10 research outputs found
Energy Management in RFID-Sensor Networks: Taxonomy and Challenges
Ubiquitous Computing is foreseen to play an important role for data production and network connectivity in the coming decades. The Internet of Things (IoT) research which has the capability to encapsulate identification potential and sensing capabilities, strives towards the objective of developing seamless, interoperable and securely integrated systems which can be achieved by connecting the Internet with computing devices. This gives way for the evolution of wireless energy harvesting and power transmission using computing devices. Radio Frequency (RF) based Energy Management (EM) has become the backbone for providing energy to wireless integrated systems. The two main techniques for EM in RFID Sensor Networks (RSN) are Energy Harvesting (EH) and Energy Transfer (ET). These techniques enable the dynamic energy level maintenance and optimisation as well as ensuring reliable communication which adheres to the goal of increased network performance and lifetime. In this paper, we present an overview of RSN, its types of integration and relative applications. We then provide the state-of-the-art EM techniques and strategies for RSN from August 2009 till date, thereby reviewing the existing EH and ET mechanisms designed for RSN. The taxonomy on various challenges for EM in RSN has also been articulated for open research directives
Agent oriented modeling for proxy server
Intelligent proxy server is one of the new technologies for firewall system. This type of proxy can do a great deal more than simply relay requests. They use agent to implement caching concept in order to get better transmission between client and server like CERN HTTP proxy and Microsoft Proxy Server. The agent was meant for search and information retrieval which implements caching concept and handle all request for remote documents. The proxy server itself is not an agent; developers developed the agent separately and incorporate the agent into the existing firewall. Compared to Proxy Agent in this research, the proxy server was developed as an agent and was meant for fixing the configuration problems. It follows from SIGAL's architecture, which based on clientlserver. The improvement towards the architecture has been made to fulfill the TIS FWTK proxy server. The type of agent used in this architecture has been changed into intelligent agent and to implement this, the CBR technique has been incorporate into the development process. Thus the agent has been programmed to have adaptation and learning features. To develop such multiagent system, a structured method must be followed and therefore MaSE has been chosen to model the Proxy Agent framework. This research has provided with a step-by-step modeling process for Proxy Agent and has been implemented and tested using AgentTool, which comes together with MaSE. The Proxy Agent framework has also been tested to be used in real proxy server environment and the result shows that the Proxy Agent has better performance in performing the configuration (network configuration) compared to manual configuration which always cause misconfiguration
Prevention of shoulder-surfing attacks using shifting condition using digraph substitution rules
Graphical passwords are implemented as an alternative scheme to replace
alphanumeric passwords to help users to memorize their password. However, most
of the graphical password systems are vulnerable to shoulder-surfing attack due
to the usage of the visual interface. In this research, a method that uses
shifting condition with digraph substitution rules is proposed to address
shoulder-surfing attack problem. The proposed algorithm uses both password
images and decoy images throughout the user authentication procedure to confuse
adversaries from obtaining the password images via direct observation or
watching from a recorded session. The pass-images generated by this suggested
algorithm are random and can only be generated if the algorithm is fully
understood. As a result, adversaries will have no clue to obtain the right
password images to log in. A user study was undertaken to assess the proposed
method's effectiveness to avoid shoulder-surfing attacks. The results of the
user study indicate that the proposed approach can withstand shoulder-surfing
attacks (both direct observation and video recording method).The proposed
method was tested and the results showed that it is able to resist
shoulder-surfing and frequency of occurrence analysis attacks. Moreover, the
experience gained in this research can be pervaded the gap on the realm of
knowledge of the graphical password
Bio-inspired for Features Optimization and Malware Detection
The leaking of sensitive data on Android mobile device poses a serious threat to users, and the unscrupulous attack violates the privacy of users. Therefore, an effective Android malware detection system is necessary. However, detecting the attack is challenging due to the similarity of the permissions in malware with those seen in benign applications. This paper aims to evaluate the effectiveness of the machine learning approach for detecting Android malware. In this paper, we applied the bio-inspired algorithm as a feature optimization approach for selecting reliable permission features that able to identify malware attacks. A static analysis technique with machine learning classifier is developed from the permission features noted in the Android mobile device for detecting the malware applications. This technique shows that the use of Android permissions is a potential feature for malware detection. The study compares the bio-inspired algorithm [particle swarm optimization (PSO)] and the evolutionary computation with information gain to find the best features optimization in selecting features. The features were optimized from 378 to 11 by using bio-inspired algorithm: particle swarm optimization (PSO). The evaluation utilizes 5000 Drebin malware samples and 3500 benign samples. In recognizing the Android malware, it appears that AdaBoost is able to achieve good detection accuracy with a true positive rate value of 95.6%, using Android permissions. The results show that particle swarm optimization (PSO) is the best feature optimization approach for selecting features
Bio-inspired for Features Optimization and Malware Detection
The leaking of sensitive data on Android mobile device poses a serious threat to users, and the unscrupulous attack violates the privacy of users. Therefore, an effective Android malware detection system is necessary. However, detecting the attack is challenging due to the similarity of the permissions in malware with those seen in benign applications. This paper aims to evaluate the effectiveness of the machine learning approach for detecting Android malware. In this paper, we applied the bio-inspired algorithm as a feature optimization approach for selecting reliable permission features that able to identify malware attacks. A static analysis technique with machine learning classifier is developed from the permission features noted in the Android mobile device for detecting the malware applications. This technique shows that the use of Android permissions is a potential feature for malware detection. The study compares the bio-inspired algorithm [particle swarm optimization (PSO)] and the evolutionary computation with information gain to find the best features optimization in selecting features. The features were optimized from 378 to 11 by using bio-inspired algorithm: particle swarm optimization (PSO). The evaluation utilizes 5000 Drebin malware samples and 3500 benign samples. In recognizing the Android malware, it appears that AdaBoost is able to achieve good detection accuracy with a true positive rate value of 95.6%, using Android permissions. The results show that particle swarm optimization (PSO) is the best feature optimization approach for selecting features
SIFT-Symmetry: A robust detection method for copy-move forgery with reflection attack
Copy-move forgery (CMF) is a popular image manipulation technique that is simple and effective in creating forged illustrations. The bulk of CMF detection methods concentrate on common geometrical transformation attacks (e.g., rotation and scale) and post-processing attacks (e.g., Joint Photographic Experts Group (JPEG) compression and Gaussian noise addition). However, geometrical transformation that involves reflection attacks has not yet been highlighted in the literature. As the threats of reflection attack are inevitable, there is an urgent need to study CMF detection methods that are robust against this type of attack. In this study, we investigated common geometrical transformation attacks and reflection-based attacks. Also, we suggested a robust CMF detection method, called SIFT-Symmetry, that innovatively combines the Scale Invariant Feature Transform (SIFT)-based CMF detection method with symmetry-based matching. We evaluated the SIFT-Symmetry with three established methods that are based on SIFT, multi-scale analysis, and patch matching using two new datasets that cover simple transformation and reflection-based attacks. The results show that the F-score of the SIFT-Symmetry method surpassed the average 80% value for all geometrical transformation cases, including simple transformation and reflection-based attacks, except for the reflection with rotation case which had an average F-score of 65.3%. The results therefore show that the SIFT-Symmetry method gives better performance compared to the other existing methods
Parenting stress among parents of children with autism spectrum disorder: the need of stress management guidelines and policy
This concept paper reviews the issue of parenting stress in mothers and fathers of children with
Autism Spectrum Disorder (ASD), and highlights the need for stress management guideline
and policy for these parents in Malaysia. Many studies have shown that parents of children
with ASD are experiencing a high level of stress. Despite this issue, there has not been any
local measures to improve the well-being of the parents. In Malaysia, there is no policy or
standard guideline for parents of children with ASD, hence maintaining the risk of mental
health cases among them. In order to overcome this issue, this paper reviewed the Lazarus and
Folkman’s (1984) problem-focused strategies used by parents of children with ASD from
previous studies. The strategies mentioned in this paper had been empirically proven as
reducing the parents’ stress level. This paper also recommends the strategies to be included in
a local policy to help the parents manage their stress