Maricel O. Balitanas, R. J. Robles, Ronnie D. Caytiles, Yvette E. Gelogo, Tai-hoon Kim
{"title":"Protecting IP-based SCADA System with Crossed-Cipher Scheme","authors":"Maricel O. Balitanas, R. J. Robles, Ronnie D. Caytiles, Yvette E. Gelogo, Tai-hoon Kim","doi":"10.1109/UCMA.2011.35","DOIUrl":"https://doi.org/10.1109/UCMA.2011.35","url":null,"abstract":"To get the best of both types of cipher symmetric using AES (Advanced Encryption Standard) and the asymmetric ECC (Elliptic Curve Cryptography) to address the Confidentiality, Authentication, Integrity and Non-repudiation issues in SCADA system. With the posted threats to SCADA systems and listed vulnerabilities in this study, a retrofit for these threats through the crossed cipher scheme is presented.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130539634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SteganPEG Steganography + JPEG","authors":"Velagalapalli Lokeswara Reddy, Arige Subramanyam, Pakanati Chenna Reddy","doi":"10.1109/UCMA.2011.17","DOIUrl":"https://doi.org/10.1109/UCMA.2011.17","url":null,"abstract":"To days internet world is full of data thieves and hackers. So, there is a need to design a system that enables the internet users to exchange their secret and private data safely across the web. Steganograhy is such a tool. It hides the user data in other kinds of data, so that no one can suspect that some sensitive data is being transferred.. Stegan PEG is an application of image steganography. It hides files in a JPEG image. This paper describes the methods used by the application in achieving its goal.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"5 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114020896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Variability Management Case Study in Software Insurance Domain","authors":"Jeong Ah Kim","doi":"10.1109/UCMA.2011.27","DOIUrl":"https://doi.org/10.1109/UCMA.2011.27","url":null,"abstract":"Variability modeling and realization mechanism are suggested for software insurance product line what focused in domain technology features. Ontology-based modeling is applied in variability modeling for concepts, attributes, and constraints among the concepts. Ontology-based variability is modeled in XML since XML is very flexible for adding and ignoring the concepts and attributes. Ontology-based variability is realized with business rule management tools at run time. With software insurance product line, insurance company improve the quality and productivities in maintain the sales system.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121247255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Entrance Authentication System in Real-Time Using Face Extraction and the RFID Tag","authors":"Dae-Gi Min, Jae-Woo Kim, Moon-seog Jun","doi":"10.1109/UCMA.2011.13","DOIUrl":"https://doi.org/10.1109/UCMA.2011.13","url":null,"abstract":"In this paper, the proposal system can achieve the more safety of RFID System with the 2-step authentication procedures for the enhancement about the security of general RFID systems. After authentication RFID Tag, additionally, the proposal system extract the characteristic information in the user image for acquisition of the additional authentication information of the user with the camera. In this paper, the system which was proposed more enforce the security of the automatic entrance and exit authentication system with the cognitive characters of RFID Tag and the extracted characteristic information of the user image through the camera. The RFID system which use the active tag and reader with 2.4GHz bandwidth can recognize the tag of RFID in the various output manner. Additionally, when the RFID system have errors, the characteristic information of the user image is designed to replace the RFID system as it compare with the similarity of the color, outline and input image information which was recorded to the database previously. In the result of experiment, the system can acquire more exact results as compared with the single authentication system when it using RFID Tag and the information of color characteristics.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115611072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Clubbing of e-Commerce and Social Networking Sites","authors":"K. Hari, S. Rajan","doi":"10.1109/UCMA.2011.10","DOIUrl":"https://doi.org/10.1109/UCMA.2011.10","url":null,"abstract":"There has been an enormous increase of the usability of the Social Network websites. Similarly the online purchase has amplified many folds. This paper deals with the proposal of integrating the effectiveness of Social websites along with the e-commerce portals. By this way, the social network site and e-commerce site provide a collective platform for promotion of the items and the e-commerce portal can take advantage of the existing usability features of the social networking websites. Also content related advertisements can be placed in the sites and can invoke interests among the website users. The marketing strategies may include the whiz list, informing the buyer's friends list about the purchased item of the buyer and much more.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132712897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Jang, Young-Gu Lee, Jeong-Jae Kim, Hoon Ko, Moon-seog Jun
{"title":"A Group Key Exchange Scheme Using Two-Dimensional Array between Sensor Nodes in Sensor Network Environment","authors":"S. Jang, Young-Gu Lee, Jeong-Jae Kim, Hoon Ko, Moon-seog Jun","doi":"10.1109/UCMA.2011.12","DOIUrl":"https://doi.org/10.1109/UCMA.2011.12","url":null,"abstract":"These days, with the implementation of ubiquitous computing concept, sensor networks that collect analyze and process information of things and environment through sensors have become a huge interest as the technology that would realize this concept. However, sensor network technology has wireless communication infrastructure as its foundation and fundamentally has security weakness with limitations on low computing capacity, power supply and low budget. The core of group telecommunications between sensor network sensor nodes is the group key management. Managing group key requires appreciating group key security and management mechanism efficiency. This paper takes the characteristics of sensor network into consideration and not only increases the group key agreement efficiency through Two-dimension array key set distribution and not the existing group key method to satisfy both the network function and security but also protects information between each nodes thereby enhancing the sense of security.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"31 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120815958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Local Buffer Management Algorithm in Wireless Sensor Networks with Mobile Collectors","authors":"Sungsuk Kim, S. Yang","doi":"10.1109/UCMA.2011.23","DOIUrl":"https://doi.org/10.1109/UCMA.2011.23","url":null,"abstract":"In wireless Sensor Networks(WSNs), the energy for the sensor nodes that are close to the base station will be quickly depleted due to their high data transmission activities. To address the problem, the concept of Mobile Collectors(MC) is introduced, but in spite of it, local buffer management algorithm is needed, which is our main concern in this paper. At first, each sensor only transmits its gathered data with a MC. If a raw data shows regularity two consecutive periods according to criterion, the value will be stored in a different form. To do so, local buffer is divided into two parts : Correct Data(CD) and Differential Data(DD). In this way, the data needs less storage without the loss of data accuracy. We have implemented a simulator to evaluate the efficiency of the proposed algorithm. From the results, we come to know our algorithm is fairly efficient compared with the normal form.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121290130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}