2015 Sixth International Conference on Emerging Security Technologies (EST)最新文献

筛选
英文 中文
Assistive Trajectories for Human-in-the-Loop Mobile Robotic Platforms 人在环移动机器人平台的辅助轨迹
M. Gillham, G. Howells, Stephen Kelly
{"title":"Assistive Trajectories for Human-in-the-Loop Mobile Robotic Platforms","authors":"M. Gillham, G. Howells, Stephen Kelly","doi":"10.1109/EST.2015.19","DOIUrl":"https://doi.org/10.1109/EST.2015.19","url":null,"abstract":"Autonomous and semi-autonomous smoothly interruptible trajectories are developed which are highly suitable for application in tele-operated mobile robots, operator on-board military mobile ground platforms, and other mobility assistance platforms. These trajectories will allow a navigational system to provide assistance to the operator in the loop, for purpose built robots or remotely operated platforms. This will allow the platform to function well beyond the line-of-sight of the operator, enabling remote operation inside a building, surveillance, or advanced observations whilst keeping the operator in a safe location. In addition, on-board operators can be assisted to navigate without collision when distracted, or under-fire, or when physically disabled by injury.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131363203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Combined Image Data Hiding Techniques in a Clone-Resistant SoC Environment 抗克隆SoC环境下的综合图像数据隐藏技术
Marwa Saidi, Oussama Benrhouma, W. Adi, S. Belghith
{"title":"Combined Image Data Hiding Techniques in a Clone-Resistant SoC Environment","authors":"Marwa Saidi, Oussama Benrhouma, W. Adi, S. Belghith","doi":"10.1109/EST.2015.20","DOIUrl":"https://doi.org/10.1109/EST.2015.20","url":null,"abstract":"In this paper, a combined algorithm of a chaotic data hiding scheme based on DCT transform and a watermarking technique based on Singular Value Decomposition(SVD) transform is proposed. Our scheme offers the feature to check the integrity of the extracted secret image. Basically, we will embed the watermarked secret bits in the least significant coefficients of the DCT transform and check the integrity of the embedded message by comparing the extracted version with the calculated one using a tamper detection key introduced in the watermarking technique. A possible future scenario application of embedding and extracting the watermark in SoC environment is proposed.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131375296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving System Reliability by Joint Usage of Hash Function Bits and Error Correction Coding 联合使用哈希函数位和纠错编码提高系统可靠性
M. Basil, W. Adi
{"title":"Improving System Reliability by Joint Usage of Hash Function Bits and Error Correction Coding","authors":"M. Basil, W. Adi","doi":"10.1109/EST.2015.15","DOIUrl":"https://doi.org/10.1109/EST.2015.15","url":null,"abstract":"Hash functions are widely deployed in many cryptographic applications, such as message integrity checks, digital signatures, message authentication codes (MACs), and many other applications. In fact, hash functions are mainly dedicated to detect tampering and prove of message authenticity. Thus, if the hash digest does not match the sent digest, this indicates modification in the data or in the hash digest itself. This may be a result of transmission error or a possible abusing attack on the system. It is observed that most practical systems deploy a bit-size for the hash mappings which ranges from 160 bits to 512 bits or more. This is often over dimensioned to comply with standardized hash functions. Therefore, the hash function bits as output of pseudorandom mapping can be replaced partially and temporarily by some forward error correcting code ECC leaving the remaining bits for authentication without significant loss of authentication security. This work evaluates a practical example combining a simple interleaved Reed-Solomon single-byte error correcting code to replace a small part of the hash bits in the sent message. On the receiving side, the ECC bytes are used to correct errors and then removed and replaced by the remainder of the original hash value. The non-replaced large hash bits would contribute to let the miss-correction performance of the code approaches zero. This technique would reduce non-significantly or even negligibly the authentication level of the system, however would improve the overall system reliability in a great deal. No changes in the size and format of the existing authenticated message are necessary. The reliability improvement and security degradation in our proposed technique are evaluated and compared with the original designed values. Experimental simulations are also compared with those statistically computed under idealized randomizing assumptions for the hash function.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123572098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data Aggregation in Wireless Sensor Networks for Lunar Exploration 月球探测无线传感器网络中的数据聚合
X. Zhai, T. Vladimirova
{"title":"Data Aggregation in Wireless Sensor Networks for Lunar Exploration","authors":"X. Zhai, T. Vladimirova","doi":"10.1109/EST.2015.9","DOIUrl":"https://doi.org/10.1109/EST.2015.9","url":null,"abstract":"This paper presents research work related to the development of Wireless Sensor Networks (WSN) gathering environmental data from the surface of the Moon. Data aggregation algorithms are applied to reduce the amount of the multi-sensor data collected by the WSN, which are to be sent to a Moon orbiter and later to Earth. A particular issue that is of utmost importance to space applications is energy efficiency and a main goal of the research is to optimise the algorithm design so that the WSN energy consumption is reduced. An extensive simulation experiment is carried out, which confirms that the use of the proposed algorithms enhances significantly the network performance in terms of energy consumption compared to routing the raw data. In addition, the proposed data aggregation algorithms are implemented successfully on a System-on-a-chip (SoC) embedded platform using a Xilinx Zynq FPGA device. The data aggregation has two important effects: the WSN life time is extended due to the saved energy and the original data accuracy is preserved. This research could be beneficial for a number of future security related applications, such as monitoring of phenomena that may affect Earth's planetary security/safety as well as monitoring the implementation of Moon treaties preventing establishment of military bases on the lunar surface.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125381492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Intrusion Detection System against Black Hole Attacks on the Communication Network of Self-Driving Cars 针对自动驾驶汽车通信网络黑洞攻击的入侵检测系统
K. Alheeti, A. Gruebler, K. Mcdonald-Maier
{"title":"An Intrusion Detection System against Black Hole Attacks on the Communication Network of Self-Driving Cars","authors":"K. Alheeti, A. Gruebler, K. Mcdonald-Maier","doi":"10.1109/EST.2015.10","DOIUrl":"https://doi.org/10.1109/EST.2015.10","url":null,"abstract":"The emergence of self-driving and semi self-driving vehicles which form vehicular ad hoc networks (VANETs) has attracted much interest in recent years. However, VANETs have some characteristics that make them more vulnerable to potential attacks when compared to other networks such as wired networks. The characteristics of VANETs are: an open medium, no traditional security infrastructure, high mobility and dynamic topology. In this paper, we build an intelligent intrusion detection system (IDS) for VANETs that uses a Proportional Overlapping Scores (POS) method to reduce the number of features that are extracted from the trace file of VANET behavior and used for classification. These are relevant features that describe the normal or abnormal behavior of vehicles. The IDS uses Artificial Neural Networks (ANNs) and fuzzified data to detect black hole attacks. The IDSs use the features extracted from the trace file as auditable data to detect the attack. In this paper, we propose hybrid detection (misuse and anomaly) to detect black holes.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128137203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信