Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066593
Y. Abbas, R. Jidin, N. Jamil, M. Z’aba, M. Rusli, Baraa Tariq
This paper presents a hardware implementation of the PRINCE block cipher in Field Programmable Gate Array (FPGA). In many security applications, the software implementations of cryptographic algorithms are slow and inefficient. In order to solve the problems, a new FPGA architecture was proposed to speed up the performance and flexibility of PRINCE algorithm. The concurrent computing design allows an encryption block data of 64 bits within one clock cycle, reducing the hardware area and producing a high throughput and low latency. It also showed high speed processing and consumed low power. To do this, firstly, the encryption, decryption and key schedule are all implemented with small hardware resources, Next, an efficient hardware architectural model for PRINCE algorithms was developed using very high speed integrated circuit hardware description language (VHDL). Finally, the VHDL design for PRINCE algorithm was synthesized in FPGA boards. Two FPGA boards were used in this study, which are Virtex-4 and Virtex-6. The results show a throughput of 2.03 Gbps and efficiency of 2.126 Mbps/slice for Virtex-4, whereas a throughput of 4.18 Gbps and efficiency of 8.681 Mbps/slice for Virtex-6.
{"title":"Implementation of PRINCE algorithm in FPGA","authors":"Y. Abbas, R. Jidin, N. Jamil, M. Z’aba, M. Rusli, Baraa Tariq","doi":"10.1109/ICIMU.2014.7066593","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066593","url":null,"abstract":"This paper presents a hardware implementation of the PRINCE block cipher in Field Programmable Gate Array (FPGA). In many security applications, the software implementations of cryptographic algorithms are slow and inefficient. In order to solve the problems, a new FPGA architecture was proposed to speed up the performance and flexibility of PRINCE algorithm. The concurrent computing design allows an encryption block data of 64 bits within one clock cycle, reducing the hardware area and producing a high throughput and low latency. It also showed high speed processing and consumed low power. To do this, firstly, the encryption, decryption and key schedule are all implemented with small hardware resources, Next, an efficient hardware architectural model for PRINCE algorithms was developed using very high speed integrated circuit hardware description language (VHDL). Finally, the VHDL design for PRINCE algorithm was synthesized in FPGA boards. Two FPGA boards were used in this study, which are Virtex-4 and Virtex-6. The results show a throughput of 2.03 Gbps and efficiency of 2.126 Mbps/slice for Virtex-4, whereas a throughput of 4.18 Gbps and efficiency of 8.681 Mbps/slice for Virtex-6.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133270701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066594
Muhammad Talha Abdul Rashid, S. Yussof, Yunus Yusoff, Roslan Ismail
Although IEC61850 substations can provide various advantages over traditional substations, the power supplier companies are being cautious about its implementation due to security concerns. Indeed, researchers have identified a number of security vulnerabilities and weaknesses in the IEC61850 standard such as the lack of encryption used in the GOOSE messages, lack of intrusion detection system implementation in IEC61850 network, and no firewall implementation inside IEC61850 substation network. By exploiting these vulnerabilities, researchers have also discovered a number of security attacks that can be launched on IEC61850 substation network. These attacks can be categorized into two, which are common network security attacks on IEC61850 network and security attacks that exploit the IEC61850 multicast messages. This paper provides a review of these security attacks in terms of how the attacks are conducted and the subsequent damages that they may cause.
{"title":"A review of security attacks on IEC61850 substation automation system network","authors":"Muhammad Talha Abdul Rashid, S. Yussof, Yunus Yusoff, Roslan Ismail","doi":"10.1109/ICIMU.2014.7066594","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066594","url":null,"abstract":"Although IEC61850 substations can provide various advantages over traditional substations, the power supplier companies are being cautious about its implementation due to security concerns. Indeed, researchers have identified a number of security vulnerabilities and weaknesses in the IEC61850 standard such as the lack of encryption used in the GOOSE messages, lack of intrusion detection system implementation in IEC61850 network, and no firewall implementation inside IEC61850 substation network. By exploiting these vulnerabilities, researchers have also discovered a number of security attacks that can be launched on IEC61850 substation network. These attacks can be categorized into two, which are common network security attacks on IEC61850 network and security attacks that exploit the IEC61850 multicast messages. This paper provides a review of these security attacks in terms of how the attacks are conducted and the subsequent damages that they may cause.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114335052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066651
Indriana Hidayah, Erna P. Adhistya, Monica Agustami Kristy
Disk hernia and spondylolisthesis are examples of pathologies on vertebral column. These traumas on vertebral column can affect spinal cord capability to send and receive messages from brain to the body systems that control sensor and motor. Therefore, accuracy and timeliness of diagnosis for these pathologies are critical. Hence, a classification system can assist radiologists to improve productivity and the quality of diagnosis. In general, Indonesia's public hospitals have many patients, thus, such classification system will be a great benefit. However, research about pathology of skeletal system classification in Indonesia is rare due to the unavailability of numerical database which quantitatively represents the disease. In this research, dataset of vertebral column from UCI Machine Learning was used to develop an optimum classification model. We ensemble decision tree (J48) and bagging as the classification model. Decision tree was chosen as the base learner due to its simplicity and interpretability. In addition, bagging was used to stable the prediction of new test instances. By applying 10-fold cross-validation we calculated true-positive rate (TP rate), false-positive (FP rate), accuracy parameters, and ROC AUC. The results showed that J48 and Bagging has better performance than J48 alone. The quantitative evaluation showed accuracy of J48 and Bagging is 85.1613%, whereas accuracy of J48 was 81.6129%.
{"title":"Application of J48 and bagging for classification of vertebral column pathologies","authors":"Indriana Hidayah, Erna P. Adhistya, Monica Agustami Kristy","doi":"10.1109/ICIMU.2014.7066651","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066651","url":null,"abstract":"Disk hernia and spondylolisthesis are examples of pathologies on vertebral column. These traumas on vertebral column can affect spinal cord capability to send and receive messages from brain to the body systems that control sensor and motor. Therefore, accuracy and timeliness of diagnosis for these pathologies are critical. Hence, a classification system can assist radiologists to improve productivity and the quality of diagnosis. In general, Indonesia's public hospitals have many patients, thus, such classification system will be a great benefit. However, research about pathology of skeletal system classification in Indonesia is rare due to the unavailability of numerical database which quantitatively represents the disease. In this research, dataset of vertebral column from UCI Machine Learning was used to develop an optimum classification model. We ensemble decision tree (J48) and bagging as the classification model. Decision tree was chosen as the base learner due to its simplicity and interpretability. In addition, bagging was used to stable the prediction of new test instances. By applying 10-fold cross-validation we calculated true-positive rate (TP rate), false-positive (FP rate), accuracy parameters, and ROC AUC. The results showed that J48 and Bagging has better performance than J48 alone. The quantitative evaluation showed accuracy of J48 and Bagging is 85.1613%, whereas accuracy of J48 was 81.6129%.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116429943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066615
A. Noor, R. Sulaiman, A. Abu Bakar
The recent advancements in social media and electronic commerce have produced a new business model called social commerce. This new business model has facilitated online business transactions via social media. Despite the advancement of technology, the issue of online trust has increased in social commerce. The purpose of this paper is to identify the factors that influence online trust in social commerce. Seven models related to online trust in electronic commerce, electronic business, and social commerce were reviewed and analyzed. This has resulted in identifying six factors, which are usefulness, ease of use, security, privacy, website design, and electronic word of mouth; as the most influential factors that influence online trust in social commerce. Discussion and direction of future work are pointed out in this paper.
{"title":"A review of factors that influenced online trust in social commerce","authors":"A. Noor, R. Sulaiman, A. Abu Bakar","doi":"10.1109/ICIMU.2014.7066615","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066615","url":null,"abstract":"The recent advancements in social media and electronic commerce have produced a new business model called social commerce. This new business model has facilitated online business transactions via social media. Despite the advancement of technology, the issue of online trust has increased in social commerce. The purpose of this paper is to identify the factors that influence online trust in social commerce. Seven models related to online trust in electronic commerce, electronic business, and social commerce were reviewed and analyzed. This has resulted in identifying six factors, which are usefulness, ease of use, security, privacy, website design, and electronic word of mouth; as the most influential factors that influence online trust in social commerce. Discussion and direction of future work are pointed out in this paper.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117078212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066659
O. K. Akputu, Yunli Lee, K. Seng
Local appearance descriptors are widely used on facial emotion recognition tasks. With these descriptors, image filters, such as Gabor wavelet or local binary patterns (LBP) are applied on the whole or specific regions of the face to extract facial appearance changes. But it is also clear that beside feature descriptor; choice of suitable learning method that integrates feature novelty is vital. The multiple kernels learning (MKL) framework reportedly shows promising performances on problems of this nature. However, most MKL studies in object recognition domain provide conflicting reports about recognition performances of MKL. We resolve such conflicts by motivating a comparative analysis of MKL using appearance descriptors for facial emotion recognition-in challenging learning setting. Moreover, we introduce a simulated learning emotion (SLE) dataset for the first time in model performance evaluation. We conclude that given sufficient training elements (examples) with efficient feature descriptor, the rapper methods of Semi-infinite programming MKL (SIP-MKL) and SimpleMKL frameworks are relatively efficient on facial emotion recognition task, compare to other kernel combination schemes. Nevertheless we opine that average MKL performance accuracy, especially on learning facial emotion dataset, remains unsatisfactory (around 56%).
{"title":"Comparative analysis of multiple kernel learning on learning emotion recognition","authors":"O. K. Akputu, Yunli Lee, K. Seng","doi":"10.1109/ICIMU.2014.7066659","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066659","url":null,"abstract":"Local appearance descriptors are widely used on facial emotion recognition tasks. With these descriptors, image filters, such as Gabor wavelet or local binary patterns (LBP) are applied on the whole or specific regions of the face to extract facial appearance changes. But it is also clear that beside feature descriptor; choice of suitable learning method that integrates feature novelty is vital. The multiple kernels learning (MKL) framework reportedly shows promising performances on problems of this nature. However, most MKL studies in object recognition domain provide conflicting reports about recognition performances of MKL. We resolve such conflicts by motivating a comparative analysis of MKL using appearance descriptors for facial emotion recognition-in challenging learning setting. Moreover, we introduce a simulated learning emotion (SLE) dataset for the first time in model performance evaluation. We conclude that given sufficient training elements (examples) with efficient feature descriptor, the rapper methods of Semi-infinite programming MKL (SIP-MKL) and SimpleMKL frameworks are relatively efficient on facial emotion recognition task, compare to other kernel combination schemes. Nevertheless we opine that average MKL performance accuracy, especially on learning facial emotion dataset, remains unsatisfactory (around 56%).","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127228840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066645
Nidaa Ghalib Ali, N. Omar
Keyphrases are single-word or multi-word lexemes that concisely and accurate describe the subject or side of the subject discuss in a document. Manually assigning keyphrases is tedious and time consuming, especially because of Web proliferation. Thus, automatic keyphrase generation systems are urgently needed. This study proposes a keyphrase extraction method that combines several keyphrase extraction methods with the use of machine learning approaches (linear logistic regression, linear discriminant analysis, and support vector machines). The proposed methods use the output of several keyphrase extraction methods as input features for a machine learning algorithm, which then determines whether each term is a keyphrase. Results show that the SVM algorithm achieves the best performance with F1-measures 88.31%. These values are relatively high and comparable with those of previous keyphrase extraction models for the Arabic language.
{"title":"Arabic keyphrases extraction using a hybrid of statistical and machine learning methods","authors":"Nidaa Ghalib Ali, N. Omar","doi":"10.1109/ICIMU.2014.7066645","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066645","url":null,"abstract":"Keyphrases are single-word or multi-word lexemes that concisely and accurate describe the subject or side of the subject discuss in a document. Manually assigning keyphrases is tedious and time consuming, especially because of Web proliferation. Thus, automatic keyphrase generation systems are urgently needed. This study proposes a keyphrase extraction method that combines several keyphrase extraction methods with the use of machine learning approaches (linear logistic regression, linear discriminant analysis, and support vector machines). The proposed methods use the output of several keyphrase extraction methods as input features for a machine learning algorithm, which then determines whether each term is a keyphrase. Results show that the SVM algorithm achieves the best performance with F1-measures 88.31%. These values are relatively high and comparable with those of previous keyphrase extraction models for the Arabic language.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127244279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066658
M. H. Rehman, C. Liew, T. Wah
The availability of computational power in mobile devices is key-enabler for Mobile Data Mining (MDM) at user-premises. Alternately, resource-constraints like limited energy, narrow bandwidth, and small screens challenge in adoption of MDM. Currently, MDM is based on light-weight algorithms that are adaptive in resource-constrained environments but a study to evaluate the performance of general algorithms still lacks in the literature. To this end, we have studied six Frequent Pattern Mining (FPM) algorithms and deployed them in mobile devices to evaluate the feasibility and highlighted the associated challenges. The experiments were performed on real and synthetic data sets strictly in android-based mobile device and compared with PC-based setup. The experimental results show that FPM algorithms can leverage MDM after tuning some basic parameters.
{"title":"Frequent pattern mining in mobile devices: A feasibility study","authors":"M. H. Rehman, C. Liew, T. Wah","doi":"10.1109/ICIMU.2014.7066658","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066658","url":null,"abstract":"The availability of computational power in mobile devices is key-enabler for Mobile Data Mining (MDM) at user-premises. Alternately, resource-constraints like limited energy, narrow bandwidth, and small screens challenge in adoption of MDM. Currently, MDM is based on light-weight algorithms that are adaptive in resource-constrained environments but a study to evaluate the performance of general algorithms still lacks in the literature. To this end, we have studied six Frequent Pattern Mining (FPM) algorithms and deployed them in mobile devices to evaluate the feasibility and highlighted the associated challenges. The experiments were performed on real and synthetic data sets strictly in android-based mobile device and compared with PC-based setup. The experimental results show that FPM algorithms can leverage MDM after tuning some basic parameters.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128405129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066608
Vala Saleh, M. Rusli, Syed Khaleel Ahmed, H. Mohamad
In this paper we formulate Network Coding (NC) and Analog Network Coding (ANC) using analytical models to quantify ANC performance parameters. For this reason, a chain topology in a non-mutual transmission was investigated. Our formulations demonstrate the benefit of NC and ANC over traditional approaches which depend on the number of transmission packets and the number of timeslots required for packets transmission in broadcasting scenarios. The advantage of this analytical approach is independence with respect to running a network simulation in order to evaluate the effect of the network coding schemes on the networks before proceeding to design or system simulation. The result shows ANC can improve capacity in the chain network as much as 50%.
{"title":"Analog Network Coding for chain topology in non-mutual transmission","authors":"Vala Saleh, M. Rusli, Syed Khaleel Ahmed, H. Mohamad","doi":"10.1109/ICIMU.2014.7066608","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066608","url":null,"abstract":"In this paper we formulate Network Coding (NC) and Analog Network Coding (ANC) using analytical models to quantify ANC performance parameters. For this reason, a chain topology in a non-mutual transmission was investigated. Our formulations demonstrate the benefit of NC and ANC over traditional approaches which depend on the number of transmission packets and the number of timeslots required for packets transmission in broadcasting scenarios. The advantage of this analytical approach is independence with respect to running a network simulation in order to evaluate the effect of the network coding schemes on the networks before proceeding to design or system simulation. The result shows ANC can improve capacity in the chain network as much as 50%.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125323656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066626
A. A. Latif, N. Arshad
Malaysia experienced flood on a regular basis due to the geographical location of the country and the improper development of its cities. Based on this situation, it is recognized that Malaysia have to establish an effective flood management (FM) practice in order to reduce the impact caused by flood. This article seeks to examine the proper governance framework needed in managing flood. The aim of this paper is to, namely: identify the current governance structure in several selected countries and identify the challenges associated with the structure. Results from this comparative study will be used in recommending the best form of a FM framework.
{"title":"A review of flood management governance framework in malaysia and selected countries","authors":"A. A. Latif, N. Arshad","doi":"10.1109/ICIMU.2014.7066626","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066626","url":null,"abstract":"Malaysia experienced flood on a regular basis due to the geographical location of the country and the improper development of its cities. Based on this situation, it is recognized that Malaysia have to establish an effective flood management (FM) practice in order to reduce the impact caused by flood. This article seeks to examine the proper governance framework needed in managing flood. The aim of this paper is to, namely: identify the current governance structure in several selected countries and identify the challenges associated with the structure. Results from this comparative study will be used in recommending the best form of a FM framework.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125897801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066611
Elmunzir Hassan El Talib, A. Abu Bakar, Roslan Ismail
With the huge advancements of mobile computing due to the enormous increase in portable wireless devices, Mobile Ad hoc Networks (MANETs) became an important aspect in the world of wireless network communications. With some unique features such as scalability, fault tolerant and autonomous systems enable a network to be setup with or without any trusted authority. This makes MANET suitable for the emergency and rescue operations. During an emergency situation, there is a need for the data to be shared with the rescuers. Prior accessing the information in emergency services, nodes in MANET need to be authenticated. However due to wireless nature that MANET inherit, nodes are susceptible to attacks hence a secure authentication mechanism is required as authentication is the first defend mechanism. This paper review the authentication models in MANET and proposed the suitable model to work under our proposed access control model called Heterogeneous Access Control Model (HACM). HACM is an expanded proposed model from our Group Based Access Control Model (GBAC) where access to information is classified into general and sensitive based on the Group Role (GR) and User Role (UR) of rescue members during emergency services. The HACM model introduces Heterogeneous Access Level (HLA) where access to information is based on level of information sensitivity, which is mapped with user-role in the group, created at the emergency area. The level of information sensitivity depends on how disastrous or the severity of the emergency situation.
{"title":"An authentication mechanism for heterogeneous access control model in MANET emergency rescue mission","authors":"Elmunzir Hassan El Talib, A. Abu Bakar, Roslan Ismail","doi":"10.1109/ICIMU.2014.7066611","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066611","url":null,"abstract":"With the huge advancements of mobile computing due to the enormous increase in portable wireless devices, Mobile Ad hoc Networks (MANETs) became an important aspect in the world of wireless network communications. With some unique features such as scalability, fault tolerant and autonomous systems enable a network to be setup with or without any trusted authority. This makes MANET suitable for the emergency and rescue operations. During an emergency situation, there is a need for the data to be shared with the rescuers. Prior accessing the information in emergency services, nodes in MANET need to be authenticated. However due to wireless nature that MANET inherit, nodes are susceptible to attacks hence a secure authentication mechanism is required as authentication is the first defend mechanism. This paper review the authentication models in MANET and proposed the suitable model to work under our proposed access control model called Heterogeneous Access Control Model (HACM). HACM is an expanded proposed model from our Group Based Access Control Model (GBAC) where access to information is classified into general and sensitive based on the Group Role (GR) and User Role (UR) of rescue members during emergency services. The HACM model introduces Heterogeneous Access Level (HLA) where access to information is based on level of information sensitivity, which is mapped with user-role in the group, created at the emergency area. The level of information sensitivity depends on how disastrous or the severity of the emergency situation.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129438756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}