{"title":"Load-adjusted video quality prediction methods for missing data","authors":"R. Fréin","doi":"10.1109/ICITST.2015.7412111","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412111","url":null,"abstract":"A polynomial fitting model for predicting the RTP packet rate of Video-on-Demand received by a client is presented. This approach is underpinned by a parametric statistical model for the client-server system. This model, namely the PQ-model, improves the robustness of the predictor in the presence of a time-varying load on the server. The advantage of our approach is that if we model the load on the server, we can then use this model, and any insights gained from it, to improve RTP packet rate predictions. A second advantage is that we can predict how the server will behave under previously unobserved loads - a tool which is particularly useful for network planning. For example, we can accurately predict how the system will behave when the load is increased to a previously unobserved value. Thirdly, the PQ-model provides accurate predictions of future RTP packet rates in scenarios where training data is unavailable.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132074463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual closed networks: A secure approach to autonomous mobile ad hoc networks","authors":"D. Hurley-Smith, Jodie Wetherall, A. A. Adekunle","doi":"10.1109/ICITST.2015.7412128","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412128","url":null,"abstract":"The increasing autonomy of Mobile Ad Hoc Networks (MANETs) has enabled a great many large-scale unguided missions, such as agricultural planning, conservation and similar surveying tasks. Commercial and military institutions have expressed great interest in such ventures; raising the question of security as the application of such systems in potentially hostile environments becomes a desired function of such networks. Preventing theft, disruption or destruction of such MANETs through cyber-attacks has become a focus for many researchers as a result. Virtual Private Networks (VPNs) have been shown to enhance the security of Mobile Ad hoc Networks (MANETs), at a high cost in network resources during the setup of secure tunnels. VPNs do not normally support broadcast communication, reducing their effectiveness in high-traffic MANETs, which have many broadcast communication requirements. To support routing, broadcast updates and efficient MANET communication, a Virtual Closed Network (VCN) architecture is proposed. By supporting private, secure communication in unicast, multicast and broadcast modes, VCNs provide an efficient alternative to VPNs when securing MANETs. Comparative analysis of the set-up overheads of VCN and VPN approaches is provided between OpenVPN, IPsec, Virtual Private LAN Service (VPLS), and the proposed VCN solution: Security Using Pre-Existing Routing for MANETs (SUPERMAN).","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"6 14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123740193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed AbuTaha, S. E. Assad, Mousa Farajallah, Audrey Queudet, O. Déforges
{"title":"Chaos-based cryptosystems using dependent diffusion: An overview","authors":"Mohammed AbuTaha, S. E. Assad, Mousa Farajallah, Audrey Queudet, O. Déforges","doi":"10.1109/ICITST.2015.7412053","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412053","url":null,"abstract":"Based on some important properties of chaos, such as ergodicity, quasi-randomness, and high sensitivity to the secret key, chaos is a hot research field in secured communication, and recently a variety of chaos-based cryptosystems have been proposed for achieving the confidentiality of transmitted images over public channels. Most of chaos-based encryption algorithms are based on the Fridrich structure, which use separate confusion-diffusion layers. In this paper, we give an overview of some chaos-based block cryptosystems, including our cryptosystem, using dependent diffusion, in which the confusion process and diffusion process are performed sequentially on each pixel of the plain plain image. This kind of cryptosystems are more efficient than the traditional confusion-diffusion architecture of Shannon. A comparison study of efficiency in terms of speed performance and of robustness against cryptanalysis is done.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124287206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nabil Abdoun, S. E. Assad, Mohammad AbuTaha, R. Assaf, O. Déforges, Mohamad Khalil
{"title":"Hash function based on efficient Chaotic Neural Network","authors":"Nabil Abdoun, S. E. Assad, Mohammad AbuTaha, R. Assaf, O. Déforges, Mohamad Khalil","doi":"10.1109/ICITST.2015.7412051","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412051","url":null,"abstract":"This paper presents an efficient algorithm for constructing a secure Hash function based on Chaotic Neural Network structure. The proposed Hash function includes two main operations: Generation of Neural Network parameters using fast and efficient Chaotic Generator and Iteration of the message through the Chaotic Neural Network. Our theoretical analysis and experimental simulations showed that the implemented Hash function has good statistical properties, strong Collision Resistance and High Message Sensitivity.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134351690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The role of HTML5 IndexedDB, the past, present and future","authors":"S. Kimak, J. Ellman","doi":"10.1109/ICITST.2015.7412126","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412126","url":null,"abstract":"Over the past 20 years Web browsers have changed considerably from being a simple text display to now supporting complex multimedia applications. The client can now enjoy chatting, playing games and Internet banking. All these applications have something in common, they can be run on multiple platforms and in some cases they will run offline. With the introduction of HTML5 this evolution will continue, with browsers offering greater levels of functionality. This paper outlines the background study and the importance of new technologies, such as HTML5's new browser based storage called IndexedDB. We will show how the technology of storing data on the client side has changed over the time and how the technologies for storing data on the client will be used in future when considering known security issues. Further, we propose a solution to IndexedDB's known security issues in form of a security model, which will extend the current model.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133624234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From use case diagrams to executable context-aware ambients","authors":"F. Siewe, Ahmed Al-alshuhai","doi":"10.1109/ICITST.2015.7412102","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412102","url":null,"abstract":"This paper proposes an approach to translating a use case diagram into an executable context-aware ambients. The requirements of a context-aware system is captured and represented in an extension of UML use case diagrams called context-aware use case diagrams. Then an algorithm is proposed that translates a context-aware use case diagram into a process in the Calculus of Context-aware Ambients (CCA). This process can then be analyzed using the CCA simulator. The proposed approach is evaluated using a real-word example of a context-aware collision avoidance system.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131255284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ons Jallouli, S. E. Assad, M. Chetto, R. Lozi, D. Caragata
{"title":"A novel chaotic generator based on weakly-coupled discrete skewtent maps","authors":"Ons Jallouli, S. E. Assad, M. Chetto, R. Lozi, D. Caragata","doi":"10.1109/ICITST.2015.7412052","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412052","url":null,"abstract":"In this paper, we propose a novel pseudo chaotic random number generator based on three weakly-coupled discrete Skew tent maps. Its implementation was performed with C language and finite precision N=32, including a chaotic multiplexing technique. We show that our approach permits to avoid dynamic degradation caused by finite precision in one hand, and to allow emergence from chaos toward randomness in the other hand. As a consequence, the proposed generator turns out to be secure against famous cryptographic and statistical attacks. Several statistical tests such as correlation, histogram, chi2 and NIST have been applied on the generated sequences. They confirm the robustness of this chaotic generator.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133282433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bench-marking of traditional cryptographic algorithms and chaos-based algorithms with DNA operations","authors":"Mirko Koscina, D. Caragata","doi":"10.1109/ICITST.2015.7412050","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412050","url":null,"abstract":"This paper presents a bench-marking analysis between traditional cryptographic algorithms and chaos-based cryptographic schemes with DNA operations. The study consists in the evaluation of the security and performance of each algorithm destined for image encryption purposes based on pre-established criteria which include: the key space, distribution of the cipher image, correlation between pixels, number of pixels change rate, the unified average changing intensity, and execution time. The bench-marking was performed in a processing engine developed in Matlab in order to compare the algorithms under the same scenarios and conclude which one is more secure and suitable for image encryption. As a result of this study we conclude that AES-128 is most suitable cryptographic algorithm for image encryption, followed by 3DES. This proves that chaos-based cryptosystems with DNA operation do not offer an improvement in comparison of traditional symmetric encryption schemes for the purpose presented in this article.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116898596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Usable security of authentication process: New approach and practical assessment","authors":"Maha M. Althobaiti, P. Mayhew","doi":"10.1109/ICITST.2015.7412083","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412083","url":null,"abstract":"Authentication mechanisms are considered the typical method to secure financial websites. Context authentication has become increasingly important in the arena of online banking, which involves sensitive data that belong to users who trust their banks. Multifactor authentication is the most commonly used method of strengthening the log-in process in e-banking. Developing a usable and secure authentication approach and method is the most challenging area for researchers in the fields of security and Human-Computer Interaction (HCI). This paper describes a work-in-progress towards a new approach for authenticating users when access online banking by giving them the opportunity to choose their preferred method to log into e-banking. In our complex experiment with 100 online banking customers, we simulate an original online banking platform based on the proposed approach; then, we evaluate the usability and security of three different methods and assess user awareness of the most visible security design flaws. The initial result shows that the new system model was able to assess the usability and security of different multifactor authentication methods and it is considered a first attempt towards a usable and secure authentication approach.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124891950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of theory of reasoned action in u-health system","authors":"Mincheol Kim","doi":"10.1109/ICITST.2015.7412082","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412082","url":null,"abstract":"The objective of this study was to propose the implications using theory of reasoned action (TRA) on ubiquitous health (u-health) system as a type of advanced evolvement of e-health. This research model through TRA is consisted as three constructs: self-efficacy (cognitive), perceived usefulness (cognitive) and behavioral intention (affective). To assess the proposed research model based on TRA, this study analyzes used PLS-SEM (Partial Least Square-Structural Equation Model) method considering the small number of samples. Finally, this research model showed statistical level significantly on proposed hypotheses and the applicability of TRA model in u-health system.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123785216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}