2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

筛选
英文 中文
Telecommunication traffic through submarine cables: Security and vulnerabilities 海底电缆通信:安全性和脆弱性
Aisha Suliaman Alazri
{"title":"Telecommunication traffic through submarine cables: Security and vulnerabilities","authors":"Aisha Suliaman Alazri","doi":"10.1109/ICITST.2016.7856733","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856733","url":null,"abstract":"This paper highlight the idea of submarine cables and its security trends. At the beginning , history of cables and its development have been introduced. The main structure of fiber optic have been discussed as well. Finally, threats and vulnerabilities of submarine cable introduced in details and supported by examples from the world such as natural disaster and habitats, commercial fishing, anchoring, oil and gas development.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133374869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experience-based learning for identifying sub-regions in Wireless Sensor Networks 基于经验的无线传感器网络子区域识别方法
Aiman Ghannami, C. Shao
{"title":"Experience-based learning for identifying sub-regions in Wireless Sensor Networks","authors":"Aiman Ghannami, C. Shao","doi":"10.1109/ICITST.2016.7856722","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856722","url":null,"abstract":"In this paper, we propose a novel mechanism to calculate sub-regions (overlapped areas) in Wireless Sensor networks (WSNs). As the major part of WSN tasks are monitoring and reporting events in sensors' sensing range, those reported events' locations can be used, by means of convex hulls, to accumulatively learn the boundaries of those overlapped areas between the ranges of sensors. Although the proposed mechanism targeted clustered networks, the mechanism also can be used with non-clustered networks. Besides, the proposed method provides two levels of abstraction, the first level is the selection of the proper algorithm to calculate convex hulls, and the second is the selection of the clustering algorithm at implementation time. The main contribution of this work is to provide a new perspective to solve this problem in WSNs and new avenues for future research.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131327017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A low-distortion QR Code watermarking scheme for digital color images robust to gamma correction attack 一种抗伽玛校正攻击的低失真QR码数字彩色图像水印方案
Cynthia Lizbeth Guzman-Candelario, José Juan García-Hernández, Loreto Gonzalez-Hernandez
{"title":"A low-distortion QR Code watermarking scheme for digital color images robust to gamma correction attack","authors":"Cynthia Lizbeth Guzman-Candelario, José Juan García-Hernández, Loreto Gonzalez-Hernandez","doi":"10.1109/ICITST.2016.7856659","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856659","url":null,"abstract":"The use of Internet and new technologies have changed the way in which digital content is provided, unfortunately due to the ease with which such data can be copied and modified, the illegal copying of digital content has been notably increased. This problem has created the need to protect digital content to avoid the illegal use and handling of such information. The watermarking is one of the most popular technologies focused on copyright protection. This technique involves inserting a message that contains information about the copyright owner. An alternative for storing this information is the use of QR Codes (Quick Response Codes) whose maximum symbol size can encoding 4296 alphanumeric data. This paper presents a Rational Dither Modulation based watermarking scheme for QR code embedding into color images. Each watermarked image was measured with the PSNR, SSIM and MSE. Results showed that the obtained values of the used measured were into the valid ranges. Also, the proposed scheme shows robustness to gamma correction attack.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114396235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the accuracy of Search Engine based anti-phishing solutions using lightweight features 使用轻量级功能提高基于搜索引擎的反网络钓鱼解决方案的准确性
G. Varshney, M. Misra, P. Atrey
{"title":"Improving the accuracy of Search Engine based anti-phishing solutions using lightweight features","authors":"G. Varshney, M. Misra, P. Atrey","doi":"10.1109/ICITST.2016.7856731","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856731","url":null,"abstract":"A drawback of the Search Engine (SE) based anti-phishing technique is that authentic websites that are newly launched over the web are classified as phishing websites due to their low ranking. This causes a noticeable reduction in the True Negative Rate (TNR) of such schemes. Some SE based techniques use other complex anti-phishing techniques or features in combination to increase the TNR which results in higher accuracy. However, such an addition dilutes the importance of SE based techniques, which are intended to make anti-phishing lightweight, client side implementable and efficient. In this paper, we study a set of lightweight features including https, digits in domain name and Google Safe Browsing (GSB) API check, and the effect of their addition to the results of a SE based solution. An eventual effect on the accuracy of the existing SE based schemes is also reflected in this paper. A total shift of nearly 96% from False Positive Rate (FPR) to TNR is recorded with a slight decrease of 0.1% in True Positive Rate (TPR), thus increasing the accuracy by 3.28%.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116878284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Learning History Transition Graphs for understanding the programming learning situations 学习历史过渡图用于理解编程学习情况
H. Nakayama, Shoichi Nakamura, Kaname Nozaki, Yasuhiko Morimoto, H. Kaminaga, Y. Miyadera
{"title":"Learning History Transition Graphs for understanding the programming learning situations","authors":"H. Nakayama, Shoichi Nakamura, Kaname Nozaki, Yasuhiko Morimoto, H. Kaminaga, Y. Miyadera","doi":"10.1109/ICITST.2016.7856758","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856758","url":null,"abstract":"This research project aims at enabling easier understanding of a learning situation on the basis of a student's learning process (compile error history) in programming exercise currently conducted at universities. We express transition of learning history of a student in graph form of time series (we call it Learning History Transition Graph (LHTG)). Facilitators or a learner can refer to an LHTG along with additional information regarding the learner. Moreover, this paper describes a prototype of the support system for grasping the learning situation introducing LHTG along with the flow of our support. Application of this system enables a novel learning support with an emphasis on context.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130434397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent dynamic Connectivity Control Algorithm for cluster-based wireless sensor networks 基于集群的无线传感器网络智能动态连通性控制算法
S. M. Jameii, M. Maadani
{"title":"Intelligent dynamic Connectivity Control Algorithm for cluster-based wireless sensor networks","authors":"S. M. Jameii, M. Maadani","doi":"10.1109/ICITST.2016.7856744","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856744","url":null,"abstract":"Connectivity and energy efficiency are two important issues in wireless sensor networks. Clustering is a mechanism to organize the sensor nodes into clusters and manage the connectivity and energy consumption of the network. In this paper, we consider cluster-based wireless sensor network and propose a Connectivity Control Algorithm based on Learning Automata called CCALA. This algorithm dynamically adjusts the transmission radius of sensor nodes to maintain the desirable connectivity. The simulation results demonstrate the efficiency of the proposed algorithm in terms of average transmission radius of nodes, percentage of connected nodes, balanced energy consumption in the network and network lifetime.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125152034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure cloud distributed file system 安全的云分布式文件系统
Kheng Kok Mar, Zhengqing Hu, C. Y. Law, Meifen Wang
{"title":"Secure cloud distributed file system","authors":"Kheng Kok Mar, Zhengqing Hu, C. Y. Law, Meifen Wang","doi":"10.1109/ICITST.2016.7856692","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856692","url":null,"abstract":"Traditional methods of securing data are challenged by specific nature and architecture of cloud. With increasing sophistication of cyber attackers and advancement of cryptanalysis techniques, encryption alone is not sufficient to ensure data security. A more adaptive and flexible approach to data security is thus required. In this paper, we introduce a secure distributed file system which can be layered transparently on existing public cloud storage infrastructure. Our approach combines secret sharing and information dispersal algorithm with more flexible authentication and access control security measures to provide secure storage for enterprise data in the cloud. Our proposed architecture supports a clear separation of roles of storage owner and information owner.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131603189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Robust chaos-based stream-cipher for secure public communication channels 用于安全公共通信信道的鲁棒混沌流密码
Ons Jallouli, S. E. Assad, M. Chetto
{"title":"Robust chaos-based stream-cipher for secure public communication channels","authors":"Ons Jallouli, S. E. Assad, M. Chetto","doi":"10.1109/ICITST.2016.7856658","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856658","url":null,"abstract":"In this paper, we propose a novel stream cipher based on a chaotic system. In order to get the cipher text, the plain text is simply XORed with the key-stream generated by a strong pseudo chaotic number generator (PCNG). Then, all the security of the system is based on the used PCNG. The structure of the proposed PCNG includes two chaotic maps which are weakly coupled by a predefined matrix and integrates a swap function. The PCNG passes all statistical NIST's randomness tests. Also, analysis and experimental results show that the proposed stream cipher has a large key space, a high key sensitivity, and can resist against chosen-plaintext attack and chosen-ciphertext attack. Indeed, for each new execution of the system using the same secret key, the generated key-stream is different due to the IV-setup function. The computing performance of the proposed system is comparable to the main algorithms of eStream such as Rabbit and HC-128.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128059498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Range query integrity in the cloud: the case of video surveillance 范围查询完整性在云:视频监控的情况
F. Buccafurri, G. Lax, S. Nicolazzo, Antonino Nocera
{"title":"Range query integrity in the cloud: the case of video surveillance","authors":"F. Buccafurri, G. Lax, S. Nicolazzo, Antonino Nocera","doi":"10.1109/ICITST.2016.7856691","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856691","url":null,"abstract":"Cloud computing provides users with the possibility to store their data in third-party servers, but these data centers may be untrusted or susceptible to attacks. This issue becomes particularly crucial in the case a third-party cloud is used to store video surveillance data. A number of methods have been proposed in the literature to allow users to verify that query results are correct. However, in the considered scenario, in which efficiency is a critical factor, classical techniques for query integrity are little suitable. This paper proposes a new solution to overcome these drawbacks.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"32 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114122692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
System and Protocols for secure Intercloud Communications 安全云间通信的系统和协议
C. Law, Wen Xie, Zheng Xu, Yi Dou, Chin Ting Yu, Henry C. B. Chan, Daniel Wai Kei Kwong
{"title":"System and Protocols for secure Intercloud Communications","authors":"C. Law, Wen Xie, Zheng Xu, Yi Dou, Chin Ting Yu, Henry C. B. Chan, Daniel Wai Kei Kwong","doi":"10.1109/ICITST.2016.7856739","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856739","url":null,"abstract":"In recent years, there has been considerable interest in Intercloud. Inspired by the Internet, Intercloud allows clouds to be interconnected, forming a cloud/network of clouds. With Intercloud, many new and powerful cloud computing services can be provided. One of the basic problems with supporting Intercloud is the need to address the issue of how to ensure that clouds can communicate with each other effectively and efficiently. Inspired by the HyperText Transfer Protocol (HTTP), this paper presents an Intercloud Communications Protocol (ICCP). ICCP allows clouds to communicate with each other using a common protocol, which is transparent to the underlying application programming interfaces of different clouds. It also includes security functions to ensure confidentiality and integrity. Essentially, clouds can communicate with each other based on XML-based request/response messages in a secure manner. An Intercloud Gateway prototype has been developed to demonstrate the basic functionalities of the ICCP, such as transferring data objects securely. The proposed framework is expected to inspire innovative cloud computing services as well as pose challenging research problems.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114285276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信