S. El-Ramly, S. Ashry, A. Elkouny, A. Elsherbini, H. Elbadawy
{"title":"SMSHM: Secure Mesh Mode Protocol to Enhance Security of 4G Networks","authors":"S. El-Ramly, S. Ashry, A. Elkouny, A. Elsherbini, H. Elbadawy","doi":"10.1109/ICITCS.2013.6717884","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717884","url":null,"abstract":"In order to protect the user's privacy as well as the network used, security support is mandatory for any communication. Unilateral authentication between the subscriber and Base Station (BS) was one of IEEE 802.16 security leaks. According to IEEE 802.16e, some security flaws are resolved, while there is scarcities of research on Mesh topology security as some vulnerability are still present. This paper points out a number of security holes and proposes a novel protocol intended to enhance security in Mesh mode. The protocol is based on biocryptosystems providing solutions to secure initial network entry, and achieve privacy between two different nodes in the network. Additionally, the protocol used the integration of Advance Encryption Standard and Biometric Digital Key (AES-BDK) to secure further network messages and key distribution.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"600 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116291874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Innate Immune System Model for Malware Detection","authors":"M. Ali, M. A. Maarof","doi":"10.1109/ICITCS.2013.6717828","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717828","url":null,"abstract":"Malware stand for Malicious Software became a major threat facing the massive amount of data transmitted through the internet and the systems holding that data. Malware detection is the process of identifying the malicious behavior or object as malware. Many methods used to do the detection process, these methods are varied depending on the process used by the detector -anti virus or anti malware is a commercial name of detectors. Signature base, behavior base and specification base. Increasing the detection accuracy is the main goal of researchers in the last decade. In this paper we introduce a dynamic malware detection model by applying the innate immune system to improve the detection accuracy. The proposed model applied to the portable executable file representation by extracting the API call logs from new installed windows environment due to the wide spread of this type of files in different platforms. The results of the experiments show a better detection accuracy of the proposed model for known malware and promising improvement on the new unknown malware and polymorphic malware.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131029463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reinforcement Learning-Based Trust and Reputation Model for Spectrum Leasing in Cognitive Radio Networks","authors":"Mee Hong Ling, K. Yau","doi":"10.1109/ICITCS.2013.6717874","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717874","url":null,"abstract":"Cognitive Radio (CR), which is the next generation wireless communication system, enables unlicensed users or Secondary Users (SUs) to exploit underutilized spectrum (called white spaces) owned by the licensed users or Primary Users (PUs) so that bandwidth availability improves at the SUs, which helps to improve the overall spectrum utilization. Collaboration, which has been adopted in various schemes such distributed channel sensing and channel access, is an intrinsic characteristic of CR to improve network performance. However, the requirement to collaborate has inevitably open doors to various forms of attacks by malicious SUs, and this can be addressed using Trust and Reputation Management (TRM). Generally speaking, TRM detects malicious SUs including honest SUs that turn malicious. To achieve a more efficient detection, we advocate the use of Reinforcement Learning (RL), which is known to be flexible and adaptable to the changes in operating environment in order to achieve optimal network performance. Its ability to learn and re-learn throughout the duration of its existence provides intelligence to the proposed TRM model, and so the focus on RL-based TRM model in this paper. Our preliminary results show that the detection performance of RL-based TRM model has an improvement of 15% over the traditional TRM in a centralized cognitive radio network. The investigation in the paper serves as an important foundation for future work in this research field.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131048382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Co-Processor Aided Attack on Embedded Multi-OS Environments","authors":"Pierre Schnarz, J. Wietzke, I. Stengel","doi":"10.1109/ICITCS.2013.6717818","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717818","url":null,"abstract":"Within several domains of embedded computing, multi operating systems will be introduced in future. This is motivated by the need of fulfilling widespread requirements. Additionally, safety critical automotive domains add high demands on the security of such systems. Depending on the hardware architecture, it is possible to use several techniques to isolate systems. These are necessary for security reasons. Despite the state-of-the-art virtualization mechanisms, the idea of asymmetric-multiprocessing can be used to split a system's hardware resources, which makes the virtualization of hardware obsolete. However, independent devices like co-processors might add potential security risks. In this paper an attack vector is shown, which utilizes a co-processor to break through the isolation of an operating system domain. Using a multi operating system environment, we manipulate a co-processor in order to circumvent isolation mechanisms on behalf of an attacking operating system. The attack demonstrates an architectural demand to extend the virtualization capabilities of autarkic devices like co- processors.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132878260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Computing Traffic Simulation Data Process","authors":"W. Suh","doi":"10.1109/ICITCS.2013.6717855","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717855","url":null,"abstract":"This paper presents a mobile computing traffic simulation based on an ad hoc distributed simulation with optimistic execution. In this system, data collection, processing, and simulations are performed in a distributed fashion. Each individual simulator models the current traffic conditions of its local vicinity focusing only on its area of interest, without modeling other less relevant areas. Collectively, a central server coordinates the overall simulations with an optimistic execution technique and provides a predictive model of traffic conditions in large areas by combining simulations geographically spread over large areas. This distributed approach increases computing capacity of the entire system and speed of execution. The proposed model manages the distributed network, synchronizes the predictions among simulators, and resolves simulation output conflicts. Proper feedback allows each simulator to have accurate input data and eventually produce predictions close to reality. Such a system could provide both more up-to-date and robust predictions than that offered by centralized simulations within a single transportation management center. As these systems evolve, the mobile computing online traffic predictions can be used in surface transportation management and travelers will benefit from more accurate and reliable traffic forecast.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115688529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Child's Body Part Tracking Simulates Babysitter Vision Robot","authors":"Hanan Aljuaid, D. Mohamad","doi":"10.1109/ICITCS.2013.6717812","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717812","url":null,"abstract":"The aim of this paper is to explore novel algorithms to track a child-object in an indoor and outdoor background video. It focuses on tracking a whole child-object while simultaneously tracking the body parts of that object to produce a positive system. This effort suggests an approach for labeling three body sections, i.e., the head, upper, and lower sections, and then for detecting a specific area within the three sections, and tracking this section using a Gaussian mixture model (GMM) algorithm according to the labeling technique. The system is applied in three situations: child-object walking, crawling, and seated moving. During system experimentation, walking object tracking provided the best performance, achieving 91.932% for body-part tracking and 96.235% for whole-object tracking. Crawling object tracking achieved 90.832% for body-part tracking and 96.231% for whole- object tracking. Finally, seated-moving-object tracking achieved 89.7% for body-part tracking and 93.4% for whole-object tracking.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114477761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visualization for Interest in Music Based on Plurk Social Network","authors":"Dong-liang Lee, L. Deng, Yi-Jen Liu","doi":"10.1109/ICITCS.2013.6717898","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717898","url":null,"abstract":"n this dissertation, we have provided a system of visualization for people's interest in music on social networks. This visualization system designed for interest in music on social networks provides several capabilities: (A) visualization for friends who share the same interest in music, (B) to group people who share the same interest in music into categories, and (C) to recommend songs function for an increase in the common interest in music. These capabilities provide some essential capabilities for social networking analysis. Take the following for example: general users chat with others through instant messaging on social networks. Or perhaps, they would rather start up a discussion with other users. However, discussions of this kind that share similar interests can allow users to get to know others and improve interpersonal relationships. Afterwards, they can know their friends more about what they like and what dislike. In this dissertation, the research fellows need to handle the text information gathered from Plurk (the world-famous social network) to carry out regularization. We make use of the data mining method to analyze the information on the subject of music interest. We classify various types of songs. They also substitute these keywords called different degree of preference into the iSpreadRank algorithm to give different degree of preference. In our experience, this visualization system plays an essential rule in the analysis on social network.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116172349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison Performance of MFFV2 and MVFactor for Factoring the Modulus","authors":"Kritsanapong Somsuk, Sumonta Kasemvilas","doi":"10.1109/ICITCS.2013.6717817","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717817","url":null,"abstract":"The aim of this research is to find the better modified integer factorization between two algorithms we recently proposed. These two algorithms are able to decrease time to search for two prime factors of the modulus. Factoring the modulus leads to breaking of RSA which the security is based on integer factorization. Both of these algorithms are called Modified Fermat Factorization Version 2 (MFFV2) and Modified VFactor (MVFactor) that can finish all value of the modulus. Furthermore, MFFV2 and MVFactor can factor the modulus very quickly whenever the difference between two large prime factors of the modulus is not too far. However, to find the better method, MFFV2 and MVFactor will be compared to each other. The experiments are divided into two parts. First is for the modulus with the same size of two prime factors. The results show that the speed of MVFactor is faster than MFFV2. Nevertheless, the computation speed of the bigger size modulus of MVFactor becomes lower than MFFV2, but not too much. The other part is for the modulus with the difference size of two prime factors. The experiment results show that MVFactor can factor the modulus very rapidly when compared with MFFV2 for all possible value of the modulus.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126745232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Case Study of Wellness IT: Therapeutic Horseback Riding","authors":"Soojung Park","doi":"10.1109/ICITCS.2013.6717770","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717770","url":null,"abstract":"Recently, there has been an increasing interest and demand for an effective use of leisure time. Many Koreans especially enjoy horseback riding as one way of spending leisure time. Some scholars noticed psychological, social, and emotional benefits produced by horseback riding because it is connected with various aspects of human movement and a special connection with an animal. Therefore, this study first aims to investigate how horseback riding has special meaning as a recreation therapy. In addition, this investigation will develop a horseback riding therapy program designed for the well-being and happiness of individuals. Following \"screen golf\" that heralded the age of indoor golf by grafting golf with IT technology, the age of indoor horse-riding is coming into existence. That is, the so called 'screen horse-riding' that enables indoor horse-riding can accelerate the popularization of horse-riding. The basic concept of the 'screen horse-riding' is the robotic terminology that is used in the rodeo games. To put it easily, one only needs to conjure up the image of horse-riding game machine in an amusement park. However, 'screen horse-riding' is different in the sense that the cutting edge IT technologies are utilized to create virtual reality that is very similar to the actual horse-riding experience. Likewise, its effect as sports is optimized instead of stopping merely at providing amusing experience.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121395318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spatial Information Service Model and Considerations in u-City","authors":"Insu Cho, Heejun Park","doi":"10.1109/ICITCS.2013.6717886","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717886","url":null,"abstract":"This study proposes the use of a service classification model to determine systematic service in ubiquitous environments. In addition, we identified various issues by analyzing the results and applying them to spatial information services based on ubiquitous environments.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120904769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}