{"title":"Efficient Symmetric and Heterogeneous Mobile Group-Based Key Management Protocol","authors":"F. S. Mubarek, Sufyan T. Faraj Al-Janabi","doi":"10.1109/DeSE.2013.52","DOIUrl":"https://doi.org/10.1109/DeSE.2013.52","url":null,"abstract":"Wireless Sensor Networks (WSNs) are a newly developed networking technology consisting of multifunctional sensor nodes that are small in size and communicate over short distances. When WSNs applications are used in mobile environments thus new challenges and difficulties are arising. The use of such Mobile wireless sensor networks (MSNs) in sensitive applications such as military or unattended environments is imposing serious security requirements. Many key management solutions have been proposed recently to provide secure communication and reduce the impact of adversaries damaging WSNs. While a few of them were suggested for MSNs. This paper presents a new key management protocol entitled the Efficient Symmetric and Heterogeneous Mobile Group-Based Key Management Protocol (ESAH-MGKM). Evaluation results have shown a significant improvement in terms of resilience against node capture attacks, data confidentiality, energy efficiency, and leaving and joining nodes. Furthermore our scheme supports secure routing through resistance to many routing attacks. Thus, our protocol has a novelty in working with mobile environments and achieved key management and secures routing demands.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"495 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115882970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time Series Analysis for Cyberthreat Detection and Prevention","authors":"A. Chirosca, Gianina Chirosca","doi":"10.1109/DeSE.2013.49","DOIUrl":"https://doi.org/10.1109/DeSE.2013.49","url":null,"abstract":"IT infrastructure exposed to Internet for a period of time, will inevitably expose it to attacks with viruses (worms or trojans). Our current available methods are known not to be full-proof for their prevention and in the worst case the detection of computer system with unauthorized (remote) access. This paper proposes and extended method, applying time series techniques while evaluating the network transfer data. The proposed method tries to improve the detection of abnormal network activity, thus providing a better trigger for other more costly solutions. The downside of this approach is that the system must be informed about changes in networks services and content and still needs a lot of data to be collected in order to provide accurate results. Correlated with netflow® LAN data, the method can be used to identify network stations that are infected with viruses not detected by the installed antivirus solution or stations with compromised security systems.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130986666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Critical Evaluation of the Rational Need for an IT Management System for Flash Flood Events in Jeddah, Saudi Arabia","authors":"Mohammad Hijji, S. Amin, R. Iqbal, Wayne Harrop","doi":"10.1109/DeSE.2013.45","DOIUrl":"https://doi.org/10.1109/DeSE.2013.45","url":null,"abstract":"The aim of this paper is to examine the value of creating an information technology (IT) system to assist Saudi Arabia in predicting and preparing the right training capabilities to manage scalable flood events. This paper sets forth the scope of emergency response training capabilities needed to manage low-, medium-, and high-intensity flooding events in Jeddah. With the use of primary data from local responders in Jeddah, the need for an emergency response training capabilities IT system that can be defined as able to map human resource training needs was assessed. This IT system could help decision makers calibrate the right response criteria in the event of scalable flash flooding across Jeddah.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114625233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework to Support E-Commerce Development for People with Visual Impairment","authors":"H. Francis, D. Al-Jumeily, Tom Oliver Lund","doi":"10.1109/DeSE.2013.66","DOIUrl":"https://doi.org/10.1109/DeSE.2013.66","url":null,"abstract":"The World Wide Web Consortium provides software developers with guidelines for designing accessible, cross browser compatible websites. Currently however, there are no guidelines in this area specific to the features of an e-commerce website. This paper explores the current usability issues relevant to users with visual impairment and further proposes a framework that seeks to ensure the site is suitable for visually impaired users. This paper includes data analysis which compares current issues in web technologies suitable for e-commerce and proposes system adaptations which can be conducted to portray the improvements in overall user experience. To this extent, several validation tools and testing techniques have been used to identify the usability issues that visually impaired users currently face when shopping online.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"17 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120856083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel Approach for Generating the Key of Stream Cipher System Using Random Forest Data Mining Algorithm","authors":"Samaher Hussein Ali","doi":"10.1109/DeSE.2013.54","DOIUrl":"https://doi.org/10.1109/DeSE.2013.54","url":null,"abstract":"Key generator is part of the stream cipher system that is responsible for generating a long random sequence of binary bits key that used in ciphering and deciphering processes. Therefore, key generator is the heart of the stream cipher system. A system with traditional key generating techniques such as using the feedback shift register is vulnerable to cypher attacks which render it to be ineffective and insecure. A suggested novel method to overcome this problem is to use a Random Forest-Data Mining (RF-DM) algorithm. It incorporates using new types of linear and nonlinear functions to mix the plain text with the key in the encryption process and the cipher text with the reverse key in the decryption process. The method is successful in satisfying the secrecy goal of the stream cipher system because it uses two types of dual randomization to baffle the attacker or cryptanalysist. By mathematical logic and prove by experiments, we generate the key successfully by encrypting messages of different sizes . This proves the ablity to generated the unique key for each message based on its length without repeating the key in most cases. In addition, by combining the use of the random forest data mining technique as the randomizating principle in the ciperhing process makes it exteremely difficult for any attacker because the attacker does not have access or understanding of the not only the technique used but also the process to decipher. The result from our experiment shows that the longer the number of the message size, the longer is the length of the generated key, which determines its strength and hence, its complexity to break by brute force.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123930497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New eRobotics Approach to Simulation-Based Analysis and Optimization","authors":"L. Atorf, E. G. Kaigom, J. Roßmann","doi":"10.1109/DeSE.2013.12","DOIUrl":"https://doi.org/10.1109/DeSE.2013.12","url":null,"abstract":"eRobotics is a newly evolving branch of eSystems engineering, providing tools to support the whole life cycle of robotic applications by means of electronic media. To this end, it extends and strengthens the Virtual Testbed idea from space robotics to provide a holistic 3D simulation platform on which complex issues in robotics and automation can be addressed and the most efficient solutions elaborated. In this line of idea, this work introduces a new and systematical eRobotics approach to support process optimization and decision making within a comprehensive 3D simulation environment. We illustrate the importance and performance of this 3D simulation-based analysis and optimization through diverse examples, ranging from planetary exploration and orbital servicing to industrial manufacturing.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121748801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SMS Security for Smartphone","authors":"A. Sagheer, A. A. Abdulhameed, M. AbdulJabbar","doi":"10.1109/DeSE.2013.57","DOIUrl":"https://doi.org/10.1109/DeSE.2013.57","url":null,"abstract":"The most popular and easiest communication technology in mobile phone devices is Short Message Service (SMS). This service is designed to transfer unsecured information. Some people want to exchange important data, so they need to secure it. In this paper, a solution is proposed that provides confidentiality and integrity for SMS data by applying a hybrid cryptographic scheme which combines the AES and RC4 algorithms to achieve more powerful security functions. The proposed system is implemented using Java programming language and NetBeans platform. The system was tested on many mobile devices such as the Nokia 5233. The results were satisfactory, Each process has completed in less than a second with effective mobile performance comparing with related works.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124998609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Bayesian Approach for the Classification of Mammographic Masses","authors":"Tarek Elguebaly, N. Bouguila","doi":"10.1109/DeSE.2013.26","DOIUrl":"https://doi.org/10.1109/DeSE.2013.26","url":null,"abstract":"Breast cancer is a major cause of deaths among women and the leading cause of death among all cancers for middle-aged women in most developed countries. Presently there are no methods to prevent breast cancer thus early detection of this disease represents a very important factor in its treatment and plays a major role in reducing mortality. Mammography is one of the most reliable methods in early detection of breast cancer. In this paper, we present a novel algorithm for medical mammogram image classification, based on the Dirichlet mixture model. Our method can be divided into three main steps: Preprocessing, feature extraction, and image classification. First, histogram equalization is used to remove the noise and to enhance the quality of the image. Later, we extract texture information from mammographic images using the Local Binary Pattern (LBP) and Haralick texture descriptor (HTD). Then, we use the Birth and Death Markov Chain Monte Carlo to estimate the parameters of the Dirichlet mixture representing each class from our training set. Finally, in the classification stage, each mammogram image is assigned to the class increasing more its likelihood. Extensive simulations are used to show the merits of our approach.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130074510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Analysis through Information Visualisation for eGovernments & eBusinesses","authors":"Wajid Khan, F. Hussain","doi":"10.1109/DeSE.2013.46","DOIUrl":"https://doi.org/10.1109/DeSE.2013.46","url":null,"abstract":"The greatest contribution of information visualisation tools are to make it possible for the decision makers to identify the expected and discover the unexpected, similarly exploring hidden patterns and trends in large enterprise and Government data is an unique challenge. Adopting existing technologies in a mash-up environment to analyse and understand data through visual analytics and information visualisation. We will be exploring data by information visualisation through mash-up application. What we have discovered that complex visualisation elements could be formed through pre-developed and existing visualisation models processing large and diverse datasets.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116448345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Reilly, C. Wren, S. Giles, Lisa Cunningham, P. Hargreaves
{"title":"CASPER: Computer Assisted Search Prioritisation and Environmental Response Application","authors":"D. Reilly, C. Wren, S. Giles, Lisa Cunningham, P. Hargreaves","doi":"10.1109/DeSE.2013.48","DOIUrl":"https://doi.org/10.1109/DeSE.2013.48","url":null,"abstract":"Missing person cases consume time and effort on what are already over-stretched Police resources. Across the UK Police forces have to deal with approximately 1000 enquiries a day relating to missing persons. Current approaches are inherently manual and rely on Police domain knowledge to relate a missing person's behavior to the surrounding geography and terrain. Searches are highly probabilistic, based on a missing person's profile, mental and spatial behavior patterns. Computer support is available, but this is largely in the form of data entry and database systems. This paper describes the CASPER system which is a software application to provide computational support for missing person cases. The CASPER system is essentially a database fronted by a Google Map application. Its strengths lie in the richness of the data and the degree of interaction and information provided through the Map application to enable 'what-if' search scenarios to be elaborated. The paper describes our on-going development of the CASPER system using missing person/suicide data for the Merseyside region in the UK.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132484311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}