首页 > 最新文献

2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)最新文献

英文 中文
The Security and Traceability of Shared Information in the Process of Transportation of Dangerous Goods 危险货物运输过程中共享信息的安全性和可追溯性
Adnan Imeri, D. Khadraoui
This paper aims at showing a conceptual approach for security and traceability of shared information in the process of transportation of dangerous goods. Concerning the transport of dangerous goods, the process generates particular information, which is necessary to share with the stakeholders involved in this process. This information is considered sensitive, because it may contain the timestamp of movement of goods, information related to the goods, contractual business details, etc., and unauthorized parties should not access them. At any level, the process should remain transparent between stakeholders', with immutable properties on data sharing and the whole process should be auditable. We examine a general procedure for contractual issues for transportation of dangerous goods between stakeholders and its conceptual implementation by blockchain based on smart contracts.
本文旨在展示危险品运输过程中共享信息的安全性和可追溯性的概念方法。关于危险货物的运输,该过程产生特定的信息,有必要与参与该过程的利益相关者共享。该信息被认为是敏感的,因为它可能包含货物移动的时间戳、与货物相关的信息、合同业务详细信息等,未经授权的各方不应访问它们。在任何层面上,这个过程应该在利益相关者之间保持透明,在数据共享上具有不可变的属性,整个过程应该是可审计的。我们研究了利益相关者之间危险货物运输合同问题的一般程序及其基于智能合约的区块链概念实施。
{"title":"The Security and Traceability of Shared Information in the Process of Transportation of Dangerous Goods","authors":"Adnan Imeri, D. Khadraoui","doi":"10.1109/NTMS.2018.8328751","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328751","url":null,"abstract":"This paper aims at showing a conceptual approach for security and traceability of shared information in the process of transportation of dangerous goods. Concerning the transport of dangerous goods, the process generates particular information, which is necessary to share with the stakeholders involved in this process. This information is considered sensitive, because it may contain the timestamp of movement of goods, information related to the goods, contractual business details, etc., and unauthorized parties should not access them. At any level, the process should remain transparent between stakeholders', with immutable properties on data sharing and the whole process should be auditable. We examine a general procedure for contractual issues for transportation of dangerous goods between stakeholders and its conceptual implementation by blockchain based on smart contracts.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130310251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
A Many-To-One Matching Game Approach to Achieve Low-Latency Exploiting Fogs and Caching 实现低延迟的多对一匹配博弈方法利用雾和缓存
Bouchaib Assila, A. Kobbane, M. Elkoutbi
In this paper, we exploit the Fog Computing features and the caching capabilities to improve low-latency and throughput transmission for 5G Internet of things (IoT) Devices. We set in a challenge on the radio capabilities of the Small Cell Networks (SCNs), to provide radio transmission rate, and the fog computing, to manage distributed networking, computing and storage resources. The IoT devices, as a content requester will take advantage of emerging caching techniques to accomplish the on-demand low-latency services that require a large amount of computing resources and a high throughput. To overcome the increasing number of IoT devices and the limited computing resources in fog computing to allocate devices, we propose a many-to-one matching game between the sets of devices and the set of fogs. To solve this game, we exploit the deferred acceptance algorithm that enables the players to self-organize into a stable matching and a reasonable number of algorithm iterations. The goal of the proposed game theory approach is to optimize the fog computing resources to satisfy the increasing IoT devices requests. Simulation results has demonstrated that our proposed matching strategy coupled to caching capabilities on distributed fog computing significantly outperforms the traditional caching strategies in terms of the cache hit ratio, average latency and back-haul traffic load.
在本文中,我们利用雾计算特性和缓存功能来改善5G物联网(IoT)设备的低延迟和吞吐量传输。我们对小型蜂窝网络(SCNs)的无线电能力提出了挑战,以提供无线电传输速率和雾计算,以管理分布式网络,计算和存储资源。物联网设备作为内容请求者,将利用新兴的缓存技术来完成需要大量计算资源和高吞吐量的按需低延迟服务。为了克服物联网设备数量不断增加和雾计算中计算资源有限的问题来分配设备,我们提出了一种设备集与雾集之间的多对一匹配博弈。为了解决这个博弈,我们利用延迟接受算法,使玩家能够自组织成一个稳定的匹配和合理的算法迭代次数。提出的博弈论方法的目标是优化雾计算资源,以满足不断增长的物联网设备需求。仿真结果表明,我们提出的匹配策略与分布式雾计算的缓存能力相结合,在缓存命中率、平均延迟和回程流量负载方面明显优于传统的缓存策略。
{"title":"A Many-To-One Matching Game Approach to Achieve Low-Latency Exploiting Fogs and Caching","authors":"Bouchaib Assila, A. Kobbane, M. Elkoutbi","doi":"10.1109/NTMS.2018.8328671","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328671","url":null,"abstract":"In this paper, we exploit the Fog Computing features and the caching capabilities to improve low-latency and throughput transmission for 5G Internet of things (IoT) Devices. We set in a challenge on the radio capabilities of the Small Cell Networks (SCNs), to provide radio transmission rate, and the fog computing, to manage distributed networking, computing and storage resources. The IoT devices, as a content requester will take advantage of emerging caching techniques to accomplish the on-demand low-latency services that require a large amount of computing resources and a high throughput. To overcome the increasing number of IoT devices and the limited computing resources in fog computing to allocate devices, we propose a many-to-one matching game between the sets of devices and the set of fogs. To solve this game, we exploit the deferred acceptance algorithm that enables the players to self-organize into a stable matching and a reasonable number of algorithm iterations. The goal of the proposed game theory approach is to optimize the fog computing resources to satisfy the increasing IoT devices requests. Simulation results has demonstrated that our proposed matching strategy coupled to caching capabilities on distributed fog computing significantly outperforms the traditional caching strategies in terms of the cache hit ratio, average latency and back-haul traffic load.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131099765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
On the Detection and Handling of Security Incidents and Perimeter Breaches - A Modular and Flexible Honeytoken based Framework 关于安全事件和外围漏洞的检测和处理——一个模块化和灵活的基于蜂蜜令牌的框架
Daniel Fraunholz, Daniel Krohmer, Frederic Pohl, H. Schotten
Information security is a fast-changing domain. Traditional security mechanisms such as firewalls and access control are circumvented regularly. The amount of significant security incidents grows each year. Deception systems are a perfect match to support perimeter-based technologies in intrusion detection, data breach identification and data leakage prevention. In this work, a framework is proposed generating, deploying, monitoring and maintaining honeytokens on a host system. The framework is easily extendable and flexible in its use. The authors also describe a prototype implementation for four different types of tokens and thereby address typical issues when operating honeytokens.
信息安全是一个快速变化的领域。防火墙和访问控制等传统安全机制经常被绕过。重大安全事件的数量每年都在增长。在入侵检测、数据泄露识别和数据泄漏预防方面,欺骗系统是支持基于周界的技术的完美匹配。在这项工作中,提出了一个在主机系统上生成、部署、监控和维护蜂蜜令牌的框架。该框架易于扩展,使用灵活。作者还描述了四种不同类型令牌的原型实现,从而解决了操作蜂蜜令牌时的典型问题。
{"title":"On the Detection and Handling of Security Incidents and Perimeter Breaches - A Modular and Flexible Honeytoken based Framework","authors":"Daniel Fraunholz, Daniel Krohmer, Frederic Pohl, H. Schotten","doi":"10.1109/NTMS.2018.8328709","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328709","url":null,"abstract":"Information security is a fast-changing domain. Traditional security mechanisms such as firewalls and access control are circumvented regularly. The amount of significant security incidents grows each year. Deception systems are a perfect match to support perimeter-based technologies in intrusion detection, data breach identification and data leakage prevention. In this work, a framework is proposed generating, deploying, monitoring and maintaining honeytokens on a host system. The framework is easily extendable and flexible in its use. The authors also describe a prototype implementation for four different types of tokens and thereby address typical issues when operating honeytokens.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132383477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Iot Forensics: Challenges for the Ioa Era 物联网取证:Ioa时代的挑战
Áine MacDermott, T. Baker, Q. Shi
Challenges for IoT-based forensic investigations include the increasing amount of objects of forensic interest, relevance of identified and collected devices, blurry network boundaries, and edgeless networks. As we look ahead to a world of expanding ubiquitous computing, the challenge of forensic processes such as data acquisition (logical and physical) and extraction and analysis of data grows in this space. Containing an IoT breach is increasingly challenging - evidence is no longer restricted to a PC or mobile device, but can be found in vehicles, RFID cards, and smart devices. Through the combination of cloud-native forensics with client-side forensics (forensics for companion devices), we can study and develop the connection to support practical digital investigations and tackle emerging challenges in digital forensics. With the IoT bringing investigative complexity, this enhances challenges for the Internet of Anything (IoA) era. IoA brings anything and everything "online" in a connectedness that generates an explosion of connected devices, from fridges, cars and drones, to smart swarms, smart grids and intelligent buildings. Research to identify methods for performing IoT-based digital forensic analysis is essential. The long-term goal is the development of digital forensic standards that can be used as part of overall IoT and IoA security and aid IoT-based investigations.
基于物联网的法医调查面临的挑战包括越来越多的法医感兴趣的对象、识别和收集的设备的相关性、模糊的网络边界和无边界网络。当我们展望一个不断扩展的无处不在的计算世界时,数据采集(逻辑和物理)以及数据提取和分析等取证过程的挑战在这个领域越来越大。控制物联网漏洞越来越具有挑战性——证据不再局限于PC或移动设备,而是可以在车辆、RFID卡和智能设备中找到。通过将云原生取证与客户端取证(伴侣设备取证)相结合,我们可以研究和开发连接,以支持实际的数字调查,并应对数字取证中的新挑战。随着物联网带来调查复杂性,这增加了物联网(IoA)时代的挑战。物联网将任何事物都“在线”连接起来,从而产生连接设备的爆炸式增长,从冰箱、汽车和无人机,到智能蜂群、智能电网和智能建筑。研究确定执行基于物联网的数字取证分析的方法至关重要。长期目标是开发数字取证标准,可作为整体物联网和物联网安全的一部分,并帮助基于物联网的调查。
{"title":"Iot Forensics: Challenges for the Ioa Era","authors":"Áine MacDermott, T. Baker, Q. Shi","doi":"10.1109/NTMS.2018.8328748","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328748","url":null,"abstract":"Challenges for IoT-based forensic investigations include the increasing amount of objects of forensic interest, relevance of identified and collected devices, blurry network boundaries, and edgeless networks. As we look ahead to a world of expanding ubiquitous computing, the challenge of forensic processes such as data acquisition (logical and physical) and extraction and analysis of data grows in this space. Containing an IoT breach is increasingly challenging - evidence is no longer restricted to a PC or mobile device, but can be found in vehicles, RFID cards, and smart devices. Through the combination of cloud-native forensics with client-side forensics (forensics for companion devices), we can study and develop the connection to support practical digital investigations and tackle emerging challenges in digital forensics. With the IoT bringing investigative complexity, this enhances challenges for the Internet of Anything (IoA) era. IoA brings anything and everything \"online\" in a connectedness that generates an explosion of connected devices, from fridges, cars and drones, to smart swarms, smart grids and intelligent buildings. Research to identify methods for performing IoT-based digital forensic analysis is essential. The long-term goal is the development of digital forensic standards that can be used as part of overall IoT and IoA security and aid IoT-based investigations.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134243117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
Duplications and Misattributions of File Fragment Hashes in Image and Compressed Files 图像和压缩文件中文件片段哈希值的重复和错误归属
Johan Garcia
Hashing is used in a wide variety of security contexts. Hashes of parts of files, fragment hashes, can be used to detect remains of deleted files in cluster slack, to detect illicit files being sent over a network, to perform approximate file matching, or to quickly scan large storage devices using sector sampling. In this work we examine the fragment hash uniqueness and hash duplication characteristics of five different data sets with a focus on JPEG images and compressed file archives. We consider both block and rolling hashes and evaluate sizes of the hashed fragments ranging from 16 to 4096 bytes. During an initial hash generation phase hash metadata is created for each data set, which in total becomes several several billion hashes. During the scan phase each other data set is scanned and hashes checked for potential matches in the hash metadata. Three aspects of fragment hashes are examined: 1) the rate of duplicate hashes within each data set, 2) the rate of hash misattribution where a fragment hash from the scanned data set matches a fragment in the hash metadata although the actual file is not present in the scan set, 3) to what extent it is possible to detect fragments from files in a hashed set when those files have been compressed and embedded in a zip archive. The results obtained are useful as input to dimensioning and evaluation procedures for several application areas of fragment hashing.
散列用于各种各样的安全上下文中。文件部分的哈希值(片段哈希值)可用于检测集群松弛中已删除文件的残余,检测通过网络发送的非法文件,执行近似文件匹配,或使用扇区抽样快速扫描大型存储设备。在这项工作中,我们研究了五种不同数据集的片段哈希唯一性和哈希重复特征,重点是JPEG图像和压缩文件存档。我们考虑块哈希和滚动哈希,并评估哈希片段的大小,范围从16到4096字节。在初始哈希生成阶段,为每个数据集创建哈希元数据,这些数据集总共成为数十亿个哈希。在扫描阶段,会扫描其他数据集,并检查散列元数据中的潜在匹配。片段哈希的三个方面进行了检查:1)每个数据集中重复哈希的比率,2)哈希错误归因的比率,其中扫描数据集中的片段哈希与哈希元数据中的片段相匹配,尽管实际文件不存在于扫描集中,3)当这些文件被压缩并嵌入到zip存档中时,在多大程度上可以从哈希集中的文件中检测片段。所获得的结果对于片段哈希的几个应用领域的维度和评估程序是有用的输入。
{"title":"Duplications and Misattributions of File Fragment Hashes in Image and Compressed Files","authors":"Johan Garcia","doi":"10.1109/NTMS.2018.8328690","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328690","url":null,"abstract":"Hashing is used in a wide variety of security contexts. Hashes of parts of files, fragment hashes, can be used to detect remains of deleted files in cluster slack, to detect illicit files being sent over a network, to perform approximate file matching, or to quickly scan large storage devices using sector sampling. In this work we examine the fragment hash uniqueness and hash duplication characteristics of five different data sets with a focus on JPEG images and compressed file archives. We consider both block and rolling hashes and evaluate sizes of the hashed fragments ranging from 16 to 4096 bytes. During an initial hash generation phase hash metadata is created for each data set, which in total becomes several several billion hashes. During the scan phase each other data set is scanned and hashes checked for potential matches in the hash metadata. Three aspects of fragment hashes are examined: 1) the rate of duplicate hashes within each data set, 2) the rate of hash misattribution where a fragment hash from the scanned data set matches a fragment in the hash metadata although the actual file is not present in the scan set, 3) to what extent it is possible to detect fragments from files in a hashed set when those files have been compressed and embedded in a zip archive. The results obtained are useful as input to dimensioning and evaluation procedures for several application areas of fragment hashing.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130579720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
DDoS Attack Detection System: Utilizing Classification Algorithms with Apache Spark DDoS攻击检测系统:基于Apache Spark的分类算法
Amjad Alsirhani, S. Sampalli, P. Bodorik
Cloud computing is a model of configurable computing resources such as servers, networks, storages, applications, and services that are available from anywhere at any time. In addition, cloud computing is managed by experts from different computer science fields to provide high reliability, availability, mobility, security, and scalability. Of course, security against all form of attacks, including DDoS attack, must be provided. Numerous DDoS attacks have been launched against different organizations in the last decade and numerous approaches have been proposed and tried to detect and prevent DDoS attacks by utilizing classification algorithms. In this research, we propose a DDoS detection system that benefits from cloud computing resources. Our proposed system consists of three concepts: classification algorithms, parallelism computing, and a fuzzy logic system. Classification algorithms are used in our system to classify and predict DDoS attacks on traffic packets. The parallelism concept is used to efficiently accelerate the execution of the utilized classification algorithms. The fuzzy logic is used to choose which of the classification algorithms is to be used next. We evaluated the classification algorithm and the parallel processing of the DDoS detection by configuring a test-bed that consists of one master and three slaves. We validated the fuzzy logic system by using the MATLAB statistical tool.
云计算是一种可配置计算资源的模型,这些资源包括服务器、网络、存储、应用程序和服务,可以随时随地使用。此外,云计算由来自不同计算机科学领域的专家管理,以提供高可靠性、可用性、移动性、安全性和可伸缩性。当然,必须提供针对各种形式的攻击(包括DDoS攻击)的安全性。在过去的十年中,针对不同的组织发起了许多DDoS攻击,并且已经提出了许多方法,并试图通过使用分类算法来检测和防止DDoS攻击。在本研究中,我们提出一种利用云计算资源的DDoS检测系统。我们提出的系统包括三个概念:分类算法、并行计算和模糊逻辑系统。在我们的系统中使用分类算法对流量数据包进行分类和预测。利用并行性的概念,有效地加快了分类算法的执行速度。使用模糊逻辑来选择下一步使用哪种分类算法。我们通过配置一个由一个主服务器和三个从服务器组成的测试平台来评估分类算法和DDoS检测的并行处理。利用MATLAB统计工具对模糊逻辑系统进行了验证。
{"title":"DDoS Attack Detection System: Utilizing Classification Algorithms with Apache Spark","authors":"Amjad Alsirhani, S. Sampalli, P. Bodorik","doi":"10.1109/NTMS.2018.8328686","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328686","url":null,"abstract":"Cloud computing is a model of configurable computing resources such as servers, networks, storages, applications, and services that are available from anywhere at any time. In addition, cloud computing is managed by experts from different computer science fields to provide high reliability, availability, mobility, security, and scalability. Of course, security against all form of attacks, including DDoS attack, must be provided. Numerous DDoS attacks have been launched against different organizations in the last decade and numerous approaches have been proposed and tried to detect and prevent DDoS attacks by utilizing classification algorithms. In this research, we propose a DDoS detection system that benefits from cloud computing resources. Our proposed system consists of three concepts: classification algorithms, parallelism computing, and a fuzzy logic system. Classification algorithms are used in our system to classify and predict DDoS attacks on traffic packets. The parallelism concept is used to efficiently accelerate the execution of the utilized classification algorithms. The fuzzy logic is used to choose which of the classification algorithms is to be used next. We evaluated the classification algorithm and the parallel processing of the DDoS detection by configuring a test-bed that consists of one master and three slaves. We validated the fuzzy logic system by using the MATLAB statistical tool.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116068961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Smart-Contract Based System Operations for Permissioned Blockchain 基于智能合约的系统操作许可区块链
Tatsuya Sato, Yosuke Himura
Enterprises have paid attention to blockchain (BC), recently permissioned BC characterized with smart-contract, where busi-ness transactions among inter-authorized companies (forming consortium) can automatically be executed based on distributed consensus protocol over user-defined business logics pre-built with program codes. A single BC system will be built across mul-tiple management domains having different operational policies, e.g., datacenter of each organization; this will trigger a problem that its system operations (e.g., backup) will become time-consuming and costly due to the difficulty in unifying and/or adjusting operational policy, schedule, etc. Toward solving the problem, we propose an operations execution method for BC systems; a primary idea is to define operations as smart-contract so that unified and synchronized cross-organizational operations can be executed effectively by using BC-native features. We de-sign the proposed method as hybrid architecture including in-BC consensus establishment and out-BC event-based instruction execution, in order to be adaptable to the recent heterogeneous BC architecture. Performance evaluation using a prototype with Hyperledger Fabric v1.0 shows that the proposed method can start executing operations within 5 seconds. Furthermore, cost evaluation using model-based estimation shows that the total yearly cost of monthly operations on a 5-organizational BC sys-tem could be reduced by 61 percent compared to a conventional manual method.
企业关注区块链(BC),最近被许可的BC具有智能合约的特征,其中跨授权公司(形成财团)之间的业务交易可以基于分布式共识协议自动执行,而用户定义的业务逻辑是预先用程序代码构建的。单个BC系统将跨多个具有不同操作策略的管理域构建,例如每个组织的数据中心;这将引发一个问题,即由于难以统一和/或调整操作策略、时间表等,其系统操作(例如备份)将变得耗时和昂贵。为了解决这个问题,我们提出了一种BC系统的操作执行方法;一个主要的想法是将操作定义为智能合约,以便通过使用bc本地功能有效地执行统一和同步的跨组织操作。我们将所提出的方法设计为混合架构,包括BC内共识建立和BC外基于事件的指令执行,以适应最近的异构BC架构。使用Hyperledger Fabric v1.0的原型进行性能评估表明,所提出的方法可以在5秒内开始执行操作。此外,使用基于模型的估算的成本评估表明,与传统的手动方法相比,5个组织的BC系统每月操作的年总成本可以减少61%。
{"title":"Smart-Contract Based System Operations for Permissioned Blockchain","authors":"Tatsuya Sato, Yosuke Himura","doi":"10.1109/NTMS.2018.8328745","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328745","url":null,"abstract":"Enterprises have paid attention to blockchain (BC), recently permissioned BC characterized with smart-contract, where busi-ness transactions among inter-authorized companies (forming consortium) can automatically be executed based on distributed consensus protocol over user-defined business logics pre-built with program codes. A single BC system will be built across mul-tiple management domains having different operational policies, e.g., datacenter of each organization; this will trigger a problem that its system operations (e.g., backup) will become time-consuming and costly due to the difficulty in unifying and/or adjusting operational policy, schedule, etc. Toward solving the problem, we propose an operations execution method for BC systems; a primary idea is to define operations as smart-contract so that unified and synchronized cross-organizational operations can be executed effectively by using BC-native features. We de-sign the proposed method as hybrid architecture including in-BC consensus establishment and out-BC event-based instruction execution, in order to be adaptable to the recent heterogeneous BC architecture. Performance evaluation using a prototype with Hyperledger Fabric v1.0 shows that the proposed method can start executing operations within 5 seconds. Furthermore, cost evaluation using model-based estimation shows that the total yearly cost of monthly operations on a 5-organizational BC sys-tem could be reduced by 61 percent compared to a conventional manual method.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116108982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
On the Cramer-Rao Lower Bounds of Ranging Based on IR-UWB TOA Estimation in Wirelessbody Area Networks 无线体域网络中基于IR-UWB TOA估计的距离Cramer-Rao下界
J. Hamie, Ali Hamieh, Joumana A. Younis, Moussa Ammar, A. Ahmad-Kassem, A. Skaiky, A. Hamie, A. Nasser, H. Abdallah
Wireless Body Area Networks (WBANs) have been subject to important research efforts for the past years. They are indeed expected to fulfil the needs of a variety of emerging human centric applications at very low cost and ultra-low power (e.g. healthcare, wellness, security, sports, gaming). Even more recently these networks have been considered for radiolocation purposes (i.e. out of transmitted signals on and around the body). This new localization add-on is rather based on the estimation of the separating distance between the WBANs devices, based on radio technologies such as Narrow-Band (N-B) and/or even Impulse Radio-Ultra Wideband (IR-UWB). In this context we present herein a theoretical modeling of WBANs ranging errors based on IR-UWB Time Of Arrival (TOA) estimation. This model consists in applying a Cramer Rao Lower Bound (CRLB) expression for discussions, after extracting realistic Channel Impulse Response (CIR) out of recent UWB multipath channel measurement campaign. The CRLB of any unbiased TOA estimator is computed in the [3.1, 5.1]GHz and [3.75, 4.25]GHz bands. The latter frequency band is compliant with the channel 2 of the IEEE 802.15.4a standard, as well as with one mandatory band imposed by the IEEE 802.15.6 standardization group.
无线体域网络(wban)是近年来研究的重点。它们确实有望以极低的成本和超低的功耗满足各种新兴的以人为中心的应用程序的需求(例如医疗保健、健康、安全、体育、游戏)。甚至在最近,这些网络已被考虑用于无线电定位目的(即在身体上和周围传输信号)。这种新的定位附加组件是基于对wban设备之间分离距离的估计,基于诸如窄带(N-B)和/或甚至脉冲无线电超宽带(IR-UWB)等无线电技术。在此背景下,我们提出了一个基于IR-UWB到达时间(TOA)估计的wban测距误差的理论模型。在从最近的UWB多径信道测量活动中提取真实的信道脉冲响应(CIR)后,该模型包括应用Cramer Rao下界(CRLB)表达式进行讨论。在[3.1,5.1]GHz和[3.75,4.25]GHz频段计算任意无偏TOA估计器的CRLB。后一个频段既符合IEEE 802.15.a标准的信道2,也符合IEEE 802.15.6标准化组织规定的一个强制性频段。
{"title":"On the Cramer-Rao Lower Bounds of Ranging Based on IR-UWB TOA Estimation in Wirelessbody Area Networks","authors":"J. Hamie, Ali Hamieh, Joumana A. Younis, Moussa Ammar, A. Ahmad-Kassem, A. Skaiky, A. Hamie, A. Nasser, H. Abdallah","doi":"10.1109/NTMS.2018.8328708","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328708","url":null,"abstract":"Wireless Body Area Networks (WBANs) have been subject to important research efforts for the past years. They are indeed expected to fulfil the needs of a variety of emerging human centric applications at very low cost and ultra-low power (e.g. healthcare, wellness, security, sports, gaming). Even more recently these networks have been considered for radiolocation purposes (i.e. out of transmitted signals on and around the body). This new localization add-on is rather based on the estimation of the separating distance between the WBANs devices, based on radio technologies such as Narrow-Band (N-B) and/or even Impulse Radio-Ultra Wideband (IR-UWB). In this context we present herein a theoretical modeling of WBANs ranging errors based on IR-UWB Time Of Arrival (TOA) estimation. This model consists in applying a Cramer Rao Lower Bound (CRLB) expression for discussions, after extracting realistic Channel Impulse Response (CIR) out of recent UWB multipath channel measurement campaign. The CRLB of any unbiased TOA estimator is computed in the [3.1, 5.1]GHz and [3.75, 4.25]GHz bands. The latter frequency band is compliant with the channel 2 of the IEEE 802.15.4a standard, as well as with one mandatory band imposed by the IEEE 802.15.6 standardization group.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116643491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Remote Data Acquisition Using Raspberry Pi3 使用Raspberry Pi3进行远程数据采集
Saeed Ibrahim, Nawwaf Al Harmi, Ebrahim Al Naqbi, Farkhund Iqbal, D. Mouheb, O. Alfandi
In the current age of digitalization, the increasing rate of cybercrimes has become a great matter to the public and private sectors. To mitigate these issues, governments and companies began a journey of building technological solutions and training individuals in the digital forensic field. This has sprouted a growth of digital forensic tools, sold by vendors to detect and analyze cybercrimes, and report the findings to the forensic investigator. However, most of these tools are quite expensive to a point where medium and small size businesses would struggle to afford them. To overcome this issue, we propose, in this paper, an easy to use and inexpensive solution based on a miniature pocket size computer, namely Raspberry Pi, running an image of Kali Linux on the mini SD card. This Raspberry Pi is configured to conduct acquisition of various storage media via physical and remote (network) access.
在当今数字化时代,日益增长的网络犯罪率已经成为公共和私营部门的一个重大问题。为了缓解这些问题,政府和公司开始建立技术解决方案,并在数字取证领域培训个人。这催生了数字取证工具的增长,这些工具由供应商出售,用于检测和分析网络犯罪,并将发现报告给法医调查员。然而,大多数这些工具都相当昂贵,以至于中小型企业很难负担得起。为了克服这个问题,我们在本文中提出了一种易于使用且价格低廉的解决方案,该解决方案基于微型口袋大小的计算机,即树莓派,在迷你SD卡上运行Kali Linux的镜像。这个树莓派被配置为通过物理和远程(网络)访问来获取各种存储介质。
{"title":"Remote Data Acquisition Using Raspberry Pi3","authors":"Saeed Ibrahim, Nawwaf Al Harmi, Ebrahim Al Naqbi, Farkhund Iqbal, D. Mouheb, O. Alfandi","doi":"10.1109/NTMS.2018.8328750","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328750","url":null,"abstract":"In the current age of digitalization, the increasing rate of cybercrimes has become a great matter to the public and private sectors. To mitigate these issues, governments and companies began a journey of building technological solutions and training individuals in the digital forensic field. This has sprouted a growth of digital forensic tools, sold by vendors to detect and analyze cybercrimes, and report the findings to the forensic investigator. However, most of these tools are quite expensive to a point where medium and small size businesses would struggle to afford them. To overcome this issue, we propose, in this paper, an easy to use and inexpensive solution based on a miniature pocket size computer, namely Raspberry Pi, running an image of Kali Linux on the mini SD card. This Raspberry Pi is configured to conduct acquisition of various storage media via physical and remote (network) access.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124978201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Evaluation of UHF RFID Anti-Collision Protocols with NS2 基于NS2的超高频RFID防碰撞协议的评估
R. B. Fraj, V. Beroulle, N. Fourty, A. Meddeb
Radio frequency identification (RFID) has become an enabling and a promising technology for the proliferation of the Internet of Things (IoT) and its implementation. An RFID system front-end is composed of many tags that are identified by one or more readers. The significant issue in RFID system is how to limit the anti-collisions that occur between readers and tags when identifying and reading tags data. A Dynamic Framed Slotted ALOHA (DFSA) mechanism for UHF RFID passive tags was proposed by the EPC Global Class-1 Generation-2 standard (EPC C1 Gen2). In this mechanism the 'Q- algorithm' is used to dynamically update the size of the frame based on the number of unidentified tags. Many researchers have evaluated the Q-Algorithm and proposed many enhancements to ameliorate it and to have better read performances. However, a design of an anti-collision scheme plays a major role in determining a protocol performance. In order to measure a protocol performance, a variety of factors could be used. In this paper we have compared two recent enhancements of the Q-Algorithm with the original one used by the EPC C1 Gen2 standard. We have implemented protocols in NS2 simulator and conduct the comparison based on three factors which are system efficiency, collision ratio and the marginal identification cost. Not only the strengths and weaknesses of the protocols measured were shown by the results, but also the importance of evaluating all relevant performance factors was highlighted especially when comparing anti-collision protocols.
射频识别(RFID)已经成为物联网(IoT)扩散及其实施的一项有前途的技术。RFID系统前端由许多标签组成,这些标签由一个或多个读取器识别。RFID系统的一个重要问题是如何限制识别和读取标签数据时阅读器与标签之间发生的反碰撞。EPC Global Class-1 Generation-2标准(EPC C1 Gen2)提出了一种UHF RFID无源标签的动态框架开槽ALOHA (DFSA)机制。在该机制中,使用“Q-算法”根据未识别标签的数量动态更新帧的大小。许多研究人员已经对q算法进行了评估,并提出了许多改进措施来改进它,以获得更好的读取性能。然而,防冲突方案的设计在决定协议性能方面起着重要作用。为了测量协议性能,可以使用各种因素。在本文中,我们比较了最近两种改进的q -算法与EPC C1 Gen2标准中使用的原始q -算法。我们在NS2模拟器上实现了协议,并基于系统效率、碰撞率和边际识别成本三个因素对协议进行了比较。结果不仅显示了所测协议的优缺点,而且强调了评估所有相关性能因素的重要性,特别是在比较防碰撞协议时。
{"title":"An Evaluation of UHF RFID Anti-Collision Protocols with NS2","authors":"R. B. Fraj, V. Beroulle, N. Fourty, A. Meddeb","doi":"10.1109/NTMS.2018.8328679","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328679","url":null,"abstract":"Radio frequency identification (RFID) has become an enabling and a promising technology for the proliferation of the Internet of Things (IoT) and its implementation. An RFID system front-end is composed of many tags that are identified by one or more readers. The significant issue in RFID system is how to limit the anti-collisions that occur between readers and tags when identifying and reading tags data. A Dynamic Framed Slotted ALOHA (DFSA) mechanism for UHF RFID passive tags was proposed by the EPC Global Class-1 Generation-2 standard (EPC C1 Gen2). In this mechanism the 'Q- algorithm' is used to dynamically update the size of the frame based on the number of unidentified tags. Many researchers have evaluated the Q-Algorithm and proposed many enhancements to ameliorate it and to have better read performances. However, a design of an anti-collision scheme plays a major role in determining a protocol performance. In order to measure a protocol performance, a variety of factors could be used. In this paper we have compared two recent enhancements of the Q-Algorithm with the original one used by the EPC C1 Gen2 standard. We have implemented protocols in NS2 simulator and conduct the comparison based on three factors which are system efficiency, collision ratio and the marginal identification cost. Not only the strengths and weaknesses of the protocols measured were shown by the results, but also the importance of evaluating all relevant performance factors was highlighted especially when comparing anti-collision protocols.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"265 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129194300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1