首页 > 最新文献

2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops最新文献

英文 中文
Improving the Energy Efficiency of a Clock Synchronization Protocol for WSNs Using a TDMA-Based MAC Protocol 利用基于tdma的MAC协议提高WSNs时钟同步协议的能效
Siddharth Watwe, R. Hansdah
Clock synchronization protocols in wireless sensor networks (WSNs) provide a uniform notion of time which is required by both system as well as application level programs of WSNs. Since nodes have limited energy, it is required that the energy consumed by the clock synchronization protocols is as minimum as possible. Synchronous clock synchronization protocols execute their clock synchronization process at each node, roughly during the same real-time interval, called synchronization phase. The energy consumed by these protocols depends on the duration of the synchronization phase and how frequently the synchronization phase is executed. Hence, to minimize the energy consumption by each node, the duration of synchronization phase should be as small as possible, and the interval between consecutive synchronization phases as large as possible. Due to different drift rates of the clocks, the synchronization phases at different nodes drift apart and special techniques are required to keep them in sync. Keeping synchronization phases at neighbouring nodes in sync helps to reduce the synchronization phase. In this paper, we propose a novel technique using TDMA-based MAC protocol to keep the synchronization phases at neighbouring nodes in sync much more tightly than the existing techniques. We have applied the technique in the improved weighted-average based clock synchronization (IWICS) protocol to reduce the synchronization phase considerably and the modified TDMA-based IWICS protocol is named TIWICS protocol. This reduction in energy consumption is achieved without reducing the synchronization accuracy. Simulation results obtained using Castalia network simulator and the experimental results obtained using a test bed of WSN consisting of a few TELUS motes confirm the effectiveness of the approach.
无线传感器网络(WSNs)中的时钟同步协议提供了一个统一的时间概念,这是WSNs系统和应用层程序都需要的。由于节点的能量有限,时钟同步协议所消耗的能量必须尽可能的小。同步时钟同步协议在每个节点上执行时钟同步过程,大致在相同的实时间隔(称为同步阶段)内执行。这些协议消耗的能量取决于同步阶段的持续时间和同步阶段执行的频率。因此,为了使每个节点的能量消耗最小,同步阶段的持续时间尽可能短,连续同步阶段之间的间隔尽可能大。由于时钟的漂移速率不同,不同节点的同步相位会偏离,需要特殊的技术来保持它们的同步。使相邻节点的同步阶段保持同步有助于减少同步阶段。在本文中,我们提出了一种新的技术,使用基于tdma的MAC协议来保持相邻节点的同步阶段比现有技术更紧密地同步。我们将该技术应用于改进的基于加权平均的时钟同步(IWICS)协议中,大大减少了同步阶段,并将改进的基于tdma的IWICS协议命名为TIWICS协议。在不降低同步精度的情况下实现了能耗的降低。在Castalia网络模拟器上的仿真结果和在由少量TELUS微点组成的WSN试验台上的实验结果验证了该方法的有效性。
{"title":"Improving the Energy Efficiency of a Clock Synchronization Protocol for WSNs Using a TDMA-Based MAC Protocol","authors":"Siddharth Watwe, R. Hansdah","doi":"10.1109/AINA.2015.190","DOIUrl":"https://doi.org/10.1109/AINA.2015.190","url":null,"abstract":"Clock synchronization protocols in wireless sensor networks (WSNs) provide a uniform notion of time which is required by both system as well as application level programs of WSNs. Since nodes have limited energy, it is required that the energy consumed by the clock synchronization protocols is as minimum as possible. Synchronous clock synchronization protocols execute their clock synchronization process at each node, roughly during the same real-time interval, called synchronization phase. The energy consumed by these protocols depends on the duration of the synchronization phase and how frequently the synchronization phase is executed. Hence, to minimize the energy consumption by each node, the duration of synchronization phase should be as small as possible, and the interval between consecutive synchronization phases as large as possible. Due to different drift rates of the clocks, the synchronization phases at different nodes drift apart and special techniques are required to keep them in sync. Keeping synchronization phases at neighbouring nodes in sync helps to reduce the synchronization phase. In this paper, we propose a novel technique using TDMA-based MAC protocol to keep the synchronization phases at neighbouring nodes in sync much more tightly than the existing techniques. We have applied the technique in the improved weighted-average based clock synchronization (IWICS) protocol to reduce the synchronization phase considerably and the modified TDMA-based IWICS protocol is named TIWICS protocol. This reduction in energy consumption is achieved without reducing the synchronization accuracy. Simulation results obtained using Castalia network simulator and the experimental results obtained using a test bed of WSN consisting of a few TELUS motes confirm the effectiveness of the approach.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"34 1","pages":"231-238"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82665871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On Data Fusion for Orientation Sensing in WBASNs Using Smart Phones 基于智能手机的无线basns方向传感数据融合研究
Danish Mahmood, N. Javaid, M. Imran, Z. Khan, U. Qasim, M. Alnuem
Orientation sensing is not a new concept. It is being used since ages however, with emergence of new technologies such as Wireless Body Area Sensor Networks (WBASNs), it gives new challenges. Commencement of smart phones that have built in orientation sensors are replacing expensive and complex Inertial Measurement Units (IMUs) designed for a specific purpose. Orientation sensing in WBASN have numerous applications. In e-health applications, rehabilitation investigation of backbone injuries can be measured by continues readings of posture. For that, gyroscopes and accelerometers are key sensors that play vital role. For machines such as robots and air crafts, such data fusion is in practice. However, considering human body movements yet there is a need to find an accurate fusion algorithm that meets all demands with low complexity. In this work, we discussed and compared two algorithms considering Wireless Body Area Sensor Fusion (WBASF) i.e. Kalman and Complementary data fusion techniques. According to our findings, Kalman Filter may have given very good results regarding machines however, Complementary filter proved itself better in performance, complexity and required computational power in WBASNs.
定向传感并不是一个新概念。它已经使用了很长时间,然而,随着无线身体区域传感器网络(WBASNs)等新技术的出现,它提出了新的挑战。内置定向传感器的智能手机正在取代为特定用途而设计的昂贵而复杂的惯性测量单元(imu)。WBASN中的方向传感有着广泛的应用。在电子健康应用中,脊柱损伤的康复调查可以通过持续读取姿势来测量。为此,陀螺仪和加速度计是起着至关重要作用的关键传感器。对于像机器人和飞机这样的机器,这种数据融合正在实践中。然而,考虑到人体的运动,需要找到一种精确的融合算法,以满足所有要求,并降低复杂度。在这项工作中,我们讨论并比较了两种考虑无线身体区域传感器融合(WBASF)的算法,即卡尔曼和互补数据融合技术。根据我们的研究结果,卡尔曼滤波器可能在机器上给出了非常好的结果,然而,互补滤波器在wbasn中证明了自己在性能、复杂性和所需的计算能力方面更好。
{"title":"On Data Fusion for Orientation Sensing in WBASNs Using Smart Phones","authors":"Danish Mahmood, N. Javaid, M. Imran, Z. Khan, U. Qasim, M. Alnuem","doi":"10.1109/AINA.2015.222","DOIUrl":"https://doi.org/10.1109/AINA.2015.222","url":null,"abstract":"Orientation sensing is not a new concept. It is being used since ages however, with emergence of new technologies such as Wireless Body Area Sensor Networks (WBASNs), it gives new challenges. Commencement of smart phones that have built in orientation sensors are replacing expensive and complex Inertial Measurement Units (IMUs) designed for a specific purpose. Orientation sensing in WBASN have numerous applications. In e-health applications, rehabilitation investigation of backbone injuries can be measured by continues readings of posture. For that, gyroscopes and accelerometers are key sensors that play vital role. For machines such as robots and air crafts, such data fusion is in practice. However, considering human body movements yet there is a need to find an accurate fusion algorithm that meets all demands with low complexity. In this work, we discussed and compared two algorithms considering Wireless Body Area Sensor Fusion (WBASF) i.e. Kalman and Complementary data fusion techniques. According to our findings, Kalman Filter may have given very good results regarding machines however, Complementary filter proved itself better in performance, complexity and required computational power in WBASNs.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"461-467"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77290913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DYN-NbC: A New Routing Scheme to Maximize Lifetime and Throughput of WSNs DYN-NbC:一种最大化无线传感器网络生存期和吞吐量的新路由方案
A. H. Khan, N. Javaid, M. Imran, Z. Khan, U. Qasim, Noman Haider
In this paper, we present need-based clustering (NbC) with dynamic sink mobility (DYN-NbC) scheme for wireless sensor networks (WSNs). Our proposed scheme increases the stability period, network lifetime, and throughput of the WSN. The scheme incorporates dynamic sink mobility in a way that mobile sink (MS) moves from dense (in terms of number of nodes) regions towards sparse regions. Intelligently moving the sink to high density regions ensure maximum collection of data. As, more number of nodes (sensors) are able to send data directly to MS, therefore, significant amount of energy is saved in each particular round. However, there is a certain limitation to this approach. Nodes which are far from sink have to wait much for their turn. So, there are chances of buffer (node storage) overflow that is not desirable. To overcome this issue our scheme includes. Clustering (communication via CHs) becomes the part for those regions which are away from MS. Simulation results show that DYN-NbC outperforms the other two protocols D-LEACH and LEACH in terms of stability period, network lifetime, and network throughput.
本文提出了一种基于需求的动态汇迁移聚类(DYN-NbC)无线传感器网络方案。我们提出的方案增加了WSN的稳定周期、网络寿命和吞吐量。该方案通过移动sink (MS)从密集(就节点数量而言)区域向稀疏区域移动的方式结合了动态sink迁移。智能地将sink移动到高密度区域,确保最大限度地收集数据。由于更多的节点(传感器)能够直接向MS发送数据,因此,在每个特定的回合中节省了大量的能量。然而,这种方法有一定的局限性。远离sink的节点必须等待很长时间才能轮到它们。因此,存在缓冲区(节点存储)溢出的可能性,这是不可取的。为了解决这个问题,我们的方案包括:仿真结果表明,DYN-NbC在稳定周期、网络生存期和网络吞吐量方面都优于其他两种协议D-LEACH和LEACH。
{"title":"DYN-NbC: A New Routing Scheme to Maximize Lifetime and Throughput of WSNs","authors":"A. H. Khan, N. Javaid, M. Imran, Z. Khan, U. Qasim, Noman Haider","doi":"10.1109/AINA.2015.171","DOIUrl":"https://doi.org/10.1109/AINA.2015.171","url":null,"abstract":"In this paper, we present need-based clustering (NbC) with dynamic sink mobility (DYN-NbC) scheme for wireless sensor networks (WSNs). Our proposed scheme increases the stability period, network lifetime, and throughput of the WSN. The scheme incorporates dynamic sink mobility in a way that mobile sink (MS) moves from dense (in terms of number of nodes) regions towards sparse regions. Intelligently moving the sink to high density regions ensure maximum collection of data. As, more number of nodes (sensors) are able to send data directly to MS, therefore, significant amount of energy is saved in each particular round. However, there is a certain limitation to this approach. Nodes which are far from sink have to wait much for their turn. So, there are chances of buffer (node storage) overflow that is not desirable. To overcome this issue our scheme includes. Clustering (communication via CHs) becomes the part for those regions which are away from MS. Simulation results show that DYN-NbC outperforms the other two protocols D-LEACH and LEACH in terms of stability period, network lifetime, and network throughput.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"10 1","pages":"92-97"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77539793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Server Selection Method for Web-Based Multiserver Systems 基于web的多服务器系统的服务器选择方法
Masaki Kohana, S. Okamoto
In our previous work, we proposed a dynamic data reallocation method for Web-based multiserver Multiplayer On-line Role-Playing Game (MORPG) systems. This method handles the data allocation as a combinational optimization problem. It is solved by using a tabu search that is a well-known meta-heuristic algorithm. Our system has some Web servers and an additional computation server. The computation server solves algorithm and decides the data allocation. However, each load of server is not completely balanced. This means that some Web server might have free computing resources. We aim to use these resources effectively. Therefore, our system handles a Web server that has free resources as a computation server. In this paper, we propose a selection method of a computation server in the Web servers. The server loads might be predicted because the data allocation is decided according to the last server loads and the user requests. Therefore, our system predicts the load of each server and selects a Web server. This selected server acts the computation server and decides the data allocation for the next term. After that, the computation server predicts the server load and selects the next computation server. We evaluates the performance of our system by measuring the latency values for game users and the server loads.
在我们之前的工作中,我们提出了一种基于web的多服务器多人在线角色扮演游戏(MORPG)系统的动态数据重新分配方法。该方法将数据分配作为一个组合优化问题来处理。它是通过使用禁忌搜索来解决的,禁忌搜索是一种著名的元启发式算法。我们的系统有一些Web服务器和一个额外的计算服务器。计算服务器解决算法并决定数据分配。但是,每个服务器的负载并不是完全平衡的。这意味着某些Web服务器可能有空闲的计算资源。我们的目标是有效地利用这些资源。因此,我们的系统处理一个具有空闲资源的Web服务器作为计算服务器。本文提出了一种Web服务器中计算服务器的选择方法。可以预测服务器负载,因为数据分配是根据最后的服务器负载和用户请求决定的。因此,我们的系统预测每个服务器的负载并选择一个Web服务器。这个选定的服务器充当计算服务器,并决定下一学期的数据分配。之后,计算服务器预测服务器负载并选择下一个计算服务器。我们通过测量游戏用户的延迟值和服务器负载来评估系统的性能。
{"title":"A Server Selection Method for Web-Based Multiserver Systems","authors":"Masaki Kohana, S. Okamoto","doi":"10.1109/AINA.2015.174","DOIUrl":"https://doi.org/10.1109/AINA.2015.174","url":null,"abstract":"In our previous work, we proposed a dynamic data reallocation method for Web-based multiserver Multiplayer On-line Role-Playing Game (MORPG) systems. This method handles the data allocation as a combinational optimization problem. It is solved by using a tabu search that is a well-known meta-heuristic algorithm. Our system has some Web servers and an additional computation server. The computation server solves algorithm and decides the data allocation. However, each load of server is not completely balanced. This means that some Web server might have free computing resources. We aim to use these resources effectively. Therefore, our system handles a Web server that has free resources as a computation server. In this paper, we propose a selection method of a computation server in the Web servers. The server loads might be predicted because the data allocation is decided according to the last server loads and the user requests. Therefore, our system predicts the load of each server and selects a Web server. This selected server acts the computation server and decides the data allocation for the next term. After that, the computation server predicts the server load and selects the next computation server. We evaluates the performance of our system by measuring the latency values for game users and the server loads.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"237 1","pages":"112-117"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88911762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Research of Security of P2P Network File Sharing System P2P网络文件共享系统的安全性研究
Shaojing Li, Wanli Su, Haoling Li
Peer to peer network is highly huge, open and dynamic. The nodes in the network with autonomy, anonymity, can freely join in or leave the network, and they do not need to be responsible for their own behavior, which reduces the P2P file sharing system's transaction success rate and brings a lot of serious hidden security danger. Some security issues in the P2P network file share system were studied in this paper. The reputation incentive mechanism is established to encourage nodes to contribute own resources positively, increase network resources and promote the healthy development of network, which can improve the resources localization rate and transaction success rate to enhance the network's security.
点对点网络是高度庞大、开放和动态的。网络中的节点具有自主性、匿名性,可以自由地加入或离开网络,不需要对自己的行为负责,这降低了P2P文件共享系统的交易成功率,带来了很多严重的安全隐患。本文对P2P网络文件共享系统中的一些安全问题进行了研究。建立声誉激励机制,鼓励节点积极贡献自身资源,增加网络资源,促进网络健康发展,提高资源定位率和交易成功率,增强网络的安全性。
{"title":"The Research of Security of P2P Network File Sharing System","authors":"Shaojing Li, Wanli Su, Haoling Li","doi":"10.1109/WAINA.2015.57","DOIUrl":"https://doi.org/10.1109/WAINA.2015.57","url":null,"abstract":"Peer to peer network is highly huge, open and dynamic. The nodes in the network with autonomy, anonymity, can freely join in or leave the network, and they do not need to be responsible for their own behavior, which reduces the P2P file sharing system's transaction success rate and brings a lot of serious hidden security danger. Some security issues in the P2P network file share system were studied in this paper. The reputation incentive mechanism is established to encourage nodes to contribute own resources positively, increase network resources and promote the healthy development of network, which can improve the resources localization rate and transaction success rate to enhance the network's security.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"13 1","pages":"250-254"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89085151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Rule Processing Scheme Using the Rete Algorithm in Grid Topology Networks 网格拓扑网络中基于Rete算法的规则处理方案
Tomoya Kawakami, T. Yoshihisa, Y. Yanagisawa, M. Tsukamoto
Recently, sensor devices such as temperature sensors or cameras are used for various purposes. These devices sometimes construct ad hoc networks, and a grid topology is one of their typical network topologies. Describing processing by rules is suitable for them since the system can flexibly change their processing according to their purposes. By relieving their rule processing loads and communication delay, the system can be applied for many applications. However, there is no rule processing schemes to realize those. In this paper, we propose a rule processing scheme using the Rete algorithm. Our proposed scheme can realize rule processing reducing redundant loads and delay for many applications.
最近,温度传感器或相机等传感器设备被用于各种用途。这些设备有时会构建自组织网络,网格拓扑是它们的典型网络拓扑之一。由于系统可以根据其目的灵活地改变其处理方式,因此用规则来描述处理过程是合适的。通过减轻规则处理负载和通信延迟,该系统可以应用于多种应用。但是,目前还没有实现这些功能的规则处理方案。本文提出了一种基于Rete算法的规则处理方案。我们提出的方案可以实现规则处理,减少了许多应用程序的冗余负载和延迟。
{"title":"A Rule Processing Scheme Using the Rete Algorithm in Grid Topology Networks","authors":"Tomoya Kawakami, T. Yoshihisa, Y. Yanagisawa, M. Tsukamoto","doi":"10.1109/AINA.2015.252","DOIUrl":"https://doi.org/10.1109/AINA.2015.252","url":null,"abstract":"Recently, sensor devices such as temperature sensors or cameras are used for various purposes. These devices sometimes construct ad hoc networks, and a grid topology is one of their typical network topologies. Describing processing by rules is suitable for them since the system can flexibly change their processing according to their purposes. By relieving their rule processing loads and communication delay, the system can be applied for many applications. However, there is no rule processing schemes to realize those. In this paper, we propose a rule processing scheme using the Rete algorithm. Our proposed scheme can realize rule processing reducing redundant loads and delay for many applications.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"37 1","pages":"674-679"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85046643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Traffic Flow Classification and Visualization for Network Forensic Analysis 网络取证分析的流量分类和可视化
Nuttachot Promrit, A. Mingkhwan
This paper presents an iterative visualization technique including the timeline and parallel coordinates to illustrate network communication for forensic analysis. In primarily analysis process, the timeline of events is reconstructed from traffic logs. An analyst can track the related anomaly event on-demand. In addition the details of abnormal and normal activities are shown in multiple dimensions of parallel coordinates. The novelty of this research is not a presentation of the timeline and parallel coordinates technique, but iterative visualization framework to illustrate both anomaly traffic and application traffic pattern. We applied frequent item-set mining to search dominant traffic flow and classify them by traffic flow shape and entropy. Although some studies have been applied frequent item-set mining with traffic dataset, but as we have known, this is the first research to 1) take advantages of the frequent item-set mining and parallel coordinates, which allow us to find both the anomaly traffic and application traffic and it can easily understand the patterns of traffic flow with the multi-dimensional visualization, and 2) classify the application traffic from the entropy values of traffic flow discovered by frequent item-set mining. This method is able to classify the encrypted traffic data and it does not violate a user privacy. The results of this research and development of a visual network communication tool can: 1) show abnormalities and normal communication activities, 2) have application traffic classification 92% accurate, 3) be a visual network communication prototype which helps an analyst to find the cause of the network malfunction.
本文提出了一种包括时间线和平行坐标在内的迭代可视化技术来说明法医分析中的网络通信。在主要的分析过程中,从流量日志中重构事件的时间线。分析人员可以按需跟踪相关的异常事件。此外,异常和正常活动的细节以平行坐标的多维度显示。本研究的新颖之处不在于给出时间轴和平行坐标技术,而是采用迭代的可视化框架来描述异常流量和应用流量模式。利用频繁项集挖掘技术搜索优势交通流,并根据交通流形状和熵对优势交通流进行分类。虽然已经有一些研究将频繁项集挖掘应用于交通数据集,但正如我们所知,这是第一次利用频繁项集挖掘和并行坐标的优势,使我们能够同时发现异常流量和应用流量,并且可以通过多维可视化轻松地理解交通流的模式;2)从频繁项集挖掘发现的流量熵值中对应用流量进行分类。该方法能够对加密的流量数据进行分类,并且不侵犯用户隐私。本研究开发的可视化网络通信工具的结果可以:1)显示异常和正常的通信活动,2)具有92%的应用流量分类准确率,3)是一个可视化网络通信原型,可以帮助分析人员找到网络故障的原因。
{"title":"Traffic Flow Classification and Visualization for Network Forensic Analysis","authors":"Nuttachot Promrit, A. Mingkhwan","doi":"10.1109/AINA.2015.207","DOIUrl":"https://doi.org/10.1109/AINA.2015.207","url":null,"abstract":"This paper presents an iterative visualization technique including the timeline and parallel coordinates to illustrate network communication for forensic analysis. In primarily analysis process, the timeline of events is reconstructed from traffic logs. An analyst can track the related anomaly event on-demand. In addition the details of abnormal and normal activities are shown in multiple dimensions of parallel coordinates. The novelty of this research is not a presentation of the timeline and parallel coordinates technique, but iterative visualization framework to illustrate both anomaly traffic and application traffic pattern. We applied frequent item-set mining to search dominant traffic flow and classify them by traffic flow shape and entropy. Although some studies have been applied frequent item-set mining with traffic dataset, but as we have known, this is the first research to 1) take advantages of the frequent item-set mining and parallel coordinates, which allow us to find both the anomaly traffic and application traffic and it can easily understand the patterns of traffic flow with the multi-dimensional visualization, and 2) classify the application traffic from the entropy values of traffic flow discovered by frequent item-set mining. This method is able to classify the encrypted traffic data and it does not violate a user privacy. The results of this research and development of a visual network communication tool can: 1) show abnormalities and normal communication activities, 2) have application traffic classification 92% accurate, 3) be a visual network communication prototype which helps an analyst to find the cause of the network malfunction.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"28 1","pages":"358-364"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84114532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Implementation of the Smart Chair System for Multi-functional Unconstrained Healthcare Monitoring 多功能无约束医疗监测智能座椅系统的实现
Byeong-Ju Kim, Yun-Hong Noh, Do-Un Jeong
User's varying posture incurs undesired measurement error on conventional BCG or non-restrictive ECG measurement system during real time measurement. In this paper, we present a novel UBPchair that embed BCG, nonrestrictive ECG, and the posture detection system within a single chair to overcome such problem. Through our evaluation result, we prove that our UBPchair is a fully functional system which is work well for continuous bio signals and posture detection. It is simple and comfortable.
常规BCG或非限制性心电测量系统在实时测量时,由于使用者姿势的变化,会产生不期望的测量误差。在本文中,我们提出了一种新型的UBPchair,它将BCG、非限制性ECG和姿势检测系统嵌入到一把椅子中,以克服这一问题。通过我们的评估结果,我们证明了我们的UBPchair是一个功能齐全的系统,可以很好地用于连续生物信号和姿势检测。它既简单又舒适。
{"title":"Implementation of the Smart Chair System for Multi-functional Unconstrained Healthcare Monitoring","authors":"Byeong-Ju Kim, Yun-Hong Noh, Do-Un Jeong","doi":"10.1109/AINA.2015.220","DOIUrl":"https://doi.org/10.1109/AINA.2015.220","url":null,"abstract":"User's varying posture incurs undesired measurement error on conventional BCG or non-restrictive ECG measurement system during real time measurement. In this paper, we present a novel UBPchair that embed BCG, nonrestrictive ECG, and the posture detection system within a single chair to overcome such problem. Through our evaluation result, we prove that our UBPchair is a fully functional system which is work well for continuous bio signals and posture detection. It is simple and comfortable.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"59 1","pages":"448-452"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88510439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Apparecium: Revealing Data Flows in Android Applications Apparecium:揭示Android应用程序中的数据流
Dennis Titze, J. Schütte
With Android applications processing not only personal but also business-critical data, efficient and precise data flow analysis has become a major technique to detect apps handling critical data in unwanted ways. Although data flow analysis in general is a thoroughly researched topic, the event-driven lifecycle model of Android has its own challenges and practical application requires for reliable and efficient analysis techniques. In this paper we present Apparecium, a tool to reveal data flows in Android applications. Apparecium has conceptual differences to other techniques, and can be used to find arbitrary data flows inside Android applications. Details about the used techniques and the differences to existing data flow analysis tools are presented, as well as an evaluation against the data flow analysis framework Flow Droid.
由于Android应用程序不仅处理个人数据,还处理关键业务数据,高效和精确的数据流分析已成为检测应用程序以不希望的方式处理关键数据的主要技术。虽然数据流分析总体上是一个被深入研究的课题,但Android的事件驱动生命周期模型有其自身的挑战,实际应用需要可靠、高效的分析技术。在本文中,我们介绍了Apparecium,一个揭示Android应用程序中的数据流的工具。Apparecium与其他技术在概念上有所不同,可用于在Android应用程序中查找任意数据流。详细介绍了所使用的技术以及与现有数据流分析工具的区别,并对数据流分析框架flow Droid进行了评估。
{"title":"Apparecium: Revealing Data Flows in Android Applications","authors":"Dennis Titze, J. Schütte","doi":"10.1109/AINA.2015.239","DOIUrl":"https://doi.org/10.1109/AINA.2015.239","url":null,"abstract":"With Android applications processing not only personal but also business-critical data, efficient and precise data flow analysis has become a major technique to detect apps handling critical data in unwanted ways. Although data flow analysis in general is a thoroughly researched topic, the event-driven lifecycle model of Android has its own challenges and practical application requires for reliable and efficient analysis techniques. In this paper we present Apparecium, a tool to reveal data flows in Android applications. Apparecium has conceptual differences to other techniques, and can be used to find arbitrary data flows inside Android applications. Details about the used techniques and the differences to existing data flow analysis tools are presented, as well as an evaluation against the data flow analysis framework Flow Droid.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"36 1","pages":"579-586"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88519673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Application of Neural Networks for Intrusion Detection in Tor Networks 神经网络在Tor网络入侵检测中的应用
Taro Ishitaki, Donald Elmazi, Yi Liu, Tetsuya Oda, L. Barolli, K. Uchida
Due to the amount of anonymity afforded to users of the Tor infrastructure, Tor has become a useful tool for malicious users. With Tor, the users are able to compromise the non-repudiation principle of computer security. Also, the potentially hackers may launch attacks such as DDoS or identity theft behind Tor. For this reason, there are needed new systems and models to detect the intrusion in Tor networks. In this paper, we present the application of Neural Networks (NNs) for intrusion detection in Tor networks. We used the Back propagation NN and constructed a Tor server and a Deep Web browser (client). Then, the client sends the data browsing to the Tor server using the Tor network. We used Wireshark Network Analyzer to get the data and then use the Back propagation NN to make the approximation. The simulation results show that our simulation system has a good approximation and can be used for intrusion detection in To networks.
由于Tor基础设施为用户提供的匿名性,Tor已成为恶意用户的有用工具。使用Tor,用户可以违背计算机安全的不可否认原则。此外,潜在的黑客可能会在Tor背后发起DDoS或身份盗窃等攻击。因此,需要新的系统和模型来检测Tor网络中的入侵。本文介绍了神经网络在Tor网络入侵检测中的应用。我们使用了反向传播神经网络,并构建了一个Tor服务器和一个深度网络浏览器(客户端)。然后,客户端通过Tor网络将数据浏览发送给Tor服务器。我们使用Wireshark网络分析器获取数据,然后使用反向传播神经网络进行近似。仿真结果表明,该仿真系统具有良好的逼近性,可用于网络中的入侵检测。
{"title":"Application of Neural Networks for Intrusion Detection in Tor Networks","authors":"Taro Ishitaki, Donald Elmazi, Yi Liu, Tetsuya Oda, L. Barolli, K. Uchida","doi":"10.1109/WAINA.2015.136","DOIUrl":"https://doi.org/10.1109/WAINA.2015.136","url":null,"abstract":"Due to the amount of anonymity afforded to users of the Tor infrastructure, Tor has become a useful tool for malicious users. With Tor, the users are able to compromise the non-repudiation principle of computer security. Also, the potentially hackers may launch attacks such as DDoS or identity theft behind Tor. For this reason, there are needed new systems and models to detect the intrusion in Tor networks. In this paper, we present the application of Neural Networks (NNs) for intrusion detection in Tor networks. We used the Back propagation NN and constructed a Tor server and a Deep Web browser (client). Then, the client sends the data browsing to the Tor server using the Tor network. We used Wireshark Network Analyzer to get the data and then use the Back propagation NN to make the approximation. The simulation results show that our simulation system has a good approximation and can be used for intrusion detection in To networks.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"138 1","pages":"67-72"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86694216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1