2017 8th International Conference on Information and Communication Systems (ICICS)最新文献

筛选
英文 中文
Source location privacy in a cluster-based wireless sensor networks against local adversary 基于集群的无线传感器网络中针对本地对手的源位置隐私
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921996
Islam M. Tanash, Fedaa S. Yaseen, M. Al-Mistarihi, Basheer Al-Duwairi, M. Shurman
{"title":"Source location privacy in a cluster-based wireless sensor networks against local adversary","authors":"Islam M. Tanash, Fedaa S. Yaseen, M. Al-Mistarihi, Basheer Al-Duwairi, M. Shurman","doi":"10.1109/IACS.2017.7921996","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921996","url":null,"abstract":"Wireless Sensor Networks (WSNs) have been popular nowadays as they provide low-cost solutions of a wide-range of real life challenges. WSN consists of a group of infrastructure-less wireless nodes that works together to deliver physical or environmental monitored data from source to sink. In general, WSNs are vulnerable to wireless attacks due to the open nature of the wireless networks. Also, WSNs suffer from unbalanced energy consumption which reduces the network life time due to the creation of the energy-hole. Two types of threats may occur for the WSNs privacy, which are; contextual and content privacy; location privacy is considered as an example for contextual privacy, where an eavesdropper tries to find the location of the source or sink. Hence, ensuring the security and privacy in WSNs is considered as an essential issue. In this paper, we avoid energy-hole creation and protect source location privacy (SLP) via proposing two source privacy protection schemes based on clustering, which are dynamic shortest path scheme (DSP) and Dynamic tree scheme (DT). We adopted grid-based clustering technique to divide the network to several square clusters. Matlab simulation evaluates the performance of the two proposed schemes in terms of safety period.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132282953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimal Wi-Fi access point placement for RSSI-based indoor localization using genetic algorithm 利用遗传算法优化基于rssi的室内定位Wi-Fi接入点位置
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921986
Abdulsalam Alsmady, F. Awad
{"title":"Optimal Wi-Fi access point placement for RSSI-based indoor localization using genetic algorithm","authors":"Abdulsalam Alsmady, F. Awad","doi":"10.1109/IACS.2017.7921986","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921986","url":null,"abstract":"Indoor navigation systems help people navigate inside large buildings such as shopping malls, university campuses, and hospitals. To make the navigation system more accurate, there must be a clear distinction between any pair of different positions in terms of the combined received signal strengths of all access points in range. This paper proposes a novel Genetic Algorithm technique to improve the quality of indoor navigation systems by adjusting the positions of the access points so that the combination of received signal strengths in each predefined block of the area unique. The simulation results demonstrated that, using the proposed algorithm, the uniqueness of the combined received signal strengths exceed 90% when seven access points are used. The proposed method provides an infrastructure for enhancing indoor navigation system quality.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133144359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A layered model approach for care process monitoring 护理过程监控的分层模型方法
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921953
Mohamed Anis Mokahhal, A. Baarah, L. Peyton
{"title":"A layered model approach for care process monitoring","authors":"Mohamed Anis Mokahhal, A. Baarah, L. Peyton","doi":"10.1109/IACS.2017.7921953","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921953","url":null,"abstract":"In this paper, we present a layered model-based approach to Care Process Monitoring (CPM). Business Process Management (BPM) technology is used to manage the care process online with an explicit business process model. The business process model is structured into three layers (organizations, processes, and interfaces) and uses vertical swim lanes with tracking points to identify where to monitor care process. An existing cardiology care process case study from a Canadian hospital is used to evaluate the approach. Transitions between different departments in a hospital are often problematic and a source of bottlenecks, so a technique of integrating event messages with a flexible triggering mechanism is also presented.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129475552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the analysis of road surface conditions using embedded smartphone sensors 基于嵌入式智能手机传感器的路面状况分析
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921967
Y. Alqudah, B. Sababha
{"title":"On the analysis of road surface conditions using embedded smartphone sensors","authors":"Y. Alqudah, B. Sababha","doi":"10.1109/IACS.2017.7921967","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921967","url":null,"abstract":"Road conditions play a critical role in ensuring traffic safety and reducing traffic jams and congestions. Ensuring healthy conditions require constant monitoring to detect and predict potential road deterioration. This work proposes a low-cost solution that takes advantage of sensory capabilities of smartphones. By recording Gyro rotation sensor data, we show that abnormalities can be detected by calculating the second moment of sensor data. Our work is validated by drive tests that show results are consistent and repeatable. The work also proposed a dynamic time warping technique to measure similarity between drive results and to obtain accurate representation of multiple drives data.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132613516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Single loop synthesizer and SDR modulator 单回路合成器和SDR调制器
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921971
Osama Alawneh, Mohammad Deeb, Omar Alma'aita, Anwar Assaf, Nidal Al-Qawabah
{"title":"Single loop synthesizer and SDR modulator","authors":"Osama Alawneh, Mohammad Deeb, Omar Alma'aita, Anwar Assaf, Nidal Al-Qawabah","doi":"10.1109/IACS.2017.7921971","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921971","url":null,"abstract":"Software defined radios are becoming very popular due to their cost, size, and ability to create any waveforms. In this paper, we present a simpler software defined modulator for VHF radios based on a digital synthesizer that is composed of a single phase locked loop with a variable reference frequency. Existing synthesizers are limited to either small step-size with spurs as in fractional N architecture or large step-size with no spurs as in integer N architecture. Our proposed synthesizer has fast-lock time that is capable to work as a software modulator for phase and frequency in software defined radios, small phase noise, and no spurs. We used simulation to validate our approach and the results showed that it is superior to the existing synthesizer architectures.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130697818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An investigation of the proliferation of mobile ERP apps and their usability 移动ERP应用程序的普及及其可用性的调查
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921997
Khalil Omar, J. Gómez
{"title":"An investigation of the proliferation of mobile ERP apps and their usability","authors":"Khalil Omar, J. Gómez","doi":"10.1109/IACS.2017.7921997","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921997","url":null,"abstract":"Mobile ERP is the current trend of ERP systems, and it has become the focus of the attention of the most ERP vendors. The proliferation of mobile devices, the advances in mobile computing, and the huge leaps of mobile HCI all together are considered the main factors that supported the realization of the mobile ERP concept. However, literature didn't pay enough attention to this subject in both the academic and practical level. Therefore, this paper tackle this issues associated with the adoption rates of mobile ERP and its proliferation in different business sectors and enterprise sizes, the reasons behind the adoption of mobile ERP, determining ERP's modules that are frequently being accessed via mobile devices, determining the level of difficulty, acceptability, and learnability for each typical ERP's module that has been accessed via mobile devices; and determining the predominant mobile OSes and devices that are used to operate mobile ERP apps.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124262118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AppTwins: A new approach to identify app package in network traffic AppTwins:一种在网络流量中识别应用程序包的新方法
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921975
Xiang Li, Chao Zheng, Chengwei Zhang, Shu Li, Li Guo, J. Xu
{"title":"AppTwins: A new approach to identify app package in network traffic","authors":"Xiang Li, Chao Zheng, Chengwei Zhang, Shu Li, Li Guo, J. Xu","doi":"10.1109/IACS.2017.7921975","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921975","url":null,"abstract":"The smartphone applications have taken place of the web browser and became the user's primary internet entrance. One application's popularity can be measured by its downloading times, and it is valuable for commercial advertising. Identifying app installation packages from network traffic is one of the most feasible approaches to collect these data. But asymmetric routing, incomplete capture and so on make it challenging to determine app's name at large scale in network traffic. With these constraints, we proposed AppTwins, an efficient, robust and automatical approach which has the ability to determine corrupted package's name. The identification consists of three distinct steps. Step 1, identify app packages with a stream fuzzy hash fingerprint database in live network traffic. Step 2, the unprecedented ones were captured and decompiled to acquire new app's name, a fingerprint was also calculated. Step3, update the database with new app's name and fingerprint. AppTwins achieves up a recall rate of 97.63% and a precision rate of 96.44% when app packages are almost complete. Furthermore, It can also identify incomplete app packages in the real traffic where there are no name or URL.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115111085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bimodal behavioral authentication framework based on decision fusion 基于决策融合的双峰行为认证框架
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7922000
Ahmed M. Mahfouz, Tarek M. Mahmoud, A. Eldin
{"title":"Bimodal behavioral authentication framework based on decision fusion","authors":"Ahmed M. Mahfouz, Tarek M. Mahmoud, A. Eldin","doi":"10.1109/IACS.2017.7922000","DOIUrl":"https://doi.org/10.1109/IACS.2017.7922000","url":null,"abstract":"The majority of proposed behavioral biometric systems on smartphones are unimodal based, which rely only on a single source of information such as gesture or keystrokes. Unfortunately, these systems are suffering from some problems such as noisy data and non-universality. Moreover, they provide lower authentication accuracy in compare with the physiological biometrics such as Face. To address these problems, we developed a bimodal authentication framework based on decision fusion. We conducted a field study by instrumenting the Android OS. We analyzed data from 52 participants during 30-day period. We present the prototype of our framework, where we developed two authentication modalities. First, a gesture authentication modality, which authenticate smartphone users based on touch gesture. Second, a keystrokes authentication modality, which authenticate smartphone users based on the way they type. We evaluated each authentication modality based on two schemes, classification scheme and anomaly detection scheme. Then we used the decision fusion method to enhance the accuracy of detection.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115327290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PVD: Passive vulnerability detection PVD:被动漏洞检测
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921992
Marian Gawron, Feng Cheng, C. Meinel
{"title":"PVD: Passive vulnerability detection","authors":"Marian Gawron, Feng Cheng, C. Meinel","doi":"10.1109/IACS.2017.7921992","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921992","url":null,"abstract":"The identification of vulnerabilities relies on detailed information about the target infrastructure. The gathering of the necessary information is a crucial step that requires an intensive scanning or mature expertise and knowledge about the system even though the information was already available in a different context. In this paper we propose a new method to detect vulnerabilities that reuses the existing information and eliminates the necessity of a comprehensive scan of the target system. Since our approach is able to identify vulnerabilities without the additional effort of a scan, we are able to increase the overall performance of the detection. Because of the reuse and the removal of the active testing procedures, our approach could be classified as a passive vulnerability detection. We will explain the approach and illustrate the additional possibility to increase the security awareness of users. Therefore, we applied the approach on an experimental setup and extracted security relevant information from web logs.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132812499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Outage probability for end user mobile in cognitive relay networks over mixed fading channels 混合衰落信道下认知中继网络中终端用户移动的中断概率
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921987
Lama N. Ibrahem, M. Khodeir, M. Al-Mistarihi
{"title":"Outage probability for end user mobile in cognitive relay networks over mixed fading channels","authors":"Lama N. Ibrahem, M. Khodeir, M. Al-Mistarihi","doi":"10.1109/IACS.2017.7921987","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921987","url":null,"abstract":"In this paper, an upper bound expression of the outage probability (OP) under interference power constraint is derived for cognitive amplify-and-forward (AF) relay network with best relay selection (BRS) scheme. In the proposed model, the destination moves at high speed, more than 100km/h and the channels that connected with destination are modeled as Nakagami-m fading channels, m < 1 whereas the other communication links are modeled by Rayleigh distribution. Analytical results are presented to evaluate the impact of the number of secondary relays, primary user (PU) location, and the severity parameter m on the performance of the cognitive relay network. Analytical results show that the Nakagami-m fading model can more accurately model conditions in vehicular environment.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"420 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126706895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信