首页 > 最新文献

2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops最新文献

英文 中文
Fuzzing CAN Packets into Automobiles 模糊CAN数据包进入汽车
Hyeryun Lee, Kyunghee Choi, K. Chung, Jaein Kim, Kangbin Yim
There have been many warnings that automobiles are vulnerable to the attacks through the network, CAN which connects the ECUs (Electrical Control Units) embedded in the automobiles. Some previous studies showed that the warnings were actual treats. They analyzed the packets flowing on the network and used the packets constructed based on the analysis. We show that it is possible to attack automobiles without any in-depth knowledge about automobiles and specially designed tools to analyze the packets. Experiments are performed in two phases. In the first phase, the victims automobiles are attacked with the packets constructed with the CAN IDs gathered from the sniffed packets flowing in the automobiles. It is not a problem at all to gather CANIDs since CAN is an open simple standard protocol and there are many tools to sniff CAN packets in the Internet. In the second phase, the attack packets are constructed in a completely random manner without any previous information such as CAN IDs. The packets are injected into the network via Bluetooth, a wireless channel. Through the experiments, we show the network vulnerability of automobiles.
很多人警告说,通过连接汽车内嵌的电子控制单元(ecu)的网络CAN,汽车很容易受到攻击。之前的一些研究表明,这些警告实际上是一种款待。他们分析了在网络上流动的数据包,并使用基于分析构建的数据包。我们表明,在没有深入了解汽车和专门设计的工具来分析数据包的情况下,攻击汽车是可能的。实验分两个阶段进行。在第一阶段,利用从汽车中收集的嗅探数据包的CAN id构造的数据包攻击受害者汽车。收集canid根本不是问题,因为CAN是一个开放的简单标准协议,并且有许多工具可以嗅探Internet中的CAN数据包。在第二阶段,攻击报文是完全随机构造的,没有任何预先的信息,如CAN id。数据包通过蓝牙(一种无线通道)注入网络。通过实验,我们展示了汽车网络的脆弱性。
{"title":"Fuzzing CAN Packets into Automobiles","authors":"Hyeryun Lee, Kyunghee Choi, K. Chung, Jaein Kim, Kangbin Yim","doi":"10.1109/AINA.2015.274","DOIUrl":"https://doi.org/10.1109/AINA.2015.274","url":null,"abstract":"There have been many warnings that automobiles are vulnerable to the attacks through the network, CAN which connects the ECUs (Electrical Control Units) embedded in the automobiles. Some previous studies showed that the warnings were actual treats. They analyzed the packets flowing on the network and used the packets constructed based on the analysis. We show that it is possible to attack automobiles without any in-depth knowledge about automobiles and specially designed tools to analyze the packets. Experiments are performed in two phases. In the first phase, the victims automobiles are attacked with the packets constructed with the CAN IDs gathered from the sniffed packets flowing in the automobiles. It is not a problem at all to gather CANIDs since CAN is an open simple standard protocol and there are many tools to sniff CAN packets in the Internet. In the second phase, the attack packets are constructed in a completely random manner without any previous information such as CAN IDs. The packets are injected into the network via Bluetooth, a wireless channel. Through the experiments, we show the network vulnerability of automobiles.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"228 1","pages":"817-821"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74468328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Efficient Processing of Queries over Recursive XML Data 递归XML数据查询的有效处理
N. Alghamdi, J. Rahayu, E. Pardede
This paper presents an object-based method for indexing recursive structured XML data and process branched queries efficiently. The proposed method is called Object-based Twig Query processing for Recursive data (OTQℜ). It is an extended approach of our existing work in [1] in order to handle recursion in XML data. Our motivation of extending OTQ to OTQℜ is to support many applications that require recursive data structure to be fully functional. OTQℜ is proposed to utilize semantics of XML data to efficiently process branched queries on recursive XML data. The experiments and evaluation are presented to cover variant evaluating points and the efficiency of our approach.
提出了一种基于对象的递归结构化XML数据索引和分支查询处理方法。提出的方法被称为基于对象的递归数据分支查询处理(OTQ)。它是[1]中现有工作的一种扩展方法,目的是处理XML数据中的递归。我们将OTQ扩展到OTQ的动机是为了支持许多需要递归数据结构的应用程序。提出了一种利用XML数据语义高效处理递归XML数据分支查询的OTQ算法。实验和评估涵盖了不同的评估点和我们的方法的效率。
{"title":"Efficient Processing of Queries over Recursive XML Data","authors":"N. Alghamdi, J. Rahayu, E. Pardede","doi":"10.1109/AINA.2015.177","DOIUrl":"https://doi.org/10.1109/AINA.2015.177","url":null,"abstract":"This paper presents an object-based method for indexing recursive structured XML data and process branched queries efficiently. The proposed method is called Object-based Twig Query processing for Recursive data (OTQℜ). It is an extended approach of our existing work in [1] in order to handle recursion in XML data. Our motivation of extending OTQ to OTQℜ is to support many applications that require recursive data structure to be fully functional. OTQℜ is proposed to utilize semantics of XML data to efficiently process branched queries on recursive XML data. The experiments and evaluation are presented to cover variant evaluating points and the efficiency of our approach.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"99 1","pages":"134-142"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72900280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Structural Controllability Analysis Via Embedding Power Dominating Set Approximation in ErdHos-Rènyi Graphs 基于嵌入幂支配集逼近的erdhos - rnyi图结构可控性分析
B. Alwasel, S. Wolthusen
The ability of an attacker to take over control of a distributed system or to deny the defender the same is a general problem, but of particular significance in cyber-physical systems where even temporary loss of view or loss of control can result in outright failure and severe cascading effects. Moreover, many such cyber-physical systems not only exhibit a safe fail-stop behaviour such that they can be brought to a halt in a safe state, but also have hard real-time requirements such as in the case of electrical power networks and their constituent elements. We study the Power Dominating Set (PDS) problem originally by Haynes to study the structure of electric power networks and their efficient control, known to be equivalent to the maximum matching problem. However, PDS is generally known to be NP-complete with poor approximability with recent work focusing on studying properties of restricted graph classes. In this paper we describe the problems of controllability and structural controllability as represented by the PDS problem and investigate different attacks affecting control networks. We therefore review existing work on graph classes for which PDS has been studied before identifying possible embeddings of such structures in ErdHös-Rènyi graphs of different density as well as the approximation characteristics which can be achieved in order to adapt them for solving the partition elements of directed PDS problem. This allows the rapid identification of feasible alternative control structures where attackers have damaged or compromised the original control network, and to recover partial controllability if a control network has been partitioned.
攻击者接管分布式系统的控制或拒绝防御者同样的能力是一个普遍问题,但在网络物理系统中特别重要,因为即使暂时失去视图或失去控制也会导致彻底的失败和严重的级联效应。此外,许多这样的网络物理系统不仅表现出安全的故障停止行为,使它们可以在安全状态下停止,而且还具有严格的实时要求,例如在电力网络及其组成元素的情况下。本文首先研究Haynes提出的功率支配集问题(PDS),用于研究电网的结构及其有效控制问题,它等价于最大匹配问题。然而,PDS通常被认为是np完全的,近似性差,最近的工作主要集中在研究受限图类的性质。本文描述了以PDS问题为代表的控制网络的可控性和结构可控性问题,并研究了影响控制网络的各种攻击。因此,我们回顾了现有的关于图类的工作,在确定这些结构在ErdHös-Rènyi不同密度图中的可能嵌入以及可以实现的近似特征之前,已经研究了PDS,以便使它们适应于解决有向PDS问题的划分元素。这允许快速识别可行的替代控制结构,当攻击者破坏或破坏原始控制网络时,如果控制网络已被分割,则可以恢复部分可控性。
{"title":"Structural Controllability Analysis Via Embedding Power Dominating Set Approximation in ErdHos-Rènyi Graphs","authors":"B. Alwasel, S. Wolthusen","doi":"10.1109/WAINA.2015.77","DOIUrl":"https://doi.org/10.1109/WAINA.2015.77","url":null,"abstract":"The ability of an attacker to take over control of a distributed system or to deny the defender the same is a general problem, but of particular significance in cyber-physical systems where even temporary loss of view or loss of control can result in outright failure and severe cascading effects. Moreover, many such cyber-physical systems not only exhibit a safe fail-stop behaviour such that they can be brought to a halt in a safe state, but also have hard real-time requirements such as in the case of electrical power networks and their constituent elements. We study the Power Dominating Set (PDS) problem originally by Haynes to study the structure of electric power networks and their efficient control, known to be equivalent to the maximum matching problem. However, PDS is generally known to be NP-complete with poor approximability with recent work focusing on studying properties of restricted graph classes. In this paper we describe the problems of controllability and structural controllability as represented by the PDS problem and investigate different attacks affecting control networks. We therefore review existing work on graph classes for which PDS has been studied before identifying possible embeddings of such structures in ErdHös-Rènyi graphs of different density as well as the approximation characteristics which can be achieved in order to adapt them for solving the partition elements of directed PDS problem. This allows the rapid identification of feasible alternative control structures where attackers have damaged or compromised the original control network, and to recover partial controllability if a control network has been partitioned.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"45 1","pages":"418-423"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73528881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Extensive Simulation Performance Evaluation of MSK Scheme with Error Correcting Codes in Wireless Sensor Networks 无线传感器网络中带纠错码的MSK方案的广泛仿真性能评价
Rajoua Anane, R. Bouallègue, K. Raoof
Link reliability and power consumption are a prime concern in the design of wireless sensor networks. The data exchanged between nodes are vulnerable to corruption by errors induced by random noise, signal fading and other factors. Error control codes (ECC) is an efficient technique for increasing reliability of links and minimizing power transmitted. In this context, the choice of energy efficient ECC with a suitable modulation scheme is a vital task at the physical layer of wireless sensor networks to improve their lifetime. A performance analysis of energy consumption referring to MSK modulation with suitable error control codes approach is presented in this paper. The particularly analysis is evaluated in terms of energy consumption and probability of Bit Error Rate (BER) for various error control codes combined with optimal modulation scheme through a Gaussian channel (AWGN). Based on simulations results, we observe that the benefit of error correcting approach varies with the transmission distance. The combination MSK modulation and Reed Solomon code yields a significant improvement power consumption.
链路可靠性和功耗是无线传感器网络设计中的主要问题。节点间交换的数据容易因随机噪声、信号衰落等因素引起的误差而损坏。错误控制码(ECC)是提高链路可靠性和减少传输功率的有效技术。在这种情况下,选择具有合适调制方案的节能ECC是无线传感器网络物理层提高其使用寿命的重要任务。本文提出了一种采用合适的误差控制码方法的MSK调制的能耗性能分析。通过高斯信道(AWGN)结合最优调制方案,对各种差错控制码的能量消耗和误码率(BER)概率进行了具体分析。仿真结果表明,误差校正方法的效果随传输距离的变化而变化。组合MSK调制和里德所罗门码产生显著改善的功耗。
{"title":"Extensive Simulation Performance Evaluation of MSK Scheme with Error Correcting Codes in Wireless Sensor Networks","authors":"Rajoua Anane, R. Bouallègue, K. Raoof","doi":"10.1109/AINA.2015.213","DOIUrl":"https://doi.org/10.1109/AINA.2015.213","url":null,"abstract":"Link reliability and power consumption are a prime concern in the design of wireless sensor networks. The data exchanged between nodes are vulnerable to corruption by errors induced by random noise, signal fading and other factors. Error control codes (ECC) is an efficient technique for increasing reliability of links and minimizing power transmitted. In this context, the choice of energy efficient ECC with a suitable modulation scheme is a vital task at the physical layer of wireless sensor networks to improve their lifetime. A performance analysis of energy consumption referring to MSK modulation with suitable error control codes approach is presented in this paper. The particularly analysis is evaluated in terms of energy consumption and probability of Bit Error Rate (BER) for various error control codes combined with optimal modulation scheme through a Gaussian channel (AWGN). Based on simulations results, we observe that the benefit of error correcting approach varies with the transmission distance. The combination MSK modulation and Reed Solomon code yields a significant improvement power consumption.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"24 1","pages":"400-405"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84701078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Application of WMN-SA Simulation System for WMN Node Placement in a Realistic Scenario WMN- sa仿真系统在现实场景下WMN节点放置中的应用
Shinji Sakamoto, Tetsuya Oda, L. Barolli, Makoto Ikeda, F. Xhafa, K. Uchida
One of the key advantages of Wireless Mesh Networks (WMNs) is their importance for providing cost efficient broad band connectivity. In WMNs, there are issues for achieving the network connectivity and user coverage, which are related with the node placement problem. In this work, we consider the router node placement problem in WMNs. We want to find the optimal distribution of router nodes in order to provide the best network connectivity (the maximal number of connected routers) and coverage (maximal number of covered clients). We apply our proposed WMN-SA simulation system in a realistic scenario of the distribution of mesh clients considering It oshima City, Fukuoka Prefecture, Japan. From simulation results, we found many insights that can be very important for real deployment of WMNs.
无线网状网络(WMNs)的关键优势之一是其提供低成本宽带连接的重要性。在wmn中,存在着实现网络连通性和用户覆盖的问题,这与节点放置问题有关。在这项工作中,我们考虑了WMNs中的路由器节点放置问题。我们希望找到路由器节点的最优分布,以提供最佳的网络连通性(连接路由器的最大数量)和覆盖范围(覆盖客户端的最大数量)。我们将我们提出的WMN-SA仿真系统应用于一个网格客户端分布的现实场景,该场景考虑了日本福冈县大岛市。从模拟结果中,我们发现了许多对wmn的实际部署非常重要的见解。
{"title":"Application of WMN-SA Simulation System for WMN Node Placement in a Realistic Scenario","authors":"Shinji Sakamoto, Tetsuya Oda, L. Barolli, Makoto Ikeda, F. Xhafa, K. Uchida","doi":"10.1109/AINA.2015.164","DOIUrl":"https://doi.org/10.1109/AINA.2015.164","url":null,"abstract":"One of the key advantages of Wireless Mesh Networks (WMNs) is their importance for providing cost efficient broad band connectivity. In WMNs, there are issues for achieving the network connectivity and user coverage, which are related with the node placement problem. In this work, we consider the router node placement problem in WMNs. We want to find the optimal distribution of router nodes in order to provide the best network connectivity (the maximal number of connected routers) and coverage (maximal number of covered clients). We apply our proposed WMN-SA simulation system in a realistic scenario of the distribution of mesh clients considering It oshima City, Fukuoka Prefecture, Japan. From simulation results, we found many insights that can be very important for real deployment of WMNs.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"49 1","pages":"43-47"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84863429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
e-MinZu: A Software Service Architecture Based on Saas for Massive Data Source e-MinZu:基于Saas的海量数据源软件服务体系结构
Weng Yu
The paper takes the multi-modal data massive minority area as the research object, and uses emotion computing, voice recognition, geographic information representation, video content recognition, intelligent technology and robot, 3D display, wireless communication, the minority language and semantic information retrieval advanced information processing technology, in-depth analyzes the methods for massive multi-modal data analysis and processing of national minority area (for example: minority voice stream data, image data, EEG data, national costume of 3D data, GIS data, characteristics of ethnic minorities village minority language news data), the effective realization of multimodal data application services integrating multiple information fusion technology.
本文以海量少数民族地区多模态数据为研究对象,运用情感计算、语音识别、地理信息表示、视频内容识别、智能技术与机器人、三维显示、无线通信、少数民族语言与语义信息检索等先进信息处理技术,深入分析了少数民族地区海量多模态数据分析与处理方法(例如:少数民族语音流数据、图像数据、脑电图数据、民族服饰三维数据、地理信息系统数据、少数民族村寨特色少数民族语言新闻数据),有效实现融合多种信息技术的多模式数据应用服务。
{"title":"e-MinZu: A Software Service Architecture Based on Saas for Massive Data Source","authors":"Weng Yu","doi":"10.1109/WAINA.2015.129","DOIUrl":"https://doi.org/10.1109/WAINA.2015.129","url":null,"abstract":"The paper takes the multi-modal data massive minority area as the research object, and uses emotion computing, voice recognition, geographic information representation, video content recognition, intelligent technology and robot, 3D display, wireless communication, the minority language and semantic information retrieval advanced information processing technology, in-depth analyzes the methods for massive multi-modal data analysis and processing of national minority area (for example: minority voice stream data, image data, EEG data, national costume of 3D data, GIS data, characteristics of ethnic minorities village minority language news data), the effective realization of multimodal data application services integrating multiple information fusion technology.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"69 1","pages":"246-249"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84912298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach to Detect Remote Access Trojan in the Early Stage of Communication 一种在通信早期检测远程访问木马的方法
Dan Jiang, Kazumasa Omote
As data leakage accidents occur every year, the security of confidential information is becoming increasingly important. Remote Access Trojans (RAT), a kind of spyware, are used to invade the PC of a victim through targeted attacks. After the intrusion, the attacker can monitor and control the victim's PC remotely, to wait for an opportunity to steal the confidential information. Since it is hard to prevent the intrusion of RATs completely, preventing confidential information being leaked back to the attacker is the main issue. Various existing approaches introduce different network behaviors of RAT to construct detection systems. Unfortunately, two challenges remain: one is to detect RAT sessions as early as possible, the other is to remain a high accuracy to detect RAT sessions, while there exist normal applications whose traffic behave similarly to RATs. In this paper, we propose a novel approach to detect RAT sessions in the early stage of communication. To differentiate network behaviors between normal applications and RAT, we extract the features from the traffic of a short period of time at the beginning. Afterward, we use machine learning techniques to train the detection model, then evaluate it by K-Fold cross-validation. The results show that our approach is able to detect RAT sessions with a high accuracy. In particular, our approach achieves over 96% accuracy together with the FNR of 10% by Random Forest algorithm, which means that our approach is valid to detect RAT sessions in the early stage of communication.
随着数据泄露事故的不断发生,机密信息的安全变得越来越重要。远程访问木马(RAT)是一种间谍软件,通过有针对性的攻击侵入受害者的PC。入侵后,攻击者可以远程监视和控制受害者的PC,等待窃取机密信息的机会。由于很难完全防止rat的入侵,因此防止机密信息泄露回攻击者是主要问题。现有的各种方法引入RAT的不同网络行为来构建检测系统。不幸的是,仍然存在两个挑战:一个是尽可能早地检测RAT会话,另一个是在存在流量与RAT相似的正常应用程序的情况下保持检测RAT会话的高准确性。在本文中,我们提出了一种在通信的早期阶段检测RAT会话的新方法。为了区分正常应用和RAT之间的网络行为,我们首先从短时间内的流量中提取特征。之后,我们使用机器学习技术来训练检测模型,然后通过K-Fold交叉验证对其进行评估。结果表明,我们的方法能够以较高的准确率检测RAT会话。特别是,我们的方法通过随机森林算法实现了超过96%的准确率和10%的FNR,这意味着我们的方法在通信的早期阶段检测RAT会话是有效的。
{"title":"An Approach to Detect Remote Access Trojan in the Early Stage of Communication","authors":"Dan Jiang, Kazumasa Omote","doi":"10.1109/AINA.2015.257","DOIUrl":"https://doi.org/10.1109/AINA.2015.257","url":null,"abstract":"As data leakage accidents occur every year, the security of confidential information is becoming increasingly important. Remote Access Trojans (RAT), a kind of spyware, are used to invade the PC of a victim through targeted attacks. After the intrusion, the attacker can monitor and control the victim's PC remotely, to wait for an opportunity to steal the confidential information. Since it is hard to prevent the intrusion of RATs completely, preventing confidential information being leaked back to the attacker is the main issue. Various existing approaches introduce different network behaviors of RAT to construct detection systems. Unfortunately, two challenges remain: one is to detect RAT sessions as early as possible, the other is to remain a high accuracy to detect RAT sessions, while there exist normal applications whose traffic behave similarly to RATs. In this paper, we propose a novel approach to detect RAT sessions in the early stage of communication. To differentiate network behaviors between normal applications and RAT, we extract the features from the traffic of a short period of time at the beginning. Afterward, we use machine learning techniques to train the detection model, then evaluate it by K-Fold cross-validation. The results show that our approach is able to detect RAT sessions with a high accuracy. In particular, our approach achieves over 96% accuracy together with the FNR of 10% by Random Forest algorithm, which means that our approach is valid to detect RAT sessions in the early stage of communication.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"706-713"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82850244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Feasibility Validation of WiFi Based Multihop Access Network for Disaster Recovery 基于WiFi的多跳接入网容灾可行性验证
Q. Minh, S. Yamada
Agile providing Internet connectivity to the victims right after a disaster occurs is essential to mitigate loss and save people. It is hard, however, to quickly recover communication infrastructures due to many difficulties such as reach ability to the destroyed areas, heavy and wide-area damages requiring a huge amount of resources and human power to recover, and so forth. WiFi based multihop access network establishment leveraging on-site commodity mobile devices has the potential to disaster recovery. This approach does not require additional hardware such as network interface cards (NICs) or pre-installed multihop routing protocols on mobile devices as in conventional ad-hoc networks. Instead, it leverages the available WiFi NIC on the mobile device to share its Internet connectivity to the nearby nodes. As a result, Internet connectivity can be quickly brought to further victims. However, we still lack an understanding of its true potential in real environments. This paper provides a comprehensive field experiment using our proof-of-concept prototype. The results reveal the feasibility and the effectiveness of the proposed network as it can easily extend to 20 hops and cover a large area, around one kilometer in diameter.
敏捷在灾难发生后立即为受害者提供互联网连接,这对于减轻损失和拯救人员至关重要。然而,由于难以到达受灾地区、大面积的严重破坏需要大量的资源和人力等诸多困难,很难迅速恢复通信基础设施。利用现场商用移动设备建立基于WiFi的多跳接入网具有灾难恢复的潜力。这种方法不需要额外的硬件,比如网络接口卡(nic),也不需要像传统的自组织网络那样在移动设备上预装多跳路由协议。相反,它利用移动设备上可用的WiFi网卡将其互联网连接共享给附近的节点。因此,互联网连接可以迅速带给更多的受害者。然而,我们仍然缺乏对其在现实环境中的真正潜力的理解。本文使用我们的概念验证原型提供了一个全面的现场实验。结果显示了该网络的可行性和有效性,因为它可以很容易地扩展到20跳,覆盖直径约1公里的大面积。
{"title":"Feasibility Validation of WiFi Based Multihop Access Network for Disaster Recovery","authors":"Q. Minh, S. Yamada","doi":"10.1109/WAINA.2015.40","DOIUrl":"https://doi.org/10.1109/WAINA.2015.40","url":null,"abstract":"Agile providing Internet connectivity to the victims right after a disaster occurs is essential to mitigate loss and save people. It is hard, however, to quickly recover communication infrastructures due to many difficulties such as reach ability to the destroyed areas, heavy and wide-area damages requiring a huge amount of resources and human power to recover, and so forth. WiFi based multihop access network establishment leveraging on-site commodity mobile devices has the potential to disaster recovery. This approach does not require additional hardware such as network interface cards (NICs) or pre-installed multihop routing protocols on mobile devices as in conventional ad-hoc networks. Instead, it leverages the available WiFi NIC on the mobile device to share its Internet connectivity to the nearby nodes. As a result, Internet connectivity can be quickly brought to further victims. However, we still lack an understanding of its true potential in real environments. This paper provides a comprehensive field experiment using our proof-of-concept prototype. The results reveal the feasibility and the effectiveness of the proposed network as it can easily extend to 20 hops and cover a large area, around one kilometer in diameter.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"180 1","pages":"473-477"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83010618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Anomaly Detection by Whitening HOSF 一种基于白化HOSF的异常检测方法
Chun-Hui Wang, Yue Pan, Shwu-Huey Yen
In this paper an improvement over our previous work is proposed to handle short-medium range surveillance videos. The features of histogram of oriented social force (HOSF) are the primitive building blocks to capture the interactions among people. To reduce the correlation among data, whitening procedure is applied on features. We use Bag-of-Feature (BoF) to pool HOSF in a given frame. Since our goal is to classify whether a given frame is normal and BoF, a histogram of visual words in a frame, can better represent patterns in term of frame. In the phase of building the dictionary, training BoFs are clustered and the center means are so called code words corresponding to "normal" patterns observed during the training process. A Gaussian model is constructed for distances between data and the codeword in each cluster. To decide whether a given frame is normal, the BoF feature is evaluated and the Z-score which measuring the deviation to the closest codeword is calculated. If such BoF is an outlier (i.e. High Z-score) comparing to the closest codeword, then the frame is classified "abnormal". The method is testified by the subway dataset with promising results.
本文提出了一种改进方法来处理中短距离监控视频。定向社会力直方图(HOSF)的特征是捕捉人与人之间相互作用的基本构件。为了降低数据之间的相关性,对特征进行了白化处理。我们使用特征袋(BoF)来池化给定帧内的hof。由于我们的目标是对给定的帧是否正常进行分类,而BoF(帧中视觉词的直方图)可以更好地代表帧的模式。在构建字典的阶段,训练bof被聚类,中心均值是所谓的码字,对应于训练过程中观察到的“正常”模式。对每个簇中数据与码字之间的距离建立高斯模型。为了确定给定帧是否正常,需要评估BoF特征,并计算测量最接近码字偏差的z分数。如果这样的BoF与最接近的码字相比是一个异常值(即高z分数),则该帧被分类为“异常”。通过地铁数据集验证了该方法的有效性。
{"title":"An Anomaly Detection by Whitening HOSF","authors":"Chun-Hui Wang, Yue Pan, Shwu-Huey Yen","doi":"10.1109/WAINA.2015.56","DOIUrl":"https://doi.org/10.1109/WAINA.2015.56","url":null,"abstract":"In this paper an improvement over our previous work is proposed to handle short-medium range surveillance videos. The features of histogram of oriented social force (HOSF) are the primitive building blocks to capture the interactions among people. To reduce the correlation among data, whitening procedure is applied on features. We use Bag-of-Feature (BoF) to pool HOSF in a given frame. Since our goal is to classify whether a given frame is normal and BoF, a histogram of visual words in a frame, can better represent patterns in term of frame. In the phase of building the dictionary, training BoFs are clustered and the center means are so called code words corresponding to \"normal\" patterns observed during the training process. A Gaussian model is constructed for distances between data and the codeword in each cluster. To decide whether a given frame is normal, the BoF feature is evaluated and the Z-score which measuring the deviation to the closest codeword is calculated. If such BoF is an outlier (i.e. High Z-score) comparing to the closest codeword, then the frame is classified \"abnormal\". The method is testified by the subway dataset with promising results.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"143 3 1","pages":"706-710"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91115005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Autonomous Anti-Disaster Base Station by Combination of Satellite and Wireless Networks 卫星与无线相结合的自主抗灾基站研制
Hiroaki Yuze, S. Nabeta, Yuji Ito
When a large-scale disaster occurs, it is crucial to secure means of communication. However, as the damage to the communication networks might be aggravated as the magnitude of the disaster becomes larger, it would likely cause a state where all communications are disrupted. In addition, as the amount of damage to the power plant and transmission line becomes more significant, it could disrupt the supply of electricity over an extended period of time. The purpose of this research is to develop an autonomous anti-disaster base station that houses a power supply system, which uses both solar panels and batteries as the source of power, and has satellite Internet and wireless LAN environment so as to contribute to the securing of Internet communication immediately following a great earthquake. We developed a prototype system of the autonomous anti-disaster base station that features two types of satellite Internet connection equipment. The prototype system was put through a demonstration experiment during an anti-disaster drill held at a university. During the anti-disaster drill, the students of the university that evacuated to a sports field used their own smart devices to connect to the wireless LAN access point of the prototype system and registered their safety information into the safety confirmation system of the university through the satellite Internet. The access log of the safety confirmation system allowed us to verify that access was successfully made to the safety confirmation system through the prototype system. In addition, we conducted a questionnaire survey of the university students following the drill and were able to verify the usefulness of the system.
当发生大规模灾难时,确保通信手段的安全至关重要。但是,随着灾害规模的扩大,对通信网络的破坏可能会加剧,很可能导致所有通信中断的状态。此外,随着电厂和输电线路的损坏程度越来越严重,它可能会在很长一段时间内中断电力供应。此次研究的目的是,为了在大地震发生后立即保障网络通信,开发具有太阳能板和电池供电系统、卫星网络和无线局域网环境的自主抗灾基站。我们开发了一个自主抗灾基站的原型系统,该系统具有两种类型的卫星互联网连接设备。该原型系统在一所大学举行的防灾演习中进行了演示实验。在抗灾演练中,疏散到运动场的大学学生使用自己的智能设备连接到原型系统的无线局域网接入点,并通过卫星互联网将自己的安全信息登记到学校的安全确认系统中。安全确认系统的访问日志允许我们验证通过原型系统成功访问安全确认系统。此外,我们在演练后对大学生进行了问卷调查,验证了系统的有效性。
{"title":"Development of Autonomous Anti-Disaster Base Station by Combination of Satellite and Wireless Networks","authors":"Hiroaki Yuze, S. Nabeta, Yuji Ito","doi":"10.1109/WAINA.2015.134","DOIUrl":"https://doi.org/10.1109/WAINA.2015.134","url":null,"abstract":"When a large-scale disaster occurs, it is crucial to secure means of communication. However, as the damage to the communication networks might be aggravated as the magnitude of the disaster becomes larger, it would likely cause a state where all communications are disrupted. In addition, as the amount of damage to the power plant and transmission line becomes more significant, it could disrupt the supply of electricity over an extended period of time. The purpose of this research is to develop an autonomous anti-disaster base station that houses a power supply system, which uses both solar panels and batteries as the source of power, and has satellite Internet and wireless LAN environment so as to contribute to the securing of Internet communication immediately following a great earthquake. We developed a prototype system of the autonomous anti-disaster base station that features two types of satellite Internet connection equipment. The prototype system was put through a demonstration experiment during an anti-disaster drill held at a university. During the anti-disaster drill, the students of the university that evacuated to a sports field used their own smart devices to connect to the wireless LAN access point of the prototype system and registered their safety information into the safety confirmation system of the university through the satellite Internet. The access log of the safety confirmation system allowed us to verify that access was successfully made to the safety confirmation system through the prototype system. In addition, we conducted a questionnaire survey of the university students following the drill and were able to verify the usefulness of the system.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"31 1","pages":"524-528"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87085015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1