199 research outputs found

    Analysis of security protocols using finite-state machines

    Get PDF
    This paper demonstrates a comprehensive analysis method using formal methods such as finite-state machine. First, we describe the modified version of our new protocol and briefly explain the encrypt-then-authenticate mechanism, which is regarded as more a secure mechanism than the one used in our protocol. Then, we use a finite-state verification to study the behaviour of each machine created for each phase of the protocol and examine their behaviour s together. Modelling with finite-state machines shows that the modified protocol can function correctly and behave properly even with invalid input or time delay

    Prediction of mobility entropy in an ambient intelligent environment

    Get PDF
    Ambient Intelligent (AmI) technology can be used to help older adults to live longer and independent lives in their own homes. Information collected from AmI environment can be used to detect and understanding human behaviour, allowing personalized care. The behaviour pattern can also be used to detect changes in behaviour and predict future trends, so that preventive action can be taken. However, due to the large number of sensors in the environment, sensor data are often complex and difficult to interpret, especially to capture behaviour trends and to detect changes over the long-term. In this paper, a model to predict the indoor mobility using binary sensors is proposed. The model utilizes weekly routine to predict the future trend. The proposed method is validated using data collected from a real home environment, and the results show that using weekly pattern helps improve indoor mobility prediction. Also, a new measurement, Mobility Entropy (ME), to measure indoor mobility based on entropy concept is proposed. The results indicate ME can be used to distinguish elders with different mobility and to see decline in mobility. The proposed work would allow detection of changes in mobility, and to foresee the future mobility trend if the current behaviour continues

    Modelling and simulation of a biometric identity-based cryptography

    Get PDF
    Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols

    Behavioural pattern identification and prediction in intelligent environments

    Get PDF
    In this paper, the application of soft computing techniques in prediction of an occupant's behaviour in an inhabited intelligent environment is addressed. In this research, daily activities of elderly people who live in their own homes suffering from dementia are studied. Occupancy sensors are used to extract the movement patterns of the occupant. The occupancy data is then converted into temporal sequences of activities which are eventually used to predict the occupant behaviour. To build the prediction model, different dynamic recurrent neural networks are investigated. Recurrent neural networks have shown a great ability in finding the temporal relationships of input patterns. The experimental results show that non-linear autoregressive network with exogenous inputs model correctly extracts the long term prediction patterns of the occupant and outperformed the Elman network. The results presented here are validated using data generated from a simulator and real environments

    Biometric identity-based cryptography for e-Government environment

    Get PDF
    Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols

    Activities recognition and worker profiling in the intelligent office environment using a fuzzy finite state machine

    Get PDF
    Analysis of the office workers’ activities of daily working in an intelligent office environment can be used to optimize energy consumption and also office workers’ comfort. To achieve this end, it is essential to recognise office workers’ activities including short breaks, meetings and non-computer activities to allow an optimum control strategy to be implemented. In this paper, fuzzy finite state machines are used to model an office worker’s behaviour. The model will incorporate sensory data collected from the environment as the input and some pre-defined fuzzy states are used to develop the model. Experimental results are presented to illustrate the effectiveness of this approach. The activity models of different individual workers as inferred from the sensory devices can be distinguished. However, further investigation is required to create a more complete model

    Semantic-based decision support for remote care of dementia patients

    Get PDF
    This paper investigates the challenges in developing a semantic-based Dementia Care Decision Support System based on the non-intrusive monitoring of the patient's behaviour. Semantic-based approaches are well suited for modelling context-aware scenarios similar to Dementia care systems, where the patient's dynamic behaviour observations (occupants movement, equipment use) need to be analysed against the semantic knowledge about the patient's condition (illness history, medical advice, known symptoms) in an integrated knowledgebase. However, our research findings establish that the ability of semantic technologies to reason upon the complex interrelated events emanating from the behaviour monitoring sensors to infer knowledge assisting medical advice represents a major challenge. We attempt to address this problem by introducing a new approach that relies on propositional calculus modelling to segregate complex events that are amenable for semantic reasoning from events that require pre-processing outside the semantic engine before they can be reasoned upon. The event pre-processing activity also controls the timing of triggering the reasoning process in order to further improve the efficiency of the inference process. Using regression analysis, we evaluate the response-time as the number of monitored patients increases and conclude that the incurred overhead on the response time of the prototype decision support systems remains tolerable
    • …
    corecore