Mourad Benmalek, Y. Challal, A. Derhab, Zakaria Gheid
{"title":"An Efficient Key Management Scheme for Secure Demand-Response Communications in Smart Grid","authors":"Mourad Benmalek, Y. Challal, A. Derhab, Zakaria Gheid","doi":"10.1109/AECT47998.2020.9194168","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194168","url":null,"abstract":"Smart Grid (SG) is considered as the next generation power grid, due to its efficiency, resilience, reliability and sustainability. An important feature that will make the SG more reliable and lead to mutual benefits for both customers and power utilities is the Demand Response (DR). DR refers to a set of actions with the aim of dynamically reducing energy demand at specific times and in specific locations in response to a relative shortage in supply. In this paper, we focus on the security of DR and we propose a new key management scheme for SG to secure DR communications. The proposed scheme is based on a novel multi-group key graph structure that supports the management of multiple and dynamic DR programs simultaneously for each customer. A security and performance analysis is conducted to show the effectiveness of our solution.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127990595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Siddiquie, Narmeen Shafqat, A. Masood, Haider Abbas, W. Shahid
{"title":"Profiling Vulnerabilities Threatening Dual Persona in Android Framework","authors":"K. Siddiquie, Narmeen Shafqat, A. Masood, Haider Abbas, W. Shahid","doi":"10.1109/AECT47998.2020.9194151","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194151","url":null,"abstract":"Enterprises round the globe have been searching for a way to securely empower AndroidTM devices for work but have spurned away from the Android platform due to ongoing fragmentation and security concerns. Discrepant vulnerabilities have been reported in Android smartphones since Android Lollipop release. Smartphones can be easily hacked by installing a malicious application, visiting an infectious browser, receiving a crafted MMS, interplaying with plug-ins, certificate forging, checksum collisions, inter-process communication (IPC) abuse and much more. To highlight this issue a manual analysis of Android vulnerabilities is performed, by using data available in National Vulnerability Database NVD and Android Vulnerability website. This paper includes the vulnerabilities that risked the dual persona support in Android 5 and above, till Dec 2017. In our security threat analysis, we have identified a comprehensive list of Android vulnerabilities, vulnerable Android versions, manufacturers, and information regarding complete and partial patches released. So far, there is no published research work that systematically presents all the vulnerabilities and vulnerability assessment for dual persona feature of Android’s smartphone. The data provided in this paper will open ways to future research and present a better Android security model for dual persona.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115568012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Things Security Assessment in Healthcare Environment","authors":"D. Ali, Ahmed Mahmoud","doi":"10.1109/AECT47998.2020.9194216","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194216","url":null,"abstract":"This paper deals with a new generation of the Internet devices which is named Internet of Things (IoT) concerning the health care environment. IoT allows understanding the interconnected devices among them, including gadgets and sensors… etc.Security assessment and security gaps treatment in the healthcare environment is also tackled through the use of secure routing protocol (SecRout) for the protection of wireless sensor networks (WSN) during different types of attacks and security risks. Symmetric encryption is used in SecRout to confirm the validity of the messages and a small cache in each nodes used to record the route of the partial routing (the previous and subsequent nodes) and it ensures that the destination is able to identify or ignore the frivolous messages. Finally, SecRout protocol performance is compared with the performance of unsecured AODV protocol..","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116295408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modified Planar Rectangular Antenna Array for Wideband 5G MIMO Applications","authors":"U. Rafique, Hisham Khalil","doi":"10.1109/AECT47998.2020.9194162","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194162","url":null,"abstract":"A modified planar rectangular antenna array design is presented for wideband 5G MIMO applications. The single element of the array comprises of a modified rectangular patch fed using a $50 Omega$ microstrip feed line, and a partial ground plane with a rectangular notch. It is observed from simulation results that the proposed antenna offers wideband characteristics from 26.88 GHz to 61.17 GHz. Furthermore, a four-element MIMO array has been designed for its possible use in 5G enabled communication devices. It is demonstrated that the proposed MIMO antenna array provides high isolation between array elements without disturbing the return loss of an individual element.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125621126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Creating Fair Classification Models in Reality Mining Using Data Resampling Techniques","authors":"Ghassan F. Bati","doi":"10.1109/AECT47998.2020.9194174","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194174","url":null,"abstract":"Multiple recent efforts in human-centered computing have used mobile and ubiquitous data to infer propensities of individuals (e.g. to trust others or behave altruistically). Often studied under the umbrella of “Reality Mining” multiple such efforts have reported high accuracies at the considered prediction tasks. However, there has been little work at quantifying the “fairness” of such algorithms in terms of how the quality of the predictions varies over different demographic groups (e.g. across gender). This work takes inspiration from data resampling techniques to create fair classification models. Empirical results suggest that a combination of over and under sampling technique (SmoteTomek) to the sensitive (protected) attribute (e.g. gender) yields improved model’s performance while reducing disparity across genders.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130253020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Najib Ur Rehman, O. Mujahid, Z. Ullah, Abdul Hafeez, Tama Fouzder, Muhammad Ibrahim
{"title":"Power Efficient FPGA-based TCAM Architecture by using Segmented Matchline Strategy","authors":"Najib Ur Rehman, O. Mujahid, Z. Ullah, Abdul Hafeez, Tama Fouzder, Muhammad Ibrahim","doi":"10.1109/AECT47998.2020.9194189","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194189","url":null,"abstract":"Ternary content-addressable memory (TCAM) is famous for its high-speed search operation but this speed comes at the cost of high-power consumption. The paper presents a power efficient architecture for TCAM on field-programmable gate array (FPGA) by using segmented matchline (ML) strategy. Each ML is divided into four equal segments where each segment has nine bits. The proposed TCAM architecture is implemented on Xilinx Virtex-6 FPGA for the size of $64times 36$. Implementation results show that during search operation, the proposed TCAM results in 13.88% reduction in dynamic power consumption compared to the latest FPGA-based TCAMs while not compromising on speed.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127458423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Overview of Privacy Issues in IoT Environments","authors":"Suha Ibrahim Al-Sharekh, K. Al-Shqeerat","doi":"10.1109/AECT47998.2020.9194197","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194197","url":null,"abstract":"Many regions in the world have recently sought to integrate and apply advanced technologies in various aspects of life. IoT applications have become popular in different areas such as smart homes, e-health, smart cities, smart connected devices, and many more. However, the growth and spread of IoT technology increase the security and privacy risks that users may experience. Security and privacy problems cannot be eradicated but can be mitigated. Therefore, it is necessary to explore and update dedicated solutions to alleviate them. This paper aims to provide and identify a comprehensive overview of privacy issues and a set of enhanced solutions to protect user privacy in IoT environments. Moreover, it surveys the opinion of researchers and experts regarding challenges and solutions related to IoT privacy. Finally, a set of recommendations and guidelines are suggested to enhance privacy in IoT environments.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128888418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samar M. Abozeed, Mustafa ElNainay, Soheir A. Fouad, M. Abougabal
{"title":"Software Bug Prediction Employing Feature Selection and Deep Learning","authors":"Samar M. Abozeed, Mustafa ElNainay, Soheir A. Fouad, M. Abougabal","doi":"10.1109/AECT47998.2020.9194215","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194215","url":null,"abstract":"It was proven that the cost of fixing errors escalates as a project moves through its life cycle in an exponential fashion. Identifying buggy classes, as soon as they are committed to the Version Control System, would have a significant impact on reducing such cost. Mining in software repositories is a growing research area, where innovative techniques and models are designed to analyze software repositories data and uncover useful information that can help in software bug prediction. Previous studies showed that Deep Learning has achieved remarkable results in many fields and it keeps evolving.In this paper, experiments are carried out to study the effect of feature selection on the performance of bug prediction models and to check if better results can be obtained by using the promising Deep Learning techniques. Results show that applying feature selection, using a simple filter approach, such as selecting the highly ranked 9 and 5 features out of the 17 features, did not enhance the performance measures in most cases. On the other hand, results show that Deep Learning model (DL) achieves higher performance measures than the selected set of base classifiers for small and balanced datasets.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124527503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Implementation of a Secure Email System with ID-based Encryption","authors":"Eltigani B. Abdelsatir, Mohammad H. Alrashdan","doi":"10.1109/AECT47998.2020.9194199","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194199","url":null,"abstract":"Email continues to be the major business correspondence tool as one of the most regularly used means of communication and collaboration today. The unsecured nature of email, however, can cause unauthorized disclosure of sensitive information. Currently, many email systems are based on schemes such as S/MIME,PGP and PKI to secure communication. However, authentication methods utilized in these systems can become costly with the growing burden of certificate management and pre-enrolment as the number of users increases. In this paper, a secure email framework while taking into account Identity-Based Encryption without pairing is considered. The proposed system provides secure email environment that eliminates PKI hassles with effortless key creation and management.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123868238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Shafeeq, Muhammad Ibrahim, Z. Ullah, Abdul Hafeez, Tama Fouzder
{"title":"A Wearable Millimeter Wave MIMO Antenna Design For High Frequency Applications","authors":"Muhammad Shafeeq, Muhammad Ibrahim, Z. Ullah, Abdul Hafeez, Tama Fouzder","doi":"10.1109/aect47998.2020.9194218","DOIUrl":"https://doi.org/10.1109/aect47998.2020.9194218","url":null,"abstract":"In this paper, we propose an improved methodology for the reduction of mutual coupling within millimeter-wave (mmwave) wearable multiple-input and multiple-output (MIMO) antennas. Such approach is crucial for high frequency applications. The important parameters such as return loss (with best matching having $S_{11}, lt -10$ dB with 35 GHz centered frequency), radiation pattern, diversity gain (DG $gt 9.99)$, envelop correlation coefficient (ECC $lt 0.05)$, and mutual coupling evaluate the presented antenna. The main issue that arises in MIMO antenna is mutual coupling. We mitigate this problem by introducing slots on either end of the transmission line. We achieve a reduced mutual coupling even less than -36 dB and it works within a high-frequency range, which is its beauty.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122587421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}