Md. Mehedi Hassan Onik, Chul-Soo Kim, Jinhong Yang
{"title":"Personal Data Privacy Challenges of the Fourth Industrial Revolution","authors":"Md. Mehedi Hassan Onik, Chul-Soo Kim, Jinhong Yang","doi":"10.23919/ICACT.2019.8701932","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701932","url":null,"abstract":"Fourth industrial revolution (Industry 4.0) promises a connected and smart manufacturing system where internet, machine (physical system) and humans lumped together. Unlike other industrial revolutions, this industrial revolution deals more with information. Device to device (D2D) and Machine to Machine (M2M) communications often generate, preserve and share private information. Personal data has already turned out to be a new commodity and currently identified as a ‘new oil’ or ‘new domain of warfare’. The more information gets generated and accumulated, the more extensive and risky the personal information becomes. Although privacy and security are often bundled together, they are different. This study investigates the privacy attack surfaces of key Industry 4.0 components (i.e. Cyber-Physical System, Artificial Intelligence, additive manufacturing, autonomous vehicle, big data, cloud computing, internet of things, distributed ledger etc). Multi-dimensional privacy challenges, data breaching incidents, regulations and need of a contextual privacy awareness is discussed in this study. Finally, this work elaborates the risk of Personally Identifiable Information (PII) leaking in the era of industry 4.0.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116412300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hanji Shen, Chun Long, Wei Wan, Jun Li, Yakui Qin, Yuhao Fu, Xiaofan Song
{"title":"Log Layering Based on Natural Language Processing","authors":"Hanji Shen, Chun Long, Wei Wan, Jun Li, Yakui Qin, Yuhao Fu, Xiaofan Song","doi":"10.23919/ICACT.2019.8702019","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702019","url":null,"abstract":"With the increasing number and variety of logs, the requirement of storage space is growing rapidly. Meantime, the speed and accuracy of querying in massive logs are becoming increasingly important. Although the well-built distributed storage technique solves the problem of mass storage and fast query, the cost is too high. As logs are created as the method to trace the historical operation, the requirement for query rate is not high. To balance the storage cost and query rate, this paper proposes a real-time log layering storage technique based on natural language processing. According to the characteristics of the log data, this technique is combined with the text language processing technique. It compresses the real-time log data effectively while considering the query efficiency. Firstly, the method extracts the feature of each log that flows in, which will be the type name of the log. Then, the method performs word segmentation on the log and encodes each word to store the key value pairs. Finally, the key value pairs of the log are stored in the memory, and the code of each log is stored in the database. Experiments show that this method can ensure the integrity of the data effectively, decompression time dropped to 40%, compression rate down to 35%.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124700924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Resource Saving MAC/IP Handling Method for Low-Power Wireless TCP Packet Network","authors":"Jong-Beom Kim, Jae-Woo Ahn, J. O. Kim, S. Choi","doi":"10.23919/ICACT.2019.8701905","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701905","url":null,"abstract":"This paper presents the technology and implementation results of manipulating the MAC and IP Address of the transmitting side in MCU(Microcontroller Unit), when data communication with remote APs is performed on CC3220 Wi-Fi module associated with STM32 MCU. Because the existing packet sending and receiving process also changes in the CRC as MAC and IP change, CRC checksum errors occur when MAC and IP are manipulated. The method presented in this paper reduces the resources required for computations to match the CRC checksum in the transmission and reception environment between MCU and external AP, and it also allows the sending-receiving and exchanging data with minimal manipulation.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128460893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power Optimization for Energy Efficiency in Cell-Free Massive MIMO with ZF Receiver","authors":"Yao Zhang, Haotong Cao, Meng Zhou, Longxiang Yang","doi":"10.23919/ICACT.2019.8702035","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702035","url":null,"abstract":"In this paper, a pilot-contaminated uplink cell-free massive multiple-input multiple-output (mMIMO) system with zero-forcing (ZF) receiver is considered. Then this paper derives a novel lower-bound expression for uplink energy efficiency (EE), which enables us to propose a resource optimization problem to maximize the total EE. This considered power optimization scheme takes into account the quality-of-service (QoS) requirement, each user power constraint and power consumption. Specifically, the power consumption model includes circuit power, data transmission power and backhaul power. Since the proposed power control problem is non-convex, a novel path-following approximation algorithm is characterized to tackle this problem. Simulation results indicate that the proposed algorithm only needs a few iterations to converge. Moreover, compared with equal power control (EPC) scheme, our algorithm can significantly improve the total EE.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128526980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chi-Kuan Chiu, Te-En Wei, Hsiao-Hsien Chang, Ching-Hao Mao
{"title":"Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Recurrent Neural Network","authors":"Chi-Kuan Chiu, Te-En Wei, Hsiao-Hsien Chang, Ching-Hao Mao","doi":"10.23919/ICACT.2019.8701951","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701951","url":null,"abstract":"Most of malwares usually hide their malicious activities into HTTP protocol, such as communicating with the C&C server or accessing some malicious webpages. The previous detection system is mainly based on the blacklist. With the advancement of technology, there are many ways can easily available to evade detection system nowadays, e.g., spoofing the HTTP headers. However, the stealthiest malware still needs to communicate with the destination point. This paper aims to provide a detection system to detect these stealthily malicious activities. Consider machine-learning classifiers with manually handled features have been widely used in malicious URL detection. We propose an end-to-end deep learning framework to learn the URL embedding for application classifier from URL string. We apply the Recurrent Neural Network (RNN) to effectively keep the semantic meaning and sequential patterns in URL strings. The proposed approach is evaluated with real-world data from technology enterprise’s network and compare the performance with the state-of-the-art approach. The result shows that our approach achieves the accuracy rate to 99%, and even the counterfeit fingerprint’s detection reaches up to 100% while the comparison approach failed with the same scenario.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125287715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical Model for Bit-error-rate of a Spread-Spectrum System","authors":"O. Wojuola","doi":"10.23919/ICACT.2019.8701934","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701934","url":null,"abstract":"Bit-error-rate (BER) is known to be an important index for measuring the performance of wireless communication systems. The use of software simulation is common for modelling BER characteristics of spread-spectrum systems, but analytic solutions for the same are not readily available. This paper presents a mathematical (analytic) model developed by the author for BER of a spread-spectrum system. The model was tested for different sets of even- and odd-degree Gold codes, generated from appropriate combination of preferred pairs of m-sequences. The outcome of the mathematical model was compared with results of software simulation carried out for the system performance. The two sets of results were found to agree closely, thereby validating the mathematical model.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121633024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross-correlation index and multiple-access performance of even-degree Gold codes","authors":"O. Wojuola","doi":"10.23919/ICACT.2019.8702020","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702020","url":null,"abstract":"It is well known that for any particular code of a spread-spectrum system, there is a maximum number of users that would be tolerated and that this number would be well below nominal full load. However, the proportion of the full code set that are actually available for use before the onset of system saturation is not well known. In this work, the author presents a simple but effective means for determining performance limits of spreading sequences. This work involves the development of a mathematical model, the concept of cross-correlation index and its use for the determination of the system loading capacity. The model was developed and tested for different sets of Gold codes, the outcome of which was found to agree with results of software simulations for the system. Results shows that cross-correlation index is very effective for determining upper limit of simultaneous users that a spread-spectrum system can support in practice with respect to its spreading sequences.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128934954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
hao-Tung Yang, Jianlu Wang, Xiang Gao, Huibo Li, D. Kim, Peng Gong
{"title":"A PDSI-based Online Fault Configuration Approach for Communication Network in Power Grid Simulation","authors":"hao-Tung Yang, Jianlu Wang, Xiang Gao, Huibo Li, D. Kim, Peng Gong","doi":"10.23919/ICACT.2019.8701924","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701924","url":null,"abstract":"In this paper, a programmable dynamic simulation interface (PDSI)-based online fault configuration approach of network simulation is proposed to dynamically set link fault as well as route fault in the case of joint power grid simulation. The proposed approach allows the user to dynamically configure the fault situations of communication network via a graphical user interface (GUI) during the simulation process. When QualNet receives the configuration messages from GUI, it will parse the messages and push the corresponding events into the event queue to close the link port or rewriting the routing tables, which is utilized to formulate the link fault or the route fault. Experiment results demonstrate that based on the proposed approach the fault configuration of communication network can be successfully performed with an acceptable compromise at interface interaction delay.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132354040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Hazemi, A. F. Y. Mohammed, Lemi Isaac Yoseke Laku, Rayan Alanazi
{"title":"PUE or GPUE: A Carbon-Aware Metric for Data Centers","authors":"F. Hazemi, A. F. Y. Mohammed, Lemi Isaac Yoseke Laku, Rayan Alanazi","doi":"10.23919/ICACT.2019.8701895","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701895","url":null,"abstract":"Greening Information and Communication Tech-nology (ICT) sector is extensively undertaken globally. Metrics were announced to control ICT impacts. For example, Power Usage Effectiveness (PUE) metric was developed to report the effectiveness of consumed power in the data center. Consequently, researchers and developers produced several prototypes and implementations on green data centers and they claimed the accuracy of their solutions with wrongly understood metrics. In this paper, we review PUE metric and its green extension (GPUE), in addition to a review of green determinants on data centers. Then, we demonstrated the application of PUE and GPUE in a modern and recent green data center (the Parasol data center). Our demonstration showed the impact of Parasol data center, and reveal insights on how to improve the carbon footprints of the data center.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133409844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RECSRF: Novel Technique to Evaluate Program Security using Dynamic Disassembly of Machine Instructions","authors":"Asanga Wanniarachchi, C. Gamage","doi":"10.23919/ICACT.2019.8701914","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701914","url":null,"abstract":"Modern software systems have nearly an uncontrolled growth in complex requirements that is fueled by the need to interact with multiple other complex systems. While some of the complexity increases are due to activities such as bug fixes which are unavoidable, other activities such as expanding and enhancing functionality of a software system becomes a risky endeavor to undertake with respect to security as responding to the potential vulnerabilities due to complexity increases require scarce resources including technical expertise and time. This paper introduces RECSRF; a novel framework to quantitatively evaluate the security of an execution in line with the security risk impact it makes over the particular microprocessor on which it executes. RECSRF consists of two components; a novel concept called The Run-time Execution Complexity (REC) of a program execution, which evaluates the trade-off between performance vs. security, while adhering to Control Flow Integrity (CFI) of programs, and an information theoretic technique to approximate the Security Risk Factor (SRF), which approximates the risk of a particular execution by analyzing dynamically disassembled machine instructions of a particular microprocessor. The RECSRF value allows software designers to select the most secure resource combination among a given set of resources, and software implementers to decide whether to proceed or not with a software change. The method can also be used to detect control flow hijacks at runtime by using it as an application level intrusion detection mechanism which allows transforming the same to an application level intrusion preventer upon successful implementation.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130223948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}