Wireless sensor networks (WSNs) is a key technology which is deployed under the assumption that participating sensors are cooperative in forwarding each other's packets. However, some nodes may behave selfishly by dropping other's packets or refusing to provide services in an attempt to maximize its throughput with minimum expense. In this paper, we present a novel detection scheme based on Dempster-Shafer (D-S) evidence theory in WSN to detect and isolate misbehavior sensors. However, when the scheme is operated, counter-intuitive results may appear. To overcome this problem, this paper improves the original D-S evidence theory, which defines a new variable to modify the collected evidence before combination and then combines these evidences according to Dempster combination rule. Simulation results show that this scheme can detect and isolate misbehavior sensors effectively and accurately, suppress nodes collusion and improve network performance. Compared with other existing detection scheme, this scheme has more security, robustness and accuracy.
{"title":"A Novel Detection Scheme Based on D-S Evidence Theory in Wireless Sensor Networks","authors":"Kai Yang, Shuguang Liu, Xiuguang Li","doi":"10.1109/INCoS.2015.64","DOIUrl":"https://doi.org/10.1109/INCoS.2015.64","url":null,"abstract":"Wireless sensor networks (WSNs) is a key technology which is deployed under the assumption that participating sensors are cooperative in forwarding each other's packets. However, some nodes may behave selfishly by dropping other's packets or refusing to provide services in an attempt to maximize its throughput with minimum expense. In this paper, we present a novel detection scheme based on Dempster-Shafer (D-S) evidence theory in WSN to detect and isolate misbehavior sensors. However, when the scheme is operated, counter-intuitive results may appear. To overcome this problem, this paper improves the original D-S evidence theory, which defines a new variable to modify the collected evidence before combination and then combines these evidences according to Dempster combination rule. Simulation results show that this scheme can detect and isolate misbehavior sensors effectively and accurately, suppress nodes collusion and improve network performance. Compared with other existing detection scheme, this scheme has more security, robustness and accuracy.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134646873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Krömer, P. Musílek, J. Rodway, M. Reformat, Michal Prauzek
Energy neutrality is the desired mode of operation of many sensor networks used for environmental monitoring. Intelligent energy harvesting networks, composed of nodes equipped with solar panels and other types of power-scavenging devices, can plan and manage their operations according to short and long-term predictions of ambient energy availability. This paper introduces a novel method for next-day solar energy prediction based on atmospheric pressure and support vector regression. A location-specific support vector regression model is in this approach created using a collection of geospatially correlated atmospheric pressure and solar intensity measurements. The trained model is used to estimate next day solar energy availability from a time series of recent atmospheric pressure values and their differences. The ability of the proposed system to estimate daily solar energy is compared to a recent evolutionary-fuzzy prediction scheme and traditional analytical estimates.
{"title":"Estimating Harvestable Solar Energy from Atmospheric Pressure Using Support Vector Regression","authors":"P. Krömer, P. Musílek, J. Rodway, M. Reformat, Michal Prauzek","doi":"10.1109/INCoS.2015.58","DOIUrl":"https://doi.org/10.1109/INCoS.2015.58","url":null,"abstract":"Energy neutrality is the desired mode of operation of many sensor networks used for environmental monitoring. Intelligent energy harvesting networks, composed of nodes equipped with solar panels and other types of power-scavenging devices, can plan and manage their operations according to short and long-term predictions of ambient energy availability. This paper introduces a novel method for next-day solar energy prediction based on atmospheric pressure and support vector regression. A location-specific support vector regression model is in this approach created using a collection of geospatially correlated atmospheric pressure and solar intensity measurements. The trained model is used to estimate next day solar energy availability from a time series of recent atmospheric pressure values and their differences. The ability of the proposed system to estimate daily solar energy is compared to a recent evolutionary-fuzzy prediction scheme and traditional analytical estimates.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134320857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Both information and communication technologies and computer-supported collaborative learning have been widely adopted in many educational institutions. Likewise, general e-assessment processes offer enormous opportunities to enhance student's learning experience. In this context, e-Learning stakeholders are increasingly demanding new requirements and, among them, information security in e-Learning stands out as a key factor. One of the key strategies in information security is that security drawbacks cannot be solved with technology solutions alone. Thus we have proposed a functional approach based on trustworthiness, namely, a trustworthiness security methodology. Since this methodology proposes processes and methods, which are closely related to knowledge management, in this paper, we will endow our methodology with current knowledge management processes. For this reason, we analyse the current models and techniques used for general knowledge management to be applied to trustworthy data from e-Learning systems. Moreover, we discuss several issues that arise when managing large data sets that span a rather long period of time. Hence, the main goal of this paper is to analyse existing knowledge management processes to endow our trustworthiness security methodology with a suitable set of knowledge management techniques and models. Finally, we exemplify the approach with trustworthy data of the on-line activity of virtual classrooms in our Virtual Campus of Open University of Catalonia.
{"title":"A Knowledge Management Process to Enhance Trustworthiness-based Security in On-line Learning Teams","authors":"Jorge Miguel, S. Caballé, F. Xhafa","doi":"10.1109/INCoS.2015.70","DOIUrl":"https://doi.org/10.1109/INCoS.2015.70","url":null,"abstract":"Both information and communication technologies and computer-supported collaborative learning have been widely adopted in many educational institutions. Likewise, general e-assessment processes offer enormous opportunities to enhance student's learning experience. In this context, e-Learning stakeholders are increasingly demanding new requirements and, among them, information security in e-Learning stands out as a key factor. One of the key strategies in information security is that security drawbacks cannot be solved with technology solutions alone. Thus we have proposed a functional approach based on trustworthiness, namely, a trustworthiness security methodology. Since this methodology proposes processes and methods, which are closely related to knowledge management, in this paper, we will endow our methodology with current knowledge management processes. For this reason, we analyse the current models and techniques used for general knowledge management to be applied to trustworthy data from e-Learning systems. Moreover, we discuss several issues that arise when managing large data sets that span a rather long period of time. Hence, the main goal of this paper is to analyse existing knowledge management processes to endow our trustworthiness security methodology with a suitable set of knowledge management techniques and models. Finally, we exemplify the approach with trustworthy data of the on-line activity of virtual classrooms in our Virtual Campus of Open University of Catalonia.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131331262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The preparation of evacuation plans for public buildings and the related training is mandated by law in many countries. The traditional approaches for providing people with the correct emergency information tend to be based on long, written instructions, posted on doors and walls that are not necessarily read by occupants and on evacuation drills that are costly, rarely performed and focused on specific scenarios. To overcome these limits we propose an engaging approach for evacuation training, targeted towards primary and secondary school students and based on adaptive serious games. The student is immersed in a virtual environment representing his/her school during an emergency with the aim of evacuating and adopting the correct behaviour. Any performed action is evaluated by the system, feedback is provided immediately and also when the game ends. Recovery training material is automatically arranged and provided to the student to explain any errors he/she made and to help reach better subsequent performances. Ontologies have been used to represent emergency skills and to relate them to possible actions within the game environment. Action-based assessment and sequencing techniques have been applied to arrange useful training material.
{"title":"Adaptive Serious Games for Emergency Evacuation Training","authors":"N. Capuano, Richard King","doi":"10.1109/INCoS.2015.32","DOIUrl":"https://doi.org/10.1109/INCoS.2015.32","url":null,"abstract":"The preparation of evacuation plans for public buildings and the related training is mandated by law in many countries. The traditional approaches for providing people with the correct emergency information tend to be based on long, written instructions, posted on doors and walls that are not necessarily read by occupants and on evacuation drills that are costly, rarely performed and focused on specific scenarios. To overcome these limits we propose an engaging approach for evacuation training, targeted towards primary and secondary school students and based on adaptive serious games. The student is immersed in a virtual environment representing his/her school during an emergency with the aim of evacuating and adopting the correct behaviour. Any performed action is evaluated by the system, feedback is provided immediately and also when the game ends. Recovery training material is automatically arranged and provided to the student to explain any errors he/she made and to help reach better subsequent performances. Ontologies have been used to represent emergency skills and to relate them to possible actions within the game environment. Action-based assessment and sequencing techniques have been applied to arrange useful training material.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131421567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It is a reasonable idea to solve a problem whose property has not been clarified yet using evolutionary multiobjective optimization (EMO) because EMO does not require domain specific knowledge and analysis for obtained pareto solution set may reveal relationships between design variables and objective functions. This paper focuses on designing a coded aperture (CA), one of the hot topics in computer photography; CA is used in a camera or a projector for deblurring, constructing all-focus image, depth estimation and so on. Since little knowledge has been accumulated for designing CA, this paper proposes a CA design method using EMO. Experiments on designing projector aperture have shown relationships between the performance of depth estimation, aperture ratio, and noise robustness.
{"title":"A Fundamental Study on Coded Aperture Design for Depth from Projector Defocus Based on Evolutionary Multi-objective Optimization","authors":"Yudai Mido, Yuuki Horita, Kentaro Nakai, Taishi Megano, S. Ono, Hiroshi Kawasaki","doi":"10.1109/INCoS.2015.91","DOIUrl":"https://doi.org/10.1109/INCoS.2015.91","url":null,"abstract":"It is a reasonable idea to solve a problem whose property has not been clarified yet using evolutionary multiobjective optimization (EMO) because EMO does not require domain specific knowledge and analysis for obtained pareto solution set may reveal relationships between design variables and objective functions. This paper focuses on designing a coded aperture (CA), one of the hot topics in computer photography; CA is used in a camera or a projector for deblurring, constructing all-focus image, depth estimation and so on. Since little knowledge has been accumulated for designing CA, this paper proposes a CA design method using EMO. Experiments on designing projector aperture have shown relationships between the performance of depth estimation, aperture ratio, and noise robustness.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122423508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose designing a specific ontology for representing relevant aspects of affective phenomena in e-learning. The ontology is aimed to include the different types of emotions, moods and behaviors that students experience in the e-learning environments, the different types of feedback that teachers can provide to their students and the different effects in students' behavior during the e-learning process. Once the ontology is formalized, it will be used to design a virtual Affective Pedagogical Tutor (APT) based on an Event-Condition-Action rule system to provide affective feedback, aiming to provide a positive change in students' behavior and performance. The ultimate goal is to provide means for effective emotion management in a collaborative learning environment.
{"title":"An Ontology about Emotion Awareness and Affective Feedback in Elearning","authors":"Marta Arguedas, F. Xhafa, T. Daradoumis","doi":"10.1109/INCoS.2015.78","DOIUrl":"https://doi.org/10.1109/INCoS.2015.78","url":null,"abstract":"In this paper, we propose designing a specific ontology for representing relevant aspects of affective phenomena in e-learning. The ontology is aimed to include the different types of emotions, moods and behaviors that students experience in the e-learning environments, the different types of feedback that teachers can provide to their students and the different effects in students' behavior during the e-learning process. Once the ontology is formalized, it will be used to design a virtual Affective Pedagogical Tutor (APT) based on an Event-Condition-Action rule system to provide affective feedback, aiming to provide a positive change in students' behavior and performance. The ultimate goal is to provide means for effective emotion management in a collaborative learning environment.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130382203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To address the limitation of entity resolution of NoSQL documents, we propose a new parallel NoSQL entity resolution approach with MapReduce. Although current MapReduce framework enables efficient parallel execution of entity resolution, it cannot find duplicates in adjacent block easily. Therefore, we investigate possible solutions called Partition-Sort-Map-Reduce to find duplicates by overlapping boundary objects in adjacent blocks. Finally, our experimental evaluation based on NoSQL breeding data and the analysis of time complexity show the high effectiveness and efficiency of the proposed entity resolution approaches.
{"title":"Parallel NoSQL Entity Resolution Approach with MapReduce","authors":"Kun Ma, Bo Yang","doi":"10.1109/INCoS.2015.16","DOIUrl":"https://doi.org/10.1109/INCoS.2015.16","url":null,"abstract":"To address the limitation of entity resolution of NoSQL documents, we propose a new parallel NoSQL entity resolution approach with MapReduce. Although current MapReduce framework enables efficient parallel execution of entity resolution, it cannot find duplicates in adjacent block easily. Therefore, we investigate possible solutions called Partition-Sort-Map-Reduce to find duplicates by overlapping boundary objects in adjacent blocks. Finally, our experimental evaluation based on NoSQL breeding data and the analysis of time complexity show the high effectiveness and efficiency of the proposed entity resolution approaches.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126784374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Although computer aided design (CAD) and computer-aided manufacturing (CAM) tools have been widely adopted in industry, it still takes a lot of time for the partners to coordinate to create a good solution. To respond to business opportunities, it calls for the development of a methodology to support and automate composition of production processes dynamically. The goal of this paper is to propose a methodology to link process specification models, negotiation mechanism and optimization methods to achieve the desired cycle time and generate processes dynamically. We exploit recent advancements in artificial intelligence and optimization theories to develop a solution methodology for dynamic composition of production processes in multi-agent systems (MAS). To develop such a design methodology relies on an appropriate process specification model to describe the tasks and a mechanism to allocate resources to production processes. Petri nets have been widely applied in modeling of workflows. Combinatorial reverse auctions provide an effective mechanism to select the resources to perform the required operations in workflows. Therefore, we combine Petri net models with combinatorial reverse auctions to dynamically plan the production processes based on MAS and construct a model to control the operations at the shop floor. Our design methodology automates the dynamic composition of production processes. An application scenario has also been provided to verify our solution methodology. We also conduct experiments to illustrate the computational efficiency and scalability of our proposed method.
{"title":"Collaborative Composition of Production Services in Multi-agent Systems Based on Auctions","authors":"Fu-Shiung Hsieh","doi":"10.1109/INCoS.2015.17","DOIUrl":"https://doi.org/10.1109/INCoS.2015.17","url":null,"abstract":"Although computer aided design (CAD) and computer-aided manufacturing (CAM) tools have been widely adopted in industry, it still takes a lot of time for the partners to coordinate to create a good solution. To respond to business opportunities, it calls for the development of a methodology to support and automate composition of production processes dynamically. The goal of this paper is to propose a methodology to link process specification models, negotiation mechanism and optimization methods to achieve the desired cycle time and generate processes dynamically. We exploit recent advancements in artificial intelligence and optimization theories to develop a solution methodology for dynamic composition of production processes in multi-agent systems (MAS). To develop such a design methodology relies on an appropriate process specification model to describe the tasks and a mechanism to allocate resources to production processes. Petri nets have been widely applied in modeling of workflows. Combinatorial reverse auctions provide an effective mechanism to select the resources to perform the required operations in workflows. Therefore, we combine Petri net models with combinatorial reverse auctions to dynamically plan the production processes based on MAS and construct a model to control the operations at the shop floor. Our design methodology automates the dynamic composition of production processes. An application scenario has also been provided to verify our solution methodology. We also conduct experiments to illustrate the computational efficiency and scalability of our proposed method.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126646037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Competitive organizations have implemented systems of business intelligence in order to help employees in the process of evidence-based decision-making. Using these systems in university will provide a set of analytical tools that support decision-making of academics focused to the improvement of their research and teaching activities. In the case of teachers, for example, it may help to better understand students, how they learn and how to improve the learning processes according to evidences. To implement these systems efficiently it is necessary to gather data about the activities students and teachers perform during the learning-teaching process. Currently, most universities provide virtual learning environments (VLE) where students perform most of their learning activities. These environments may store data about the interaction of their users and, therefore, gather information of all the agents during the teaching-learning process. Our proposal is to adopt the strategies of business intelligence, which resulted useful in organizations, to universities. By applying analytic techniques on the large volume of data stored in the VLE, we propose to build dashboards for teachers and academic program managers in order to help them to take decisions that improve teaching in the short, medium and long term.
{"title":"Analytic Information Systems in the Context of Higher Education: Expectations, Reality and Trends","authors":"I. Guitart, J. Conesa","doi":"10.1109/INCoS.2015.71","DOIUrl":"https://doi.org/10.1109/INCoS.2015.71","url":null,"abstract":"Competitive organizations have implemented systems of business intelligence in order to help employees in the process of evidence-based decision-making. Using these systems in university will provide a set of analytical tools that support decision-making of academics focused to the improvement of their research and teaching activities. In the case of teachers, for example, it may help to better understand students, how they learn and how to improve the learning processes according to evidences. To implement these systems efficiently it is necessary to gather data about the activities students and teachers perform during the learning-teaching process. Currently, most universities provide virtual learning environments (VLE) where students perform most of their learning activities. These environments may store data about the interaction of their users and, therefore, gather information of all the agents during the teaching-learning process. Our proposal is to adopt the strategies of business intelligence, which resulted useful in organizations, to universities. By applying analytic techniques on the large volume of data stored in the VLE, we propose to build dashboards for teachers and academic program managers in order to help them to take decisions that improve teaching in the short, medium and long term.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125875689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Karolis Vilius, Lu Liu, John Panneerselvam, T. Stimpson
Given the emergence of the wireless technologies in the recent past, their utilities in both home and industrial applications have taken new shapes in various dimensions. Along with this progressive growth is the substantial emergence of the network attackers as they are finding new bases and platforms for launching network attacks. Existing wireless security standards are not persistent enough under the lights of the emerging malicious attackers. Since the first implementation of wireless networks, it was noticed that the original WEP encryption methods had flawed security which led to the industry searching for new solutions to secure wireless communications. Whilst enterprises were able to take advantage of these developments, many home users were unaware of the dangers posed by weak wireless encryption and are continued to employ vulnerable encryption. Thus it has become a necessity to explore and reveal the current security trends and their efficiencies against the present form of the network vulnerabilities from time to time. To this end, this paper delves into the background of weak encryption protocols and identifies the risks and countermeasures for protecting wireless networks against attacks. This research also includes the analysis on the data collected from scanning the wireless networks in the city of Derby in the United Kingdom. An important outcome of this research work is the critical evaluation of the security standards along with the recognition of the encryption protocol patterns in existence from 2006 to 2015.
{"title":"A Critical Analysis of the Efficiencies of Emerging Wireless Security Standards Against Network Attacks","authors":"Karolis Vilius, Lu Liu, John Panneerselvam, T. Stimpson","doi":"10.1109/INCoS.2015.56","DOIUrl":"https://doi.org/10.1109/INCoS.2015.56","url":null,"abstract":"Given the emergence of the wireless technologies in the recent past, their utilities in both home and industrial applications have taken new shapes in various dimensions. Along with this progressive growth is the substantial emergence of the network attackers as they are finding new bases and platforms for launching network attacks. Existing wireless security standards are not persistent enough under the lights of the emerging malicious attackers. Since the first implementation of wireless networks, it was noticed that the original WEP encryption methods had flawed security which led to the industry searching for new solutions to secure wireless communications. Whilst enterprises were able to take advantage of these developments, many home users were unaware of the dangers posed by weak wireless encryption and are continued to employ vulnerable encryption. Thus it has become a necessity to explore and reveal the current security trends and their efficiencies against the present form of the network vulnerabilities from time to time. To this end, this paper delves into the background of weak encryption protocols and identifies the risks and countermeasures for protecting wireless networks against attacks. This research also includes the analysis on the data collected from scanning the wireless networks in the city of Derby in the United Kingdom. An important outcome of this research work is the critical evaluation of the security standards along with the recognition of the encryption protocol patterns in existence from 2006 to 2015.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121570348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}