{"title":"Mobile Payment Protocol for Micropayments: Withdrawal and Payment Anonymous","authors":"R. Martínez-Peláez, F. Rico-Novella, C. Satizábal","doi":"10.1109/NTMS.2008.ECP.61","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.61","url":null,"abstract":"This paper presents an efficient and practical protocol to carry out micropayments, based on the use of anonymous mobile cash, that provides anonymity and unlinkability to customers. The mobile cash used in the protocol can be of different value and denomination. It is official after a bank signs it with a specific private key. The bank stores the relation between the mobile cash's value and its corresponding public key. The scheme prevents double spending and forgery attacks. A mobile device that supports Java applications and Bluetooth technology is required. Through the use of pseudonym certificates customers can be authenticated using WTLS protocol without disclosing personal information. The protocol requires a low computational cost.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132584803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Youssef Gahi, M. Lamrani, Abdelhak Zoglat, M. Guennoun, B. Kapralos, K. El-Khatib
{"title":"Biometric Identification System Based on Electrocardiogram Data","authors":"Youssef Gahi, M. Lamrani, Abdelhak Zoglat, M. Guennoun, B. Kapralos, K. El-Khatib","doi":"10.1109/NTMS.2008.ECP.29","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.29","url":null,"abstract":"Recent advancements in computing and digital signal processing technologies have made automated identification of people based on their biological, physiological, or behavioral traits a feasible approach for access control. The wide variety of available technologies has also increased the number of traits and features that can be collected and used to more accurately identify people. Systems that use biological, physiological, or behavioral trait to grant access to resources are called biometric systems. In this paper we present a biometric identification system based on the Electrocardiogram (ECG) signal. The system extracts 24 temporal and amplitude features from an ECG signal and after processing, reduces the set of features to the nine most relevant features. Preliminary experimental results indicate that the system is accurate and robust and can achieve a 100% identification rate with the reduced set of features.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122435164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi Layer Cyber Attack Detection through Honeynet","authors":"J. S. Bhatia, R. Sehgal, B. Bhushan, Harneet Kaur","doi":"10.1109/NTMS.2008.ECP.65","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.65","url":null,"abstract":"Intrusion detection forms an indispensable component of cyber security. To keep pace with the growing trends of blackhat community, there is an urgent need to replace single layer detection technology with multi layer detection. Our practical experiences depicted the retrieval of attack evidences from system traces. This paper signifies the integration of host-based intrusion detection system (HIDS) with already existing network based detection on Gen 3 Honeynet architecture. The integration procedure involves the stealth mode operation of HIDS sensor, code organization to generate HIDS alerts in a standard format with requisite network parameters, enhancing the functionality of data fusion to pipeline HIDS sensor with other data sensors for real-time operation and correlation with established network sessions, and further visualization on graphical analysis console. The benefits of new Honeynet architecture have been established. The results in the form of statistical trend distribution and percentage reduction of Honeynet data have been presented.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134423005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Edwin R. Ramos, Sooyoung Chae, Mansig Kim, Myeonggil Choi
{"title":"The Optimistic Schemes of Cluster Analysis and k-NN Classifier Method in Detecting and Counteracting Learned DDoS Attack","authors":"Edwin R. Ramos, Sooyoung Chae, Mansig Kim, Myeonggil Choi","doi":"10.1109/NTMS.2008.ECP.95","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.95","url":null,"abstract":"The creation of Internet has been materialized to help people become aware of different information and unleash them from the state of ignorance. However, its vast expansions turned out to be a threat at their individual premises wherein integrity, accessibility and confidentiality are oftentimes compromised. This paper concerns the optimistic schemes of detecting and counteracting learned DDoS attacks. We described approaches of cluster analysis and k-NN classifier method as effective tools to battle tremendous security threats i.e., malicious usage, attacks and sabotage. These schemes were tested using a set of benchmark data from KDD (Knowledge Discovery and Data Mining) designed by DARPA. Results are clear evidence that combinations of such schemes lead to have an efficient and accurate performance in detecting DDoS attacks.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134425037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Taniguchi, N. Wakamiya, M. Murata, Takashi Fukushima
{"title":"An Autonomous Data Gathering Scheme Adaptive to Sensing Requirements for Industrial Environment Monitoring","authors":"Y. Taniguchi, N. Wakamiya, M. Murata, Takashi Fukushima","doi":"10.1109/NTMS.2008.ECP.17","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.17","url":null,"abstract":"In wireless sensor networks (WSNs), the frequency of sensing and data gathering depends on application requirements and surrounding conditions. In this paper, we propose a data gathering scheme adaptive to sensing requirements for WSNs composed of sensor nodes with multiple sensing capabilities. To accomplish self-organizing control, we adopt the response threshold model for adaptive sensing task engagement and the pulse-coupled oscillator model for energy-efficient transmission and sleep scheduling. Through preliminary simulation experiments, we confirm that autonomous and energy-efficient data gathering can be accomplished satisfying dynamically changing sensing requirements.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130096488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Kaushik, Saurabh Singh, Hemant Tiwari, Sachin K. Goyal, V. Pathak, Phalguni Gupta
{"title":"Automatic 3D Facial Feature Extraction Algorithm","authors":"V. Kaushik, Saurabh Singh, Hemant Tiwari, Sachin K. Goyal, V. Pathak, Phalguni Gupta","doi":"10.1109/NTMS.2008.ECP.28","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.28","url":null,"abstract":"This paper presents a novel algorithm for automatic facial feature extraction from 3D facial data. The proposed algorithm is found to be pose and expression invariant. It is successfully tested on 3D face database from the State University of New York, Binghamton, USA. In order to test the algorithm, the images have been regenerated using these extracted features. Bezier surface algorithm has been used for regeneration.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129466547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaobin Xu, Chun-xi Zhang, K. Hou, Hao Ding, Xunming Diao
{"title":"A New Wireless Fiber Optic Sensor for Monitoring Breath Motion","authors":"Xiaobin Xu, Chun-xi Zhang, K. Hou, Hao Ding, Xunming Diao","doi":"10.1109/NTMS.2008.ECP.13","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.13","url":null,"abstract":"Wireless technology is wide utilized in biomedical and life monitor fields, such as breath motion monitor. As the common technique is big in size and complicate in design, which has impeded the progress in medical application, a novel fiber Bragg grating and wireless based approach is proposed in this paper. In this design, a \"four states method with combined modulation\" principle is utilized in the fiber Bragg grating demodulation, which makes our new approach having the characteristics of small size, high integrality and portability. The system is developed based on the platform of LiveNode (Limos versatile embedded node), and the simulation result shows that the system could monitor the breath motion with a sensitivity of about 41 muepsiv. Additionally, an alarm signal can be transmitted through wireless access medium to a remote server when abnormal event occurs (e.g. stop breathing).","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130834423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fire Detection using Wireless Sensor Networks: An Approach Based on Statistical Data Modeling","authors":"G. Boggia, P. Camarda, L. Grieco, M. Palattella","doi":"10.1109/NTMS.2008.ECP.46","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.46","url":null,"abstract":"The aim of this work is to propose an innovative architecture for fire detection, using a wireless sensor network. This scheme is based on the statistical modeling of the Angstrom index. So far, such an index has been applied in outdoor environments. The results obtained by our analysis have extended its validity also to indoor scenarios. A key strength of our system is that each sensor node models the collected measures of the index, in order to transmit, in normal conditions, only the parameters of such a model, thus saving energy. To test the effectiveness of our fire detection system, we have simulated a fire in a building using the fire dynamics simulator. Results have shown that our proposed system is able to reach a good tradeoff between energy consumption and detection delay, in several operative conditions.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133092805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric Approaches.","authors":"H. Alzaid, M. Alfaraj","doi":"10.1109/NTMS.2008.ECP.59","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.59","url":null,"abstract":"Wireless sensor networks (WSNs) are a new technology that is expected to be used increasingly in the near future due to its cheap cost and data processing ability. However, securing WSNs is a complicated issue since the chosen security scheme should offer data security requirements such as data integrity, confidentiality, authentication, and availability although of the existed resource constraints in the sensors. In this paper, we describe the design of securing end-to-end data in WSNs using a mixture of asymmetric and symmetric approaches (MASA) that improves the security level offered by similar schemes and reduces the resources consumptions.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114763463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Roaming and Vertical Handover between Mobile WiMAX and UMTS","authors":"N. Krichene, N. Boudriga","doi":"10.1109/NTMS.2008.ECP.86","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.86","url":null,"abstract":"Handover between different wireless mobile networks is a key constraint for achieving subscribers satisfaction and enhancing the overall performance. More precisely, mobile subscribers wish to enjoy ubiquitous service availability while being sure of keeping the required security level and a comparable performance level when changing the aceess network. In this paper, we address this issue by proposing a new authentication protocol that enables mobile WiMAX subscribers who do not possess USIM cards to transparently roam and handover to UMTS networks and vice-verca.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123866526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}