Indonesi
an
Journa
l
of El
ect
ri
cal Engineer
ing
an
d
Comp
ut
er
Scie
nce
Vo
l.
12
,
No.
3
,
Decem
ber
201
8
, p
p.
1187
~
1194
IS
S
N: 25
02
-
4752, DO
I: 10
.11
5
91/i
j
eecs
.v1
2
.i
3
.pp
1187
-
1194
1187
Journ
al h
om
e
page
:
http:
//
ia
es
core.c
om/j
ourn
als/i
ndex.
ph
p/ij
eecs
Developi
ng an En
hanced High
-
Sp
ee
d
Key
Tra
nsmi
ssion
(EHSKT
) Techni
qu
e to
A
vo
id F
ra
ud
Ac
ti
vity in E
-
Commer
ce
A.
B.
H
aj
ir
a
Be
,
R
.Bal
as
ubr
am
an
ia
n
Depa
rtment
o
f
C
om
pute
r
Applica
ti
ons,
Karp
aga Vinay
ag
a
Col
le
g
e
of
Engi
n
ee
rin
g
a
nd
Technol
og
y
,
Madura
ntha
g
am
,
India
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
Ju
l
30, 2
018
Re
vised
Sep
2
4,
2018
Accepte
d
O
ct
1
1
, 201
8
E
-
comm
erc
e
is
a
n
emergi
ng
and
conve
rge
n
ce
of
num
ero
us
m
ai
n
i
nform
at
ion
te
chno
logi
es
in
b
usiness
pra
ct
i
ce
s
.
E
-
comm
erc
e
is
an
onli
n
e
websit
e
where
the
sale
or
bu
y
s
of
m
erc
handi
se
o
rd
ere
d
el
e
ct
ron
ic
a
l
l
y
.
I
t giv
es
a
sim
ple
appr
oac
h
to
sell
i
te
m
s
to
customers.
In
th
e
applications
suffers
p
a
y
m
en
ts
issues;
fo
r
exa
m
ple
,
elec
t
ro
nic
tr
ansa
ctions
uti
lizing
Visas
o
r
debi
t
ca
rds,
ne
t
banki
ng
,
Pa
y
P
al
or
di
ffe
ren
t
t
okens
hav
e
m
ore
consist
ency
prob
le
m
s
and
ar
e
a
t
expa
nded
h
azard
from
bei
ng
foc
used
tha
n
di
ffe
r
ent
sit
es
as
they
suffer
m
ore
outc
om
es
if
th
er
e
is
informa
ti
on
loss
or
m
odific
at
ion
.
An
Enh
a
nce
d
High
-
Speed
Ke
y
Tr
a
nsm
ission
(EHS
KT)
Techni
qu
e
is
proposed
for
sec
ur
e
and
eff
icient
pa
y
m
en
t
tr
ansa
c
ti
ons
an
d
avoi
ds
fra
ud
activi
t
y
.
The
propo
sed
s
y
st
em
works
base
d
UU
ID
(Unive
rsal
l
y
Unique
Ide
n
ti
f
ier)
to
gene
r
ate
a
u
nique
id
fo
r
pa
y
m
en
t
tra
nsa
ct
ions.
Propos
e
d
s
y
stem
generat
es
Unique
i
d
have
a
combinat
ion
of
num
ber
,
a
lpha
b
e
ts,
&
spec
ial
ch
ara
c
te
r
to
avoi
d
fra
ud
users.
The
proposed
design
red
uc
es
the
en
cr
y
pt
ion
,
decr
y
pti
on
tim
e
and
k
e
y
complexi
t
y
.
Ba
sed
on
Exp
erim
ent
al
ev
al
ua
tions
,
proposed
m
et
hodolo
g
y
red
uce
s
4
.
73
AD
(Avera
ge De
lay), 23.91
EC (En
e
rg
y
Consu
m
pti
o
n),
0.
95
ET
(Enc
r
y
pt
ion
Tim
e),
0.
85
DT
(Dec
r
y
p
ti
on
T
ime)
and
impr
oves
59.
8%
(Thr
oughput) co
m
par
ed
tha
n
ex
i
sting
m
et
hodolo
gie
s
.
Ke
yw
or
ds:
Encr
y
ption a
nd D
ec
ryptio
n
En
han
ce
d Hig
h
-
S
pee
d Key
Transm
issi
on
(EHS
KT)
Tech
nique
Key Com
plexity
UUID (
U
niv
er
sal
ly
U
nique
Id
e
ntifie
r)
Copyright
©
201
8
Instit
ut
e
o
f Ad
vanc
ed
Engi
n
ee
r
ing
and
S
cienc
e
.
Al
l
rights re
serv
ed.
Corres
pond
in
g
Aut
h
or
:
A.
B.
Ha
j
ira Be
,
Dep
a
rtm
ent o
f C
om
pu
te
r
A
pp
li
cat
ion
s
,
Karpa
ga Vinay
aga C
ollege
of
En
gin
eeri
ng a
nd
Tec
hnol
og
y
,
Ma
duran
t
hag
a
m
, Ta
m
il
N
adu
.
Em
a
il
:
haj
irabe
@g
m
ai
l.co
m
1.
INTROD
U
CTION
E
-
com
m
erce is an
em
erg
ing
a
nd
c
onve
r
gen
c
e tec
hnologies
in busines
s pra
ct
ic
es. E
-
com
m
erce b
uild
s
ever
y
day
li
fe
quic
kly.
E
-
c
omm
erce
is
a
n
on
li
ne
we
bs
it
e
w
her
e
the
sel
li
ng
or
bu
yi
ng
of
m
erch
an
dise
order
e
d
el
ect
ro
nical
ly
.
It
giv
es
a
sim
p
le
ap
proac
h
t
o
sel
l
it
em
s
to
custom
ers.
H
owever,
t
her
e
is
a
lot
of
c
om
petitio
n
a
m
on
g
dif
fer
e
nt
com
m
ercial
web
sit
es
sit
es.
At
the
poi
nt
w
hen
t
he
us
er
i
nt
eracts
on
an
e
-
com
m
erce
web
sit
e,
they
hope
t
o
di
sco
ver
w
hat
t
he
y
are
searc
hing
f
or
r
a
pid
ly
and
ea
sil
y.
Addi
ti
on
al
ly
,
us
e
rs
don'
t
know
a
bo
ut
the
br
a
nds
or the a
ct
ual it
e
m
s they wan
t t
o bu
y.
They
hav
e
a c
om
pr
ehen
sive
id
ea o
f wh
at
t
hey n
ee
d
to
pu
rch
a
se.
1.1
.
Pr
ob
le
m
E
-
com
m
erce
app
li
cat
io
ns
s
uffer
for
paym
en
ts
prob
le
m
s;
for
exam
ple,
el
ect
ronic
transacti
on
s
util
iz
ing
Visas
or
de
bit
car
ds
,
net
ba
nk
i
ng,
PayPal
or
diff
e
re
nt
to
kens
ha
ve
m
ore
c
on
sist
e
ncy
pro
blem
s
and
are
a
t
exp
a
nded
haza
rd
f
ro
m
bein
g
fo
c
us
e
d
t
han
di
ff
ere
nt
s
it
es
as
they
s
uffe
r
m
or
e
outc
om
es
i
f
the
re
is
in
f
orm
at
ion
loss
or
m
od
ifi
cat
ion
.
Alth
ou
gh,
t
he
gove
r
nm
ent
of
India
has
ta
ke
n
posit
ive
m
easur
es
to
e
ncou
rag
e
t
he
fast
dev
el
op
m
ent
of
E
-
c
omm
erce
by
the
intr
oduction
of
cy
be
r
la
ws,
decr
ea
s
ing
ta
xe
s
on
the
f
ram
ewo
r
k
and
s
o
forth.
Pe
op
le
s
are
he
sit
at
ing
t
o
purch
a
se
on
l
ines
beca
us
e
of
co
nfusions
on
secur
it
y
an
d i
nst
alm
ent
te
chn
iqu
e
s.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
12
, N
o.
3
,
Dece
m
ber
2
01
8
:
1187
–
119
4
1188
Ther
e
a
re
a
ddit
ion
al
ly
fa
kes
occurri
ng
in
c
r
edit
car
ds
/de
bi
t
car
ds
w
hich
can
ha
pp
e
n
to
anyo
ne
duri
ng
on
li
ne
purc
hasin
g.
1.2
.
B
ackgro
un
d
In
Ra
j
a
n
et
al
[
1]
ex
posed
the
rail
way
ti
cket
reservat
io
n
sys
tem
was
co
nge
ste
d
on
e
w
her
e
the
qu
e
ue
for
ti
cket
rese
rv
at
io
n
i
ncr
ea
ses
an
d
not
a
ble
to
cat
c
h
t
rain
s
oone
r.
Dass
[2
]
s
ugge
ste
d
to
au
dits
I
nd
ia
n
gove
rn
m
ent
ini
ti
al
iz
ed
uniq
ue
identit
y
(
ID)
to
al
l
the
ci
ti
zens
of
I
ndia
w
hich
wa
s
a
global
I
T
pro
j
ect
t
o
pr
ov
i
de
auth
or
it
y.
Ya
da
v
[3
]
desc
ribe
d
t
he
uniq
ue
i
de
ntit
y
innov
at
e
d
t
o
reduce
po
ver
ty
iss
ues,
in
crease
t
he
ec
onom
y,
avo
i
ds
f
orge
identit
ie
s
wh
ic
h
em
erg
e
d
pro
cess
in
de
velo
ping
c
ou
ntries
li
ke
I
nd
ia
2
nd
place
in
po
pula
ti
on.
Chan
der
&
K
us
h
[4
]
sug
ges
te
d
t
o
a
gathe
r
ing
of
pe
ople
'
s
detai
ls
m
igh
t
be
secu
re
d
i
n
a
way
to
a
vo
i
d
un
-
auth
or
iz
e
d
pe
rs
on
acce
ssi
ng
s
om
eon
e'
s
inf
orm
at
ion
was
a
vi
olati
on
,
the
s
oft
war
e
t
oo
ls
us
ed
t
o
hold
the
s
e
ki
nds
of
sit
uations
w
ere
car
ried
out
by
adm
inist
rator
s
kee
p
on
t
r
ackin
g
netw
ork
at
ta
cke
rs
f
or
th
e
sec
ur
it
y
of
data
.
Jada
v
e
t
al
[
5]
co
ns
ide
re
d
a
bout
cu
rr
e
nt
vo
ti
ng
iss
ues
in
the
governa
nc
e
of
India
w
he
re
cl
ou
d
c
ompu
ti
ng
te
chnolo
gy
wa
s
pro
vid
i
ng
e
-
voti
ng
procedu
r
e
that
a
vo
i
ded
f
or
ge
i
den
ti
ti
es
as
well
as
sec
uri
ng
proce
ss
of
li
nk
in
g
Aadhaa
r
car
d f
or e
-
vo
ti
ng
syst
e
m
.
Ba
huguna
[
6]
r
eviewe
d
on
in
f
or
m
at
ion
an
d
s
ecur
it
y
of
bro
w
sing
ap
plica
ti
on
s
wh
ic
h
s
houl
d
be
sec
ur
e
d
and
sho
uld
not
al
low
a
ny
othe
r
virus
or
m
al
war
e
i
nto
personal
com
pu
te
rs
of
us
e
rs.
Va
rshney
&
G
oy
al
[7
]
insp
ect
e
d
a
s
olu
ti
on
f
or
m
on
e
y
transf
e
r
in
r
ural
an
d
urban
a
reas
w
he
re
people
do
no
t
know
ab
out
onli
ne
fun
d
trans
ferrin
g,
t
he
i
m
ple
m
ented
fr
am
ewo
r
k
e
nri
che
d
wit
h
hi
gh sec
ur
it
y o
f 3
-
le
vel au
the
ntic
at
ion
all
ows th
e u
se
r
to
e
nter
UID,
on
e
-
ti
m
e
passw
ord
a
nd
fi
ngerprint
rec
ogni
ti
on
.
C
hatte
rj
e
e
&
Nath
[8
]
s
urveyed
Indian
rail
way
syst
e
m
was
a
com
plica
te
d
ta
sk
t
o
m
anag
e
a
la
rg
e
am
ou
nt
of
data,
t
he
r
eserv
e
d
an
d
un
-
reserve
d
tra
velle
r
s
m
assivel
y
hig
h
in
I
ndia
w
herea
s
seve
nteen
m
illi
on
pe
ople
tra
vel
per
day
.
A
na
nd
Sh
e
nd
e
et
al
[9
]
c
onveye
d
NoSQL
databa
se
s
olu
ti
on
for
m
ai
ntaining
m
i
ll
ion
s
of
U
I
D
de
ta
il
s
secur
el
y
and
ret
rieve
it
with
m
ini
m
u
m
tim
e.
Hende
rson
-
sel
le
rs
et
al
[
10]
e
xam
ined
the
el
ect
ronic
sig
nat
ur
es
o
f
cl
ie
nts g
at
he
red on
a s
tora
ge
a
rea of cen
tral
gove
rn
m
ent
w
hich
e
nsure
d
a
uth
e
ntica
ti
on
s
erv
ic
e
t
o
av
oid
un
-
a
uthorize
d
at
ta
cker
acce
ss
ing
si
gn
at
ur
e
r
ecord
s
to forge
on
pr
i
vate asset
s
without a
ny kn
owle
dg
e.
Akhile
sh
&
S
riniv
asa
n
[
11
]
fo
c
us
e
d
t
he
Indian
eco
no
m
ic
m
ark
et
s
of
r
ur
al
a
r
eas
w
her
e
e
ve
ry
te
chnolo
gy
de
pends
on
t
he
m
ark
et
er.
T
he
agenda
was
ta
king
in
novativ
e
te
chnolo
gy
awar
e
ness
to
t
he
interi
or
of v
il
la
ges
, m
ou
ntain
ar
eas
for
le
ar
ning
n
e
w t
echnolo
gies
on t
he
m
ark
et
. UI
DAI
[
12
]
a
na
ly
zed th
e
im
p
or
ta
nc
e
of
Aa
dh
aa
r
car
d
in
Indian
go
vernm
ent
to
re
du
ce
pove
rty
,
avo
i
d
f
orge
i
de
ntit
ie
s
and
inc
r
ease
eco
no
m
y
wh
ic
h
ens
ur
es
ef
fici
ent
in
sec
ur
i
ng
public
in
f
or
m
a
ti
on
on
sec
ure
d
data
-
ce
nter
a
nd
in
novate
d
f
or
f
uture
de
velop
m
ent
of
the
c
ountry.
The
co
nf
i
de
ntial
awar
e
ness
base
d
on
crypt
oan
al
ysi
s
for
t
wo
fact
or
a
uthe
ntica
ti
on
proc
ess
i
s
pr
ese
nted
by
[
13]
.
T
he
com
pari
so
n
of
va
rio
us
crypto
an
al
yse
s
pr
ocedur
e
s
a
r
e
disc
us
se
d.
I
n
[14],
t
her
e
are
thre
e
cat
egories
of
c
rypto
gr
a
phic
al
gorithm
s.
They
are
as
f
ollows:
Has
h
al
gorith
m
s,
in
w
hich
ha
sh
in
g
f
un
ct
io
n
s
a
r
e
us
e
d
to
m
ap
da
ta
of
ra
ndom
or
prede
fine
d
si
zes.
Sym
m
et
ri
c
key
al
gorith
m
s,
the
sa
m
e
c
rypto
gr
a
phic
ke
ys
are
us
e
d
f
or
e
ncr
y
ption
of
plain
t
ext
in
t
he
tra
nsm
itter
side
a
nd
dec
ryptio
n
of
ci
ph
e
r
te
xt
i
n
t
he
receive
r
sid
e.
T
he
keys
m
ay
either
be
ide
ntica
l
o
r
s
om
e
si
m
ple
trans
form
ations
involve
d
bet
ween
tra
ns
m
i
tter
an
d
receive
r
sides.
An integ
rated
appr
oach com
bin
ing ra
ndom
key
g
ene
rati
on a
nd ell
ipti
c curv
er cr
y
ptogra
ph
y i
s d
isc
usse
d [
15
]
.
1.3
.
O
bj
ec
tiv
es:
The pa
per
obje
ct
ives are f
ollo
wing as:
a)
To
de
vel
op
a
n
Enh
a
nce
d
Hi
gh
-
S
pee
d
Key
Tran
sm
issi
on
(EHSKT
)
Te
chn
i
qu
e
f
or
se
cur
e
a
nd
eff
ic
i
ent
paym
ent trans
a
ct
ion
s a
nd a
vo
i
ds
fr
a
ud acti
vity
.
b)
To
a
pply
pr
i
va
cy
m
echan
ism
to m
ai
ntain trad
ers
&
c
us
t
ome
r
c
on
te
nt prof
il
e
m
anag
em
ent
c)
To desig
n
e
ff
e
ct
ive & s
ec
ure
inf
or
m
at
ion
ret
rieval in
E
-
c
om
m
erce f
or tra
der
s
and a
s
well
as cu
st
om
ers.
d)
To
m
ini
m
iz
e
t
he
e
ncr
y
ptio
n
and
decr
ypti
on
tim
e,
aver
a
ge
delay
,
ene
rg
y
co
nsum
ption
&
im
pr
ov
e
th
e
su
ccess
r
at
e
of
pro
po
se
d
m
et
ho
d com
par
e t
ha
n
e
xisti
ng app
ro
ac
hes
2.
METHO
D
In
t
he
sect
io
n
i
ll
us
trat
es
the
pro
posed
m
et
ho
do
l
og
y
detai
ls,
Im
ple
m
entation
pr
e
-
proce
ssin
g
ste
ps,
a
nd
i
m
ple
m
ented
al
gorithm
detai
ls
that
pro
vid
es
s
ecur
e
a
nd
ef
fici
ent
paym
ent
transacti
ons
a
nd
a
vo
i
ds
f
ra
ud
act
i
vity
and
m
ini
m
iz
es
the
ave
ra
ge
delay
,
enc
ryptio
n
tim
e,
decr
ypti
on
ti
m
e,
ener
gy
consum
ption
a
nd
key
c
om
plexiti
es
and
im
pr
ove
thr
ough
pu
t.
Fi
gure
1
dem
onstrat
es
the
w
orki
ng
pr
i
ncipl
e
of
the
pro
pose
d
al
gorith
m
with
i
m
ple
m
entat
io
n
processi
ng
s
te
ps
a
nd
m
at
h
e
m
at
ic
al
evaluati
on
detai
ls.
The
pr
e
-
proce
ssing
im
ple
m
e
ntati
on
ste
ps
a
re
e
xp
l
ai
ned
belo
w
i
n
detai
ls.
The
resea
rch
ai
m
s
to
desig
n
a
Web
-
based
se
cur
e
f
ram
ewo
r
k
f
or
a
n
En
han
ce
d
High
-
S
pee
d
Key
Transm
issi
on
(
EHSKT)
Tec
hniq
ue
is
pro
po
sed
for
s
ecu
re
and
ef
fici
ent
pa
ym
ent
transacti
ons
an
d
a
voids
f
raud
act
ivit
y.
In
the
current
sce
nar
i
o,
E
-
s
hoppin
g
is
ra
pid
ly
goin
g
to
i
ncr
ea
se
da
y
-
day.
The
pro
posed
fr
am
ewo
r
k
ta
ke
s
care
t
he
pr
i
vacy
of
t
he
use
r,
tra
de
r,
tra
de
r
in
form
at
ion
and
paym
ent
proces
s.
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
Develo
ping
an
En
hance
d Hig
h
-
Speed
Key T
ra
nsmissi
on (EHS
KT)
Techni
qu
e
…
(
A.B.
H
aj
ira Be
)
1189
The
te
ch
nique
al
so
de
dicat
es
to
offe
r
ef
fecti
ve
sm
art
way
pr
i
vacy
to
av
oi
d
the
c
om
plexity
of
ap
plica
ti
on
s
&
bur
den
of
c
us
t
om
ers.
The
propose
d
syst
em
works
base
d
UUID
(
Un
i
versal
ly
Un
iq
ue
I
den
ti
fier
)
to
ge
ner
at
e
a
un
i
qu
e
i
d
f
or
paym
ent
trans
act
ion
s.
P
r
opose
d
syst
em
gen
erates.
U
niqu
e
id
has
a
co
m
bin
at
ion
of
nu
m
ber
,
al
ph
a
bets,
&
s
pe
ci
al
char
act
er
to
av
oid
fr
a
u
d
us
ers
.
I
n
the
te
chn
i
qu
e
pro
vide
s
facil
it
y
to
us
er
f
or
util
iz
ing
m
ul
ti
-
bankin
g
acc
ou
nt
tra
ns
act
io
n
a
t
sing
le
place.
The
pro
posed
s
yst
e
m
hig
hly
de
dicat
ed
t
o
a
voiding
f
raud
e
nt
ry
an
d
u
n
-
a
uthorized
us
ers
.
The
secr
et
key
is
us
e
d t
o
ref
le
ct
t
he a
c
cess
m
echan
is
m
s
so
that
the
auth
or
iz
e
d
us
e
r
can
be
able
to
validat
e
the
tra
ns
act
io
n
if
an
d
on
ly
if
t
he
tra
ns
act
io
n
at
tribu
te
s
to
f
ulfill
the
crit
eria
of
se
cret
key
acce
ss.
Figure
1.
Wo
r
ki
ng
Pr
i
nciple
of the
Pro
posed
Algorithm
2.1
.
Im
plem
e
nt
ati
on Pre
-
pr
ocessin
g
S
teps
2.1.1
Ad
mi
n
Module
In
t
he
adm
in
m
od
ule,
ad
ding
the
ne
w
pr
oducts
,
di
ff
e
rent
kinds
of
pro
du
ct
s
a
nd
w
ha
t
are
al
l
the
pro
du
ct
s
offe
r
ed
i
n
t
hat
st
ore.
T
he
adm
in
changes
the
products
an
d
del
et
es
the
pr
oduc
ts,
a
nd
it
m
ain
ta
ins
ever
yt
hi
ng d
ay
b
y
day. T
he
a
dm
in can
m
anag
e the
or
der
i
nfor
m
at
ion
and c
li
ent infor
m
at
i
on.
2.1.2 Se
archin
g
Pr
ocess
In
t
he
m
od
ule
,
the
cl
ie
nt
will
per
m
it
to
searc
h
the
sho
pp
i
ng
store
pro
duct
s
befor
e
lo
gin
.
It
disp
la
ys
t
he
nam
e
and
oth
e
r
relat
ed
data
con
ce
r
ning
the
on
li
ne
s
hoppi
ng
st
or
e
a
nd
w
hen
t
he
cl
ie
nts
choose
the
or
der
i
ng
cho
ic
e i
n orde
r
ing
segm
ent, a
nd it
il
lustrate
s the c
rite
ria of
exh
i
biti
ng
t
he pr
oducts.
2.1.3
User
Aut
hent
ic
at
io
n
Lo
gin
:
The
cl
i
ent
will
be
pe
rm
i
tt
ed
to
log
on
at
the
init
ia
ti
ng
the
sho
pp
i
ng
a
ppli
cat
i
on
or
at
the
s
hoppin
g givin
g
their e
-
m
ai
l a
ddress
as
us
e
rna
m
e and
p
a
sswor
d.
T
he
cl
ie
nt
log
s
on to
sta
rt
ing
the a
ppli
cat
ion
;
the
cl
ie
nt
pro
vid
ed
t
he
sel
ect
ion
of
orde
rin
g
the
eq
ual
to
the
la
st
tim
e
with
a
total
view
of
the
shoppin
g
a
nd
al
s
o
to
m
od
ify
if
ne
eded
b
y
the
cl
i
ent
to
m
ake
a
ne
w
or
der
.
A
dding
e
xtra
pro
du
ct
s
to
ta
ke
the a
m
al
ga
m
at
ion
of
t
he
cl
ie
nts earlie
r order
pr
oducts
and d
em
on
strat
e the a
uth
e
ntica
ti
on
.
Re
gistrati
on
:
I
n
th
e
m
od
ule,
cl
ie
nts
will
be
per
m
it
te
d
to
pr
ov
i
de
t
heir
i
nput
de
ta
il
s
an
d
po
stc
ode
to
store
th
e
datab
ase,
a
nd
it
ve
r
ifie
s
wh
et
her
t
he
sto
red
data
to
delivers
t
he
order
util
iz
ing
t
he
postc
od
e
.
T
he
ver
ific
at
io
n
pr
ov
i
des
c
orrect,
an
d
the
orde
r
can
be
delive
r
ed
t
o
t
he
cl
ie
nt
'
s
address.
T
he
cl
ie
nt
need
s
t
o
fill
a
reg
ist
rati
on c
onta
inin
g
al
l t
he
essen
ti
a
l detai
ls t
hat are nee
de
d
to
co
m
plete
the or
der
dis
pa
tc
h.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
12
, N
o.
3
,
Dece
m
ber
2
01
8
:
1187
–
119
4
1190
2.1.4
View
Shoppe
d Pr
od
u
c
ts
At
any
tim
e,
the
cl
ie
nts
will
be
able
to
vie
w
his/her
s
hoppe
d
pro
duct
s
that
are
ad
de
d
to
th
e
cart.
At
th
e
sam
e
tim
e
i
t
also
able
to
m
odify
and
rem
ov
e
and
in
div
i
dual
and
gro
up
pro
du
ct
s
from
the
sh
op
ping
cart
l
ist
.
It
will
be
an
o
pti
on
f
or
t
he
cl
ie
nt
s
to
a
dd or r
e
m
ov
e
the quant
it
y
of
in
di
vidu
al
pro
duct
s
in
t
he
s
hoppin
g
ca
rt.
T
he
authe
ntica
te
d
c
li
ents
on
ly
buy
the
pro
du
ct
s
a
nd
a
dded
t
o
shoppin
g
ca
rt.
But
the
no
n
-
a
uthe
ntica
te
d
cl
ie
nts
j
ust
view
t
he pr
oduc
ts an
d
it
s d
e
sc
riptio
ns
.
2.1.5 S
hoppin
g Ca
r
t
In
the
s
hoppin
g
ca
rt
t
o
per
m
it
s
to
the
cl
ie
nts
to
inclu
de
in
di
vidual
pro
du
ct
s
or
gro
up
of
pro
duct
s
a
nd
it
autom
a
ti
cal
l
y
m
od
ify
the
fu
ll
am
ou
nts
a
nd
oth
e
rs.
T
he
cl
ie
nts
to
re
m
ov
e
in
div
id
ua
l
pr
od
ucts
or
group
pro
du
ct
s
from
the s
hoppin
g
c
art an
d
it
will
m
od
ify
the tota
l a
m
ou
nt a
nd
ot
her
s.
2.1.6 Or
der p
rocess
In the m
odule,
cl
ie
nts ord
e
r
is
processe
d. A
cli
ent r
e
qu
i
res b
uying p
r
oducts
and it ca
n plac
e the
orde
r
for t
he
pro
du
ct
s. T
he
po
stc
od
e
validat
io
n
ca
n
be
do
ne t
o c
onfirm
the
dis
pa
tc
h at
cl
ie
nts
place.
T
he
dis
patchin
g
detai
ls an
d
the
address
at w
hi
ch
the
pr
oduct
sh
oul
d be
deliv
ered are
pro
vide
d.
2.1.7 P
aymen
t
pro
ce
ss
In
t
he
paym
ent
m
od
ule
op
ti
on
s
for
the
orde
r
is
prov
i
ded
a
nd
pr
oces
se
d.
P
aym
ent
sh
ould
be
th
rou
gh
cred
it
ca
r
d,
de
bit
car
d
an
d
ne
t
ba
nk
i
ng.
The
total
am
ount
i
s
the
a
dd
it
io
n
of
c
os
t
of
the
pro
du
ct
s
an
d
di
sp
at
c
h
charges
will
b
e
d
e
du
ct
e
d from
the cli
ents acc
ount in
case
of
paym
ent o
ptio
ns
oth
e
r
tha
n
c
ash o
n deli
ver
y
.
2.2
.
Enh
an
c
e
d High
-
Speed
Key
Tr
an
s
mi
ssion (EHS
KT)
Techni
que
An
E
nh
a
nce
d
High
-
S
pee
d
K
ey
Tra
ns
m
issi
on
(E
HSKT)
Te
chn
i
qu
e
is
pro
pose
d
for
sec
ure
an
d
ef
fici
ent
paym
ent
transa
ct
ion
s
an
d
av
oi
ds
frau
d
act
ivit
y.
T
he
pro
pose
d sy
ste
m
wor
ks
ba
sed
UUID
(Unive
rsall
y
U
nique
Id
e
n
ti
fier)
to
gen
e
rate
uniq
ue
id
for
paym
ent
transacti
on
s
.
P
rop
os
e
d
syst
e
m
gen
er
at
es
Un
i
qu
e
i
d
ha
ve
com
bin
at
ion
of
num
ber
,
al
pha
bets,
&
s
pecial
cha
racter
t
o
a
vo
i
d
fr
a
ud
use
r
s.
I
n
t
he
te
c
hn
i
qu
e
pr
ov
i
des
f
aci
li
ty
to
us
e
r
for
util
i
zi
ng
m
ulti
-
bankin
g
acc
ount
tr
an
sact
io
n
at
sin
gle
place.
The
pro
po
se
d
syst
e
m
is
hig
hly
dedi
cat
ed
to
a
vo
i
d
fr
a
ud
entry
a
nd
a
n
-
a
uthorize
d
us
e
rs
.
T
he
a
ppr
oac
h
en
ha
nces
t
he
RSA
al
gorithm
with
the
key
l
eng
t
h
4096
w
hich
is
m
or
e
eff
ect
ive
for
secret
key
gen
e
rati
on
an
d
key
distrib
ution
ins
ecu
re
m
edium
.
Her
e,
User’
s
secret
key
us
e
d
to
re
flect
the
a
ccess
m
echan
ism
s
so
that
the
auth
or
iz
e
d
us
er
can
a
ble
to
val
idate
the
tra
ns
a
ct
io
n
if
a
nd
on
ly
i
f t
he t
ran
sact
i
on
at
tribu
te
s
to
f
ulfill
the
c
rite
ria
of
sec
ret
key
a
ccess.
Data
a
re
ge
ne
rall
y
assu
m
ed t
o
be
ei
the
r
ver
ti
c
al
ly
or
horizo
ntall
y
par
ti
ti
on
ed
.
I
n
the
case
of
horizo
ntall
y
pa
rtit
ion
ed
data,
diff
e
re
nt
sit
es
c
ollec
t
the
sam
e
set
of
in
form
at
ion
about
dif
fer
e
nt
entit
ie
s.
P
rop
os
e
d
syst
em
pr
od
uced
sec
ur
i
ty
accor
ding
t
o
data
at
tribu
te
s.
T
he
pro
po
se
d
desi
gn
r
e
du
ces
t
he
encr
y
ption,
de
crypti
on
tim
e
and
key
com
plexity
.
The
Propos
e
d
desig
ne
d hav
e
fo
ll
owin
g proc
ess:
a)
Setu
p
:
I
n
t
he
al
gorithm
ta
kes
input
par
am
et
er
is
set
of
num
ber
,
al
ph
a
bets
a
nd
spe
ci
al
cha
r
act
er
k
an
d
re
ve
rt
the pu
blic key
PK
as
w
el
l as
a
u
se
r
sec
ret
ke
y US
K.
PK i
s
util
iz
ed
f
or uni
qu
e
tra
ns
act
io
n i
d gen
e
rati
on.
b)
Secret
Ke
y
Ge
ner
ation:
I
n
t
he
al
gorithm
wi
ll
ta
ke
i
nput
K
f
or
acce
s
s
struc
ture
A
a
nd
t
he
use
r
sec
ret
ke
y
USK.
He
re,
in
the
a
ppr
oach
pro
vid
es
sec
ret
key
SK
wh
ic
h
enab
le
s
the
us
e
r t
o
validat
e
th
e
tra
ns
act
io
ns
f
or
resp
ect
ive
user
s.
U
SK uti
li
zed
for
ge
ner
at
in
g t
he
key
by a
n
a
uthori
ze
d user
on
ly
.
c)
Trans
actions
V
alida
ti
ons
:
It
r
ecei
ves
t
he
i
nput
f
r
om
us
ers
with
t
heir
secre
t
key
SK
to
pro
ceed
for
paym
e
nt
validat
io
n
pro
cess
for
key
acce
ss
st
ru
ct
ure
A
.
The
pro
po
s
ed
m
et
ho
d
pe
rfo
rm
s
paym
ent
tran
sact
io
n
validat
io
ns
,
if an
d on
ly
i
f
t
he
set
of
paym
ent
at
trib
ute
c
onfi
rm
s
the
use
r
se
cret key
acce
ss
str
uctu
re A
.T
he
ps
e
udo
c
ode
of prop
os
ed
alg
ori
thm
is g
iven
belo
w
in
d
et
ai
l
s:
The Inp
ut:
Ta
ke
in
put pa
ram
et
ers
set
of
nu
m
ber
, alph
a
bet
s and s
pecial
c
har
act
er
k
Out
p
ut:
UUI
D base S
ecret
key S
K
Proced
ure:
Start
;
Start t
he
a
ppli
cat
ion
s;
Enter
t
he neces
sary at
trib
utes
for
tra
ns
act
io
ns p
ro
ce
ss;
Pr
oc
eed
for En
han
ce
d U
UID
base
d
sec
ret k
e
y SK ge
ner
at
io
ns
;
Take t
he para
m
et
ers
K;
Pr
oc
eed
for co
m
pu
ta
ti
on
s;
If
c
om
pu
ta
ti
on pro
ces
s c
om
pl
et
ed;
The
n
S
K ge
nera
te
d
f
ro
m
access str
uctu
re
A;
Pr
oc
eed
for t
ra
ns
act
io
n
a
nd paym
ent p
r
oces
s is com
plete
d;
In
it
ia
li
ze the tr
ansacti
on
valid
at
ion
process;
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
Develo
ping
an
En
hance
d Hig
h
-
Speed
Key T
ra
nsmissi
on (EHS
KT)
Techni
qu
e
…
(
A.B.
H
aj
ira Be
)
1191
Enter
t
he
sec
re
t SK for
valida
ti
on
;
If
S
K
is
validat
ed
the
n
Transac
ti
on is
com
plete
d,
and
SK is ta
ke
n from
access stru
ct
ur
e
A;
El
se
Un
a
utho
rized
us
ers
a
nd pro
c
ess is de
cl
ined;
El
se
Re
sta
rt the
pro
cess;
End
3.
RES
ULTS
A
ND
DI
SCUS
S
ION
3.1
.
Pro
gr
am
mi
ng
Set
up
To
e
valuate,
th
e
pro
posed
sys
tem
with
existi
ng
ap
proac
hes,
the
dep
l
oym
e
nt
pr
ocess
c
on
du
ct
e
d
on
a
la
pto
p
with
I
ntel
Core
i7
7600
pr
ocess
or
,
16GB
m
e
m
or
y,
and
Wi
ndow
7
Ultim
at
e
syst
e
m
.
Her
e,
this
m
et
hod
i
m
ple
m
ented
in
J
AVA
us
in
g
NetB
eans
8.0
with
Ap
ac
he
Tom
ca
t
8.
0.
3
a
nd
MYS
Q
L
5.5
Databa
s
e.
The
Pr
op
os
e
d
al
gor
it
h
m
is
eval
uated
with
tran
sac
ti
on
proces
ses
in
the
fi
na
ncial
dom
ai
n
to
c
he
ck
t
he
e
ff
ic
ie
nc
y
of
pro
po
se
d
m
echan
ism
s.
Fo
r
a
pply
ing
a
nd
validat
ing
the
tra
nsa
ct
ion
s,
the
propose
d
m
et
ho
d
is
us
e
d
ce
ntral
iz
ed
& i
m
ple
m
entation
done
in JA
VA.
3.2
.
Per
fo
r
m
an
ce
Me
trics
In
t
he
ph
ase
,
pro
posed
m
et
ho
d
e
xp
l
or
es
t
he
perform
ance
m
et
rics
to
im
pr
ove
the
secu
rity
for
sec
ur
e
paym
ent
in
fi
na
ncial
tra
ns
act
ion
al
pr
ocess.
Table
1
dis
play
s
f
ollow
i
ng
e
valuati
on
pa
ra
m
et
ers
sepa
ratel
y
su
c
h
as ave
rag
e
d
el
a
y, thr
ough
pu
t,
energy c
on
s
umpti
ons e
ncr
ypti
on tim
e & d
ec
r
ypti
on
ti
m
e.
Table
1
.
Per
for
m
ance Met
rics
Metr
ics
Descripti
o
n
Fo
r
m
u
la
Av
erage Del
ay
Ti
m
e
d
if
f
erence
b
etween
th
e
cu
rr
en
t
d
ata
p
ackets
rece
iv
ed
an
d
th
e
p
revio
u
s
d
ata
p
ackets
rece
iv
ed
P
k
t
R
e
c
v
d
Ti
m
e
P
k
t
Se
nt
Ti
m
e
A
v
e
rag
e
D
e
lay
tim
e
Thro
u
g
h
p
u
t
Av
erage
o
f
su
ccessf
u
l
d
ata
d
eliv
ered
to
th
e
d
estin
atio
n
0
(
)
*
1000
n
Pk
t
s
Re
c
e
i
v
e
d
n
Pk
t
Si
ze
T
hroughput
Energy Co
n
su
m
p
ti
o
n
Dif
f
erence
b
etween
th
e
in
itial
en
ergy
an
d
th
e
resid
u
al
en
erg
y
o
v
er
th
e
si
m
u
l
atio
n
ti
m
e
Energy
T
x
=
(33
0
*
d
ata Size)
/2
*
1
0
6
Energy R
x
=
(23
0
*
d
ata Size)
/2
*
1
0
6
Encry
p
tio
n
T
i
m
e
(
ET
)
Total
ti
m
e
to
p
rod
u
ce
a
cip
h
er
tex
t
f
ro
m
p
lain
text
i
CT
I
EP
i
EP
,
Decr
y
p
tio
n
T
i
m
e
(
DT)
Total
ti
m
e
to
p
r
o
d
u
ce
p
lain
tex
t
f
ro
m
en
cry
p
ted
text
p
i
(
0
)
s
,
s
k
i
E
Pi
,
g
g
EP
EP
W
h
ere
,
Pk
t
–
Pack
et Rx
-
Res
id
u
al E
n
ergy
E
P
-
Enco
d
in
g
Pr
o
cess
Recv
d
-
Rece
iv
ed
I
-
Attribu
te Se
t sk
-
Se
cret
Ke
y
Tx
-
Initial
Energ
y
CT
-
Cip
h
er
T
ex
t
3.3
.
Result
Table
2
ex
pla
ins
t
he
Avera
ge
Delay
,
Th
r
oughput,
E
nergy
Co
nsum
pti
on,
Enc
ryptio
n
Tim
e,
and
Decr
y
ption
Ti
m
e
fo
r
se
ver
a
l
inp
ut
c
on
st
r
ai
nts
with
pre
vious
m
et
ho
do
log
ie
s.
T
he
propose
d
m
et
ho
do
l
og
y
cal
culat
ed
on vario
us
k
in
ds
o
f
al
gorithm
s
li
k
e
DES,
A
ES,
a
nd
B
F,
with
cl
os
est
e
xisti
ng
a
ppr
oach
es
.
Ba
s
ed
on
ta
bu
la
r
res
ult
ob
s
er
vation,
it
can
be
sai
d
t
hat
the
pr
opose
d
m
et
ho
d
pe
r
form
s
well
com
par
e
than
ex
ist
ing
te
chn
iq
ues
.
Th
e
pr
opos
e
d
f
ra
m
ewo
r
k
cal
cul
at
ed
by
f
ollow
i
ng
e
xisti
ng
m
eth
od
ologies
na
m
el
y:
Data
Enc
ryptio
n
Stand
a
r
d
(
DES)
[
16
]
,
Adva
nc
ed
Enc
ryptio
n
Stand
a
r
d
(
AES)
[
16
]
an
d
Bl
ow
Fish
(BF)
[
16
]
m
et
ho
do
l
ogie
s.
Accor
ding to
T
able
1, it
noti
c
ed
that
EH
SKT has
the
best
scor
e
on eac
h partic
ula
r
fact
or.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
12
, N
o.
3
,
Dece
m
ber
2
01
8
:
1187
–
119
4
1192
Table
2.
A
ver
a
ge Del
ay
, T
hro
ughput,
E
nerg
y C
on
s
um
ption, E
ncr
ypti
on
Tim
e, D
ecry
ptio
n
Tim
e
for
E
-
Com
m
er
ce
Alg
o
rith
m
Av
erage Del
ay
(s)
Thro
u
g
h
p
u
t
(Kbp
s)
Ener
g
y
Co
n
su
m
p
ti
o
n
(Jo
u
les)
Encry
p
tio
n
T
i
m
e
(s)
Decr
y
p
tio
n
T
i
m
e
(s)
DES
4
8
.77
6
6
2
8
.13
8
3
.08
7
0
.43
4
0
.45
1
AES
4
9
.13
6
7
5
.27
7
2
.08
7
0
.21
4
0
.22
1
BF
4
8
.73
4
9
3
5
.2
8
5
.54
4
0
.26
2
0
.25
3
EHSK
T
1
3
.33
4
9
5
.16
4
8
.16
8
0
.11
9
0
.13
6
Accor
ding
to
F
igure
2
to
5
ob
serv
at
io
ns,
the
pro
po
se
d
te
c
hniqu
e
is
est
i
m
ated
base
d
on
a
ve
rag
e
delay
,
thr
oughput,
e
nc
ryptio
n
ti
m
e,
energy
c
onsum
pt
ion
,
an
d
de
crypti
on
ti
m
e.
Pr
op
os
e
d
E
HSKT
is
com
pu
te
d
with
Data
Enc
ryptio
n
Stan
da
rd
(DES),
A
dv
a
nce
d
Encr
y
ption
Stand
a
r
d
(
AES)
and
Bl
ow
Fis
h
(BF)
m
et
ho
do
l
og
ie
s
beh
al
f
of
on
a
ve
rag
e
delay
,
th
rou
ghput,
enc
r
ypti
on
ti
m
e,
ener
gy
c
on
s
um
ption
,
a
nd
dec
ry
ption
ti
m
e.
BF
is
the
cl
os
est
chall
en
ger.
A
ES
pro
vi
ded
t
he
data
confide
ntial
it
y,
integrity
.
A
ES
fail
s
to
decr
ea
se
key
c
om
ple
xiti
es,
and
it
ea
sil
y
br
ok
e
t
he
im
po
rt
an
t
key
pr
i
vac
y.
E
HSKT
im
p
rove
d
t
he
secu
r
it
y
for
se
cu
re
a
nd
e
ff
ic
ie
nt
pa
ym
ent
transacti
ons
a
nd
av
oid
s
fr
a
ud
act
ivit
y.
Pr
opose
d
E
HSKT
re
du
ce
s
4.7
3
A
D
(Aver
a
ge
Delay
),
23.
91
EC
(
Energy
Con
s
um
ption
)
,
0.9
5
ET
(E
ncr
y
ption
Tim
e),
an
d
0.8
5
DT
(
Dec
ryption
Tim
e)
and
im
pr
ov
es
59.
8%
(Thr
oughput).
Finall
y,
the
pa
per
cl
aim
s
the
pro
po
se
d
EH
S
KT m
et
ho
dolo
gy
pe
rfo
rm
s
best
on
e
ver
y
e
va
luati
on
m
at
rix
& r
e
sp
e
ct
ive input
para
m
et
ers.
In c
oncl
us
io
n,
it
clai
m
s
the prop
os
e
d
E
HSKT st
rategy i
s b
e
st o
f
s
ever
a
l
ov
e
rall
f
act
or
s
.
Figure
2. A
verage
Delay
of E
-
com
m
erce
Figure
3. Th
r
ough
pu
t
of E
-
Com
m
erce
4
8
.77
6
6
4
9
.13
6
7
4
8
.73
4
9
1
3
.33
4
0
10
20
30
40
50
60
DE
S
AE
S
BF
EH
SKT
Seco
nds
Alg
o
rithm
s
Av
er
ag
e
Dela
y
0
20
40
60
80
1
0
0
DE
S
AE
S
BF
EH
SKT
2
8
.13
5
.27
3
5
.2
9
5
.16
K
bps
Alg
o
rithm
s
Thr
o
u
g
h
p
u
t
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
Develo
ping
an
En
hance
d Hig
h
-
Speed
Key T
ra
nsmissi
on (EHS
KT)
Techni
qu
e
…
(
A.B.
H
aj
ira Be
)
1193
Figure
4. Ene
r
gy Co
nsum
ption
of E
-
C
omm
e
rce
Figure
5. Enc
r
ypti
on
ti
m
e and
Decr
y
ption t
im
e o
f
E
-
c
ommerce
4.
CONCL
US
I
O
N
In
I
n
m
od
er
n
business
,
the
m
a
in
res
ource
is
a
Wo
rld
W
i
de
Web,
a
nd
it
prov
i
des
new
op
portu
niti
es
f
or
bu
si
ness.
E
-
c
om
m
erce
is
an on
li
ne we
bs
it
e
wh
e
re
the
sel
li
ng
or
buyi
ng
of
m
erch
and
ise
order
e
d el
ect
r
onic
al
ly
.
In
t
he
pa
per
de
velo
ped
an
E
nhance
d
High
-
S
peed
Key
Tra
nsm
issi
on
(
EHSKT)
Tec
hn
i
que
for
sec
ure
pa
ym
ent
transacti
ons
a
nd
av
oids
f
raud
act
ivit
y.
The
pri
vacy
m
echan
is
m
m
a
intai
ned
tra
der
s
&
c
ust
om
er
con
te
nt
prof
il
e
m
anag
em
ent.
Pr
op
os
e
d
m
et
h
odology
im
pr
oved
t
he
th
rou
ghput
of
sec
ur
e
and
ef
fici
ent
paym
ent
transacti
ons
and
a
voids
f
r
aud
act
ivit
y.
Pr
op
os
e
d
EH
SK
T
re
d
uces
4.7
3
AD
(
A
ver
a
ge
Delay
)
,
23.91
EC
(
Energ
y
Con
s
um
ption
)
,
0.9
5
ET
(E
ncr
y
ption
Tim
e),
an
d
0.8
5
DT
(
Dec
ryption
Tim
e)
and
im
pr
ov
es
59.
8%
(Thr
oughput).
Finall
y,
the
pa
per
cl
aim
s
the
pro
po
se
d
EH
S
KT m
et
ho
dolo
gy
pe
rfo
rm
s
best
on
e
ver
y
e
va
luati
on
m
at
rix
& respe
ct
ive input
para
m
et
ers.
In
fu
t
ur
e
w
ork
m
ay
be
done
f
or
la
r
ge
siz
e
of
vid
e
o
file
s
an
d
di
ff
e
ren
t
siz
e
of
keys
to
in
ve
sti
gate
best
m
et
ho
dolo
gy t
o pro
du
ce
b
est
perform
ance r
e
su
lt
s.
REFERE
NCE
S
[1]
Raj
an
,
M
.
T.,
Vi
nce
nt
,
A
.
J
.
,
Pra
kash,
G
.
,
Praka
s
h,
N.
,
&
JU
,
R
.
M
.
,
“
Com
pute
ri
ze
d
RTBS
S
y
s
tem
”,
Int
ernati
ona
l
Journal
of
Eme
r
ging
Eng
ine
erin
g
Re
search
and
Technol
ogy
,
vo
l. 2, no. 2, pp. 25
-
29,
2014
.
[2]
Dass
,
R.
,
“
Unique
Id
entit
y
Pro
j
ec
t
in
India:
A
Divine
Drea
m
o
r
a
Misc
alculate
d
Heroi
sm
?
”
,
In
dian
Inst
it
ut
e
of
Manage
ment
,
20
11.
[3]
Yada
v,
V.
,
“
Unique
ide
n
ti
fi
catio
n
proje
c
t
for
1
.
2
bil
li
on
people
i
n
India
:
ca
n
it
f
il
l
inst
it
ut
iona
l
voids
and
ena
b
l
e
'
in
cl
usive
'
innov
at
ion
?
”,
Cont
emporar
y
Re
adings
in
Law
and
Soc
i
al
Just
ic
e
,
vo
l. 6
,
no
.
1
,
pp
.
38
,
2
014.
[4]
Chande
r,
S.
,
&
Kus
h,
A.,
“
Un
i
que
Id
ent
if
icati
o
n
Num
ber
a
nd
E
-
Governa
nc
e
Secur
i
t
y
”,
In
te
rna
ti
onal
Journal
o
f
Computing
and
Busine
ss
Re
sear
ch
,
vo
l. 1, no. 1,
2010.
[5]
Jada
v,
M.
B
.
,
De
sai,
M.
A.
,
Patel,
M.
F.
,
&
Pat
el,
M.
R.
,
“
Cloud
C
om
puti
ng
E
-
Voting:
A
Techni
c
al
Revi
ew”
,
Int
.
J
.
Re
s. Eme
rg.
Sci.
Technol
,
vo
l. 2,
pp.
8
-
13
,
2015
.
[6]
Bahuguna
,
A
.
,
“
FIRe:
Firefox
for
Com
pute
r
Secur
i
t
y
Inc
id
ent
Report
ing
and
Coordina
ti
on
”,
IITM
Journal
of
Manage
ment
an
d
IT
,
vol
.
6
,
no
.
1,
pp
.
3
-
11
,
201
5.
[7]
Varshne
y
,
D.
,
&
Go
y
al
,
D.,
“
UID
base
d
Mobile
Mone
y
Im
ple
m
en
ta
t
ion
in
R
ura
l
Are
as
of
In
dia
”
,
Int
ernati
on
al
Journal
of
R
ese
a
rch
in Engi
n
ee
ri
ng
&
Adv
ance
d
Technol
ogy
,
vo
l. 1, no. 6, 2014.
[8]
Chat
terje
e,
P.,
&
Nath
,
A.,
“
Sm
art
Com
puti
ng
Applicat
ions
in
Railwa
y
S
y
st
e
m
s
-
A
ca
se
stud
y
in
Indi
an
R
ai
lw
a
y
s
Pass
enge
r
Reser
vat
ion
S
y
st
em”,
Inte
rnational
Jo
urnal
,
vol
.
3
,
no
.
4,
2014.
0
20
40
60
80
1
0
0
DES
AES
BF
EHSK
T
8
3
.
0
8
7
7
2
.
0
8
7
8
5
.
5
4
4
4
8
.
1
6
8
Jo
u
les
A
lgo
rith
ms
Ene
r
gy Co
nsum
ption
0
.43
4
0
.21
4
0
.26
2
0
.11
9
0
.45
1
0
.22
1
0
.25
3
0
.13
6
0
0
.1
0
.2
0
.3
0
.4
0
.5
DE
S
AE
S
BF
EH
SKT
Seco
nds
Alg
o
rithm
s
Encr
y
p
tio
n
T
im
e
Dec
rypti
o
n
T
im
e
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
12
, N
o.
3
,
Dece
m
ber
2
01
8
:
1187
–
119
4
1194
[9]
Anand
Shende
,
Om
kar
Gurav,
Sw
apni
l
Shirode,
Pi
y
ush
Govek
ar,
and
S.N.
Za
war
e,
“
Secur
e
Uniq
ue
Id
ent
if
icati
o
n
using
Enc
r
y
pt
ed
Storage
in
NoS
QL
Data
base
”,
Inte
rnationa
l
J
ournal
of
Adv
a
nce
d
R
ese
arch
in
Comput
er
an
d
Comm
unic
ati
on
Engi
ne
ering
,
vol
.
5
,
no
.
4
,
2016
.
[10]
Hende
rson
-
Sell
e
rs,
B.
,
Fir
esm
it
h,
D.
G.,
Bo
ck,
C
.
,
&
Odel
l,
J
.
,
“
E
SIG
N”,
Journal
of
Object
-
oriented
Program
ming
,
vol.
11
,
1998
.
[11]
Akhile
sh,
K.
B
.
,
&
Sriniva
san
,
R.
,
“
Driving
the
econom
y
through
i
nnovat
io
n
and
e
ntre
pre
n
eur
ship:
Emerging
age
nd
a
for
technolog
y
m
ana
gement”,
2
013.
[12]
C.
Mukhopadh
ya
y
,
A.
Gur
too,
P.
Ramach
andr
an
,
P.
P.
I
y
er
,
M.
Ma
thi
rajan,
&
M.
H.
B.
Subrahm
an
ya
(
Eds.
).
Springe
r
India.
AUTH
ENTICATION
,
UID
AI,
2011.
[13]
Choi,
Youns
ung.
"Cr
y
p
ta
n
aly
sis
o
n
Privacy
-
awa
re
two
-
fac
tor
Authe
nti
c
at
ion
Protoco
l
for
W
ire
l
ess
Se
nsor
Networks."
Indone
sian J
our
nal
of
Elec
tric
al
Engi
ne
ering
and
Computer
Sc
ie
n
ce
,
Vol.
8,
no.
2,
pp.
296
-
301,
20
17.
[14]
Singh,
Pooja,
an
d
R.
K.
Chauh
an
.
"A
Surve
y
on
C
om
par
isons
of
Cr
y
ptogr
aphic
Al
gorit
hm
s
Us
ing
Cert
a
in
Para
m
eters
in
W
SN
.
"
Inte
rn
ati
onal Journal of
E
le
c
tric
al
and
Computer
Eng
i
nee
ring,
Vol.
7,
no.
4
,
pp
.
2232
,
2017.
[15]
Ga
y
at
hri
,
P.,
S
y
ed
Um
ar,
G.
Sri
devi
,
N
.
Bashwa
nth,
and
Ro
yy
ur
u
Srikant
h.
"H
ybrid
Cr
y
p
togra
p
h
y
for
R
andom
-
k
e
y
Gene
rati
on
base
d
on
ECC
Algor
it
hm
.
"
Inte
rnat
io
nal
Journal
of
E
le
c
tric
al
and
Co
mputer
Engi
ne
ering
(
IJE
CE)
,
Vol.
7,
no
.
3
,
pp
.
129
3
-
1298,
2017
.
[16]
Sahu,
S.
K.
,
&
Kus
hwaha
,
A.,
“
Perform
anc
e
Anal
y
s
is
of
S
y
m
m
et
ric
En
cr
y
pt
i
on
Algorit
hm
s
for
Mobile
Ad
h
oc
Network”
,
Int
ernati
onal
Journal
of
Eme
rging
Tec
hnology
and
Advance
d
Engi
n
ee
ri
ng
,
vo
l.
4
,
no.
6
,
pp
619
-
624
,
20
1
4
.
Evaluation Warning : The document was created with Spire.PDF for Python.