Open Science Research Excellence

M Junaid

Publications

4

Publications

4
7162
Vulnerabilities of IEEE 802.11i Wireless LAN CCMP Protocol
Abstract:

IEEE has recently incorporated CCMP protocol to provide robust security to IEEE 802.11 wireless LANs. It is found that CCMP has been designed with a weak nonce construction and transmission mechanism, which leads to the exposure of initial counter value. This weak construction of nonce renders the protocol vulnerable to attacks by intruders. This paper presents how the initial counter can be pre-computed by the intruder. This vulnerability of counter block value leads to pre-computation attack on the counter mode encryption of CCMP. The failure of the counter mode will result in the collapse of the whole security mechanism of 802.11 WLAN.

Keywords:
Information Security, Cryptography, IEEE 802.11i, Computer security, Wireless LAN
3
14906
Viscosity Reduction and Upgrading of Athabasca Oilsands Bitumen by Natural Zeolite Cracking
Abstract:
Oilsands bitumen is an extremely important source of energy for North America. However, due to the presence of large molecules such as asphaltenes, the density and viscosity of the bitumen recovered from these sands are much higher than those of conventional crude oil. As a result the extracted bitumen has to be diluted with expensive solvents, or thermochemically upgraded in large, capital-intensive conventional upgrading facilities prior to pipeline transport. This study demonstrates that globally abundant natural zeolites such as clinoptilolite from Saint Clouds, New Mexico and Ca-chabazite from Bowie, Arizona can be used as very effective reagents for cracking and visbreaking of oilsands bitumen. Natural zeolite cracked oilsands bitumen products are highly recoverable (up to ~ 83%) using light hydrocarbons such as pentane, which indicates substantial conversion of heavier fractions to lighter components. The resultant liquid products are much less viscous, and have lighter product distribution compared to those produced from pure thermal treatment. These natural minerals impart similar effect on industrially extracted Athabasca bitumen.
Keywords:
Natural Zeolites, Oilsands Bitumen, Cracking,Viscosity Reduction, Upgrading.
2
10006152
Electrochemical Performance of Al-Mn2O3 Based Electrode Materials
Abstract:

Manganese oxide is being recently used as electrode material for rechargeable batteries. In this study, Al incorporated Mn2O3 compositions were synthesized to study the effect of Al doping on electrochemical performance of host material. Structural studies were carried out using X-ray diffraction analysis to confirm the phase stability and explore the lattice parameters, crystallite size, lattice strain, density and cell volume. Morphology and composition were analyzed using field emission scanning electron microscope and energy dispersive X-ray spectroscopy, respectively. Dynamic light scattering analysis was performed to observe the average particle size of the compositions. FTIR measurements exhibit the O-Al-O and O-Mn-O and Al-O bonding and with increasing the concentration of Al, the vibrational peaks of Mn-O become sharper. An enhanced electrochemical performance was observed in compositions with higher Al content.

Keywords:
Mn2O3, electrode materials, energy storage and conversion, electrochemical performance.
1
10007267
Secure Text Steganography for Microsoft Word Document
Abstract:

Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.

Keywords:
Hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography.