Browsing by Author "Siriwardena, P"
Now showing 1 - 6 of 6
- Results Per Page
- Sort Options
- item: Conference-Extended-AbstractCross domain authentication with open ID for web-services(2011) Siriwardena, P; Attenayake, S; Mahagederawatte, H; Wijekoon, S; Wijenayake, D; Dias, GCross domain authentication for web services is important when web services in one organization are accessed from another. This paper presents the implementations of cross domain authentication in web service environment with OpenID. OpenID integration for web-services enables authentication to web-services regardless of the domains requester and resource provider belong to. It enables wider use of web-services among users since OpenID has become quite popular. It also enhances the security aspect in web service authentication, since it eliminated the use passwords for authentication between requester and resource provider.
- item: Conference-AbstractDisaster and emergency warning network (DEWN) : harnessing cellular technologies for early warning disseminationWijesinghe, L; Siriwardena, P; Wijerathna, S; Purasinghe, H; Dias, DThe Disaster and Emergency Warning Network (DEWN) is a last-mile disaster early warning system based on a suite of mobile technologies. It alerts citizens of impending disasters through SMS/Cell Broadcast activated remote-alarm devices, cell broadcasting to handsets and multi-lingual SMS.
- item: Conference-Full-textMSchain: blockchain based decentralized certificate transparency for microservices(IEEE, 2020-07) Dilshan, D; Piumika, S; Rupasinghe, C; Perera, I; Siriwardena, P; Weeraddana, C; Edussooriya, CUS; Abeysooriya, RPMicroservices architecture has become one of the most prominent software architectures in the software development processes due to its features such as scalability, maintainability, resilience, and composability. It allows developing business applications in a decentralized manner by dividing the important business logic into separate independent services. Digital certificates are used to verify the identity of microservices in most cases. However, the certificate authorities (CA) who issue the certificates to microservices cannot be trusted always since they can issue certificates without the consent of the relevant microservice. Nevertheless, existing implementations of certificate transparency are mostly centralized and has the vulnerability of the single point of failure. The distributed ledger technologies such as blockchain can be used to achieve decentralized nature in certificate transparency implementations. A blockchain-based decentralized certificate transparency system specified for microservices architecture is proposed in this paper to ensure secure communication among services. After the implementation and deployment in a cloud service, the system expressed average certificate querying time of 643 milliseconds along with the highly secured service provided.
- item: Conference-AbstractSensing line-of-sight obstructions in a multipath radio environment(2011) Chandrasekara, R; Wijesinghe, L; Siriwardena, P; Sampath, JPK; Edirisinghe, R; Dias, DThe paper presents the development and the experimental verification of a technique for the identification of obstructions in the line-of-sight path between two or more radio transceivers in a multipath radio environment. The objective of this technique is to use RSS measurements from a mesh of simple sensor nodes to identify intrusions.
- item: Thesis-AbstractSOAP message serialization with templating & cachingSiriwardena, P; Weerawarana, SWeb services marked a remarkable milestone in the field of distributed computing. Its predecessors like, Java RMI and .NET Remoting had their own ways of communication and optimized to suit their individual frameworks The gain was in performance - which led web services to be behind. SOAP message serializing process itself contributes 90% of the performance bottlenecks found in web service communication (II).// The research focuses on improving SOAP message serialization process with Templating and Caching. With Tern plating, we use a given WSDL to generate SOAP message templates at the time of code generation and in runtime the generated templates will he substituted with input arguments to the web service APIs. These substituted templates will be cached in the SOAP message template repository, with a unique key to identify- each web service request. Cached SOAP message requests will be used in subsequent web service calls, if a match found.// With the performance test results obtained, we could witness that Templating & Caching improves the web service performance and the factor of improvement depends on the complexity of objects involved in the web service API call. Also the performance gain due lo Templating & Caching increases as the object complexity increases and Templating itself contributes in a larger percentage to the performance gain than the Caching, as the object complexity increases
- item: Article-AbstractWi-alert : a wireless sensor network based intrusion alert prototype for HEC(2015-09-01) Edirisinghe, R; Dias, SAD; Chandrasekara, R; Wijesinghe, L; Siriwardena, P; Sampath, PKA wired fence based intrusion detection and alerting mechanism for boundaries separating wildlife habitats and human settlements was implemented, particularly as a solution to the Human-Elephant Conflict (HEC). The objective of the research reported in this paper is to propose and verify an alternative technique for this wired fence based alerting mechanism to overcome its limitations and to improve its effectiveness. This article presents a comprehensive study of alternative solutions with deliberate consideration of the practical constraints. Wi-Alert is a wireless sensor network based intrusion detection system proposed as the best alternative solution. This article reports the outcomes of the first two phases of ongoing developments of Wi-Alert. The first phase of experiments was conducted to investigate the multi-path effect reduction techniques at one site. In the next phase, experiments were conducted to verify the ability to detect elephants. The results obtained via the candidate techniques are compared. Both experiments confirm the feasibility of the prototype as a non-invasive method to detect elephants.