首页 > 最新文献

2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

英文 中文
Secure and Fraud Proof Online Payment System for Credit Cards 安全和防欺诈的信用卡在线支付系统
Baker Al Smadi, A. A. AlQahtani, Hosam Alamleh
Credit card fraud is one of the most critical threats affecting individuals and companies worldwide, particularly with the growing number of financial transactions involving credit cards every day. The most common threats are likely to come from database breaches and identity theft. All these threats put the security of financial transactions at severe risk and require a fundamental solution. This paper aims to suggest a secure online payment system that significantly improves credit card security. Our system can be particularly resilient to potential cyber-attacks, unauthorized users, man-in-the-middle, and guessing attacks for credit card number generation or illegal financial activities by utilizing a secure communication channel between the cardholder and server. Our system uses a shared secret and a verification token that allow both sides to communicate through an encrypted channel. Furthermore, our system is designed to generate a one-time credit card number at the user’s machine that is verified by the server without sharing the credit card number over the network. Our approach combines machine learning (ML) algorithms with unique temporary credit card numbers in one integrated system, which is the first approach in the online credit card protection system. The new security system generates a one-time-use credit card number for each transaction with a predetermined amount of money. Simultaneously, the system can detect potential fraud utilizing ML algorithm with new critical features such as the IMEI or IP address, the transaction’s location, and other features.
信用卡诈骗是影响全球个人和公司的最严重威胁之一,特别是随着每天涉及信用卡的金融交易数量的增加。最常见的威胁可能来自数据库泄露和身份盗窃。所有这些威胁使金融交易的安全面临严重风险,需要从根本上解决。本文旨在提出一个安全的在线支付系统,显著提高信用卡的安全性。通过利用持卡人和服务器之间的安全通信通道,我们的系统可以特别适应潜在的网络攻击、未经授权的用户、中间人、信用卡号码生成的猜测攻击或非法金融活动。我们的系统使用共享密钥和验证令牌,允许双方通过加密通道进行通信。此外,我们的系统被设计为在用户的机器上生成一次性信用卡号码,由服务器验证,而不通过网络共享信用卡号码。我们的方法将机器学习(ML)算法与唯一的临时信用卡号码结合在一个集成系统中,这是在线信用卡保护系统中的第一种方法。新的安全系统为每笔预定金额的交易生成一个一次性信用卡号码。同时,该系统可以利用ML算法检测潜在的欺诈行为,该算法具有新的关键特征,如IMEI或IP地址、交易位置和其他特征。
{"title":"Secure and Fraud Proof Online Payment System for Credit Cards","authors":"Baker Al Smadi, A. A. AlQahtani, Hosam Alamleh","doi":"10.1109/uemcon53757.2021.9666549","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666549","url":null,"abstract":"Credit card fraud is one of the most critical threats affecting individuals and companies worldwide, particularly with the growing number of financial transactions involving credit cards every day. The most common threats are likely to come from database breaches and identity theft. All these threats put the security of financial transactions at severe risk and require a fundamental solution. This paper aims to suggest a secure online payment system that significantly improves credit card security. Our system can be particularly resilient to potential cyber-attacks, unauthorized users, man-in-the-middle, and guessing attacks for credit card number generation or illegal financial activities by utilizing a secure communication channel between the cardholder and server. Our system uses a shared secret and a verification token that allow both sides to communicate through an encrypted channel. Furthermore, our system is designed to generate a one-time credit card number at the user’s machine that is verified by the server without sharing the credit card number over the network. Our approach combines machine learning (ML) algorithms with unique temporary credit card numbers in one integrated system, which is the first approach in the online credit card protection system. The new security system generates a one-time-use credit card number for each transaction with a predetermined amount of money. Simultaneously, the system can detect potential fraud utilizing ML algorithm with new critical features such as the IMEI or IP address, the transaction’s location, and other features.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114344327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Personalized Virtual Learning Environment Using Multiple Modeling Techniques 使用多种建模技术的个性化虚拟学习环境
R. R. Maaliw
Student learning optimization is one of the main goals of education. A conventional e-learning system fails to accomplish its true purpose due to the lack or absence of personalization features. This paper presents an end-to-end approach for supporting students’ diverse needs by classifying their learning styles in a virtual learning environment (VLE) and embedding the discovered knowledge in an adaptive e-learning system prototype. Furthermore, we validated different models’ accuracies and comparative consistencies to manual methods using 704,592 interactions log data of 898 learners. Quantitative results show that the Support Vector Machine (SVM) achieves cross-validated accuracies of 88%, 86%, and 87% (processing, perception & input) of the Felder-Silverman Learning Style Model (FSLSM) and the Decision Tree (DT) for the understanding dimension with 86% accuracy.
学生学习优化是教育的主要目标之一。由于缺乏个性化功能,传统的电子学习系统无法实现其真正的目的。本文提出了一种端到端的方法,通过在虚拟学习环境(VLE)中对学生的学习风格进行分类,并将发现的知识嵌入到自适应电子学习系统原型中,来支持学生的多样化需求。此外,我们使用898个学习者的704,592个交互日志数据验证了不同模型的准确性和与手动方法的比较一致性。定量结果表明,支持向量机(SVM)与Felder-Silverman学习风格模型(FSLSM)和决策树(DT)在理解维度上的交叉验证准确率分别为88%、86%和87%(处理、感知和输入),准确率为86%。
{"title":"A Personalized Virtual Learning Environment Using Multiple Modeling Techniques","authors":"R. R. Maaliw","doi":"10.1109/uemcon53757.2021.9666645","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666645","url":null,"abstract":"Student learning optimization is one of the main goals of education. A conventional e-learning system fails to accomplish its true purpose due to the lack or absence of personalization features. This paper presents an end-to-end approach for supporting students’ diverse needs by classifying their learning styles in a virtual learning environment (VLE) and embedding the discovered knowledge in an adaptive e-learning system prototype. Furthermore, we validated different models’ accuracies and comparative consistencies to manual methods using 704,592 interactions log data of 898 learners. Quantitative results show that the Support Vector Machine (SVM) achieves cross-validated accuracies of 88%, 86%, and 87% (processing, perception & input) of the Felder-Silverman Learning Style Model (FSLSM) and the Decision Tree (DT) for the understanding dimension with 86% accuracy.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"183 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113987778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Control and Monitoring System of Hydraulic Parameters for Rainbow Trout Culture 虹鳟鱼养殖水力参数控制与监测系统
Alem Huayta Uribe, Jalber Brayan Macuri Vasquez, Alexander Claudio Miranda Yauri, Deyby Huamanchahua
This research presents the design and control of an automatic monitoring system of the main water parameters for rainbow trout culture, which is a freshwater species distributed in the high Andean zones along with the Andes mountain range, which will be given through mechatronic systems. This work presents the control and monitoring of temperature, dissolved oxygen level, pH, and water level independently so that monitoring and control are simple. The procedure shows the use of different sensors that capture the water parameters such as the use of a Ceratex analog sensor to measure the pH, also the PT100 that will help us to calculate the temperature, and finally an Oxymax sensor for dissolved oxygen, all this helps us to extend the species and prevent its extinction, For the part of the programmed environment the information will be sent and displayed in the visual environment of the system, parallel to this the controller will act based on the information received, to maintain the water parameters in the appropriate range for rainbow trout, which are dissolved oxygen greater than 6 mg / l and less than 8. 5mg/l, within the temperature level, the species lives in waters of 9° to 14° C and with a pH of 6.6 to 7.9. In addition, the automatic mechatronic system implemented will facilitate and improve the monitoring and control of water parameters for rainbow trout culture.
虹鳟鱼是一种分布在安第斯山脉高海拔地区的淡水鱼类,本研究设计并控制了虹鳟鱼养殖主要水参数的自动监测系统,该系统将通过机电系统进行监测。这项工作提出了温度、溶解氧水平、pH值和水位的独立控制和监测,使监测和控制简单。该程序显示了使用不同的传感器来捕获水参数,例如使用Ceratex模拟传感器来测量pH值,也使用PT100来帮助我们计算温度,最后使用Oxymax传感器来测量溶解氧,所有这些都有助于我们扩展物种并防止其灭绝,对于编程环境的一部分,信息将被发送并显示在系统的视觉环境中。与此同时,控制器将根据收到的信息采取行动,将虹鳟鱼的水参数维持在适当的范围内,即溶解氧大于6毫克/升,小于8毫克/升。5毫克/升,在温度水平内,该物种生活在9°至14°C的水域,pH值为6.6至7.9。此外,所实施的自动化机电一体化系统将促进和改善虹鳟鱼养殖水参数的监测和控制。
{"title":"Control and Monitoring System of Hydraulic Parameters for Rainbow Trout Culture","authors":"Alem Huayta Uribe, Jalber Brayan Macuri Vasquez, Alexander Claudio Miranda Yauri, Deyby Huamanchahua","doi":"10.1109/UEMCON53757.2021.9666512","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666512","url":null,"abstract":"This research presents the design and control of an automatic monitoring system of the main water parameters for rainbow trout culture, which is a freshwater species distributed in the high Andean zones along with the Andes mountain range, which will be given through mechatronic systems. This work presents the control and monitoring of temperature, dissolved oxygen level, pH, and water level independently so that monitoring and control are simple. The procedure shows the use of different sensors that capture the water parameters such as the use of a Ceratex analog sensor to measure the pH, also the PT100 that will help us to calculate the temperature, and finally an Oxymax sensor for dissolved oxygen, all this helps us to extend the species and prevent its extinction, For the part of the programmed environment the information will be sent and displayed in the visual environment of the system, parallel to this the controller will act based on the information received, to maintain the water parameters in the appropriate range for rainbow trout, which are dissolved oxygen greater than 6 mg / l and less than 8. 5mg/l, within the temperature level, the species lives in waters of 9° to 14° C and with a pH of 6.6 to 7.9. In addition, the automatic mechatronic system implemented will facilitate and improve the monitoring and control of water parameters for rainbow trout culture.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124227664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Dead-Time Optimization in a GaN-Based Boost Converter Using a Digital Controller 基于数字控制器的gan升压变换器的实时死区优化
Mohsin Asad, A. Singha
The Gallium-Nitride (GaN) based converters can operate in a high frequency range without compromising the efficiency as compared to silicon based converters. However, the reverse conduction loss during dead-time in GaN degrades the efficiency; thus, optimization of dead-time is required to improve the efficiency. This paper proposes a real-time dead-time optimization controller for the synchronous boost converter. The proposed controller samples only the inductor current and output voltage at the rate of switching frequency to determine the optimal dead-time. Thus, this is suitable for high-frequency converters. Furthermore, the proposed controller requires only a few switching cycles to compute the optimal dead-time. A prototype of the boost converter is developed using GaN FET from GaN System and the proposed dead-time controller is implemented using a TI digital controller.
与硅基变换器相比,氮化镓(GaN)基变换器可以在高频率范围内工作,而不会影响效率。然而,氮化镓在死区期间的反向传导损耗降低了效率;因此,需要优化死区时间来提高效率。提出了一种同步升压变换器的实时死区优化控制器。该控制器仅以开关频率的速率采样电感电流和输出电压,以确定最佳死区时间。因此,这适用于高频变换器。此外,所提出的控制器只需要几个切换周期来计算最优死区时间。利用GaN系统的GaN场效应管开发了升压变换器的原型,并使用TI数字控制器实现了所提出的死区时间控制器。
{"title":"Real-Time Dead-Time Optimization in a GaN-Based Boost Converter Using a Digital Controller","authors":"Mohsin Asad, A. Singha","doi":"10.1109/UEMCON53757.2021.9666693","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666693","url":null,"abstract":"The Gallium-Nitride (GaN) based converters can operate in a high frequency range without compromising the efficiency as compared to silicon based converters. However, the reverse conduction loss during dead-time in GaN degrades the efficiency; thus, optimization of dead-time is required to improve the efficiency. This paper proposes a real-time dead-time optimization controller for the synchronous boost converter. The proposed controller samples only the inductor current and output voltage at the rate of switching frequency to determine the optimal dead-time. Thus, this is suitable for high-frequency converters. Furthermore, the proposed controller requires only a few switching cycles to compute the optimal dead-time. A prototype of the boost converter is developed using GaN FET from GaN System and the proposed dead-time controller is implemented using a TI digital controller.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125772328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Boosting-based Models with Tree-structured Parzen Estimator Optimization to Detect Intrusion Attacks on Smart Grid 基于树结构Parzen估计优化的增强模型检测智能电网入侵攻击
T. T. Khoei, Shereen S. Ismail, N. Kaabouch
Smart grid is an emerging technology that transfers power to users intelligently through two-way communication. Despite the benefits of this network, it is prone to different cyber-attacks. One solution to address this issue is the use of intrusion detection systems. Several studies have been conducted to investigate the shortcomings of such system, which include low detection rates and high false alarms; however, these studies did not completely address these issues. Motivated by the existing gaps, we investigate the performance of boosting-based models, namely Adaptive Boosting, Gradient Boosting, and Categorical Boosting, in detecting cyber-attacks on smart grid networks. The performance evaluation is conducted based on accuracy, probability of detection, probability of misdetection, and probability of false alarm. The results of the models were compared with those of three widely used traditional machine learning models, namely support vector machine, naïve Bayes, and K nearest neighbor. The benchmark of CICDDoS 2019 is selected as a dataset for training, validation, and testing. The ReliefF feature selection technique is used to identify the most important features for training the models. We also used the Tree-structured Parzen Estimator optimization technique to find the best hyperparameters for each model and ensure optimal performance. The results show that the boosting-based models outperform the three traditional models, and the Categorical Boosting classifier has the best results in terms of the four-evaluation metrics.
智能电网是一种通过双向通信将电力智能传输给用户的新兴技术。尽管这个网络有好处,但它容易受到不同的网络攻击。解决这个问题的一个解决方案是使用入侵检测系统。已经进行了几项研究来调查这种系统的缺点,其中包括低检测率和高误报;然而,这些研究并没有完全解决这些问题。基于现有的差距,我们研究了基于增强的模型,即自适应增强、梯度增强和分类增强,在检测智能电网网络上的网络攻击方面的性能。根据准确率、检测概率、误检概率、虚警概率进行性能评价。将模型的结果与支持向量机(support vector machine)、naïve贝叶斯(Bayes)和K近邻(K nearest neighbor)这三种广泛使用的传统机器学习模型的结果进行比较。选择CICDDoS 2019的基准作为训练、验证和测试的数据集。ReliefF特征选择技术用于识别训练模型的最重要特征。我们还使用了树结构Parzen Estimator优化技术来为每个模型找到最佳的超参数,以确保最佳性能。结果表明,基于Boosting的分类器模型优于传统的三种分类器模型,其中分类器在四个评价指标上的效果最好。
{"title":"Boosting-based Models with Tree-structured Parzen Estimator Optimization to Detect Intrusion Attacks on Smart Grid","authors":"T. T. Khoei, Shereen S. Ismail, N. Kaabouch","doi":"10.1109/UEMCON53757.2021.9666607","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666607","url":null,"abstract":"Smart grid is an emerging technology that transfers power to users intelligently through two-way communication. Despite the benefits of this network, it is prone to different cyber-attacks. One solution to address this issue is the use of intrusion detection systems. Several studies have been conducted to investigate the shortcomings of such system, which include low detection rates and high false alarms; however, these studies did not completely address these issues. Motivated by the existing gaps, we investigate the performance of boosting-based models, namely Adaptive Boosting, Gradient Boosting, and Categorical Boosting, in detecting cyber-attacks on smart grid networks. The performance evaluation is conducted based on accuracy, probability of detection, probability of misdetection, and probability of false alarm. The results of the models were compared with those of three widely used traditional machine learning models, namely support vector machine, naïve Bayes, and K nearest neighbor. The benchmark of CICDDoS 2019 is selected as a dataset for training, validation, and testing. The ReliefF feature selection technique is used to identify the most important features for training the models. We also used the Tree-structured Parzen Estimator optimization technique to find the best hyperparameters for each model and ensure optimal performance. The results show that the boosting-based models outperform the three traditional models, and the Categorical Boosting classifier has the best results in terms of the four-evaluation metrics.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132209506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Connecting Rural Areas: A Solution Approach to Bridging the Coverage Gap 连接农村地区:弥合覆盖差距的解决办法
Ida Sèmévo Tognisse, Jules R. Dégila, A. Kora
Access to the Internet, new information, and communication technologies are becoming necessary in human life. However, for people in rural and remote areas, connectivity remains scarce and a big challenge. It is a fact that telecommunication services are primarily deployed in urban areas, for which the return on investment is more evident, to the detriment of rural and isolated areas. However, the absence of these services constitutes a hindrance to socio-economic development. In this paper, we consider that rural connectivity presents specific needs and peculiarities. We first recall the challenges to removing barriers to connectivity in rural areas. Second, we argue that improving access to technology requires expanding mobile networks and implementing appropriate technologies. Thus, this article takes stock of the technologies suitable to rural, poor, and isolated areas. After analyzing and discussing each technology and highlighting the impact of the choice of technology on the challenges of connectivity in remote areas, this paper proposes an architecture for future networks based on existing solutions to eliminate the coverage gap in rural areas.
接入互联网,新的信息和通信技术在人类生活中变得越来越必要。然而,对于农村和偏远地区的人们来说,网络连接仍然稀缺,这是一个巨大的挑战。事实上,电信服务主要部署在投资回报更为明显的城市地区,而不利于农村和偏远地区。但是,缺乏这些服务妨碍了社会经济发展。在本文中,我们认为农村连通性具有特定的需求和特性。我们首先回顾消除农村地区互联互通障碍所面临的挑战。其次,我们认为改善技术获取需要扩大移动网络和实施适当的技术。因此,本文盘点了适用于农村、贫困和偏远地区的技术。在分析和讨论了每种技术并强调了技术选择对偏远地区连通性挑战的影响之后,本文提出了基于现有解决方案的未来网络架构,以消除农村地区的覆盖差距。
{"title":"Connecting Rural Areas: A Solution Approach to Bridging the Coverage Gap","authors":"Ida Sèmévo Tognisse, Jules R. Dégila, A. Kora","doi":"10.1109/uemcon53757.2021.9666712","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666712","url":null,"abstract":"Access to the Internet, new information, and communication technologies are becoming necessary in human life. However, for people in rural and remote areas, connectivity remains scarce and a big challenge. It is a fact that telecommunication services are primarily deployed in urban areas, for which the return on investment is more evident, to the detriment of rural and isolated areas. However, the absence of these services constitutes a hindrance to socio-economic development. In this paper, we consider that rural connectivity presents specific needs and peculiarities. We first recall the challenges to removing barriers to connectivity in rural areas. Second, we argue that improving access to technology requires expanding mobile networks and implementing appropriate technologies. Thus, this article takes stock of the technologies suitable to rural, poor, and isolated areas. After analyzing and discussing each technology and highlighting the impact of the choice of technology on the challenges of connectivity in remote areas, this paper proposes an architecture for future networks based on existing solutions to eliminate the coverage gap in rural areas.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131621661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancement of Energy Harvesting Efficiency in Mobile Wireless Sensor Networks 移动无线传感器网络能量收集效率的提高
Amin H. Al-Ka'bi
In this research work, a proposed method for extending the lifetime of energy-constrained Mobile wireless sensor networks (MWSNs) is presented. This method is based on the fact that RF signal carries both information and energy at the same time. Hence, by increasing the efficiency of energy harvesting from radio frequency (RF) signals, the lifetime of the wireless network can be significantly extended. The Simultaneous Wireless Information and Power Transfer (SWIPT) in this technique enables harvesting of energy by relay nodes which in turn can be used for wireless data transmission. In order to enhance the lifetime of the mobile wireless network, the transmitted RF energy can be recycled at the receiver side. On the other hand, a balance between energy harvesting and wireless data transmission is required in order to maximize the overall efficiency of the system. Particle Swarm Optimization (PSO) is employed to obtain the optimum resource allocation policies which maximizes the system energy efficiency. A cost function is framed for this purpose and PSO attains maximum energy efficiency by improving the solution of the cost function at each iteration with respect to given constraints.
在这项研究工作中,提出了一种延长能量受限移动无线传感器网络(MWSNs)寿命的方法。这种方法是基于射频信号同时携带信息和能量的事实。因此,通过提高从射频(RF)信号中收集能量的效率,可以显著延长无线网络的寿命。该技术中的同步无线信息和能量传输(SWIPT)能够通过中继节点收集能量,而中继节点又可以用于无线数据传输。为了提高移动无线网络的使用寿命,可以在接收端回收发射的射频能量。另一方面,为了使系统的整体效率最大化,需要在能量收集和无线数据传输之间取得平衡。采用粒子群算法(PSO)获得系统能源效率最大化的最优资源分配策略。为此目的构建了一个成本函数,粒子群算法通过在给定约束条件下改进每次迭代时成本函数的解来实现最大的能源效率。
{"title":"Enhancement of Energy Harvesting Efficiency in Mobile Wireless Sensor Networks","authors":"Amin H. Al-Ka'bi","doi":"10.1109/uemcon53757.2021.9666602","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666602","url":null,"abstract":"In this research work, a proposed method for extending the lifetime of energy-constrained Mobile wireless sensor networks (MWSNs) is presented. This method is based on the fact that RF signal carries both information and energy at the same time. Hence, by increasing the efficiency of energy harvesting from radio frequency (RF) signals, the lifetime of the wireless network can be significantly extended. The Simultaneous Wireless Information and Power Transfer (SWIPT) in this technique enables harvesting of energy by relay nodes which in turn can be used for wireless data transmission. In order to enhance the lifetime of the mobile wireless network, the transmitted RF energy can be recycled at the receiver side. On the other hand, a balance between energy harvesting and wireless data transmission is required in order to maximize the overall efficiency of the system. Particle Swarm Optimization (PSO) is employed to obtain the optimum resource allocation policies which maximizes the system energy efficiency. A cost function is framed for this purpose and PSO attains maximum energy efficiency by improving the solution of the cost function at each iteration with respect to given constraints.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132608828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
DenCity: A WiFi Location Tracking Solution denity:一个WiFi位置跟踪解决方案
Joseph Spanilo, David Edwards, Sunjae Park, Mira Yun
Google Maps has made it easy for people to plan their commute based on how busy a road is. This has also been expanded to help users understand how busy a store may be during the day. However this feature has not been applied to buildings with much depth. DenCity aims to solve this problem by showing a way that the number of users can be tracked without having to implement new hardware to existing infrastructure and without the user having to participate. DenCity uses the WiFi signals sent out by devices to track the number of users near an access point. As a result it makes it possible for users to know the number of people within a building or given area.
谷歌Maps让人们可以轻松地根据道路的繁忙程度来规划通勤。这也被扩展到帮助用户了解商店在白天可能有多忙。然而,这个特性并没有被应用到深度较大的建筑中。density旨在通过展示一种方法来解决这个问题,这种方法可以跟踪用户的数量,而无需在现有的基础设施上实现新的硬件,也无需用户参与。DenCity使用设备发出的WiFi信号来跟踪接入点附近的用户数量。因此,用户可以知道建筑物或给定区域内的人数。
{"title":"DenCity: A WiFi Location Tracking Solution","authors":"Joseph Spanilo, David Edwards, Sunjae Park, Mira Yun","doi":"10.1109/uemcon53757.2021.9666697","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666697","url":null,"abstract":"Google Maps has made it easy for people to plan their commute based on how busy a road is. This has also been expanded to help users understand how busy a store may be during the day. However this feature has not been applied to buildings with much depth. DenCity aims to solve this problem by showing a way that the number of users can be tracked without having to implement new hardware to existing infrastructure and without the user having to participate. DenCity uses the WiFi signals sent out by devices to track the number of users near an access point. As a result it makes it possible for users to know the number of people within a building or given area.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128939132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating True Cryptographic Key Space Size 评估真正的加密密钥空间大小
Albert H Carlson, Garret Gang, Torsten Gang, Bhaskar Ghosh, I. Dutta
Cybersecurity professionals have relied on the key space of a cipher to compare encryption algorithms and select the best encryptions for transmitted data. Peer reviewed strong ciphers have been assumed to maintain strength for all messages. It is thought that only brute force attacks can break these ciphers, so the key space calculation for these algorithms uses the maximum key space to determine the unicity distance. Unfortunately, the key space is heavily dependent on the user and habits of the user, as well as the content of the message. In this paper, we present factors that affect the key space size and show that the effects of these factors can seriously decrease the security of a cipher for a particular message. By considering these factors, a cybersecurity practitioner can properly assess vulnerability and choose the best security for that message.
网络安全专业人员依靠密码的密钥空间来比较加密算法,并为传输数据选择最佳加密。同行评审的强密码被认为对所有消息保持强度。一般认为只有蛮力攻击才能破解这些密码,因此这些算法的密钥空间计算使用最大密钥空间来确定唯一距离。不幸的是,键空间严重依赖于用户和用户的习惯,以及消息的内容。在本文中,我们提出了影响密钥空间大小的因素,并表明这些因素的影响会严重降低特定消息的密码安全性。通过考虑这些因素,网络安全从业者可以正确地评估漏洞并为该消息选择最佳安全性。
{"title":"Evaluating True Cryptographic Key Space Size","authors":"Albert H Carlson, Garret Gang, Torsten Gang, Bhaskar Ghosh, I. Dutta","doi":"10.1109/UEMCON53757.2021.9666530","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666530","url":null,"abstract":"Cybersecurity professionals have relied on the key space of a cipher to compare encryption algorithms and select the best encryptions for transmitted data. Peer reviewed strong ciphers have been assumed to maintain strength for all messages. It is thought that only brute force attacks can break these ciphers, so the key space calculation for these algorithms uses the maximum key space to determine the unicity distance. Unfortunately, the key space is heavily dependent on the user and habits of the user, as well as the content of the message. In this paper, we present factors that affect the key space size and show that the effects of these factors can seriously decrease the security of a cipher for a particular message. By considering these factors, a cybersecurity practitioner can properly assess vulnerability and choose the best security for that message.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133522201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Top Reported Data Security Risks in the Age of COVID-19 2019冠状病毒病时代报告的主要数据安全风险
Suzanna E. Schmeelk, Kutub Thakur, M. Ali, Denise M. Dragos, Abdullah Al-Hayajneh, Bryan Rendra Pramana
Data has been collected and stored for thousands of years. Securing data during the digital age has remained difficult. Research shows that in 2018 there was over 33 zettabytes of data, which is approximately an equivalent to 129 billion 256GB mobile devices of data. Risk management in recent years has made attempts at balancing data security risks with organizational business and budgetary requirements. This research examines high probability data security threats and mitigations. It then reports on the threats in connection with the top United States healthcare data breaches reported during the COVID outbreak to the Health and Human Services (HHS) between June 11, 2020 and June 11, 2021. The data analysis shows that there were nine breaches of over a million affected individuals reported to HHS affecting 15,936,679 individuals in total. Five-million individuals is approximately larger than the populations of Los Angeles, New York, and Chicago combined. We connect the common security risks with the reports of these incidents to gain insights into common network security concerns and inform future network architectures and risk mitigations.
数据已经被收集和储存了数千年。在数字时代保护数据仍然很困难。研究表明,2018年有超过33 zb的数据,大约相当于1290亿256GB的移动设备数据。近年来,风险管理试图平衡数据安全风险与组织业务和预算需求。本研究考察了高概率数据安全威胁和缓解措施。然后,它将在2020年6月11日至2021年6月11日期间向卫生与人类服务部(HHS)报告与COVID爆发期间报告的美国顶级医疗保健数据泄露相关的威胁。数据分析显示,向卫生与公众服务部报告的数据泄露事件共有9起,涉及超过100万人,总共影响了15,936,679人。500万人大约比洛杉矶、纽约和芝加哥人口的总和还要多。我们将常见的安全风险与这些事件的报告联系起来,以深入了解常见的网络安全问题,并为未来的网络架构和风险缓解提供信息。
{"title":"Top Reported Data Security Risks in the Age of COVID-19","authors":"Suzanna E. Schmeelk, Kutub Thakur, M. Ali, Denise M. Dragos, Abdullah Al-Hayajneh, Bryan Rendra Pramana","doi":"10.1109/UEMCON53757.2021.9666573","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666573","url":null,"abstract":"Data has been collected and stored for thousands of years. Securing data during the digital age has remained difficult. Research shows that in 2018 there was over 33 zettabytes of data, which is approximately an equivalent to 129 billion 256GB mobile devices of data. Risk management in recent years has made attempts at balancing data security risks with organizational business and budgetary requirements. This research examines high probability data security threats and mitigations. It then reports on the threats in connection with the top United States healthcare data breaches reported during the COVID outbreak to the Health and Human Services (HHS) between June 11, 2020 and June 11, 2021. The data analysis shows that there were nine breaches of over a million affected individuals reported to HHS affecting 15,936,679 individuals in total. Five-million individuals is approximately larger than the populations of Los Angeles, New York, and Chicago combined. We connect the common security risks with the reports of these incidents to gain insights into common network security concerns and inform future network architectures and risk mitigations.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133617577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1