provide future systems architecture that will integrate all the processes and systems required for an intelligent electricity network. The Smart Grid is necessary and imminent; and without it, it will be impossible to manage and control modern ways of power generation, transmission, and distribution. Unlike the old traditional power grid in which automation systems were isolated from the corporate networks, the Smart Grid is more prone to cyberattacks, due to the nature of its complexity. In addition to that, the reliance of the Smart Grid on the Supervisory Control and Data Acquisition (SCADA) system for automated control and monitoring increases the vulnerabilities of the Smart Grid to cyber risks, cyber-threats, and cyberattacks. To fully protect the Smart Grid SCADA system communication, the existing Smart Grid SCADA protocols must ensure end-to-end authentication, data integrity, confidentiality, and availability, Denial of Service (DoS) attacks targeting the availability. DoS attacks are considered one of the major threats to the Smart Grid SCADA system, because a successful attack can lead to a blackout. This research study proposed an enhanced cybersecurity algorithm by integrating the N-th degree truncated polynomial ring units (NTRU) algorithm into the Toom-Cook algorithm, to ensure secure end-to-end authentication and communication during data transmission while reducing complexity. The NS-2 simulator was used to simulate, evaluate, and measure the effectiveness of the proposed enhanced cybersecurity algorithm (ECS). The ECS algorithm was compared with the best-known algorithms, namely, the elliptic curve cryptography (ECC) algorithm, and Rivest, Shamir, Adleman (RSA), used for protecting the Smart Grid SCADA System. By comparison with RSA and ECC, the simulation results show that ECS achieved high-speed encryption of 1.4ms and high decryption speed of 2.9ms with the use of minimal computing power. The ECS only sustained a 0.5% packet loss during the launch of a DoS attack, making it suitable for the SCADA system, with real-time constraints and hardware limitations. Furthermore, the ECS addresses the data-integrity, confidentiality, availability, and authentication issues of the Smart Grid SCADA system.
  • Item
    An enhanced encryption algorithm for free public wireless networks.
    (Tshwane University of Technology, 2023-03-01) Khosa, Christopher; Dr. DP du Plessis; Dr. TE Mathonsi; Dr. T M Tshilongamulenzhe
    Wireless networks afford numerous benefits for productivity, due to the ease of access to information resources. A network can now be set up and changed more quickly, with less effort, and for less money. However, wireless technology also creates new threats; and alerts the existing risk profile for information security. In Wireless Fidelity (Wi-Fi), security mechanisms such as encryption algorithms play a vital role. A large amount of memory and power is consumed by those algorithms. This research study therefore proposed a computation efficient secure algorithm (CESA) that reduces the high consumption of power and memory to efficiently secure public Wi-Fi networks. The proposed CESA was based on a hash-based message authentication algorithm. A digital signature algorithm (DSA) was accomplished to produce and verify signatures using the secure hash algorithm (SHA). The network simulation 2 (NS-2) tool was used to evaluate the various settings of each algorithm, including key generation time, encryption time, and decryption time. Through the simulation, it was demonstrated that the proposed algorithm CESA outperformed both the EDH and AES algorithms in terms of key generation time, encryption time, and decryption time. To generate the key, the proposed CESA algorithm took up to 59 seconds, while the EDH and AES algorithms took almost 90 seconds. To encrypt the data, the proposed CESA algorithm took about 98 seconds, while EDH and AES algorithms took almost 167 seconds. To decrypt the data, the proposed CESA algorithm took about 80 seconds, while EDH and AES algorithms took almost 160 seconds. Thus, the EDH and AES make CESA more robust against attacks and very rapid in handling encryption and decryption processes.