首页 > 最新文献

2017 8th International Conference on Information and Communication Systems (ICICS)最新文献

英文 中文
Source location privacy in a cluster-based wireless sensor networks against local adversary 基于集群的无线传感器网络中针对本地对手的源位置隐私
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921996
Islam M. Tanash, Fedaa S. Yaseen, M. Al-Mistarihi, Basheer Al-Duwairi, M. Shurman
Wireless Sensor Networks (WSNs) have been popular nowadays as they provide low-cost solutions of a wide-range of real life challenges. WSN consists of a group of infrastructure-less wireless nodes that works together to deliver physical or environmental monitored data from source to sink. In general, WSNs are vulnerable to wireless attacks due to the open nature of the wireless networks. Also, WSNs suffer from unbalanced energy consumption which reduces the network life time due to the creation of the energy-hole. Two types of threats may occur for the WSNs privacy, which are; contextual and content privacy; location privacy is considered as an example for contextual privacy, where an eavesdropper tries to find the location of the source or sink. Hence, ensuring the security and privacy in WSNs is considered as an essential issue. In this paper, we avoid energy-hole creation and protect source location privacy (SLP) via proposing two source privacy protection schemes based on clustering, which are dynamic shortest path scheme (DSP) and Dynamic tree scheme (DT). We adopted grid-based clustering technique to divide the network to several square clusters. Matlab simulation evaluates the performance of the two proposed schemes in terms of safety period.
无线传感器网络(wsn)如今已经很受欢迎,因为它们为广泛的现实生活挑战提供了低成本的解决方案。WSN由一组无基础设施的无线节点组成,这些节点协同工作,将物理或环境监测数据从源发送到接收器。一般来说,由于无线网络的开放性,wsn容易受到无线攻击。此外,由于能量空洞的产生,无线传感器网络的能量消耗不平衡,从而减少了网络的寿命。无线传感器网络的隐私可能会受到两种类型的威胁,它们是;上下文和内容隐私;位置隐私被认为是上下文隐私的一个例子,其中窃听者试图找到源或接收器的位置。因此,确保无线传感器网络的安全性和隐私性是一个至关重要的问题。本文通过提出两种基于聚类的源隐私保护方案,即动态最短路径方案(DSP)和动态树方案(DT),避免了能量洞的产生并保护了源位置隐私(SLP)。我们采用基于网格的聚类技术将网络划分为多个方形聚类。Matlab仿真从安全周期的角度对两种方案的性能进行了评价。
{"title":"Source location privacy in a cluster-based wireless sensor networks against local adversary","authors":"Islam M. Tanash, Fedaa S. Yaseen, M. Al-Mistarihi, Basheer Al-Duwairi, M. Shurman","doi":"10.1109/IACS.2017.7921996","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921996","url":null,"abstract":"Wireless Sensor Networks (WSNs) have been popular nowadays as they provide low-cost solutions of a wide-range of real life challenges. WSN consists of a group of infrastructure-less wireless nodes that works together to deliver physical or environmental monitored data from source to sink. In general, WSNs are vulnerable to wireless attacks due to the open nature of the wireless networks. Also, WSNs suffer from unbalanced energy consumption which reduces the network life time due to the creation of the energy-hole. Two types of threats may occur for the WSNs privacy, which are; contextual and content privacy; location privacy is considered as an example for contextual privacy, where an eavesdropper tries to find the location of the source or sink. Hence, ensuring the security and privacy in WSNs is considered as an essential issue. In this paper, we avoid energy-hole creation and protect source location privacy (SLP) via proposing two source privacy protection schemes based on clustering, which are dynamic shortest path scheme (DSP) and Dynamic tree scheme (DT). We adopted grid-based clustering technique to divide the network to several square clusters. Matlab simulation evaluates the performance of the two proposed schemes in terms of safety period.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132282953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimal Wi-Fi access point placement for RSSI-based indoor localization using genetic algorithm 利用遗传算法优化基于rssi的室内定位Wi-Fi接入点位置
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921986
Abdulsalam Alsmady, F. Awad
Indoor navigation systems help people navigate inside large buildings such as shopping malls, university campuses, and hospitals. To make the navigation system more accurate, there must be a clear distinction between any pair of different positions in terms of the combined received signal strengths of all access points in range. This paper proposes a novel Genetic Algorithm technique to improve the quality of indoor navigation systems by adjusting the positions of the access points so that the combination of received signal strengths in each predefined block of the area unique. The simulation results demonstrated that, using the proposed algorithm, the uniqueness of the combined received signal strengths exceed 90% when seven access points are used. The proposed method provides an infrastructure for enhancing indoor navigation system quality.
室内导航系统帮助人们在大型建筑内导航,如购物中心、大学校园和医院。为了使导航系统更加精确,必须根据范围内所有接入点的综合接收信号强度,明确区分任何一对不同位置。本文提出了一种新的遗传算法技术,通过调整接入点的位置,使区域内每个预定义块的接收信号强度组合唯一,从而提高室内导航系统的质量。仿真结果表明,当使用7个接入点时,所提算法的组合接收信号强度唯一性超过90%。该方法为提高室内导航系统的质量提供了基础。
{"title":"Optimal Wi-Fi access point placement for RSSI-based indoor localization using genetic algorithm","authors":"Abdulsalam Alsmady, F. Awad","doi":"10.1109/IACS.2017.7921986","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921986","url":null,"abstract":"Indoor navigation systems help people navigate inside large buildings such as shopping malls, university campuses, and hospitals. To make the navigation system more accurate, there must be a clear distinction between any pair of different positions in terms of the combined received signal strengths of all access points in range. This paper proposes a novel Genetic Algorithm technique to improve the quality of indoor navigation systems by adjusting the positions of the access points so that the combination of received signal strengths in each predefined block of the area unique. The simulation results demonstrated that, using the proposed algorithm, the uniqueness of the combined received signal strengths exceed 90% when seven access points are used. The proposed method provides an infrastructure for enhancing indoor navigation system quality.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133144359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A layered model approach for care process monitoring 护理过程监控的分层模型方法
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921953
Mohamed Anis Mokahhal, A. Baarah, L. Peyton
In this paper, we present a layered model-based approach to Care Process Monitoring (CPM). Business Process Management (BPM) technology is used to manage the care process online with an explicit business process model. The business process model is structured into three layers (organizations, processes, and interfaces) and uses vertical swim lanes with tracking points to identify where to monitor care process. An existing cardiology care process case study from a Canadian hospital is used to evaluate the approach. Transitions between different departments in a hospital are often problematic and a source of bottlenecks, so a technique of integrating event messages with a flexible triggering mechanism is also presented.
在本文中,我们提出了一种基于分层模型的护理过程监测(CPM)方法。业务流程管理(BPM)技术用于使用显式业务流程模型在线管理护理流程。业务流程模型分为三个层(组织、流程和接口),并使用带有跟踪点的垂直泳道来确定在何处监视护理流程。一个加拿大医院现有的心脏病护理过程案例研究被用来评估该方法。医院中不同部门之间的转换通常是有问题的,并且是瓶颈的来源,因此还提出了一种将事件消息与灵活的触发机制集成的技术。
{"title":"A layered model approach for care process monitoring","authors":"Mohamed Anis Mokahhal, A. Baarah, L. Peyton","doi":"10.1109/IACS.2017.7921953","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921953","url":null,"abstract":"In this paper, we present a layered model-based approach to Care Process Monitoring (CPM). Business Process Management (BPM) technology is used to manage the care process online with an explicit business process model. The business process model is structured into three layers (organizations, processes, and interfaces) and uses vertical swim lanes with tracking points to identify where to monitor care process. An existing cardiology care process case study from a Canadian hospital is used to evaluate the approach. Transitions between different departments in a hospital are often problematic and a source of bottlenecks, so a technique of integrating event messages with a flexible triggering mechanism is also presented.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129475552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the analysis of road surface conditions using embedded smartphone sensors 基于嵌入式智能手机传感器的路面状况分析
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921967
Y. Alqudah, B. Sababha
Road conditions play a critical role in ensuring traffic safety and reducing traffic jams and congestions. Ensuring healthy conditions require constant monitoring to detect and predict potential road deterioration. This work proposes a low-cost solution that takes advantage of sensory capabilities of smartphones. By recording Gyro rotation sensor data, we show that abnormalities can be detected by calculating the second moment of sensor data. Our work is validated by drive tests that show results are consistent and repeatable. The work also proposed a dynamic time warping technique to measure similarity between drive results and to obtain accurate representation of multiple drives data.
道路状况在确保交通安全和减少交通堵塞和拥堵方面发挥着关键作用。确保健康的条件需要不断监测,以发现和预测潜在的道路恶化。这项工作提出了一种利用智能手机感知能力的低成本解决方案。通过记录陀螺旋转传感器数据,我们表明可以通过计算传感器数据的第二矩来检测异常。我们的工作得到了驱动测试的验证,结果是一致的和可重复的。该工作还提出了一种动态时间规整技术来测量驱动器结果之间的相似性,并获得多个驱动器数据的准确表示。
{"title":"On the analysis of road surface conditions using embedded smartphone sensors","authors":"Y. Alqudah, B. Sababha","doi":"10.1109/IACS.2017.7921967","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921967","url":null,"abstract":"Road conditions play a critical role in ensuring traffic safety and reducing traffic jams and congestions. Ensuring healthy conditions require constant monitoring to detect and predict potential road deterioration. This work proposes a low-cost solution that takes advantage of sensory capabilities of smartphones. By recording Gyro rotation sensor data, we show that abnormalities can be detected by calculating the second moment of sensor data. Our work is validated by drive tests that show results are consistent and repeatable. The work also proposed a dynamic time warping technique to measure similarity between drive results and to obtain accurate representation of multiple drives data.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132613516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Single loop synthesizer and SDR modulator 单回路合成器和SDR调制器
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921971
Osama Alawneh, Mohammad Deeb, Omar Alma'aita, Anwar Assaf, Nidal Al-Qawabah
Software defined radios are becoming very popular due to their cost, size, and ability to create any waveforms. In this paper, we present a simpler software defined modulator for VHF radios based on a digital synthesizer that is composed of a single phase locked loop with a variable reference frequency. Existing synthesizers are limited to either small step-size with spurs as in fractional N architecture or large step-size with no spurs as in integer N architecture. Our proposed synthesizer has fast-lock time that is capable to work as a software modulator for phase and frequency in software defined radios, small phase noise, and no spurs. We used simulation to validate our approach and the results showed that it is superior to the existing synthesizer architectures.
软件定义无线电由于其成本,尺寸和创建任何波形的能力而变得非常流行。在本文中,我们提出了一种基于数字合成器的更简单的甚高频无线电软件定义调制器,该调制器由一个可变参考频率的单相锁相环组成。现有的合成器要么限于带杂散的小步长(如分数N结构),要么限于无杂散的大步长(如整数N结构)。我们提出的合成器具有快速锁定时间,能够作为软件定义无线电中的相位和频率的软件调制器,相位噪声小,无杂散。我们使用仿真来验证我们的方法,结果表明它优于现有的合成器架构。
{"title":"Single loop synthesizer and SDR modulator","authors":"Osama Alawneh, Mohammad Deeb, Omar Alma'aita, Anwar Assaf, Nidal Al-Qawabah","doi":"10.1109/IACS.2017.7921971","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921971","url":null,"abstract":"Software defined radios are becoming very popular due to their cost, size, and ability to create any waveforms. In this paper, we present a simpler software defined modulator for VHF radios based on a digital synthesizer that is composed of a single phase locked loop with a variable reference frequency. Existing synthesizers are limited to either small step-size with spurs as in fractional N architecture or large step-size with no spurs as in integer N architecture. Our proposed synthesizer has fast-lock time that is capable to work as a software modulator for phase and frequency in software defined radios, small phase noise, and no spurs. We used simulation to validate our approach and the results showed that it is superior to the existing synthesizer architectures.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130697818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An investigation of the proliferation of mobile ERP apps and their usability 移动ERP应用程序的普及及其可用性的调查
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921997
Khalil Omar, J. Gómez
Mobile ERP is the current trend of ERP systems, and it has become the focus of the attention of the most ERP vendors. The proliferation of mobile devices, the advances in mobile computing, and the huge leaps of mobile HCI all together are considered the main factors that supported the realization of the mobile ERP concept. However, literature didn't pay enough attention to this subject in both the academic and practical level. Therefore, this paper tackle this issues associated with the adoption rates of mobile ERP and its proliferation in different business sectors and enterprise sizes, the reasons behind the adoption of mobile ERP, determining ERP's modules that are frequently being accessed via mobile devices, determining the level of difficulty, acceptability, and learnability for each typical ERP's module that has been accessed via mobile devices; and determining the predominant mobile OSes and devices that are used to operate mobile ERP apps.
移动ERP是当前ERP系统的发展趋势,已成为大多数ERP厂商关注的焦点。移动设备的普及、移动计算的进步以及移动HCI的巨大飞跃都被认为是支持实现移动ERP概念的主要因素。然而,无论是在学术层面还是在实践层面,文献对这一主题的关注都不够。因此,本文解决了与移动ERP的采用率及其在不同业务部门和企业规模中的扩散相关的问题,采用移动ERP的原因,确定通过移动设备频繁访问的ERP模块,确定通过移动设备访问的每个典型ERP模块的难度,可接受性和可学习性;并确定用于运行移动ERP应用程序的主要移动操作系统和设备。
{"title":"An investigation of the proliferation of mobile ERP apps and their usability","authors":"Khalil Omar, J. Gómez","doi":"10.1109/IACS.2017.7921997","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921997","url":null,"abstract":"Mobile ERP is the current trend of ERP systems, and it has become the focus of the attention of the most ERP vendors. The proliferation of mobile devices, the advances in mobile computing, and the huge leaps of mobile HCI all together are considered the main factors that supported the realization of the mobile ERP concept. However, literature didn't pay enough attention to this subject in both the academic and practical level. Therefore, this paper tackle this issues associated with the adoption rates of mobile ERP and its proliferation in different business sectors and enterprise sizes, the reasons behind the adoption of mobile ERP, determining ERP's modules that are frequently being accessed via mobile devices, determining the level of difficulty, acceptability, and learnability for each typical ERP's module that has been accessed via mobile devices; and determining the predominant mobile OSes and devices that are used to operate mobile ERP apps.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124262118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AppTwins: A new approach to identify app package in network traffic AppTwins:一种在网络流量中识别应用程序包的新方法
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921975
Xiang Li, Chao Zheng, Chengwei Zhang, Shu Li, Li Guo, J. Xu
The smartphone applications have taken place of the web browser and became the user's primary internet entrance. One application's popularity can be measured by its downloading times, and it is valuable for commercial advertising. Identifying app installation packages from network traffic is one of the most feasible approaches to collect these data. But asymmetric routing, incomplete capture and so on make it challenging to determine app's name at large scale in network traffic. With these constraints, we proposed AppTwins, an efficient, robust and automatical approach which has the ability to determine corrupted package's name. The identification consists of three distinct steps. Step 1, identify app packages with a stream fuzzy hash fingerprint database in live network traffic. Step 2, the unprecedented ones were captured and decompiled to acquire new app's name, a fingerprint was also calculated. Step3, update the database with new app's name and fingerprint. AppTwins achieves up a recall rate of 97.63% and a precision rate of 96.44% when app packages are almost complete. Furthermore, It can also identify incomplete app packages in the real traffic where there are no name or URL.
智能手机应用程序已经取代了网页浏览器,成为用户上网的主要入口。一个应用程序的受欢迎程度可以通过它的下载次数来衡量,它对商业广告很有价值。从网络流量中识别应用程序安装包是收集这些数据的最可行方法之一。但是不对称路由、不完全捕获等问题使得在网络流量中大规模确定应用程序的名称具有挑战性。有了这些限制,我们提出了AppTwins,这是一种高效、健壮和自动的方法,能够确定损坏的包的名称。识别包括三个不同的步骤。第1步,在实时网络流量中使用流模糊哈希指纹数据库识别应用程序包。第2步,捕获前所未见的应用程序并进行反编译,获取新应用程序的名称,并计算指纹。步骤3,用新应用程序的名称和指纹更新数据库。当应用程序包几乎完成时,AppTwins的召回率为97.63%,准确率为96.44%。此外,它还可以识别真实流量中没有名称或URL的不完整应用程序包。
{"title":"AppTwins: A new approach to identify app package in network traffic","authors":"Xiang Li, Chao Zheng, Chengwei Zhang, Shu Li, Li Guo, J. Xu","doi":"10.1109/IACS.2017.7921975","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921975","url":null,"abstract":"The smartphone applications have taken place of the web browser and became the user's primary internet entrance. One application's popularity can be measured by its downloading times, and it is valuable for commercial advertising. Identifying app installation packages from network traffic is one of the most feasible approaches to collect these data. But asymmetric routing, incomplete capture and so on make it challenging to determine app's name at large scale in network traffic. With these constraints, we proposed AppTwins, an efficient, robust and automatical approach which has the ability to determine corrupted package's name. The identification consists of three distinct steps. Step 1, identify app packages with a stream fuzzy hash fingerprint database in live network traffic. Step 2, the unprecedented ones were captured and decompiled to acquire new app's name, a fingerprint was also calculated. Step3, update the database with new app's name and fingerprint. AppTwins achieves up a recall rate of 97.63% and a precision rate of 96.44% when app packages are almost complete. Furthermore, It can also identify incomplete app packages in the real traffic where there are no name or URL.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115111085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bimodal behavioral authentication framework based on decision fusion 基于决策融合的双峰行为认证框架
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7922000
Ahmed M. Mahfouz, Tarek M. Mahmoud, A. Eldin
The majority of proposed behavioral biometric systems on smartphones are unimodal based, which rely only on a single source of information such as gesture or keystrokes. Unfortunately, these systems are suffering from some problems such as noisy data and non-universality. Moreover, they provide lower authentication accuracy in compare with the physiological biometrics such as Face. To address these problems, we developed a bimodal authentication framework based on decision fusion. We conducted a field study by instrumenting the Android OS. We analyzed data from 52 participants during 30-day period. We present the prototype of our framework, where we developed two authentication modalities. First, a gesture authentication modality, which authenticate smartphone users based on touch gesture. Second, a keystrokes authentication modality, which authenticate smartphone users based on the way they type. We evaluated each authentication modality based on two schemes, classification scheme and anomaly detection scheme. Then we used the decision fusion method to enhance the accuracy of detection.
大多数智能手机上的行为生物识别系统都是单模态的,只依赖于单一的信息源,比如手势或按键。不幸的是,这些系统存在数据噪声和非通用性等问题。此外,与人脸等生理生物识别技术相比,它们的认证精度较低。为了解决这些问题,我们开发了一个基于决策融合的双峰身份验证框架。我们通过测试Android操作系统进行了实地研究。我们分析了52名参与者在30天内的数据。我们展示了框架的原型,我们在其中开发了两种身份验证模式。首先,手势认证模式,基于触摸手势对智能手机用户进行认证。第二,击键认证模式,根据智能手机用户的输入方式对其进行认证。我们基于分类方案和异常检测方案两种方案对每种认证方式进行了评估。然后采用决策融合方法提高检测精度。
{"title":"Bimodal behavioral authentication framework based on decision fusion","authors":"Ahmed M. Mahfouz, Tarek M. Mahmoud, A. Eldin","doi":"10.1109/IACS.2017.7922000","DOIUrl":"https://doi.org/10.1109/IACS.2017.7922000","url":null,"abstract":"The majority of proposed behavioral biometric systems on smartphones are unimodal based, which rely only on a single source of information such as gesture or keystrokes. Unfortunately, these systems are suffering from some problems such as noisy data and non-universality. Moreover, they provide lower authentication accuracy in compare with the physiological biometrics such as Face. To address these problems, we developed a bimodal authentication framework based on decision fusion. We conducted a field study by instrumenting the Android OS. We analyzed data from 52 participants during 30-day period. We present the prototype of our framework, where we developed two authentication modalities. First, a gesture authentication modality, which authenticate smartphone users based on touch gesture. Second, a keystrokes authentication modality, which authenticate smartphone users based on the way they type. We evaluated each authentication modality based on two schemes, classification scheme and anomaly detection scheme. Then we used the decision fusion method to enhance the accuracy of detection.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115327290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PVD: Passive vulnerability detection PVD:被动漏洞检测
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921992
Marian Gawron, Feng Cheng, C. Meinel
The identification of vulnerabilities relies on detailed information about the target infrastructure. The gathering of the necessary information is a crucial step that requires an intensive scanning or mature expertise and knowledge about the system even though the information was already available in a different context. In this paper we propose a new method to detect vulnerabilities that reuses the existing information and eliminates the necessity of a comprehensive scan of the target system. Since our approach is able to identify vulnerabilities without the additional effort of a scan, we are able to increase the overall performance of the detection. Because of the reuse and the removal of the active testing procedures, our approach could be classified as a passive vulnerability detection. We will explain the approach and illustrate the additional possibility to increase the security awareness of users. Therefore, we applied the approach on an experimental setup and extracted security relevant information from web logs.
漏洞的识别依赖于目标基础设施的详细信息。收集必要的信息是至关重要的一步,它需要对系统进行深入的扫描或成熟的专业知识和知识,即使这些信息已经在不同的上下文中可用。在本文中,我们提出了一种新的方法来检测漏洞重用现有的信息,消除了对目标系统进行全面扫描的必要性。由于我们的方法能够识别漏洞,而无需额外的扫描工作,因此我们能够提高检测的整体性能。由于主动测试过程的重用和删除,我们的方法可以被归类为被动漏洞检测。我们将解释这种方法,并说明提高用户安全意识的其他可能性。因此,我们将该方法应用于实验设置,并从web日志中提取安全相关信息。
{"title":"PVD: Passive vulnerability detection","authors":"Marian Gawron, Feng Cheng, C. Meinel","doi":"10.1109/IACS.2017.7921992","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921992","url":null,"abstract":"The identification of vulnerabilities relies on detailed information about the target infrastructure. The gathering of the necessary information is a crucial step that requires an intensive scanning or mature expertise and knowledge about the system even though the information was already available in a different context. In this paper we propose a new method to detect vulnerabilities that reuses the existing information and eliminates the necessity of a comprehensive scan of the target system. Since our approach is able to identify vulnerabilities without the additional effort of a scan, we are able to increase the overall performance of the detection. Because of the reuse and the removal of the active testing procedures, our approach could be classified as a passive vulnerability detection. We will explain the approach and illustrate the additional possibility to increase the security awareness of users. Therefore, we applied the approach on an experimental setup and extracted security relevant information from web logs.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132812499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Outage probability for end user mobile in cognitive relay networks over mixed fading channels 混合衰落信道下认知中继网络中终端用户移动的中断概率
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921987
Lama N. Ibrahem, M. Khodeir, M. Al-Mistarihi
In this paper, an upper bound expression of the outage probability (OP) under interference power constraint is derived for cognitive amplify-and-forward (AF) relay network with best relay selection (BRS) scheme. In the proposed model, the destination moves at high speed, more than 100km/h and the channels that connected with destination are modeled as Nakagami-m fading channels, m < 1 whereas the other communication links are modeled by Rayleigh distribution. Analytical results are presented to evaluate the impact of the number of secondary relays, primary user (PU) location, and the severity parameter m on the performance of the cognitive relay network. Analytical results show that the Nakagami-m fading model can more accurately model conditions in vehicular environment.
本文推导了具有最佳中继选择(BRS)方案的认知放大转发(AF)中继网络在干扰功率约束下的中断概率(OP)的上界表达式。在该模型中,目的地以大于100km/h的高速运动,与目的地相连的信道建模为Nakagami-m衰落信道,m < 1,其他通信链路采用瑞利分布建模。分析结果评估了二次中继数量、主用户位置和严重程度参数m对认知中继网络性能的影响。分析结果表明,Nakagami-m衰落模型能更准确地模拟车辆环境中的条件。
{"title":"Outage probability for end user mobile in cognitive relay networks over mixed fading channels","authors":"Lama N. Ibrahem, M. Khodeir, M. Al-Mistarihi","doi":"10.1109/IACS.2017.7921987","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921987","url":null,"abstract":"In this paper, an upper bound expression of the outage probability (OP) under interference power constraint is derived for cognitive amplify-and-forward (AF) relay network with best relay selection (BRS) scheme. In the proposed model, the destination moves at high speed, more than 100km/h and the channels that connected with destination are modeled as Nakagami-m fading channels, m < 1 whereas the other communication links are modeled by Rayleigh distribution. Analytical results are presented to evaluate the impact of the number of secondary relays, primary user (PU) location, and the severity parameter m on the performance of the cognitive relay network. Analytical results show that the Nakagami-m fading model can more accurately model conditions in vehicular environment.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"420 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126706895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2017 8th International Conference on Information and Communication Systems (ICICS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1