Proceedings of the 3rd International Conference on Future Networks and Distributed Systems最新文献

筛选
英文 中文
User Authentication Scheme for Greenhouse Remote Monitoring System using WSNs/IOT 基于WSNs/IOT的温室远程监控系统用户认证方案
M. Akhtar, M. Hussain, J. Arshad, Mudassar Ahmad
{"title":"User Authentication Scheme for Greenhouse Remote Monitoring System using WSNs/IOT","authors":"M. Akhtar, M. Hussain, J. Arshad, Mudassar Ahmad","doi":"10.1145/3341325.3342039","DOIUrl":"https://doi.org/10.1145/3341325.3342039","url":null,"abstract":"Use of modern machinery and technology has significantly reduced the labor work in agriculture. The next level was to make growth of vegetables/ crops independent of seasons. This was made possible by introducing greenhouses. Essence of greenhouse lies in control of environmental parameters like temperature, humidity, light, pressure and CO 2 as per specific crop needs. Integrating IOT technology with greenhouse enables us to remotely monitor the greenhouse environment and control its parameters intelligently. OT and WSNs deployed in greenhouse require a secure and efficient connectivity with monitoring/ control room. While deploying a WSN for greenhouse following aspects are worth considering. Hardware Connectivity User Authentication The objective of this research is to devise a user authentication scheme for deployment of IOT in greenhouse environment.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121243482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Two-steps QoS-aware services composition algorithm for Internet of Things 面向物联网的两步qos感知服务组合算法
Mohamed Essaid Khanouche, Sihem Mouloudj, Melissa Hammoum
{"title":"Two-steps QoS-aware services composition algorithm for Internet of Things","authors":"Mohamed Essaid Khanouche, Sihem Mouloudj, Melissa Hammoum","doi":"10.1145/3341325.3342017","DOIUrl":"https://doi.org/10.1145/3341325.3342017","url":null,"abstract":"The Internet of Things (IoT) is a global infrastructure that provides services having similar functionality but with different quality of service (QoS). The fast growing of these services leads to a difficulty of selecting the most appropriate services to fulfill a complex user's requirement. It is therefore necessary to automate the mechanism for selecting the appropriate services in order to satisfy both functional and non-functional user's requirements. In this paper, a two-steps QoS-aware services composition algorithm (TS-QCA) based on clustering and shuffled frog leaping algorithm (SFLA) is proposed in the context of large-scale IoT environments. This approach aims at minimizing the composition time through accelerating the algorithm convergence by using the clustering technique and the exploitation of the parallel aspect of the SFLA algorithm. The simulation results demonstrate that the proposed algorithm is scalable and achieves a near-to-optimal composition in a reduced amount of composition in comparison to other services composition approaches proposed in the literature.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"os-53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127793391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Lightweight Two-Factor Authentication Scheme for Mobile Cloud Computing 一种轻量级的移动云计算双因素认证方案
A. Abuarqoub
{"title":"A Lightweight Two-Factor Authentication Scheme for Mobile Cloud Computing","authors":"A. Abuarqoub","doi":"10.1145/3341325.3342020","DOIUrl":"https://doi.org/10.1145/3341325.3342020","url":null,"abstract":"Mobile Cloud Computing (MCC) offers a new world of promise, and can be leveraged to improve the quality of mobile services. MCC brings cloud storage, processing and communication benefits to resource-constrained mobile devices. While MCC adoption is growing significantly, various key challenges need to be addressed to make MCC-based solutions scale and meet the ever-growing demand for more resource intensive applications. The enormous volume of data that is collected from and stored on mobile devices poses information security and privacy concerns for individuals, enterprises and governments. Limited computing and energy resources makes authentication and encryption a challenging task. To preserve user's privacy and ensure security, MCC establishes authenticated communication sessions between the mobile device and cloud servers. In this position paper, an overview of MCC authentication approaches is presented. Then, a lightweight two-factor, password and smart card, authentication for mobile cloud-connected devices is described. The proposed authentication scheme aims at increasing authentication security by using multi-factors while offloaded computation to the cloud to reduce battery consumption.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114825505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Behavior-Based Outlier Detection for Network Access Control Systems 基于行为的网络访问控制系统异常点检测
M. Muhammad, A. Ayesh, Isabel Wagner
{"title":"Behavior-Based Outlier Detection for Network Access Control Systems","authors":"M. Muhammad, A. Ayesh, Isabel Wagner","doi":"10.1145/3341325.3342004","DOIUrl":"https://doi.org/10.1145/3341325.3342004","url":null,"abstract":"Network Access Control (NAC) systems manage the access of new devices into enterprise networks to prevent unauthorised devices from attacking network services. The main difficulty with this approach is that NAC cannot detect abnormal behaviour of devices connected to an enterprise network. These abnormal devices can be detected using outlier detection techniques. Existing outlier detection techniques focus on specific application domains such as fraud, event or system health monitoring. In this paper, we review attacks on Bring Your Own Device (BYOD) enterprise networks as well as existing clustering-based outlier detection algorithms along with their limitations. Importantly, existing techniques can detect outliers, but cannot detect where or which device is causing the abnormal behaviour. We develop a novel behaviour-based outlier detection technique which detects abnormal behaviour according to a device type profile. Based on data analysis with K-means clustering, we build device type profiles using Clustering-based Multivariate Gaussian Outlier Score (CMGOS) and filter out abnormal devices from the device type profile. The experimental results show the applicability of our approach as we can obtain a device type profile for five dell-netbooks, three iPads, two iPhone 3G, two iPhones 4G and Nokia Phones and detect outlying devices within the device type profile.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"46 14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129686187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Low Power Boundary Nodes Detection Algorithm for Wireless Sensor Networks (WSNs) 一种低功耗无线传感器网络边界节点检测算法
Ahmad Lhwani, Abed-Alrhman Mosallam, Aws Alawneh, Ahmed Awad, O. Othman
{"title":"A Low Power Boundary Nodes Detection Algorithm for Wireless Sensor Networks (WSNs)","authors":"Ahmad Lhwani, Abed-Alrhman Mosallam, Aws Alawneh, Ahmed Awad, O. Othman","doi":"10.1145/3341325.3342007","DOIUrl":"https://doi.org/10.1145/3341325.3342007","url":null,"abstract":"Boundary nodes in a Wireless Sensor Network (WSN) are highly essential due to the critical functions in which they involve. Therefore, several algorithms have been proposed in the literature to detect boundary nodes. However, due to the limited power budget in the battery of sensor nodes, there is a need to develop distributed algorithms that detect boundary nodes in such ad-hoc networks with low power consumption. In this work, we propose an enhancement for a recently published algorithm for boundary nodes detection, namely Distributed Least Polar-Angle Connected Node (DLPCN), through minimizing the communication overhead. Experimental results have shown around 28% power reduction, with preserving the great accuracy obtained by DLPCN algorithm.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121361892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices 利用电子健康物联网设备中的蓝牙漏洞
M. Zubair, Devrim Unal, A. Al-Ali, Abdullatif Shikfa
{"title":"Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices","authors":"M. Zubair, Devrim Unal, A. Al-Ali, Abdullatif Shikfa","doi":"10.1145/3341325.3342000","DOIUrl":"https://doi.org/10.1145/3341325.3342000","url":null,"abstract":"Internet of Things (IoT) is an interconnected network of heterogeneous things through the Internet. The current and next generation of e-health systems are dependent on IoT devices such as wireless medical sensors. One of the most important applications of IoT devices in the medical field is the usage of these smart devices for emergency healthcare. In the current interconnected world, Bluetooth Technology plays a vital role in communication due to its less resource consumption which suits the IoT architecture and design. However Bluetooth technology does not come without security flaws. In this article, we explore various security threats in Bluetooth communication for e-Health systems and present some examples of the attacks that have been performed on e-Health systems by exploiting the identified vulnerabilities","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117021817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Understanding Blockchain: Platforms, Applications and Implementation Challenges 理解区块链:平台、应用和实现挑战
Moneeb Ahmed, Ihsan Elahi, Muhammad Abrar, Umair Aslam, Iqra Khalid, Muhammad Asif Habib
{"title":"Understanding Blockchain: Platforms, Applications and Implementation Challenges","authors":"Moneeb Ahmed, Ihsan Elahi, Muhammad Abrar, Umair Aslam, Iqra Khalid, Muhammad Asif Habib","doi":"10.1145/3341325.3342033","DOIUrl":"https://doi.org/10.1145/3341325.3342033","url":null,"abstract":"Blockchain is a distributed ledger which works on a peer to peer network, with attributes of decentralized technology it's an emerging technology which will revolutionize the way of management of organizations of public and private sectors in coming decades.it provides transpires, security, trust on the system with its qualities like decentralization, immutability, transparency, and consensus-driven results. It's a buzz word nowadays, receiving massive attention in different areas like government, media, and different public-private sector organization. Blockchain is the future of the administration domain. Studies count it as an essential invention as the internet was. Literature in this significant domain is insufficient, and there are many research gaps which demand attention. This paper is a benefit for those who want to understand or contribute to this domain for research point of view or development. This article presents a general overview of blockchain technology its significant components, existing applications and some limitations of this technology.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134413955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Comprehensive Review of Adaptive Noise Cancellation Techniques in the Internet of Things 物联网中自适应降噪技术综述
Hafiz Shakir Mehmood, Rana Zeeshan Ahmad, Muhammad Jehanzaib Yousuf
{"title":"A Comprehensive Review of Adaptive Noise Cancellation Techniques in the Internet of Things","authors":"Hafiz Shakir Mehmood, Rana Zeeshan Ahmad, Muhammad Jehanzaib Yousuf","doi":"10.1145/3341325.3342035","DOIUrl":"https://doi.org/10.1145/3341325.3342035","url":null,"abstract":"Internet of things (IoT) has made possible the sharing of data wirelessly among everyday objects and physical devices. However, distortion and noise can significantly degrade the signaling performance of IoT. Adaptive Noise Cancellation (ACN) technology plays an important role not only in IoT but also in other numerous fields such as system identification, noise cancellation, communication, signal control, etc. At present, IoT is an advance trend and need to deal with upcoming issues in a way to deal properly in enjoying this technology. Due to the presence of noise in the signal, the quality of the signal is reduced, so the quality of communication (signal) can be improved by adaptive noise (acoustic) cancellation technology. This paper aims to provide the performance analysis of adaptive algorithm and the application of adaptive noise cancellation technique. Further, use cases of three-noise cancellation filter in IoT are introduced. In wireless communication, quality of services relies on signal quality and thus noise cancellation plays a vital role in the signaling of IoT. At the end of this paper performance analysis of different ANC algorithms including least mean square (LMS), Normalized least mean square (NLMS), recursive least square (RLS) will be done based on simulation results.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124049732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multiple Lane Road Car-Following Model using Bayesian Reasoning for Lane Change Behavior Estimation: A Smart Approach for Smart Mobility 基于贝叶斯推理的多车道道路车辆跟随模型变道行为估计:一种智能移动的智能方法
M. Pop, O. Proștean, G. Proștean
{"title":"Multiple Lane Road Car-Following Model using Bayesian Reasoning for Lane Change Behavior Estimation: A Smart Approach for Smart Mobility","authors":"M. Pop, O. Proștean, G. Proștean","doi":"10.1145/3341325.3341996","DOIUrl":"https://doi.org/10.1145/3341325.3341996","url":null,"abstract":"Car-following modeling is one of the most used approaches for road traffic modeling. It ensures a detailed overview of vehicles behavior at microscopic traffic modeling level, taking into account some primary parameters like velocity, acceleration/deceleration, the distance between vehicles etc. A big disadvantage of this model is that is single-lane oriented, studying the current vehicle behavior based only on vehicle ahead behavior. The purpose of this paper is to deliver a new car-following model capable to adapt to multiple lanes roads, where the followed vehicle can be changed at any time. In this case, a big challenge will be the integration of a new vehicle in the established car-following model. This study attempts to estimate these different cases of lane-change based on a Bayesian reasoning estimation, facilitating the new vehicle integration on the current lane. Results will show the advantage of having a multiple lanes road traffic overview in adopting a proper traffic strategy, from the possible routes that can be reached point of view, based on lane change drivers' decisions.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121286944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
BCEAP - A Blockchain Embedded Academic Paradigm to Augment Legacy Education through Application BCEAP——通过应用增强传统教育的区块链嵌入式学术范式
Anum Ghaffar, M. Hussain
{"title":"BCEAP - A Blockchain Embedded Academic Paradigm to Augment Legacy Education through Application","authors":"Anum Ghaffar, M. Hussain","doi":"10.1145/3341325.3342036","DOIUrl":"https://doi.org/10.1145/3341325.3342036","url":null,"abstract":"Education plays an important role in the economic and social progress of any community. Currently, the higher education system needs immense of enhancements for fulfilling essential needs of the productive and beneficial educational environment. The major challenges faced by the higher education system is the verification of student's data at the time of admission in the university. Current admission system requires a lot of time along with an excess of human resources. there is no mechanism for the authentication of degrees and educational certificates in Pakistan. In this paper, the proposed system based on blockchain technology. This system can validate and verify degree/certificates. The proposed system can verify and validate the student's educational record from respective educational stakeholders like HEC, PEC, IBCC. It allows students to apply for admission using the single platform at a few clicks. Using blockchain, this system is secure, tamper-resistant, time saving, efficient and reliable.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125793656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信