Pub Date : 2022-06-16DOI: 10.1109/comm54429.2022.9817255
Yazan Mohammad Hyasat, Dia Abualnadi, Yanal S. Faouri
In this paper, a two elements wideband MIMO antenna is proposed for 5G communications, WiFi-5, and WiFi-6 usage working in 3.89 GHz to 19.51 GHz frequency bandwidth with an FBW of 133.5 %. The antenna is composed of two identical rectangular patches, each with a circular slot, along with an E-shaped parasitic patch inside the slot. Also, an elliptical shape partial ground plane has been utilized to improve the impedance bandwidth of the suggested antenna. This design covers the n80 5G band (4.4 GHz – 4.99 GHz), and the complete bandwidth of both WiFi-5 and WiFi-6 (5.15 – 7.125) GHz. The mutual decoupling of the suggested MIMO antenna is below −20 dB over the whole frequency range. The proposed MIMO has an admirable correlation coefficient (ECC < 0.05), and the maximum channel capacity loss is 0.3 b/s/Hz. The proposed antenna has been simulated using HFSS software.
{"title":"Two Elements Ultra Wideband MIMO Antenna for 5G Communications, WiFi-5 and WiFi-6 Applications","authors":"Yazan Mohammad Hyasat, Dia Abualnadi, Yanal S. Faouri","doi":"10.1109/comm54429.2022.9817255","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817255","url":null,"abstract":"In this paper, a two elements wideband MIMO antenna is proposed for 5G communications, WiFi-5, and WiFi-6 usage working in 3.89 GHz to 19.51 GHz frequency bandwidth with an FBW of 133.5 %. The antenna is composed of two identical rectangular patches, each with a circular slot, along with an E-shaped parasitic patch inside the slot. Also, an elliptical shape partial ground plane has been utilized to improve the impedance bandwidth of the suggested antenna. This design covers the n80 5G band (4.4 GHz – 4.99 GHz), and the complete bandwidth of both WiFi-5 and WiFi-6 (5.15 – 7.125) GHz. The mutual decoupling of the suggested MIMO antenna is below −20 dB over the whole frequency range. The proposed MIMO has an admirable correlation coefficient (ECC < 0.05), and the maximum channel capacity loss is 0.3 b/s/Hz. The proposed antenna has been simulated using HFSS software.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"259 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132826920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/comm54429.2022.9817305
Rodica Paula Cota, Daniel Zinca
Among the problems caused by spam email are loss of productivity and increase in network resources consumption. Sometimes spam email contain malware as attachments or include links for phishing websites, leading to theft and loss of data. Many email servers are filtering spam but the process becomes increasingly difficult as spammers try to create messages that look similar to normal email. In this paper we implemented five Machine Learning Algorithms in the Python language using the scikit-learn library and we compared their performance against two publicly available spam email corpuses. The discussed algorithms are: Support Vector Machine, Random Forest, Logistic Regression, Multinomial Naive Bayes and Gaussian Naive Bayes.
{"title":"Comparative Results of Spam Email Detection Using Machine Learning Algorithms","authors":"Rodica Paula Cota, Daniel Zinca","doi":"10.1109/comm54429.2022.9817305","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817305","url":null,"abstract":"Among the problems caused by spam email are loss of productivity and increase in network resources consumption. Sometimes spam email contain malware as attachments or include links for phishing websites, leading to theft and loss of data. Many email servers are filtering spam but the process becomes increasingly difficult as spammers try to create messages that look similar to normal email. In this paper we implemented five Machine Learning Algorithms in the Python language using the scikit-learn library and we compared their performance against two publicly available spam email corpuses. The discussed algorithms are: Support Vector Machine, Random Forest, Logistic Regression, Multinomial Naive Bayes and Gaussian Naive Bayes.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116499227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/comm54429.2022.9817220
Maria Dragan, D. Brinaru, S. Halunga
High-speed circuits impose special restrictions on dielectrics with smaller constant dielectric permittivity. On these circuits, velocity increases with the decrease of relative dielectric permittivity. On the other hand, the cost of the system will increase due to substrate's cost, as substrates with low loss at higher frequencies, as N4000-13, are more expensive comparing to the most common substrates as FR4, and design cost will also increase due to the need of proper evaluation of the electromagnetic and signal integrity aspects. High speed and ultra-high speed sensors, 5G networks and IoT applications require lower latency and lower jitter, higher data rates and demand timing analyses while minimizing power consumption. In the current paper, we will analyze several aspects on signal integrity, circuits with frequency dependent dielectric models and fiber weave effect (FWE) upon the dielectric model to characterize the composite structure of printed circuit boards' (PCB) substrates. Also, we will study and include in simulation circuit various types of laminated fabrics and describe the impact of fiberglass effect on the proposed circuit. Coupled lines or single ended lines in the proposed circuit model the interconnections on the PCB. Based on these circuits, we represented the reflection and transmission coefficients for two materials that allows analyzes of composite type substrates: FR4 and N4000-13. In order to highlight the FWE, we designed a circuit with two uncoupled lines and we study the reflection and insertion loss that appear with the increase of the frequency.
{"title":"Constraints of Fiber Weave Effect on High-Speed Circuits","authors":"Maria Dragan, D. Brinaru, S. Halunga","doi":"10.1109/comm54429.2022.9817220","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817220","url":null,"abstract":"High-speed circuits impose special restrictions on dielectrics with smaller constant dielectric permittivity. On these circuits, velocity increases with the decrease of relative dielectric permittivity. On the other hand, the cost of the system will increase due to substrate's cost, as substrates with low loss at higher frequencies, as N4000-13, are more expensive comparing to the most common substrates as FR4, and design cost will also increase due to the need of proper evaluation of the electromagnetic and signal integrity aspects. High speed and ultra-high speed sensors, 5G networks and IoT applications require lower latency and lower jitter, higher data rates and demand timing analyses while minimizing power consumption. In the current paper, we will analyze several aspects on signal integrity, circuits with frequency dependent dielectric models and fiber weave effect (FWE) upon the dielectric model to characterize the composite structure of printed circuit boards' (PCB) substrates. Also, we will study and include in simulation circuit various types of laminated fabrics and describe the impact of fiberglass effect on the proposed circuit. Coupled lines or single ended lines in the proposed circuit model the interconnections on the PCB. Based on these circuits, we represented the reflection and transmission coefficients for two materials that allows analyzes of composite type substrates: FR4 and N4000-13. In order to highlight the FWE, we designed a circuit with two uncoupled lines and we study the reflection and insertion loss that appear with the increase of the frequency.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131953340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/comm54429.2022.9817242
Irina Petra Manciu, D. Sacaleanu, L. Perisoara
The objective of this paper is to evaluate, from the point of view of energy efficiency, the communication protocols whose characteristics make them suitable to the implementation requirements in the infrastructure of Wireless Sensor Networks (WSN). The WiFi, GSM and LoRa protocols are evaluated in this regard, being some of the most widely used for applications of sensor networks. An accurate estimation of the energy consumption for network connection, data acquisition, raw data processing, and data transmission helps proper sizing for versatile indoor or outdoor monitoring solution. The tests were performed on similar data acquisition boards, with similar sensor shields for acquired parameters, but with different data communication transceivers. A special interest was shown to LoRa, and the results of the tests show the flexibility and adaptability of this protocol in WSN with low volume data exchange.
{"title":"Evaluation of the wireless communication protocols' energy efficiency for versatile WSN deployments","authors":"Irina Petra Manciu, D. Sacaleanu, L. Perisoara","doi":"10.1109/comm54429.2022.9817242","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817242","url":null,"abstract":"The objective of this paper is to evaluate, from the point of view of energy efficiency, the communication protocols whose characteristics make them suitable to the implementation requirements in the infrastructure of Wireless Sensor Networks (WSN). The WiFi, GSM and LoRa protocols are evaluated in this regard, being some of the most widely used for applications of sensor networks. An accurate estimation of the energy consumption for network connection, data acquisition, raw data processing, and data transmission helps proper sizing for versatile indoor or outdoor monitoring solution. The tests were performed on similar data acquisition boards, with similar sensor shields for acquired parameters, but with different data communication transceivers. A special interest was shown to LoRa, and the results of the tests show the flexibility and adaptability of this protocol in WSN with low volume data exchange.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134563788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/comm54429.2022.9817251
E. Pop, Daniela Gîfu
E-business offers to economic agents the opportunity to increase the efficiency of their activity, promote and offer their products and services on a large and diversified market. Often a single service, separately, does not meet all the needs of various categories and groups of customers. In such a situation, service composition can provide more technical, commercial, informational facilities than each separate component service can offer. There are many web-based frameworks used for e-business, but still with limitations. The paper presents a Services Composition Framework and a wise algorithm for e-business models, based on REST and SOAP web services. It is intended to be used for the development of e-business models, comprising stock market exchange, e-commerce, e-banking, etc. The customers can access the framework services, through Smartphones, on mobile and wireless communication channels. Within a Quality-of-Service performance analysis of the e-business Service Composition Framework, the response time and throughput for multiuser access simultaneous requests were evaluated. A stock market exchange service is considered, as an e-business service example, while Bucharest Stock Exchange information is the digital content source for data transactions.
{"title":"An e-Business Services Composition Framework","authors":"E. Pop, Daniela Gîfu","doi":"10.1109/comm54429.2022.9817251","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817251","url":null,"abstract":"E-business offers to economic agents the opportunity to increase the efficiency of their activity, promote and offer their products and services on a large and diversified market. Often a single service, separately, does not meet all the needs of various categories and groups of customers. In such a situation, service composition can provide more technical, commercial, informational facilities than each separate component service can offer. There are many web-based frameworks used for e-business, but still with limitations. The paper presents a Services Composition Framework and a wise algorithm for e-business models, based on REST and SOAP web services. It is intended to be used for the development of e-business models, comprising stock market exchange, e-commerce, e-banking, etc. The customers can access the framework services, through Smartphones, on mobile and wireless communication channels. Within a Quality-of-Service performance analysis of the e-business Service Composition Framework, the response time and throughput for multiuser access simultaneous requests were evaluated. A stock market exchange service is considered, as an e-business service example, while Bucharest Stock Exchange information is the digital content source for data transactions.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130171594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/comm54429.2022.9817184
Roxana Mihaescu, S. Carata, Mihai Chindea, M. Ghenescu
Nowadays, the field of long-range thermal image processing is increasingly popular. Although this technology has several advantages in terms of security and monitoring, there are not enough autonomous algorithms for processing these images. In this paper, we aim to address two of the main problems in this field: lack of long-range thermal databases and shortage of autonomous monitoring systems. Firstly, we are introducing a new proprietary database with long-range thermal images. Further, we present a thermal detection algorithm, capable of running on real-time monitoring systems. This algorithm is based on a general-purpose DNN (Deep Neural Network) object detector - the YOLO (You Only Look Once) model. Thus, with minimal computing and hardware resources, this article aims to bring a plus in the field of long-range thermal Image processing.
{"title":"Long range thermal image object recognition for perimeter security","authors":"Roxana Mihaescu, S. Carata, Mihai Chindea, M. Ghenescu","doi":"10.1109/comm54429.2022.9817184","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817184","url":null,"abstract":"Nowadays, the field of long-range thermal image processing is increasingly popular. Although this technology has several advantages in terms of security and monitoring, there are not enough autonomous algorithms for processing these images. In this paper, we aim to address two of the main problems in this field: lack of long-range thermal databases and shortage of autonomous monitoring systems. Firstly, we are introducing a new proprietary database with long-range thermal images. Further, we present a thermal detection algorithm, capable of running on real-time monitoring systems. This algorithm is based on a general-purpose DNN (Deep Neural Network) object detector - the YOLO (You Only Look Once) model. Thus, with minimal computing and hardware resources, this article aims to bring a plus in the field of long-range thermal Image processing.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129900653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/comm54429.2022.9817179
Seyedsalar Sefati, S. Halunga
The Internet of Things (IoT) is a technology that employs a variety of sensors and wireless communication protocols. People are leveraging IoT to make their lives easier by using innovative and intelligent equipment. One of them is home automation, which works in conjunction with the actuators and sensors linked to the network. The massive increase in the number of sensors, embedded systems, personal devices, etc., will increase the load and, thus, the faults. In such complicated and dense networks, the capacity to offer reliable services in any circumstance is required, and the IoT sensors should not be interrupted. Fault-tolerance methods are essential to maintain low latency and high reliability in IoT systems. A dynamic and sophisticated algorithm is needed to ensure the services in real-world applications. In this proposed method, firstly, the Fog retrieves and stores the Availability, Reliability, and Throughput information (ART) from each cluster. Then, the second round compares the parameters available for the current situation because it is possible to fail in each round. If the ART is equal with the first round, the situation is continuous; otherwise, Fog requests from the Cluster Head (CH) to find the faulty sensor. By removing the faulty sensor, the adjacent nodes must re-route. The proposed method has been simulated in a NS3 environment and achieved high reliability and throughput compared to other algorithms.
物联网(IoT)是一种采用各种传感器和无线通信协议的技术。人们正在利用物联网通过使用创新和智能设备使他们的生活更轻松。其中之一是家庭自动化,它与连接到网络的执行器和传感器一起工作。传感器、嵌入式系统、个人设备等数量的大量增加,将增加负载,从而增加故障。在如此复杂和密集的网络中,需要在任何情况下提供可靠服务的能力,并且物联网传感器不应该中断。容错方法对于保持物联网系统的低延迟和高可靠性至关重要。需要一个动态和复杂的算法来确保实际应用程序中的服务。在该方法中,Fog首先从每个集群中检索并存储可用性、可靠性和吞吐量信息(ART);然后,第二轮比较当前情况可用的参数,因为在每轮中都有可能失败。如果抗逆转录病毒治疗与第一轮相同,则情况是连续的;否则,Fog会向Cluster Head (CH)请求查找故障传感器。通过移除故障传感器,相邻节点必须重新路由。该方法在NS3环境下进行了仿真,与其他算法相比,具有较高的可靠性和吞吐量。
{"title":"Data forwarding to Fog with guaranteed fault tolerance in Internet of Things (IoT)","authors":"Seyedsalar Sefati, S. Halunga","doi":"10.1109/comm54429.2022.9817179","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817179","url":null,"abstract":"The Internet of Things (IoT) is a technology that employs a variety of sensors and wireless communication protocols. People are leveraging IoT to make their lives easier by using innovative and intelligent equipment. One of them is home automation, which works in conjunction with the actuators and sensors linked to the network. The massive increase in the number of sensors, embedded systems, personal devices, etc., will increase the load and, thus, the faults. In such complicated and dense networks, the capacity to offer reliable services in any circumstance is required, and the IoT sensors should not be interrupted. Fault-tolerance methods are essential to maintain low latency and high reliability in IoT systems. A dynamic and sophisticated algorithm is needed to ensure the services in real-world applications. In this proposed method, firstly, the Fog retrieves and stores the Availability, Reliability, and Throughput information (ART) from each cluster. Then, the second round compares the parameters available for the current situation because it is possible to fail in each round. If the ART is equal with the first round, the situation is continuous; otherwise, Fog requests from the Cluster Head (CH) to find the faulty sensor. By removing the faulty sensor, the adjacent nodes must re-route. The proposed method has been simulated in a NS3 environment and achieved high reliability and throughput compared to other algorithms.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128113817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/comm54429.2022.9817196
Florin Rastoceanu, Daniel-Tiberius Hriţcu, Constantin Grozea, Marilena Lazar
The increasing use of video surveillance systems raises security concerns regarding the processing of personal data. The security of personal data must be ensured throughout the process of acquisition, transport, storage, processing and discretionary access. In this paper we propose a solution that provides protection for personal data carried by, or stored in a video identification system. Using simple cryptographic methods, the proposed system architecture manages to ensure confidentiality, integrity and authenticity, but also controlled access to personal data. Furthermore, we demonstrate the possibility of using a inexpensive solution with limited resources to secure the video stream in transit. The presented solution is suitable for real-time video communication systems and can ensure the requirements imposed by the GDPR regulations regarding the protection of personal data.
{"title":"Securing Personal Data in a Video Identification System","authors":"Florin Rastoceanu, Daniel-Tiberius Hriţcu, Constantin Grozea, Marilena Lazar","doi":"10.1109/comm54429.2022.9817196","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817196","url":null,"abstract":"The increasing use of video surveillance systems raises security concerns regarding the processing of personal data. The security of personal data must be ensured throughout the process of acquisition, transport, storage, processing and discretionary access. In this paper we propose a solution that provides protection for personal data carried by, or stored in a video identification system. Using simple cryptographic methods, the proposed system architecture manages to ensure confidentiality, integrity and authenticity, but also controlled access to personal data. Furthermore, we demonstrate the possibility of using a inexpensive solution with limited resources to secure the video stream in transit. The presented solution is suitable for real-time video communication systems and can ensure the requirements imposed by the GDPR regulations regarding the protection of personal data.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122021570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/comm54429.2022.9817359
Marios Karatisoglou, Aristeidis Farao, Vaios Bolgouras, C. Xenakis
Security for businesses and organizations is essential to protect operational activities, trust relationship with clients and financial viability. Increased interest for research concerning cybersecurity issues has been shown recently, while at the same time professionals of this sector are employed to ensure safety. In turn, the efficacy and performance of both the researchers and professionals rely on the information provided by Cyber Threat Intelligence infrastructures. Automation of procedures regarding the collection, harmonization and processing of information is of utmost importance for Cyber Threat Intelligence, in order to effectively relay to the community data concerning newly emerged threats. Nevertheless, the process regarding the transfer of knowledge between Cyber Threat Intelligence and cybersecurity specialists is based on frameworks and procedures that are not in line with the needs and standards of modern times, being performed through obsolete methods and manual labor. In this paper, we propose BRIDGE, the first tool that streamlines the flow of intelligence between Cyber Threat Intelligence and cybersecurity professionals, by taking advantage of the Structured Threat Information eXpression standard, utilizing blockchain technology and automatically converting the intelligence needed in the form that researchers and other professionals require. Our experimental results demonstrate the efficiency of BRIDGE in terms of swiftness and performance improvement compared to the mainstream approach.
{"title":"BRIDGE: BRIDGing the gap bEtween CTI production and consumption","authors":"Marios Karatisoglou, Aristeidis Farao, Vaios Bolgouras, C. Xenakis","doi":"10.1109/comm54429.2022.9817359","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817359","url":null,"abstract":"Security for businesses and organizations is essential to protect operational activities, trust relationship with clients and financial viability. Increased interest for research concerning cybersecurity issues has been shown recently, while at the same time professionals of this sector are employed to ensure safety. In turn, the efficacy and performance of both the researchers and professionals rely on the information provided by Cyber Threat Intelligence infrastructures. Automation of procedures regarding the collection, harmonization and processing of information is of utmost importance for Cyber Threat Intelligence, in order to effectively relay to the community data concerning newly emerged threats. Nevertheless, the process regarding the transfer of knowledge between Cyber Threat Intelligence and cybersecurity specialists is based on frameworks and procedures that are not in line with the needs and standards of modern times, being performed through obsolete methods and manual labor. In this paper, we propose BRIDGE, the first tool that streamlines the flow of intelligence between Cyber Threat Intelligence and cybersecurity professionals, by taking advantage of the Structured Threat Information eXpression standard, utilizing blockchain technology and automatically converting the intelligence needed in the form that researchers and other professionals require. Our experimental results demonstrate the efficiency of BRIDGE in terms of swiftness and performance improvement compared to the mainstream approach.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"38 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123408074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/comm54429.2022.9817188
L. Perisoara, D. Sacaleanu, Cosmin Danisor
Automotive Ethernet is an ideal choice for high-speed buses within modern vehicles, used by Advanced Driver Assistance Systems (ADAS), multimedia, navigation, telematics. This paper analysis the advantages of using Automotive Ethernet in vehicles. For a Dacia Logan Electric Vehicle (EV), converted from a classical vehicle with Internal Combustion Engine (ICE), an Ethernet network architecture is proposed for the communication between different Electronic Control Units (ECUs). To gather data from the vehicle's Controller Area Network (CAN), a CAN to Ethernet gateway is developed based on Raspberry Pi. To send data to a web server, an industrial Teltonika RUTX09 mobile router with Ethernet interface is used. Different measurements are performed for acquiring data from the CAN bus, or to investigate the network performances of the mobile Internet Service Provider (ISP). Finally, signal integrity of Ethernet bus is measured and analyzed.
{"title":"Automotive Ethernet Architecture for the Connected Dacia Logan Electric Vehicle","authors":"L. Perisoara, D. Sacaleanu, Cosmin Danisor","doi":"10.1109/comm54429.2022.9817188","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817188","url":null,"abstract":"Automotive Ethernet is an ideal choice for high-speed buses within modern vehicles, used by Advanced Driver Assistance Systems (ADAS), multimedia, navigation, telematics. This paper analysis the advantages of using Automotive Ethernet in vehicles. For a Dacia Logan Electric Vehicle (EV), converted from a classical vehicle with Internal Combustion Engine (ICE), an Ethernet network architecture is proposed for the communication between different Electronic Control Units (ECUs). To gather data from the vehicle's Controller Area Network (CAN), a CAN to Ethernet gateway is developed based on Raspberry Pi. To send data to a web server, an industrial Teltonika RUTX09 mobile router with Ethernet interface is used. Different measurements are performed for acquiring data from the CAN bus, or to investigate the network performances of the mobile Internet Service Provider (ISP). Finally, signal integrity of Ethernet bus is measured and analyzed.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126424095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}