{"title":"A systematic mapping on security threats in mobile devices","authors":"Anselmo Lacerda, R. D. de Queiroz, M. Barbosa","doi":"10.1109/ITECHA.2015.7317411","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317411","url":null,"abstract":"The increase in the use of mobile devices and the large amount of sensitive information that they store make them valuable targets for cybercriminals. In this work, we use the systematic mapping methodology to identify what are the main security incidents targeting mobile devices and what are their main causes. Finally, this research aims to propose some guidelines to avoid or minimize the extent of the damages provoked by these incidents.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133490923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Verovko, Oleksandr Verovko, V. Kazymyr, John N. Davies, V. Grout
{"title":"Performance concerns when implementing infrastructure security in IPv4/IPv6 networks","authors":"M. Verovko, Oleksandr Verovko, V. Kazymyr, John N. Davies, V. Grout","doi":"10.1109/ITECHA.2015.7317393","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317393","url":null,"abstract":"Internet Service Providers (ISPs) throughout the world are beginning the rollout of IPv6 networks to cater for the increase in the number of devices connected to the Internet. Without the use of this technology the internet would not be able grow at the present rate. Network security has become a very important function of the network infrastructure since it has the ability to limit the packets that can be passed. This functionality is usually implemented as an Access Control List (ACL) within a router. ACLs are created from rules that specify the action to be taken for any packet which is tested and matched against it. Rules are put together to form an ordered. If a match is made on a particular rule the packet is either permitted or denied and no further rules are evaluated. This paper investigates the effect on the delays through a router when ACLs are implemented using an IPv6 addressing scheme. With the increase in the bandwidth of networks the delays through networking equipment can become significant and so this is the main area of research. A comparison is made with similar ACLs implemented in an IPv4 and IPv6 network. Additionally the tests are repeated using an IPv6-IPv4-IPv6 Tunnel to compare the delays with the previous results. To eliminate the uncertainties related to the internet performance a set of experiments were conducted on a laboratory network ensuring that the comparisons are consistent.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126473197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. D. Sparrow, A. A. Adekunle, R. J. Berry, R. Farnish
{"title":"Simulating and modelling the impact of secure communication latency for closed loop control","authors":"R. D. Sparrow, A. A. Adekunle, R. J. Berry, R. Farnish","doi":"10.1109/ITECHA.2015.7317384","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317384","url":null,"abstract":"Closed loop control systems have been implemented to conduct a variety of tasks (e.g. manufacturing and automation). Industrial Control System (ICS) have been used to regulate a closed loop process; however, ICS are exposed to the same security vulnerabilities associated with enterprise networks. Cryptography has been deployed to overcome the associated data communication weaknesses between each ICS node through the use of block ciphers; however, the drawback of applying cryptographic algorithms to ICS is the additional communication latency. This paper investigates the relationship between security constructs and latency for closed loop control system with test conducted in a simulated environment. A case scenario is illustrated to demonstrate the impact of the results obtained to a real world context.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121023198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Personalized learning materials for children with special needs using machine learning","authors":"Likhan Banik, Monir Bhuiyan, Azmery Jahan","doi":"10.1109/ITECHA.2015.7317390","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317390","url":null,"abstract":"Children with neurological disorder such as autism need personalized development system for their daily activities. Technology can play a significant role. This paper introduces a research to deliver personalized learning materials for children with special needs based on diverse characteristics of children. There are four parts of the system: i) identifying level of the user by using machine learning algorithm. ii) web mining to generate multimodal learning materials from text story or learning keywords, iii) linking user preferences and IoT enabled sensor data with the result, iv) personalizing contents for users delineated with an intelligent interface. This paper explains personalization of results using machine learning algorithm.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122413137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. A. Jan, F. Elmegri, M. Bin-Melha, R. Abd‐Alhameed, M. Lashab, C. See
{"title":"Compact size uni-planer small Metamaterial-Inspired antenna for UWB applications","authors":"N. A. Jan, F. Elmegri, M. Bin-Melha, R. Abd‐Alhameed, M. Lashab, C. See","doi":"10.1109/ITECHA.2015.7317443","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317443","url":null,"abstract":"In this paper, low profile planar Metamaterial-Inspired coplanar fed waveguide antenna is presented for WLAN and Ultra-Wideband applications. The antenna is based on a simple strip loaded to a rectangular patch and zigzag E-shape metamaterial-inspired unit cell. The idea behind the proposed antenna is to enable miniaturization effect. The proposed antenna can provide dual band operation, the first one is a Wi-Fi band at 2.45 GHz having impedance bandwidth of 150MHz, the second one is an ultra wide band extended from 4.2 GHz to 6.5 GHz. Two antennas are designed and fabricated with and without metamaterial-inspired loading. The simulated and measured results regarding Return loss (S11), Gain and Radiation pattern are discussed.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"22 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121012992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Secil Senel-Kleine, Johannes Bouché, Martin Kappes
{"title":"On the usefulness of machine learning techniques in collaborative anomaly detection","authors":"Secil Senel-Kleine, Johannes Bouché, Martin Kappes","doi":"10.1109/ITECHA.2015.7317397","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317397","url":null,"abstract":"Due to the increase in network attacks, anomaly detection has gained importance. In this paper, we present and investigate the idea of institutions cooperating for performing anomaly detection, i.e. institutions jointly analyzing their network traffic, in order to identify malicious attacks, using classification-based machine learning techniques. We compare the results of such a collaborative analysis with a single analysis. Moreover, as institutions might not be willing to share confidential data, we analyze the benefits of a collaborative approach if some parts of the traffic are being anonymized. While, intuitively, having more data at hand should lead to improved detection rates, our results indicate that a federated analysis using standard classification-based methods improves detection rates only slightly. Moreover, when using anonymized data, the obtained detection rates of a joint data analysis further deteriorate such that the analysis of individual traffic is more useful. Thus, our research indicates that the classical classification based machine learning approaches for anomaly detection must be adapted and improved in order to leverage the advantage of having data from various sources.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128408297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Atojoko, R. Abd‐Alhameed, H. Rajamani, N. McEwan, C. See, P. Excell
{"title":"Design and analysis of a simple UHF passive RFID tag for liquid level monitoring applications","authors":"A. Atojoko, R. Abd‐Alhameed, H. Rajamani, N. McEwan, C. See, P. Excell","doi":"10.1109/ITECHA.2015.7317453","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317453","url":null,"abstract":"Radio Frequency Identification (RFID) systems has gained increasing popularity with multiple deployments to existing wireless sensors in a view to achieve energy and overall operational efficiency at a much lower cost. This paper presents the design and analysis of a UHF (860-868MHZ) passive tag using HFSS (High Frequency Structural Simulator) platform. It explores specific tag geometry characteristics that affect overall tag antenna performance and presents the optimised result. The simulation results and parametric analysis are compared. Further simulations on HFSS platform is carried out to theoretically demonstrate the reflections of the tag when deployed as sensors to multiple levels of a cistern.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130461396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Bomhara, J. Gardiner, Huthaifa Obeidat, R. Abd‐Alhameed
{"title":"CP-QFSK modem for TDMA short range communications systems","authors":"M. Bomhara, J. Gardiner, Huthaifa Obeidat, R. Abd‐Alhameed","doi":"10.1109/ITECHA.2015.7317454","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317454","url":null,"abstract":"Work presented in this paper investigates the feasibility of Continuous-Phase Quaternary Frequency Shift Keying (CP-QFSK) with limiter-discriminator detection modem as a viable dual data rate system that can be employed in TDMA short range communications systems. It offers a great deal of spectral efficiency in multi-channel systems, hardware simplicity and robustness to adjacent Channel Interference (ACI). The interrelated system design parameters are defined and optimized and the system performance in different propagation media is evaluated. Simulation results have demonstrated that adjacent channel rejection factor of 40 dB has been achieved and that the CP-QFSK system outperforms the GMSK modulation scheme as it causes far less ACI, and hence coexists well in a multi-channel system. Error correction coding has been applied to enhance the system quality.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134200630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two basic iterative solving methods of Cauchy problem of the first order equations","authors":"K. Younis, Nikolay Tsapenko","doi":"10.1109/ITECHA.2015.7317410","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317410","url":null,"abstract":"In this paper by employing similar standard methods, the theorem of two essential iterative processes namely, Pickard and Newton's applicable to Cauchy's problem for the first order ordinary differential equations have been proved. Those methods permit to compare the mentioned processes by both its convergence acceleration and by its segment length convergence. It has been demonstrated that, the iteration calculated by Newton's method, incomparably excessive rapidity approach to the exact solution. In the same time the segment lengths for which the given iterative process converges, do not diverge too much from each other. The application of the solution method of the general Ricatti's equation with acquired numerical results, developed by the authors has been revealed.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133595793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Adeka, S. Shepherd, R. Abd‐Alhameed, Nuredin A. S. Ahmed
{"title":"A Versatile and Ubiquitous Secret Sharing","authors":"Muhammad Adeka, S. Shepherd, R. Abd‐Alhameed, Nuredin A. S. Ahmed","doi":"10.1109/ITECHA.2015.7317449","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317449","url":null,"abstract":"The Versatile and Ubiquitous Secret Sharing System, a cloud data repository secure access and a web based authentication scheme. It is designed to implement the sharing, distribution and reconstruction of sensitive secret data that could compromise the functioning of an organisation, if leaked to unauthorised persons. This is carried out in a secure web environment, globally. It is a threshold secret sharing scheme, designed to extend the human trust security perimeter. The system could be adapted to serve as a cloud data repository and secure data communication scheme. A secret sharing scheme is a method by which a dealer distributes shares of a secret data to trustees, such that only authorised subsets of the trustees can reconstruct the secret. This paper gives a brief summary of the layout and functions of a 15-page secure server-based website prototype; the main focus of a PhD research effort titled `Cryptography and Computer Communications Security: Extending the Human Security Perimeter through a Web of Trust'. The prototype, which has been successfully tested, has globalised the distribution and reconstruction processes.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"48 43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124221123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}