Islam M. Tanash, Fedaa S. Yaseen, M. Al-Mistarihi, Basheer Al-Duwairi, M. Shurman
{"title":"Source location privacy in a cluster-based wireless sensor networks against local adversary","authors":"Islam M. Tanash, Fedaa S. Yaseen, M. Al-Mistarihi, Basheer Al-Duwairi, M. Shurman","doi":"10.1109/IACS.2017.7921996","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921996","url":null,"abstract":"Wireless Sensor Networks (WSNs) have been popular nowadays as they provide low-cost solutions of a wide-range of real life challenges. WSN consists of a group of infrastructure-less wireless nodes that works together to deliver physical or environmental monitored data from source to sink. In general, WSNs are vulnerable to wireless attacks due to the open nature of the wireless networks. Also, WSNs suffer from unbalanced energy consumption which reduces the network life time due to the creation of the energy-hole. Two types of threats may occur for the WSNs privacy, which are; contextual and content privacy; location privacy is considered as an example for contextual privacy, where an eavesdropper tries to find the location of the source or sink. Hence, ensuring the security and privacy in WSNs is considered as an essential issue. In this paper, we avoid energy-hole creation and protect source location privacy (SLP) via proposing two source privacy protection schemes based on clustering, which are dynamic shortest path scheme (DSP) and Dynamic tree scheme (DT). We adopted grid-based clustering technique to divide the network to several square clusters. Matlab simulation evaluates the performance of the two proposed schemes in terms of safety period.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132282953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Wi-Fi access point placement for RSSI-based indoor localization using genetic algorithm","authors":"Abdulsalam Alsmady, F. Awad","doi":"10.1109/IACS.2017.7921986","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921986","url":null,"abstract":"Indoor navigation systems help people navigate inside large buildings such as shopping malls, university campuses, and hospitals. To make the navigation system more accurate, there must be a clear distinction between any pair of different positions in terms of the combined received signal strengths of all access points in range. This paper proposes a novel Genetic Algorithm technique to improve the quality of indoor navigation systems by adjusting the positions of the access points so that the combination of received signal strengths in each predefined block of the area unique. The simulation results demonstrated that, using the proposed algorithm, the uniqueness of the combined received signal strengths exceed 90% when seven access points are used. The proposed method provides an infrastructure for enhancing indoor navigation system quality.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133144359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A layered model approach for care process monitoring","authors":"Mohamed Anis Mokahhal, A. Baarah, L. Peyton","doi":"10.1109/IACS.2017.7921953","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921953","url":null,"abstract":"In this paper, we present a layered model-based approach to Care Process Monitoring (CPM). Business Process Management (BPM) technology is used to manage the care process online with an explicit business process model. The business process model is structured into three layers (organizations, processes, and interfaces) and uses vertical swim lanes with tracking points to identify where to monitor care process. An existing cardiology care process case study from a Canadian hospital is used to evaluate the approach. Transitions between different departments in a hospital are often problematic and a source of bottlenecks, so a technique of integrating event messages with a flexible triggering mechanism is also presented.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129475552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the analysis of road surface conditions using embedded smartphone sensors","authors":"Y. Alqudah, B. Sababha","doi":"10.1109/IACS.2017.7921967","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921967","url":null,"abstract":"Road conditions play a critical role in ensuring traffic safety and reducing traffic jams and congestions. Ensuring healthy conditions require constant monitoring to detect and predict potential road deterioration. This work proposes a low-cost solution that takes advantage of sensory capabilities of smartphones. By recording Gyro rotation sensor data, we show that abnormalities can be detected by calculating the second moment of sensor data. Our work is validated by drive tests that show results are consistent and repeatable. The work also proposed a dynamic time warping technique to measure similarity between drive results and to obtain accurate representation of multiple drives data.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132613516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Osama Alawneh, Mohammad Deeb, Omar Alma'aita, Anwar Assaf, Nidal Al-Qawabah
{"title":"Single loop synthesizer and SDR modulator","authors":"Osama Alawneh, Mohammad Deeb, Omar Alma'aita, Anwar Assaf, Nidal Al-Qawabah","doi":"10.1109/IACS.2017.7921971","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921971","url":null,"abstract":"Software defined radios are becoming very popular due to their cost, size, and ability to create any waveforms. In this paper, we present a simpler software defined modulator for VHF radios based on a digital synthesizer that is composed of a single phase locked loop with a variable reference frequency. Existing synthesizers are limited to either small step-size with spurs as in fractional N architecture or large step-size with no spurs as in integer N architecture. Our proposed synthesizer has fast-lock time that is capable to work as a software modulator for phase and frequency in software defined radios, small phase noise, and no spurs. We used simulation to validate our approach and the results showed that it is superior to the existing synthesizer architectures.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130697818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An investigation of the proliferation of mobile ERP apps and their usability","authors":"Khalil Omar, J. Gómez","doi":"10.1109/IACS.2017.7921997","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921997","url":null,"abstract":"Mobile ERP is the current trend of ERP systems, and it has become the focus of the attention of the most ERP vendors. The proliferation of mobile devices, the advances in mobile computing, and the huge leaps of mobile HCI all together are considered the main factors that supported the realization of the mobile ERP concept. However, literature didn't pay enough attention to this subject in both the academic and practical level. Therefore, this paper tackle this issues associated with the adoption rates of mobile ERP and its proliferation in different business sectors and enterprise sizes, the reasons behind the adoption of mobile ERP, determining ERP's modules that are frequently being accessed via mobile devices, determining the level of difficulty, acceptability, and learnability for each typical ERP's module that has been accessed via mobile devices; and determining the predominant mobile OSes and devices that are used to operate mobile ERP apps.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124262118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiang Li, Chao Zheng, Chengwei Zhang, Shu Li, Li Guo, J. Xu
{"title":"AppTwins: A new approach to identify app package in network traffic","authors":"Xiang Li, Chao Zheng, Chengwei Zhang, Shu Li, Li Guo, J. Xu","doi":"10.1109/IACS.2017.7921975","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921975","url":null,"abstract":"The smartphone applications have taken place of the web browser and became the user's primary internet entrance. One application's popularity can be measured by its downloading times, and it is valuable for commercial advertising. Identifying app installation packages from network traffic is one of the most feasible approaches to collect these data. But asymmetric routing, incomplete capture and so on make it challenging to determine app's name at large scale in network traffic. With these constraints, we proposed AppTwins, an efficient, robust and automatical approach which has the ability to determine corrupted package's name. The identification consists of three distinct steps. Step 1, identify app packages with a stream fuzzy hash fingerprint database in live network traffic. Step 2, the unprecedented ones were captured and decompiled to acquire new app's name, a fingerprint was also calculated. Step3, update the database with new app's name and fingerprint. AppTwins achieves up a recall rate of 97.63% and a precision rate of 96.44% when app packages are almost complete. Furthermore, It can also identify incomplete app packages in the real traffic where there are no name or URL.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115111085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bimodal behavioral authentication framework based on decision fusion","authors":"Ahmed M. Mahfouz, Tarek M. Mahmoud, A. Eldin","doi":"10.1109/IACS.2017.7922000","DOIUrl":"https://doi.org/10.1109/IACS.2017.7922000","url":null,"abstract":"The majority of proposed behavioral biometric systems on smartphones are unimodal based, which rely only on a single source of information such as gesture or keystrokes. Unfortunately, these systems are suffering from some problems such as noisy data and non-universality. Moreover, they provide lower authentication accuracy in compare with the physiological biometrics such as Face. To address these problems, we developed a bimodal authentication framework based on decision fusion. We conducted a field study by instrumenting the Android OS. We analyzed data from 52 participants during 30-day period. We present the prototype of our framework, where we developed two authentication modalities. First, a gesture authentication modality, which authenticate smartphone users based on touch gesture. Second, a keystrokes authentication modality, which authenticate smartphone users based on the way they type. We evaluated each authentication modality based on two schemes, classification scheme and anomaly detection scheme. Then we used the decision fusion method to enhance the accuracy of detection.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115327290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PVD: Passive vulnerability detection","authors":"Marian Gawron, Feng Cheng, C. Meinel","doi":"10.1109/IACS.2017.7921992","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921992","url":null,"abstract":"The identification of vulnerabilities relies on detailed information about the target infrastructure. The gathering of the necessary information is a crucial step that requires an intensive scanning or mature expertise and knowledge about the system even though the information was already available in a different context. In this paper we propose a new method to detect vulnerabilities that reuses the existing information and eliminates the necessity of a comprehensive scan of the target system. Since our approach is able to identify vulnerabilities without the additional effort of a scan, we are able to increase the overall performance of the detection. Because of the reuse and the removal of the active testing procedures, our approach could be classified as a passive vulnerability detection. We will explain the approach and illustrate the additional possibility to increase the security awareness of users. Therefore, we applied the approach on an experimental setup and extracted security relevant information from web logs.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132812499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Outage probability for end user mobile in cognitive relay networks over mixed fading channels","authors":"Lama N. Ibrahem, M. Khodeir, M. Al-Mistarihi","doi":"10.1109/IACS.2017.7921987","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921987","url":null,"abstract":"In this paper, an upper bound expression of the outage probability (OP) under interference power constraint is derived for cognitive amplify-and-forward (AF) relay network with best relay selection (BRS) scheme. In the proposed model, the destination moves at high speed, more than 100km/h and the channels that connected with destination are modeled as Nakagami-m fading channels, m < 1 whereas the other communication links are modeled by Rayleigh distribution. Analytical results are presented to evaluate the impact of the number of secondary relays, primary user (PU) location, and the severity parameter m on the performance of the cognitive relay network. Analytical results show that the Nakagami-m fading model can more accurately model conditions in vehicular environment.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"420 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126706895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}