Trust establishment in Smart Transportation environments is a challenging task due essentially to the high speed of vehicles, the long distances and the network topology dynamics. Furthermore, the applications context requires that the lifetime of data messages be short, so the vehicles have to authenticate the reliability of the received messages timely to make decision accordingly. In this paper work, we conduct a comprehensive review of the recent schemes dealing with trust management in vehicular environments, particularly, blockchain-based ones. Besides, we propose a dependable trust management scheme based on blockchain aiming to calculate for each vehicle a unique and up-to-date trust metric available to all other vehicles to solve the cold-start problem.
{"title":"A New Blockchain-based Trust Management protocol For Vehicular ad hoc networks","authors":"Ohoud Alboqomi, Tahani Gazdar, A. Munshi","doi":"10.1145/3440749.3442642","DOIUrl":"https://doi.org/10.1145/3440749.3442642","url":null,"abstract":"Trust establishment in Smart Transportation environments is a challenging task due essentially to the high speed of vehicles, the long distances and the network topology dynamics. Furthermore, the applications context requires that the lifetime of data messages be short, so the vehicles have to authenticate the reliability of the received messages timely to make decision accordingly. In this paper work, we conduct a comprehensive review of the recent schemes dealing with trust management in vehicular environments, particularly, blockchain-based ones. Besides, we propose a dependable trust management scheme based on blockchain aiming to calculate for each vehicle a unique and up-to-date trust metric available to all other vehicles to solve the cold-start problem.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129257940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper presents a methodology for testing LPWAN network with a mesh topology. Network testing is essential to identify and resolve problems before deploying the network on a large scale. Deploying a network without preliminary testing increases the number of wasted resources and does not guarantee the expected network performance. The methodology provided in this article allows testing the network and determining the main parameters, which will allow identifying the faults of the network before implementation. The proposed methodology is based on the IETF RFC 2544 specification. Model-based testing allows automating the testing process. For this, a simulation model of an LPWAN network with mesh topology based on LoRaWAN was developed in the OMNeT++ simulation environment.
{"title":"Methodology for testing LPWAN networks with mesh topology","authors":"Y. Avakyan, E. S. Kuznetsova, R. Kirichek","doi":"10.1145/3440749.3442623","DOIUrl":"https://doi.org/10.1145/3440749.3442623","url":null,"abstract":"The paper presents a methodology for testing LPWAN network with a mesh topology. Network testing is essential to identify and resolve problems before deploying the network on a large scale. Deploying a network without preliminary testing increases the number of wasted resources and does not guarantee the expected network performance. The methodology provided in this article allows testing the network and determining the main parameters, which will allow identifying the faults of the network before implementation. The proposed methodology is based on the IETF RFC 2544 specification. Model-based testing allows automating the testing process. For this, a simulation model of an LPWAN network with mesh topology based on LoRaWAN was developed in the OMNeT++ simulation environment.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115319403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper describes the implementation of deep learning-based edge detection in image processing. A set of points in an image at which image brightness changes formally or sharply is called edge detection. Using edge detection filters, we can extract the feature of an object. In our work, we aim to develop a deep learning system to classify Arabic document images into four classes as follows: printed, handwritten, historical, and signboard and applying edge detection filters to extract features from document images. We will be using two edge detection methods namely Sobel, and Canny edge detection that are applied in 1000 Arabic document images to extract edges. Analyzing the performance factors are done in the terms of accuracy on the premise of Mean Squared Error (MSE) and python is employed for edge detection implementation. The experimental results show that the Canny edge detection technique results higher than the Sobel edge detection technique.
{"title":"Canny edge detection towards deep learning Arabic document classification","authors":"Taghreed Alghamdi, S. Snoussi, L. Hsairi","doi":"10.1145/3440749.3442641","DOIUrl":"https://doi.org/10.1145/3440749.3442641","url":null,"abstract":"The paper describes the implementation of deep learning-based edge detection in image processing. A set of points in an image at which image brightness changes formally or sharply is called edge detection. Using edge detection filters, we can extract the feature of an object. In our work, we aim to develop a deep learning system to classify Arabic document images into four classes as follows: printed, handwritten, historical, and signboard and applying edge detection filters to extract features from document images. We will be using two edge detection methods namely Sobel, and Canny edge detection that are applied in 1000 Arabic document images to extract edges. Analyzing the performance factors are done in the terms of accuracy on the premise of Mean Squared Error (MSE) and python is employed for edge detection implementation. The experimental results show that the Canny edge detection technique results higher than the Sobel edge detection technique.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131601454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Penetration Testing (PT) is one of the most effective and widely used methods to increase the defence of a system by looking for potential vulnerabilities. Reinforcement learning (RL), a powerful type of machine learning in self-decision making, is demonstrated to be applicable in PT to increase automation as well as reduce implementation costs. However, RL algorithms are still having difficulty on PT problems which have large network size and high complexity. This paper proposes a multiple level action embedding applied with Wolpertinger architect (WA) to enhance the accuracy and performance of the RL, especially in large and complicated environments. The main purpose of the action embedding is to be able to represent the elements in the RL action space as an n-dimensional vector while preserving their properties and accurately representing the relationship between them. Experiments are conducted to evaluate the logical accuracy of the action embedding. The deep Q-network algorithm is also used as a baseline for comparing with WA using the multiple level action embedding.
{"title":"Multiple Level Action Embedding for Penetration Testing","authors":"Hoang Nguyen, H. Nguyen, T. Uehara","doi":"10.1145/3440749.3442660","DOIUrl":"https://doi.org/10.1145/3440749.3442660","url":null,"abstract":"Penetration Testing (PT) is one of the most effective and widely used methods to increase the defence of a system by looking for potential vulnerabilities. Reinforcement learning (RL), a powerful type of machine learning in self-decision making, is demonstrated to be applicable in PT to increase automation as well as reduce implementation costs. However, RL algorithms are still having difficulty on PT problems which have large network size and high complexity. This paper proposes a multiple level action embedding applied with Wolpertinger architect (WA) to enhance the accuracy and performance of the RL, especially in large and complicated environments. The main purpose of the action embedding is to be able to represent the elements in the RL action space as an n-dimensional vector while preserving their properties and accurately representing the relationship between them. Experiments are conducted to evaluate the logical accuracy of the action embedding. The deep Q-network algorithm is also used as a baseline for comparing with WA using the multiple level action embedding.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114913948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A modified version of one-class classification criterion reducing the impact of outliers on the one-class classification decision rule is proposed based on support vector data description (SVDD) by D. Tax. The optimization method utilizes the substitution of nondifferentiable objective function by the smooth one. A comparative experimental study of existing one-class methods shows the superiority of the proposed criterion in anomaly detection.
D. Tax基于支持向量数据描述(SVDD)提出了一种改进的一类分类准则,减少了异常值对一类分类决策规则的影响。该优化方法利用不可微目标函数替换为光滑目标函数。通过与现有一类方法的对比实验研究,证明了该准则在异常检测中的优越性。
{"title":"Reducing the Impact of Outliers on the One-Class Classification Decision Rule","authors":"A. Larin, O. Seredin, A. Kopylov","doi":"10.1145/3440749.3442662","DOIUrl":"https://doi.org/10.1145/3440749.3442662","url":null,"abstract":"A modified version of one-class classification criterion reducing the impact of outliers on the one-class classification decision rule is proposed based on support vector data description (SVDD) by D. Tax. The optimization method utilizes the substitution of nondifferentiable objective function by the smooth one. A comparative experimental study of existing one-class methods shows the superiority of the proposed criterion in anomaly detection.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"452 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123626258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a new computationally effective method of haze removal based on joint transmission map estimation and atmospheric-light extraction using the probabilistic gamma-normal model. The enhanced version of universal atmospheric light extractor allows reducing the influence of localized light sources to result of processing. Experimental results show that the proposed method has comparable quality results and lower computation time than other haze removal methods.
{"title":"Haze Removal Method Based on Joint Transmission Map Estimation and Atmospheric-Light Extraction","authors":"A. Filin, I. Gracheva, A. Kopylov","doi":"10.1145/3440749.3442663","DOIUrl":"https://doi.org/10.1145/3440749.3442663","url":null,"abstract":"This paper proposes a new computationally effective method of haze removal based on joint transmission map estimation and atmospheric-light extraction using the probabilistic gamma-normal model. The enhanced version of universal atmospheric light extractor allows reducing the influence of localized light sources to result of processing. Experimental results show that the proposed method has comparable quality results and lower computation time than other haze removal methods.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127559226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Today, the work of many organizations directly depends on the quality of the Internet connection. Using the method of measuring the speed of the Internet network and network parameters based on Recommendation ITU-T Q.3961 and Recommendation ITU-T Q.3056 using probes will allow monitoring the quality of the services provided. There are solutions for measuring the bandwidth of Internet connection such as Speedtest, 2IP, Netflix Fast, but they are not based on the international standard, hence measurements of these systems cannot be considered trusted. Therefore, to control the quality of the Internet connection using a trusted source, there is a need in the trusted method, which is discussed in this article. This article discusses developed methods for throughput, network latency, jitter. Measurement results of the methods shows reliability in testing conditions.
{"title":"Development of System for Measuring Internet Speed and Network Parameters on Fixed and Mobile Communication Networks Based on Recommendation ITU-T Q.3961 and Recommendation ITU-T Q.3056 Using Probes","authors":"Nikita Shustov, V. Zelenov, R. Kirichek","doi":"10.1145/3440749.3442608","DOIUrl":"https://doi.org/10.1145/3440749.3442608","url":null,"abstract":"Today, the work of many organizations directly depends on the quality of the Internet connection. Using the method of measuring the speed of the Internet network and network parameters based on Recommendation ITU-T Q.3961 and Recommendation ITU-T Q.3056 using probes will allow monitoring the quality of the services provided. There are solutions for measuring the bandwidth of Internet connection such as Speedtest, 2IP, Netflix Fast, but they are not based on the international standard, hence measurements of these systems cannot be considered trusted. Therefore, to control the quality of the Internet connection using a trusted source, there is a need in the trusted method, which is discussed in this article. This article discusses developed methods for throughput, network latency, jitter. Measurement results of the methods shows reliability in testing conditions.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121528098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Internet of Things (IoT) technology found many applications in the healthcare sector. Through the collection of vital data, IoT plays a crucial role are automating manual tasks and improving patient outcomes. This paper provides an overview of the impact and challenges of IoT architectures and applications in healthcare. The paper identifies the key benefits and key drivers behind the development of IoT-enabled healthcare systems. Then, we focus on security and privacy issues as real threats and obstacles facing the wide adoption of IoT in healthcare applications. Finally, we outline the key challenges and opportunities with specific reference to the unique requirements of healthcare applications.
{"title":"IoT-Enabled Healthcare: Benefits, Issues and Challenges","authors":"Bassam Al-Shargabi, Simak Abuarqoub","doi":"10.1145/3440749.3442596","DOIUrl":"https://doi.org/10.1145/3440749.3442596","url":null,"abstract":"The Internet of Things (IoT) technology found many applications in the healthcare sector. Through the collection of vital data, IoT plays a crucial role are automating manual tasks and improving patient outcomes. This paper provides an overview of the impact and challenges of IoT architectures and applications in healthcare. The paper identifies the key benefits and key drivers behind the development of IoT-enabled healthcare systems. Then, we focus on security and privacy issues as real threats and obstacles facing the wide adoption of IoT in healthcare applications. Finally, we outline the key challenges and opportunities with specific reference to the unique requirements of healthcare applications.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121778844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Currently, the quality of the environment in urban areas is a matter of concern of countries in particular and the world in general. The application of new technology for this field is becoming increasingly urgent in the context of severe environmental pollution, environmental monitoring systems need to be upgraded to be able to effectively manage and evaluate the environment of a large geographic area. Transparency, accuracy and real time of data must be at the forefront to provide timely solutions when environmental pollution occurs to minimize socio-economic impacts.
{"title":"Advanced Environmental Monitoring Solution Using the Internet of Things (IoT) and Blockchain","authors":"Viet Tran, Mau Pham, Hoang Ho, Luan Nguyen","doi":"10.1145/3440749.3442655","DOIUrl":"https://doi.org/10.1145/3440749.3442655","url":null,"abstract":"Currently, the quality of the environment in urban areas is a matter of concern of countries in particular and the world in general. The application of new technology for this field is becoming increasingly urgent in the context of severe environmental pollution, environmental monitoring systems need to be upgraded to be able to effectively manage and evaluate the environment of a large geographic area. Transparency, accuracy and real time of data must be at the forefront to provide timely solutions when environmental pollution occurs to minimize socio-economic impacts.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130718950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mostefa Kara, A. Laouid, R. Euler, Mohammed Amine Yagoub, A. Bounceur, Mohammad Hammoudeh, S. Medileh
In the fast moving field of computer cryptography, researchers are actively working on addressing various emerging challenges to keep tomorrow’s systems secure. Many efforts are focused on addressing the computation speed and the massive data size requirements of today’s systems. Significant research efforts are targeting the computational complexity by focusing on the number of cryptographic operations or the scope of application. In this paper, we present an asymmetric homomorphic encryption scheme that relies on converting base numbers to a given base in such a way that Leveled Fully Homomorphic Encryption (LFHE) is performed. This lightweight technique is easy to implement and applicable in many fields, especially those that require high speed and safety.
{"title":"A Homomorphic Digit Fragmentation Encryption Scheme Based on the Polynomial Reconstruction Problem","authors":"Mostefa Kara, A. Laouid, R. Euler, Mohammed Amine Yagoub, A. Bounceur, Mohammad Hammoudeh, S. Medileh","doi":"10.1145/3440749.3442592","DOIUrl":"https://doi.org/10.1145/3440749.3442592","url":null,"abstract":"In the fast moving field of computer cryptography, researchers are actively working on addressing various emerging challenges to keep tomorrow’s systems secure. Many efforts are focused on addressing the computation speed and the massive data size requirements of today’s systems. Significant research efforts are targeting the computational complexity by focusing on the number of cryptographic operations or the scope of application. In this paper, we present an asymmetric homomorphic encryption scheme that relies on converting base numbers to a given base in such a way that Leveled Fully Homomorphic Encryption (LFHE) is performed. This lightweight technique is easy to implement and applicable in many fields, especially those that require high speed and safety.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133253662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}