2021 IEEE International Conference on Electro Information Technology (EIT)最新文献

筛选
英文 中文
Automotive Network Security 汽车网络安全
2021 IEEE International Conference on Electro Information Technology (EIT) Pub Date : 2021-05-14 DOI: 10.1109/EIT51626.2021.9491889
Dingwang Wang, S. Ganesan
{"title":"Automotive Network Security","authors":"Dingwang Wang, S. Ganesan","doi":"10.1109/EIT51626.2021.9491889","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491889","url":null,"abstract":"Today automobiles are no longer mere isolated mechanical devices, but are increasingly connected to the outside environment, e.g. V2I(Vehicle-to-Infrastructure), V2V(Vehicle-to-Vehicle), V2C(Vehicle-to-Cloud) and V2X(Vehicle-to-Everything)[1]. The high degree of connectivity makes vehicles exposed to a range of security and privacy threats. The increasingly interconnected demand of a vehicle’s control modules means there is no safety without security.In this paper we describe the vulnerability of CAN and Ethernet automotive buses. We present the multiple domain CAN buses connected to a high speed Gigabit automotive Ethernet. We describe backend computers and central computing gateways provide layered security. We explain that Hardware Security Modules and Message Authentication Code (MAC) in CAN frame will increase security. We suggest ways to protect automotive Ethernet bus.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121200664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security Analysis of 5G Network 5G网络安全分析
2021 IEEE International Conference on Electro Information Technology (EIT) Pub Date : 2021-05-14 DOI: 10.1109/EIT51626.2021.9491923
John A. Khan, M. Chowdhury
{"title":"Security Analysis of 5G Network","authors":"John A. Khan, M. Chowdhury","doi":"10.1109/EIT51626.2021.9491923","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491923","url":null,"abstract":"The popularity of mobile network connected devices continues to expand exponentially. An estimated 5 billion devices exist worldwide. With the expansion of wearable devices, a regular user can carry up to two network connected devices. The 5G network attracts users by advertising low latency data communication and high download and upload speeds. With the number of subscribers on the rise, it is no surprise that concerns of information and cyber security would heighten to match the integrity of data safety. As with any form of information security, there is always privacy concerns of users and their sensitive data. This paper shall provide an analysis of the security architectures of mobile connected networks, where these networks are susceptible in being compromised, popular attack techniques, and the mitigations against attacks.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126804400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Spatial Temporal Denoised Thermal Source Separation in Images of Compact Pulsed Thermography System for Qualification of Additively Manufactured Metals 用于增材制造金属鉴定的紧凑脉冲热成像系统图像的时空去噪热源分离
2021 IEEE International Conference on Electro Information Technology (EIT) Pub Date : 2021-05-14 DOI: 10.1109/EIT51626.2021.9491844
Xin Zhang, J. Saniie, A. Heifetz
{"title":"Spatial Temporal Denoised Thermal Source Separation in Images of Compact Pulsed Thermography System for Qualification of Additively Manufactured Metals","authors":"Xin Zhang, J. Saniie, A. Heifetz","doi":"10.1109/EIT51626.2021.9491844","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491844","url":null,"abstract":"We introduce a Spatial Temporal Denoised Thermal Source Separation (STDTSS) unsupervised machine learning (ML) algorithm for detection of material flaws in additively manufactured (AM) metals using pulsed thermography (PT) images obtained with compact infrared (IR) camera. Quality control of actual AM structures is necessary before their deployment, because AM metals can contain defects, such as pores, due intrinsic features of AM process. The PT nondestructive evaluation (NDE) method is based on recording material surface temperature transients with IR camera following thermal pulse delivered on material surface with flashlight. The PT method has advantages for NDE of arbitrary size AM structures because the method involves one-sided non-contact measurements and fast processing of large sample areas captured in one image. To reduce the cost and enable in-service NDE in spatially constrained environment, it is highly desirable to develop PT with compact and inexpensive IR camera. However, data cube obtained with PT based on compact IR camera suffers from strong thermal noises and loss of features due to relatively low sampling rate. The purpose of STDTSS algorithm is to compensate for uncertainties detection due to reduced resolution of low-cost hardware. The STDTSS algorithm consists of spatial and temporal denoising using Gaussian and Savitzky–Golay filtering, followed by the matrix decomposition using Principal Component Analysis (PCA), and Independent Component Analysis (ICA) to automatically detect flaws. We construct a compact PT system based on FLIR A65 camera, and demonstrate performance of STDTSS method in detection of imprinted calibrated defects in AM stainless steel 316L specimens.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132364327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Modified Combinatorial Design for Sparse NOMA System 稀疏NOMA系统的改进组合设计
2021 IEEE International Conference on Electro Information Technology (EIT) Pub Date : 2021-05-14 DOI: 10.1109/EIT51626.2021.9491914
Xing Hao, Yuteng Wu, Yu Xiao, G. Atkin
{"title":"Modified Combinatorial Design for Sparse NOMA System","authors":"Xing Hao, Yuteng Wu, Yu Xiao, G. Atkin","doi":"10.1109/EIT51626.2021.9491914","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491914","url":null,"abstract":"It is known that the Non-Orthogonal Multiple Access (NOMA) system can achieve higher spectral efficiency and massive connectivity. However, due to the linear combination of modulated symbols, the surjective-only mapping is raised with uncertainty and excessive the complexity in decoding process. In this paper, a construction method of a sparse structure for downlink NOMA system based on a modified combinatorial design with balanced incomplete block design (BIBD) is proposed, aiming at building systems with different diversity and more users. Our scheme can provide a one-to-one mapping pattern with a sparser multiple access structure. Then the complexity of the design and multiuser detection (MUD) can be leveraged owing to the distinctive discretizing distribution in reconstructed BIBD. This new scheme can easily transmit a large number of users within this system. Finally, numerical simulations show that this scheme can deploy more than 50 users with relatively low complexity.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128193631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Study of IoT MQTT Publish Latency 物联网MQTT发布延迟研究
2021 IEEE International Conference on Electro Information Technology (EIT) Pub Date : 2021-05-14 DOI: 10.1109/EIT51626.2021.9491838
Guoping Wang
{"title":"The Study of IoT MQTT Publish Latency","authors":"Guoping Wang","doi":"10.1109/EIT51626.2021.9491838","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491838","url":null,"abstract":"The Internet of things (IoT) is the inter-networking of physical devices, vehicles (also referred to as connected devices and smart devices), buildings, and other itemsembedded with electronics, software, sensors, actuators, and network connectivity that enable these objects to collect and exchange data. IoT allows objects to be controlled and gather information remotely across the already established network.In this paper, IoT latencies based on MQTT protocol are studied. Latency test results on Linux-based platform - Raspberry Pi using programming language C and Python are compared. Latency test results based on bare-metal embedded system are also described. MQTT local broker and remote broker are compared for all the testing results. These research results can help us to get a better understanding of the IoT performance for message publish and can be used as a metrics during IoT implementations.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128595156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensemble Learning Methods for Anomaly Intrusion Detection System in Smart Grid 智能电网异常入侵检测系统的集成学习方法
2021 IEEE International Conference on Electro Information Technology (EIT) Pub Date : 2021-05-14 DOI: 10.1109/EIT51626.2021.9491891
T. T. Khoei, Ghilas Aissou, When Chen Hu, N. Kaabouch
{"title":"Ensemble Learning Methods for Anomaly Intrusion Detection System in Smart Grid","authors":"T. T. Khoei, Ghilas Aissou, When Chen Hu, N. Kaabouch","doi":"10.1109/EIT51626.2021.9491891","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491891","url":null,"abstract":"Smart grid is an emerging technology that delivers intelligently to the end-users through two-way communication. However, this technology can be subject to several cyber-attacks due to this network's inherent weaknesses. One practical solution to secure smart grid networks is using an intrusion detection system (IDS). IDS improves the smart grid’s security by detecting malicious activities in the network. However, existing systems have several shortcomings, such as a low detection rate and high false alarm. For this purpose, several studies have focused on addressing these issues, using techniques, including traditional machine learning models. In this paper, we investigate the performance of three different ensemble learning techniques: bagging-based, boosting-based, and stacking-based. Their results are compared to those of three traditional machine learning techniques, namely K nearest neighbor, decision tree, and Naive Bayes. To train, evaluate, and test the proposed methods. We used the benchmark of CICDDos 2019 that consists of several DDoS attacks. Two feature selection techniques are used to identify the most important features. The performance evaluation is based on the probability of detection, probability of false alarm, probability of miss detection, and accuracy. The simulation results show that the stacking-based ensemble learning techniques outperform the other algorithms in terms of the four-evaluation metrics.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134451939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Area Division Cluster-based Algorithm for Data Collection over UAV Networks 基于区域划分聚类的无人机网络数据采集算法
2021 IEEE International Conference on Electro Information Technology (EIT) Pub Date : 2021-05-14 DOI: 10.1109/EIT51626.2021.9491898
Khedidja Medani, Houssem Guemer, Z. Aliouat, S. Harous
{"title":"Area Division Cluster-based Algorithm for Data Collection over UAV Networks","authors":"Khedidja Medani, Houssem Guemer, Z. Aliouat, S. Harous","doi":"10.1109/EIT51626.2021.9491898","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491898","url":null,"abstract":"In this paper, we consider the unmanned aerial vehicles (UAVs) as mobile sensors with flying ability to provide a timely and accurate vision over a large supervised area. The interconnection of these UAVs, in order to route the collected data to the control station on the ground, constitutes the flying ad hoc network (FANET). However, the UAVs features impose challenging issues to data collection and routing. Thus, the communications are prone to high-frequency link disconnections caused by the high mobility of UAVs. In this paper, we propose a reliable architecture to collect and route data to a ground station (GS). The proposed simple area division cluster-based algorithm (SAD-CA) provides a stable network architecture through the clustering technique in order to deal with the high mobility of the UAVs while preserving their energy consumption. The performance evaluation of the proposed algorithm, carried out using the network simulator 3 (NS3), has shown convincing results, in terms of energy consumption and network lifetime, outperforming those exhibited by the referred protocol.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127975289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evaluation of Deep Learning Neural Networks with Input Processing for Bearing Fault Diagonosis 带输入处理的深度学习神经网络在轴承故障诊断中的评价
2021 IEEE International Conference on Electro Information Technology (EIT) Pub Date : 2021-05-14 DOI: 10.1109/EIT51626.2021.9491871
Yuanyang Cai, Lizhe Tan, Junngan Chen
{"title":"Evaluation of Deep Learning Neural Networks with Input Processing for Bearing Fault Diagonosis","authors":"Yuanyang Cai, Lizhe Tan, Junngan Chen","doi":"10.1109/EIT51626.2021.9491871","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491871","url":null,"abstract":"Deep learning networks have been widely used as effective methods for bearing fault diagnosis. Deep learning neural networks such as convolutional neural network (CNN) use the images as inputs while the others such as long-short term memory (LSTM) may apply data sequences as inputs. This paper focuses on performance evaluations of deep learning networks by utilizing various signal transforms to form the network inputs. The CNN and LSTM are adopted as our deep learning network structures. Besides raw data, the algorithms for processing input signals include short-time Fourier transform (STFT), Cepstrum, wavelet packet transform (WPT), and empirical mode decomposition (EMD). Our simulations validate the effectiveness for each network input formulation based on the Case Western Reserve University’s (CWRU) bearing dataset.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128638332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Evaluation of RFID Security Systems and their Effectiveness RFID安全系统的评估及其有效性
2021 IEEE International Conference on Electro Information Technology (EIT) Pub Date : 2021-05-14 DOI: 10.1109/EIT51626.2021.9491901
Jeremy Ketterer, M. Chowdhury
{"title":"An Evaluation of RFID Security Systems and their Effectiveness","authors":"Jeremy Ketterer, M. Chowdhury","doi":"10.1109/EIT51626.2021.9491901","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491901","url":null,"abstract":"Radio Frequency Identification has tremendous potential when applied to security systems. From anti-theft to physical access, the technology has been applied in numerous ways to both enhance existing systems and become the core component of brand-new ones. While not foolproof, the application of RFID in security systems is seen worldwide, and for good reason. The versatility of RFID is a key factor when considering the widespread use of the technology in various security systems. Passive and active tags provide functionalities that only increase the overall effectiveness of the technology. The ability to make both tags and readers mobile provides a flexibility that makes the technology even more popular. Cost is another major benefit when utilizing RFID for a security system. Tags can be produced for pennies on the dollar, allowing system designers to attach tags to an enormous number of objects or products. Keeping costs down not only allows for higher expansion, but a lower initial cost when installing a new system. This paper discusses the definition and history of RFID, as well as a detailed background on the technology and how it works.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128406021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CB/PDMS Based Strain Gauge Using 3D Printed Mold 使用3D打印模具的CB/PDMS应变计
2021 IEEE International Conference on Electro Information Technology (EIT) Pub Date : 2021-05-14 DOI: 10.1109/EIT51626.2021.9491899
B. Liu, A. K. Bose, X. Zhang, Z. Zhang
{"title":"CB/PDMS Based Strain Gauge Using 3D Printed Mold","authors":"B. Liu, A. K. Bose, X. Zhang, Z. Zhang","doi":"10.1109/EIT51626.2021.9491899","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491899","url":null,"abstract":"A carbon black (CB) /polydimethylsiloxane (PDMS) composite based strain gauge was developed for bending measurements. The homogenous mixture of CB/PDMS composite was prepared by magnetic stirring and sonication process. The strain gauge was fabricated by depositing CB/PDMS composite into 3D printed mold. The capability of the strain gauge was investigated by flexing it on to surfaces, that were 3D printed, with varying radius curvature (ROC) ranging from 40 mm to 80 mm. The strain gauge response demonstrated an overall resistance change of ~9.73 %, ~6.03 %, ~4.41 %, ~3.42 and ~1.62 for ROC of 40 mm, 50 mm, 60 mm, 70 mm, and 80 mm, respectively. The results demonstrate that a CB/PDMS composite strain gauge fabrication from a 3D mold can be utilized for bending applications. The electromechanical response of the fabricated strain gauge as a function of resistance is investigated and presented in this paper.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114373032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信