2015 International Conference on Networking Systems and Security (NSysS)最新文献

筛选
英文 中文
Test implementation of a sensor device for measuring soil macronutrients 一种测量土壤宏量养分的传感器装置的测试实现
2015 International Conference on Networking Systems and Security (NSysS) Pub Date : 2015-02-19 DOI: 10.1109/NSysS.2015.7042951
Tamal Adhikary, A. Das, M. Razzaque, M. E. Chowdhury, S. Parvin
{"title":"Test implementation of a sensor device for measuring soil macronutrients","authors":"Tamal Adhikary, A. Das, M. Razzaque, M. E. Chowdhury, S. Parvin","doi":"10.1109/NSysS.2015.7042951","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7042951","url":null,"abstract":"Continuous cropping without adequate measurement and provisioning of soil nutrient may endanger the sustainability of agriculture. Soil nutrient measurement is greatly required for proper plant growth and effective fertilization. Existing methods of soil testing are costly and time consuming. In this paper, we have developed a sensing system using high precision, wide spectral range Photo Diode (PD), low spectral-width Light Emitting Diode (LED), microcontroller, analog-to-digital converter (ADC) for measuring soil macronutrients. We have integrated a GPRS modem with our sensing unit for remote data collection to a server. A cell of 5.5 mm path length is used to contain soil solutions. The resolution of 0.1-20 mg/100g has been used as standard solution. The test samples are taken from different farmlands and the results are compared with those obtained by a color chart judgement after laboratory analysis. The results found from our proposed system has good level of agreement with the laboratory results.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116752825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Malware detection in Android by network traffic analysis 基于网络流量分析的Android恶意软件检测
2015 International Conference on Networking Systems and Security (NSysS) Pub Date : 2015-02-19 DOI: 10.1109/NSysS.2015.7043530
Mehedee Zaman, Tazrian Siddiqui, M. R. Amin, Md. Shohrab Hossain
{"title":"Malware detection in Android by network traffic analysis","authors":"Mehedee Zaman, Tazrian Siddiqui, M. R. Amin, Md. Shohrab Hossain","doi":"10.1109/NSysS.2015.7043530","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043530","url":null,"abstract":"A common behavior of mobile malware is transferring sensitive information of the cell phone user to malicious remote servers. In this paper, we describe and demonstrate in full detail, a method for detecting malware based on this behavior. For this, we first create an App-URL table that logs all attempts made by all applications to communicate with remote servers. Each entry in this log preserves the application id and the URI that the application contacted. From this log, with the help of a reliable and comprehensive domain blacklist, we can detect rogue applications that communicate with malicious domains. We further propose a behavioral analysis method using syscall tracing. Our work can be integrated with be behavioral analysis to build an intelligent malware detection model.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"76 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124264456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Wireless media access depending on packet size distribution over error-prone channels 无线媒体访问,这取决于在容易出错的信道上的分组大小分布
2015 International Conference on Networking Systems and Security (NSysS) Pub Date : 2015-02-19 DOI: 10.1109/NSysS.2015.7043519
Farah Tanjeem, Md Yusuf Sarwar Uddin, A. Rahman
{"title":"Wireless media access depending on packet size distribution over error-prone channels","authors":"Farah Tanjeem, Md Yusuf Sarwar Uddin, A. Rahman","doi":"10.1109/NSysS.2015.7043519","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043519","url":null,"abstract":"Ad Hoc Network is a decentralized type of network where wireless devices are allowed to discover each other and communicate in peer to peer fashion without involving central access points. In most ad hoc networks, nodes compete for access to shared wireless medium, often resulting in collision (interference). IEEE 802.11, a well-known standard, uses medium access control (MAC) protocol to support delivery of radio data packets for both ad hoc networks and infrastructure based network. But designing a Medium Access Control(MAC) protocol for ad hoc wireless networks is challenging, particularly when the protocol needs to achieve optimal performance both in terms of throughput and efficiency to deliver a packet. Error-prone channel has a significant impact on unsuccessful transmission probability which is often ignored by previous researches. Standard DCF (Distributed Coordination Function) operation of IEEE 802.11 enacted by binary exponential back-off (BEB) algorithm cannot differentiate collision from corruption and therefore sets forth a (time) separation between multiple nodes accessing the channel by (appropriately) adjusting contention window (CW) upon a failure. This leads to increased delay in error-prone network when nodes are not contending at all. Since packet corruption depends on bit error rate (BER) and length of packets, packet size can have significant impact on the throughput in error-prone environment. In this paper, we analyze effect of packet size in determining optimal CW to improve throughput and efficiency for error-prone networks. We propose a dynamic learning based scheme to adaptively select CW sub-range instead of whole selection range for different packet distribution. To validate our scheme extensive simulations have been done and simulation results show significant improvement in E2E delay performance.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116965419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sign of life: A system for escalating post-disaster rescue missions in ready-made garment factories 生命的迹象:在成衣工厂的灾后救援任务升级系统
2015 International Conference on Networking Systems and Security (NSysS) Pub Date : 2015-02-19 DOI: 10.1109/NSysS.2015.7043522
T. Khan, M. Jonas, S. Rashid, Mushfequr Rahman, Mohammad Saifur Rahman, A. Islam
{"title":"Sign of life: A system for escalating post-disaster rescue missions in ready-made garment factories","authors":"T. Khan, M. Jonas, S. Rashid, Mushfequr Rahman, Mohammad Saifur Rahman, A. Islam","doi":"10.1109/NSysS.2015.7043522","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043522","url":null,"abstract":"Both severity and frequency of disasters in highly-dense industries such as ready-made garment factories have increased to an alarming level in recent times. Technological advancement addresses a number of aspects of post-disaster rescue missions for such events, however, facilitating the missions through providing real-time information about the survivors to the first responders is yet to be focused in the literature. Absence of such real-time information may create a gap between the survivors' requirements and the first responders' action. To bridge the gap, in this paper, we propose a novel system (named Sign of Life) exploiting wireless sensor networks for escalating the post-disaster rescue missions. Even though we mainly focus on ready-made garments factories in the paper, it can be utilized in other similar cases. Here, we propose a network architecture for the system and develop a prototype required for implementing the system. We present ns-2 simulation results pertinent to our proposed network architecture. Finally, we point out how we plan to enhance our proposed system in future.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130908912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modified TCP NewReno for wireless networks 修改了无线网络的TCP NewReno
2015 International Conference on Networking Systems and Security (NSysS) Pub Date : 2015-02-19 DOI: 10.1109/NSysS.2015.7042948
Ahmed Khurshid, M. Kabir, R. Das
{"title":"Modified TCP NewReno for wireless networks","authors":"Ahmed Khurshid, M. Kabir, R. Das","doi":"10.1109/NSysS.2015.7042948","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7042948","url":null,"abstract":"Transmission Control Protocol (TCP) congestion control algorithm works well for the wired networks where most of the timeouts and 3-dupacks are the result of congestion. In the wireless networks, where random segment loss due to bit errors is a dominant concern, the arrival of duplicate acknowledgements or even the retransmission timeouts do not necessarily denote congestion. In those cases, throttling transmission rate is not necessary rather detrimental. For this reason, existing TCP congestion control algorithms fail to perform well in wireless networks. In this paper, we propose a new TCP congestion control algorithm TCP NewReno+ that performs better in wireless networks. We tested our proposed algorithm using the network simulator (ns-2) and it shows better performance than many other TCP variants in the wired, wireless and the mixed networks.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121610872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Measuring topological robustness of scale-free networks using biconnected components 利用双连通分量测量无标度网络的拓扑鲁棒性
2015 International Conference on Networking Systems and Security (NSysS) Pub Date : 2015-02-19 DOI: 10.1109/NSysS.2015.7042945
Suri Dipannita Sayeed, Md. Sajid Hasan, M. S. Rahman
{"title":"Measuring topological robustness of scale-free networks using biconnected components","authors":"Suri Dipannita Sayeed, Md. Sajid Hasan, M. S. Rahman","doi":"10.1109/NSysS.2015.7042945","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7042945","url":null,"abstract":"Models of complex networks are dependent on various properties of networks like connectivity, accessibility, efficiency, robustness, degree distribution etc. Network robustness is a parameter that reflects attack tolerance of a network in terms of connectivity. In this paper we have tried to measure the robustness of a network in such a way that gives a better idea of both stability and reliability of a network. In some previous works, the existence of a giant connected component is considered as an indicator of structural robustness of the entire system. In this paper we show that the size of a largest biconnected component can be a better parameter for measurement of robustness of a complex network. Our experimental study exhibits that scale-free networks are more vulnerable to sustained targeted attacks and more resilient to random failures.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125259209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digging the innate reliability of wireless networked systems 挖掘无线网络系统固有的可靠性
2015 International Conference on Networking Systems and Security (NSysS) Pub Date : 2015-02-19 DOI: 10.1109/NSysS.2015.7042946
A. Alim, Al Islam, Chowdhury Sayeed Hyder, Kazi Hasan Zubaer
{"title":"Digging the innate reliability of wireless networked systems","authors":"A. Alim, Al Islam, Chowdhury Sayeed Hyder, Kazi Hasan Zubaer","doi":"10.1109/NSysS.2015.7042946","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7042946","url":null,"abstract":"Network reliability of wireless networks exhibits a prominent impact in successful advancement of the networking paradigm. A complete understanding of the network reliability demands its in-depth analysis, which is yet to be attempted in the literature. Therefore, we present a comprehensive study on the network reliability in this paper. Our step-by-step stochastic study, from node-level to network-level reliability, reveals a novel finding: the network reliability of a wireless network follows the Gaussian distribution in general. We validate the finding through exhaustive numerical simulation and ns-2 simulation.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133472324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A multi-step approach for RSSi-based distance estimation using smartphones 基于rssi的智能手机距离估计的多步骤方法
2015 International Conference on Networking Systems and Security (NSysS) Pub Date : 2015-02-19 DOI: 10.1109/NSysS.2015.7042942
T. Chowdhury, M. M. Rahman, Sadre-Ala Parvez, A. Alam, A. Basher, A. Alam, S. Rizwan
{"title":"A multi-step approach for RSSi-based distance estimation using smartphones","authors":"T. Chowdhury, M. M. Rahman, Sadre-Ala Parvez, A. Alam, A. Basher, A. Alam, S. Rizwan","doi":"10.1109/NSysS.2015.7042942","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7042942","url":null,"abstract":"Measuring distance from Received Signal Strength Indication (RSSI) of wireless devices has become one of the rudimentary but challenging requirements for Indoor Positioning and Indoor Navigation (IPIN). To address this subject, we propose a novel multi-step approach combining Flat Earth Model, Free Space Friis Model and Linear Approximation Model for measuring distance from RSSI for smart devices with Bluetooth Low Energy (BLE) connectivity. To get better result we proposed an improved averaging and smoothing algorithm of RSSI. We have significantly achieved 13.4% reduced error of measured distance.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130278546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
User identification through usage analysis of electronic devices 通过分析电子设备的使用情况来识别用户
2015 International Conference on Networking Systems and Security (NSysS) Pub Date : 2015-02-19 DOI: 10.1109/NSysS.2015.7043518
Shamir Ahmed, A. Rizvi, Rifat Sabbir Mansur, Md. Rafatul Amin, A. Islam
{"title":"User identification through usage analysis of electronic devices","authors":"Shamir Ahmed, A. Rizvi, Rifat Sabbir Mansur, Md. Rafatul Amin, A. Islam","doi":"10.1109/NSysS.2015.7043518","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043518","url":null,"abstract":"Different aspects of usage of electronic devices significantly vary person to person, and therefore, rigorous usage analysis exhibits its prospect in identifying a user in road to secure the devices. Different state-of-the-art approaches have investigated different aspects of the usage, such as typing speed and dwelling time, in isolation for identifying a user. However, investigation of multiple aspects of the usage in combination is yet to be focused in the literature. Therefore, this paper, we investigate multiple aspects of usage in combination to identify a user. We perform the investigation over real users through letting them interact with an Android application, which we develop specifically for the investigation. Our investigation reveals a key finding considering multiple aspects of usage in combination provides improved performance in identifying a user. We get this improved performance up to a certain number of aspects of usage being considered in the identification task.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129564264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network lifetime aware area coverage for clustered directional sensor networks 集群方向传感器网络的网络寿命感知区域覆盖
2015 International Conference on Networking Systems and Security (NSysS) Pub Date : 2015-02-19 DOI: 10.1109/NSysS.2015.7042949
Selina Sharmin, Fernaz Narin Nur, M. Razzaque, Md. Mustafizur Rahman
{"title":"Network lifetime aware area coverage for clustered directional sensor networks","authors":"Selina Sharmin, Fernaz Narin Nur, M. Razzaque, Md. Mustafizur Rahman","doi":"10.1109/NSysS.2015.7042949","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7042949","url":null,"abstract":"The problem of field or area coverage in Directional Sensor Networks (DSNs) presents huge research challenges including appropriate selection of sensors with their active sensing directions in an energy-efficient way. Existing solutions permit to execute coverage enhancement algorithms in each individual sensor nodes, leading to high communication and computation overheads, loss of energy and reduced accuracy. In this paper, we have proposed a novel network lifetime aware area coverage solution, NLAC, for a clustered DSN, where distributed cluster heads (CHs) have the responsibility of determining the number of active member nodes and their sensing directions. The CHs minimizes the overlapping coverage area and energy consumption by switching more nodes in sleep state. The proposed NLAC system is fully distributed and it exploits single-hop neighborhood information only. Results from extensive simulations, show that NLAC system offers better performance in terms of covering area and networklife.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125393343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信