Pub Date : 2017-10-01DOI: 10.1109/CCST.2017.8167807
Paloma Tirado-Martin, Ramón Blanco-Gonzalo, Alba Alvarez-Nieto, Alvaro Romero-Diaz
Since the beginning of hand vein biometrics, the approaches to this problem have been countless, making this modality suitable for commercial use in some countries. This paper shows some of them and tries to show which are the most common procedures in each of the main stages of these systems. We will be able to see that the same database usage is not common along the literature, being the main problem when evaluating the performance of a new system.
{"title":"Image processing techniques for improving vascular hand biometrics","authors":"Paloma Tirado-Martin, Ramón Blanco-Gonzalo, Alba Alvarez-Nieto, Alvaro Romero-Diaz","doi":"10.1109/CCST.2017.8167807","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167807","url":null,"abstract":"Since the beginning of hand vein biometrics, the approaches to this problem have been countless, making this modality suitable for commercial use in some countries. This paper shows some of them and tries to show which are the most common procedures in each of the main stages of these systems. We will be able to see that the same database usage is not common along the literature, being the main problem when evaluating the performance of a new system.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128587812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/CCST.2017.8167810
S. Michel, Nicole Hättenschwiler, Melina Zeballos, A. Schwaninger
This study investigated the effectiveness of e-learning and blended learning for airport security officers (screeners) aimed at increasing their detection of novel prohibited items in X-ray images of passenger bags. 80 screeners from a large European airport conducted a simulated X-ray baggage screening task (SXBST). Based on hit- and false alarm rates, d-prime, age, gender and job experience, four equivalent screener groups were created. The first group (EL1) conducted six different e-learning modules. The second group (EL2) repeated the e-learning modules once with a predefined time interval of one week in-between. The third group (BL) participated in an asynchrony blended learning course where all participants first conducted the six e-learning modules followed by classroom training. The control group (CG) did neither conduct e-learning nor participate in the blended learning course. All four groups conducted the SXBST again after these interventions. Statistical analyses of the hit rates for novel prohibited items showed a significant main effect of group (EL1, EL2, BL, CG). Post-hoc tests showed that the increase of the hit rate for EL1 vs. CG, EL2 vs. CG and BL vs. CG was significant. Therefore, all interventions helped to increase the detection of novel prohibited items in X-ray images of passenger bags. Additionally, the hit rate for BL was significantly higher compared to EL1, which underlies the benefit of blended learning as a combination of classroom and online-training. The repetition of the e-learning modules (EL2) led to a marginally significant increase of the hit rate compared to EL1. The difference between EL2 and BL was not significant. This suggests that when training duration is controlled, the advantage of blended learning compared to e-learning vanishes. In addition, training did not impact false alarm rate as the main effect of group was not significant. Analysis of response times showed no speed-accuracy tradeoff but screeners needed significantly more time to analyze target-absent images than target-present images and this effect was independent of group. Overall, these findings suggest that e-learning as well as blended learning are effective to improve screeners' detection of novel prohibited items in X-ray images of passenger bags. Implications for X-ray image interpretation training for screeners are discussed.
{"title":"Comparing e-learning and blended learning for threat detection in airport security X-ray screening","authors":"S. Michel, Nicole Hättenschwiler, Melina Zeballos, A. Schwaninger","doi":"10.1109/CCST.2017.8167810","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167810","url":null,"abstract":"This study investigated the effectiveness of e-learning and blended learning for airport security officers (screeners) aimed at increasing their detection of novel prohibited items in X-ray images of passenger bags. 80 screeners from a large European airport conducted a simulated X-ray baggage screening task (SXBST). Based on hit- and false alarm rates, d-prime, age, gender and job experience, four equivalent screener groups were created. The first group (EL1) conducted six different e-learning modules. The second group (EL2) repeated the e-learning modules once with a predefined time interval of one week in-between. The third group (BL) participated in an asynchrony blended learning course where all participants first conducted the six e-learning modules followed by classroom training. The control group (CG) did neither conduct e-learning nor participate in the blended learning course. All four groups conducted the SXBST again after these interventions. Statistical analyses of the hit rates for novel prohibited items showed a significant main effect of group (EL1, EL2, BL, CG). Post-hoc tests showed that the increase of the hit rate for EL1 vs. CG, EL2 vs. CG and BL vs. CG was significant. Therefore, all interventions helped to increase the detection of novel prohibited items in X-ray images of passenger bags. Additionally, the hit rate for BL was significantly higher compared to EL1, which underlies the benefit of blended learning as a combination of classroom and online-training. The repetition of the e-learning modules (EL2) led to a marginally significant increase of the hit rate compared to EL1. The difference between EL2 and BL was not significant. This suggests that when training duration is controlled, the advantage of blended learning compared to e-learning vanishes. In addition, training did not impact false alarm rate as the main effect of group was not significant. Analysis of response times showed no speed-accuracy tradeoff but screeners needed significantly more time to analyze target-absent images than target-present images and this effect was independent of group. Overall, these findings suggest that e-learning as well as blended learning are effective to improve screeners' detection of novel prohibited items in X-ray images of passenger bags. Implications for X-ray image interpretation training for screeners are discussed.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126591766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/CCST.2017.8167849
Iwen Coisel, Ignacio Sanchez, Javier Galbally
This work proposes a novel password guessing approach based on the identification, extraction and recombination of meaningful syntactic patterns present in human-chosen passwords. The proposed method exploits the existence of these patterns across user-selected passwords in order to effectively reduce the search space to be explored during the password guessing process. The password guessing scheme follows a two stage strategy. In the first step, a novel algorithm based on machine learning principles, identifies and extracts the syntactic meaningful patterns from a dataset of passwords. Then, in a second stage, these parts-of-passwords previously segmented are recombined in order to generate new statistically relevant password candidates that are used against a blind evaluation set. The experimental results show that this novel approach is able to guess complex passwords usually robust to traditional password guessing techniques.
{"title":"Divide, recombine and conquer: Syntactic patterns-reassembly algorithm applied to password guessing process","authors":"Iwen Coisel, Ignacio Sanchez, Javier Galbally","doi":"10.1109/CCST.2017.8167849","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167849","url":null,"abstract":"This work proposes a novel password guessing approach based on the identification, extraction and recombination of meaningful syntactic patterns present in human-chosen passwords. The proposed method exploits the existence of these patterns across user-selected passwords in order to effectively reduce the search space to be explored during the password guessing process. The password guessing scheme follows a two stage strategy. In the first step, a novel algorithm based on machine learning principles, identifies and extracts the syntactic meaningful patterns from a dataset of passwords. Then, in a second stage, these parts-of-passwords previously segmented are recombined in order to generate new statistically relevant password candidates that are used against a blind evaluation set. The experimental results show that this novel approach is able to guess complex passwords usually robust to traditional password guessing techniques.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121952625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/CCST.2017.8167852
P. Poitevin, M. Pelletier, Patrick Lamontagne
The recent proliferation of drones has contributed to the emergence of new threats in security applications. Because of their great agility and small size, UAS can be used for numerous missions and are very challenging to detect. Radar technology with its all-weather capability can play an important role in detecting UAS-based threats and in protecting critical assets. However, to be successful, radars have to quickly scan large volumes with great sensitivity, eliminate nuisance alarms from birds and discriminate UAS from ground targets. Radar parameters, antenna scan techniques and target classification requirements for UAS detection are analyzed. A radar implementation is discussed and preliminary results presented. Overall, an X-band radar with electronic scanning capability can contribute to a reliable and affordable solution for detecting UAS-based threats.
{"title":"Challenges in detecting UAS with radar","authors":"P. Poitevin, M. Pelletier, Patrick Lamontagne","doi":"10.1109/CCST.2017.8167852","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167852","url":null,"abstract":"The recent proliferation of drones has contributed to the emergence of new threats in security applications. Because of their great agility and small size, UAS can be used for numerous missions and are very challenging to detect. Radar technology with its all-weather capability can play an important role in detecting UAS-based threats and in protecting critical assets. However, to be successful, radars have to quickly scan large volumes with great sensitivity, eliminate nuisance alarms from birds and discriminate UAS from ground targets. Radar parameters, antenna scan techniques and target classification requirements for UAS detection are analyzed. A radar implementation is discussed and preliminary results presented. Overall, an X-band radar with electronic scanning capability can contribute to a reliable and affordable solution for detecting UAS-based threats.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116428349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/CCST.2017.8167794
A. Tundis, M. Mühlhäuser
The use of IT technology for the planning and implementation of illegal activities has been gaining ground in recent years. Nowadays, through the web and the social media, it is possible not only to divulge advertising for the disclosure of illicit activities, but also to take action that in the past needed to have people in place and at the moment the activity took place. In fact, this phenomenon allows criminals to be less exposed to the risk of being discovered. Furthermore, the technology tends to encourage international collaborations, which makes the process of identifying illegal activities even more complex because of the lack of adequate tools that can operate effectively by considering multi-cultural aspects. Consequently, this evolving phenomenon towards cyber-crime requires new models and analysis techniques to address these challenges. In this context, the paper proposes an approach based on a multi-language model that aims to support the identification of suspicious users on social networks. It exploits the effectiveness of web translation services along with specific stand-alone libraries for normalizing user profiles in a common language. In addition, different text analysis techniques are combined for supporting the user profiles evaluation. The proposed approach is exemplified through a case study by analyzing Twitter users profile by showing step by step the overall process and related results.
{"title":"A multi-language approach towards the identification of suspicious users on social networks","authors":"A. Tundis, M. Mühlhäuser","doi":"10.1109/CCST.2017.8167794","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167794","url":null,"abstract":"The use of IT technology for the planning and implementation of illegal activities has been gaining ground in recent years. Nowadays, through the web and the social media, it is possible not only to divulge advertising for the disclosure of illicit activities, but also to take action that in the past needed to have people in place and at the moment the activity took place. In fact, this phenomenon allows criminals to be less exposed to the risk of being discovered. Furthermore, the technology tends to encourage international collaborations, which makes the process of identifying illegal activities even more complex because of the lack of adequate tools that can operate effectively by considering multi-cultural aspects. Consequently, this evolving phenomenon towards cyber-crime requires new models and analysis techniques to address these challenges. In this context, the paper proposes an approach based on a multi-language model that aims to support the identification of suspicious users on social networks. It exploits the effectiveness of web translation services along with specific stand-alone libraries for normalizing user profiles in a common language. In addition, different text analysis techniques are combined for supporting the user profiles evaluation. The proposed approach is exemplified through a case study by analyzing Twitter users profile by showing step by step the overall process and related results.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134080607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/CCST.2017.8167855
G. Baldini, G. Steri, Irene Amerini, R. Caldelli
The identification of mobile phones through their built-in electronic sensors has been proven in literature for cameras, microphones and accelerometers demonstrating to have various applications in security, forensics or in the fight against the counterfeiting of electronic products. The identification of a sensor (and consequently of the mobile phone) is possible through the exploitation of small but significant differences in the physical components of the sensor itself. These physical differences are mainly generated during the production process of the sensor in the manufacturing plant producing small but reproducible variations in the digital output generated by the built-in sensor. In particular, in this paper, we investigate the identification of mobile phones through the built-in magnetometer sensor, which has received very limited attention by the research community so far. In particular, the specific aspects of robustness and portability of such a fingerprint have been analyzed. Different stimulation conditions, diverse kinds of features and classification procedures have been considered achieving very promising results.
{"title":"The identification of mobile phones through the fingerprints of their built-in magnetometer: An analysis of the portability of the fingerprints","authors":"G. Baldini, G. Steri, Irene Amerini, R. Caldelli","doi":"10.1109/CCST.2017.8167855","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167855","url":null,"abstract":"The identification of mobile phones through their built-in electronic sensors has been proven in literature for cameras, microphones and accelerometers demonstrating to have various applications in security, forensics or in the fight against the counterfeiting of electronic products. The identification of a sensor (and consequently of the mobile phone) is possible through the exploitation of small but significant differences in the physical components of the sensor itself. These physical differences are mainly generated during the production process of the sensor in the manufacturing plant producing small but reproducible variations in the digital output generated by the built-in sensor. In particular, in this paper, we investigate the identification of mobile phones through the built-in magnetometer sensor, which has received very limited attention by the research community so far. In particular, the specific aspects of robustness and portability of such a fingerprint have been analyzed. Different stimulation conditions, diverse kinds of features and classification procedures have been considered achieving very promising results.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"2 Suppl 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133819181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/CCST.2017.8167808
Alicia Aglio-Caballero, Belén Ríos-Sánchez, C. S. Ávila, Maria Jose Melcon De Giles
Palm vein recognition has emerged as a novelty highly invariant biometric technique that is difficult to forge due to their internal nature. In this work the texture descriptors Local Binary Patterns (LBP) and Uniform Local Binary Patterns (LBPU) are analyzed as feature extraction methods for biometric verification based on palm veins. Their performance and efficiency has been studied through a multivariate analysis including the impact of different wavelengths and the parameters of the texture descriptor number of neighboors and radio. CASIA Multi-Spectral Palmprint Image Database V1.0 has been used for the evaluation of the system.
{"title":"Analysis of local binary patterns and uniform local binary patterns for palm vein biometric recognition","authors":"Alicia Aglio-Caballero, Belén Ríos-Sánchez, C. S. Ávila, Maria Jose Melcon De Giles","doi":"10.1109/CCST.2017.8167808","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167808","url":null,"abstract":"Palm vein recognition has emerged as a novelty highly invariant biometric technique that is difficult to forge due to their internal nature. In this work the texture descriptors Local Binary Patterns (LBP) and Uniform Local Binary Patterns (LBPU) are analyzed as feature extraction methods for biometric verification based on palm veins. Their performance and efficiency has been studied through a multivariate analysis including the impact of different wavelengths and the parameters of the texture descriptor number of neighboors and radio. CASIA Multi-Spectral Palmprint Image Database V1.0 has been used for the evaluation of the system.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116774002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/CCST.2017.8167837
M. F. F. Khan, K. Sakamura
Use of digital token — which certifies the bearer's rights to some kind of products or services — is quite common nowadays for its convenience, ease of use and cost-effectiveness. Many of such digital tokens, however, are produced with software alone, making them vulnerable to forgery, including alteration and duplication. For a more secure safeguard for both token owner's right and service provider's accountability, digital tokens should be tamper-resistant as much as possible in order for them to withstand physical attacks as well. In this paper, we present a rights management system that leverages tamper-resistant digital tokens created by hardware-software collaboration in our eTRON architecture. The system features the complete life cycle of a digital token from generation to storage and redemption. Additionally, it provides a secure mechanism for transfer of rights in a peer-to-peer manner over the Internet. The proposed system specifies protocols for permissible manipulation on digital tokens, and subsequently provides a set of APIs for seamless application development. Access privileges to the tokens are strictly defined and state-of-the-art asymmetric cryptography is used for ensuring their confidentiality. Apart from the digital tokens being physically tamper-resistant, the protocols involved in the system are proven to be secure against attacks. Furthermore, an authentication mechanism is implemented that invariably precedes any operation involving the digital token in question. The proposed system presents clear security gains compared to existing systems that do not take tamper-resistance into account, and schemes that use symmetric key cryptography.
{"title":"A tamper-resistant digital token-based rights management system","authors":"M. F. F. Khan, K. Sakamura","doi":"10.1109/CCST.2017.8167837","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167837","url":null,"abstract":"Use of digital token — which certifies the bearer's rights to some kind of products or services — is quite common nowadays for its convenience, ease of use and cost-effectiveness. Many of such digital tokens, however, are produced with software alone, making them vulnerable to forgery, including alteration and duplication. For a more secure safeguard for both token owner's right and service provider's accountability, digital tokens should be tamper-resistant as much as possible in order for them to withstand physical attacks as well. In this paper, we present a rights management system that leverages tamper-resistant digital tokens created by hardware-software collaboration in our eTRON architecture. The system features the complete life cycle of a digital token from generation to storage and redemption. Additionally, it provides a secure mechanism for transfer of rights in a peer-to-peer manner over the Internet. The proposed system specifies protocols for permissible manipulation on digital tokens, and subsequently provides a set of APIs for seamless application development. Access privileges to the tokens are strictly defined and state-of-the-art asymmetric cryptography is used for ensuring their confidentiality. Apart from the digital tokens being physically tamper-resistant, the protocols involved in the system are proven to be secure against attacks. Furthermore, an authentication mechanism is implemented that invariably precedes any operation involving the digital token in question. The proposed system presents clear security gains compared to existing systems that do not take tamper-resistance into account, and schemes that use symmetric key cryptography.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121793635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/CCST.2017.8167862
Hakar Mohsin Saber, Nawzad K. Al-Salihi
In recent years, dramatic evolution of network has been introduced in the home environment that enables digital technologies to be used as the appliances in the home. These devices can be remotely accessed and controlled using existing network infrastructure, thus allowing a direct integration of computing systems with the physical world. A part of this network evolution is Internet-of-Things (IoT), which is the expansion of the services provided by internet. The IoT can be used for various fields and home automation is one of the applications of IoT. This method allows more opportunities to increase the connectivity between devices within the home and outside the home through internet for automating the home appliances. This paper includes the design and implementation of a secured and automated house using a hybrid communication system such as IoT and mobile communication methods for the communication part with using Arduino Microcontroller, GSM Shield, Ethernet Shield, and varieties of sensors. With the advancement in the field of IoT, there is an increasing demand of real time security for ones need. Secured and automated house is a house which is secured via electronic devices and sensors to protect the house from different kinds of intrusions such as motion in the house and disasters for example fire and gas leakage in the house. This paper focuses on designing a robust and reliable system using the home automation system to overcome these problems and to alert the owner of the house with a message once suspicious act are occurred. The results are very helpful in the desire to achieve an efficient and reliable solution contributing in the field of IoT, considering various aspects which include fast processing, system cost, robustness and precision for the modern, technological and needs.
{"title":"IoT: Secured and automated house","authors":"Hakar Mohsin Saber, Nawzad K. Al-Salihi","doi":"10.1109/CCST.2017.8167862","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167862","url":null,"abstract":"In recent years, dramatic evolution of network has been introduced in the home environment that enables digital technologies to be used as the appliances in the home. These devices can be remotely accessed and controlled using existing network infrastructure, thus allowing a direct integration of computing systems with the physical world. A part of this network evolution is Internet-of-Things (IoT), which is the expansion of the services provided by internet. The IoT can be used for various fields and home automation is one of the applications of IoT. This method allows more opportunities to increase the connectivity between devices within the home and outside the home through internet for automating the home appliances. This paper includes the design and implementation of a secured and automated house using a hybrid communication system such as IoT and mobile communication methods for the communication part with using Arduino Microcontroller, GSM Shield, Ethernet Shield, and varieties of sensors. With the advancement in the field of IoT, there is an increasing demand of real time security for ones need. Secured and automated house is a house which is secured via electronic devices and sensors to protect the house from different kinds of intrusions such as motion in the house and disasters for example fire and gas leakage in the house. This paper focuses on designing a robust and reliable system using the home automation system to overcome these problems and to alert the owner of the house with a message once suspicious act are occurred. The results are very helpful in the desire to achieve an efficient and reliable solution contributing in the field of IoT, considering various aspects which include fast processing, system cost, robustness and precision for the modern, technological and needs.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130001628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/CCST.2017.8167828
G. Birch, Bryana L. Woo, C. LaCasse, Jaclynn J. Stubbs, Amber L. Dagel
Physical unclonable functions (PUFs) are devices which are easily probed but difficult to predict. Optical PUFs have been discussed within the literature, with traditional optical PUFs typically using spatial light modulators, coherent illumination, and scattering volumes; however, these systems can be large, expensive, and difficult to maintain alignment in practical conditions. We propose and demonstrate a new kind of optical PUF based on computational imaging and compressive sensing to address these challenges with traditional optical PUFs. This work describes the design, simulation, and prototyping of this computational optical PUF (COPUF) that utilizes incoherent polychromatic illumination passing through an additively manufactured refracting optical polymer element. We demonstrate the ability to pass information through a COPUF using a variety of sampling methods, including the use of compressive sensing. The sensitivity of the COPUF system is also explored. We explore non-traditional PUF configurations enabled by the COPUF architecture. The double COPUF system, which employees two serially connected COPUFs, is proposed and analyzed as a means to authenticate and communicate between two entities that have previously agreed to communicate. This configuration enables estimation of a message inversion key without the calculation of individual COPUF inversion keys at any point in the PUF life cycle. Our results show that it is possible to construct inexpensive optical PUFs using computational imaging. This could lead to new uses of PUFs in places where electrical PUFs cannot be utilized effectively, as low cost tags and seals, and potentially as authenticating and communicating devices.
{"title":"Computational optical physical unclonable functions","authors":"G. Birch, Bryana L. Woo, C. LaCasse, Jaclynn J. Stubbs, Amber L. Dagel","doi":"10.1109/CCST.2017.8167828","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167828","url":null,"abstract":"Physical unclonable functions (PUFs) are devices which are easily probed but difficult to predict. Optical PUFs have been discussed within the literature, with traditional optical PUFs typically using spatial light modulators, coherent illumination, and scattering volumes; however, these systems can be large, expensive, and difficult to maintain alignment in practical conditions. We propose and demonstrate a new kind of optical PUF based on computational imaging and compressive sensing to address these challenges with traditional optical PUFs. This work describes the design, simulation, and prototyping of this computational optical PUF (COPUF) that utilizes incoherent polychromatic illumination passing through an additively manufactured refracting optical polymer element. We demonstrate the ability to pass information through a COPUF using a variety of sampling methods, including the use of compressive sensing. The sensitivity of the COPUF system is also explored. We explore non-traditional PUF configurations enabled by the COPUF architecture. The double COPUF system, which employees two serially connected COPUFs, is proposed and analyzed as a means to authenticate and communicate between two entities that have previously agreed to communicate. This configuration enables estimation of a message inversion key without the calculation of individual COPUF inversion keys at any point in the PUF life cycle. Our results show that it is possible to construct inexpensive optical PUFs using computational imaging. This could lead to new uses of PUFs in places where electrical PUFs cannot be utilized effectively, as low cost tags and seals, and potentially as authenticating and communicating devices.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121379670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}