2,168 research outputs found
The Proceedings of 14th Australian Digital Forensics Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia
Conference Foreword
This is the fifth year that the Australian Digital Forensics Conference has been held under the banner of the Security Research Institute, which is in part due to the success of the security conference program at ECU. As with previous years, the conference continues to see a quality papers with a number from local and international authors. 11 papers were submitted and following a double blind peer review process, 8 were accepted for final presentation and publication. Conferences such as these are simply not possible without willing volunteers who follow through with the commitment they have initially made, and I would like to take this opportunity to thank the conference committee for their tireless efforts in this regard. These efforts have included but not been limited to the reviewing and editing of the conference papers, and helping with the planning, organisation and execution of the conference. Particular thanks go to those international reviewers who took the time to review papers for the conference, irrespective of the fact that they are unable to attend this year.
To our sponsors and supporters a vote of thanks for both the financial and moral support provided to the conference. Finally, to the student volunteers and staff of the ECU Security Research Institute, your efforts as always are appreciated and invaluable. Yours sincerely, Conference Chair Professor Craig Valli Director, Security Research Institut
Recent advances in industrial wireless sensor networks towards efficient management in IoT
With the accelerated development of Internet-of- Things (IoT), wireless sensor networks (WSN) are gaining importance in the continued advancement of information and communication technologies, and have been connected and integrated with Internet in vast industrial applications. However, given the fact that most wireless sensor devices are resource constrained and operate on batteries, the communication overhead and power consumption are therefore important issues for wireless sensor networks design. In order to efficiently manage these wireless sensor devices in a unified manner, the industrial authorities should be able to provide a network infrastructure supporting various WSN applications and services that facilitate the management of sensor-equipped real-world entities. This paper presents an overview of industrial ecosystem, technical architecture, industrial device management standards and our latest research activity in developing a WSN management system. The key approach to enable efficient and reliable management of WSN within such an infrastructure is a cross layer design of lightweight and cloud-based RESTful web service
An Architecture for QoS-Enabled Mobile Video Surveillance Applications in a 4G EPC and M2M Environment
© 2016 IEEE. Mobile video surveillance applications are used widely nowadays. They offer real-time video monitoring for homes, offices, warehouses, airports, and so on with live and pre-recorded on-demand video streaming. Quality of service (QoS) remains a key challenge faced by most of these applications. In this article, we propose an architecture for mobile video surveillance applications with a guaranteed and differentiated QoS support. The architecture relies on the 3GPP 4G evolved packet core (EPC). The main components are the QoS enabler, media server, and machine-to-machine gateway and surveillance application. To demonstrate its feasibility, a proof of concept prototype has been implemented and deployed. We also took measurements to evaluate the performance. Several lessons were learned. For instance, multimedia frameworks must allow for buffering controls in media streaming to reduce live streaming delay. In addition, we have learned that publicly available materials related to the EPC prototyping platform we have used (i.e., OpenEPC) are scarce. This has made our prototyping task rather difficult
Mission-Critical Communications from LMR to 5G: a Technology Assessment approach for Smart City scenarios
Radiocommunication networks are one of the main support tools of agencies that carry out
actions in Public Protection & Disaster Relief (PPDR), and it is necessary to update these
communications technologies from narrowband to broadband and integrated to information
technologies to have an effective action before society. Understanding that this problem
includes, besides the technical aspects, issues related to the social context to which these
systems are inserted, this study aims to construct scenarios, using several sources of
information, that helps the managers of the PPDR agencies in the technological decisionmaking
process of the Digital Transformation of Mission-Critical Communication considering
Smart City scenarios, guided by the methods and approaches of Technological Assessment
(TA).As redes de radiocomunicações são uma das principais ferramentas de apoio dos órgãos que
realizam ações de Proteção Pública e Socorro em desastres, sendo necessário atualizar essas
tecnologias de comunicação de banda estreita para banda larga, e integra- las às tecnologias
de informação, para se ter uma atuação efetiva perante a sociedade . Entendendo que esse
problema inclui, além dos aspectos técnicos, questões relacionadas ao contexto social ao qual
esses sistemas estão inseridos, este estudo tem por objetivo a construção de cenários,
utilizando diversas fontes de informação que auxiliem os gestores destas agências na tomada
de decisĂŁo tecnolĂłgica que envolve a transformação digital da Comunicação de MissĂŁo CrĂtica
considerando cenários de Cidades Inteligentes, guiado pelos métodos e abordagens de
Avaliação Tecnológica (TA)
Future worlds: threats and opportunities for policing and security
An article about the threats and opportunities for policing and security in the future operating environment for public and private sector capabilities and capacities
Implementation of Middleware for Internet of Things in Asset Tracking Applications: In-lining Approach
ThesisInternet of Things (IoT) is a concept that involves giving objects a digital identity and limited
artificial intelligence, which helps the objects to be interactive, process data, make decisions,
communicate and react to events virtually with minimum human intervention. IoT is intensified
by advancements in hardware and software engineering and promises to close the gap that exists
between the physical and digital worlds. IoT is paving ways to address complex phenomena,
through designing and implementation of intelligent systems that can monitor phenomena,
perform real-time data interpretation, react to events, and swiftly communicate observations. The
primary goal of IoT is ubiquitous computing using wireless sensors and communication
protocols such as Bluetooth, Wireless Fidelity (Wi-Fi), ZigBee and General Packet Radio
Service (GPRS).
Insecurity, of assets and lives, is a problem around the world. One application area of IoT is
tracking and monitoring; it could therefore be used to solve asset insecurity. A preliminary
investigation revealed that security systems in place at Central University of Technology, Free
State (CUT) are disjointed; they do not instantaneously and intelligently conscientize security
personnel about security breaches using real time messages. As a result, many assets have been
stolen, particularly laptops. The main objective of this research was to prove that a real-life application built over a generic
IoT architecture that innovatively and intelligently integrates: (1) wireless sensors; (2) radio
frequency identification (RFID) tags and readers; (3) fingerprint readers; and (4) mobile phones,
can be used to dispel laptop theft. To achieve this, the researcher developed a system, using the
heterogeneous devices mentioned above and a middleware that harnessed their unique
capabilities to bring out the full potential of IoT in intelligently curbing laptop theft.
The resulting system has the ability to: (1) monitor the presence of a laptop using RFID reader
that pro-actively interrogates a passive tag attached to the laptop; (2) detect unauthorized
removal of a laptop under monitoring; (3) instantly communicate security violations via cell
phones; and (4) use Windows location sensors to track the position of a laptop using Googlemaps.
The system also manages administrative tasks such as laptop registration, assignment and withdrawal which used to be handled manually. Experiments conducted using the resulting
system prototype proved the hypothesis outlined for this research
Performance analysis and application development of hybrid WiMAX-WiFi IP video surveillance systems
Traditional Closed Circuit Television (CCTV) analogue cameras installed in buildings and other areas of security interest necessitates the use of cable lines. However, analogue systems are limited by distance; and storing analogue data requires huge space or bandwidth. Wired systems are also prone to vandalism, they cannot be installed in a hostile terrain and in heritage sites, where cabling would distort original design. Currently, there is a paradigm shift towards wireless solutions (WiMAX, Wi-Fi, 3G, 4G) to complement and in some cases replace the wired system. A wireless solution of the Fourth-Generation Surveillance System (4GSS) has been proposed in this thesis. It is a hybrid WiMAX-WiFi video surveillance system. The performance analysis of the hybrid WiMAX-WiFi is compared with the conventional WiMAX surveillance models. The video surveillance models and the algorithm that exploit the advantages of both WiMAX and Wi-Fi for scenarios of fixed and mobile wireless cameras have been proposed, simulated and compared with the mathematical/analytical models. The hybrid WiMAX-WiFi video surveillance model has been extended to include a Wireless Mesh configuration on the Wi-Fi part, to improve the scalability and reliability. A performance analysis for hybrid WiMAX-WiFi system with an appropriate Mobility model has been considered for the case of mobile cameras. A security software application for mobile smartphones that sends surveillance images to either local or remote servers has been developed. The developed software has been tested, evaluated and deployed in low bandwidth Wi-Fi wireless network environments. WiMAX is a wireless metropolitan access network technology that provides broadband services to the connected customers. Major modules and units of WiMAX include the Customer Provided Equipment (CPE), the Access Service Network (ASN) which consist one or more Base Stations (BS) and the Connectivity Service Network (CSN). Various interfaces exist between each unit and module. WiMAX is based on the IEEE 802.16 family of standards. Wi-Fi, on the other hand, is a wireless access network operating in the local area network; and it is based on the IEEE 802.11 standards
- …