Pub Date : 2022-05-28DOI: 10.1109/SETIT54465.2022.9875453
M. Gafsi, Nessrine Abbassi, Rim Amdouni, Mohamed Ali Hajjaji, A. Mtibaa
This paper suggests a high-performance FPGA implementation of a strong pseudo-random numbers generator for several applications mainly in the security domain. An improved PRNG utilizing the Lorenz chaotic map is propounded. Then, using the Xilinx System Generator software of Xilinx society an FPGA architecture of the DPRNG is developed. Next, the hardware DPRNG is implemented on an FPGA-Zynq resulting in low resource utilization, a good frequency of 194.714 MHz, and high throughput of 25702 Mbps. The NIST 800-22 SP test suite result demonstrates that the suggested hardware DPRNG allows for generating high-quality random numbers. It provides a strong key with a high space. In addition, an application of the hardware DPRNG for image encryption is presented. The experimental results show better results when compared to other recent works.
本文提出了一种高性能FPGA实现的强伪随机数生成器,主要用于安全领域的几种应用。提出了一种利用洛伦兹混沌映射的改进PRNG算法。然后,利用Xilinx公司的Xilinx System Generator软件开发了DPRNG的FPGA架构。接下来,硬件DPRNG在FPGA-Zynq上实现,导致低资源利用率,194.714 MHz的良好频率和25702 Mbps的高吞吐量。NIST 800-22 SP测试套件结果表明,建议的硬件DPRNG允许生成高质量的随机数。它提供了一个高空间的坚固钥匙。此外,还介绍了硬件DPRNG在图像加密中的应用。实验结果与近年来的研究成果相比较,取得了较好的效果。
{"title":"Hardware implementation of a strong pseudo-random numbers generator with an application to image encryption","authors":"M. Gafsi, Nessrine Abbassi, Rim Amdouni, Mohamed Ali Hajjaji, A. Mtibaa","doi":"10.1109/SETIT54465.2022.9875453","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875453","url":null,"abstract":"This paper suggests a high-performance FPGA implementation of a strong pseudo-random numbers generator for several applications mainly in the security domain. An improved PRNG utilizing the Lorenz chaotic map is propounded. Then, using the Xilinx System Generator software of Xilinx society an FPGA architecture of the DPRNG is developed. Next, the hardware DPRNG is implemented on an FPGA-Zynq resulting in low resource utilization, a good frequency of 194.714 MHz, and high throughput of 25702 Mbps. The NIST 800-22 SP test suite result demonstrates that the suggested hardware DPRNG allows for generating high-quality random numbers. It provides a strong key with a high space. In addition, an application of the hardware DPRNG for image encryption is presented. The experimental results show better results when compared to other recent works.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115714751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-28DOI: 10.1109/SETIT54465.2022.9875510
Naftali Nakasole, Mercy Chitauro, Suama Hamunyela
The Information and Communication Technology (ICT) revolution has become a critical component of every law enforcement when combating crimes. With the surge of cybercrimes, it has increasing pressure on law enforcement to guarantee that cybercrimes are successfully combated. To combat cybercrimes, there are initiatives such as Social Media, Open Data, Geographic Information System Crime Mapping, Science of Security (SoS), Electronic Safe for Kid, Cybersecurity Competition, Cybercrime Reporting Portals, and Artificial Intelligence solutions which are vital to law enforcement in deterring more cybercrimes. This study employed a systematic literature review to look at relevant ICT initiative at the disposal to African law enforcement and they can be of assist in combating cybercrimes.
{"title":"Analysing ICT Initiatives towards Smart Policing to Assist African Law Enforcement in Combating Cybercrimes","authors":"Naftali Nakasole, Mercy Chitauro, Suama Hamunyela","doi":"10.1109/SETIT54465.2022.9875510","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875510","url":null,"abstract":"The Information and Communication Technology (ICT) revolution has become a critical component of every law enforcement when combating crimes. With the surge of cybercrimes, it has increasing pressure on law enforcement to guarantee that cybercrimes are successfully combated. To combat cybercrimes, there are initiatives such as Social Media, Open Data, Geographic Information System Crime Mapping, Science of Security (SoS), Electronic Safe for Kid, Cybersecurity Competition, Cybercrime Reporting Portals, and Artificial Intelligence solutions which are vital to law enforcement in deterring more cybercrimes. This study employed a systematic literature review to look at relevant ICT initiative at the disposal to African law enforcement and they can be of assist in combating cybercrimes.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114446281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-28DOI: 10.1109/SETIT54465.2022.9875855
Souhir Gabsi, Yassin Kortli, V. Beroulle, Yann Kieffer, H. Belgacem
A single RFID (Radio Frequency Identification) is a technology for the remote identification of objects or people. It integrates a reader that receives the information contained in an RFID tag through an RFID authentication protocol. RFID provides several security services to protect the data transmitted between the tag and the reader. However, these advantages do not prevent an attacker to access this communication and remaining various security and privacy issues in these systems. Furthermore, with the rapid growth of IoT, there is an urgent need of security authentication and confidential data protection. Authentication protocols based on elliptic curve cryptographic (ECC) were widely investigated and implemented to guarantee protection against the various attacks that can suffer an RFID system. In this paper, we are going to focus on a comparative study between the most efficient ECC-based RFID authentication protocols that are already published, and study their security against the different wireless attacks.
{"title":"Adoption of a Secure ECC-based RFID Authentication Protocol","authors":"Souhir Gabsi, Yassin Kortli, V. Beroulle, Yann Kieffer, H. Belgacem","doi":"10.1109/SETIT54465.2022.9875855","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875855","url":null,"abstract":"A single RFID (Radio Frequency Identification) is a technology for the remote identification of objects or people. It integrates a reader that receives the information contained in an RFID tag through an RFID authentication protocol. RFID provides several security services to protect the data transmitted between the tag and the reader. However, these advantages do not prevent an attacker to access this communication and remaining various security and privacy issues in these systems. Furthermore, with the rapid growth of IoT, there is an urgent need of security authentication and confidential data protection. Authentication protocols based on elliptic curve cryptographic (ECC) were widely investigated and implemented to guarantee protection against the various attacks that can suffer an RFID system. In this paper, we are going to focus on a comparative study between the most efficient ECC-based RFID authentication protocols that are already published, and study their security against the different wireless attacks.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122872186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-28DOI: 10.1109/SETIT54465.2022.9875823
Yassin Kortli, Souhir Gabsi, L. L. Y. Lew Yan Voon, M. Jridi
In recent years, driver fatigue and drowsiness have been presented as the main factors of road accidents with a high rate of passenger deaths, injuries and property losses. In this paper, we developed a monitoring system for vehicle drivers that detects and warns of the presence of fatigue and drowsiness through computer vision or machine vision. Our developed system consists of four steps: training of the classifier to perform the detection module, image acquisition and processing, detection and alarm activation. Firstly, training of classifier was performed using Haar technique to locate face features. Secondly, a Jetson Xavier NX or Pynq Z1 development board was used to perform real-time video using a 4K camera, thirdly, we use the training classifier to detect the face image and facial landmark algorithm proposed by Kazemi & Sullivan to detect face features. Finally, our system analyses the state characteristics of the eyes; once the processing is completed, the detection of drowsiness and fatigue is carried out.
{"title":"Design of ADAS Fatigue Control System using Pynq z1 and Jetson Xavier NX","authors":"Yassin Kortli, Souhir Gabsi, L. L. Y. Lew Yan Voon, M. Jridi","doi":"10.1109/SETIT54465.2022.9875823","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875823","url":null,"abstract":"In recent years, driver fatigue and drowsiness have been presented as the main factors of road accidents with a high rate of passenger deaths, injuries and property losses. In this paper, we developed a monitoring system for vehicle drivers that detects and warns of the presence of fatigue and drowsiness through computer vision or machine vision. Our developed system consists of four steps: training of the classifier to perform the detection module, image acquisition and processing, detection and alarm activation. Firstly, training of classifier was performed using Haar technique to locate face features. Secondly, a Jetson Xavier NX or Pynq Z1 development board was used to perform real-time video using a 4K camera, thirdly, we use the training classifier to detect the face image and facial landmark algorithm proposed by Kazemi & Sullivan to detect face features. Finally, our system analyses the state characteristics of the eyes; once the processing is completed, the detection of drowsiness and fatigue is carried out.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123034902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-28DOI: 10.1109/SETIT54465.2022.9875700
Houneida Sakly, Mourad Said, M. Tagina
The development of further treatment techniques in the prognosis of terminal heart failure has recently been influenced by innovative mechanical circulatory systems in the medical profession. The need for cardiac intervention may be determined by the patient's condition. Implantable left ventricular assist devices may be used to replace it in some circumstances left ventricular assist devices. Mechanical assistance of the failing left ventricle enables optimal hemodynamic stability and recovery of secondary organ failure for patients suffering from heart failure. These devices can help the expert until a suitable cardiac allograft becomes available, but they are also used as a last resort for individuals who are not transplant candidates. Furthermore, left ventricular assist devices implantation, requires a second heart procedure, which comes with its own set of dangers and perioperative difficulties during the waiting period. The surgical problem arises when a left ventricular assist devices is already installed after a heart transplant at home. Implementation of the HeartWare System When compared to pulsatile devices, tracking is thought to be more versatile and long-lasting. Our key contribution in this regard is to use of computational fluid dynamics modules to assess the velocity behavior as well as the flow heart rate while taking into account the physical features of blood flow.
{"title":"Left ventricular assist device: CFD Simulation of Flow HeartWare","authors":"Houneida Sakly, Mourad Said, M. Tagina","doi":"10.1109/SETIT54465.2022.9875700","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875700","url":null,"abstract":"The development of further treatment techniques in the prognosis of terminal heart failure has recently been influenced by innovative mechanical circulatory systems in the medical profession. The need for cardiac intervention may be determined by the patient's condition. Implantable left ventricular assist devices may be used to replace it in some circumstances left ventricular assist devices. Mechanical assistance of the failing left ventricle enables optimal hemodynamic stability and recovery of secondary organ failure for patients suffering from heart failure. These devices can help the expert until a suitable cardiac allograft becomes available, but they are also used as a last resort for individuals who are not transplant candidates. Furthermore, left ventricular assist devices implantation, requires a second heart procedure, which comes with its own set of dangers and perioperative difficulties during the waiting period. The surgical problem arises when a left ventricular assist devices is already installed after a heart transplant at home. Implementation of the HeartWare System When compared to pulsatile devices, tracking is thought to be more versatile and long-lasting. Our key contribution in this regard is to use of computational fluid dynamics modules to assess the velocity behavior as well as the flow heart rate while taking into account the physical features of blood flow.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123671561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-28DOI: 10.1109/SETIT54465.2022.9875601
M. Cimino, Manel Ennahedh, Federico A. Galatolo, N. Hariga-Tlatli, I. Nouiri, N. Perilli, J. Tarhouni
This paper introduces a novel method and tools for groundwater modeling. The purpose is to perform numerical approximations of a groundwater system, for unlocking and paving water management problems and supporting decision-making processes. In the last decade, Data-driven Models (DdMs) have attracted increasing attention for their efficient development made possible by modern remote and ground sensing and learning technologies. With respect to conventional Process-driven Models (PdMs), based on mathematical modeling of core physical processes into a system of equations, a DdM requires less human effort and process-specific knowledge. The paper covers the design and simulation of a deep learning modeling tool based on Convolutional Neural Networks, integrated with the design and simulation of the workflow based on the Business Process Model and Notation (BPMN). Experimental results clearly show the potential of the novel approach for scientists and policy makers.
{"title":"A machine learning approach for groundwater modeling","authors":"M. Cimino, Manel Ennahedh, Federico A. Galatolo, N. Hariga-Tlatli, I. Nouiri, N. Perilli, J. Tarhouni","doi":"10.1109/SETIT54465.2022.9875601","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875601","url":null,"abstract":"This paper introduces a novel method and tools for groundwater modeling. The purpose is to perform numerical approximations of a groundwater system, for unlocking and paving water management problems and supporting decision-making processes. In the last decade, Data-driven Models (DdMs) have attracted increasing attention for their efficient development made possible by modern remote and ground sensing and learning technologies. With respect to conventional Process-driven Models (PdMs), based on mathematical modeling of core physical processes into a system of equations, a DdM requires less human effort and process-specific knowledge. The paper covers the design and simulation of a deep learning modeling tool based on Convolutional Neural Networks, integrated with the design and simulation of the workflow based on the Business Process Model and Notation (BPMN). Experimental results clearly show the potential of the novel approach for scientists and policy makers.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126075247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}