By Topic

New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on

Date March 30 2014-April 2 2014

Filter Results

Displaying Results 1 - 25 of 79
  • [Front cover]

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (229 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Chair Message

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • New Tech Welcome Message

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • Mobility Welcome Message

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • Security Welcome Message

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • Smart City Welcome Message

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • Conference Committee

    Publication Year: 2014, Page(s):i - vii
    Request permission for commercial reuse | PDF file iconPDF (204 KB)
    Freely Available from IEEE
  • A Comparison of Forensic Acquisition Techniques for Android Devices: A Case Study Investigation of Orweb Browsing Sessions

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (174 KB) | HTML iconHTML

    The issue of whether to "root" a small scale digital device in order to be able to execute acquisition tools with kernel-level privileges is a vexing one. In the early research literature about Android forensics, and in the commercial forensic tools alike, the common wisdom was that "rooting" the device modified its memory only minimally, and enabled more complete acquisition of digital evidence, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cross-layer Based Packet Scheduling Scheme for Multimedia Traffic in Satellite LTE Networks

    Publication Year: 2014, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (527 KB) | HTML iconHTML

    This paper proposes a new cross-layer based packet scheduling scheme for multimedia traffic in satellite Long Term Evolution (LTE) network which adopts MIMO technology. The Satellite LTE air interface will provide global coverage and hence complement its terrestrial counterpart in the provision of mobile services (especially multimedia services) to users across the globe. A dynamic packet scheduli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Joint Channel and Slot Assignment for Convergecast in Wireless Sensor Networks

    Publication Year: 2014, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (429 KB) | HTML iconHTML

    In this work, we study raw convergecast in multichannel wireless sensor networks (WSNs) where the sink may be equipped with multiple radio interfaces. We propose Wave, a simple and efficient distributed joint channel and time slot assignment. We evaluate the number of slots needed to complete the convergecast by simulation and compare it to the optimal schedule and to a centralized solution. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Factorial Space for a System-Based Detection of Botcloud Activity

    Publication Year: 2014, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (562 KB) | HTML iconHTML

    Today, beyond a legitimate usage, the numerous advantages of cloud computing are exploited by attackers, and Botnets supporting DDoS attacks are among the greatest beneficiaries of this malicious use. Such a phenomena is a major issue since it strongly increases the power of distributed massive attacks while involving the responsibility of cloud service providers that do not own appropriate soluti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Layer 2 Wired-Wireless Interworking Model to Achieve Throughput Improvement

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (434 KB) | HTML iconHTML

    Convergence of Internet Protocol based networks is a necessary requirement today. One important aspect of convergence is seamless integration of wired- wireless network. Internetworking of wired-wireless network is important from Quality of Service (QoS) perspective. Providing a wired network support to an overloaded wireless network for load sharing, improves its bandwidth and subsequently its th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A MAC Scheme-Based Cooperative Codes for Vehicular Connectivity in AHVN

    Publication Year: 2014, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB) | HTML iconHTML

    In this paper, we propose a cooperative MAC scheme for vehicular connectivity in advanced heterogeneous vehicular networks (AHVN). AHVN is an integrated architecture between the vehicular ad hoc NETwork (VANET) and the existing vehicle to infrastructure (V2I) network. The proposed MAC is based on an adaptive backoff algorithm for accessing cooperative codes in V2I network while taking into account... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Business Model and Architecture for Context-Aware Applications Provisioning in the Cloud

    Publication Year: 2014, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (486 KB) | HTML iconHTML

    Context-aware applications are seen as one of the "killer" application categories of the future, due to their ability to offer personalized services by adapting their behavior according to the users' needs and changing situation. Context-aware applications rely in their operation on a complex set of functionalities (i.e. context-awareness substrates). In order to facilitate the development of nove... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Simulation Model Based on EESM for VANETS

    Publication Year: 2014, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (590 KB) | HTML iconHTML

    In order to improve traffic safety, applications in Vehicular Ad Hoc Networks (VANETs) domain are becoming increasingly important. Performance evaluations of VANETs are mostly dependent on computer simulation. However, the traditional method to model physical layer in network simulator suffers from a lack of accuracy. In this paper, we present a low complexity VANETs simulation model based on Expo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reasoning System for Composition Verification and Security Validation

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    The procedure to prove that a system-of-systems is composable and secure is a very difficult task. Formal methods are mathematically-based techniques used for the specification, development and verification of software and hardware systems. This paper presents a model-based framework for dynamic embedded system composition and security evaluation. Event Calculus is applied for modeling the securit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Secure Client Side Deduplication Scheme in Cloud Storage Environments

    Publication Year: 2014, Page(s):1 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    Recent years have witnessed the trend of leveraging cloud-based services for large scale content storage, processing, and distribution. Security and privacy are among top concerns for the public cloud environments. Towards these security challenges, we propose and implement, on OpenStack Swift, a new client-side deduplication scheme for securely storing and sharing outsourced data via the public c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Self-disclosure Framework for Social Mobile Applications

    Publication Year: 2014, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (547 KB) | HTML iconHTML

    With the growing interest in social media, attention should be given to privacy and trust issues. Social applications are usually proposed and developed without clear measures related to privacy and trust issues. In this paper, we propose a framework for data sharing in social mobile applications that helps users having dynamic control of their information sharing on social networks. We also show ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aerial Mast vs Aerial Bridge Autonomous UAV Relay: A Simulation-Based Comparison

    Publication Year: 2014, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    This paper provides a simulation-based comparison between two strategies for an autonomous mobile aerial node communication relay between two mobile ground nodes with non-line-of-sight (NLOS). For both strategies, the airborne relay is considered as a signal repeater between the two ground mobile vehicles. The first strategy (aerial bridge) implies that an unmanned aerial vehicle (UAV) is trying t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach for the Validation of File Recovery Functions in Digital Forensics' Software Tools

    Publication Year: 2014, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (646 KB) | HTML iconHTML

    Recovering lost and deleted information from computer storage media for the purpose of forensic investigation is one of the essential steps in digital forensics. There are several dozens of commercial and open source digital analysis tools dedicated for this purpose. The challenge is to identify the tool that best fits in a specific case of investigation. To measure the file recovering functionali... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Network Log Anomaly Detection System Using Random Projection Dimensionality Reduction

    Publication Year: 2014, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (509 KB) | HTML iconHTML

    Network traffic is increasing all the time and network services are becoming more complex and vulnerable. To protect these networks, intrusion detection systems are used. Signature-based intrusion detection cannot find previously unknown attacks, which is why anomaly detection is needed. However, many new systems are slow and complicated. We propose a log anomaly detection framework which aims to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing Metropolitan-Area Networking within Public Transportation Systems for Smart City Applications

    Publication Year: 2014, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (485 KB) | HTML iconHTML

    In the scope of smart cities, mobile participatory sensing and metropolitan area networking on top of public transportation systems for communication offers widespread dissemination of information in both time and spatial domains. Specifically, the transportation network naturally reflects urban human mobility patterns between places of interest and interconnects hotspots where information is crea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterization of Covert Channels in DNS

    Publication Year: 2014, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    Malware families utilize different protocols to establish their covert communication networks. It is also the case that sometimes they utilize protocols which are least expected to be used for transferring data, e.g., Domain Name System (DNS). Even though the DNS protocol is designed to be a translation service between domain names and IP addresses, it leaves some open doors to establish covert ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.