{"title":"Evaluation of Packet Concatenation Mechanisms for Low Power Devices in Industrial Internet of Things","authors":"S. Siddiqui, A. Khan","doi":"10.1109/INMIC56986.2022.9972988","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972988","url":null,"abstract":"Packet concatenation at Media Access Control (MAC) layer has a profound impact for the performance of low power devices in the Internet of Things (IoT), often termed as Wireless Sensor Networks (WSNs). Due to the recent development of enormous packet concatenation schemes, it has become crucial to compare them in order to identify the best method which could fit a specific application scenario for WSN. This paper compares the dynamic duty-cycling based packet concatenation MAC, ADP-MAC (Adaptive and Dynamic Duty-cycle MAC) with concurrent transmission-based MAC primitive PiP (Packet-in-Packet). Simulations have been conducted to compare the single hop performance of 2 schemes based on their Packet delivery Ratio. The detailed implementation for the two protocols has been used for conducting simulation over Avrora emulator. It has been found that ADP-MAC outperforms PiP due to achieving better synchronization between source and sink nodes","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124299424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constructiveness-Based Product Review Scoring Using Machine Learning","authors":"Muhammad Nauman Asif, Muhammad Arshad Islam","doi":"10.1109/INMIC56986.2022.9972932","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972932","url":null,"abstract":"To make the internet a more productive environment, it is vital to promote constructiveness in online discussion forums. Customers are regularly offered the chance to share their thoughts and experiences with a product on online marketplaces. Generally, online products have fewer constructive reviews, and some of them are unrelated to the product. Existing approaches focus on textual features to classify a product's constructiveness and ignore semantic and contextual information about the reviews. The directed graph model has been utilized in this study to represent information about the product. Also, the node and graph level features like average in-degree, out-degree, and clustering coefficients are used to model constructiveness in product evaluation to encourage the most informative reviews. Graph embedding techniques are used to depict each node as a vector into low-dimensional space and preserve the structure and properties of the graph as well. The topic modeling approach has been used to contextualize the reviews with the appropriate product. Additionally, we employed logistic regression, random forest, Gaussian naive Bayes, support vector machine (SVM), and Gradient Boosting Machine models trained on Amazon product reviews and constructive news corpus for constructiveness. These ML models outperform the baseline approach, achieving a 90% F1-Score.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128170314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fuzzy Approach to Trust Management in Fog Computing","authors":"Masooma Muhammad Nabi, M. A. Shah","doi":"10.1109/INMIC56986.2022.9972942","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972942","url":null,"abstract":"The Internet of Things (IoT) technology has revolutionized the world where anything is smartly connected and is accessible. The IoT makes use of cloud computing for processing and storing huge amounts of data. In some way, the concept of fog computing has emerged between cloud and IoT devices to address the issue of latency. When a fog node exchanges data for completing a particular task, there are many security and privacy risks. For example, offloading data to a rogue fog node might result in an illegal gathering or modification of users' private data. In this paper, we rely on trust to detect and detach bad fog nodes. We use a Mamdani fuzzy method and we consider a hospital scenario with many fog servers. The aim is to identify the malicious fog node. Metrics such as latency and distance are used in evaluating the trustworthiness of each fog server. The main contribution of this study is identifying how fuzzy logic configuration could alter the trust value of fog nodes. The experimental results show that our method detects the bad fog device and establishes its trustworthiness in the given scenario.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131023225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dual-band Chiral Metasurface with Linear Asymmetric Transmission and Orthogonal Polarization Conversion over a wide Incidence Angle for Ku-band and 5G Applications","authors":"Aisha Bibi, Muhammad Ismail Khan, Imdad Khan","doi":"10.1109/INMIC56986.2022.9972882","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972882","url":null,"abstract":"A bilayer, ultrathin, dual-band chiral metasurface is designed and analyzed in this paper with linear polarization conversion and asymmetric transmission for Ku-band and 5G communications. The polarization conversion efficiency of the first band (11.8-13.5 GHz) is ultra-high having a value 0.95 at 12GHz and that of the second band (26.2-26.7 GHz) is 0.9 at 25.6 GHz. The proposed structure also exhibits linear polarization asymmetric transmission in both bands with asymmetric parameters above 90% and above 80% for the first and second bands, respectively. The structure is ultrathin with respect to lowest resonating frequency of 12 GHz having thickness of 0.032λ0. Moreover, the structure is also angularly stable upto 60° for first band and upto 30° for second band, making the structure robust for practical applications. Due to scalability of the design, the proposed structure finds wide range of applications, covering a large spectrum from microwave to 5G bands.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"90 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133523235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Fault-Prediction Mechanism for Improving Yield in Industry 5.0","authors":"Fariha Maqbool, Haroon Mahmood, Hasan Ali Khattak","doi":"10.1109/INMIC56986.2022.9972980","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972980","url":null,"abstract":"Industrial sectors are constantly under pressure to produce higher-quality goods while maximizing yield. Machine maintenance is a critical component of manufacturing, accounting for a significant portion of total production costs. Corrective, preventive, and conditional maintenance strategies only make a negligible contribution to cost and downtime reduction. With the fifth industrial revolution, industrialists can now use sensors and cyber-physical systems to perform predictive maintenance on manufacturing operations. This strategy eliminates unnecessary maintenance and minimizes downtime by continuously collecting and analyzing data to predict time to failure. Numerous approaches to fault prediction have been proposed for predictive maintenance, but most of them are prohibitively expensive due to the massive number of features in manufacturing machines. The purpose of this work is to develop a technique for reliably predicting machine problems with the fewest possible features. To select features, we used SVR-based Recursive Feature Elimination (SVR-RFE) and Random Forest Regressor (RFR), while to predict, we used Long Short-Term Memory (LSTM) and Convolutional Neural Network (CNN). Our experiments on the 2018 PHM Challenge Dataset demonstrate that the proposed strategy outperforms prior approaches and reduces the mean absolute percentage error (SMAPE).","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128786242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Robust Architecture for Aggregation of Heterogeneous Data for Threat Intelligence Platforms","authors":"Afzal Yasmeen, Asim Muhammad, Khan Kifayat Ullah","doi":"10.1109/INMIC56986.2022.9972973","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972973","url":null,"abstract":"With increased dependency on computers, the threat of cyber-attacks becomes more prevalent. Cyber threat intelligence gathers reports from previous threats and helps to identify potential future attacks. The challenge for threat intelligence is overloaded threat feeds from various sources with structural heterogeneity. Currently, most of the sources share same type of data in heterogeneous format with different identifiers. In this paper, an architecture has been proposed for data aggregation from heterogeneous sources. The architecture is based on a three tier model that maps the heterogeneous sources' feeds into the target Threat Intelligence Platform (TIP). In this model, each layer has its own set of tasks and works in a step-by-step pattern, the output of one layer is input to the next layer. The working of this model is entirely dependent on the XML broker for dynamic mapping of sources. The objective is to have a unified system that can transform data from heterogeneous sources into a unified form that can assist the TIP in further statistics generation for analysis. This architecture has been implemented over six heterogeneous sources and performed data aggregation.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129832914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Shaharyar Yaqub, Haroon Mahmood, Ibrahim Nadir, G. Shah
{"title":"An Ensemble Approach for IoT Firmware Strength Analysis using STRIDE Threat Modeling and Reverse Engineering","authors":"Muhammad Shaharyar Yaqub, Haroon Mahmood, Ibrahim Nadir, G. Shah","doi":"10.1109/INMIC56986.2022.9972941","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972941","url":null,"abstract":"Internet of Things (IoT) market is growing exponentially and automated smart solutions are revolutionizing a diverse range of areas with innovative technologies. The most critical and vital part of an IoT system that cannot be overlooked at any cost is its security. The security standards for IoT devices are not mature enough to provide foolproof security and there is still a long journey for manufacturers to incorporate stealth in devices. The most vulnerable component of an IoT system is the firmware which controls all the functionality of the device. If subverted by an attacker, the firmware of the IoT device can prove to be a critical attack surface for obtaining enough information to annihilate an IoT device. In this paper, we propose a twofold strategy to critically analyze the security of an IoT firmware. We will first use the STRIDE threat model to identify the security parameters that attackers could exploit to launch attacks. We will then use reverse engineering to examine and evaluate the security of a wide range of firmware being used in the latest and most commonly used IoT devices based on the identified security parameters. The same parameters can then derive security expectations for a secure IoT firmware. The proposed approach provides a powerful strategy to comprehensively analyze an IoT system's security. Our experimental results show that more than 50 percent of the firmware are exposing critical information that can be used to launch attacks. We believe that our findings will also help establish recommendations for developing secure and resilient firmware.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"2007 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128587246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Model for Cloud Data Security Using ECC-DES","authors":"Qammar Un nisa, M. A. Shah","doi":"10.1109/INMIC56986.2022.9972963","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972963","url":null,"abstract":"An online data storage and retrieval system known as a cloud computing environment makes it easier for users to access data from virtually anywhere at any time. However, according to the CIA triad, data kept on the cloud is vulnerable to data breaches. Data integrity and authentication can be compromised since end users and third parties are both permitted access to the data. With the help of cryptographic algorithms like elliptic curve cryptography (ECC), numerous methods and protocols have been developed to ensure the security and integrity of data. A popular symmetric key block cypher method is the data encryption standard (DES). Up until it was proven unsafe, the security of DES was a sensitive and resolved topic. In this research, we present a method for protecting data transmission among users in cloud computing that, when combined with ECC, can address the security issue with DES. We present a hybrid approach that combines two cryptographic methods. We propose a solution to reduce the key size issue. In comparison to existing encryption systems, our system ensures data confidentiality and authentication integrity. By retaining more space, our plan reduces computational complexity.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"149 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125880810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CMRUTU: Code Mixed Roman Urdu (Roman Urdu and English) to Urdu Translator","authors":"Muhammad Wisal, A. Mustafa, Umair Arshad","doi":"10.1109/INMIC56986.2022.9972972","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972972","url":null,"abstract":"Urdu is the official language of Pakistan and a familiar language in the South Asian countries. It is spoken as the first language by nearly 70 million people and as a second language by more than 100 million people, mainly in Pakistan and India. Most of the textual communication is not pure Roman Urdu. There are words of actual English in between those Roman Urdu sentences. It is necessary to have a translator that can translate these code-mixed sentences into Urdu because the purpose of any language is to communicate. It can be difficult for a machine to understand the shift of languages in between a sentence. In the past, researchers have worked on Urdu transliteration and rule-based translation. However, a pure translation of mixed Roman Urdu to Urdu with such accuracy is novel. In this research, we have introduced Mixed Language (Roman Urdu and English) to the Urdu translator. A deep learning pre-trained model “g2p_multilingual_byT5_small” is fine-tuned with a newly created corpus of Mixed Roman Urdu sentences and their translations in pure Urdu. With a BLEU score of 66.73, It can translate text messages, paragraphs, or any descriptions from Roman Urdu to Urdu. We have carried out this research using Python programming language and the model training on Google Colab.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121872142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}