Pub Date : 2019-04-24DOI: 10.1109/ICWR.2019.8765265
Mohammad Mehdi Yadollahi, Farzaneh Shoeleh, Elham Serkani, Afsaneh Madani, Hossein Gharaee
Nowadays, phishing is one of the most usual web threats with regards to the significant growth of the World Wide Web in volume over time. Phishing attackers always use new (zero-day) and sophisticated techniques to deceive online customers. Hence, it is necessary that the anti-phishing system be real-time and fast and also leverages from an intelligent phishing detection solution. Here, we develop a reliable detection system which can adaptively match the changing environment and phishing websites. Our method is an online and feature-rich machine learning technique to discriminate the phishing and legitimate websites. Since the proposed approach extracts different types of discriminative features from URLs and webpages source code, it is an entirely client-side solution and does not require any service from the third-party. The experimental results highlight the robustness and competitiveness of our anti-phishing system to distinguish the phishing and legitimate websites.
{"title":"An Adaptive Machine Learning Based Approach for Phishing Detection Using Hybrid Features","authors":"Mohammad Mehdi Yadollahi, Farzaneh Shoeleh, Elham Serkani, Afsaneh Madani, Hossein Gharaee","doi":"10.1109/ICWR.2019.8765265","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765265","url":null,"abstract":"Nowadays, phishing is one of the most usual web threats with regards to the significant growth of the World Wide Web in volume over time. Phishing attackers always use new (zero-day) and sophisticated techniques to deceive online customers. Hence, it is necessary that the anti-phishing system be real-time and fast and also leverages from an intelligent phishing detection solution. Here, we develop a reliable detection system which can adaptively match the changing environment and phishing websites. Our method is an online and feature-rich machine learning technique to discriminate the phishing and legitimate websites. Since the proposed approach extracts different types of discriminative features from URLs and webpages source code, it is an entirely client-side solution and does not require any service from the third-party. The experimental results highlight the robustness and competitiveness of our anti-phishing system to distinguish the phishing and legitimate websites.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"6 1","pages":"281-286"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75685685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-24DOI: 10.1109/ICWR.2019.8765250
R. Annamoradnejad, Issa Annamoradnejad, T. Safarrad, J. Habibi
There have been many previous works to determine the determinants of housing prices. All of these works relied on a relatively small set of data, mostly collected with the help of real estate agencies. In this work, we used web mining methods to generate a big, organized dataset from a popular national brokerage website. The dataset contains structural characteristics of more than 139,000 apartments, alongside their location and price. We provided our full dataset for the article, so that other researchers can reproduce our results or conduct further analyses. Using this dataset, we analyzed housing prices of Tehran in order to identify its major determinants. To this aim, we examine the dynamics of housing prices at the district levels of Tehran using Hedonic Price model. Our results highlight a number of points, including: Base area of an apartment is positively correlated with price per square meter (r=0.89), showing a two-folded impact on the overall price. Air quality is in a positive, and floor level is in negative correlation with housing prices.
{"title":"Using Web Mining in the Analysis of Housing Prices: A Case study of Tehran","authors":"R. Annamoradnejad, Issa Annamoradnejad, T. Safarrad, J. Habibi","doi":"10.1109/ICWR.2019.8765250","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765250","url":null,"abstract":"There have been many previous works to determine the determinants of housing prices. All of these works relied on a relatively small set of data, mostly collected with the help of real estate agencies. In this work, we used web mining methods to generate a big, organized dataset from a popular national brokerage website. The dataset contains structural characteristics of more than 139,000 apartments, alongside their location and price. We provided our full dataset for the article, so that other researchers can reproduce our results or conduct further analyses. Using this dataset, we analyzed housing prices of Tehran in order to identify its major determinants. To this aim, we examine the dynamics of housing prices at the district levels of Tehran using Hedonic Price model. Our results highlight a number of points, including: Base area of an apartment is positively correlated with price per square meter (r=0.89), showing a two-folded impact on the overall price. Air quality is in a positive, and floor level is in negative correlation with housing prices.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"14 1","pages":"55-60"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75460037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-24DOI: 10.1109/ICWR.2019.8765291
Mehrdad Nasseralfoghara, Hamid-Reza Hamidi
Todays analyzing web weaknesses and vulnerabilities in order to find security attacks has become more urgent. In case there is a communication contrary to the system security policies, a covert channel has been created. The attacker can easily disclosure information from the victim’s system with just one public access permission. Covert timing channels, unlike covert storage channels, do not have memory storage and they draw less attention. Different methods have been proposed for their identification, which generally benefit from the shape of traffic and the channel’s regularity. In this article, an entropy-based detection method is designed and implemented. The attacker can adjust the amount of channel entropy by controlling measures such as changing the channel’s level or creating noise on the channel to protect from the analyst’s detection. As a result, the entropy threshold is not always constant for detection. By comparing the entropy from different levels of the channel and the analyst, we conclude that the analyst must investigate traffic at all possible levels.
{"title":"Web Covert Timing Channels Detection based on Entropy","authors":"Mehrdad Nasseralfoghara, Hamid-Reza Hamidi","doi":"10.1109/ICWR.2019.8765291","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765291","url":null,"abstract":"Todays analyzing web weaknesses and vulnerabilities in order to find security attacks has become more urgent. In case there is a communication contrary to the system security policies, a covert channel has been created. The attacker can easily disclosure information from the victim’s system with just one public access permission. Covert timing channels, unlike covert storage channels, do not have memory storage and they draw less attention. Different methods have been proposed for their identification, which generally benefit from the shape of traffic and the channel’s regularity. In this article, an entropy-based detection method is designed and implemented. The attacker can adjust the amount of channel entropy by controlling measures such as changing the channel’s level or creating noise on the channel to protect from the analyst’s detection. As a result, the entropy threshold is not always constant for detection. By comparing the entropy from different levels of the channel and the analyst, we conclude that the analyst must investigate traffic at all possible levels.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"5 1","pages":"12-15"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81552221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-24DOI: 10.1109/ICWR.2019.8765283
Mahdi Ghorbani, M. Meybodi, Ali Mohammad Saghiri
Peer-to-peer systems are well-known patterns of distributed systems which created several revelations in designing ultra-scalable systems. Recently, these types of systems are evolved into cognitive peer-to-peer networks. Because of the distributed nature of Internet of Things (IoT), peer-to-peer systems such as blockchain can be used to design management mechanisms in IoT. Therefore, we need an architecture which facilitates the utilization of peer-to-peer systems in IoT based systems. To the best of our knowledge, there is no general architecture based on cognitive peer-to-peer networks. Therefore, in this paper, we propose an architecture for managing IoT based on cognitive peer-to-peer networks. In order to study the potential of the proposed architecture, we suggest an adaptive search mechanism and also a topology management algorithm utilizing the proposed architecture. The results show the efficiency of the suggested algorithms. The proposed architecture may facilitate a new evolution from peer-to-peer systems to thing-to-thing systems.
{"title":"An Architecture for Managing Internet of Things based on Cognitive Peer-to-peer Networks","authors":"Mahdi Ghorbani, M. Meybodi, Ali Mohammad Saghiri","doi":"10.1109/ICWR.2019.8765283","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765283","url":null,"abstract":"Peer-to-peer systems are well-known patterns of distributed systems which created several revelations in designing ultra-scalable systems. Recently, these types of systems are evolved into cognitive peer-to-peer networks. Because of the distributed nature of Internet of Things (IoT), peer-to-peer systems such as blockchain can be used to design management mechanisms in IoT. Therefore, we need an architecture which facilitates the utilization of peer-to-peer systems in IoT based systems. To the best of our knowledge, there is no general architecture based on cognitive peer-to-peer networks. Therefore, in this paper, we propose an architecture for managing IoT based on cognitive peer-to-peer networks. In order to study the potential of the proposed architecture, we suggest an adaptive search mechanism and also a topology management algorithm utilizing the proposed architecture. The results show the efficiency of the suggested algorithms. The proposed architecture may facilitate a new evolution from peer-to-peer systems to thing-to-thing systems.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"31 1","pages":"111-116"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91354496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-24DOI: 10.1109/ICWR.2019.8765278
M. Sanaei, S. Mostafavi
In the recent years, many solutions have been proposed to deliver multimedia over the best-effort Internet. The objective of these approaches is to ensure high Quality of Service (QoS) and Quality of Experience (QoE) for multimedia delivery in the presence of bandwidth fluctuations made by factors like signal propagation and network congestion. However, many of these techniques faces severe limitations such as network bottleneck and congestion due to the lack of global network view. The separation of control logic and data plane in Software Defined Networking (SDN) architecture contributes to the smartness, flexibility, and controllability of computer networks and provides new opportunities for guaranteeing higher QoE for multimedia viewers. In this survey, we present a taxonomy of the state-of-art SDN-based solutions for multimedia communications and we shed light on the research gaps in this area.
近年来,已经提出了许多解决方案,以在尽力的Internet上传递多媒体。这些方法的目标是在信号传播和网络拥塞等因素造成带宽波动的情况下,确保多媒体交付的高服务质量(QoS)和高体验质量(QoE)。然而,由于缺乏全局网络视图,这些技术面临着网络瓶颈和拥塞等严重的限制。SDN (Software Defined Networking)架构中控制逻辑和数据平面的分离,提高了计算机网络的智能性、灵活性和可控性,为多媒体观众提供了更高的QoE保障。在这项调查中,我们提出了一种最新的基于sdn的多媒体通信解决方案的分类,并阐明了该领域的研究差距。
{"title":"Multimedia Delivery Techniques over Software-Defined Networks: A Survey","authors":"M. Sanaei, S. Mostafavi","doi":"10.1109/ICWR.2019.8765278","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765278","url":null,"abstract":"In the recent years, many solutions have been proposed to deliver multimedia over the best-effort Internet. The objective of these approaches is to ensure high Quality of Service (QoS) and Quality of Experience (QoE) for multimedia delivery in the presence of bandwidth fluctuations made by factors like signal propagation and network congestion. However, many of these techniques faces severe limitations such as network bottleneck and congestion due to the lack of global network view. The separation of control logic and data plane in Software Defined Networking (SDN) architecture contributes to the smartness, flexibility, and controllability of computer networks and provides new opportunities for guaranteeing higher QoE for multimedia viewers. In this survey, we present a taxonomy of the state-of-art SDN-based solutions for multimedia communications and we shed light on the research gaps in this area.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"29 1","pages":"105-110"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83503154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-24DOI: 10.1109/ICWR.2019.8765296
Behzad Soleimani Neysiani, Seyed Morteza Babamir
Duplicate bug report detection is one of the major problems in software triage systems like Bugzilla to deal with end user requests. User request contains some categorical and especially textual fields which need feature extraction for duplicate detection. Contextual and topical features are acquired using calculating cosine similarity between term frequency or inverse document frequency or BM25F technique from a pair of bug reports against some topics. This research proposes the individual Manhattan distance similarity approach instead of cosine distance similarity for every topic in contextual features to expand the feature dimension which can increase the accuracy of the duplicate bug report detection process. The four famous datasets of bug reports have used for evaluation of the proposed method including Android, Eclipse, Mozilla, and Open Office which the experimental results indicate performance improvement for four contextual features including general, cryptography, network, and Java topics.
{"title":"New Methodology for Contextual Features Usage in Duplicate Bug Reports Detection : Dimension Expansion based on Manhattan Distance Similarity of Topics","authors":"Behzad Soleimani Neysiani, Seyed Morteza Babamir","doi":"10.1109/ICWR.2019.8765296","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765296","url":null,"abstract":"Duplicate bug report detection is one of the major problems in software triage systems like Bugzilla to deal with end user requests. User request contains some categorical and especially textual fields which need feature extraction for duplicate detection. Contextual and topical features are acquired using calculating cosine similarity between term frequency or inverse document frequency or BM25F technique from a pair of bug reports against some topics. This research proposes the individual Manhattan distance similarity approach instead of cosine distance similarity for every topic in contextual features to expand the feature dimension which can increase the accuracy of the duplicate bug report detection process. The four famous datasets of bug reports have used for evaluation of the proposed method including Android, Eclipse, Mozilla, and Open Office which the experimental results indicate performance improvement for four contextual features including general, cryptography, network, and Java topics.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"112 1","pages":"178-183"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89339878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-24DOI: 10.1109/ICWR.2019.8765270
Hossein Ahmadi, F sadoughi, L. Gholamhosseini, Tannaz Azadi, A. Sheikhtaheri, M. Nilashi, A. Dehnad
Hospital Information System (HIS) plays a dominant role in improving health processes and in the provision of patient care services. This study seeks potential organizational factors influencing adoption of HIS in Malaysian public hospitals. This study integrates the Technology Organization Environment (TOE) framework and Absorptive Capacity Theory (ACT) in proposing a new theoretical framework for HIS adoption in Malaysia. Specifically, we examined the organizational dimension in the proposed framework and investigated moderating role of hospital size in the adoption of HIS. This research applied a quantitative approach and conducted a nationwide survey involving 137 public hospitals, with different hospital size. A survey method using a web-based questionnaire was conducted to examine the effects of the identified factors on HIS adoption. The logistic regression method is then deployed for testing the research hypotheses. Regarding the hospital size as the only moderator of this study, we found that effects of the significant factors on HIS adoption are the same in different hospital sizes. This analytical study approaches to the TOE framework and extends it by taking into account the absorptive capacity of hospital as the important component of the internal organization. Therefore, the study and its findings are to provide more insight into the process of successful adoption of HIS for public hospitals of Malaysia.
{"title":"Organizational Factors Affecting the Adoption of a Technological Innovation: A Study of the Hospital Information System (HIS)","authors":"Hossein Ahmadi, F sadoughi, L. Gholamhosseini, Tannaz Azadi, A. Sheikhtaheri, M. Nilashi, A. Dehnad","doi":"10.1109/ICWR.2019.8765270","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765270","url":null,"abstract":"Hospital Information System (HIS) plays a dominant role in improving health processes and in the provision of patient care services. This study seeks potential organizational factors influencing adoption of HIS in Malaysian public hospitals. This study integrates the Technology Organization Environment (TOE) framework and Absorptive Capacity Theory (ACT) in proposing a new theoretical framework for HIS adoption in Malaysia. Specifically, we examined the organizational dimension in the proposed framework and investigated moderating role of hospital size in the adoption of HIS. This research applied a quantitative approach and conducted a nationwide survey involving 137 public hospitals, with different hospital size. A survey method using a web-based questionnaire was conducted to examine the effects of the identified factors on HIS adoption. The logistic regression method is then deployed for testing the research hypotheses. Regarding the hospital size as the only moderator of this study, we found that effects of the significant factors on HIS adoption are the same in different hospital sizes. This analytical study approaches to the TOE framework and extends it by taking into account the absorptive capacity of hospital as the important component of the internal organization. Therefore, the study and its findings are to provide more insight into the process of successful adoption of HIS for public hospitals of Malaysia.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"48 1","pages":"240-245"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87944906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-24DOI: 10.1109/ICWR.2019.8765285
H. Abbasimehr, M. Shabani
User-Generated-Content (UGC) in the form of online reviews can be an invaluable source of information for both customers and businesses. Sentiment analysis and opinion mining tools and techniques have been proposed in the literature to extract knowledge from online reviews. Aspect-based opinion mining which has gained growing attention mainly has two tasks including aspect extraction and sentiment polarity detection. Once an aspect-based opinion mining task has been accomplished; a bag of sentiments will be achieved. In many cases, it is necessary to obtain an overall sentiment about a typical aspect. In this study, we have proposed a sentiment aggregation system based on weighted selective aggregated majority OWA (WSAM-OWA). WSAM-OWA considers both the majority and the degree of importance of information source in the process of aggregation. The proposed system exploits the helpfulness rating of reviews in determining the reliability and credibility of each sentiment. A case study was conducted to illustrates the usefulness of the proposed system. The results of this study demonstrated that the proposed sentiment aggregation system could be incorporated in opinion mining systems.
{"title":"A Sentiment Aggregation System based on an OWA Operator","authors":"H. Abbasimehr, M. Shabani","doi":"10.1109/ICWR.2019.8765285","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765285","url":null,"abstract":"User-Generated-Content (UGC) in the form of online reviews can be an invaluable source of information for both customers and businesses. Sentiment analysis and opinion mining tools and techniques have been proposed in the literature to extract knowledge from online reviews. Aspect-based opinion mining which has gained growing attention mainly has two tasks including aspect extraction and sentiment polarity detection. Once an aspect-based opinion mining task has been accomplished; a bag of sentiments will be achieved. In many cases, it is necessary to obtain an overall sentiment about a typical aspect. In this study, we have proposed a sentiment aggregation system based on weighted selective aggregated majority OWA (WSAM-OWA). WSAM-OWA considers both the majority and the degree of importance of information source in the process of aggregation. The proposed system exploits the helpfulness rating of reviews in determining the reliability and credibility of each sentiment. A case study was conducted to illustrates the usefulness of the proposed system. The results of this study demonstrated that the proposed sentiment aggregation system could be incorporated in opinion mining systems.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"98 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74949002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-24DOI: 10.1109/ICWR.2019.8765272
Behnam Farzaneh, M. A. Montazeri, S. Jamali
The Internet of Things (IoT) is a concept that allows the networking of various objects of everyday life and communications on the Internet without human interaction. The IoT consists of Low-Power and Lossy Networks (LLN) which for routing use a special protocol called Routing over Low-Power and Lossy Networks (RPL). Due to the resource-constrained nature of RPL networks, they may be exposed to a variety of internal attacks. Neighbor attack and DIS attack are the specific internal attacks at this protocol. This paper presents an anomaly-based lightweight Intrusion Detection System (IDS) based on threshold values for detecting attacks on the RPL protocol. The results of the simulation using Cooja show that the proposed model has a very high True Positive Rate (TPR) and in some cases, it can be 100%, while the False Positive Rate (FPR) is very low. The results show that the proposed model is fully effective in detecting attacks and applicable to large-scale networks.
{"title":"An Anomaly-Based IDS for Detecting Attacks in RPL-Based Internet of Things","authors":"Behnam Farzaneh, M. A. Montazeri, S. Jamali","doi":"10.1109/ICWR.2019.8765272","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765272","url":null,"abstract":"The Internet of Things (IoT) is a concept that allows the networking of various objects of everyday life and communications on the Internet without human interaction. The IoT consists of Low-Power and Lossy Networks (LLN) which for routing use a special protocol called Routing over Low-Power and Lossy Networks (RPL). Due to the resource-constrained nature of RPL networks, they may be exposed to a variety of internal attacks. Neighbor attack and DIS attack are the specific internal attacks at this protocol. This paper presents an anomaly-based lightweight Intrusion Detection System (IDS) based on threshold values for detecting attacks on the RPL protocol. The results of the simulation using Cooja show that the proposed model has a very high True Positive Rate (TPR) and in some cases, it can be 100%, while the False Positive Rate (FPR) is very low. The results show that the proposed model is fully effective in detecting attacks and applicable to large-scale networks.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"210 1","pages":"61-66"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73144114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-24DOI: 10.1109/ICWR.2019.8765273
Samaneh Hoghooghi, Ramin Nasr Esfahani
Recently, mobile devices have been introduced in various Wireless Sensor Networks (WSNs) applications in order to increase data collection efficiency. Mobility and resources optimized management are still open challenging issues for the success and proliferation of the Internet of mobile things. Routing plays an important role in the overall architecture of the IoT. The existing routing protocol RPL has a very low reactivity to mobility making it inefficient and open to further research improvements. In this paper, the RPL protocol has been improved to support mobility on the network. We created a continuous connection by reducing the number of hand-offs using the hop count metric. This led to the reduced network overhead and the increased data delivery rate. To simulate the proposed protocol, the Contiki 6LoWPAN/RPL stack has been used. Obtained simulation results show that proposed protocol outperforms both the RPL and the MRPL protocols in terms of packet delivery rate, delay, network overhead and energy consumption.
{"title":"Mobility-Aware Parent Selection for Routing Protocol in Wireless Sensor Networks using RPL","authors":"Samaneh Hoghooghi, Ramin Nasr Esfahani","doi":"10.1109/ICWR.2019.8765273","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765273","url":null,"abstract":"Recently, mobile devices have been introduced in various Wireless Sensor Networks (WSNs) applications in order to increase data collection efficiency. Mobility and resources optimized management are still open challenging issues for the success and proliferation of the Internet of mobile things. Routing plays an important role in the overall architecture of the IoT. The existing routing protocol RPL has a very low reactivity to mobility making it inefficient and open to further research improvements. In this paper, the RPL protocol has been improved to support mobility on the network. We created a continuous connection by reducing the number of hand-offs using the hop count metric. This led to the reduced network overhead and the increased data delivery rate. To simulate the proposed protocol, the Contiki 6LoWPAN/RPL stack has been used. Obtained simulation results show that proposed protocol outperforms both the RPL and the MRPL protocols in terms of packet delivery rate, delay, network overhead and energy consumption.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"88 1","pages":"79-84"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78314529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}