Autonomous and semi-autonomous smoothly interruptible trajectories are developed which are highly suitable for application in tele-operated mobile robots, operator on-board military mobile ground platforms, and other mobility assistance platforms. These trajectories will allow a navigational system to provide assistance to the operator in the loop, for purpose built robots or remotely operated platforms. This will allow the platform to function well beyond the line-of-sight of the operator, enabling remote operation inside a building, surveillance, or advanced observations whilst keeping the operator in a safe location. In addition, on-board operators can be assisted to navigate without collision when distracted, or under-fire, or when physically disabled by injury.
{"title":"Assistive Trajectories for Human-in-the-Loop Mobile Robotic Platforms","authors":"M. Gillham, G. Howells, Stephen Kelly","doi":"10.1109/EST.2015.19","DOIUrl":"https://doi.org/10.1109/EST.2015.19","url":null,"abstract":"Autonomous and semi-autonomous smoothly interruptible trajectories are developed which are highly suitable for application in tele-operated mobile robots, operator on-board military mobile ground platforms, and other mobility assistance platforms. These trajectories will allow a navigational system to provide assistance to the operator in the loop, for purpose built robots or remotely operated platforms. This will allow the platform to function well beyond the line-of-sight of the operator, enabling remote operation inside a building, surveillance, or advanced observations whilst keeping the operator in a safe location. In addition, on-board operators can be assisted to navigate without collision when distracted, or under-fire, or when physically disabled by injury.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131363203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marwa Saidi, Oussama Benrhouma, W. Adi, S. Belghith
In this paper, a combined algorithm of a chaotic data hiding scheme based on DCT transform and a watermarking technique based on Singular Value Decomposition(SVD) transform is proposed. Our scheme offers the feature to check the integrity of the extracted secret image. Basically, we will embed the watermarked secret bits in the least significant coefficients of the DCT transform and check the integrity of the embedded message by comparing the extracted version with the calculated one using a tamper detection key introduced in the watermarking technique. A possible future scenario application of embedding and extracting the watermark in SoC environment is proposed.
{"title":"Combined Image Data Hiding Techniques in a Clone-Resistant SoC Environment","authors":"Marwa Saidi, Oussama Benrhouma, W. Adi, S. Belghith","doi":"10.1109/EST.2015.20","DOIUrl":"https://doi.org/10.1109/EST.2015.20","url":null,"abstract":"In this paper, a combined algorithm of a chaotic data hiding scheme based on DCT transform and a watermarking technique based on Singular Value Decomposition(SVD) transform is proposed. Our scheme offers the feature to check the integrity of the extracted secret image. Basically, we will embed the watermarked secret bits in the least significant coefficients of the DCT transform and check the integrity of the embedded message by comparing the extracted version with the calculated one using a tamper detection key introduced in the watermarking technique. A possible future scenario application of embedding and extracting the watermark in SoC environment is proposed.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131375296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hash functions are widely deployed in many cryptographic applications, such as message integrity checks, digital signatures, message authentication codes (MACs), and many other applications. In fact, hash functions are mainly dedicated to detect tampering and prove of message authenticity. Thus, if the hash digest does not match the sent digest, this indicates modification in the data or in the hash digest itself. This may be a result of transmission error or a possible abusing attack on the system. It is observed that most practical systems deploy a bit-size for the hash mappings which ranges from 160 bits to 512 bits or more. This is often over dimensioned to comply with standardized hash functions. Therefore, the hash function bits as output of pseudorandom mapping can be replaced partially and temporarily by some forward error correcting code ECC leaving the remaining bits for authentication without significant loss of authentication security. This work evaluates a practical example combining a simple interleaved Reed-Solomon single-byte error correcting code to replace a small part of the hash bits in the sent message. On the receiving side, the ECC bytes are used to correct errors and then removed and replaced by the remainder of the original hash value. The non-replaced large hash bits would contribute to let the miss-correction performance of the code approaches zero. This technique would reduce non-significantly or even negligibly the authentication level of the system, however would improve the overall system reliability in a great deal. No changes in the size and format of the existing authenticated message are necessary. The reliability improvement and security degradation in our proposed technique are evaluated and compared with the original designed values. Experimental simulations are also compared with those statistically computed under idealized randomizing assumptions for the hash function.
{"title":"Improving System Reliability by Joint Usage of Hash Function Bits and Error Correction Coding","authors":"M. Basil, W. Adi","doi":"10.1109/EST.2015.15","DOIUrl":"https://doi.org/10.1109/EST.2015.15","url":null,"abstract":"Hash functions are widely deployed in many cryptographic applications, such as message integrity checks, digital signatures, message authentication codes (MACs), and many other applications. In fact, hash functions are mainly dedicated to detect tampering and prove of message authenticity. Thus, if the hash digest does not match the sent digest, this indicates modification in the data or in the hash digest itself. This may be a result of transmission error or a possible abusing attack on the system. It is observed that most practical systems deploy a bit-size for the hash mappings which ranges from 160 bits to 512 bits or more. This is often over dimensioned to comply with standardized hash functions. Therefore, the hash function bits as output of pseudorandom mapping can be replaced partially and temporarily by some forward error correcting code ECC leaving the remaining bits for authentication without significant loss of authentication security. This work evaluates a practical example combining a simple interleaved Reed-Solomon single-byte error correcting code to replace a small part of the hash bits in the sent message. On the receiving side, the ECC bytes are used to correct errors and then removed and replaced by the remainder of the original hash value. The non-replaced large hash bits would contribute to let the miss-correction performance of the code approaches zero. This technique would reduce non-significantly or even negligibly the authentication level of the system, however would improve the overall system reliability in a great deal. No changes in the size and format of the existing authenticated message are necessary. The reliability improvement and security degradation in our proposed technique are evaluated and compared with the original designed values. Experimental simulations are also compared with those statistically computed under idealized randomizing assumptions for the hash function.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123572098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents research work related to the development of Wireless Sensor Networks (WSN) gathering environmental data from the surface of the Moon. Data aggregation algorithms are applied to reduce the amount of the multi-sensor data collected by the WSN, which are to be sent to a Moon orbiter and later to Earth. A particular issue that is of utmost importance to space applications is energy efficiency and a main goal of the research is to optimise the algorithm design so that the WSN energy consumption is reduced. An extensive simulation experiment is carried out, which confirms that the use of the proposed algorithms enhances significantly the network performance in terms of energy consumption compared to routing the raw data. In addition, the proposed data aggregation algorithms are implemented successfully on a System-on-a-chip (SoC) embedded platform using a Xilinx Zynq FPGA device. The data aggregation has two important effects: the WSN life time is extended due to the saved energy and the original data accuracy is preserved. This research could be beneficial for a number of future security related applications, such as monitoring of phenomena that may affect Earth's planetary security/safety as well as monitoring the implementation of Moon treaties preventing establishment of military bases on the lunar surface.
{"title":"Data Aggregation in Wireless Sensor Networks for Lunar Exploration","authors":"X. Zhai, T. Vladimirova","doi":"10.1109/EST.2015.9","DOIUrl":"https://doi.org/10.1109/EST.2015.9","url":null,"abstract":"This paper presents research work related to the development of Wireless Sensor Networks (WSN) gathering environmental data from the surface of the Moon. Data aggregation algorithms are applied to reduce the amount of the multi-sensor data collected by the WSN, which are to be sent to a Moon orbiter and later to Earth. A particular issue that is of utmost importance to space applications is energy efficiency and a main goal of the research is to optimise the algorithm design so that the WSN energy consumption is reduced. An extensive simulation experiment is carried out, which confirms that the use of the proposed algorithms enhances significantly the network performance in terms of energy consumption compared to routing the raw data. In addition, the proposed data aggregation algorithms are implemented successfully on a System-on-a-chip (SoC) embedded platform using a Xilinx Zynq FPGA device. The data aggregation has two important effects: the WSN life time is extended due to the saved energy and the original data accuracy is preserved. This research could be beneficial for a number of future security related applications, such as monitoring of phenomena that may affect Earth's planetary security/safety as well as monitoring the implementation of Moon treaties preventing establishment of military bases on the lunar surface.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125381492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The emergence of self-driving and semi self-driving vehicles which form vehicular ad hoc networks (VANETs) has attracted much interest in recent years. However, VANETs have some characteristics that make them more vulnerable to potential attacks when compared to other networks such as wired networks. The characteristics of VANETs are: an open medium, no traditional security infrastructure, high mobility and dynamic topology. In this paper, we build an intelligent intrusion detection system (IDS) for VANETs that uses a Proportional Overlapping Scores (POS) method to reduce the number of features that are extracted from the trace file of VANET behavior and used for classification. These are relevant features that describe the normal or abnormal behavior of vehicles. The IDS uses Artificial Neural Networks (ANNs) and fuzzified data to detect black hole attacks. The IDSs use the features extracted from the trace file as auditable data to detect the attack. In this paper, we propose hybrid detection (misuse and anomaly) to detect black holes.
{"title":"An Intrusion Detection System against Black Hole Attacks on the Communication Network of Self-Driving Cars","authors":"K. Alheeti, A. Gruebler, K. Mcdonald-Maier","doi":"10.1109/EST.2015.10","DOIUrl":"https://doi.org/10.1109/EST.2015.10","url":null,"abstract":"The emergence of self-driving and semi self-driving vehicles which form vehicular ad hoc networks (VANETs) has attracted much interest in recent years. However, VANETs have some characteristics that make them more vulnerable to potential attacks when compared to other networks such as wired networks. The characteristics of VANETs are: an open medium, no traditional security infrastructure, high mobility and dynamic topology. In this paper, we build an intelligent intrusion detection system (IDS) for VANETs that uses a Proportional Overlapping Scores (POS) method to reduce the number of features that are extracted from the trace file of VANET behavior and used for classification. These are relevant features that describe the normal or abnormal behavior of vehicles. The IDS uses Artificial Neural Networks (ANNs) and fuzzified data to detect black hole attacks. The IDSs use the features extracted from the trace file as auditable data to detect the attack. In this paper, we propose hybrid detection (misuse and anomaly) to detect black holes.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128137203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}