首页 > 最新文献

2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)最新文献

英文 中文
An Analysis of Screen Resolution Effects on Battery Endurance: A Case of Smartphones 屏幕分辨率对电池续航能力的影响分析:以智能手机为例
Simon Hlekisana Muchinenyika, Hippolyte N’sung-Nza Muyingi
Most computing capabilities are fast migrating from hardware to software. Despite this having a tendency of lowering energy consumption within devices, increase in computing capacity, improved display capabilities, and huge memory demands cancel out optimal energy savings. Software developers have to rely on code instrumentation as the sole source of data to apply energy optimisation techniques. However, code instrumentation abstracts hardware features and rely on logs from software modules to represent energy consumption. Test cases have to be carefully planned as well to have meaningful logs, as use cases are usually diverse for mobile. Apart from reviewing techniques used to assess energy consumption on mobile platforms, this paper presents an analysis of hardware advancements on smartphones in an attempt to expose the underlying hardware characteristics which are generally abstracted to software developers. An understanding of such features is essential as software in itself does not consume energy, but does that indirectly through hardware it controls. Software projects can then be planned and designed to match the hardware characteristics without compromising much on energy consumption.
大多数计算能力正在快速地从硬件迁移到软件。尽管这有降低设备能耗的趋势,但计算能力的增加、显示能力的改进和巨大的内存需求抵消了最佳的节能效果。软件开发人员必须依赖代码检测作为应用能量优化技术的唯一数据源。然而,代码插装抽象了硬件特性,并依赖软件模块的日志来表示能耗。测试用例必须仔细规划,以获得有意义的日志,因为手机用例通常是多种多样的。除了回顾用于评估移动平台能源消耗的技术外,本文还分析了智能手机上的硬件进步,试图揭示通常抽象给软件开发人员的底层硬件特征。了解这些特性是必要的,因为软件本身并不消耗能量,而是通过它所控制的硬件间接地消耗能量。然后,可以计划和设计软件项目以匹配硬件特性,而不会在能源消耗上做出太多妥协。
{"title":"An Analysis of Screen Resolution Effects on Battery Endurance: A Case of Smartphones","authors":"Simon Hlekisana Muchinenyika, Hippolyte N’sung-Nza Muyingi","doi":"10.1109/SETIT54465.2022.9875592","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875592","url":null,"abstract":"Most computing capabilities are fast migrating from hardware to software. Despite this having a tendency of lowering energy consumption within devices, increase in computing capacity, improved display capabilities, and huge memory demands cancel out optimal energy savings. Software developers have to rely on code instrumentation as the sole source of data to apply energy optimisation techniques. However, code instrumentation abstracts hardware features and rely on logs from software modules to represent energy consumption. Test cases have to be carefully planned as well to have meaningful logs, as use cases are usually diverse for mobile. Apart from reviewing techniques used to assess energy consumption on mobile platforms, this paper presents an analysis of hardware advancements on smartphones in an attempt to expose the underlying hardware characteristics which are generally abstracted to software developers. An understanding of such features is essential as software in itself does not consume energy, but does that indirectly through hardware it controls. Software projects can then be planned and designed to match the hardware characteristics without compromising much on energy consumption.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133097458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Refinement Approach for Node Localization Using Dynamic Cell Structures Neural Networks 基于动态细胞结构神经网络的节点定位改进方法
Mohsen Othmani, T. Ezzedine
Wireless Sensor Network (WSN) localization is still an open topic for improvement and continues to prove its necessity in our daily life in parallel with the technological evolution and our needs in various fields. The issue of energy efficiency and network lifetime extension, localization, secure data communication, latency reduction, efficient quality of service, data communication assurance, high scalability also remain topics for improvement.In a context of indoor localization based on learning a database of collected RSSI values, we detail how to proceed with a refinement approach in order to gain in memory, execution time, and localization accuracy. We took advantage of our previous studies in which dynamic cell structure neural networks (DCSNN) have proven superior performance to apply our approach.The results obtained show a memory gain of 82% relative to the data to be extracted from the training database and to be learned, and consequently a gain in execution time and energy consumed. The precision of the coordinates is about 0.031m.Note that the training database is presented as a matrix of RSSI (Received Signal Strength Indicator) values collected by the anchor nodes for each reference point.
随着技术的发展和各个领域的需求,无线传感器网络(WSN)的定位仍然是一个有待改进的开放话题,并不断证明其在我们日常生活中的必要性。能源效率和网络寿命延长、本地化、安全数据通信、降低延迟、高效服务质量、数据通信保证、高可扩展性等问题也仍有待改进。在基于学习收集的RSSI值数据库进行室内定位的背景下,我们详细介绍了如何使用改进方法来获得内存、执行时间和定位精度。我们利用我们之前的研究,其中动态细胞结构神经网络(DCSNN)已经证明了优越的性能来应用我们的方法。获得的结果显示,相对于从训练数据库中提取和学习的数据,内存增加了82%,因此执行时间和消耗的能量增加了。坐标精度约为0.031m。请注意,训练数据库以锚节点为每个参考点收集的RSSI (Received Signal Strength Indicator,接收信号强度指标)值矩阵的形式呈现。
{"title":"Refinement Approach for Node Localization Using Dynamic Cell Structures Neural Networks","authors":"Mohsen Othmani, T. Ezzedine","doi":"10.1109/SETIT54465.2022.9875494","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875494","url":null,"abstract":"Wireless Sensor Network (WSN) localization is still an open topic for improvement and continues to prove its necessity in our daily life in parallel with the technological evolution and our needs in various fields. The issue of energy efficiency and network lifetime extension, localization, secure data communication, latency reduction, efficient quality of service, data communication assurance, high scalability also remain topics for improvement.In a context of indoor localization based on learning a database of collected RSSI values, we detail how to proceed with a refinement approach in order to gain in memory, execution time, and localization accuracy. We took advantage of our previous studies in which dynamic cell structure neural networks (DCSNN) have proven superior performance to apply our approach.The results obtained show a memory gain of 82% relative to the data to be extracted from the training database and to be learned, and consequently a gain in execution time and energy consumed. The precision of the coordinates is about 0.031m.Note that the training database is presented as a matrix of RSSI (Received Signal Strength Indicator) values collected by the anchor nodes for each reference point.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124935653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TD-MQTT: Transparent Distributed MQTT Brokers for Horizontal IoT Applications TD-MQTT:用于水平物联网应用的透明分布式MQTT代理
Fatma Hmissi, Sofiane Ouni
MQTT (Message Queuing Telemetry Transport) has become the perfect messaging protocol for IoT (Internet of Things) systems since it is the lightest protocol designed for low bandwidth, high-latency, unreliable networks. Today, the strategy of distributing several MQTT brokers on the networks is widely used because the strategy of using a single broker is no longer efficient. However, in the distributing architectures of MQTT brokers, a subscriber should have prior knowledge about the address of the broker that publishes the data on the topics of interest. In this paper, we tackle this challenge by proposing a mechanism that connects the subscribers to the brokers in a transparent way. The proposed approach, known as TD-MQTT (Transparent Distributed MQTT brokers), requires no prior knowledge of the brokers by the subscribers. The data will be carried automatically from brokers that can change their configuration and location. The transparency will help to use IoT data without worrying about their location and dynamic configuration changes. To evaluate our approach, we compared it with the basic distributed MQTT and the EMMA (MQTT Middle-ware for Edge Computing Applications) approach. The results of the evaluation show that TD-MQTT is much better than the standard MQTT, especially in terms of response time.
MQTT(消息队列遥测传输)已经成为IoT(物联网)系统的完美消息传递协议,因为它是为低带宽,高延迟,不可靠的网络设计的最轻的协议。如今,在网络上分布多个MQTT代理的策略被广泛使用,因为使用单个代理的策略不再有效。但是,在MQTT代理的分布式体系结构中,订阅者应该事先知道发布有关感兴趣主题的数据的代理的地址。在本文中,我们通过提出一种以透明的方式将订阅者连接到代理的机制来解决这一挑战。所建议的方法称为TD-MQTT(透明分布式MQTT代理),它不需要订阅者事先了解代理。数据将从可以更改其配置和位置的代理自动传输。透明度将有助于使用物联网数据,而无需担心其位置和动态配置变化。为了评估我们的方法,我们将其与基本的分布式MQTT和EMMA(用于边缘计算应用程序的MQTT中间件)方法进行了比较。评估结果表明,TD-MQTT比标准MQTT要好得多,特别是在响应时间方面。
{"title":"TD-MQTT: Transparent Distributed MQTT Brokers for Horizontal IoT Applications","authors":"Fatma Hmissi, Sofiane Ouni","doi":"10.1109/SETIT54465.2022.9875881","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875881","url":null,"abstract":"MQTT (Message Queuing Telemetry Transport) has become the perfect messaging protocol for IoT (Internet of Things) systems since it is the lightest protocol designed for low bandwidth, high-latency, unreliable networks. Today, the strategy of distributing several MQTT brokers on the networks is widely used because the strategy of using a single broker is no longer efficient. However, in the distributing architectures of MQTT brokers, a subscriber should have prior knowledge about the address of the broker that publishes the data on the topics of interest. In this paper, we tackle this challenge by proposing a mechanism that connects the subscribers to the brokers in a transparent way. The proposed approach, known as TD-MQTT (Transparent Distributed MQTT brokers), requires no prior knowledge of the brokers by the subscribers. The data will be carried automatically from brokers that can change their configuration and location. The transparency will help to use IoT data without worrying about their location and dynamic configuration changes. To evaluate our approach, we compared it with the basic distributed MQTT and the EMMA (MQTT Middle-ware for Edge Computing Applications) approach. The results of the evaluation show that TD-MQTT is much better than the standard MQTT, especially in terms of response time.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127759912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Review and evaluation of OTP-Based authentication schemes in the metering systems of smart grids 智能电网计量系统中基于otp的认证方案综述与评价
Hind El Makhtoum, Youssef Bentaleb
Metering systems in smart grids are the components that store, transmit and process critical data about customers and their energy use. These systems communicate with users’ devices, technicians, and utility control systems, namely MDMS, substations… Consequently, smart meters are a tempting target for intrusion and falsification attacks that may have devastating consequences on the electrical grid and user’s private life. In order to tackle eventual vulnerabilities, the One-Time-Password (OTP) is a promising technique to ensure privacy and access control to smart meters as it is claimed to have better results on safeguarding access. In this paper, we highlight the current existing OTP-based authentication approaches in the metering systems. First, we investigate the privacy issues that are related to smart meters. Additionally, we highlight significant attacks and security parameters that we will include in our evaluation. Furthermore, we will analyze the selected schemes and propose some recommendations. Finally, we will discuss limitations, challenges, and future scopes of the analyzed schemes to help future researchers use the OTP technique securely and efficiently.
智能电网中的计量系统是存储、传输和处理客户及其能源使用关键数据的组件。这些系统与用户的设备,技术人员和公用事业控制系统,即MDMS,变电站进行通信……因此,智能电表是入侵和伪造攻击的诱人目标,可能对电网和用户的私人生活造成毁灭性的后果。为了解决最终的漏洞,一次性密码(OTP)是一种很有前途的技术,可以确保智能电表的隐私和访问控制,因为它据称在保护访问方面有更好的结果。本文重点介绍了计量系统中现有的基于otp的认证方法。首先,我们调查了与智能电表相关的隐私问题。此外,我们强调了我们将在评估中包含的重大攻击和安全参数。此外,我们将对选定的方案进行分析并提出一些建议。最后,我们将讨论所分析方案的局限性、挑战和未来范围,以帮助未来的研究人员安全有效地使用OTP技术。
{"title":"Review and evaluation of OTP-Based authentication schemes in the metering systems of smart grids","authors":"Hind El Makhtoum, Youssef Bentaleb","doi":"10.1109/SETIT54465.2022.9875937","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875937","url":null,"abstract":"Metering systems in smart grids are the components that store, transmit and process critical data about customers and their energy use. These systems communicate with users’ devices, technicians, and utility control systems, namely MDMS, substations… Consequently, smart meters are a tempting target for intrusion and falsification attacks that may have devastating consequences on the electrical grid and user’s private life. In order to tackle eventual vulnerabilities, the One-Time-Password (OTP) is a promising technique to ensure privacy and access control to smart meters as it is claimed to have better results on safeguarding access. In this paper, we highlight the current existing OTP-based authentication approaches in the metering systems. First, we investigate the privacy issues that are related to smart meters. Additionally, we highlight significant attacks and security parameters that we will include in our evaluation. Furthermore, we will analyze the selected schemes and propose some recommendations. Finally, we will discuss limitations, challenges, and future scopes of the analyzed schemes to help future researchers use the OTP technique securely and efficiently.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116598093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Implementation of an Embedded Vision System for Industrial Inspection 工业检测嵌入式视觉系统的设计与实现
Intissar Sayahi, Sarra Ismail
Nowadays, the advantages offered by image processing and deep learning increased their efficiency popularity. Thus, vision systems are widely motivating researchers to develop new protocols and features to optimize existing ones. Of course, technical challenges do not lack since the integration of image acquisition and processing units industrial environment poses considerable problems. In context, we adopted in our work the hybrid approach combining hardware design and software development. This approach makes the system compact, robust and reliable, especially in industrial field to ensure several operations quality inspection and verification. The proposed solution is to design an industrial embedded vision system that matches scalable hardware architectures to adaptable algorithms. this paper, we propose an efficient model to automate quality control in an industrial production line. This work aims to integrate the concept of the multi-tasking image processing in the manufacturing field by offering a whole pack of various inspection operations, from surface to dimensional inspections, based on simple hardware implementations, optical setups, and deep learning algorithms.
如今,图像处理和深度学习所提供的优势增加了它们的效率和普及程度。因此,视觉系统正在广泛激励研究人员开发新的协议和功能来优化现有的协议和功能。当然,技术上的挑战也不缺少,因为图像采集和处理单元的集成在工业环境中提出了相当大的问题。在上下文中,我们在工作中采用了硬件设计和软件开发相结合的混合方法。这种方法使系统结构紧凑、鲁棒性强、可靠性高,尤其在工业现场保证了多次操作的质量检验和验证。提出的解决方案是设计一个工业嵌入式视觉系统,将可扩展的硬件架构与自适应算法相匹配。本文提出了一种有效的自动化工业生产线质量控制模型。这项工作旨在通过提供一整套基于简单硬件实现、光学设置和深度学习算法的各种检测操作,从表面到尺寸检测,将多任务图像处理的概念整合到制造领域。
{"title":"Design and Implementation of an Embedded Vision System for Industrial Inspection","authors":"Intissar Sayahi, Sarra Ismail","doi":"10.1109/SETIT54465.2022.9875471","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875471","url":null,"abstract":"Nowadays, the advantages offered by image processing and deep learning increased their efficiency popularity. Thus, vision systems are widely motivating researchers to develop new protocols and features to optimize existing ones. Of course, technical challenges do not lack since the integration of image acquisition and processing units industrial environment poses considerable problems. In context, we adopted in our work the hybrid approach combining hardware design and software development. This approach makes the system compact, robust and reliable, especially in industrial field to ensure several operations quality inspection and verification. The proposed solution is to design an industrial embedded vision system that matches scalable hardware architectures to adaptable algorithms. this paper, we propose an efficient model to automate quality control in an industrial production line. This work aims to integrate the concept of the multi-tasking image processing in the manufacturing field by offering a whole pack of various inspection operations, from surface to dimensional inspections, based on simple hardware implementations, optical setups, and deep learning algorithms.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114862134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Low-Noise Injection-Locked Ring Oscillator for biomedical implants applications 用于生物医学植入物的低噪声注射锁定环形振荡器
Nadia Gargouri, M. Samet, Z. Sakka
This paper presents an Injection Locked Ring Oscillator (ILRO) for use in biomedical implants applications. A pulse injection locking method has been desired for ring oscillator performance enhancement and phase noise cancellation. In addition, the frequency is controlled independently of the biasing circuit using an inversion mode MOS voltage controlled capacitor (varactor).Designed in a 0.18-μm CMOS, this ILRO works inthe ISM band of 902–928 GHz and consumes a lowpower of 4.62 mW under 1.8V power supply. The phase noise of -121.6dBc /Hz at 1MHzoffset frequency was obtained at 76 MHz inputinjection pulse.The proposed circuit can achieve a FoM of -174.19 dBc/Hz.
本文介绍了一种用于生物医学植入物的注射锁环振荡器(ILRO)。为了提高环形振荡器的性能和消除相位噪声,需要一种脉冲注入锁定方法。此外,频率控制独立于偏置电路,使用反转模式MOS压控电容器(变容管)。该ILRO采用0.18 μm CMOS设计,工作在902-928 GHz的ISM频段,在1.8V电源下功耗为4.62 mW。在76 MHz输入注入脉冲下,在1mhz偏置频率下得到-121.6dBc /Hz的相位噪声。该电路可实现-174.19 dBc/Hz的波形。
{"title":"A Low-Noise Injection-Locked Ring Oscillator for biomedical implants applications","authors":"Nadia Gargouri, M. Samet, Z. Sakka","doi":"10.1109/SETIT54465.2022.9875516","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875516","url":null,"abstract":"This paper presents an Injection Locked Ring Oscillator (ILRO) for use in biomedical implants applications. A pulse injection locking method has been desired for ring oscillator performance enhancement and phase noise cancellation. In addition, the frequency is controlled independently of the biasing circuit using an inversion mode MOS voltage controlled capacitor (varactor).Designed in a 0.18-μm CMOS, this ILRO works inthe ISM band of 902–928 GHz and consumes a lowpower of 4.62 mW under 1.8V power supply. The phase noise of -121.6dBc /Hz at 1MHzoffset frequency was obtained at 76 MHz inputinjection pulse.The proposed circuit can achieve a FoM of -174.19 dBc/Hz.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129894902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Maximizing The Lifetime of WSN Using Hybrid Energy Harvesting Approach 利用混合能量收集方法最大化无线传感器网络的寿命
Boulerial Dalila, Kechar Bouabdellah, Benzerbadj Ali
The 21st century is marked by a remarkable expansion of IoT. This technology that allows us to connect with our objects permanently and thus monitor each interaction that may be crucial in our daily life. And among the most important bronchi of this technology we are interested in wireless sensor networks with mobile sink (WSN-MS1 for short). These networks, while being very useful and efficient in the world of internet of things (IoT)[33],[34], they face serious challenges, particularly that of the battery which ensures them a very limited lifetime, as well as the problem of the broken links between the transmitting nodes and the mobile sink. In this paper, we have proposed a new approach EH-HXMAC that solves the first problem by collecting ambient energy from the two most powerful sources (the sun and the wind), and by acting on the duty cycle of the emitting nodes. To remedy the second problem, we have resorted to the Handover technique which ensures data transmission integrity between the sensor and the mobile sink. The results of the simulation carried out by the Cooja Contiki simulator show that the combination of these three techniques provides an improvement in terms of network lifetime , throughput and received packets number.
21世纪的标志是物联网的显著扩张。这项技术使我们能够永久地与我们的物体连接,从而监控我们日常生活中可能至关重要的每一次互动。在这项技术最重要的分支中,我们对带有移动接收器的无线传感器网络(简称WSN-MS1)感兴趣。这些网络虽然在物联网(IoT)世界中非常有用和高效[33],[34],但它们面临着严峻的挑战,特别是确保它们非常有限的使用寿命的电池,以及传输节点和移动接收器之间链路断开的问题。在本文中,我们提出了一种新的EH-HXMAC方法,通过从两个最强大的来源(太阳和风)收集环境能量,并通过作用于发射节点的占空比来解决第一个问题。为了解决第二个问题,我们采用了确保传感器和移动接收器之间数据传输完整性的切换技术。在Cooja Contiki模拟器上进行的仿真结果表明,这三种技术的结合在网络生存期、吞吐量和接收包数方面都有改善。
{"title":"Maximizing The Lifetime of WSN Using Hybrid Energy Harvesting Approach","authors":"Boulerial Dalila, Kechar Bouabdellah, Benzerbadj Ali","doi":"10.1109/SETIT54465.2022.9875757","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875757","url":null,"abstract":"The 21st century is marked by a remarkable expansion of IoT. This technology that allows us to connect with our objects permanently and thus monitor each interaction that may be crucial in our daily life. And among the most important bronchi of this technology we are interested in wireless sensor networks with mobile sink (WSN-MS1 for short). These networks, while being very useful and efficient in the world of internet of things (IoT)[33],[34], they face serious challenges, particularly that of the battery which ensures them a very limited lifetime, as well as the problem of the broken links between the transmitting nodes and the mobile sink. In this paper, we have proposed a new approach EH-HXMAC that solves the first problem by collecting ambient energy from the two most powerful sources (the sun and the wind), and by acting on the duty cycle of the emitting nodes. To remedy the second problem, we have resorted to the Handover technique which ensures data transmission integrity between the sensor and the mobile sink. The results of the simulation carried out by the Cooja Contiki simulator show that the combination of these three techniques provides an improvement in terms of network lifetime , throughput and received packets number.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125900998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
cybclass: classification approach for cybersecurity in industry 4.0 网络类:工业4.0中网络安全的分类方法
Salma Laazizi, Jihan Ben Azzouz, A. Jemai
Cyberinfrastructure is characterized by a large amount of emerging and dynamic information, requiring a large number of cyber-criminals trying to acquire information, data mining, machine learning, measurements, and other interdisciplinary skills to meet the cybersecurity issues in Industry 4.0. Machine learning and information mining play an important role in cybersecurity, and unstable information frequently has a high-dimensional feature space. The presence of several noisy characteristics among high-dimensional features might impede and degrade classifier performance. To address this issue, feature selection and subspace methods have been put out and assessed during the past few years. In this paper, four classification techniques and a feature selection strategy are implemented to detect attacks that threaten Industry 4.0. These techniques are Random Forest (RF), Decision Trees (J48), Support Vector Machines (SVM), and Naive Bayes (NB) with Feature Selection Strategy (CFS). Several experiments have been performed using the train and test NSL-KDD datasets with good results. These are based on four categories: Denial of Service (DoS) attack, Probing Attack, User-to-Root (U2R) attack, and Remote-to-Local (R2L) attack. To improve the detection rate of these attacks, a strategy combining multiple classification algorithms is implemented.
网络基础设施具有大量新兴和动态信息的特点,需要大量网络犯罪分子试图获取信息、数据挖掘、机器学习、测量等跨学科技能,以满足工业4.0中的网络安全问题。机器学习和信息挖掘在网络安全中发挥着重要作用,不稳定信息往往具有高维特征空间。在高维特征中存在一些噪声特征可能会阻碍和降低分类器的性能。为了解决这个问题,在过去的几年里,人们提出并评估了特征选择和子空间方法。本文采用了四种分类技术和一种特征选择策略来检测威胁工业4.0的攻击。这些技术是随机森林(RF),决策树(J48),支持向量机(SVM)和朴素贝叶斯(NB)与特征选择策略(CFS)。利用训练和测试NSL-KDD数据集进行了多次实验,取得了良好的效果。这些攻击基于四种类型:拒绝服务(DoS)攻击、探测攻击、用户到根(U2R)攻击和远程到本地(R2L)攻击。为了提高这些攻击的检出率,采用了多种分类算法相结合的策略。
{"title":"cybclass: classification approach for cybersecurity in industry 4.0","authors":"Salma Laazizi, Jihan Ben Azzouz, A. Jemai","doi":"10.1109/SETIT54465.2022.9875643","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875643","url":null,"abstract":"Cyberinfrastructure is characterized by a large amount of emerging and dynamic information, requiring a large number of cyber-criminals trying to acquire information, data mining, machine learning, measurements, and other interdisciplinary skills to meet the cybersecurity issues in Industry 4.0. Machine learning and information mining play an important role in cybersecurity, and unstable information frequently has a high-dimensional feature space. The presence of several noisy characteristics among high-dimensional features might impede and degrade classifier performance. To address this issue, feature selection and subspace methods have been put out and assessed during the past few years. In this paper, four classification techniques and a feature selection strategy are implemented to detect attacks that threaten Industry 4.0. These techniques are Random Forest (RF), Decision Trees (J48), Support Vector Machines (SVM), and Naive Bayes (NB) with Feature Selection Strategy (CFS). Several experiments have been performed using the train and test NSL-KDD datasets with good results. These are based on four categories: Denial of Service (DoS) attack, Probing Attack, User-to-Root (U2R) attack, and Remote-to-Local (R2L) attack. To improve the detection rate of these attacks, a strategy combining multiple classification algorithms is implemented.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121872499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum cryptography for the benefit of API keys safety 量子加密有利于API密钥的安全
Aymen Ramadhan Ghilen, Amel Mohamed Zahou, Wiem Abedelmonem Ben Khalifa
To cope with the unauthorized access to the cloud treasure of resources and services, several cloud service providers implement the API-based access control approach and grant thus a full authentication of any client application. Once called, each cloud API (Application Programming Interface) is required to authenticate through a secret access key, commonly termed API key. A plethora of security risks is associated with these keys whether during their generation, storage, or utilization. The hardware secure element-based proposal aims for an end-to-end security between a cloud service provider and a client application. To ensure a reliable and secure API key exchange, the concerned entities rely on Public Key Infrastructure (PKI). As soon as an adversary acquires an unbounded computing power, it would be easy to intercept the keys and then unlock the gate behind the valuables over the cloud. In this paper, we propose a revised scheme that discards the PKI and installs a quantum mechanism to mutually authenticate the secure element and the cloud service provider by establishing a set of shared keys. A pioneering absolute security of the presented approach is warranted by the principles of quantum physics. To analyze the security of the quantum technology, we establish a formal verification based on PRISM model checking tool. We outstandingly focus on satisfying two prominent properties: (i) both the parties engaged in the quantum protocol are able to detect any disallowed eavesdropping and (ii) the valid amount of information caught by an adversary on the installed key must be negligible.
为了应对对云资源和服务宝库的未经授权的访问,一些云服务提供商实现了基于api的访问控制方法,并因此授予任何客户端应用程序的完整身份验证。一旦被调用,每个云API(应用程序编程接口)都需要通过一个秘密访问密钥(通常称为API密钥)进行身份验证。无论是在密钥的生成、存储还是使用过程中,大量的安全风险都与这些密钥相关。基于硬件安全元素的建议旨在实现云服务提供商和客户端应用程序之间的端到端安全性。为确保可靠和安全的API密码匙交换,有关实体依靠公开密码匙基础设施(PKI)。一旦对手获得了无限的计算能力,就很容易拦截密钥,然后在云上打开贵重物品背后的大门。在本文中,我们提出了一个改进方案,该方案抛弃了PKI,并安装了一个量子机制,通过建立一组共享密钥来相互认证安全元素和云服务提供商。量子物理原理保证了所提出方法的开创性绝对安全性。为了分析量子技术的安全性,我们建立了一个基于PRISM模型检验工具的形式化验证。我们特别注重满足两个突出的特性:(i)参与量子协议的双方都能够检测到任何不被允许的窃听;(ii)对手在安装的密钥上捕获的有效信息量必须可以忽略不计。
{"title":"Quantum cryptography for the benefit of API keys safety","authors":"Aymen Ramadhan Ghilen, Amel Mohamed Zahou, Wiem Abedelmonem Ben Khalifa","doi":"10.1109/SETIT54465.2022.9875712","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875712","url":null,"abstract":"To cope with the unauthorized access to the cloud treasure of resources and services, several cloud service providers implement the API-based access control approach and grant thus a full authentication of any client application. Once called, each cloud API (Application Programming Interface) is required to authenticate through a secret access key, commonly termed API key. A plethora of security risks is associated with these keys whether during their generation, storage, or utilization. The hardware secure element-based proposal aims for an end-to-end security between a cloud service provider and a client application. To ensure a reliable and secure API key exchange, the concerned entities rely on Public Key Infrastructure (PKI). As soon as an adversary acquires an unbounded computing power, it would be easy to intercept the keys and then unlock the gate behind the valuables over the cloud. In this paper, we propose a revised scheme that discards the PKI and installs a quantum mechanism to mutually authenticate the secure element and the cloud service provider by establishing a set of shared keys. A pioneering absolute security of the presented approach is warranted by the principles of quantum physics. To analyze the security of the quantum technology, we establish a formal verification based on PRISM model checking tool. We outstandingly focus on satisfying two prominent properties: (i) both the parties engaged in the quantum protocol are able to detect any disallowed eavesdropping and (ii) the valid amount of information caught by an adversary on the installed key must be negligible.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121931630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic Sign recognition for smart vehicles based on lightweight CNN implementation on mobile devices 基于移动设备上轻量级CNN实现的智能车辆交通标志识别
R. Ayachi, Mouna Afif, Y. Said, A. B. Abdelali
The concept of smart vehicles is becoming an essential feature that ensures driver comfort and security. Smart vehicles are equipped with intelligent systems based on advanced technologies that perform a set of tasks for the mentioned purposes. Recognizing Traffic sign is one the most important systems that guarantee a high-security level. However, it is difficult to develop the best traffic sign recognition system due to numerous obstacles. such as weather conditions, geometric deformation, and most important is the material limitation. In this work, we proposed the implementation of a lightweight convolutional neural network (CNN) model on a mobile device to overcome the mentioned challenges. The proposed CNN combines high performances and low computation complexity. Evaluating the proposed model on publicly available datasets proved its efficiency. Besides, the implementation of the CNN model on the pynq platform demonstrates the possibility of using a wide range of mobile devices for the inference of the proposed model.
智能汽车的概念正在成为确保驾驶员舒适和安全的基本特征。智能车辆配备了基于先进技术的智能系统,可以执行上述目的的一系列任务。交通标志识别是保证交通安全的重要系统之一。然而,由于障碍众多,很难开发出最佳的交通标志识别系统。如天气条件,几何变形,最重要的是材料的限制。在这项工作中,我们提出了在移动设备上实现轻量级卷积神经网络(CNN)模型来克服上述挑战。本文提出的CNN结合了高性能和低计算复杂度。通过对公开数据集的评估,证明了该模型的有效性。此外,CNN模型在pynq平台上的实现证明了使用广泛的移动设备对所提出的模型进行推理的可能性。
{"title":"Traffic Sign recognition for smart vehicles based on lightweight CNN implementation on mobile devices","authors":"R. Ayachi, Mouna Afif, Y. Said, A. B. Abdelali","doi":"10.1109/SETIT54465.2022.9875912","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875912","url":null,"abstract":"The concept of smart vehicles is becoming an essential feature that ensures driver comfort and security. Smart vehicles are equipped with intelligent systems based on advanced technologies that perform a set of tasks for the mentioned purposes. Recognizing Traffic sign is one the most important systems that guarantee a high-security level. However, it is difficult to develop the best traffic sign recognition system due to numerous obstacles. such as weather conditions, geometric deformation, and most important is the material limitation. In this work, we proposed the implementation of a lightweight convolutional neural network (CNN) model on a mobile device to overcome the mentioned challenges. The proposed CNN combines high performances and low computation complexity. Evaluating the proposed model on publicly available datasets proved its efficiency. Besides, the implementation of the CNN model on the pynq platform demonstrates the possibility of using a wide range of mobile devices for the inference of the proposed model.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126550429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1