首页 > 最新文献

2015 Sixth International Conference on Emerging Security Technologies (EST)最新文献

英文 中文
Assistive Trajectories for Human-in-the-Loop Mobile Robotic Platforms 人在环移动机器人平台的辅助轨迹
M. Gillham, G. Howells, Stephen Kelly
Autonomous and semi-autonomous smoothly interruptible trajectories are developed which are highly suitable for application in tele-operated mobile robots, operator on-board military mobile ground platforms, and other mobility assistance platforms. These trajectories will allow a navigational system to provide assistance to the operator in the loop, for purpose built robots or remotely operated platforms. This will allow the platform to function well beyond the line-of-sight of the operator, enabling remote operation inside a building, surveillance, or advanced observations whilst keeping the operator in a safe location. In addition, on-board operators can be assisted to navigate without collision when distracted, or under-fire, or when physically disabled by injury.
开发了自主和半自主的平滑可中断轨迹,非常适合应用于遥控移动机器人、操作员机载军用移动地面平台和其他移动辅助平台。这些轨迹将允许导航系统在回路中为操作员提供辅助,用于专用机器人或远程操作平台。这将使平台能够在操作员的视线之外发挥作用,实现建筑物内的远程操作、监视或高级观察,同时使操作员处于安全位置。此外,在分心、受到火力攻击或因伤致残的情况下,机上操作人员可以在不发生碰撞的情况下进行导航。
{"title":"Assistive Trajectories for Human-in-the-Loop Mobile Robotic Platforms","authors":"M. Gillham, G. Howells, Stephen Kelly","doi":"10.1109/EST.2015.19","DOIUrl":"https://doi.org/10.1109/EST.2015.19","url":null,"abstract":"Autonomous and semi-autonomous smoothly interruptible trajectories are developed which are highly suitable for application in tele-operated mobile robots, operator on-board military mobile ground platforms, and other mobility assistance platforms. These trajectories will allow a navigational system to provide assistance to the operator in the loop, for purpose built robots or remotely operated platforms. This will allow the platform to function well beyond the line-of-sight of the operator, enabling remote operation inside a building, surveillance, or advanced observations whilst keeping the operator in a safe location. In addition, on-board operators can be assisted to navigate without collision when distracted, or under-fire, or when physically disabled by injury.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131363203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Combined Image Data Hiding Techniques in a Clone-Resistant SoC Environment 抗克隆SoC环境下的综合图像数据隐藏技术
Marwa Saidi, Oussama Benrhouma, W. Adi, S. Belghith
In this paper, a combined algorithm of a chaotic data hiding scheme based on DCT transform and a watermarking technique based on Singular Value Decomposition(SVD) transform is proposed. Our scheme offers the feature to check the integrity of the extracted secret image. Basically, we will embed the watermarked secret bits in the least significant coefficients of the DCT transform and check the integrity of the embedded message by comparing the extracted version with the calculated one using a tamper detection key introduced in the watermarking technique. A possible future scenario application of embedding and extracting the watermark in SoC environment is proposed.
本文提出了一种基于DCT变换的混沌数据隐藏方案与基于奇异值分解(SVD)变换的水印技术相结合的算法。我们的方案提供了检测提取的秘密图像完整性的特征。基本上,我们将水印的秘密位嵌入到DCT变换的最低有效系数中,并使用水印技术中引入的篡改检测密钥通过比较提取的版本和计算的版本来检查嵌入消息的完整性。提出了在SoC环境下水印嵌入与提取的一种可能的应用场景。
{"title":"Combined Image Data Hiding Techniques in a Clone-Resistant SoC Environment","authors":"Marwa Saidi, Oussama Benrhouma, W. Adi, S. Belghith","doi":"10.1109/EST.2015.20","DOIUrl":"https://doi.org/10.1109/EST.2015.20","url":null,"abstract":"In this paper, a combined algorithm of a chaotic data hiding scheme based on DCT transform and a watermarking technique based on Singular Value Decomposition(SVD) transform is proposed. Our scheme offers the feature to check the integrity of the extracted secret image. Basically, we will embed the watermarked secret bits in the least significant coefficients of the DCT transform and check the integrity of the embedded message by comparing the extracted version with the calculated one using a tamper detection key introduced in the watermarking technique. A possible future scenario application of embedding and extracting the watermark in SoC environment is proposed.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131375296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving System Reliability by Joint Usage of Hash Function Bits and Error Correction Coding 联合使用哈希函数位和纠错编码提高系统可靠性
M. Basil, W. Adi
Hash functions are widely deployed in many cryptographic applications, such as message integrity checks, digital signatures, message authentication codes (MACs), and many other applications. In fact, hash functions are mainly dedicated to detect tampering and prove of message authenticity. Thus, if the hash digest does not match the sent digest, this indicates modification in the data or in the hash digest itself. This may be a result of transmission error or a possible abusing attack on the system. It is observed that most practical systems deploy a bit-size for the hash mappings which ranges from 160 bits to 512 bits or more. This is often over dimensioned to comply with standardized hash functions. Therefore, the hash function bits as output of pseudorandom mapping can be replaced partially and temporarily by some forward error correcting code ECC leaving the remaining bits for authentication without significant loss of authentication security. This work evaluates a practical example combining a simple interleaved Reed-Solomon single-byte error correcting code to replace a small part of the hash bits in the sent message. On the receiving side, the ECC bytes are used to correct errors and then removed and replaced by the remainder of the original hash value. The non-replaced large hash bits would contribute to let the miss-correction performance of the code approaches zero. This technique would reduce non-significantly or even negligibly the authentication level of the system, however would improve the overall system reliability in a great deal. No changes in the size and format of the existing authenticated message are necessary. The reliability improvement and security degradation in our proposed technique are evaluated and compared with the original designed values. Experimental simulations are also compared with those statistically computed under idealized randomizing assumptions for the hash function.
散列函数广泛部署在许多加密应用程序中,例如消息完整性检查、数字签名、消息认证码(mac)和许多其他应用程序。实际上,哈希函数主要用于检测篡改和证明消息的真实性。因此,如果哈希摘要与发送的摘要不匹配,这表明数据或哈希摘要本身被修改了。这可能是传输错误的结果,也可能是对系统的滥用攻击。据观察,大多数实际系统为哈希映射部署一个位大小,范围从160位到512位或更多。这通常是过维的,以符合标准化的散列函数。因此,作为伪随机映射输出的哈希函数比特可以被一些前向纠错码ECC部分地和暂时地替换,留下剩余的比特用于身份验证,而不会严重损失身份验证安全性。这项工作评估了一个实际的例子,结合一个简单的交错Reed-Solomon单字节纠错码来替换发送消息中的一小部分哈希位。在接收端,ECC字节用于纠正错误,然后删除并替换为原始哈希值的剩余部分。未替换的大哈希位将有助于使代码的纠错性能接近零。这种技术将不显著地或甚至可以忽略系统的身份验证级别,但是将大大提高整个系统的可靠性。不需要更改现有经过身份验证的消息的大小和格式。并与原设计值进行了可靠性改进和安全性降低的比较。实验模拟也与哈希函数在理想随机化假设下的统计计算结果进行了比较。
{"title":"Improving System Reliability by Joint Usage of Hash Function Bits and Error Correction Coding","authors":"M. Basil, W. Adi","doi":"10.1109/EST.2015.15","DOIUrl":"https://doi.org/10.1109/EST.2015.15","url":null,"abstract":"Hash functions are widely deployed in many cryptographic applications, such as message integrity checks, digital signatures, message authentication codes (MACs), and many other applications. In fact, hash functions are mainly dedicated to detect tampering and prove of message authenticity. Thus, if the hash digest does not match the sent digest, this indicates modification in the data or in the hash digest itself. This may be a result of transmission error or a possible abusing attack on the system. It is observed that most practical systems deploy a bit-size for the hash mappings which ranges from 160 bits to 512 bits or more. This is often over dimensioned to comply with standardized hash functions. Therefore, the hash function bits as output of pseudorandom mapping can be replaced partially and temporarily by some forward error correcting code ECC leaving the remaining bits for authentication without significant loss of authentication security. This work evaluates a practical example combining a simple interleaved Reed-Solomon single-byte error correcting code to replace a small part of the hash bits in the sent message. On the receiving side, the ECC bytes are used to correct errors and then removed and replaced by the remainder of the original hash value. The non-replaced large hash bits would contribute to let the miss-correction performance of the code approaches zero. This technique would reduce non-significantly or even negligibly the authentication level of the system, however would improve the overall system reliability in a great deal. No changes in the size and format of the existing authenticated message are necessary. The reliability improvement and security degradation in our proposed technique are evaluated and compared with the original designed values. Experimental simulations are also compared with those statistically computed under idealized randomizing assumptions for the hash function.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123572098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data Aggregation in Wireless Sensor Networks for Lunar Exploration 月球探测无线传感器网络中的数据聚合
X. Zhai, T. Vladimirova
This paper presents research work related to the development of Wireless Sensor Networks (WSN) gathering environmental data from the surface of the Moon. Data aggregation algorithms are applied to reduce the amount of the multi-sensor data collected by the WSN, which are to be sent to a Moon orbiter and later to Earth. A particular issue that is of utmost importance to space applications is energy efficiency and a main goal of the research is to optimise the algorithm design so that the WSN energy consumption is reduced. An extensive simulation experiment is carried out, which confirms that the use of the proposed algorithms enhances significantly the network performance in terms of energy consumption compared to routing the raw data. In addition, the proposed data aggregation algorithms are implemented successfully on a System-on-a-chip (SoC) embedded platform using a Xilinx Zynq FPGA device. The data aggregation has two important effects: the WSN life time is extended due to the saved energy and the original data accuracy is preserved. This research could be beneficial for a number of future security related applications, such as monitoring of phenomena that may affect Earth's planetary security/safety as well as monitoring the implementation of Moon treaties preventing establishment of military bases on the lunar surface.
本文介绍了从月球表面采集环境数据的无线传感器网络(WSN)的发展相关研究工作。数据聚合算法用于减少传感器网络收集的多传感器数据量,这些数据将被发送到月球轨道器,然后再发送到地球。能源效率是空间应用中最重要的一个特殊问题,研究的主要目标是优化算法设计,从而降低WSN的能耗。进行了广泛的仿真实验,证实了与路由原始数据相比,使用所提出的算法在能耗方面显着提高了网络性能。此外,所提出的数据聚合算法已使用Xilinx Zynq FPGA器件在片上系统(SoC)嵌入式平台上成功实现。数据聚合有两个重要的作用:一是节省了能量,延长了无线传感器网络的寿命;二是保持了原始数据的精度。这项研究可能有利于若干未来与安全有关的应用,例如监测可能影响地球行星安全/安全的现象,以及监测防止在月球表面建立军事基地的月球条约的执行情况。
{"title":"Data Aggregation in Wireless Sensor Networks for Lunar Exploration","authors":"X. Zhai, T. Vladimirova","doi":"10.1109/EST.2015.9","DOIUrl":"https://doi.org/10.1109/EST.2015.9","url":null,"abstract":"This paper presents research work related to the development of Wireless Sensor Networks (WSN) gathering environmental data from the surface of the Moon. Data aggregation algorithms are applied to reduce the amount of the multi-sensor data collected by the WSN, which are to be sent to a Moon orbiter and later to Earth. A particular issue that is of utmost importance to space applications is energy efficiency and a main goal of the research is to optimise the algorithm design so that the WSN energy consumption is reduced. An extensive simulation experiment is carried out, which confirms that the use of the proposed algorithms enhances significantly the network performance in terms of energy consumption compared to routing the raw data. In addition, the proposed data aggregation algorithms are implemented successfully on a System-on-a-chip (SoC) embedded platform using a Xilinx Zynq FPGA device. The data aggregation has two important effects: the WSN life time is extended due to the saved energy and the original data accuracy is preserved. This research could be beneficial for a number of future security related applications, such as monitoring of phenomena that may affect Earth's planetary security/safety as well as monitoring the implementation of Moon treaties preventing establishment of military bases on the lunar surface.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125381492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Intrusion Detection System against Black Hole Attacks on the Communication Network of Self-Driving Cars 针对自动驾驶汽车通信网络黑洞攻击的入侵检测系统
K. Alheeti, A. Gruebler, K. Mcdonald-Maier
The emergence of self-driving and semi self-driving vehicles which form vehicular ad hoc networks (VANETs) has attracted much interest in recent years. However, VANETs have some characteristics that make them more vulnerable to potential attacks when compared to other networks such as wired networks. The characteristics of VANETs are: an open medium, no traditional security infrastructure, high mobility and dynamic topology. In this paper, we build an intelligent intrusion detection system (IDS) for VANETs that uses a Proportional Overlapping Scores (POS) method to reduce the number of features that are extracted from the trace file of VANET behavior and used for classification. These are relevant features that describe the normal or abnormal behavior of vehicles. The IDS uses Artificial Neural Networks (ANNs) and fuzzified data to detect black hole attacks. The IDSs use the features extracted from the trace file as auditable data to detect the attack. In this paper, we propose hybrid detection (misuse and anomaly) to detect black holes.
近年来,自动驾驶和半自动驾驶汽车的出现引起了人们的极大兴趣,这些汽车构成了车辆自组织网络(vanet)。然而,与有线网络等其他网络相比,vanet有一些特点,使它们更容易受到潜在的攻击。VANETs的特点是:开放的媒介,没有传统的安全基础设施,高移动性和动态拓扑结构。在本文中,我们建立了一个VANET智能入侵检测系统(IDS),该系统使用比例重叠分数(POS)方法来减少从VANET行为跟踪文件中提取并用于分类的特征数量。这些是描述车辆正常或异常行为的相关特征。IDS利用人工神经网络(ann)和模糊数据来检测黑洞攻击。ids使用从跟踪文件中提取的特征作为可审计数据来检测攻击。在本文中,我们提出了混合检测(误用和异常)来检测黑洞。
{"title":"An Intrusion Detection System against Black Hole Attacks on the Communication Network of Self-Driving Cars","authors":"K. Alheeti, A. Gruebler, K. Mcdonald-Maier","doi":"10.1109/EST.2015.10","DOIUrl":"https://doi.org/10.1109/EST.2015.10","url":null,"abstract":"The emergence of self-driving and semi self-driving vehicles which form vehicular ad hoc networks (VANETs) has attracted much interest in recent years. However, VANETs have some characteristics that make them more vulnerable to potential attacks when compared to other networks such as wired networks. The characteristics of VANETs are: an open medium, no traditional security infrastructure, high mobility and dynamic topology. In this paper, we build an intelligent intrusion detection system (IDS) for VANETs that uses a Proportional Overlapping Scores (POS) method to reduce the number of features that are extracted from the trace file of VANET behavior and used for classification. These are relevant features that describe the normal or abnormal behavior of vehicles. The IDS uses Artificial Neural Networks (ANNs) and fuzzified data to detect black hole attacks. The IDSs use the features extracted from the trace file as auditable data to detect the attack. In this paper, we propose hybrid detection (misuse and anomaly) to detect black holes.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128137203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
期刊
2015 Sixth International Conference on Emerging Security Technologies (EST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1