首页 > 最新文献

2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies最新文献

英文 中文
A Secure Authentication and Key Agreement Protocol for Telecare Medicine Information System 远程医疗信息系统的安全认证与密钥协议
Xuanang Li, Zhiming Zheng, Xiao Zhang
Telecare Medicine Information System enables patients to get healthcare services at home expediently and efficiently. Authentication and key agreement protocol suited for TMIS protect patient's privacy via the unsecure network. Recently, numerous protocols have been proposed intend to safeguard the communication between patients and server. However, most of them have high computation overhead and security problems. In this paper, we aim to propose a secure and effective authentication and key agreement protocol using smartcard and password for TMIS. The protocol is based on elliptic curve cryptography. Through security analysis we illustrate that our protocol is secure to resist some known attacks and provide user anonymity. Furthermore, by comparing with other related protocols we show our protocol is superior in security and performance aspects.
远程医疗信息系统使患者能够方便、高效地在家中获得医疗保健服务。适用于TMIS的身份验证和密钥协议通过不安全的网络保护了患者的隐私。最近,人们提出了许多协议来保护患者和服务器之间的通信。然而,它们大多存在较高的计算开销和安全问题。本文旨在提出一种安全有效的基于智能卡和密码的TMIS认证和密钥协商协议。该协议基于椭圆曲线密码学。通过安全分析,我们证明了我们的协议是安全的,可以抵御一些已知的攻击,并提供用户匿名。此外,通过与其他相关协议的比较,我们的协议在安全性和性能方面都具有优势。
{"title":"A Secure Authentication and Key Agreement Protocol for Telecare Medicine Information System","authors":"Xuanang Li, Zhiming Zheng, Xiao Zhang","doi":"10.1109/NGMAST.2015.75","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.75","url":null,"abstract":"Telecare Medicine Information System enables patients to get healthcare services at home expediently and efficiently. Authentication and key agreement protocol suited for TMIS protect patient's privacy via the unsecure network. Recently, numerous protocols have been proposed intend to safeguard the communication between patients and server. However, most of them have high computation overhead and security problems. In this paper, we aim to propose a secure and effective authentication and key agreement protocol using smartcard and password for TMIS. The protocol is based on elliptic curve cryptography. Through security analysis we illustrate that our protocol is secure to resist some known attacks and provide user anonymity. Furthermore, by comparing with other related protocols we show our protocol is superior in security and performance aspects.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132241281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Routing Fault-Tolerance for Heterogeneous WSNs Based on an Immune Cooperative Multi-Particle-Swarm Algorithm 基于免疫协同多粒子群算法的异构WSNs路由容错
Yifan Hu, Xiaoming Wu, Fu-Qiang Wang, Yong Pang, Xiangzhi Liu, Jianqiang Zhang, Yong Fu
In this paper, we address the fault-tolerant routing problem in a heterogeneous wireless sensor network consisting of several resource-rich supernodes, and large number of energy-constrained sensor nodes. We propose the immune cooperative multi-particle-swarm algorithm (ICMPSA) to provide fast routing recovery method, in order to maintain K disjoint paths from each source node to the nearest supernode, and the available path from supernode to the sink. The key concept of our method is to efficiently repair the broken links between intercluster supernodes or intracluster sensor nodes with less network resources. Performance and analysis results of our ICMPSA based routing fault-tolerant protocol approve that it can provide reliable communication with fast bio-heuristic routing recovery mechanism, thus extend the lifetime of WSNs.
本文研究了由多个资源丰富的超级节点和大量能量受限的传感器节点组成的异构无线传感器网络中的容错路由问题。为了保持每个源节点到最近超级节点的K条不相交路径,以及超级节点到汇聚节点的K条可用路径,我们提出了免疫协同多粒子群算法(ICMPSA),提供快速路由恢复方法。该方法的核心思想是利用较少的网络资源,有效地修复集群间超级节点或集群内传感器节点之间断裂的链路。基于ICMPSA的路由容错协议的性能和分析结果表明,该协议可以提供可靠的通信,并具有快速的生物启发式路由恢复机制,从而延长了wsn的生命周期。
{"title":"Routing Fault-Tolerance for Heterogeneous WSNs Based on an Immune Cooperative Multi-Particle-Swarm Algorithm","authors":"Yifan Hu, Xiaoming Wu, Fu-Qiang Wang, Yong Pang, Xiangzhi Liu, Jianqiang Zhang, Yong Fu","doi":"10.1109/NGMAST.2015.11","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.11","url":null,"abstract":"In this paper, we address the fault-tolerant routing problem in a heterogeneous wireless sensor network consisting of several resource-rich supernodes, and large number of energy-constrained sensor nodes. We propose the immune cooperative multi-particle-swarm algorithm (ICMPSA) to provide fast routing recovery method, in order to maintain K disjoint paths from each source node to the nearest supernode, and the available path from supernode to the sink. The key concept of our method is to efficiently repair the broken links between intercluster supernodes or intracluster sensor nodes with less network resources. Performance and analysis results of our ICMPSA based routing fault-tolerant protocol approve that it can provide reliable communication with fast bio-heuristic routing recovery mechanism, thus extend the lifetime of WSNs.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116101673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Lightweight Authentication Scheme for E-Health Applications in the Context of Internet of Things 面向物联网环境下电子医疗应用的轻量级认证方案
Hamza Khemissa, Djamel Tandjaoui
The strong development of the Internet of Things (IoT) is changing traditional perceptions of the current Internet towards a vision of smart objects interacting with each other. In this vision e-health applications are one of the most promising applications in IoT. However, security issues are the major obstacle for their deployment. Among these issues, authentication of the different interconnected entities and exchanged data confidentiality constitutes the main concerns for users that need to be addressed. In this paper, we propose a new lightweight authentication scheme for an e-health application. This scheme allows both of sensors and the Base Station (BS) to authenticate each other in order to secure the collection of health-related data. Our scheme uses nonces and Keyed-Hash message authentication (HMAC) to check the integrity of authentication exchanges. In addition, it provides authentication with less energy consumption, and it terminates with a session key agreement between each sensor and the Base Station. To assess our scheme, we carry out a performance and security analysis. The obtained results show that our scheme saves energy. In addition, it is resistant against different types of attacks.
物联网(IoT)的强劲发展正在改变人们对当前互联网的传统看法,使其朝着智能物体相互交互的愿景发展。在这个愿景中,电子医疗应用是物联网中最有前途的应用之一。然而,安全问题是其部署的主要障碍。在这些问题中,不同互联实体的身份验证和交换数据的机密性是用户需要解决的主要问题。在本文中,我们提出了一种新的轻量级身份验证方案。该方案允许传感器和基站(BS)相互验证,以确保健康相关数据的收集。我们的方案使用随机数和密钥哈希消息认证(HMAC)来检查认证交换的完整性。此外,它以较少的能耗提供身份验证,并以每个传感器和基站之间的会话密钥协议结束。为了评估我们的方案,我们进行了性能和安全性分析。实验结果表明,该方案具有较好的节能效果。此外,它还可以抵抗不同类型的攻击。
{"title":"A Lightweight Authentication Scheme for E-Health Applications in the Context of Internet of Things","authors":"Hamza Khemissa, Djamel Tandjaoui","doi":"10.1109/NGMAST.2015.31","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.31","url":null,"abstract":"The strong development of the Internet of Things (IoT) is changing traditional perceptions of the current Internet towards a vision of smart objects interacting with each other. In this vision e-health applications are one of the most promising applications in IoT. However, security issues are the major obstacle for their deployment. Among these issues, authentication of the different interconnected entities and exchanged data confidentiality constitutes the main concerns for users that need to be addressed. In this paper, we propose a new lightweight authentication scheme for an e-health application. This scheme allows both of sensors and the Base Station (BS) to authenticate each other in order to secure the collection of health-related data. Our scheme uses nonces and Keyed-Hash message authentication (HMAC) to check the integrity of authentication exchanges. In addition, it provides authentication with less energy consumption, and it terminates with a session key agreement between each sensor and the Base Station. To assess our scheme, we carry out a performance and security analysis. The obtained results show that our scheme saves energy. In addition, it is resistant against different types of attacks.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126100607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
An Autoregressive Estimator for Overhead Reduction in Substitution Networks 替代网络开销缩减的自回归估计
K. Miranda, N. Mitton, V. Ramos
A substitution network is a temporary network that self-deploys to dynamically replace a portion of a damaged infrastructure by means of a fleet of mobile routers. Some efficient solutions deploy robots based on active measurements. A robot/node in the network may use active link monitoring to assess the link quality towards its neighbors through the use of probe packets. Such probe packets are sent periodically at a given rate, and so, the accuracy of the measurements depends on the number and the frequency of exchanged packets. However, exchanging probe packets is energy and bandwidth consuming, thus active monitoring is considered as a costly mechanism. Even so, active link monitoring is a technique widely used on many network protocols. In this paper, we focus on an adaptive positioning algorithm (APOLO) to self-deploy a network. APOLO is based on active monitoring to gather essential information from nodes. Therefore, we show how autoregressive estimation may be used to reduce the overhead caused by the active measuring technique. Moreover, it is possible to use surrogate data rather than real data to feed APOLO without impacting its performance.
替代网络是一种自部署的临时网络,通过一组移动路由器动态替换部分损坏的基础设施。一些有效的解决方案部署基于主动测量的机器人。网络中的机器人/节点可以使用主动链路监控,通过使用探测包来评估到其邻居的链路质量。这种探测包以给定的速率周期性地发送,因此,测量的准确性取决于交换包的数量和频率。然而,交换探测报文消耗能量和带宽,因此主动监控被认为是一种昂贵的机制。尽管如此,主动链路监控仍然是许多网络协议中广泛使用的一种技术。本文主要研究一种自适应定位算法(APOLO)来实现网络的自部署。阿波罗是基于主动监测从节点收集重要信息。因此,我们展示了如何使用自回归估计来减少由主动测量技术引起的开销。此外,可以使用代理数据而不是真实数据来为apollo提供数据,而不会影响其性能。
{"title":"An Autoregressive Estimator for Overhead Reduction in Substitution Networks","authors":"K. Miranda, N. Mitton, V. Ramos","doi":"10.1109/NGMAST.2015.55","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.55","url":null,"abstract":"A substitution network is a temporary network that self-deploys to dynamically replace a portion of a damaged infrastructure by means of a fleet of mobile routers. Some efficient solutions deploy robots based on active measurements. A robot/node in the network may use active link monitoring to assess the link quality towards its neighbors through the use of probe packets. Such probe packets are sent periodically at a given rate, and so, the accuracy of the measurements depends on the number and the frequency of exchanged packets. However, exchanging probe packets is energy and bandwidth consuming, thus active monitoring is considered as a costly mechanism. Even so, active link monitoring is a technique widely used on many network protocols. In this paper, we focus on an adaptive positioning algorithm (APOLO) to self-deploy a network. APOLO is based on active monitoring to gather essential information from nodes. Therefore, we show how autoregressive estimation may be used to reduce the overhead caused by the active measuring technique. Moreover, it is possible to use surrogate data rather than real data to feed APOLO without impacting its performance.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128587808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LSEA: Light Weight Sector Eligibility Algorithm for k-Coverage in Wireless Sensor Networks 无线传感器网络中k-覆盖的轻量级扇区资格算法
M. Chenait, B. Zebbane, Lyes Boufennara, Lotfi Haouaya, Chafika Benzaid, N. Badache
In wireless sensor networks, preserving sensing k-coverage with energy constraint is a basic issue drawing increasing attentions. In fact, the k-coverage configuration is extensively exploited to ensure that each location is covered by at least k active sensor nodes. However, most of these algorithms incur several drawbacks like: i) The need of a global view of the monitored field ii) Redundant sensor occurrence, and iii) Considerably high computation cost. We propose, in this paper, (LSEA) a distributed Lightweight Sector Eligibility Algorithm that settles all of the above critical problems and prove that a monitored area is k-covered with very low cost. LSEA proves that whether a sensor is eligible to sleep (redundant) or stay active can be accurately determined by simply checking if its neighbours belong to a well known set of points within its sensing range (Flower Area). LSEA has a computational complexity of O(N), where N is the number of neighboring nodes, lower than the complexity of many other eligibility algorithms. Simulation results confirm the theoretical analysis.
在无线传感器网络中,能量约束下保持传感k覆盖是一个日益受到关注的基本问题。事实上,k覆盖配置被广泛利用,以确保每个位置被至少k个主动传感器节点覆盖。然而,这些算法中的大多数都会产生一些缺点,例如:i)需要监测领域的全局视图ii)冗余传感器的出现,以及iii)相当高的计算成本。在本文中,我们提出了一种分布式轻量级扇区资格算法(LSEA),该算法解决了上述所有关键问题,并以非常低的成本证明了监控区域是k覆盖的。LSEA证明,传感器是否有资格休眠(冗余)或保持活跃,可以通过简单地检查其邻居是否属于其感知范围内的一组已知点(花区)来准确确定。LSEA的计算复杂度为O(N),其中N为相邻节点的个数,低于许多其他合格性算法的复杂度。仿真结果证实了理论分析的正确性。
{"title":"LSEA: Light Weight Sector Eligibility Algorithm for k-Coverage in Wireless Sensor Networks","authors":"M. Chenait, B. Zebbane, Lyes Boufennara, Lotfi Haouaya, Chafika Benzaid, N. Badache","doi":"10.1109/NGMAST.2015.66","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.66","url":null,"abstract":"In wireless sensor networks, preserving sensing k-coverage with energy constraint is a basic issue drawing increasing attentions. In fact, the k-coverage configuration is extensively exploited to ensure that each location is covered by at least k active sensor nodes. However, most of these algorithms incur several drawbacks like: i) The need of a global view of the monitored field ii) Redundant sensor occurrence, and iii) Considerably high computation cost. We propose, in this paper, (LSEA) a distributed Lightweight Sector Eligibility Algorithm that settles all of the above critical problems and prove that a monitored area is k-covered with very low cost. LSEA proves that whether a sensor is eligible to sleep (redundant) or stay active can be accurately determined by simply checking if its neighbours belong to a well known set of points within its sensing range (Flower Area). LSEA has a computational complexity of O(N), where N is the number of neighboring nodes, lower than the complexity of many other eligibility algorithms. Simulation results confirm the theoretical analysis.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116189122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Affect of Two Cryptographic Constructs on QoS and QoE for Unmanned Control Vehicles 两种加密结构对无人控制车辆QoS和QoE的影响
R. D. Sparrow, A. A. Adekunle, R. J. Berry, R. Farnish
Unmanned control vehicles are used for a variety of scenarios where the user can conduct a task from a remote location, scenarios include surveillance, disaster recovery and agricultural farming. The operation of unmanned vehicles is generally conducted over a wireless communication medium. The nature of the wireless broadcast allows attackers to exploit security vulnerabilities through passive and active attacks, consequently, cryptography is often selected as a countermeasure to the aforementioned attacks. This paper analyses simulation undertaken to identify the affect of cryptographic constructs on the Quality of Service (QoS) and Quality of Experience (QoE) of controlling an unmanned vehicle. Results indicate that standardised AEAD cryptographic approaches can increase the additional distance travelled by a unmanned vehicle over multiple hops communications up to 110 meters per second.
无人控制车辆用于各种场景,用户可以从远程位置执行任务,场景包括监视,灾难恢复和农业耕作。无人驾驶车辆的操作通常通过无线通信媒介进行。无线广播的性质允许攻击者通过被动和主动攻击来利用安全漏洞,因此,通常选择加密作为上述攻击的对策。本文分析了为识别加密结构对控制无人驾驶车辆的服务质量(QoS)和体验质量(QoE)的影响而进行的仿真。结果表明,标准化的AEAD加密方法可以增加无人驾驶车辆在多跳通信中行驶的额外距离,最高可达每秒110米。
{"title":"The Affect of Two Cryptographic Constructs on QoS and QoE for Unmanned Control Vehicles","authors":"R. D. Sparrow, A. A. Adekunle, R. J. Berry, R. Farnish","doi":"10.1109/NGMAST.2015.46","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.46","url":null,"abstract":"Unmanned control vehicles are used for a variety of scenarios where the user can conduct a task from a remote location, scenarios include surveillance, disaster recovery and agricultural farming. The operation of unmanned vehicles is generally conducted over a wireless communication medium. The nature of the wireless broadcast allows attackers to exploit security vulnerabilities through passive and active attacks, consequently, cryptography is often selected as a countermeasure to the aforementioned attacks. This paper analyses simulation undertaken to identify the affect of cryptographic constructs on the Quality of Service (QoS) and Quality of Experience (QoE) of controlling an unmanned vehicle. Results indicate that standardised AEAD cryptographic approaches can increase the additional distance travelled by a unmanned vehicle over multiple hops communications up to 110 meters per second.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125981863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed Intrusion Detection System for Wireless Sensor Networks 无线传感器网络分布式入侵检测系统
K. Medhat, R. Ramadan, I. Talkhan
Wireless Sensor Networks is extensively used in many of applications related to different fields. Some of those applications deal with confidential and critical data that must be protected from unauthorized access. Some other systems use WSNs that are deployed in very harsh environments with limited energy resources. Those systems cannot tolerate network failures that can be caused by network intruders. In this paper, an efficient intrusion detection model is introduced. The model uses intelligent techniques to detect intrusions. Two different architectures are introduced. The first architecture represents the level of sensor node, sink node, and base station. The second architecture represents the levels of sensor and sink nodes. This work proposes two intrusion detection algorithms, one uses a supervised learning mechanism to be used on the level of the sensor node and the other uses an unsupervised learning mechanism to be used on the levels of both the sink node and base station. The output of the algorithms is a set of detection rules which are structured in the form of binary tree. The introduced algorithms provided a high detection accuracy using less number of selected features, compared to previous work for intrusion detection, which decreases the complexity and the processing time. The proposed learning algorithms used only 10% of the data for training. An enhancement for J48 classification algorithm is also introduced which decreases the size of the algorithm's decision tree and makes it suitable to be used for intrusion detection in WSNs.
无线传感器网络广泛应用于各个领域。其中一些应用程序处理必须防止未经授权访问的机密和关键数据。其他一些系统使用wsn,部署在非常恶劣的环境中,能源有限。这些系统不能容忍可能由网络入侵者引起的网络故障。本文提出了一种高效的入侵检测模型。该模型使用智能技术来检测入侵。介绍了两种不同的体系结构。第一个体系结构表示传感器节点、汇聚节点和基站的级别。第二个体系结构表示传感器和接收节点的级别。本文提出了两种入侵检测算法,一种是在传感器节点级别使用监督学习机制,另一种是在汇聚节点和基站级别使用无监督学习机制。算法的输出是一组以二叉树形式构成的检测规则。与以往的入侵检测方法相比,所引入的算法使用较少的特征来提供较高的检测精度,从而降低了复杂性和处理时间。所提出的学习算法只使用了10%的数据进行训练。本文还对J48分类算法进行了改进,减小了算法决策树的大小,使其更适合于wsn中的入侵检测。
{"title":"Distributed Intrusion Detection System for Wireless Sensor Networks","authors":"K. Medhat, R. Ramadan, I. Talkhan","doi":"10.1109/NGMAST.2015.29","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.29","url":null,"abstract":"Wireless Sensor Networks is extensively used in many of applications related to different fields. Some of those applications deal with confidential and critical data that must be protected from unauthorized access. Some other systems use WSNs that are deployed in very harsh environments with limited energy resources. Those systems cannot tolerate network failures that can be caused by network intruders. In this paper, an efficient intrusion detection model is introduced. The model uses intelligent techniques to detect intrusions. Two different architectures are introduced. The first architecture represents the level of sensor node, sink node, and base station. The second architecture represents the levels of sensor and sink nodes. This work proposes two intrusion detection algorithms, one uses a supervised learning mechanism to be used on the level of the sensor node and the other uses an unsupervised learning mechanism to be used on the levels of both the sink node and base station. The output of the algorithms is a set of detection rules which are structured in the form of binary tree. The introduced algorithms provided a high detection accuracy using less number of selected features, compared to previous work for intrusion detection, which decreases the complexity and the processing time. The proposed learning algorithms used only 10% of the data for training. An enhancement for J48 classification algorithm is also introduced which decreases the size of the algorithm's decision tree and makes it suitable to be used for intrusion detection in WSNs.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131419441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Urban Scale Context Dissemination in the Internet of Things: Challenge Accepted 物联网中的城市尺度文脉传播:接受挑战
A. Morris, C. Patsakis, M. Dragone, A. Manzoor, V. Cahill, Mélanie Bouroche
Mobile applications envisaged in the Smart City rely on the capacity of acquiring context from a vast array of sensors and other data sources, to deliver context-aware services at an urban scale whilst leveraging the Internet of Things (IoT). This work analyses existing context dissemination techniques, encompassing both probabilistic and deterministic algorithms, and advocates the case for ACT (Adaptive Context Tries), a novel urban scale technique with a dissemination complexity and context availability that fulfils the requirements of Context-Aware Smart City applications. A number of enabling technologies and middleware solutions already exists supporting the provision and the sharing of context in small scale scenarios. It also shows that existing context dissemination techniques used in State of the Art middleware do not provide solutions that support context-aware applications in urban scale and dynamic, mobile environments. Results show ACT provides a scalable approach that incurs logarithmic growth in overhead with respect to the number of participating peers in the system without compromising the completeness, reliability, or timeliness of disseminated context.
智慧城市中设想的移动应用依赖于从大量传感器和其他数据源获取环境的能力,在利用物联网(IoT)的同时,在城市规模上提供环境感知服务。本研究分析了现有的上下文传播技术,包括概率和确定性算法,并倡导ACT (Adaptive context Tries),这是一种新型的城市规模技术,具有传播复杂性和上下文可用性,满足上下文感知智能城市应用的要求。目前已经存在许多支持在小规模场景中提供和共享上下文的启用技术和中间件解决方案。它还表明,在最先进的中间件中使用的现有上下文传播技术不能提供在城市规模和动态移动环境中支持上下文感知应用的解决方案。结果表明,ACT提供了一种可扩展的方法,该方法在不影响传播上下文的完整性、可靠性或及时性的情况下,会导致系统中参与节点数量的开销呈对数增长。
{"title":"Urban Scale Context Dissemination in the Internet of Things: Challenge Accepted","authors":"A. Morris, C. Patsakis, M. Dragone, A. Manzoor, V. Cahill, Mélanie Bouroche","doi":"10.1109/NGMAST.2015.62","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.62","url":null,"abstract":"Mobile applications envisaged in the Smart City rely on the capacity of acquiring context from a vast array of sensors and other data sources, to deliver context-aware services at an urban scale whilst leveraging the Internet of Things (IoT). This work analyses existing context dissemination techniques, encompassing both probabilistic and deterministic algorithms, and advocates the case for ACT (Adaptive Context Tries), a novel urban scale technique with a dissemination complexity and context availability that fulfils the requirements of Context-Aware Smart City applications. A number of enabling technologies and middleware solutions already exists supporting the provision and the sharing of context in small scale scenarios. It also shows that existing context dissemination techniques used in State of the Art middleware do not provide solutions that support context-aware applications in urban scale and dynamic, mobile environments. Results show ACT provides a scalable approach that incurs logarithmic growth in overhead with respect to the number of participating peers in the system without compromising the completeness, reliability, or timeliness of disseminated context.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134163364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
BBCast: Cloud-Based Interactive Public Bulletin Board BBCast:基于云的交互式公共公告板
Jan Franz Palngipang, Miguel Luis Ting, Rowel Atienza
Interactive digital displays are now finding their way in various public spaces as tools for information dissemination. Current methods of deploying such technologies include installation of large screens along with expensive and bulky dedicated machines making them costly for multiple deployments. Interaction with these displays is done through sensors or through mobile applications but often fail to fully engage the user with the display. These implementations are plagued by content management and presentation issues, oftentimes multiple contents obstructing each other. To solve these problems, we developed BBCast, a cloud-based interactive bulletin board. Having the system deployed on the cloud eliminates the need for dedicated servers on site, therefore cutting cost and saving space. Interaction with the display is done through an Android application integrated with social media services to fully engage the user, allowing users share content in ways that they are accustomed to. The displayed contents are organized in a grid where a particular media type goes to its corresponding widget. This project was deployed in the lobby of an academic institution where at least 1,000 people pass by everyday and tested for Quality of Experience.
交互式数字显示器作为信息传播的工具,正在各种公共空间中找到自己的方式。目前部署此类技术的方法包括安装大屏幕以及昂贵且笨重的专用机器,这使得多次部署成本高昂。与这些显示器的交互是通过传感器或移动应用程序完成的,但往往不能让用户完全参与到显示器中来。这些实现受到内容管理和表示问题的困扰,常常是多个内容相互阻碍。为了解决这些问题,我们开发了BBCast,一个基于云的交互式公告板。将系统部署在云端,无需现场专用服务器,从而降低了成本并节省了空间。与显示器的交互是通过与社交媒体服务集成的Android应用程序完成的,以充分吸引用户,允许用户以他们习惯的方式分享内容。显示的内容组织在一个网格中,其中特定的媒体类型进入其相应的小部件。这个项目被部署在一个学术机构的大厅里,每天至少有1000人经过这里,并对体验质量进行了测试。
{"title":"BBCast: Cloud-Based Interactive Public Bulletin Board","authors":"Jan Franz Palngipang, Miguel Luis Ting, Rowel Atienza","doi":"10.1109/NGMAST.2015.33","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.33","url":null,"abstract":"Interactive digital displays are now finding their way in various public spaces as tools for information dissemination. Current methods of deploying such technologies include installation of large screens along with expensive and bulky dedicated machines making them costly for multiple deployments. Interaction with these displays is done through sensors or through mobile applications but often fail to fully engage the user with the display. These implementations are plagued by content management and presentation issues, oftentimes multiple contents obstructing each other. To solve these problems, we developed BBCast, a cloud-based interactive bulletin board. Having the system deployed on the cloud eliminates the need for dedicated servers on site, therefore cutting cost and saving space. Interaction with the display is done through an Android application integrated with social media services to fully engage the user, allowing users share content in ways that they are accustomed to. The displayed contents are organized in a grid where a particular media type goes to its corresponding widget. This project was deployed in the lobby of an academic institution where at least 1,000 people pass by everyday and tested for Quality of Experience.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"73 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113962407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Compressive Wideband Spectrum Sensing in Cognitive Radio Systems Based on Cyclostationary Feature Detection 基于循环平稳特征检测的认知无线电系统压缩宽带频谱感知
Mohammad-Ali Damavandi, S. Nader-Esfahani
High precision spectrum sensing is a critical component in cognitive radio systems. This is more critical when our interested bandwidth is very wide in noisy channel environments. There are many detection ways for spectrum sensing, but each of them has their problems. In this paper we use cyclostationary feature detection which is robust against noise uncertainty, but it needs very high sampling rate, especially when the interested frequency band is wideband. Hence its computational and hardware cost are high, Compressive sensing is a new sub-Nyquist sampling method, which asserts can completely recover specific signals, which are sparse in a certain domain. This paper helps to reduce the required sampling rate of cyclic detector by using the compressive sensing procedure and exploiting the sparsity of the cyclic features in the two-dimensional cyclic spectrum domain. In addition this paper proposes new scheme for reformulating the linear relationship between the compressive samples acquired in frequency domain and the two-dimensional cyclic spectrum. Simulations show that the proposed spectrum sensing scheme can reduce the required sampling rate with little performance loss, and is robust against noise uncertainty in low SNR conditions, also show that the reconstruction accuracy and probability of detection for proposed scheme is higher than for existence methods.
高精度频谱感知是认知无线电系统的重要组成部分。当我们感兴趣的带宽在噪声信道环境中非常宽时,这一点更为关键。频谱传感的检测方法有很多,但每一种方法都有各自的问题。本文采用循环平稳特征检测方法,该方法对噪声不确定性具有较强的鲁棒性,但对采样率的要求很高,特别是当感兴趣的频带较宽时。压缩感知是一种新型的亚奈奎斯特采样方法,它声称可以完全恢复特定的信号,这些信号在一定的域中是稀疏的。本文采用压缩感知方法,利用二维循环频谱域循环特征的稀疏性,降低了循环检测器所需的采样率。此外,本文还提出了一种新的格式来重新表述在频域获得的压缩样本与二维循环谱之间的线性关系。仿真结果表明,所提频谱感知方案在降低采样率的同时性能损失小,在低信噪比条件下对噪声不确定性具有较强的鲁棒性,重构精度和检测概率均高于现有方法。
{"title":"Compressive Wideband Spectrum Sensing in Cognitive Radio Systems Based on Cyclostationary Feature Detection","authors":"Mohammad-Ali Damavandi, S. Nader-Esfahani","doi":"10.1109/NGMAST.2015.30","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.30","url":null,"abstract":"High precision spectrum sensing is a critical component in cognitive radio systems. This is more critical when our interested bandwidth is very wide in noisy channel environments. There are many detection ways for spectrum sensing, but each of them has their problems. In this paper we use cyclostationary feature detection which is robust against noise uncertainty, but it needs very high sampling rate, especially when the interested frequency band is wideband. Hence its computational and hardware cost are high, Compressive sensing is a new sub-Nyquist sampling method, which asserts can completely recover specific signals, which are sparse in a certain domain. This paper helps to reduce the required sampling rate of cyclic detector by using the compressive sensing procedure and exploiting the sparsity of the cyclic features in the two-dimensional cyclic spectrum domain. In addition this paper proposes new scheme for reformulating the linear relationship between the compressive samples acquired in frequency domain and the two-dimensional cyclic spectrum. Simulations show that the proposed spectrum sensing scheme can reduce the required sampling rate with little performance loss, and is robust against noise uncertainty in low SNR conditions, also show that the reconstruction accuracy and probability of detection for proposed scheme is higher than for existence methods.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"602 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116334326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1