{"title":"A classification of web browser fingerprinting techniques","authors":"Randika Upathilake, Yingkun Li, A. Matrawy","doi":"10.1109/NTMS.2015.7266460","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266460","url":null,"abstract":"As the World Wide Web has increasingly become a necessity in daily life, the acute need to safeguard user privacy and security has become manifestly apparent. After users realized that browser cookies could allow websites to track their actions without permission or notification, many have chosen to reject cookies in order to protect their privacy. However, more recently, methods of fingerprinting a web browser have become an increasingly common practice. In this paper, we classify web browser fingerprinting into four main categories: (1) Browser Specific, (2) Canvas, (3) JavaScript Engine, and (4) Cross-browser. We then summarize the privacy and security implications, discuss commercial fingerprinting techniques, and finally present some detection and prevention methods.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"3 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132893853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards power profiling of Android permissions","authors":"K. Adlard, Tharanga Ekanayake, A. Matrawy","doi":"10.1109/NTMS.2015.7266526","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266526","url":null,"abstract":"As the popularity of smart phones and tablets grow, the battery life of these devices is becoming an important issue. The Android OS uses permissions to control access to software and hardware components of the device. Therefore, depending on the combination of permissions allowed by the user, a different set of hardware components will be used and hence a particular device may experience different battery consumption patterns depending on the set of allowed permissions. In this position paper we provide a preliminary experimental evaluation of the relation between some popular Android permissions and battery consumption by the device while these permissions are allowed. While battery consumption is an issue in different platforms, we chose to study this on Android because of the user's involvement in the Android permission model. We are hoping that these results will be the basis of further investigation into battery usage profiling of different Android applications based on the analysis of their permission requests and usage.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123652971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pierpaolo Cincilla, Arnaud Kaiser, B. Lonc, H. Labiod, Remi Blancher, C. Jouvray, Richard Denis, Antoine Boulanger
{"title":"Security of C-ITS messages: A practical solution the ISE project demonstrator","authors":"Pierpaolo Cincilla, Arnaud Kaiser, B. Lonc, H. Labiod, Remi Blancher, C. Jouvray, Richard Denis, Antoine Boulanger","doi":"10.1109/NTMS.2015.7266520","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266520","url":null,"abstract":"Cooperative Intelligent Transport Systems (C-ITS) offer innovative ways of wireless communication between Intelligent Transport Systems (ITS) stations and ITS road-side stations. They favour the development of ITS applications to improve traffic management, road safety, mobility and other comfort services. C-ITS systems have to guarantee communication security, especially in heterogeneous network environments. Safety critical applications require authentication to avoid attackers to send spoofed or reforged information, nevertheless, cars and drivers privacy must be maintained. We present a demonstration of the C-ITS security management infrastructure of the ITS-Security (ISE) project [1]. Through our demonstrator we show how ISE provides message authentication without violating cars and drivers privacy. Our demonstrator allows the public to run an attack scenario with and without the ISE security system, making evident importance of securing ITS communications.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128563927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cloud-based architecture for network attack signature learning","authors":"O. Hamdi, M. Mbaye, F. Krief","doi":"10.1109/NTMS.2015.7266461","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266461","url":null,"abstract":"Intrusion Detection System (IDS) is an essential component of the network security infrastructure. It detects malicious activities by monitoring network traffic. There are two main classes of IDS: the anomaly-based IDS and signature-based IDS. An important challenge, for signature-based IDS, is automating attack signature writing from traffic logs, which can be very hard to be established for human administrator. In this paper, we propose a solution addressing this challenge. We propose cloud-based signature learning service using Inductive Logic Programming (ILP). Learning service generates rule describing properties shared by packets labelled as malicious and that do not cover normal packets. The system uses a background knowledge composed of predicates used to describe network attack signature. The cloud architecture of our IDS enables it to have specialized nodes. Preliminary experimentations show that the proposed system is able to reproduce automatically SNORT signature.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117283462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless sensor device hardware architecture — Design and analysis for high availability","authors":"D. Selvakumar, K. Nanda, H. Pasupuleti","doi":"10.1109/NTMS.2015.7266533","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266533","url":null,"abstract":"Wireless sensor node or end device or mote is an entity which gathers information from the sensors and communicates to a remote location through set of routers and gateway. The reliability, availability, periodic verification of its healthiness etc. are paramount important for enhancing the usability of WSN system for practical applications. The above can be fulfilled, by adopting various hardware and software design techniques, considerations and options which enable reliable and verifiable hardware/software. This work exclusively discusses hardware design and analysis for high availability of a mote. The various design aspects and considerations such as, dual RF, wakeup radios, redundant reliable power sources and efficient energy/power management, health check of power sources, dynamic voltage and frequency scaling, remote programming of end device, remote reset of end device, system level ESD protection, RF shielding, external watch dog timer and real-time clock etc. have been discussed and analyzed. The uniqueness of our design is reliable redundant power sources and management and on-board dual RF transceivers. The testing and characterization, RF performance results of the fabricated device including EMI/EMC tests have also been presented.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132968385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On-the-fly algorithm for the service composition problem","authors":"H. Farhat, G. Feuillade","doi":"10.1109/NTMS.2015.7266511","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266511","url":null,"abstract":"The behavioral service composition problem arises when no available service can achieve a target behavior. The composition problem consists in building a special service, an orchestrator, which schedules the actions of the services to produce a behavior equivalent to the target one. In this paper, services are modeled as nondeterministic transition systems and the behavior of the composition realizes the behavior of the target. We propose an algorithm that avoids the full computation of the product of services, and instead constructs the orchestrator incrementally. Unlike most algorithms where the whole state space, which is exponential in the number of services, is visited, the proposed algorithm can find a solution by visiting only the pertinent portion of the state space. We also show that this on-the-fly behavior can be paired with a heuristic to speed up the synthesis.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125739274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aymen Boudguiga, Antoine Boulanger, P. Chiron, W. Klaudel, H. Labiod, Jean-Christophe Seguy
{"title":"RACE: Risk analysis for cooperative engines","authors":"Aymen Boudguiga, Antoine Boulanger, P. Chiron, W. Klaudel, H. Labiod, Jean-Christophe Seguy","doi":"10.1109/NTMS.2015.7266516","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266516","url":null,"abstract":"Nowadays, Cooperative Intelligent Transport Systems (C-ITS) are not fiction anymore. Prototypes of self-driving vehicles are flourishing everywhere, e.g. Google driverless car. These new generation vehicles are not only intelligent as they do not need human intervention during cruise, but they also communicate together creating a cooperative network. However, C-ITS are becoming the prey of hackers and the target of cyberattacks. Consequently, a reliable risk analysis method needs to be defined to prevent C-ITS threats and to assess their vulnerabilities. In this paper, we define a simple and efficient risk analysis method called RACE. We compare it to two of main risk analysis methods, namely TVRA and EVITA.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123492612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lifetime optimization of sensor-cloud systems","authors":"Leila Ben Saad, B. Tourancheau","doi":"10.1109/NTMS.2015.7266502","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266502","url":null,"abstract":"Sensor-Cloud is an emerging technology and popular paradigm of choice in systems development for various real-life applications. It consists in integrating wireless sensor networks with cloud computing environment. In fact, the cloud provides new opportunities of massive data storage, processing and analysing that wireless sensor networks can not offer. Despite the fact that the cloud have helped to overcome many wireless sensor networks limitations, there are other challenging issues that need to be addressed. The major problem that can significantly affect Sensor-Cloud performance is the short lifetime due to limited energy supply of sensors and sometimes some sinks. In this work, we propose a Sensor-Cloud Optimization problem (SCL-OPT) that maximizes lifetime as well as increases energy efficiency of sensors and sinks layers.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"10 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120922208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoE-aware multiple sinks mobility in wireless sensor networks","authors":"J. P. J. Peixoto, D. G. Costa","doi":"10.1109/NTMS.2015.7266515","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266515","url":null,"abstract":"Wireless sensor networks can be used to monitor and gather information from different environments, supporting a large set of applications that need constant monitoring. In some applications, the use of multiple mobile sinks can improve the network traffic and reduce energy consumption, leading to a higher network lifetime. Depending on the application characteristics, the priority of each sensor node can be considered in order to determine the positions of the mobile sinks, reducing the number of hops between high priority nodes and the sinks. We propose a QoE-aware multiple mobile sinks positioning approach aimed at the reduction of energy consumption in wireless sensor networks by shortening the distance of high priority nodes to the sinks. We believe that such approach can bring valuable results for sensing monitoring applications.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117119322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Zonal fairness in wireless infrastructure","authors":"M. Köppen, M. Tsuru","doi":"10.1109/NTMS.2015.7266534","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266534","url":null,"abstract":"Fairness models can be roughly categorized into two groups: proportional fairness based models balancing the relative values of allocated goods, and maxmin fairness based models with reference to absolute valuations. In a specific problem domain it appears that only one fairness model can be used. Here a situation is studied where the users of a wireless infrastructure have in fact conflicting interests with regard to the chosen fairness model. A fair bargaining approach to balance those conflicting interests is presented based on the specification of a binary relation that combines product and lexicographic maxmin and whose maximum set gives the desired solutions to a mixed zonal fairness problem. The application of the approach is presented by analysis of an optimal distinction between users near or far to a base station, and a peak in the total performance related to that maximum could be identified that surpasses both, the allocation by maxmin fairness as well as the allocation by proportional fairness. In addition the approach offers a rich potential of variations that allows application to many other network domain models.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129576713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}