2012 5th International Conference on New Technologies, Mobility and Security (NTMS)最新文献

筛选
英文 中文
Integral Federated Identity Management for Cloud Computing 云计算集成联邦身份管理
Maicon Stihler, A. Santin, Arlindo L. Marcon, J. Fraga
{"title":"Integral Federated Identity Management for Cloud Computing","authors":"Maicon Stihler, A. Santin, Arlindo L. Marcon, J. Fraga","doi":"10.1109/NTMS.2012.6208751","DOIUrl":"https://doi.org/10.1109/NTMS.2012.6208751","url":null,"abstract":"Cloud computing environments may offer different levels of abstraction to its users. Federated identity management, though, does not leverage these abstractions; each user must set up her identity management solution. This situation is further aggravated by the fact that no identity federation solution is able to integrate all abstraction layers (i.e. IaaS, PaaS, and SaaS). On this paper we describe a new architecture offering integral federated identity management, to support multi-domain clients in a multi-provider environment. We also present some implementation details. The proposed architecture offers significant advantages over current offerings: it eases identity management without losing flexibility, offers better user tracking through the whole cloud computing layers, and enables the implementation of multi-provider environments through account data replication.","PeriodicalId":401320,"journal":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117180990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Cross Layer MAC and PHY Architecture for Collision Correction of DSRC Safety Messages 用于DSRC安全消息冲突校正的跨层MAC和PHY架构
W. G. Cassidy, N. Jaber, K. Tepe
{"title":"Cross Layer MAC and PHY Architecture for Collision Correction of DSRC Safety Messages","authors":"W. G. Cassidy, N. Jaber, K. Tepe","doi":"10.1109/NTMS.2012.6208708","DOIUrl":"https://doi.org/10.1109/NTMS.2012.6208708","url":null,"abstract":"This paper presents a new physical (PHY) and medium access control (MAC) cross layer packet collision correction (CC) architecture for correction of Dedicated short range communications (DSRC) safety messages. At its basic level, the CC at the PHY uses a new decision making block that uses information from the MAC layer for the channel estimator and equalizer. This requires a cache of previously received packets, and pre-announcing packet repetitions from the MAC. We present the theoretical equations behind CC mechanism, and describe the components required to implement the cross layer CC using deployment and sequence diagrams. Simulation results show that especially under high user load, reception reliability of the DSRC safety messages increases and PER decreases.","PeriodicalId":401320,"journal":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"81 24","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120807383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mobile Robot Aided Self-Deploying Wireless Sensor Networks for Radiation Leak Detection 移动机器人辅助自部署无线传感器网络辐射泄漏检测
Gurkan Tuna, K. Gulez, T. V. Mumcu, V. C. Gungor
{"title":"Mobile Robot Aided Self-Deploying Wireless Sensor Networks for Radiation Leak Detection","authors":"Gurkan Tuna, K. Gulez, T. V. Mumcu, V. C. Gungor","doi":"10.1109/NTMS.2012.6208745","DOIUrl":"https://doi.org/10.1109/NTMS.2012.6208745","url":null,"abstract":"This paper presents a mobile robot aided self deploying wireless sensor network aiming to detect radiation leaks and to measure radiation levels, and explains design considerations to prolong network life. Special attention is given to the factors which are important for the specific requirements of radiation leak detection. Wireless sensor networks (WSNs) provide numerous benefits to applications with low duty cycle, such as environmental monitoring, event detection, etc. However, the realization of these potential benefits directly depends on energy efficient and reliable communication and coordination capabilities of the deployed system. In this study, challenges of WSNs, deployment strategies using mobile robots, and energy harvesting techniques to maximize lifetime of WSNs are discussed. Also, a comparison of two different exploration strategies is shown with the results of our own application developed in C#. Main contributions of this study are discussions on mobile robot aided WSN deployment strategies and energy harvesting techniques to maximize WSN lifetime.","PeriodicalId":401320,"journal":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1505 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127445266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Redefining Security Engineering 重新定义安全工程
C. Rudolph, A. Fuchs
{"title":"Redefining Security Engineering","authors":"C. Rudolph, A. Fuchs","doi":"10.1109/NTMS.2012.6208773","DOIUrl":"https://doi.org/10.1109/NTMS.2012.6208773","url":null,"abstract":"For a long time, security was not in the focus of software engineering and system engineering processes. Only quite recently the situation has changed and security issues are now more and more integrated into concrete steps of the development process. Various approaches exist for the elicitation of security requirements, for threat modeling, for risk analysis, or for security testing. These different approaches are more-and-more adapted for practical use and become integrated parts of software development life-cycles. Nevertheless, they only support isolated steps in the process (e.g. security of code) or concentrate on particular types of requirements (e.g. for access control). The long-term goal for security engineering shall be the establishment of processes supporting all steps of the engineering process in an integrated way and to co-ordinate the contributions by different roles in this process. This paper identifies the different tasks of security engineering and discusses what parts of these tasks can be realised by using existing approaches. Further, three embedded scenarios are used to identify some concrete requirements for a security engineering process. This discussion shall show the scope of future research and developments in the area of security engineering and motivate inter-disciplinary approaches to establish security engineering as a research discipline.","PeriodicalId":401320,"journal":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126915400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Model for Privacy and Security Risks Analysis 隐私与安全风险分析模型
Ebenezer Paintsil
{"title":"A Model for Privacy and Security Risks Analysis","authors":"Ebenezer Paintsil","doi":"10.1109/NTMS.2012.6208713","DOIUrl":"https://doi.org/10.1109/NTMS.2012.6208713","url":null,"abstract":"This article introduces an extended misuse case (EMC) model for privacy and security risks analysis and formally validates the model by means of colored petri nets (CPNs). The EMC model extends the use and misuse cases (UMCs) model with security and privacy requirements. The proposed EMC model and the CPNs instantiation deal with some of the shortcomings of the traditional UMCs which include lack of quality goals and formal validation techniques. The CPNs instantiation enables automatic detection of possible violation of privacy and security goals and can be extended to communicate risk to both technical and non-technical stakeholders. The CPNs and EMC models are illustrated with privacy and security risks contributing factors for identity management systems (IDMSs).","PeriodicalId":401320,"journal":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116570639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Emulated Test Framework for Service Discovery and MANET Research Based on ns-3 基于ns-3的服务发现与MANET仿真测试框架研究
Magnus Skjegstad, F. T. Johnsen, Jørgen Nordmoen
{"title":"An Emulated Test Framework for Service Discovery and MANET Research Based on ns-3","authors":"Magnus Skjegstad, F. T. Johnsen, Jørgen Nordmoen","doi":"10.1109/NTMS.2012.6208683","DOIUrl":"https://doi.org/10.1109/NTMS.2012.6208683","url":null,"abstract":"In this paper we present our framework for emulated evaluation of service discovery protocols in mobile ad-hoc networks (MANETs). Emulation is preferable to simulation when evaluating real world software implementations, as it provides a controlled network environment without requiring modifications to the software. We base our work on the open-source simulator ns-3, which also has support for network emulation. Our own test framework consists of a set of scripts running in Linux Containers, providing a means to bootstrap and populate service discovery protocols with services and queries. Our setup allows us to perform controlled and repeatable service discovery protocol experiments in MANETs with a high degree of automation. Experiment series are set up, controlled, and statistics calculated by scripts, thus enabling complex, large, and real-time evaluations to be performed without human interaction.","PeriodicalId":401320,"journal":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128713959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Fingerprinting Seismic Activity across an Internet of Things 通过物联网识别地震活动
John P. T. Moore, Jiva N. Bagale, Antonio D. Kheirkhahzadeh, P. Komisarczuk
{"title":"Fingerprinting Seismic Activity across an Internet of Things","authors":"John P. T. Moore, Jiva N. Bagale, Antonio D. Kheirkhahzadeh, P. Komisarczuk","doi":"10.1109/NTMS.2012.6208718","DOIUrl":"https://doi.org/10.1109/NTMS.2012.6208718","url":null,"abstract":"In this paper we will present technology designed to detect seismic events using pervasive computing. The project is focused on using low-cost open hardware in developing countries to provide an alternative more sustainable solution to the costly infrastructure used in countries such as Japan. The work involves building a network of embedded computing devices capable of forming a broadcast group across a range of different networking technologies including emerging 802.15.4-based networks. Soft- ware is been developed capable of detecting patterns of network activity which will act as an early identifier of significant seismic events across our network.","PeriodicalId":401320,"journal":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127727865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Address Allocation Scheme to Improve Lifetime of IPv6 Cluster-Based WSNs 提高IPv6集群wsn生存期的地址分配方案
Leila Ben Saad, B. Tourancheau
{"title":"Address Allocation Scheme to Improve Lifetime of IPv6 Cluster-Based WSNs","authors":"Leila Ben Saad, B. Tourancheau","doi":"10.1109/NTMS.2012.6208699","DOIUrl":"https://doi.org/10.1109/NTMS.2012.6208699","url":null,"abstract":"Extending the lifetime of wireless sensor networks under energy resource limitations of the sensors is a challenging problem. To reach this goal, we propose, in this paper, an address allocation scheme that maximizes the correlation in addresses. This correlation is then exploited by the sensors to reduce the size of their packets transmitted to the sink by applying source coding on addresses. The proposed approach was formulated as an optimization problem that maximizes the network lifetime. The simulation results show that a significant network lifetime improvement can be achieved by using this solution.","PeriodicalId":401320,"journal":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130237437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards an Energy-Efficient Algorithm Based Sleep-Scheduling for Wireless Sensor Networks 基于节能算法的无线传感器网络睡眠调度
B. Zebbane, M. Chenait, N. Badache
{"title":"Towards an Energy-Efficient Algorithm Based Sleep-Scheduling for Wireless Sensor Networks","authors":"B. Zebbane, M. Chenait, N. Badache","doi":"10.1109/NTMS.2012.6208725","DOIUrl":"https://doi.org/10.1109/NTMS.2012.6208725","url":null,"abstract":"In this paper, we investigated the issue of energy conservation, in the WSNs, by keeping a minimum number of sensor nodes to operate in active mode as well as ensure network connectivity. To address this problem, we proposed a Geographical Topology Control (GTC) Protocol to reduce energy consumption in wireless sensor network by sleep scheduling among sensor nodes. The simulation results of GTC show that it can consume 30% less energy than GAF protocol. Moreover, GTC extends the network lifetime by 20% compared to GAF.","PeriodicalId":401320,"journal":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117326384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards Smart Anti-Malwares for Battery-Powered Devices 面向电池供电设备的智能反恶意软件
Hajer Al Housani, H. Otrok, R. Mizouni, J. Robert, A. Mourad
{"title":"Towards Smart Anti-Malwares for Battery-Powered Devices","authors":"Hajer Al Housani, H. Otrok, R. Mizouni, J. Robert, A. Mourad","doi":"10.1109/NTMS.2012.6208692","DOIUrl":"https://doi.org/10.1109/NTMS.2012.6208692","url":null,"abstract":"Anti-malware programs (AM) are well-known powerful security tools that protects against malicious activities. Behaviour-based AMs are seen as suitable candidates to detect unknown malwares in mobile devices. Usually, AM offers different levels of security namely high, medium, and low. The low level offers minimal basic checks in case of low probability of attacks while the high level offers intensive checks in situations of high probability of attacks. Despite their efficiency, behaviour-based anti-malwares are still considered as resource consumer especially in high detection level which reduces considerably the lifetime of handheld devices. In addition, current anti-malwares are not smart to decide when to shift across those levels to reduce both resources consumption and false alarms without scarifying the security level required. To alleviate this problem, we propose a smart anti-malware that can shift between different security levels according to the assets value and the battery status of the resource-constrained device. Such decision is made possible using a nonzero-sum non-cooperative game theoretical model.","PeriodicalId":401320,"journal":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117336050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信