Dragos Draghicescu, Alexandru Caranica, Alexandru Vulpe, O. Fratu
{"title":"Crypto-Mining Application Fingerprinting Method","authors":"Dragos Draghicescu, Alexandru Caranica, Alexandru Vulpe, O. Fratu","doi":"10.1109/iccomm.2018.8484745","DOIUrl":"https://doi.org/10.1109/iccomm.2018.8484745","url":null,"abstract":"Computing power has increased exponentially in the last decades, and more and more consumer devices are now permanently connected to the internet, to form the so called “Internet of Things” (IoT), Following this trend, security threats and vulnerabilities have increased drastically over a short period of time, as more and more devices are inter-connected and not properly secured. Lately, the growing popularity of Bitcoin and other cryptocurrencies are generating a lot of hype and concern, among security specialists, as unwanted mining applications on an end-user device can potentially pose both security risks and increased operating costs. There are multiple ways of detecting unwanted applications at the user-level, by means of URL blocking and application fingerprinting, and this paper will cover a detection method proposed by our group.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129646006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compact Antenna for UHF IoT LPWAN Sensor","authors":"A. Tatomirescu","doi":"10.1109/ICCOMM.2018.8430154","DOIUrl":"https://doi.org/10.1109/ICCOMM.2018.8430154","url":null,"abstract":"The design of compact UHF antenna is proposed that can be used for an internet of things(IoT) sensor. The intended communication protocols are the ones used in Low Power Wide Area networks (LPWAN) using the 868 Mhz band in Europe. Practical consideration have been given to the design in question by including the electronics and battery in the simulation scenario. A high radiating efficiency is obtained given the the element electrical size of less than lambda/8. The matching bandwidth is close to 2 percent ensuring that the 3 MHz required for LPWAN protocols operating in the ISM band are covered even with manufacturing uncertainties. This is achieved by designing the antenna around the unique specification for this compact sensor which occupies a volume of 45×30×4 cubic mm.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126349792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Complex Domain Adaptive System Identification Using Sparse Affine Projection Normalized Correlation Algorithms Under Impulsive Noises","authors":"P. Rakesh, T. Kishore Kumar, F. Albu","doi":"10.1109/iccomm.2018.8484791","DOIUrl":"https://doi.org/10.1109/iccomm.2018.8484791","url":null,"abstract":"Sparse adaptive filters are used extensively for enhancing the filter performance in a sparse system. The affine projection algorithm (APA) is effective in improving the convergence speed for strongly correlated input signals, but it is very sensitive to impulsive noise. Normalized Correlation Algorithm (NCA) is robust in impulsive noise environments. The affine projection normalized correlation algorithm (AP-NCA) used in complex-domain adaptive filters, combines the benefits of APA and NCA and it does not take into account the underlying sparsity information of the system. In this paper, we develop sparse AP-NCA algorithms to exploit system sparsity as well as to mitigate impulsive noise with correlated complex-valued input. Simulation results show that the proposed algorithms exhibit better performance than the AP-NCA for a sparse system. The robustness of these algorithms is evaluated in terms of Mean square error (MSE) performance in the adaptive system identification context.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":" 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120829792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Copyright","authors":"","doi":"10.1109/iccomm.2018.8484833","DOIUrl":"https://doi.org/10.1109/iccomm.2018.8484833","url":null,"abstract":"","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124302449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"2018 12th International Conference on Communications (COMM)","authors":"Ieee Staff","doi":"10.1109/iccomm.2018.8484830","DOIUrl":"https://doi.org/10.1109/iccomm.2018.8484830","url":null,"abstract":"2018 12th International Conference on Communications (COMM)","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122799062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Privacy and Security Issues for the Internet of Things in the GDPR Era","authors":"Laura Vegh","doi":"10.1109/ICCOMM.2018.8453643","DOIUrl":"https://doi.org/10.1109/ICCOMM.2018.8453643","url":null,"abstract":"The Internet of Things (IoT) has become a topic of great importance both in research and in industry alike. Seeing the advances in technology made during the last decade and how technology is in every part of our everyday lives, the rise of the IoT feels natural. Security and privacy are two extremely important topics in anything technology and communications related. However, the Internet of Things with its high complexity and large number of interconnected components adds to the challenge. Furthermore, this year researchers worldwide are faced with an unprecedented issue: a new European regulation - The General Data Protection Regulation (GDPR) - a law aimed to give back the power over the personal data to the people. It is also a law that sets extremely high standards for privacy in all areas. Many are concerned that the IoT paradigm is at risk, as it seems almost impossible to ensure the level of privacy and security required by the GDPR. This article presents a survey of the most important privacy solutions currently available and analyzes how these solutions can be used in the current scenario.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123903839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahmood Jalal Ahmad Al Sammarraie, Alexandru Martian, C. Vladeanu
{"title":"Adaptive IED Spectrum Sensing Algorithm for Different Duty Cycle Values","authors":"Mahmood Jalal Ahmad Al Sammarraie, Alexandru Martian, C. Vladeanu","doi":"10.1109/ICCOMM.2018.8430110","DOIUrl":"https://doi.org/10.1109/ICCOMM.2018.8430110","url":null,"abstract":"The Energy Detection (ED) represents the most used and the simplest solution for implementing spectrum sensing in Cognitive Radio (CR) systems. Previously, an Improved ED (IED) algorithm was proposed, which estimates the average energy over more consecutive sensing slots. We propose an Adaptive threshold IED (AIED) algorithm, which requires some a priori knowledge about the Primary User (PU) signal, such as its average duty cycle and Signal-to-Noise Ratio (SNR). We compared the performance of the AIED algorithm with the Adaptive Classical ED (ACED) algorithm for different SNR and duty cycle values. For the same decision error probability, we demonstrate a detection SNR gain of more than 1 dB of AIED over ACED, in the low SNR regime, for high duty cycle values.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127059617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Anatomy of a Quasi-Static Arithmetic Encoder","authors":"Sabin Belu, D. Coltuc","doi":"10.1109/ICCOMM.2018.8430114","DOIUrl":"https://doi.org/10.1109/ICCOMM.2018.8430114","url":null,"abstract":"The paper proposes a new architecture for arithmetic encoders called Quasi-Static. Unlike the classical implementations, the Quasi-Static Encoder buffers the input stream and uses a static model for encoding the data in the buffer. The big advantage of such approach is the higher encoding speed obtained however with the price of slight degraded compression rates. The Quasi-Static Encoder is tested on three types of data - English text, log files and binary files - and compared with two dynamic arithmetic encoders. For 128kB buffers, the Quasi-Static Encoder is about 3.6 times faster than the dynamic counterparts. The loss in compression rate depends on data type and the considered dynamic implementation. The Quasi-Static Encoder outperforms Dippenstein's implementation on English texts and exe files and is below Sachin Garg implementation that gains between 0.08 and 0.20 bpb in compression rate.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123748145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Elastic Search in Cache Based Service Management for Healthcare Automation","authors":"Harshit Sinha, Dew ang, G. Raj","doi":"10.1109/ICCOMM.2018.8430162","DOIUrl":"https://doi.org/10.1109/ICCOMM.2018.8430162","url":null,"abstract":"Healthcare Automation is an area, which involves various services, such as the housekeeping & patient management system. There is a incredible quantity of consideration and focusing to improve health. Big healthcare survey organizations illustrate that sickness and death rate, to a great extent rely on accessing of suitable healthcare systems, which is not accessible to an enormous preponderance of the worldwide inhabitants. This research paper introduce automating healthcare functions such as monitoring, accessing of information of patients by doctors using effective grid search technology, interactive user interface assistance for the doctors and junior doctors for any queries & cache management technology based web application for efficient performance. We elucidate our thoughts on how technology can aid in this vital and crucial life sustaining goings-on. We provide insight hooked on our effort on automating medical sector by means of text mining techniques, Natural Language Processing, Elastic Search, PHP-MVC, Web Services and Cache and include some initial results.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115893543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Defined Radio for Analyzing Drone Communication Protocols","authors":"Dan Mototolea, Comelis Stolk","doi":"10.1109/iccomm.2018.8484821","DOIUrl":"https://doi.org/10.1109/iccomm.2018.8484821","url":null,"abstract":"The aim of this research is to determine the possibilities of using commercial off the shelf FPGA based Software Defined Radio Systems to analyze and understand small drone communication protocols in order to hijack or smart jam the receiver. A study on decoding the DSM2 protocol of communication is presented. In order to understand the protocol, raw RF data were collected using Software Defined Radio and LabView software. A set of tools were written in MAT LAB to analyze the data, extract the bursts, perform synchronization and demodulate the chips. Understanding the communication is vital when creating a counter drone system. The possibility of smart jamming the DSM2 protocol of communication is analyzed in the final part of the paper.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"25 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120850865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}