10 research outputs found

    Energy Management in RFID-Sensor Networks: Taxonomy and Challenges

    Get PDF
    Ubiquitous Computing is foreseen to play an important role for data production and network connectivity in the coming decades. The Internet of Things (IoT) research which has the capability to encapsulate identification potential and sensing capabilities, strives towards the objective of developing seamless, interoperable and securely integrated systems which can be achieved by connecting the Internet with computing devices. This gives way for the evolution of wireless energy harvesting and power transmission using computing devices. Radio Frequency (RF) based Energy Management (EM) has become the backbone for providing energy to wireless integrated systems. The two main techniques for EM in RFID Sensor Networks (RSN) are Energy Harvesting (EH) and Energy Transfer (ET). These techniques enable the dynamic energy level maintenance and optimisation as well as ensuring reliable communication which adheres to the goal of increased network performance and lifetime. In this paper, we present an overview of RSN, its types of integration and relative applications. We then provide the state-of-the-art EM techniques and strategies for RSN from August 2009 till date, thereby reviewing the existing EH and ET mechanisms designed for RSN. The taxonomy on various challenges for EM in RSN has also been articulated for open research directives

    Agent oriented modeling for proxy server

    Get PDF
    Intelligent proxy server is one of the new technologies for firewall system. This type of proxy can do a great deal more than simply relay requests. They use agent to implement caching concept in order to get better transmission between client and server like CERN HTTP proxy and Microsoft Proxy Server. The agent was meant for search and information retrieval which implements caching concept and handle all request for remote documents. The proxy server itself is not an agent; developers developed the agent separately and incorporate the agent into the existing firewall. Compared to Proxy Agent in this research, the proxy server was developed as an agent and was meant for fixing the configuration problems. It follows from SIGAL's architecture, which based on clientlserver. The improvement towards the architecture has been made to fulfill the TIS FWTK proxy server. The type of agent used in this architecture has been changed into intelligent agent and to implement this, the CBR technique has been incorporate into the development process. Thus the agent has been programmed to have adaptation and learning features. To develop such multiagent system, a structured method must be followed and therefore MaSE has been chosen to model the Proxy Agent framework. This research has provided with a step-by-step modeling process for Proxy Agent and has been implemented and tested using AgentTool, which comes together with MaSE. The Proxy Agent framework has also been tested to be used in real proxy server environment and the result shows that the Proxy Agent has better performance in performing the configuration (network configuration) compared to manual configuration which always cause misconfiguration

    Prevention of shoulder-surfing attacks using shifting condition using digraph substitution rules

    Full text link
    Graphical passwords are implemented as an alternative scheme to replace alphanumeric passwords to help users to memorize their password. However, most of the graphical password systems are vulnerable to shoulder-surfing attack due to the usage of the visual interface. In this research, a method that uses shifting condition with digraph substitution rules is proposed to address shoulder-surfing attack problem. The proposed algorithm uses both password images and decoy images throughout the user authentication procedure to confuse adversaries from obtaining the password images via direct observation or watching from a recorded session. The pass-images generated by this suggested algorithm are random and can only be generated if the algorithm is fully understood. As a result, adversaries will have no clue to obtain the right password images to log in. A user study was undertaken to assess the proposed method's effectiveness to avoid shoulder-surfing attacks. The results of the user study indicate that the proposed approach can withstand shoulder-surfing attacks (both direct observation and video recording method).The proposed method was tested and the results showed that it is able to resist shoulder-surfing and frequency of occurrence analysis attacks. Moreover, the experience gained in this research can be pervaded the gap on the realm of knowledge of the graphical password

    Bio-inspired for Features Optimization and Malware Detection

    Get PDF
    The leaking of sensitive data on Android mobile device poses a serious threat to users, and the unscrupulous attack violates the privacy of users. Therefore, an effective Android malware detection system is necessary. However, detecting the attack is challenging due to the similarity of the permissions in malware with those seen in benign applications. This paper aims to evaluate the effectiveness of the machine learning approach for detecting Android malware. In this paper, we applied the bio-inspired algorithm as a feature optimization approach for selecting reliable permission features that able to identify malware attacks. A static analysis technique with machine learning classifier is developed from the permission features noted in the Android mobile device for detecting the malware applications. This technique shows that the use of Android permissions is a potential feature for malware detection. The study compares the bio-inspired algorithm [particle swarm optimization (PSO)] and the evolutionary computation with information gain to find the best features optimization in selecting features. The features were optimized from 378 to 11 by using bio-inspired algorithm: particle swarm optimization (PSO). The evaluation utilizes 5000 Drebin malware samples and 3500 benign samples. In recognizing the Android malware, it appears that AdaBoost is able to achieve good detection accuracy with a true positive rate value of 95.6%, using Android permissions. The results show that particle swarm optimization (PSO) is the best feature optimization approach for selecting features

    Bio-inspired for Features Optimization and Malware Detection

    No full text
    The leaking of sensitive data on Android mobile device poses a serious threat to users, and the unscrupulous attack violates the privacy of users. Therefore, an effective Android malware detection system is necessary. However, detecting the attack is challenging due to the similarity of the permissions in malware with those seen in benign applications. This paper aims to evaluate the effectiveness of the machine learning approach for detecting Android malware. In this paper, we applied the bio-inspired algorithm as a feature optimization approach for selecting reliable permission features that able to identify malware attacks. A static analysis technique with machine learning classifier is developed from the permission features noted in the Android mobile device for detecting the malware applications. This technique shows that the use of Android permissions is a potential feature for malware detection. The study compares the bio-inspired algorithm [particle swarm optimization (PSO)] and the evolutionary computation with information gain to find the best features optimization in selecting features. The features were optimized from 378 to 11 by using bio-inspired algorithm: particle swarm optimization (PSO). The evaluation utilizes 5000 Drebin malware samples and 3500 benign samples. In recognizing the Android malware, it appears that AdaBoost is able to achieve good detection accuracy with a true positive rate value of 95.6%, using Android permissions. The results show that particle swarm optimization (PSO) is the best feature optimization approach for selecting features

    SIFT-Symmetry: A robust detection method for copy-move forgery with reflection attack

    No full text
    Copy-move forgery (CMF) is a popular image manipulation technique that is simple and effective in creating forged illustrations. The bulk of CMF detection methods concentrate on common geometrical transformation attacks (e.g., rotation and scale) and post-processing attacks (e.g., Joint Photographic Experts Group (JPEG) compression and Gaussian noise addition). However, geometrical transformation that involves reflection attacks has not yet been highlighted in the literature. As the threats of reflection attack are inevitable, there is an urgent need to study CMF detection methods that are robust against this type of attack. In this study, we investigated common geometrical transformation attacks and reflection-based attacks. Also, we suggested a robust CMF detection method, called SIFT-Symmetry, that innovatively combines the Scale Invariant Feature Transform (SIFT)-based CMF detection method with symmetry-based matching. We evaluated the SIFT-Symmetry with three established methods that are based on SIFT, multi-scale analysis, and patch matching using two new datasets that cover simple transformation and reflection-based attacks. The results show that the F-score of the SIFT-Symmetry method surpassed the average 80% value for all geometrical transformation cases, including simple transformation and reflection-based attacks, except for the reflection with rotation case which had an average F-score of 65.3%. The results therefore show that the SIFT-Symmetry method gives better performance compared to the other existing methods

    Parenting stress among parents of children with autism spectrum disorder: the need of stress management guidelines and policy

    Get PDF
    This concept paper reviews the issue of parenting stress in mothers and fathers of children with Autism Spectrum Disorder (ASD), and highlights the need for stress management guideline and policy for these parents in Malaysia. Many studies have shown that parents of children with ASD are experiencing a high level of stress. Despite this issue, there has not been any local measures to improve the well-being of the parents. In Malaysia, there is no policy or standard guideline for parents of children with ASD, hence maintaining the risk of mental health cases among them. In order to overcome this issue, this paper reviewed the Lazarus and Folkman’s (1984) problem-focused strategies used by parents of children with ASD from previous studies. The strategies mentioned in this paper had been empirically proven as reducing the parents’ stress level. This paper also recommends the strategies to be included in a local policy to help the parents manage their stress
    corecore