{"title":"Fountain-code-enabled DCF for optimazing throughput in wireless sensors","authors":"Rachid Aouami, Essaid Sabir, M. Rifi, M. Ouzzif","doi":"10.1109/ICITST.2015.7412136","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412136","url":null,"abstract":"This paper presents a new innovation network architecture for the analytical model by the integration which challenges both fountain code and Markov chain modeling to improve the throughput performance for ideal channel conditions. In this context, the collision result in corrupted packets and the following MAC layer retransmissions consume extra energy. Channel contention is a serious problem in Wireless sensor due to packets collisions. The Distribution Coordination Function (DCF) plays a very important role in the analytical model for IEEE802.11 in MAC layer protocol. Our solution uses the Fountain code enabled DCF (FCEDCF) under saturation traffic and compares the result with the classical proposed by Bianchi according a lightly accurate estimation of throughput and collision probability model to analyze the protocol MAC layer.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124247531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Norulzahrah Mohd. Zainudin, S. Ramli, T. T. Zizi, N. Hasbullah, Norazlin Ibrahim
{"title":"Facial expression change detection algorithm using optical flow technique","authors":"Norulzahrah Mohd. Zainudin, S. Ramli, T. T. Zizi, N. Hasbullah, Norazlin Ibrahim","doi":"10.1109/ICITST.2015.7412115","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412115","url":null,"abstract":"This study is aimed to investigate the use of optical flow techniques in detecting changes in facial expressions. A person face expression detection is very important as we can identify a person's emotional and mental state. When communicating with people, human can identify someone's expression accurately compared to computer. Although many approaches are tackled on this topic, there are still several drawbacks and limitations. In order to yield better results, we have applied optical flow technique to detect facial expression. In addition, we have the technique with Horn-Schunck method to optimize the results. Based on the experiment conducted, the average value represented by every facial expression can be identified, and the values are significant for future research that is focused on facial expression classification.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116921452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Azerikatoa Ayoung, Boyce Sigweni, Pamela Y. Abbott
{"title":"Case-based reasoning system for predicting the sustainability of a telecentre","authors":"Azerikatoa Ayoung, Boyce Sigweni, Pamela Y. Abbott","doi":"10.1109/ICITST.2015.7412072","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412072","url":null,"abstract":"Telecentre implementation has been inundated with failure in developing countries. This has necessitated the need for evaluations to unearth reasons for such occurrences. Various methods have been proposed to evaluate IT projects. However, very few of these methods have been used to predict telecentre failure. We combine two approaches (ICT4D evaluation and Machine Learning) to predict the likelihood for failure of a telecentre. Through the use of a case study, this paper uses the well-established Case-Based Reasoning (CBR) methodology to predict failure of telecentres. We apply CBR on real life dataset to predict the Design-Reality Gap score (DRGS). We compare three CBR methods with a naïve benchmark using ArchANGEL. We demonstrate through our experiments that CBR can be used to predict DRGS. This gives a refreshing indication suggesting that it may be feasible to use CBR to evaluate ICT initiatives and to predict adequately outcome of an initiative. Through this mechanism, it may be possible for managers and owners of telecentres to pre-empt an outcome and have the advantage to take mitigating steps. This affords managers an opportunity for remedial action for sustainability.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121977198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Managing security trade-offs in the Internet of Things using adaptive security","authors":"Waqas Aman, E. Snekkenes","doi":"10.1109/ICITST.2015.7412122","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412122","url":null,"abstract":"Adaptive security can take dynamic trade-off decisions autonomously at runtime and is considered a key desirable attribute in the Internet of Things (IoT). However, there is no clear evidence that it can handle these trade-offs optimally to add value to such a complex and dynamic network. We present a scenario-based approach to recognize and evaluate typical security trade-off situations in the IoT. Using the Event-driven Adaptive Security (EDAS) model, we provide the assessment of dynamic trade-off decisions in the IoT. We have showed that an optimum trade-off mitigation response in the IoT can be automated by assessing various contextual requirements, such as the QoS and user preferences, thing capabilities, and the risk faced, at runtime. eHealth scenarios are examined to illustrate system application in IoT-based remote patient monitoring systems.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129850053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A taxonomy of perceived information security and privacy threats among IT security students","authors":"Ali Farooq, S. Kakakhel, S. Virtanen, J. Isoaho","doi":"10.1109/ICITST.2015.7412106","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412106","url":null,"abstract":"The purpose of this study is to explore students' perceived information security and privacy (IS&P) threats and to classify them in a way that helps in analyzing the problem, creating awareness measures and further improving students' IS&P education. Using a qualitative research approach, a group of forty two Master's degree IT students identified seventy five IS&P threats related to them. The identified threats were classified into fourteen categories. Further, using the affinity diagraming technique, the categories were grouped into four domains - Personnel, Devices, Intranet and Internet. In this way, we defined a taxonomy of students' perceived IS&P threats as well as a model that highlights the domains where students consider themselves prone to IS&P threats. The proposed taxonomy and the domain model can be used as a benchmark for designing information security awareness assessment instruments as well as preparing information security awareness programs. The taxonomy can also be used for highlighting areas where students lack information security related knowledge.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121275308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gabriel Biedima Peterside, P. Zavarsky, S. Butakov
{"title":"Automated security configuration checklist for a cisco IPsec VPN router using SCAP 1.2","authors":"Gabriel Biedima Peterside, P. Zavarsky, S. Butakov","doi":"10.1109/ICITST.2015.7412120","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412120","url":null,"abstract":"For large enterprises running many different operating systems, applications, and multi-vendor devices, the task of reviewing the security state of a broad range of devices and business areas in order to either comply with security requirements from regulations or detect risks such as misconfigured devices, out-of-date software, etc., is time-consuming, error-prone, and expensive. Although humans are important in the security assessment process, they are unable to keep up with the task, and may introduce inconsistencies which could further make organizations vulnerable to security breaches. Security automation provides a solution to this challenges. In this paper, a common security automation protocol, Security Content Automation Protocol (SCAP) version 1.2, was leveraged to develop an automated secure configuration checklist which can be used by security professionals to rapidly and consistently audit network edge devices such as a Cisco IPsec VPN router to ensure secure configuration per the baseline.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126041734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recent advances of smart glass application security and privacy","authors":"Buti Al Delail, C. Yeun","doi":"10.1109/ICITST.2015.7412058","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412058","url":null,"abstract":"The recent developments in technology have led to new emerging wearable devices such as Smart Glasses. Usually, consumer electronics devices are designed for the benefits and functionalities they can provide, and the security aspect is incorporated later. In its core, a Smart Glass is based on components available in modern smartphones. This includes the CPU, Sensors and Operating System. Thus would share similar security threats. This paper identifies security threats and privacy issues of the Smart Glass from two different perspectives, as well as propose preliminary solutions to overcome such risks. This includes, a suggested two-factor authentication for smart glasses based on PIN or Voice combined with an Iris scan. The purpose of this work to examine the current state-of-the-art of smart glasses applications, and analyse existing and potential security and privacy issues. Therefore, we investigate issues from a system perspective, and the users point of view. In addition, we survey existing solutions for each issue.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127001750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vimal Kumar SathiyaBalan, P. Zavarsky, Dale Lindskog, S. Butakov
{"title":"Study of applicability of Chinese remainder theorem based group key management for cloud environment","authors":"Vimal Kumar SathiyaBalan, P. Zavarsky, Dale Lindskog, S. Butakov","doi":"10.1109/ICITST.2015.7412069","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412069","url":null,"abstract":"This paper reports on applicability of the Chinese Remainder Theorem (CRT) based Group Key Management (CRTGKM) for cloud environment. The results of our experiments confirm that the cloud environment group key management schemes known as ACV-BGKM and AB-GKM require high computation time for key update and key recovery processes. Therefore, to reduce the computational cost, a CRTGKM algorithm of multimedia multicast environment is applied to cloud environment based on applicability criteria. JAVA-based testbed was developed for simulation of performance of various group key management schemes and for estimation of the computation time for key update and key recovery processes.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115291440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on security and privacy issues in big data","authors":"Duygu Sinanc, Ramazan Terzi, Ş. Sağiroğlu","doi":"10.1109/ICITST.2015.7412089","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412089","url":null,"abstract":"Due to the reasons such as the rapid growth and spread of network services, mobile devices, and online users on the Internet leading to a remarkable increase in the amount of data. Almost every industry is trying to cope with this huge data. Big data phenomenon has begun to gain importance. However, it is not only very difficult to store big data and analyse them with traditional applications, but also it has challenging privacy and security problems. For this reason, this paper discusses the big data, its ecosystem, concerns on big data and presents comparative view of big data privacy and security approaches in literature in terms of infrastructure, application, and data. By grouping these applications an overall perspective of security and privacy issues in big data is suggested.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116194335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Role-based privilege isolation: A novel authorization model for Android smart devices","authors":"B. Das, L. Maddali, Harshita Vani Nallagonda","doi":"10.1109/ICITST.2015.7412093","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412093","url":null,"abstract":"Data ex-filtration is a major security concern in smart devices as they often store private and confidential data. Data ex-filtration can potentially lead to identity theft, financial and non-financial risks, and reputation damage for individuals and organizations. In Android smart devices, sandbox mechanism is not flexible enough to allow an application, such as webbrowser, to protect its own data against attacks such as cross-site request forgery, session or cookie hijacking that exploit application or platform vulnerabilities. These attacks in turn can lead to severe sensitive, private and confidential data ex-filtration. In this paper, we propose a novel authorization model for Android smart devices called Role Based Privilege Isolation (RBPI) which intends to mitigate data ex-filtration. This model achieves fine-grained privilege separation by creating roles based on application usage categories. By using roles, different instances of an application can be made to run with different data access privileges. Thus, the model protects sensitive data even in case where other instances of the same application are compromised. RBPI acts as an additional data security layer on top of the existing Android's security model without any performance overhead. Our proposed model is also applicable on any end-user computing system.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117085133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}