首页 > 最新文献

2015 Long Island Systems, Applications and Technology最新文献

英文 中文
Enhancing performance of Hadoop and MapReduce for scientific data using NoSQL database 利用NoSQL数据库增强Hadoop和MapReduce对科学数据的性能
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160180
Hamoud H. Alshammari, H. Bajwa, JeongKyu Lee
Scientific data sets usually have similar jobs that are frequently applied to them by different users. In addition, many of these data sets are unstructured and complex, and required fast and simple processing. In order to increase the performance of the existing Hadoop and MapReduce algorithm, it is necessary to develop an algorithm based on the type of data sets and requirements of the jobs. Genomic and biological data is an example of unstructured data because it only has a huge sequence of unreadable and non-relational letters. In this paper, we present an overview of a developed MapReduce algorithm and its simulation using HBase as a NoSQL database.
科学数据集通常具有相似的工作,这些工作经常由不同的用户应用于它们。此外,许多这些数据集是非结构化和复杂的,需要快速和简单的处理。为了提高现有Hadoop和MapReduce算法的性能,有必要根据数据集的类型和作业的要求开发一种算法。基因组和生物学数据是非结构化数据的一个例子,因为它只有一个巨大的不可读和非关系字母序列。在本文中,我们概述了一种开发的MapReduce算法及其使用HBase作为NoSQL数据库的仿真。
{"title":"Enhancing performance of Hadoop and MapReduce for scientific data using NoSQL database","authors":"Hamoud H. Alshammari, H. Bajwa, JeongKyu Lee","doi":"10.1109/LISAT.2015.7160180","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160180","url":null,"abstract":"Scientific data sets usually have similar jobs that are frequently applied to them by different users. In addition, many of these data sets are unstructured and complex, and required fast and simple processing. In order to increase the performance of the existing Hadoop and MapReduce algorithm, it is necessary to develop an algorithm based on the type of data sets and requirements of the jobs. Genomic and biological data is an example of unstructured data because it only has a huge sequence of unreadable and non-relational letters. In this paper, we present an overview of a developed MapReduce algorithm and its simulation using HBase as a NoSQL database.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134383708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Detection of Trojan Horses by the analysis of system behavior and data packets 通过分析系统行为和数据包来检测特洛伊木马
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160176
Vamshi Krishna Gudipati, Aayush Vetwal, Varun Kumar, Anjorin Adeniyi, Abdel-shakour Abuzneid
Trojan Horse is said to be one of the most serious threats to computer security. A Trojan Horse is an executable file in the Windows operating system. This executable file will have certain static and runtime characteristics. Multiple system processes in the Windows OS will be called whenever a Trojan Horse tries to execute any operation on the system. In this paper, a new Trojan Horse detection method by using Windows Dynamic Link Libraries to identify system calls from a Trojan Horses is explicated. Process explorer is used to identify the malicious executables and to determine whether they are Trojans or not. Further, an attempt made to study the network behavior after a Trojan Horse is executed using Wireshark.
据说特洛伊木马是对计算机安全最严重的威胁之一。特洛伊木马是Windows操作系统中的可执行文件。这个可执行文件将具有某些静态和运行时特征。每当特洛伊木马试图在系统上执行任何操作时,Windows操作系统中的多个系统进程将被调用。本文阐述了一种利用Windows动态链接库识别木马系统调用的木马检测方法。进程资源管理器用于识别恶意可执行文件,并确定它们是否是木马程序。此外,尝试使用Wireshark研究特洛伊木马执行后的网络行为。
{"title":"Detection of Trojan Horses by the analysis of system behavior and data packets","authors":"Vamshi Krishna Gudipati, Aayush Vetwal, Varun Kumar, Anjorin Adeniyi, Abdel-shakour Abuzneid","doi":"10.1109/LISAT.2015.7160176","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160176","url":null,"abstract":"Trojan Horse is said to be one of the most serious threats to computer security. A Trojan Horse is an executable file in the Windows operating system. This executable file will have certain static and runtime characteristics. Multiple system processes in the Windows OS will be called whenever a Trojan Horse tries to execute any operation on the system. In this paper, a new Trojan Horse detection method by using Windows Dynamic Link Libraries to identify system calls from a Trojan Horses is explicated. Process explorer is used to identify the malicious executables and to determine whether they are Trojans or not. Further, an attempt made to study the network behavior after a Trojan Horse is executed using Wireshark.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127651405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Motion model binary switch for MonoSLAM MonoSLAM运动模型二进制开关
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160210
Akin Tatoglu, K. Pochiraju
Current Monocular Simultaneous Localization and Mapping (MonoSLAM) methodologies use constant velocity and smooth motion assumptions. If the motion consists of rapid accelerations, decelerations or stops, the position estimates become erroneous and unstable. Mobile robots require frequent stops due to mission dictated or safety reasons. With the objective of using MonoSLAM to localize a mobile robot, we determined the effectiveness of trajectory estimation for a typical robot moving with constant velocity and stopping to execute missions. Experiments were performed with a camera mounted on a 3-axis translational robot and several path profiles with brief stops were executed. The trajectory estimated with a MonoSLAM algorithm is compared with the known motion profile. As the stop causes significant error and drift in the position estimates, we modified the constant velocity motion model to incorporate a stop detection method. An optical flow based stop detection model was formulated and implemented in conjunction with MonoSLAM. Velocity update is modified when a stop or start is detected by optical flow. By adaptively switching between constant velocity and stop models, the trajectory estimate is seen to be more accurate and stable after an intermittent stop. Details of the adaptive switching method and the performance of the modified MonoSLAM are described in this paper.
当前的单目同步定位和映射(MonoSLAM)方法使用恒定速度和平滑运动假设。如果运动包含快速的加速、减速或停止,位置估计就会变得错误和不稳定。由于任务要求或安全原因,移动机器人需要经常停下来。以利用MonoSLAM对移动机器人进行定位为目标,确定了一个典型的机器人匀速运动并停止执行任务的轨迹估计的有效性。实验采用安装在三轴平移机器人上的摄像机进行,并进行了若干路径轮廓的短暂停留。将MonoSLAM算法估计的轨迹与已知的运动轮廓进行比较。由于停止会在位置估计中引起明显的误差和漂移,我们对等速运动模型进行了修改,加入了停止检测方法。提出了一种基于光流的光阑检测模型,并结合MonoSLAM实现了该模型。当光流检测到停止或开始时,速度更新被修改。通过在等速和停车模型之间的自适应切换,间歇停车后的轨迹估计更加准确和稳定。本文详细介绍了自适应切换方法和改进后的MonoSLAM的性能。
{"title":"Motion model binary switch for MonoSLAM","authors":"Akin Tatoglu, K. Pochiraju","doi":"10.1109/LISAT.2015.7160210","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160210","url":null,"abstract":"Current Monocular Simultaneous Localization and Mapping (MonoSLAM) methodologies use constant velocity and smooth motion assumptions. If the motion consists of rapid accelerations, decelerations or stops, the position estimates become erroneous and unstable. Mobile robots require frequent stops due to mission dictated or safety reasons. With the objective of using MonoSLAM to localize a mobile robot, we determined the effectiveness of trajectory estimation for a typical robot moving with constant velocity and stopping to execute missions. Experiments were performed with a camera mounted on a 3-axis translational robot and several path profiles with brief stops were executed. The trajectory estimated with a MonoSLAM algorithm is compared with the known motion profile. As the stop causes significant error and drift in the position estimates, we modified the constant velocity motion model to incorporate a stop detection method. An optical flow based stop detection model was formulated and implemented in conjunction with MonoSLAM. Velocity update is modified when a stop or start is detected by optical flow. By adaptively switching between constant velocity and stop models, the trajectory estimate is seen to be more accurate and stable after an intermittent stop. Details of the adaptive switching method and the performance of the modified MonoSLAM are described in this paper.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125755254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-sensor based collision avoidance algorithm for mobile robot 基于多传感器的移动机器人避碰算法
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160181
Abrar Alajlan, M. Almasri, K. Elleithy
Collision Avoidance (CA) systems have been used in wide range of different robotics areas and had extraordinary success in minimizing the risk of collisions. It is a critical requirement in building mobile robot systems where they all featured some kind of obstacle detection techniques in order to avoid two or more objects from colliding. The purpose of this paper is to present an algorithm for performing collision avoidance in mobile robot that is relying on the use of low-cost ultrasonic with infrared sensors, and involving some other modules, so that it can be easily used in real-time robotic applications. The proposed algorithm is implemented in multiple scenarios with several obstacles placed in different locations around the robot. Our experimental run shows that the robot has been successfully detecting obstacles and avoiding collisions along its path.
避碰(CA)系统已广泛应用于不同的机器人领域,并在最小化碰撞风险方面取得了非凡的成功。为了避免两个或多个物体的碰撞,在构建移动机器人系统中,障碍物检测技术是一个至关重要的要求。本文的目的是提出一种基于低成本超声波和红外传感器的移动机器人避碰算法,并涉及一些其他模块,使其易于在机器人实时应用中使用。该算法在机器人周围不同位置放置障碍物的多个场景中实现。我们的实验运行表明,机器人已经成功地探测到障碍物并避免了沿途的碰撞。
{"title":"Multi-sensor based collision avoidance algorithm for mobile robot","authors":"Abrar Alajlan, M. Almasri, K. Elleithy","doi":"10.1109/LISAT.2015.7160181","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160181","url":null,"abstract":"Collision Avoidance (CA) systems have been used in wide range of different robotics areas and had extraordinary success in minimizing the risk of collisions. It is a critical requirement in building mobile robot systems where they all featured some kind of obstacle detection techniques in order to avoid two or more objects from colliding. The purpose of this paper is to present an algorithm for performing collision avoidance in mobile robot that is relying on the use of low-cost ultrasonic with infrared sensors, and involving some other modules, so that it can be easily used in real-time robotic applications. The proposed algorithm is implemented in multiple scenarios with several obstacles placed in different locations around the robot. Our experimental run shows that the robot has been successfully detecting obstacles and avoiding collisions along its path.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129629165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Extending XACML to express and enforce laws and regulations privacy policies 扩展XACML以表达和执行法律法规隐私策略
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160190
Tariq Alshugran, J. Dichter, A. Rusu
Some software applications are developed to collect, store, and manage users' personal, medical, or financial information. In the United States, such applications are required to preserve users' privacy and to be compliant with the federal privacy laws and regulations. To formally guarantee compliance with federal regulations, it is necessary to express the privacy rules enforced by those regulations in a standard policy specification language. In this work we evaluate the eXtensible Access Control Model Language (XACML) as a formal specification language for privacy laws and regulations. Furthermore, we evaluate XACML features and attributes to extend it in order to enforce those privacy rules.
开发了一些软件应用程序来收集、存储和管理用户的个人、医疗或财务信息。在美国,此类应用程序需要保护用户的隐私,并遵守联邦隐私法律法规。为了正式保证遵守联邦法规,有必要用标准的策略规范语言表达由这些法规强制执行的隐私规则。在这项工作中,我们评估了可扩展访问控制模型语言(XACML)作为隐私法律和法规的正式规范语言。此外,我们还对XACML特性和属性进行了评估,以便对其进行扩展,以强制执行这些隐私规则。
{"title":"Extending XACML to express and enforce laws and regulations privacy policies","authors":"Tariq Alshugran, J. Dichter, A. Rusu","doi":"10.1109/LISAT.2015.7160190","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160190","url":null,"abstract":"Some software applications are developed to collect, store, and manage users' personal, medical, or financial information. In the United States, such applications are required to preserve users' privacy and to be compliant with the federal privacy laws and regulations. To formally guarantee compliance with federal regulations, it is necessary to express the privacy rules enforced by those regulations in a standard policy specification language. In this work we evaluate the eXtensible Access Control Model Language (XACML) as a formal specification language for privacy laws and regulations. Furthermore, we evaluate XACML features and attributes to extend it in order to enforce those privacy rules.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122746594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Hadoop eco system for big data security and privacy Hadoop生态系统的大数据安全和隐私
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160211
Pradeep Adluru, Srikari Sindhoori Datla, Xiaowen Zhang
Privacy and Security of Big Data is gaining high importance since recently all the technologies started to depend on Big Data. In this paper, we are going to discuss particularly Hadoop and difficulty in maintaining the privacy and security of Big Data. The main goal is to propose a Hadoop system that maintains the privacy and security of the information stored on the cloud.
自从最近所有的技术都开始依赖于大数据以来,大数据的隐私和安全变得越来越重要。在本文中,我们将特别讨论Hadoop以及维护大数据隐私和安全的困难。主要目标是提出一个维护存储在云上的信息的隐私和安全的Hadoop系统。
{"title":"Hadoop eco system for big data security and privacy","authors":"Pradeep Adluru, Srikari Sindhoori Datla, Xiaowen Zhang","doi":"10.1109/LISAT.2015.7160211","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160211","url":null,"abstract":"Privacy and Security of Big Data is gaining high importance since recently all the technologies started to depend on Big Data. In this paper, we are going to discuss particularly Hadoop and difficulty in maintaining the privacy and security of Big Data. The main goal is to propose a Hadoop system that maintains the privacy and security of the information stored on the cloud.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134335626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Selective forwarding detection (SFD) in wireless sensor networks 无线传感器网络中的选择性转发检测(SFD)
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160207
Naser Alajmi, K. Elleithy
Security is the critical subject in wireless sensor networks. Therefore, WSNs are susceptible to several types of security attacks. One reason to attack sensor networks is the limited capacity of sensor nodes. The security attacks could affect the most significant applications in WSNs area such as military surveillance, traffic monitor, and healthcare. Thus, there are different types of detection approaches against security attacks on the network layer in WSNs. Also, there are severe constraints on sensor nodes like reliability, energy efficiency, and scalability, which affect the security in WSNs. Since the sensor nodes have limited capabilities for most of these constraints, a selective forwarding attack is difficult to detect in the networks. Malicious nodes in the selective forwarding attack, work as normal nodes. However, it attempts to find the sensitive messages and drop them before sending the packet to other nodes. In order to keep this type of attacks away from networks, we propose a multi layers approach (SFD) that preserves the safely of data transmission between sensor nodes while detecting the selective forwarding attack. Furthermore, the approach includes reliability, energy efficiency, and scalability.
安全是无线传感器网络的关键问题。因此,wsn容易受到多种类型的安全攻击。攻击传感器网络的一个原因是传感器节点的容量有限。安全攻击可能影响wsn领域中最重要的应用,如军事监视、交通监控和医疗保健。因此,在无线传感器网络中,针对网络层的安全攻击有不同类型的检测方法。同时,传感器节点在可靠性、能效、可扩展性等方面存在严格的限制,影响了无线传感器网络的安全性。由于传感器节点对这些约束的能力有限,因此在网络中很难检测到选择性转发攻击。恶意节点在选择性转发攻击中,与正常节点一样工作。但是,它会尝试找到敏感消息并在将数据包发送到其他节点之前丢弃它们。为了防止这种类型的攻击远离网络,我们提出了一种多层方法(SFD),该方法在检测选择性转发攻击的同时保持传感器节点之间数据传输的安全性。此外,该方法还包括可靠性、能效和可扩展性。
{"title":"Selective forwarding detection (SFD) in wireless sensor networks","authors":"Naser Alajmi, K. Elleithy","doi":"10.1109/LISAT.2015.7160207","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160207","url":null,"abstract":"Security is the critical subject in wireless sensor networks. Therefore, WSNs are susceptible to several types of security attacks. One reason to attack sensor networks is the limited capacity of sensor nodes. The security attacks could affect the most significant applications in WSNs area such as military surveillance, traffic monitor, and healthcare. Thus, there are different types of detection approaches against security attacks on the network layer in WSNs. Also, there are severe constraints on sensor nodes like reliability, energy efficiency, and scalability, which affect the security in WSNs. Since the sensor nodes have limited capabilities for most of these constraints, a selective forwarding attack is difficult to detect in the networks. Malicious nodes in the selective forwarding attack, work as normal nodes. However, it attempts to find the sensitive messages and drop them before sending the packet to other nodes. In order to keep this type of attacks away from networks, we propose a multi layers approach (SFD) that preserves the safely of data transmission between sensor nodes while detecting the selective forwarding attack. Furthermore, the approach includes reliability, energy efficiency, and scalability.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115001358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Initiated decoy states in quantum key distribution protocol by 3 ways channel 量子密钥分配协议中由三路信道发起的诱饵状态
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160178
Abdulbast A. Abushgra, K. Elleithy
After decades of research, computer scientists have in recent years come close to reaching substantive results which prove the usability of quantum key distribution (QKD). Several QKD protocols and different schemes have surfaced since the last century. Additionally, some of these protocols were created in new algorithms and up until now, have been proven to be secure; however, other scientists only made modifications to previous original protocols. This paper seeks to create a new scheme in QKD that will communicate between two parties and will give them a high level of security against any well-known attacks while handling both of parties in a manner that will reduce their dependency on both classic communication and the classical channel.
经过几十年的研究,计算机科学家近年来已经接近取得实质性成果,证明了量子密钥分发(QKD)的可用性。自上个世纪以来,出现了几种QKD协议和不同的方案。此外,其中一些协议是用新算法创建的,到目前为止,已被证明是安全的;然而,其他科学家只是对先前的原始协议进行了修改。本文试图在QKD中创建一个新的方案,该方案将在双方之间进行通信,并将为他们提供针对任何已知攻击的高级别安全性,同时以一种减少双方对经典通信和经典通道的依赖的方式处理双方。
{"title":"Initiated decoy states in quantum key distribution protocol by 3 ways channel","authors":"Abdulbast A. Abushgra, K. Elleithy","doi":"10.1109/LISAT.2015.7160178","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160178","url":null,"abstract":"After decades of research, computer scientists have in recent years come close to reaching substantive results which prove the usability of quantum key distribution (QKD). Several QKD protocols and different schemes have surfaced since the last century. Additionally, some of these protocols were created in new algorithms and up until now, have been proven to be secure; however, other scientists only made modifications to previous original protocols. This paper seeks to create a new scheme in QKD that will communicate between two parties and will give them a high level of security against any well-known attacks while handling both of parties in a manner that will reduce their dependency on both classic communication and the classical channel.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129471924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An empirical fingerprint framework to detect Rogue Access Points 一个经验指纹框架,以检测流氓接入点
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160206
Bandar Alotaibi, K. Elleithy
The aim of this paper is to detect Rogue Access Points (RAPs) that clone some of the characteristics of nearby legitimate Access Points (APs). A new passive approach that takes advantage of the first frame that the RAP sends (i.e, Beacon Frame (BF)) when it is planted in the Wireless Local Area Network (WLAN) is proposed. We apply the proposed fingerprint to detect RAPs to evaluate the fingerprint effectiveness. The proposed framework examines every beacon frame size, and compares it with a threshold value. The technique is implemented on a commercially available Wireless Network Interface Controller (WNIC) to evaluate its accuracy. The detection algorithm achieves 100 percent accuracy to determine the RAPs in a lightly loaded traffic environment. The detection time can be taken in approximately 100 ms and is scanned in real-time setting. The robustness and the efficiency of the detection algorithm are examined in two different locations.
本文的目的是检测复制附近合法接入点(ap)的某些特征的流氓接入点(rap)。提出了一种新的被动方法,利用RAP在无线局域网(WLAN)中植入时发送的第一帧(即信标帧(BF))。我们将提出的指纹用于检测RAPs,以评估指纹的有效性。提出的框架检查每个信标帧大小,并将其与阈值进行比较。该技术在市售无线网络接口控制器(WNIC)上实现,以评估其准确性。该检测算法在轻负荷的流量环境下,确定rap的准确率达到100%。检测时间约为100毫秒,并在实时设置中进行扫描。在两个不同的位置检验了检测算法的鲁棒性和效率。
{"title":"An empirical fingerprint framework to detect Rogue Access Points","authors":"Bandar Alotaibi, K. Elleithy","doi":"10.1109/LISAT.2015.7160206","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160206","url":null,"abstract":"The aim of this paper is to detect Rogue Access Points (RAPs) that clone some of the characteristics of nearby legitimate Access Points (APs). A new passive approach that takes advantage of the first frame that the RAP sends (i.e, Beacon Frame (BF)) when it is planted in the Wireless Local Area Network (WLAN) is proposed. We apply the proposed fingerprint to detect RAPs to evaluate the fingerprint effectiveness. The proposed framework examines every beacon frame size, and compares it with a threshold value. The technique is implemented on a commercially available Wireless Network Interface Controller (WNIC) to evaluate its accuracy. The detection algorithm achieves 100 percent accuracy to determine the RAPs in a lightly loaded traffic environment. The detection time can be taken in approximately 100 ms and is scanned in real-time setting. The robustness and the efficiency of the detection algorithm are examined in two different locations.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116304988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
IPLMS: An intelligent parking lot management system IPLMS:智能停车场管理系统
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160219
Jiameng Wang, Stefanie Gebara, Zhengyi Sun, Qi Wu, Keqin Zong, Hao Sun, A. Farajidavar
In this paper, we are introducing an intelligent valet parking management system that guides the cars to autonomously park within a parking lot. The IPLMS for Intelligent Parking Lot Management System, consists of two modules: 1) a model car with a set of micro-controllers and sensors which can scan the environment for suitable parking spot and avoid collision to obstacles, and a Parking Lot Management System (IPLMS) which screens the parking spaces within the parking lot and offers guidelines to the car. The model car has the capability to autonomously maneuver within the parking lot using a fuzzy logic algorithm, and execute parking in the spot determined by the IPLMS, using a parking algorithm. The car receives the instructions from the IPLMS through a wireless communication link. The IPLMS has the flexibility to be adopted by any parking management system, and can potentially save the clients time to look for a parking spot, and/or to stroll from an inaccessible parking space. Moreover, the IPLMS can decrease the financial burden from the parking lot management by offering an easy-to-install system for self-guided valet parking.
在本文中,我们介绍了一种智能代客泊车管理系统,该系统可以引导车辆在停车场内自动停车。智能停车场管理系统(IPLMS)由两个模块组成:1)一个带有一组微控制器和传感器的模型车,该模型车可以扫描环境以寻找合适的停车位并避免与障碍物碰撞,以及一个停车场管理系统(IPLMS),该系统可以筛选停车场内的停车位并为汽车提供指导。模型车采用模糊逻辑算法在停车场内自主机动,并使用停车算法在IPLMS确定的位置执行停车。汽车通过无线通信链路接收来自IPLMS的指令。IPLMS具有被任何停车管理系统采用的灵活性,并且可以潜在地节省客户寻找停车位和/或从无法进入的停车位漫步的时间。此外,IPLMS可以通过提供易于安装的自动引导代客停车系统来减轻停车场管理的经济负担。
{"title":"IPLMS: An intelligent parking lot management system","authors":"Jiameng Wang, Stefanie Gebara, Zhengyi Sun, Qi Wu, Keqin Zong, Hao Sun, A. Farajidavar","doi":"10.1109/LISAT.2015.7160219","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160219","url":null,"abstract":"In this paper, we are introducing an intelligent valet parking management system that guides the cars to autonomously park within a parking lot. The IPLMS for Intelligent Parking Lot Management System, consists of two modules: 1) a model car with a set of micro-controllers and sensors which can scan the environment for suitable parking spot and avoid collision to obstacles, and a Parking Lot Management System (IPLMS) which screens the parking spaces within the parking lot and offers guidelines to the car. The model car has the capability to autonomously maneuver within the parking lot using a fuzzy logic algorithm, and execute parking in the spot determined by the IPLMS, using a parking algorithm. The car receives the instructions from the IPLMS through a wireless communication link. The IPLMS has the flexibility to be adopted by any parking management system, and can potentially save the clients time to look for a parking spot, and/or to stroll from an inaccessible parking space. Moreover, the IPLMS can decrease the financial burden from the parking lot management by offering an easy-to-install system for self-guided valet parking.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126361103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2015 Long Island Systems, Applications and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1