首页 > 最新文献

2020 Conference on Information Communications Technology and Society (ICTAS)最新文献

英文 中文
The Adoption of Automation in Cyber Forensics 自动化在网络取证中的应用
Pub Date : 2020-03-01 DOI: 10.1109/ICTAS47918.2020.233977
D. Hayes, M. Kyobe
Cybercrime has increased considerably over the past years, emphasizing the need for efficient investigations. Currently, some tools and processes are manual and lead to long and inaccurate investigations. This report provides a descriptive review of the of published research in the field of cyber forensics, in order to identify current practices, challenges and the adoption of automation. A pragmatist approach was taken to accommodate the multitude of theories and views presented in the literature. The research illustrates how the use of technology could simplify an investigators task and solving difficulties that currently exist in cyber forensics. The paper concludes in motivating for the use of automated practices in the cyber forensic process.
网络犯罪在过去几年中大幅增加,强调了有效调查的必要性。目前,一些工具和流程是手动的,导致长时间和不准确的调查。本报告对网络取证领域已发表的研究进行了描述性回顾,以确定当前的实践、挑战和自动化的采用。采用实用主义的方法来适应文献中提出的众多理论和观点。这项研究说明了技术的使用如何简化调查人员的任务,并解决目前在网络取证中存在的困难。本文总结了在网络取证过程中使用自动化实践的动机。
{"title":"The Adoption of Automation in Cyber Forensics","authors":"D. Hayes, M. Kyobe","doi":"10.1109/ICTAS47918.2020.233977","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.233977","url":null,"abstract":"Cybercrime has increased considerably over the past years, emphasizing the need for efficient investigations. Currently, some tools and processes are manual and lead to long and inaccurate investigations. This report provides a descriptive review of the of published research in the field of cyber forensics, in order to identify current practices, challenges and the adoption of automation. A pragmatist approach was taken to accommodate the multitude of theories and views presented in the literature. The research illustrates how the use of technology could simplify an investigators task and solving difficulties that currently exist in cyber forensics. The paper concludes in motivating for the use of automated practices in the cyber forensic process.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117248090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ICTAS 2020 Breaker Page ICTAS 2020断路器页面
Pub Date : 2020-03-01 DOI: 10.1109/ictas47918.2020.9082443
{"title":"ICTAS 2020 Breaker Page","authors":"","doi":"10.1109/ictas47918.2020.9082443","DOIUrl":"https://doi.org/10.1109/ictas47918.2020.9082443","url":null,"abstract":"","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124650450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICTAS 2020 Preface
Pub Date : 2020-03-01 DOI: 10.1109/ictas47918.2020.9082471
{"title":"ICTAS 2020 Preface","authors":"","doi":"10.1109/ictas47918.2020.9082471","DOIUrl":"https://doi.org/10.1109/ictas47918.2020.9082471","url":null,"abstract":"","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130415058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of demographics on patients' acceptance of ICT for diabetes self-management: Applying the UTAUT model in low socio-economic areas 人口统计学对糖尿病患者接受ICT自我管理的影响:在低社会经济地区应用UTAUT模型
Pub Date : 2020-03-01 DOI: 10.1109/ICTAS47918.2020.233975
Fazlyn Petersen, Ziyaad Luckan, S. Pather
The exponential increases in the number of patients with diabetes warrants the use of innovative health solutions, especially in low socio-economic areas. Yet the acceptance of Information Communication and Technology (ICT) for diabetes self-management remains low, especially in developing countries. The study used key constructs from the Unified Theory of Acceptance and Use of Technology (UTAUT) model and introduced education as a moderator. It analysed the survey data from 430 respondent using purposive sampling. It found that all four variables (effort expectancy (EE), performance expectancy (PE), social influence (SI) and facilitating conditions (FC)) all influenced behavioural intention (BI). Gender did not provide any moderation effect, contrary to literature. Age and education proved to have a moderating effect on the relationship between PE and BI and SI and BI. Only age had a moderating effect on the relationship between EE and BI and FC and BI.
糖尿病患者人数呈指数级增长,需要采用创新的保健解决方案,特别是在社会经济水平较低的地区。然而,信息通信和技术(ICT)用于糖尿病自我管理的接受程度仍然很低,特别是在发展中国家。该研究使用了技术接受与使用统一理论(UTAUT)模型中的关键结构,并引入了教育作为调节因素。采用有目的抽样的方法对430名被调查者的调查数据进行了分析。它发现所有四个变量(努力期望(EE),表现期望(PE),社会影响(SI)和促进条件(FC))都影响行为意图(BI)。与文献相反,性别没有提供任何调节作用。年龄和受教育程度对体育运动与BI、SI与BI之间的关系有调节作用。只有年龄对EE和BI、FC和BI之间的关系有调节作用。
{"title":"Impact of demographics on patients' acceptance of ICT for diabetes self-management: Applying the UTAUT model in low socio-economic areas","authors":"Fazlyn Petersen, Ziyaad Luckan, S. Pather","doi":"10.1109/ICTAS47918.2020.233975","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.233975","url":null,"abstract":"The exponential increases in the number of patients with diabetes warrants the use of innovative health solutions, especially in low socio-economic areas. Yet the acceptance of Information Communication and Technology (ICT) for diabetes self-management remains low, especially in developing countries. The study used key constructs from the Unified Theory of Acceptance and Use of Technology (UTAUT) model and introduced education as a moderator. It analysed the survey data from 430 respondent using purposive sampling. It found that all four variables (effort expectancy (EE), performance expectancy (PE), social influence (SI) and facilitating conditions (FC)) all influenced behavioural intention (BI). Gender did not provide any moderation effect, contrary to literature. Age and education proved to have a moderating effect on the relationship between PE and BI and SI and BI. Only age had a moderating effect on the relationship between EE and BI and FC and BI.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126758462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Online Signature Verification using Deep Descriptors 使用深度描述符的在线签名验证
Pub Date : 2020-03-01 DOI: 10.1109/ICTAS47918.2020.233999
Abigail Singh, Serestina Viriri
Signature verification is a technique used to counter signature forgery. In the past, the process began with staff at a bank, who is an expert, would confirm if a signature is genuine or forged. With the development of technology, now people no longer sign on paper, rather on a digital pad which can take more data which is recorded on paper, for example, pressure, azimuth and altitude angles. Examples of details captured from a digital pen include pen pressure, azimuth and altitude angles. This data is now used in various dynamic signature verification systems that achieve high accuracy on evaluation tests using different forms of artificial intelligence. This paper investigates using artificial intelligence in the form of a Convolutional Neural Network (CNN) followed by a Recurrent Neural Network (RNN) to verify signatures using the SVC 2004 and SigComp2009 online datasets and it achieved a testing accuracy of 97.05%.
签名验证是一种防止签名伪造的技术。过去,这一过程首先由银行的专家工作人员确认签名是真的还是伪造的。随着科技的发展,现在人们不再在纸上签字,而是在一个数字垫子上签字,这样可以记录更多的数据,这些数据记录在纸上,例如压力,方位角和高度角。从数字笔捕获的细节示例包括笔压力,方位角和高度角。该数据现在用于各种动态签名验证系统,这些系统使用不同形式的人工智能在评估测试中实现高精度。利用SVC 2004和SigComp2009在线数据集,采用卷积神经网络(CNN)和递归神经网络(RNN)形式的人工智能对签名进行验证,测试准确率达到97.05%。
{"title":"Online Signature Verification using Deep Descriptors","authors":"Abigail Singh, Serestina Viriri","doi":"10.1109/ICTAS47918.2020.233999","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.233999","url":null,"abstract":"Signature verification is a technique used to counter signature forgery. In the past, the process began with staff at a bank, who is an expert, would confirm if a signature is genuine or forged. With the development of technology, now people no longer sign on paper, rather on a digital pad which can take more data which is recorded on paper, for example, pressure, azimuth and altitude angles. Examples of details captured from a digital pen include pen pressure, azimuth and altitude angles. This data is now used in various dynamic signature verification systems that achieve high accuracy on evaluation tests using different forms of artificial intelligence. This paper investigates using artificial intelligence in the form of a Convolutional Neural Network (CNN) followed by a Recurrent Neural Network (RNN) to verify signatures using the SVC 2004 and SigComp2009 online datasets and it achieved a testing accuracy of 97.05%.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116272719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ICTAS 2020 Index ICTAS 2020指数
Pub Date : 2020-03-01 DOI: 10.1109/ictas47918.2020.9082464
{"title":"ICTAS 2020 Index","authors":"","doi":"10.1109/ictas47918.2020.9082464","DOIUrl":"https://doi.org/10.1109/ictas47918.2020.9082464","url":null,"abstract":"","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124115305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big Data and Machine Learning for Forestalling Customer Churn Using Hybrid Software 使用混合软件预防客户流失的大数据和机器学习
Pub Date : 2020-03-01 DOI: 10.1109/ICTAS47918.2020.233972
L. Butgereit
The term customer churn is used to describe a situation where a customer leaves one merchant or supplier and moves to a competitor of that original merchant or supplier. This is also know as customer attrition. Prior to churning, however, there are often hints or clues in the customer’s buying patterns that he or she is ready to leave the supplier. This paper looks at the use of Machine Learning algorithms to predict when customers are ready to churn or in the process of churning. These predictions are then used to look at free text unformatted log data to find any reasons why this customer might be churning. This free text log data would include textual error messages that the customer might have received or financial problems which might have arisen such as not having sufficient funds in his or her account. This merged information is then forwarded to an outbound call queue so that trained call center agents could make human-to-human voice calls to the customer and entice them to stay with the merchant or supplier by offering some financial incentive. All of the technicalities were orchestrated using Spring Boot microservices. Design Science Research was used for the this project and a number of iterations were executed until results were satisfactory. These iterations included changing from an AutoEncoder to a MultiLayerPerceptron, included changing from one Java library providing neural network objects to another Java library, included better searching of log files for possible reasons that customers were churning and included many experiments with the quantity of sales data required in order for the neural networks to create reasonable predictions.
客户流失这个术语是用来描述客户离开一个商家或供应商,转向原来的商家或供应商的竞争对手的情况。这也被称为客户流失。然而,在顾客流失之前,在顾客的购买模式中往往有暗示或线索表明他或她准备离开供应商。本文着眼于使用机器学习算法来预测客户何时准备流失或正在流失过程中。然后使用这些预测来查看自由文本未格式化的日志数据,以查找该客户流失的任何原因。此免费文本日志数据将包括客户可能收到的文本错误消息或可能出现的财务问题,例如他或她的帐户中没有足够的资金。这些合并的信息随后被转发到一个呼出队列,这样经过培训的呼叫中心座席就可以与客户进行面对面的语音通话,并通过提供一些经济激励来吸引他们留在商家或供应商那里。所有的技术细节都是使用Spring Boot微服务编排的。设计科学研究被用于这个项目,并且执行了许多迭代,直到结果令人满意。这些迭代包括从AutoEncoder更改为MultiLayerPerceptron,包括从一个提供神经网络对象的Java库更改为另一个Java库,包括更好地搜索日志文件,以查找客户流失的可能原因,以及包括许多实验,这些实验需要大量的销售数据,以便神经网络创建合理的预测。
{"title":"Big Data and Machine Learning for Forestalling Customer Churn Using Hybrid Software","authors":"L. Butgereit","doi":"10.1109/ICTAS47918.2020.233972","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.233972","url":null,"abstract":"The term customer churn is used to describe a situation where a customer leaves one merchant or supplier and moves to a competitor of that original merchant or supplier. This is also know as customer attrition. Prior to churning, however, there are often hints or clues in the customer’s buying patterns that he or she is ready to leave the supplier. This paper looks at the use of Machine Learning algorithms to predict when customers are ready to churn or in the process of churning. These predictions are then used to look at free text unformatted log data to find any reasons why this customer might be churning. This free text log data would include textual error messages that the customer might have received or financial problems which might have arisen such as not having sufficient funds in his or her account. This merged information is then forwarded to an outbound call queue so that trained call center agents could make human-to-human voice calls to the customer and entice them to stay with the merchant or supplier by offering some financial incentive. All of the technicalities were orchestrated using Spring Boot microservices. Design Science Research was used for the this project and a number of iterations were executed until results were satisfactory. These iterations included changing from an AutoEncoder to a MultiLayerPerceptron, included changing from one Java library providing neural network objects to another Java library, included better searching of log files for possible reasons that customers were churning and included many experiments with the quantity of sales data required in order for the neural networks to create reasonable predictions.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126315898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A conceptual model for the use of artificial intelligence for credit card fraud detection in banks 人工智能在银行信用卡欺诈检测中的应用概念模型
Pub Date : 2020-03-01 DOI: 10.1109/ICTAS47918.2020.233980
Busisizwe Kelvin Nkomo, T. Breetzke
Credit cards play a role in economic growth because they allow for a cashless society which in turn reduces government expenditure on the manufacturing and distribution of monetary notes. A cashless society would allow governments to save billions of money that can be ploughed back into the economy for other purposes. However, mediums of achieving a cashless society such as credit cards are under attack from fraudsters. Recent studies show that more and more money is being fraudulently withdrawn from accounts. This paper aims to evaluate the credit card fraud detection methods used by banks and the difficulties in implementing the said methods. The study suggests the use of artificial intelligence, geolocation and data mining in credit card fraud detection methods to mitigate the weaknesses that current credit card fraud detection methods have. The use of artificial intelligence, data mining and geolocation would enable credit card fraud detection methods to analyse and identify trends in customer spending to identify fraudulent transactions. A model is introduced to help mitigate the weaknesses. An indepth literature review was undertaken and secondary research was used throughout the study as the main source of information.
信用卡在经济增长中发挥着重要作用,因为它使无现金社会成为可能,从而减少了政府在制造和发行纸币上的开支。无现金社会将使政府节省数十亿美元,这些钱可以重新投入到经济中用于其他目的。然而,实现无现金社会的媒介,如信用卡,正受到欺诈者的攻击。最近的研究表明,越来越多的钱被欺诈性地从账户中取出。本文旨在评估银行使用的信用卡欺诈检测方法以及实施这些方法的难点。该研究建议在信用卡欺诈检测方法中使用人工智能、地理定位和数据挖掘,以减轻当前信用卡欺诈检测方法的弱点。人工智能、数据挖掘和地理定位的使用将使信用卡欺诈检测方法能够分析和识别客户支出趋势,从而识别欺诈交易。引入了一个模型来帮助缓解这些弱点。我们进行了深入的文献综述,并在整个研究中使用了二手研究作为主要的信息来源。
{"title":"A conceptual model for the use of artificial intelligence for credit card fraud detection in banks","authors":"Busisizwe Kelvin Nkomo, T. Breetzke","doi":"10.1109/ICTAS47918.2020.233980","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.233980","url":null,"abstract":"Credit cards play a role in economic growth because they allow for a cashless society which in turn reduces government expenditure on the manufacturing and distribution of monetary notes. A cashless society would allow governments to save billions of money that can be ploughed back into the economy for other purposes. However, mediums of achieving a cashless society such as credit cards are under attack from fraudsters. Recent studies show that more and more money is being fraudulently withdrawn from accounts. This paper aims to evaluate the credit card fraud detection methods used by banks and the difficulties in implementing the said methods. The study suggests the use of artificial intelligence, geolocation and data mining in credit card fraud detection methods to mitigate the weaknesses that current credit card fraud detection methods have. The use of artificial intelligence, data mining and geolocation would enable credit card fraud detection methods to analyse and identify trends in customer spending to identify fraudulent transactions. A model is introduced to help mitigate the weaknesses. An indepth literature review was undertaken and secondary research was used throughout the study as the main source of information.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132190751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ICTAS 2020 Ad Page ICTAS 2020广告页
Pub Date : 2020-03-01 DOI: 10.1109/ictas47918.2020.9082479
{"title":"ICTAS 2020 Ad Page","authors":"","doi":"10.1109/ictas47918.2020.9082479","DOIUrl":"https://doi.org/10.1109/ictas47918.2020.9082479","url":null,"abstract":"","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114693192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Privacy and Security Preservation Framework for D2D Communication Based Smart Grid Services 基于D2D通信的智能电网服务的隐私和安全保护框架
Pub Date : 2020-03-01 DOI: 10.1109/ICTAS47918.2020.233995
L. Bopape, B. Nleya, Phumzile P. Khumalo
Long-Term-Evolution (LTE) based Device-to-Device (D2D) communication in future generation networks are envisaged to become the basis for deployment of various applications and services in Smart Grids (SGs). However related privacy and security aspects are also under serious consideration especially when dealing with large-scale deployment of services and applications related D2D groups. Current and legacy related algorithms cannot be applied directly to this new paradigm shift (i.e D2D communication and group formations). Using the IoT as the pillar communication subsystem for SGs, the service providers can deploy several applications and services some of which may include the acquisition and storage of personal information of individual SG users. However, the challenge will always be in the strict preservation of privacy and security of their personal data and thus a necessity in eliminating such concerns. In this paper we propose a general framework that employs a Group Key Management (GKM) mechanism to ensure enhanced privacy and security especially during the discovery and communication phases. We further mitigate on the impact of enhanced privacy and security in SG services and applications.
未来一代网络中基于长期演进(LTE)的设备对设备(D2D)通信预计将成为智能电网(SGs)中各种应用和服务部署的基础。但是,相关的隐私和安全方面也需要认真考虑,特别是在处理与D2D组相关的服务和应用程序的大规模部署时。当前和遗留的相关算法不能直接应用于这种新的范式转换(即D2D通信和组形成)。使用物联网作为SG的支柱通信子系统,服务提供商可以部署多个应用程序和服务,其中一些可能包括获取和存储单个SG用户的个人信息。然而,我们所面临的挑战始终是如何严格保障个人资料的私隐和安全,因此有必要消除这些担忧。在本文中,我们提出了一个通用框架,该框架采用组密钥管理(GKM)机制来确保增强的隐私和安全性,特别是在发现和通信阶段。我们进一步减轻在SG服务和应用程序中增强隐私和安全的影响。
{"title":"A Privacy and Security Preservation Framework for D2D Communication Based Smart Grid Services","authors":"L. Bopape, B. Nleya, Phumzile P. Khumalo","doi":"10.1109/ICTAS47918.2020.233995","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.233995","url":null,"abstract":"Long-Term-Evolution (LTE) based Device-to-Device (D2D) communication in future generation networks are envisaged to become the basis for deployment of various applications and services in Smart Grids (SGs). However related privacy and security aspects are also under serious consideration especially when dealing with large-scale deployment of services and applications related D2D groups. Current and legacy related algorithms cannot be applied directly to this new paradigm shift (i.e D2D communication and group formations). Using the IoT as the pillar communication subsystem for SGs, the service providers can deploy several applications and services some of which may include the acquisition and storage of personal information of individual SG users. However, the challenge will always be in the strict preservation of privacy and security of their personal data and thus a necessity in eliminating such concerns. In this paper we propose a general framework that employs a Group Key Management (GKM) mechanism to ensure enhanced privacy and security especially during the discovery and communication phases. We further mitigate on the impact of enhanced privacy and security in SG services and applications.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122881635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 Conference on Information Communications Technology and Society (ICTAS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1