Data protection is essential for sensitive applications using Wireless Sensor Networks like health monitoring or video surveillance. WSN are deployed generally in harsh environment making them vulnerable for attacks thus it's important to secure data while being transferred from the sensor until the base station. This article is a proposal for a methodology which enable attack detection and classification on WSN. Compressive sensing is used to optimize the size of data exchange and hence optimize energy consumption. Homomorphic encryption allows to reduce encryption complexity by applying arithmetic operations on cypher text. Machine learning is applied to classify the attacks quickly.
{"title":"Compressive Sensing Based on Homomorphic Encryption and Attack Classification using Machine Learning Algorithm in WSN Security","authors":"Samir Ifzarne, I. Hafidi, Nadia Idrissi","doi":"10.1145/3386723.3387859","DOIUrl":"https://doi.org/10.1145/3386723.3387859","url":null,"abstract":"Data protection is essential for sensitive applications using Wireless Sensor Networks like health monitoring or video surveillance. WSN are deployed generally in harsh environment making them vulnerable for attacks thus it's important to secure data while being transferred from the sensor until the base station. This article is a proposal for a methodology which enable attack detection and classification on WSN. Compressive sensing is used to optimize the size of data exchange and hence optimize energy consumption. Homomorphic encryption allows to reduce encryption complexity by applying arithmetic operations on cypher text. Machine learning is applied to classify the attacks quickly.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125400118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Developments in telecommunications technology has opened up the possibility of circumventing intellectual property in the digital world, outside the legal and technical methods proposed for copyright protection, the information retrieval is considered as a computer field helping to protect these rights by proposing methods of search, analysis and comparison for protected documents. This article proposes an approach based on the distributed information retrieval allowing the detection of any unlawful manipulation for copyrighted works. In particular, we propose an architecture of a distributed information retrieval system on a peer-to-peer network as well as the specific architecture of its nodes, in addition, a double indexation (local & distributed) was proposed.
{"title":"A Distributed Information Retrieval Approach for Copyright Protection","authors":"Sonia Benbelgacem, L. Guezouli, Rachid Seghir","doi":"10.1145/3386723.3387882","DOIUrl":"https://doi.org/10.1145/3386723.3387882","url":null,"abstract":"Developments in telecommunications technology has opened up the possibility of circumventing intellectual property in the digital world, outside the legal and technical methods proposed for copyright protection, the information retrieval is considered as a computer field helping to protect these rights by proposing methods of search, analysis and comparison for protected documents. This article proposes an approach based on the distributed information retrieval allowing the detection of any unlawful manipulation for copyrighted works. In particular, we propose an architecture of a distributed information retrieval system on a peer-to-peer network as well as the specific architecture of its nodes, in addition, a double indexation (local & distributed) was proposed.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131060648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There has been vast development leading to advanced systems like wireless communication and development of small sized devices and sensors which can perform several tasks simultaneously. These wireless sensors have provided a great potential towards a wearable technology, however; due to the small size of battery they have a limited power storage. There are vast applications of these sensors are in medical wireless sensor networks which are very critical. If the sensors not precisely positioned on the body of a patient, the communication between them may increase the power consumption of sensor nodes and diminish the life of battery. In this paper, a transposition technique for sensor position is being proposed by using Euclidean algorithm. In this technique, the sensor nodes may get placed in such a way that they have smaller distance to communicate with each other. This makes communication effective and increase battery life by reduction of path loss which occurs in wireless sensors communication.
{"title":"Sensors Transposing Technique for Minimizing the Path Loss Effect and Enhancement of Battery Lifetime in Wireless Body Area Sensor Networks","authors":"R. A. Khan, S. Memon","doi":"10.1145/3386723.3387828","DOIUrl":"https://doi.org/10.1145/3386723.3387828","url":null,"abstract":"There has been vast development leading to advanced systems like wireless communication and development of small sized devices and sensors which can perform several tasks simultaneously. These wireless sensors have provided a great potential towards a wearable technology, however; due to the small size of battery they have a limited power storage. There are vast applications of these sensors are in medical wireless sensor networks which are very critical. If the sensors not precisely positioned on the body of a patient, the communication between them may increase the power consumption of sensor nodes and diminish the life of battery. In this paper, a transposition technique for sensor position is being proposed by using Euclidean algorithm. In this technique, the sensor nodes may get placed in such a way that they have smaller distance to communicate with each other. This makes communication effective and increase battery life by reduction of path loss which occurs in wireless sensors communication.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114617175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Different lower limbs robotic rehabilitation devices are under study to help patients to recover gestures altered, affected or lost after traffic accident injury, illness or disability. Especially ankle because is a complex part of the human skeleton. In this paper we present our contribution to the ankle foot robotic device. We will present our strategy to generate the setpoint trajectory for ankle devices that is based on neural networks. The latter will generate the trajectory of the ankle from the angular position sensors of the hip joint and the knee joint. This gave good results, but we noticed during the tests that the ankle trajectory contained sporadic peaks. This was the case of the right and left ankle. An optimization algorithm is developed to eliminate this phenomenon; it will be presented soon.
{"title":"Ankle gait-pattern generators","authors":"Mohamed Amine Mamou, N. Saadia","doi":"10.1145/3386723.3387833","DOIUrl":"https://doi.org/10.1145/3386723.3387833","url":null,"abstract":"Different lower limbs robotic rehabilitation devices are under study to help patients to recover gestures altered, affected or lost after traffic accident injury, illness or disability. Especially ankle because is a complex part of the human skeleton. In this paper we present our contribution to the ankle foot robotic device. We will present our strategy to generate the setpoint trajectory for ankle devices that is based on neural networks. The latter will generate the trajectory of the ankle from the angular position sensors of the hip joint and the knee joint. This gave good results, but we noticed during the tests that the ankle trajectory contained sporadic peaks. This was the case of the right and left ankle. An optimization algorithm is developed to eliminate this phenomenon; it will be presented soon.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132448681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Over the last decade, the web 2.0 has been shifting the web to turn it into an opinion platform. This results in a large amount of raw data that overwhelms human capacity to extract valuable knowledge without assistance of machines. In real world applications, sentiment analysis faces imbalanced data problem. To tackle this problem, sampling techniques have been proposed. In this paper, we focus on studying the performance of these techniques on Imbalanced Data of Arabic Sentiment. We then conduct a comparative evaluation using Support Vector Machine (SVM), Naive Bayes (NB), and Random Forest (RF) as classification algorithms.
{"title":"Sampling techniques for Arabic Sentiment Classification: A Comparative Study","authors":"H. A. Addi, R. Ezzahir","doi":"10.1145/3386723.3387899","DOIUrl":"https://doi.org/10.1145/3386723.3387899","url":null,"abstract":"Over the last decade, the web 2.0 has been shifting the web to turn it into an opinion platform. This results in a large amount of raw data that overwhelms human capacity to extract valuable knowledge without assistance of machines. In real world applications, sentiment analysis faces imbalanced data problem. To tackle this problem, sampling techniques have been proposed. In this paper, we focus on studying the performance of these techniques on Imbalanced Data of Arabic Sentiment. We then conduct a comparative evaluation using Support Vector Machine (SVM), Naive Bayes (NB), and Random Forest (RF) as classification algorithms.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116145267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the present digital world, users have to access multiple applications for carrying out their day-to-day business activities. As the amount of apps increase, the number of credentials (e.g. username/password) for each user increases and thereby the possibility of losing or forgetting them also increases. Single Sign-On (SSO) can be used to solve many problems related to web user authentication. OAuth-based SSO Systems are widely deployed by big tech companies such as Facebook and Google. In this paper we provide an in-depth review analysis of OAuth-based SSO systems security issues. In fact, previous efforts have been aimed either at finding errors in specific implementations, or at finding security problems within the specification itself. The main paper contribution is twofold: (1) describe in detail the OAuth 2.0 authorization flows and summarize the differences between the flows of each scenario that affect the security of the OAuth 2.0 protocol, and (2) examine the security problems related to the OAuth 2.0 specification and its implementation in the Web environment.
{"title":"Web OAuth-based SSO Systems Security","authors":"Yassine Sadqi, Yousra Belfaik, S. Safi","doi":"10.1145/3386723.3387888","DOIUrl":"https://doi.org/10.1145/3386723.3387888","url":null,"abstract":"In the present digital world, users have to access multiple applications for carrying out their day-to-day business activities. As the amount of apps increase, the number of credentials (e.g. username/password) for each user increases and thereby the possibility of losing or forgetting them also increases. Single Sign-On (SSO) can be used to solve many problems related to web user authentication. OAuth-based SSO Systems are widely deployed by big tech companies such as Facebook and Google. In this paper we provide an in-depth review analysis of OAuth-based SSO systems security issues. In fact, previous efforts have been aimed either at finding errors in specific implementations, or at finding security problems within the specification itself. The main paper contribution is twofold: (1) describe in detail the OAuth 2.0 authorization flows and summarize the differences between the flows of each scenario that affect the security of the OAuth 2.0 protocol, and (2) examine the security problems related to the OAuth 2.0 specification and its implementation in the Web environment.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129864368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Ikram, Lotfi El Aachak, Boudhir Anouar Abdelhakim, B. Mohammed
Malwares attacks are becoming increasingly destructive. Hackers target all types of devices from big to the most little ones. Researcher's communities in cybersecurity field are working hard to defend malwares attacks as well as any other malicious activity. In fact, the primary goal is to defend cyberattacks as fast as possible to avoid catastrophic damages. In this paper, we proposed new cybersecurity architecture specialized in malwares attacks defense. This proposal puts together four layers based on malwares behaviors. In addition, we perform malware classifier using malware visualization technique, GIST descriptor features and K-Nearest Neighbor algorithm. The classifier is able to put each input malware image into its corresponding family. Families distribution is been divided by malwares behaviors. For the purpose of attaining speedy malwares classifier, we use Univariate Feature Selection technique to reduce GIST feature. So we succeeded in getting from 320 to only 50 features in less timing with very close accuracy of 97,67%.
{"title":"Speedy and efficient malwares images classifier using reduced GIST features for a new defense guide","authors":"B. Ikram, Lotfi El Aachak, Boudhir Anouar Abdelhakim, B. Mohammed","doi":"10.1145/3386723.3387839","DOIUrl":"https://doi.org/10.1145/3386723.3387839","url":null,"abstract":"Malwares attacks are becoming increasingly destructive. Hackers target all types of devices from big to the most little ones. Researcher's communities in cybersecurity field are working hard to defend malwares attacks as well as any other malicious activity. In fact, the primary goal is to defend cyberattacks as fast as possible to avoid catastrophic damages. In this paper, we proposed new cybersecurity architecture specialized in malwares attacks defense. This proposal puts together four layers based on malwares behaviors. In addition, we perform malware classifier using malware visualization technique, GIST descriptor features and K-Nearest Neighbor algorithm. The classifier is able to put each input malware image into its corresponding family. Families distribution is been divided by malwares behaviors. For the purpose of attaining speedy malwares classifier, we use Univariate Feature Selection technique to reduce GIST feature. So we succeeded in getting from 320 to only 50 features in less timing with very close accuracy of 97,67%.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130363572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The advent of Internet of Things (IoT) technologies in the 21st century has led to exciting achievements. IoT smart medical devices along with wearables are generating and communicating high volume and high-velocity of heterogeneous data. Consequently, services provided by traditional methods such as cloud computing to manage these data become insufficient. Fog computing is seen as being the most effective solution for IoT-based healthcare. The stringy demand of this model was principally driven by a growing need for real-time analysis and low latency. It is apparently envisioned that the medicine field expects to draw enormous interest in combining IoT and fog computing. This in turn, improved the patient treatment, staff satisfaction, and operational efficiency and showed positive influence on all aspects of healthcare. This paper has reviewed fog computing in the context of medical IoT while comparing it with cloud computing and has attempted to present the three-layer architecture of fog-based healthcare system containing: edge, fog and cloud. It has also highlighted challenges facing IoT-driven healthcare in an ever-changing world.
{"title":"Fog Computing for Smart Healthcare data Analytics: An Urgent Necessity","authors":"Hayat Khaloufi, Karim Abouelmehdi, A. B. Hssane","doi":"10.1145/3386723.3387861","DOIUrl":"https://doi.org/10.1145/3386723.3387861","url":null,"abstract":"The advent of Internet of Things (IoT) technologies in the 21st century has led to exciting achievements. IoT smart medical devices along with wearables are generating and communicating high volume and high-velocity of heterogeneous data. Consequently, services provided by traditional methods such as cloud computing to manage these data become insufficient. Fog computing is seen as being the most effective solution for IoT-based healthcare. The stringy demand of this model was principally driven by a growing need for real-time analysis and low latency. It is apparently envisioned that the medicine field expects to draw enormous interest in combining IoT and fog computing. This in turn, improved the patient treatment, staff satisfaction, and operational efficiency and showed positive influence on all aspects of healthcare. This paper has reviewed fog computing in the context of medical IoT while comparing it with cloud computing and has attempted to present the three-layer architecture of fog-based healthcare system containing: edge, fog and cloud. It has also highlighted challenges facing IoT-driven healthcare in an ever-changing world.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125561674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recommender systems use algorithms to provide users with product or service recommendations. In recent times, these systems have been using Artificial Intelligence algorithms. However, choosing a suitable AI algorithm for a recommender system is difficult because of the number of algorithms described in the literature. Researchers and practitioners developing recommender systems are left with little information about the current approaches in algorithm usage. Moreover, the development of recommender systems using AI algorithms often faces problems and raises questions that must be resolved. In this context developing recommender system in the medical domain are presented as complementary tools in decision-making processes in healthcare services, it allows to increase the usability of technologies and reduce information overload in processes. This paper presents a systematic review of the literature that analyze the use of AI algorithms in recommender system and identify new research opportunities. The goals of this study are to (i) identify latest trends in the use or research of AI algorithms in recommender system applied in the medical domain;(ii)identify open questions in the use or research of AI algorithms, and (iii)assist new researchers to position new research activity in this domain appropriately.
{"title":"Latest Trends in Recommender Systems applied in the medical domain: A Systematic Review","authors":"O. Stitini, S. Kaloun, O. Bencharef","doi":"10.1145/3386723.3387860","DOIUrl":"https://doi.org/10.1145/3386723.3387860","url":null,"abstract":"Recommender systems use algorithms to provide users with product or service recommendations. In recent times, these systems have been using Artificial Intelligence algorithms. However, choosing a suitable AI algorithm for a recommender system is difficult because of the number of algorithms described in the literature. Researchers and practitioners developing recommender systems are left with little information about the current approaches in algorithm usage. Moreover, the development of recommender systems using AI algorithms often faces problems and raises questions that must be resolved. In this context developing recommender system in the medical domain are presented as complementary tools in decision-making processes in healthcare services, it allows to increase the usability of technologies and reduce information overload in processes. This paper presents a systematic review of the literature that analyze the use of AI algorithms in recommender system and identify new research opportunities. The goals of this study are to (i) identify latest trends in the use or research of AI algorithms in recommender system applied in the medical domain;(ii)identify open questions in the use or research of AI algorithms, and (iii)assist new researchers to position new research activity in this domain appropriately.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"19 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120813752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ait Lahcen Yassine, Jali Abdelaziz, El Oirrak Ahmed
In this article, we put forth an approach to build a geometric Islamic pattern, according to a method called Hasba. This kind of geometric pattern is generally found in Moroccan geometric art, adopted by artisans; it is rather suitable for sculpture and painting on wood. It is based on geometric rules and the concept of symmetry. Here we describe step by step the basic approach to create a new model respecting certain rules of the "Hasba" method.
{"title":"Approach of Constructing an Islamic Pattern Respecting the \"HASBA\" Method","authors":"Ait Lahcen Yassine, Jali Abdelaziz, El Oirrak Ahmed","doi":"10.1145/3386723.3387872","DOIUrl":"https://doi.org/10.1145/3386723.3387872","url":null,"abstract":"In this article, we put forth an approach to build a geometric Islamic pattern, according to a method called Hasba. This kind of geometric pattern is generally found in Moroccan geometric art, adopted by artisans; it is rather suitable for sculpture and painting on wood. It is based on geometric rules and the concept of symmetry. Here we describe step by step the basic approach to create a new model respecting certain rules of the \"Hasba\" method.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126483886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}