{"title":"Improving Trust and Privacy Models in Social Networks","authors":"N. Jabeur, S. Zeadally, Sergey Maydebura","doi":"10.1109/NTMS.2012.6208769","DOIUrl":"https://doi.org/10.1109/NTMS.2012.6208769","url":null,"abstract":"The disclosure and misuse of personal information are two major problems of social networking sites. To address these problems, several models focusing on trust or privacy have been proposed. We propose a privacy model addressing the following issues: What could be private? For whom is it private? When is it private? And how can it be made private? We also propose a trust model covering five aspects related to what could be trusted, when it could be trusted, where it could be trusted, whom to trust, and why to trust someone/something. In addition to leveraging results from current research works on trust and privacy, our models are based on the results of our survey that we have undertaken to analyze the responses of users to friendship requests from unknown individuals and to conduct a comprehensive gender-based analysis of the collected data.","PeriodicalId":401320,"journal":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132577404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk Management for IT Security: When Theory Meets Practice","authors":"Anil Kumar Chorppath, T. Alpcan","doi":"10.1109/NTMS.2012.6208739","DOIUrl":"https://doi.org/10.1109/NTMS.2012.6208739","url":null,"abstract":"A Layer-Based Risk Tool (LBRT) for IT security management in a corporate environment is presented and discussed. The Risk-Rank algorithm is modified for implementation in this tool by taking practical considerations into account. The focus is shifted to a security requirement-based approach during actual assessment of operational risk in the organization and absolute risk values are computed instead of relative risk probabilities. In addition, a risk mitigation algorithm is proposed to find the optimum set of measures under certain budget constraints. A dynamic programming formulation is presented and a shortest path solution is obtained based on Dijkstra's algorithm. The risk assessment and mitigation algorithms are illustrated and evaluated with numerical examples.","PeriodicalId":401320,"journal":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114568709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Identification Based on Hand Geometry and Probabilistic Neural Networks","authors":"El-Sayed M. El-Alfy","doi":"10.1109/NTMS.2012.6208758","DOIUrl":"https://doi.org/10.1109/NTMS.2012.6208758","url":null,"abstract":"Recently, there has been a growing interest in biometric technology as a more reliable means for verifying or identifying persons. In this paper, we present an affordable user-friendly approach for automatic personal identification based on hand geometry and probabilistic neural networks. We evaluate and compare the performance of the proposed approach with other common classifiers including naive Bayes, rule-based, decision tree, and k-NN classifiers. The empirical results reveal that probabilistic neural networks can lead to significant improvement for user identification with more than 98% accuracy, sensitivity and specificity.","PeriodicalId":401320,"journal":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117248339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prospects for WLAN in the Evolved Packet Core Environment","authors":"S. Frei, W. Fuhrmann, A. Rinkel, B. Ghita","doi":"10.1109/NTMS.2012.6208674","DOIUrl":"https://doi.org/10.1109/NTMS.2012.6208674","url":null,"abstract":"The number of mobile devices, such as smartphones, netbooks, notebooks, etc. will increase in the next few years and with the availability of Long Term Evolution (LTE) capable devices and networks the data rates are increasing. As a result of this, the data traffic volume will massively increase by 2015 and therefore the core and access networks have to be offloaded. Beside femtocell offloading solutions, Wireless Local Area Networks (WLANs) could be used as an offloading technology as well. In recent years, as well as in the near future, some huge changes are on the way impacting the WLAN security and ease of use. The paper provides prospects of the possibilities if WLAN would be classified as a trusted access network. Furthermore, the General Packet Radio Service (GPRS) Tunnelling Protocol (GTP) is identified as a valuable mobility protocol, which can create advantages for QoS and mobility but also simplifying the architecture and decrease the signalling effort. The paper proposes offloading scenarios for WLAN which could be used to protect access and core networks against overloading.","PeriodicalId":401320,"journal":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124753314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Medium Access Scheduling for Wireless LANs","authors":"D. Kwak, Hyeonmok Ko, Cheeha Kim","doi":"10.1109/NTMS.2012.6208734","DOIUrl":"https://doi.org/10.1109/NTMS.2012.6208734","url":null,"abstract":"The contention-based Distributed Coordination Function (DCF) scheme performs poorly due to collisions and idle back-off slots. Continuous efforts to improve its performance have rarely been successful because collisions and idle periods are inherent in DCF. This paper proposes a distributed medium access protocol called Distributed Medium Access Scheduling (DMAS), which enables the elimination of most collisions and idle slots in a distributed manner. The stations used for this purpose were divided into blue stations, which have the exclusive right to transmit during their turn, and red stations, which have the opportunity to transmit without overhead. The performances of DMAS, DCF, and the ideal DCF were compared through simulations. The results indicate that DMAS could be used to replace Medium Access Control (MAC) in IEEE standard 802.11 for Wireless LANs with higher throughput.","PeriodicalId":401320,"journal":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129717348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Longhi, D. Marzioni, Emanuele Alidori, G. D. Buo, M. Prist, M. Grisostomi, M. Pirro
{"title":"Solid Waste Management Architecture Using Wireless Sensor Network Technology","authors":"S. Longhi, D. Marzioni, Emanuele Alidori, G. D. Buo, M. Prist, M. Grisostomi, M. Pirro","doi":"10.1109/NTMS.2012.6208764","DOIUrl":"https://doi.org/10.1109/NTMS.2012.6208764","url":null,"abstract":"In many application fields such as home, industry, environment and health, different Wireless Sensor Network (WSN) applications have been developed to solve management problems with smart implementations. This approach can be applied in the filed of solid waste management. In this paper a new architecture is proposed with the aim to improve the on-site handling and transfer optimization in the waste management process. The system architecture is based on sensor nodes and makes use of Data Transfer Nodes (DTN) in order to provide to a remote server the retrieved data measurements from the garbage bins filling. A remote monitoring solution has been implemented, providing user the possibility to interact with the system by using a web browser. Several activities with the aim to provide a Decision Support System (DSS) able to find solutions for resources organization problems linked to solid waste management have been started.","PeriodicalId":401320,"journal":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127043133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of Trojan Propagation in Online Social Networks","authors":"M. R. Faghani, A. Matrawy, Chung-Horng Lung","doi":"10.1109/NTMS.2012.6208767","DOIUrl":"https://doi.org/10.1109/NTMS.2012.6208767","url":null,"abstract":"Online Social Networks (OSNs) are generally based on real social relations. Hence, malware writers are taking advantage of this fact to propagate their viral code into OSNs. In recent years, major OSNs, such as Facebook, were extensively under malware attacks. These attacks commonly lead to hundreds of thousands of compromised accounts that may bear personal and even confidential information. In this paper, different types of malware in OSNs are discussed. Then, this paper investigates the attacking vector of the Trojan type malware in OSNs. First, the clustering coefficient which is one of the main OSN graph characteristics is examined through simulation. It is shown that the clustering coefficient has a linear effect on the speed of Trojans. Second, the effect of user behavior is studied using different user reactions to malicious posts. Through simulations, we show that, if Trojans try to deceive users by choosing interesting topics, the speed of propagation will be increased exponentially. This effect raises the significance of giving security knowledge to avoid designated social engineered posts. Finally, we suggest adjustment to the current model for malware propagation in scale-free networks to consider the effect of clustering coefficient and the user behaviors.","PeriodicalId":401320,"journal":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130163767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ABLA: Angle-Based Location Advertisement for Location-Based Ad-Hoc Routing Protocols","authors":"H. Higaki","doi":"10.1109/NTMS.2012.6208697","DOIUrl":"https://doi.org/10.1109/NTMS.2012.6208697","url":null,"abstract":"Location-based ad-hoc routing protocols such as GEDIR, COMPASS and GPSR achieve higher performance in mobile ad-hoc networks under an assumption that each mobile wireless node is with a GPS receiver. Here, it is critical for their performance to advertise locations of mobile destination wireless nodes. For achieving trade-off between advertisement overhead and reachability of data messages affected by inaccuracy of locations of destination nodes, DREAM restricts advertisement ranges by distance (hop-counts) from destination nodes. For achieving better trade-off, this paper proposes ABLA (angle-based location advertisement) method which restricts advertisement ranges by change of relative direction to destination nodes. Simulation experiments show that ABLA requires lower communication overhead than DREAM for the same reachability of data messages. Hence, combination of ABLA and location-based ad-hoc routing protocols is expected to provide better trade-off between reliability and performance to ad-hoc network applications.","PeriodicalId":401320,"journal":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128970370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RECOMAC: A Cross-Layer Cooperative Network Protocol for Wireless Ad Hoc Networks","authors":"M. Gokturk, Ozgur Gurbuz, E. Erkip","doi":"10.1109/NTMS.2012.6208694","DOIUrl":"https://doi.org/10.1109/NTMS.2012.6208694","url":null,"abstract":"A novel decentralized cross-layer multi-hop cooperative protocol, namely, Routing Enabled Cooperative Medium Access Control (RECOMAC) is proposed for wireless ad hoc networks. The protocol architecture makes use of cooperative forwarding methods, in which coded packets are forwarded via opportunistically formed cooperative sets within a region, as RECOMAC spans the physical, medium access control (MAC) and routing layers. Randomized coding is exploited at the physical layer to realize cooperative transmissions, and cooperative forwarding is implemented for routing functionality, which is submerged into the MAC layer, while the overhead for MAC and route set up is minimized. RECOMAC is shown to provide dramatic performance improvements of eight times higher throughput and one tenth of end-to-end delay than that of the conventional architecture in practical wireless mesh networks.","PeriodicalId":401320,"journal":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128902052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TASAM - Towards the Smart Devices App-Stores Applications Security Management Related Best Practices","authors":"Z. Kazmi, Toni Felguera, J. A. Vila, M. M. Marcos","doi":"10.1109/NTMS.2012.6208729","DOIUrl":"https://doi.org/10.1109/NTMS.2012.6208729","url":null,"abstract":"Mobile phone applications (Apps) including the financial services related mobile Apps such as the banking Apps, are becoming the wave of the future and these must be developed, managed and monitored with a great consideration, in order to ensure the Apps security. It is therefore, a huge responsibility of different Apps publishers and the application stores (App-Stores) to develop and maintain an up-to-date Apps delivery security mechanism. This paper aims to present a proposal on mobile application stores Apps management security related good practices, by reviewing the current security measures deployed by different major mobile application stores and by developing the Apps management best practices, based on the finding of the review.","PeriodicalId":401320,"journal":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"35 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132477138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}