2008 New Technologies, Mobility and Security最新文献

筛选
英文 中文
Mobile Payment Protocol for Micropayments: Withdrawal and Payment Anonymous 小额支付的移动支付协议:取款和匿名支付
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.61
R. Martínez-Peláez, F. Rico-Novella, C. Satizábal
{"title":"Mobile Payment Protocol for Micropayments: Withdrawal and Payment Anonymous","authors":"R. Martínez-Peláez, F. Rico-Novella, C. Satizábal","doi":"10.1109/NTMS.2008.ECP.61","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.61","url":null,"abstract":"This paper presents an efficient and practical protocol to carry out micropayments, based on the use of anonymous mobile cash, that provides anonymity and unlinkability to customers. The mobile cash used in the protocol can be of different value and denomination. It is official after a bank signs it with a specific private key. The bank stores the relation between the mobile cash's value and its corresponding public key. The scheme prevents double spending and forgery attacks. A mobile device that supports Java applications and Bluetooth technology is required. Through the use of pseudonym certificates customers can be authenticated using WTLS protocol without disclosing personal information. The protocol requires a low computational cost.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132584803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Biometric Identification System Based on Electrocardiogram Data 基于心电图数据的生物识别系统
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.29
Youssef Gahi, M. Lamrani, Abdelhak Zoglat, M. Guennoun, B. Kapralos, K. El-Khatib
{"title":"Biometric Identification System Based on Electrocardiogram Data","authors":"Youssef Gahi, M. Lamrani, Abdelhak Zoglat, M. Guennoun, B. Kapralos, K. El-Khatib","doi":"10.1109/NTMS.2008.ECP.29","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.29","url":null,"abstract":"Recent advancements in computing and digital signal processing technologies have made automated identification of people based on their biological, physiological, or behavioral traits a feasible approach for access control. The wide variety of available technologies has also increased the number of traits and features that can be collected and used to more accurately identify people. Systems that use biological, physiological, or behavioral trait to grant access to resources are called biometric systems. In this paper we present a biometric identification system based on the Electrocardiogram (ECG) signal. The system extracts 24 temporal and amplitude features from an ECG signal and after processing, reduces the set of features to the nine most relevant features. Preliminary experimental results indicate that the system is accurate and robust and can achieve a 100% identification rate with the reduced set of features.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122435164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Multi Layer Cyber Attack Detection through Honeynet 基于蜜网的多层网络攻击检测
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.65
J. S. Bhatia, R. Sehgal, B. Bhushan, Harneet Kaur
{"title":"Multi Layer Cyber Attack Detection through Honeynet","authors":"J. S. Bhatia, R. Sehgal, B. Bhushan, Harneet Kaur","doi":"10.1109/NTMS.2008.ECP.65","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.65","url":null,"abstract":"Intrusion detection forms an indispensable component of cyber security. To keep pace with the growing trends of blackhat community, there is an urgent need to replace single layer detection technology with multi layer detection. Our practical experiences depicted the retrieval of attack evidences from system traces. This paper signifies the integration of host-based intrusion detection system (HIDS) with already existing network based detection on Gen 3 Honeynet architecture. The integration procedure involves the stealth mode operation of HIDS sensor, code organization to generate HIDS alerts in a standard format with requisite network parameters, enhancing the functionality of data fusion to pipeline HIDS sensor with other data sensors for real-time operation and correlation with established network sessions, and further visualization on graphical analysis console. The benefits of new Honeynet architecture have been established. The results in the form of statistical trend distribution and percentage reduction of Honeynet data have been presented.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134423005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
The Optimistic Schemes of Cluster Analysis and k-NN Classifier Method in Detecting and Counteracting Learned DDoS Attack 聚类分析和k-NN分类器方法检测和对抗学习型DDoS攻击的乐观方案
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.95
Edwin R. Ramos, Sooyoung Chae, Mansig Kim, Myeonggil Choi
{"title":"The Optimistic Schemes of Cluster Analysis and k-NN Classifier Method in Detecting and Counteracting Learned DDoS Attack","authors":"Edwin R. Ramos, Sooyoung Chae, Mansig Kim, Myeonggil Choi","doi":"10.1109/NTMS.2008.ECP.95","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.95","url":null,"abstract":"The creation of Internet has been materialized to help people become aware of different information and unleash them from the state of ignorance. However, its vast expansions turned out to be a threat at their individual premises wherein integrity, accessibility and confidentiality are oftentimes compromised. This paper concerns the optimistic schemes of detecting and counteracting learned DDoS attacks. We described approaches of cluster analysis and k-NN classifier method as effective tools to battle tremendous security threats i.e., malicious usage, attacks and sabotage. These schemes were tested using a set of benchmark data from KDD (Knowledge Discovery and Data Mining) designed by DARPA. Results are clear evidence that combinations of such schemes lead to have an efficient and accurate performance in detecting DDoS attacks.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134425037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Autonomous Data Gathering Scheme Adaptive to Sensing Requirements for Industrial Environment Monitoring 一种适应工业环境监测传感需求的自主数据采集方案
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.17
Y. Taniguchi, N. Wakamiya, M. Murata, Takashi Fukushima
{"title":"An Autonomous Data Gathering Scheme Adaptive to Sensing Requirements for Industrial Environment Monitoring","authors":"Y. Taniguchi, N. Wakamiya, M. Murata, Takashi Fukushima","doi":"10.1109/NTMS.2008.ECP.17","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.17","url":null,"abstract":"In wireless sensor networks (WSNs), the frequency of sensing and data gathering depends on application requirements and surrounding conditions. In this paper, we propose a data gathering scheme adaptive to sensing requirements for WSNs composed of sensor nodes with multiple sensing capabilities. To accomplish self-organizing control, we adopt the response threshold model for adaptive sensing task engagement and the pulse-coupled oscillator model for energy-efficient transmission and sleep scheduling. Through preliminary simulation experiments, we confirm that autonomous and energy-efficient data gathering can be accomplished satisfying dynamically changing sensing requirements.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130096488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Automatic 3D Facial Feature Extraction Algorithm 自动三维人脸特征提取算法
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.28
V. Kaushik, Saurabh Singh, Hemant Tiwari, Sachin K. Goyal, V. Pathak, Phalguni Gupta
{"title":"Automatic 3D Facial Feature Extraction Algorithm","authors":"V. Kaushik, Saurabh Singh, Hemant Tiwari, Sachin K. Goyal, V. Pathak, Phalguni Gupta","doi":"10.1109/NTMS.2008.ECP.28","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.28","url":null,"abstract":"This paper presents a novel algorithm for automatic facial feature extraction from 3D facial data. The proposed algorithm is found to be pose and expression invariant. It is successfully tested on 3D face database from the State University of New York, Binghamton, USA. In order to test the algorithm, the images have been regenerated using these extracted features. Bezier surface algorithm has been used for regeneration.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129466547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Wireless Fiber Optic Sensor for Monitoring Breath Motion 一种用于呼吸运动监测的新型无线光纤传感器
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.13
Xiaobin Xu, Chun-xi Zhang, K. Hou, Hao Ding, Xunming Diao
{"title":"A New Wireless Fiber Optic Sensor for Monitoring Breath Motion","authors":"Xiaobin Xu, Chun-xi Zhang, K. Hou, Hao Ding, Xunming Diao","doi":"10.1109/NTMS.2008.ECP.13","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.13","url":null,"abstract":"Wireless technology is wide utilized in biomedical and life monitor fields, such as breath motion monitor. As the common technique is big in size and complicate in design, which has impeded the progress in medical application, a novel fiber Bragg grating and wireless based approach is proposed in this paper. In this design, a \"four states method with combined modulation\" principle is utilized in the fiber Bragg grating demodulation, which makes our new approach having the characteristics of small size, high integrality and portability. The system is developed based on the platform of LiveNode (Limos versatile embedded node), and the simulation result shows that the system could monitor the breath motion with a sensitivity of about 41 muepsiv. Additionally, an alarm signal can be transmitted through wireless access medium to a remote server when abnormal event occurs (e.g. stop breathing).","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130834423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fire Detection using Wireless Sensor Networks: An Approach Based on Statistical Data Modeling 无线传感器网络火灾探测:一种基于统计数据建模的方法
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.46
G. Boggia, P. Camarda, L. Grieco, M. Palattella
{"title":"Fire Detection using Wireless Sensor Networks: An Approach Based on Statistical Data Modeling","authors":"G. Boggia, P. Camarda, L. Grieco, M. Palattella","doi":"10.1109/NTMS.2008.ECP.46","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.46","url":null,"abstract":"The aim of this work is to propose an innovative architecture for fire detection, using a wireless sensor network. This scheme is based on the statistical modeling of the Angstrom index. So far, such an index has been applied in outdoor environments. The results obtained by our analysis have extended its validity also to indoor scenarios. A key strength of our system is that each sensor node models the collected measures of the index, in order to transmit, in normal conditions, only the parameters of such a model, thus saving energy. To test the effectiveness of our fire detection system, we have simulated a fire in a building using the fire dynamics simulator. Results have shown that our proposed system is able to reach a good tradeoff between energy consumption and detection delay, in several operative conditions.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133092805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric Approaches. 传感器网络中使用非对称和对称混合方法的端到端数据安全。
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.59
H. Alzaid, M. Alfaraj
{"title":"MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric Approaches.","authors":"H. Alzaid, M. Alfaraj","doi":"10.1109/NTMS.2008.ECP.59","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.59","url":null,"abstract":"Wireless sensor networks (WSNs) are a new technology that is expected to be used increasingly in the near future due to its cheap cost and data processing ability. However, securing WSNs is a complicated issue since the chosen security scheme should offer data security requirements such as data integrity, confidentiality, authentication, and availability although of the existed resource constraints in the sensors. In this paper, we describe the design of securing end-to-end data in WSNs using a mixture of asymmetric and symmetric approaches (MASA) that improves the security level offered by similar schemes and reduces the resources consumptions.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114763463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Securing Roaming and Vertical Handover between Mobile WiMAX and UMTS 确保移动WiMAX和UMTS之间的漫游和垂直切换
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.86
N. Krichene, N. Boudriga
{"title":"Securing Roaming and Vertical Handover between Mobile WiMAX and UMTS","authors":"N. Krichene, N. Boudriga","doi":"10.1109/NTMS.2008.ECP.86","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.86","url":null,"abstract":"Handover between different wireless mobile networks is a key constraint for achieving subscribers satisfaction and enhancing the overall performance. More precisely, mobile subscribers wish to enjoy ubiquitous service availability while being sure of keeping the required security level and a comparable performance level when changing the aceess network. In this paper, we address this issue by proposing a new authentication protocol that enables mobile WiMAX subscribers who do not possess USIM cards to transparently roam and handover to UMTS networks and vice-verca.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123866526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信