Tamal Adhikary, A. Das, M. Razzaque, M. E. Chowdhury, S. Parvin
{"title":"Test implementation of a sensor device for measuring soil macronutrients","authors":"Tamal Adhikary, A. Das, M. Razzaque, M. E. Chowdhury, S. Parvin","doi":"10.1109/NSysS.2015.7042951","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7042951","url":null,"abstract":"Continuous cropping without adequate measurement and provisioning of soil nutrient may endanger the sustainability of agriculture. Soil nutrient measurement is greatly required for proper plant growth and effective fertilization. Existing methods of soil testing are costly and time consuming. In this paper, we have developed a sensing system using high precision, wide spectral range Photo Diode (PD), low spectral-width Light Emitting Diode (LED), microcontroller, analog-to-digital converter (ADC) for measuring soil macronutrients. We have integrated a GPRS modem with our sensing unit for remote data collection to a server. A cell of 5.5 mm path length is used to contain soil solutions. The resolution of 0.1-20 mg/100g has been used as standard solution. The test samples are taken from different farmlands and the results are compared with those obtained by a color chart judgement after laboratory analysis. The results found from our proposed system has good level of agreement with the laboratory results.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116752825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mehedee Zaman, Tazrian Siddiqui, M. R. Amin, Md. Shohrab Hossain
{"title":"Malware detection in Android by network traffic analysis","authors":"Mehedee Zaman, Tazrian Siddiqui, M. R. Amin, Md. Shohrab Hossain","doi":"10.1109/NSysS.2015.7043530","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043530","url":null,"abstract":"A common behavior of mobile malware is transferring sensitive information of the cell phone user to malicious remote servers. In this paper, we describe and demonstrate in full detail, a method for detecting malware based on this behavior. For this, we first create an App-URL table that logs all attempts made by all applications to communicate with remote servers. Each entry in this log preserves the application id and the URI that the application contacted. From this log, with the help of a reliable and comprehensive domain blacklist, we can detect rogue applications that communicate with malicious domains. We further propose a behavioral analysis method using syscall tracing. Our work can be integrated with be behavioral analysis to build an intelligent malware detection model.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"76 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124264456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless media access depending on packet size distribution over error-prone channels","authors":"Farah Tanjeem, Md Yusuf Sarwar Uddin, A. Rahman","doi":"10.1109/NSysS.2015.7043519","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043519","url":null,"abstract":"Ad Hoc Network is a decentralized type of network where wireless devices are allowed to discover each other and communicate in peer to peer fashion without involving central access points. In most ad hoc networks, nodes compete for access to shared wireless medium, often resulting in collision (interference). IEEE 802.11, a well-known standard, uses medium access control (MAC) protocol to support delivery of radio data packets for both ad hoc networks and infrastructure based network. But designing a Medium Access Control(MAC) protocol for ad hoc wireless networks is challenging, particularly when the protocol needs to achieve optimal performance both in terms of throughput and efficiency to deliver a packet. Error-prone channel has a significant impact on unsuccessful transmission probability which is often ignored by previous researches. Standard DCF (Distributed Coordination Function) operation of IEEE 802.11 enacted by binary exponential back-off (BEB) algorithm cannot differentiate collision from corruption and therefore sets forth a (time) separation between multiple nodes accessing the channel by (appropriately) adjusting contention window (CW) upon a failure. This leads to increased delay in error-prone network when nodes are not contending at all. Since packet corruption depends on bit error rate (BER) and length of packets, packet size can have significant impact on the throughput in error-prone environment. In this paper, we analyze effect of packet size in determining optimal CW to improve throughput and efficiency for error-prone networks. We propose a dynamic learning based scheme to adaptively select CW sub-range instead of whole selection range for different packet distribution. To validate our scheme extensive simulations have been done and simulation results show significant improvement in E2E delay performance.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116965419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Khan, M. Jonas, S. Rashid, Mushfequr Rahman, Mohammad Saifur Rahman, A. Islam
{"title":"Sign of life: A system for escalating post-disaster rescue missions in ready-made garment factories","authors":"T. Khan, M. Jonas, S. Rashid, Mushfequr Rahman, Mohammad Saifur Rahman, A. Islam","doi":"10.1109/NSysS.2015.7043522","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043522","url":null,"abstract":"Both severity and frequency of disasters in highly-dense industries such as ready-made garment factories have increased to an alarming level in recent times. Technological advancement addresses a number of aspects of post-disaster rescue missions for such events, however, facilitating the missions through providing real-time information about the survivors to the first responders is yet to be focused in the literature. Absence of such real-time information may create a gap between the survivors' requirements and the first responders' action. To bridge the gap, in this paper, we propose a novel system (named Sign of Life) exploiting wireless sensor networks for escalating the post-disaster rescue missions. Even though we mainly focus on ready-made garments factories in the paper, it can be utilized in other similar cases. Here, we propose a network architecture for the system and develop a prototype required for implementing the system. We present ns-2 simulation results pertinent to our proposed network architecture. Finally, we point out how we plan to enhance our proposed system in future.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130908912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modified TCP NewReno for wireless networks","authors":"Ahmed Khurshid, M. Kabir, R. Das","doi":"10.1109/NSysS.2015.7042948","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7042948","url":null,"abstract":"Transmission Control Protocol (TCP) congestion control algorithm works well for the wired networks where most of the timeouts and 3-dupacks are the result of congestion. In the wireless networks, where random segment loss due to bit errors is a dominant concern, the arrival of duplicate acknowledgements or even the retransmission timeouts do not necessarily denote congestion. In those cases, throttling transmission rate is not necessary rather detrimental. For this reason, existing TCP congestion control algorithms fail to perform well in wireless networks. In this paper, we propose a new TCP congestion control algorithm TCP NewReno+ that performs better in wireless networks. We tested our proposed algorithm using the network simulator (ns-2) and it shows better performance than many other TCP variants in the wired, wireless and the mixed networks.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121610872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Suri Dipannita Sayeed, Md. Sajid Hasan, M. S. Rahman
{"title":"Measuring topological robustness of scale-free networks using biconnected components","authors":"Suri Dipannita Sayeed, Md. Sajid Hasan, M. S. Rahman","doi":"10.1109/NSysS.2015.7042945","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7042945","url":null,"abstract":"Models of complex networks are dependent on various properties of networks like connectivity, accessibility, efficiency, robustness, degree distribution etc. Network robustness is a parameter that reflects attack tolerance of a network in terms of connectivity. In this paper we have tried to measure the robustness of a network in such a way that gives a better idea of both stability and reliability of a network. In some previous works, the existence of a giant connected component is considered as an indicator of structural robustness of the entire system. In this paper we show that the size of a largest biconnected component can be a better parameter for measurement of robustness of a complex network. Our experimental study exhibits that scale-free networks are more vulnerable to sustained targeted attacks and more resilient to random failures.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125259209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Alim, Al Islam, Chowdhury Sayeed Hyder, Kazi Hasan Zubaer
{"title":"Digging the innate reliability of wireless networked systems","authors":"A. Alim, Al Islam, Chowdhury Sayeed Hyder, Kazi Hasan Zubaer","doi":"10.1109/NSysS.2015.7042946","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7042946","url":null,"abstract":"Network reliability of wireless networks exhibits a prominent impact in successful advancement of the networking paradigm. A complete understanding of the network reliability demands its in-depth analysis, which is yet to be attempted in the literature. Therefore, we present a comprehensive study on the network reliability in this paper. Our step-by-step stochastic study, from node-level to network-level reliability, reveals a novel finding: the network reliability of a wireless network follows the Gaussian distribution in general. We validate the finding through exhaustive numerical simulation and ns-2 simulation.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133472324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Chowdhury, M. M. Rahman, Sadre-Ala Parvez, A. Alam, A. Basher, A. Alam, S. Rizwan
{"title":"A multi-step approach for RSSi-based distance estimation using smartphones","authors":"T. Chowdhury, M. M. Rahman, Sadre-Ala Parvez, A. Alam, A. Basher, A. Alam, S. Rizwan","doi":"10.1109/NSysS.2015.7042942","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7042942","url":null,"abstract":"Measuring distance from Received Signal Strength Indication (RSSI) of wireless devices has become one of the rudimentary but challenging requirements for Indoor Positioning and Indoor Navigation (IPIN). To address this subject, we propose a novel multi-step approach combining Flat Earth Model, Free Space Friis Model and Linear Approximation Model for measuring distance from RSSI for smart devices with Bluetooth Low Energy (BLE) connectivity. To get better result we proposed an improved averaging and smoothing algorithm of RSSI. We have significantly achieved 13.4% reduced error of measured distance.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130278546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shamir Ahmed, A. Rizvi, Rifat Sabbir Mansur, Md. Rafatul Amin, A. Islam
{"title":"User identification through usage analysis of electronic devices","authors":"Shamir Ahmed, A. Rizvi, Rifat Sabbir Mansur, Md. Rafatul Amin, A. Islam","doi":"10.1109/NSysS.2015.7043518","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043518","url":null,"abstract":"Different aspects of usage of electronic devices significantly vary person to person, and therefore, rigorous usage analysis exhibits its prospect in identifying a user in road to secure the devices. Different state-of-the-art approaches have investigated different aspects of the usage, such as typing speed and dwelling time, in isolation for identifying a user. However, investigation of multiple aspects of the usage in combination is yet to be focused in the literature. Therefore, this paper, we investigate multiple aspects of usage in combination to identify a user. We perform the investigation over real users through letting them interact with an Android application, which we develop specifically for the investigation. Our investigation reveals a key finding considering multiple aspects of usage in combination provides improved performance in identifying a user. We get this improved performance up to a certain number of aspects of usage being considered in the identification task.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129564264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Selina Sharmin, Fernaz Narin Nur, M. Razzaque, Md. Mustafizur Rahman
{"title":"Network lifetime aware area coverage for clustered directional sensor networks","authors":"Selina Sharmin, Fernaz Narin Nur, M. Razzaque, Md. Mustafizur Rahman","doi":"10.1109/NSysS.2015.7042949","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7042949","url":null,"abstract":"The problem of field or area coverage in Directional Sensor Networks (DSNs) presents huge research challenges including appropriate selection of sensors with their active sensing directions in an energy-efficient way. Existing solutions permit to execute coverage enhancement algorithms in each individual sensor nodes, leading to high communication and computation overheads, loss of energy and reduced accuracy. In this paper, we have proposed a novel network lifetime aware area coverage solution, NLAC, for a clustered DSN, where distributed cluster heads (CHs) have the responsibility of determining the number of active member nodes and their sensing directions. The CHs minimizes the overlapping coverage area and energy consumption by switching more nodes in sleep state. The proposed NLAC system is fully distributed and it exploits single-hop neighborhood information only. Results from extensive simulations, show that NLAC system offers better performance in terms of covering area and networklife.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125393343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}