2021 International Conference on Networking and Advanced Systems (ICNAS)最新文献

筛选
英文 中文
AOM4JADE: An Aspect-Oriented Monitoring Approach for JADE-based Multi-Agent Applications AOM4JADE:基于jade的多代理应用程序面向方面的监控方法
2021 International Conference on Networking and Advanced Systems (ICNAS) Pub Date : 2021-10-27 DOI: 10.1109/icnas53565.2021.9628965
Mohamed Sedik Chebout
{"title":"AOM4JADE: An Aspect-Oriented Monitoring Approach for JADE-based Multi-Agent Applications","authors":"Mohamed Sedik Chebout","doi":"10.1109/icnas53565.2021.9628965","DOIUrl":"https://doi.org/10.1109/icnas53565.2021.9628965","url":null,"abstract":"In Multi-Agent System (MAS), agents coordinate their behaviour aiming to achieve some collective goals. However, heterogeneous nature of agents and their autonomy make the coordination task exceedingly difficult and likewise the achievement of the ultimate system target. Consequently, it’s unavoidable to proceed with monitoring techniques in order to analyze and understand the dynamic behaviour of such a system. JAVA Agent DEvelopment framework (JADE) is a JAVA-based framework intensively used in academia to implement MAS. Aspect-Oriented Programming (AOP) paradigm has proved its effectiveness to support software monitoring especially regarding MAS specificities. The combination of monitoring and AOP results in the appearance of a new technique known as Aspect-Oriented Monitoring (AOM). In this paper, we introduce AOM4JADE, an Aspect-Oriented Monitoring Approach for JADE-based Multi-Agent Applications. Proposed approach investigates three JADE foundations: FIPA-ACL-based Agents’ communication, agents’ behaviours and agents’ lifecycle. For each concept, we specify the integration of monitoring related aspects with JADE architecture using Aspect UML class diagram.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117262718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust evaluation method for Wireless Sensor Networks based on behavioral similarity and similarity coefficient 基于行为相似度和相似系数的无线传感器网络信任评估方法
2021 International Conference on Networking and Advanced Systems (ICNAS) Pub Date : 2021-10-27 DOI: 10.1109/icnas53565.2021.9628892
A. Saidi
{"title":"Trust evaluation method for Wireless Sensor Networks based on behavioral similarity and similarity coefficient","authors":"A. Saidi","doi":"10.1109/icnas53565.2021.9628892","DOIUrl":"https://doi.org/10.1109/icnas53565.2021.9628892","url":null,"abstract":"Recently, the security of Wireless Sensor Networks (WSNs) has been taken match attention because WSNs are extensively applied in many applications such as environment monitoring, military operations, critical infrastructure monitoring. Trust factor has been proved to be an efficient strategy that secure the network from compromised and misbehavior nodes. Several trust models have been proposed. However, the majority of them did not consider the uncertainty nature of trust. Therefore, to overcome the uncertainty of trust, we suggest a new trust method using the behavioral similarity between sensor nodes. First, we break the behavior of sensor node into a set of behavioral patterns. Next, we use different threshold values to differentiate between trustworthy and untrustworthy patterns. Using bipartite graph, we represent the sensor nodes and their behavioral patterns as two groups of vertices. Through vertex similarity, the trust value is measured in term of behavioral similarity between the sensor nodes. Finely, we evaluate our scheme using MATLAB as a simulation tool. The result indicates that our scheme achieves high detection rate of malicious nodes and protects the network against attacks.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129095603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FPGA Implementation of Mixed Robust Chaos-based Digital Color Image Watermarking 基于混合鲁棒混沌的数字彩色图像水印的FPGA实现
2021 International Conference on Networking and Advanced Systems (ICNAS) Pub Date : 2021-10-27 DOI: 10.1109/icnas53565.2021.9628906
Redouane Kaibou, M. S. Azzaz
{"title":"FPGA Implementation of Mixed Robust Chaos-based Digital Color Image Watermarking","authors":"Redouane Kaibou, M. S. Azzaz","doi":"10.1109/icnas53565.2021.9628906","DOIUrl":"https://doi.org/10.1109/icnas53565.2021.9628906","url":null,"abstract":"In this article, a hardware implementation of an invisible watermarking system has been proposed using Cyclone IV-E ’EP4CE115F29C7’ FPGA board of ALTERA company. Algorithms have been applied on digital color images using Discrete Wavelet Transform (DWT) for the decomposition and Rössler Chaotic Model (RCM) and Genesio-Tesi Chaotic Model (G-TCM) for the watermark encryption. The security of the implementation has been further increased by comparing image encryption using C-Eclipse software-generated best performing chaotic model outputs with VHDL in Quartus hardware generated Intellectual Property (IP) core ones. The experimental setup includes Video Graphics Array (VGA) monitor for different images display for the experimental validation. Implementation major performances of imperceptibility, robustness, resources consumption, and speed are analyzed and interpreted.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122990102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Convolutional AutoEncoder and Bidirectional Long Short-Term Memory to Estimate Remaining Useful Life for Condition Based Maintenance 基于状态维护的剩余使用寿命估计的卷积自编码器和双向长短期记忆
2021 International Conference on Networking and Advanced Systems (ICNAS) Pub Date : 2021-10-27 DOI: 10.1109/icnas53565.2021.9628958
Samira Abderrezek, Abdelhabib Bourouis
{"title":"Convolutional AutoEncoder and Bidirectional Long Short-Term Memory to Estimate Remaining Useful Life for Condition Based Maintenance","authors":"Samira Abderrezek, Abdelhabib Bourouis","doi":"10.1109/icnas53565.2021.9628958","DOIUrl":"https://doi.org/10.1109/icnas53565.2021.9628958","url":null,"abstract":"Intelligent prognosis and Condition-Based Maintenance (CBM) strategies accurately estimate the Remaining Useful Life (RUL). To achieve this task, various kinds of neural networks have been applied. Bidirectional long short-term memories were preferred for their ability to identify patterns of temporal sequences independently, while Convolutional Autoencoders were used in extracting features. In an attempt to combine the advantages of these two types of deep learning, a hybrid model is proposed in this paper. Based on these two networks, this study tries to find the best alternative by testing several hyperpa-rameters and studying their effects on the model performances. Finally, to study the approach efficiency, it is compared with other similar models.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"19 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134298894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Parallel and Optimized Image Compressed Sensing Solution 一种并行优化的图像压缩感知解决方案
2021 International Conference on Networking and Advanced Systems (ICNAS) Pub Date : 2021-10-27 DOI: 10.1109/icnas53565.2021.9628898
Zakaria Bairi, Kadda Beghdad Bey, Abdennour Amamra, Badis Djamaa
{"title":"A Parallel and Optimized Image Compressed Sensing Solution","authors":"Zakaria Bairi, Kadda Beghdad Bey, Abdennour Amamra, Badis Djamaa","doi":"10.1109/icnas53565.2021.9628898","DOIUrl":"https://doi.org/10.1109/icnas53565.2021.9628898","url":null,"abstract":"Although there have been significant processor technology enhancements in terms of speed, data compression algorithms still do not accomplish the required task in a convenient time for voluminous data. The parallelism of the compression process could significantly improve not only the processing time but also the quality of the solution. In this paper, we propose a new Compressed Sensing (CS) solution based on Parallel CSNet (PCSNet) while integrating the PSNR loss to improve the image reconstruction process. The proposal results in distributing data to be processed to different cores of the machine and could benefit a multitude of applications including autonomous driving, medical imaging, and face detection. At its core, PCSNet uses a parallel convolutional neural network that includes a sampling subnetwork and a reconstruction subnetwork. These two networks learn the sampling matrix from the input image then the reconstructed image from the CS measurements. Thus, the training is done in a parallel way in each iteration then optimized at the master level using PSNR loss in an end-to-end learning process. Obtained experimental results outperform state-of-the-art approaches in terms of both image reconstruction quality and processing time.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133558540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the security of business processes: classification of approaches, comparison, and research directions 业务流程的安全性:方法的分类、比较和研究方向
2021 International Conference on Networking and Advanced Systems (ICNAS) Pub Date : 2021-10-27 DOI: 10.1109/icnas53565.2021.9628908
Abdmeziem Farah, Boukhedouma Saida, Oussalah Mourad
{"title":"On the security of business processes: classification of approaches, comparison, and research directions","authors":"Abdmeziem Farah, Boukhedouma Saida, Oussalah Mourad","doi":"10.1109/icnas53565.2021.9628908","DOIUrl":"https://doi.org/10.1109/icnas53565.2021.9628908","url":null,"abstract":"Business processes are at the heart of companies and evolve constantly to cope with the business needs. Considering the speed at which these changes occur, securing companies’ business processes has become much more critical. Indeed, business processes are becoming more complex and rely on today’s new technologies like the Cloud Computing that cause many security concerns. In this paper, we overview the security with its three goals namely confidentiality, integrity and availability of information systems, focusing on the business process layer. We consider the main business process dimensions (aspects), namely, the informational, the organizational and the logical (behavioural) dimensions. Then, we review and provide a comparison of distinct published security approaches that we have categorised into six main classes. Finally, based on our comparative study, we identify open questions and research directions in the field.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123474193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Replication and Migration Heuristics for Enhancing Service Accessibility in Fog Environment 雾环境下增强服务可达性的复制和迁移启发式方法
2021 International Conference on Networking and Advanced Systems (ICNAS) Pub Date : 2021-10-27 DOI: 10.1109/icnas53565.2021.9628964
Bekkouche Khawla, Brahimi Said, Boulaiche Mehdi
{"title":"Replication and Migration Heuristics for Enhancing Service Accessibility in Fog Environment","authors":"Bekkouche Khawla, Brahimi Said, Boulaiche Mehdi","doi":"10.1109/icnas53565.2021.9628964","DOIUrl":"https://doi.org/10.1109/icnas53565.2021.9628964","url":null,"abstract":"Fog computing has arisen to address the needs of IOT (Internet of Things) applications that are currently unmet by existing solutions. However, many issues associated with efficient and successful accessibility at service occur lead to interruptions and decrease the accessibility of services. In this paper, we introduce two fog service migration methods, which allow users to retrieve service in an efficient way, to improve service accessibility by replicating service on fog nodes. In these two methods,we take into account the service history from fog to each service, we also show the results of simulation experiments regarding the performance evaluation of our proposed heuristics.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"338 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122332838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Authenticated Group Key Agreement Protocol for Dynamic UAV Fleets in Untrusted Environments 非可信环境下动态无人机机群的高效认证组密钥协商协议
2021 International Conference on Networking and Advanced Systems (ICNAS) Pub Date : 2021-10-27 DOI: 10.1109/icnas53565.2021.9628966
Anfal Ayad, Y. Hammal
{"title":"An Efficient Authenticated Group Key Agreement Protocol for Dynamic UAV Fleets in Untrusted Environments","authors":"Anfal Ayad, Y. Hammal","doi":"10.1109/icnas53565.2021.9628966","DOIUrl":"https://doi.org/10.1109/icnas53565.2021.9628966","url":null,"abstract":"Unmanned aerial vehicle (UAV) fleets are the focus of various nations nowadays. Thus, it is expected to witness an explosion of reliability and safety critical UAV-based applications. Moreover, the recent surge of research on applied artificial intelligence and the industry advancement encourage the use of cooperative UAV fleets that offer potential collaborations even between UAVs from different organizations. The untrusted nature of the operation environments in addition to the high level of criticality of such applications require stringent secure protocols. There have been several security protocol proposals to ensure authentication, confidentiality and integrity, yet the overhead generated by these solutions and their impact on performance still severely hamper UAV endurance. In this paper, we propose to tackle the problem of secure communications within dynamic UAV fleets in open public networks using a pairing free Certificateless-Authenticated Group Key Agreement (CL-AGKA) scheme with constant rounds that meets efficiency and strong security. The formal security validation of the proposed protocol has been done by using Automated Validation of Internet Security Protocols and Applications tool (AVISPA). The aforementioned tool revealed that the proposed protocol is resilient against several attacks. More important, the computation cost has been significantly reduced thanks to the elimination of the expensive pairing operations and to the integration of the signature scheme into the key agreement to build one efficient algorithm.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127112703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trust-based Approach to Secure Low-Power and Lossy Networks Routing Protocol 基于信任的低功耗有损网络路由协议安全方法
2021 International Conference on Networking and Advanced Systems (ICNAS) Pub Date : 2021-10-27 DOI: 10.1109/icnas53565.2021.9628947
M. Abid, Sarah Nait Bahloul, Sara Hamlili
{"title":"Trust-based Approach to Secure Low-Power and Lossy Networks Routing Protocol","authors":"M. Abid, Sarah Nait Bahloul, Sara Hamlili","doi":"10.1109/icnas53565.2021.9628947","DOIUrl":"https://doi.org/10.1109/icnas53565.2021.9628947","url":null,"abstract":"Resource-constrained things can now connect to the Internet through Wireless Personal Area Networks (WPAN) and Low Power Wide Area Networks (LPWAN). Since then, they are vulnerable to both attacks from inside the network and from the Internet as well. Many research has already investigated the security threats of such an environment. In this article, we focus on how securing the RPL routing protocol in such a constrained and vulnerable environment.To tackle these issues, we investigate how trust that is inspired by social human behavior can enhance RPL security. Our trust-based solution enables motes evaluating locally the threat level when interacting with their neighbors. However, evaluating the trust in such environment is a challenge due to various factors to take into account and the motes resource scarcity.To this end, we propose a distributed trust management approach based on machine learning to evaluate trust and detect untrustworthy behaviors. Machine learning-based approach have been widely investigated in IoT and RPL.We evaluate the performance through significant metrics so as to obtain a good assessment of the effectiveness of our method.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129150341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICNAS 2021 Cover Page ICNAS 2021封面
2021 International Conference on Networking and Advanced Systems (ICNAS) Pub Date : 2021-10-27 DOI: 10.1109/icnas53565.2021.9628902
{"title":"ICNAS 2021 Cover Page","authors":"","doi":"10.1109/icnas53565.2021.9628902","DOIUrl":"https://doi.org/10.1109/icnas53565.2021.9628902","url":null,"abstract":"","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133131918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信