Pub Date : 2014-12-18DOI: 10.1109/CCST.2014.6987024
Lorena Guachi, G. Cocorullo, P. Corsonello, F. Frustaci, S. Perri
This paper presents a new method for background subtraction which takes advantages of using the color invariants combined with gray color. The proposed method works robustly reducing misclassified foreground objects. Gaussian mixtures are exploited for each pixel through two channels: the color invariants, which are derived from a physical model, and the gray colors obtained as a descriptor of the image. The background models update is performed using a random process selected considering that in many practical situations it is not necessary to update each background pixel model for each new frame. The novel algorithm has been compared to three state-of-the-art methods. Experimental results demonstrate the proposed method achieves a higher robustness, is less sensitive to noise and increases the number of pixel correctly classified as foreground for both indoor and outdoor video sequences.
{"title":"A novel background subtraction method based on color invariants and grayscale levels","authors":"Lorena Guachi, G. Cocorullo, P. Corsonello, F. Frustaci, S. Perri","doi":"10.1109/CCST.2014.6987024","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987024","url":null,"abstract":"This paper presents a new method for background subtraction which takes advantages of using the color invariants combined with gray color. The proposed method works robustly reducing misclassified foreground objects. Gaussian mixtures are exploited for each pixel through two channels: the color invariants, which are derived from a physical model, and the gray colors obtained as a descriptor of the image. The background models update is performed using a random process selected considering that in many practical situations it is not necessary to update each background pixel model for each new frame. The novel algorithm has been compared to three state-of-the-art methods. Experimental results demonstrate the proposed method achieves a higher robustness, is less sensitive to noise and increases the number of pixel correctly classified as foreground for both indoor and outdoor video sequences.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"536 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115633793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/CCST.2014.6987047
Le Zhang, Chip-Hong Chang, A. Cabrini, G. Torelli, Z. Kong
Memory-based Physical Unclonable Function (MemPUF) emerged as a replacement for traditional key preservation primitives to overcome the susceptibility of secret keys to physical attacks. Recent experiments demonstrated that even some MemPUFs can be physically attacked by exploiting their side-channel information. In this paper, we formulate an adversary model for a prediction attack that takes advantage of the side-channel information leaked from a MemPUF. Based on this pivotal insight, we propose countermeasures to enhance the resilience of MemPUFs against such a kind of attack, and introduce a security-enhanced MemPUF design using phase change material. Our analysis demonstrated the effectiveness of our proposed scheme against the measurement-prediction attack given an adversary with certain bounded attack capability.
{"title":"Leakage-resilient memory-based physical unclonable function using phase change material","authors":"Le Zhang, Chip-Hong Chang, A. Cabrini, G. Torelli, Z. Kong","doi":"10.1109/CCST.2014.6987047","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987047","url":null,"abstract":"Memory-based Physical Unclonable Function (MemPUF) emerged as a replacement for traditional key preservation primitives to overcome the susceptibility of secret keys to physical attacks. Recent experiments demonstrated that even some MemPUFs can be physically attacked by exploiting their side-channel information. In this paper, we formulate an adversary model for a prediction attack that takes advantage of the side-channel information leaked from a MemPUF. Based on this pivotal insight, we propose countermeasures to enhance the resilience of MemPUFs against such a kind of attack, and introduce a security-enhanced MemPUF design using phase change material. Our analysis demonstrated the effectiveness of our proposed scheme against the measurement-prediction attack given an adversary with certain bounded attack capability.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"306 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114280277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/CCST.2014.6986972
A. Nautsch, C. Rathgeb, C. Busch
The use of (online) signatures for the purpose of verifying a subject's identity is highly accepted within society and perceived as a noninvasive and nonthreatening biometric characteristic by most users. However, signature biometrics is typically characterized by a high intra-class variability, being influenced by several physical and emotional conditions, i.e. identity verification based on online signature biometrics represents an extremely challenging task. Online signature verification systems mainly utilize time-discrete signal processing techniques for biometric signature authorship verification. The vast majority of state-of-the-art approaches to online signature verification construct subject-specific probabilistic models during feature extraction, e.g. Gaussian Mixture Models (GMMs). Focusing on the construction of these models feature normalization turns out to be vital in order to achieve robustness against noise. In this work we propose the very first application of a feature normalization technique, referred to as Feature Warping (FW), which is well-established within the speaker recognition community, to a GMM-based online signature verification system. Experimental evaluations, which are carried out on the MCYT signature corpus, demonstrate that the presented adaptation of FW significantly improves the biometric performance of the underlying online signature verification system, achieving relative gains of approximately 47% in terms of equal error rates.
{"title":"Bridging Gaps: An application of feature warping to online signature verification","authors":"A. Nautsch, C. Rathgeb, C. Busch","doi":"10.1109/CCST.2014.6986972","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986972","url":null,"abstract":"The use of (online) signatures for the purpose of verifying a subject's identity is highly accepted within society and perceived as a noninvasive and nonthreatening biometric characteristic by most users. However, signature biometrics is typically characterized by a high intra-class variability, being influenced by several physical and emotional conditions, i.e. identity verification based on online signature biometrics represents an extremely challenging task. Online signature verification systems mainly utilize time-discrete signal processing techniques for biometric signature authorship verification. The vast majority of state-of-the-art approaches to online signature verification construct subject-specific probabilistic models during feature extraction, e.g. Gaussian Mixture Models (GMMs). Focusing on the construction of these models feature normalization turns out to be vital in order to achieve robustness against noise. In this work we propose the very first application of a feature normalization technique, referred to as Feature Warping (FW), which is well-established within the speaker recognition community, to a GMM-based online signature verification system. Experimental evaluations, which are carried out on the MCYT signature corpus, demonstrate that the presented adaptation of FW significantly improves the biometric performance of the underlying online signature verification system, achieving relative gains of approximately 47% in terms of equal error rates.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123931470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/CCST.2014.6987035
Ramón Blanco-Gonzalo, R. Sánchez-Reillo, N. Poh
One of the most promising biometric modalities suggested to secure mobile devices is dynamic signature verification. It is widely accepted by users as to sign is considered a usual action. At the time to sign documents, it happens that people tend to feel stress or discomfort, but does it influence negatively to the signature recognition? In this work several users participated in a usability evaluation signing in a common smartphone with a stylus under stress conditions. This is targeting the potential use of this kind of biometric systems in scenarios where the user may suffer a certain level of stress, such as in courts, banks or even shopping. We have focused in one of the main usability factors: the efficiency in terms of the time on tasks. Our findings suggest that longer signatures are more negatively influenced in performance by stress situations than shorter signatures, but this performance decrease is still acceptable for recognition.
{"title":"On the effect of time efficiency in DSV under stress","authors":"Ramón Blanco-Gonzalo, R. Sánchez-Reillo, N. Poh","doi":"10.1109/CCST.2014.6987035","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987035","url":null,"abstract":"One of the most promising biometric modalities suggested to secure mobile devices is dynamic signature verification. It is widely accepted by users as to sign is considered a usual action. At the time to sign documents, it happens that people tend to feel stress or discomfort, but does it influence negatively to the signature recognition? In this work several users participated in a usability evaluation signing in a common smartphone with a stylus under stress conditions. This is targeting the potential use of this kind of biometric systems in scenarios where the user may suffer a certain level of stress, such as in courts, banks or even shopping. We have focused in one of the main usability factors: the efficiency in terms of the time on tasks. Our findings suggest that longer signatures are more negatively influenced in performance by stress situations than shorter signatures, but this performance decrease is still acceptable for recognition.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"453 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116180787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/CCST.2014.6987015
S. Salvador, R. Maggiora, D. Milanesio, G. Rodighiero
The 2D (range and azimuth) radar system here presented has been developed for civilian and industrial anti-intrusion applications and has been designed to provide an impassable protection barrier with controllable width (down to one meter). It is based on a CW double chirp technique: a linearly changing frequency signal is transmitted and the signals reflected by possible intruders (targets) are properly processed to determine, by analyzing their frequency content, the position in azimuth and range of the target itself. The system is mainly composed of a 24 GHz transceiver module for the transmission and reception of the signals, a real-time processing DSP-based board and an interface board for communication with the user and with external devices. The transceiver module includes one transmitting (TX) and two receiving (RX) antennas and an MMIC chip for the generation of the radar signals and the reception of echoes and their coherent pulse compression and filtering. The TX and RX antennas are patch 2D arrays with a designed beam-width of approximately 6° and side-lobe suppression achieved through appropriate elements power tapering. The main element of the transceiver is an MMIC chip which converts the triangular continuous wave generated by the DSP board into a varying frequency (24-24.250 GHz) wave for feeding the TX antenna. The high frequency received echo signals are then pulse compressed by the MMIC, filtered and sent back to the DSP board. The processing board is equipped with a DAC, four ADCs, a 300 MHz DSP and many peripherals. The received echo signals, converted into frequency domain through complex FFT, are processed with sophisticated algorithms for background removal (MTI filter), thresholding (CFAR algorithms, RCS analysis and more) and range determination. The determination of the azimuthal position of the target is based on a phase comparison mono-pulse technique. The analysis allows to determine both the range and the azimuth position and to accurately achieve the desired 2D shape of the detection area (usually a very narrow BLADE shape). The sophisticated processing algorithm makes the system resilient to atmospheric events such as wind, snow and rain, and capable of discriminating between human targets and small animals. The interface board gives the user the possibility to properly configure the radar system by setting all the parameters through an appropriate GUI and regulate the radar sensitivity all over the protection area. Furthermore, it allows the system to be integrated in a network of sensors, video cameras and other devices.
{"title":"An anti-intrusion protection barrier based on 2D radar technology","authors":"S. Salvador, R. Maggiora, D. Milanesio, G. Rodighiero","doi":"10.1109/CCST.2014.6987015","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987015","url":null,"abstract":"The 2D (range and azimuth) radar system here presented has been developed for civilian and industrial anti-intrusion applications and has been designed to provide an impassable protection barrier with controllable width (down to one meter). It is based on a CW double chirp technique: a linearly changing frequency signal is transmitted and the signals reflected by possible intruders (targets) are properly processed to determine, by analyzing their frequency content, the position in azimuth and range of the target itself. The system is mainly composed of a 24 GHz transceiver module for the transmission and reception of the signals, a real-time processing DSP-based board and an interface board for communication with the user and with external devices. The transceiver module includes one transmitting (TX) and two receiving (RX) antennas and an MMIC chip for the generation of the radar signals and the reception of echoes and their coherent pulse compression and filtering. The TX and RX antennas are patch 2D arrays with a designed beam-width of approximately 6° and side-lobe suppression achieved through appropriate elements power tapering. The main element of the transceiver is an MMIC chip which converts the triangular continuous wave generated by the DSP board into a varying frequency (24-24.250 GHz) wave for feeding the TX antenna. The high frequency received echo signals are then pulse compressed by the MMIC, filtered and sent back to the DSP board. The processing board is equipped with a DAC, four ADCs, a 300 MHz DSP and many peripherals. The received echo signals, converted into frequency domain through complex FFT, are processed with sophisticated algorithms for background removal (MTI filter), thresholding (CFAR algorithms, RCS analysis and more) and range determination. The determination of the azimuthal position of the target is based on a phase comparison mono-pulse technique. The analysis allows to determine both the range and the azimuth position and to accurately achieve the desired 2D shape of the detection area (usually a very narrow BLADE shape). The sophisticated processing algorithm makes the system resilient to atmospheric events such as wind, snow and rain, and capable of discriminating between human targets and small animals. The interface board gives the user the possibility to properly configure the radar system by setting all the parameters through an appropriate GUI and regulate the radar sensitivity all over the protection area. Furthermore, it allows the system to be integrated in a network of sensors, video cameras and other devices.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132034479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/CCST.2014.6987022
R. Setola, D. Lorusso, M. Maggio
Recently, the “All Hazard” paradigm gained a large interest in the framework of Critical Infrastructure Protection, stressing the importance to guarantee an adequate level of service continuity in spite of any type of negative events, ranging from natural disasters to technological faults, considering both accidental and malicious actions. However, such an approach makes more difficult the analysis of the scenario, because experts have to consider a multitude of possible causes and their possible effects. Moreover, there is the need to consider, further to the direct consequences, also those induced by second or higher-level effects, i.e. the consequences induced by dependencies on other systems and cascading effects on the population. To help experts in this hard task, within the EC co-funded project Threvi2, the authors developed an approach to manage the cause-effect relationships using a taxonomic framework, where the different causes are decomposed in their elementary effects, and then grouped into classes of threats.
{"title":"Dependencies analysis in emergency scenarios","authors":"R. Setola, D. Lorusso, M. Maggio","doi":"10.1109/CCST.2014.6987022","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987022","url":null,"abstract":"Recently, the “All Hazard” paradigm gained a large interest in the framework of Critical Infrastructure Protection, stressing the importance to guarantee an adequate level of service continuity in spite of any type of negative events, ranging from natural disasters to technological faults, considering both accidental and malicious actions. However, such an approach makes more difficult the analysis of the scenario, because experts have to consider a multitude of possible causes and their possible effects. Moreover, there is the need to consider, further to the direct consequences, also those induced by second or higher-level effects, i.e. the consequences induced by dependencies on other systems and cascading effects on the population. To help experts in this hard task, within the EC co-funded project Threvi2, the authors developed an approach to manage the cause-effect relationships using a taxonomic framework, where the different causes are decomposed in their elementary effects, and then grouped into classes of threats.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134014003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/CCST.2014.6986968
F. Maio
Civil aviation remains an attracting target for criminals and the obligation to protect civil aviation against acts of unlawful interference must cope with increasingly sophisticated threats, many of a technological nature. The development of complex systems, by their nature interoperable, in an increasingly global and supranational environment, requires a methodological approach of the security governance to enable the constant monitoring of resources, process integration between IT, logical and physical security, continuously measuring the threat level and the potential vulnerability, with the aim to react and respond to acts of unlawful interference. This requires also a close and continuous link between all the actors of the system. The legal framework, both European and national, forms a solid term of reference, but the mere compliance with regulations is not enough, while it is always necessary to demonstrate due diligence for the protection of human lives in the air and on the ground and to ensure, in general, security, continuity, resilience and regularity of the public service of transportation by air. ENAV, Italian State-owned Air Navigation Service Provider, is in charge a vital segment of aviation and it has established an integrated security management system, focused on the concept of centralized government. Its centerpiece is the Security Operation Center, now evolving into an Integrated Defense Center, in constant evolution and aimed at a full context awareness and adaptive response. In accordance with Annex 17 to the Chicago Convention and related guidance material, ENAV provided a strategy based on the principle to combine technology, human and material resources, a set of processes and procedures intended to address a continuous improvement based on Deming cycle. Furthermore, the process management is focused on internationally recognized standards and committed to the exchange of information with the appropriate authorities and key stakeholders to achieve the dynamic configuration of the devices of physical and logical security and their responsiveness in the context of the system of critical infrastructure protection and cyber security system of the Italian Republic.
{"title":"Centralized security governance for air navigation services: Innovative strategies to confront emerging threats against Civil Aviation","authors":"F. Maio","doi":"10.1109/CCST.2014.6986968","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986968","url":null,"abstract":"Civil aviation remains an attracting target for criminals and the obligation to protect civil aviation against acts of unlawful interference must cope with increasingly sophisticated threats, many of a technological nature. The development of complex systems, by their nature interoperable, in an increasingly global and supranational environment, requires a methodological approach of the security governance to enable the constant monitoring of resources, process integration between IT, logical and physical security, continuously measuring the threat level and the potential vulnerability, with the aim to react and respond to acts of unlawful interference. This requires also a close and continuous link between all the actors of the system. The legal framework, both European and national, forms a solid term of reference, but the mere compliance with regulations is not enough, while it is always necessary to demonstrate due diligence for the protection of human lives in the air and on the ground and to ensure, in general, security, continuity, resilience and regularity of the public service of transportation by air. ENAV, Italian State-owned Air Navigation Service Provider, is in charge a vital segment of aviation and it has established an integrated security management system, focused on the concept of centralized government. Its centerpiece is the Security Operation Center, now evolving into an Integrated Defense Center, in constant evolution and aimed at a full context awareness and adaptive response. In accordance with Annex 17 to the Chicago Convention and related guidance material, ENAV provided a strategy based on the principle to combine technology, human and material resources, a set of processes and procedures intended to address a continuous improvement based on Deming cycle. Furthermore, the process management is focused on internationally recognized standards and committed to the exchange of information with the appropriate authorities and key stakeholders to achieve the dynamic configuration of the devices of physical and logical security and their responsiveness in the context of the system of critical infrastructure protection and cyber security system of the Italian Republic.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134097075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/CCST.2014.6987012
Mofreh A. Hogo
Intrusion detection system (IDS) is becoming an integral part of the network security infrastructure. Data mining tools are widely used for developing IDS. There is a lack of researches in the temporal data mining analysis of the intrusions (intrusions detection over different time periods). Most of researches are focusing on the latest snapshot data mining of intrusion detection systems. This work presented in this paper proposes a new temporal data mining analysis technique of intrusion detection systems based on naïve Bayes networks. The presented system considered the time dimension and built many different classifier models to obtain an accurate analysis of intruders. The obtained results give more focusing and deep understanding of the intruders' behavior during the different time periods and illustrate the shrinking and expansions of intruders' classes over the time slices (the migrations of intruders from one segment to another), The temporal analysis of intruders can help in taking an appropriate decision against specific type of attacks (decisions must be suitable with the intruder behaviour). The results indicate the reduction of the possible high positive false rate.
{"title":"Temporal analysis of intrusion detection","authors":"Mofreh A. Hogo","doi":"10.1109/CCST.2014.6987012","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987012","url":null,"abstract":"Intrusion detection system (IDS) is becoming an integral part of the network security infrastructure. Data mining tools are widely used for developing IDS. There is a lack of researches in the temporal data mining analysis of the intrusions (intrusions detection over different time periods). Most of researches are focusing on the latest snapshot data mining of intrusion detection systems. This work presented in this paper proposes a new temporal data mining analysis technique of intrusion detection systems based on naïve Bayes networks. The presented system considered the time dimension and built many different classifier models to obtain an accurate analysis of intruders. The obtained results give more focusing and deep understanding of the intruders' behavior during the different time periods and illustrate the shrinking and expansions of intruders' classes over the time slices (the migrations of intruders from one segment to another), The temporal analysis of intruders can help in taking an appropriate decision against specific type of attacks (decisions must be suitable with the intruder behaviour). The results indicate the reduction of the possible high positive false rate.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131605353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/CCST.2014.6987023
Simona Capparella, M. Falvo
Photovoltaic (PV) systems has been playing a key role during the last years in the evolution of electricity sector. Concerning the design issues for guaranteeing security and safety, it is particularly important to take into account that a PV plant is a "special" system of generation, in which the presence of a d.c. generator results in changings of the technical rules used for the design of electrical systems. Choices regarding the layout of the system, the grounding of the negative pole of the d.c. side and the means of protection are fundamental for the design of a PV system that takes into account the risk of fire. The subject of this article is the analysis of the relation between electrical phenomena that can occur inside of a PV system and the related means of protection (depending on the system's architecture) that can guarantee the secure fault detection and so prevent the occurrence and development of a fire.
{"title":"Secure faults detection for preventing fire risk in PV systems","authors":"Simona Capparella, M. Falvo","doi":"10.1109/CCST.2014.6987023","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987023","url":null,"abstract":"Photovoltaic (PV) systems has been playing a key role during the last years in the evolution of electricity sector. Concerning the design issues for guaranteeing security and safety, it is particularly important to take into account that a PV plant is a \"special\" system of generation, in which the presence of a d.c. generator results in changings of the technical rules used for the design of electrical systems. Choices regarding the layout of the system, the grounding of the negative pole of the d.c. side and the means of protection are fundamental for the design of a PV system that takes into account the risk of fire. The subject of this article is the analysis of the relation between electrical phenomena that can occur inside of a PV system and the related means of protection (depending on the system's architecture) that can guarantee the secure fault detection and so prevent the occurrence and development of a fire.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127577455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/CCST.2014.6986977
Ignacio Sanchez, R. Satta, I. N. Fovino, G. Baldini, G. Steri, David Shaw, A. Ciardulli
The concept of Smart Home where appliances, sensors, actuators, displays and computing resources are connected and interact to support the life of the citizen is being increasingly researched. In this context, the Wi-Fi communication technology has grown to become the de-facto standard for data communications in Smart Home environments, with cordless telephony being dominated by the DECT protocol. Even though both technologies incorporate sets of security features aimed at securing the confidentiality and integrity of the communications, the nature and the design of both radio-frequency protocols make them vulnerable, up to a certain extent, to privacy leakages through traffic analysis attacks. In this paper we explore the information leakage vulnerabilities inherent to these technologies and their potential impact on citizens' privacy in the context of the Smart Home. We demonstrate how the websites visited by a smart device can be inferred by applying machine learning and pattern matching techniques to eavesdropped encrypted traffic.
{"title":"Privacy leakages in Smart Home wireless technologies","authors":"Ignacio Sanchez, R. Satta, I. N. Fovino, G. Baldini, G. Steri, David Shaw, A. Ciardulli","doi":"10.1109/CCST.2014.6986977","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986977","url":null,"abstract":"The concept of Smart Home where appliances, sensors, actuators, displays and computing resources are connected and interact to support the life of the citizen is being increasingly researched. In this context, the Wi-Fi communication technology has grown to become the de-facto standard for data communications in Smart Home environments, with cordless telephony being dominated by the DECT protocol. Even though both technologies incorporate sets of security features aimed at securing the confidentiality and integrity of the communications, the nature and the design of both radio-frequency protocols make them vulnerable, up to a certain extent, to privacy leakages through traffic analysis attacks. In this paper we explore the information leakage vulnerabilities inherent to these technologies and their potential impact on citizens' privacy in the context of the Smart Home. We demonstrate how the websites visited by a smart device can be inferred by applying machine learning and pattern matching techniques to eavesdropped encrypted traffic.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115365107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}