In Wireless sensor networks (WSNs), All communications between different nodes are sent out
in a broadcast fashion. These networks are used in a variety of applications including military,
environmental, and smart spaces. Sensors are susceptible to various types of attack, such as
data modification, data insertion and deletion, or even physical capture and sensor
replacement. Hence security becomes important issue in WSNs. However given the fact that
sensors are resources constrained, hence the traditional intensive security algorithms are not
well suited for WSNs. This makes traditional security techniques, based on data encryption, not
very suitable for WSNs. This paper proposes Linear Kolmogorov watermarking technique for
secure data communication in WSNs. We provide a security analysis to show the robustness of
the proposed techniques against various types of attacks. This technique is robust against data
deletion, packet replication and Sybil attacks
27 5 jun17 28apr 15859 ammar final (edti ari baru))IAESIJEECS
The transition from analog technologies to digital technologies has increased the ever-growing concern for protection and authentication of digital content and data. Owners of digital content of any type are seeking and exploring new technologies for the protection of copyrighted multimedia content. Multimedia protection has become an issue in recent years, and to deal with this issue, researchers are continuously searching for and exploring new effective and efficient technologies. This thesis study has been prepared in order to increase the invisibility and durability of invisible watermarking by using the multilayer Discrete Wavelet Transform (DWT) in the frequency plane and embedding two marks into an image for the purpose of authentication and copyright when digital content travels through an unsecured channel. A novel watermarking algorithm has been proposed based on five active positions and on using two marks. In addition to the extraction process, watermarking images will be subjected to a set of attack tests. The evaluation criteria have been the bases of assessing the value of SNR, PNSR, MAE and RMSE for both the watermarking images and the watermarking images after attacks, followed by the invisibility of the watermarking being measured before and after the attacks. Our lab results show high robustness and high quality images obtaining value for both SNR and PNSR.
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
Sensor network is a term used to refer to a heterogeneous system combining tiny sensors and actuators with general/special-purpose processors. Sensor networks are assumed to grow in size to include hundreds or thousands of low-power, low-cost, static or mobile nodes. This system is created by observing that for any densely deployed sensor network, high redundancy exists in the gathered information from the sensor nodes that are close to each other we have exploited the redundancy and designed schemes to secure different kinds of aggregation processing against both inside and outside attacks.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
A data dissemination protocol for wireless sensor networks has been engaged for modifying configuration fields and circulating management controls to the mote. Earlier, a data dissemination protocol faces the henceforth two consequences. First, they are works on sink based model; only the sink can circulate data item to other motes. Such model is not suitable for large user wireless sensor networks. Second, those protocols are not provide with any security and hence intruders will make problems to misuse the network. We provided the seDrip protocol. It allows the network mentors to authorize multiple network uses with various permissions to simultaneously and directly distributed data items to the mote. seDrip is implemented in an laboratory of network restricted resources mote to depict its large capability in practice.
VPN usage across the world has increased due to the COVID-19 pandemic. With companies trying to lay
the course through this unfamiliar state, corporations had to implement a Business Continuity Plan which
included several elements to maintain a scalable and robust VPN connection. During this time of
uncertainty, best practices need to be deployed by corporations and government entities more than ever.
The purpose of this study is to highlight the necessary path SD Telecom would take to ensure a secure,
reliable network during global traffic surge. Specific VPN solutions, access needs, and eligibility
requirements vary based on the end user.
27 5 jun17 28apr 15859 ammar final (edti ari baru))IAESIJEECS
The transition from analog technologies to digital technologies has increased the ever-growing concern for protection and authentication of digital content and data. Owners of digital content of any type are seeking and exploring new technologies for the protection of copyrighted multimedia content. Multimedia protection has become an issue in recent years, and to deal with this issue, researchers are continuously searching for and exploring new effective and efficient technologies. This thesis study has been prepared in order to increase the invisibility and durability of invisible watermarking by using the multilayer Discrete Wavelet Transform (DWT) in the frequency plane and embedding two marks into an image for the purpose of authentication and copyright when digital content travels through an unsecured channel. A novel watermarking algorithm has been proposed based on five active positions and on using two marks. In addition to the extraction process, watermarking images will be subjected to a set of attack tests. The evaluation criteria have been the bases of assessing the value of SNR, PNSR, MAE and RMSE for both the watermarking images and the watermarking images after attacks, followed by the invisibility of the watermarking being measured before and after the attacks. Our lab results show high robustness and high quality images obtaining value for both SNR and PNSR.
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
Sensor network is a term used to refer to a heterogeneous system combining tiny sensors and actuators with general/special-purpose processors. Sensor networks are assumed to grow in size to include hundreds or thousands of low-power, low-cost, static or mobile nodes. This system is created by observing that for any densely deployed sensor network, high redundancy exists in the gathered information from the sensor nodes that are close to each other we have exploited the redundancy and designed schemes to secure different kinds of aggregation processing against both inside and outside attacks.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
A data dissemination protocol for wireless sensor networks has been engaged for modifying configuration fields and circulating management controls to the mote. Earlier, a data dissemination protocol faces the henceforth two consequences. First, they are works on sink based model; only the sink can circulate data item to other motes. Such model is not suitable for large user wireless sensor networks. Second, those protocols are not provide with any security and hence intruders will make problems to misuse the network. We provided the seDrip protocol. It allows the network mentors to authorize multiple network uses with various permissions to simultaneously and directly distributed data items to the mote. seDrip is implemented in an laboratory of network restricted resources mote to depict its large capability in practice.
VPN usage across the world has increased due to the COVID-19 pandemic. With companies trying to lay
the course through this unfamiliar state, corporations had to implement a Business Continuity Plan which
included several elements to maintain a scalable and robust VPN connection. During this time of
uncertainty, best practices need to be deployed by corporations and government entities more than ever.
The purpose of this study is to highlight the necessary path SD Telecom would take to ensure a secure,
reliable network during global traffic surge. Specific VPN solutions, access needs, and eligibility
requirements vary based on the end user.
Encrypting an audio file based on integer wavelet transform and hand geometryTELKOMNIKA JOURNAL
A new algorithm suggested for audio file encryption and decryption utilizing integer wavelet transform to take advantage of the property for adaptive context-based lossless audio coding. In addition, biometrics are used to give a significant level of classification and unwavering quality because the procedure has numerous qualities and points of interest. The offered algorithm utilized many properties of hand geometry estimations as keys to encode and decode the audio file. Many tests were carried out on a set of audio files and quality metrics such as mean square error and correlations were calculated which in turn confirmed the efficiency and quality of the work.
oT applications usually rely on cloud computing services to perform data analysis such as filtering,
aggregation, classification, pattern detection, and prediction. When applied to specific domains, the IoT
needs to deal with unique constraints. Besides the hostile environment such as vibration and electric-
magnetic interference, resulting in malfunction, noise, and data loss, industrial plants often have Internet
access restricted or unavailable, forcing us to design stand-alone fog and edge computing solutions.
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
Over the past decades, research in security has concentrated on the development of algorithms and protocols for authentication, encryption and integrity of data. Despite tremendous advances, several security problems still afflict system’s. In this android app watermarking and encryption is being applied on images and data. Because of the human visual system’s low sensitivity to small changes and the high flexibility of digital media, anyone can easily make small changes in digital data with low perceptibility. Here watermarking and encryption are being performed in wavelet domain. Here in watermarking, the coefficients of watermarks are being embedded with the coefficients of the original image. Encryption is being done in wavelet domain so that the probability of an intruder trying to access the contents is very much minimized. Thus, this model provides a high level of security.
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEijcsit
This paper proposes an encryption-based image watermarking scheme for medical images using a customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding, an R-level discrete wavelet transform was applied to the host image. The high frequency wavelet coefficients are selected to carry these scrambled-watermarks by using adaptive quantization low bit modulation (LBM). The proposed image watermarking method endures entirety attacks and rightly extracts the hidden watermark without significant degradation in the image quality, Thus, when the Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) performance of the proposed algorithm is compared with other related techniques.
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
The mobile device is one of the fasted growing technologies that is widely used in a diversifying sector.
Mobile devices are used for everyday life, such as personal information exchange – chatting, email,
shopping, and mobile banking, contributing to information security threats. Users' behavior can influence
information security threats. More research is needed to understand users' threat avoidance behavior and
motivation. Using Technology threat avoidance theory (TTAT), this study assessed factors that influenced
mobile device users' threat avoidance motivations and behaviors as it relates to phishing attacks.
Improved method for image security based on chaotic-shuffle and chaotic-diffu...IJECEIAES
In this paper, we propose to enhance the security performance of the color image encryption algorithm which depends on multi-chaotic systems. The current cryptosystem utilized a pixel-chaotic-shuffle system to encode images, in which the time of shuffling is autonomous to the plain-image. Thus, it neglects to the picked plaintext and known-plaintext attacks. Also, the statistical features of the cryptosystem are not up to the standard. Along these lines, the security changes are encircled to make the above attacks infeasible and upgrade the statistical features also. It is accomplished by altering the pixel-chaotic-shuffle component and including another pixel-chaotic-diffusion system to it. The keys for diffusion of pixels are extracted from the same chaotic arrangements created in the past stage. The renovation investigations and studies are performed to exhibit that the refreshed version of cryptosystem has better statistical features and invulnerable to the picked plaintext and known plaintext attacks than the current algorithm.
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
As per the recent studies, the volatile growth has been seen in the use of mobile devices as
the supporting technology for accessing Internet based services, as well as for personal
communication needs in networking. Various studies indicate that it is impossible to utilize strong
cryptographic functions for implementing security protocols on mobile devices. Our research negates
this. Explicitly, a performance analysis focused on the most commonly used cryptographic protocols
based on the location address (latitude & longitude) of the user for mobile applications and projected
provably secure authentication protocol that is more efficient than any of the prevailing
authentication protocol is being used by the network security methods. Understanding the use of
public key cryptography which makes potential use of discrete logarithms problem. The security of
ECC depends on the difficulty of Elliptic Curve Discrete Logarithm. To provide secure
communication for mobile devices, authenticated protocol is an important primitive for establishing
trusted connection. In this paper, it has been shown that the location based system using improved
Rabin Algorithm provides a better security and acquires much less energy consumption than the
existing authentication protocols.
The Impact on Security due to the Vulnerabilities Existing in the network a S...IJAEMSJORNAL
Software Defined Networking, the emerging technology is taking the network sector to a new variant. Networking sector completely focused on hardware infrastructure is now moving towards software programming. Due to an exponential growth in the number of user and the amount of information over wires, there arises a great risk with the existing IP Network architecture. Software Defined Networking paves a platform identifying a feasible solution to the problem by virtualization. Software Defined Networking provides a viable path in virtualization and managing the network resources in an “On Demand Manner”. This study is focused on the drawbacks of the existing technology and a fine grained introduction to Software Defined Networking. Further adding to the above topic, this study also passes over the current steps taken in the industrial sector in implementing Software Defined Networking. This study makes a walkthrough about the security features of Software Defined Networking, its advantages, limitations and further scope in identifying the loopholes in the security.
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYijcsit
Protection has become one of the biggest fields of study for several years, however the demand for this is growing exponentially mostly with rise in sensitive data. The quality of the research can differ slightly from any workstation to cloud, and though protection must be incredibly important all over. Throughout the past two decades, sufficient focus has been given to substantiation along with validation in the technology model. Identifying a legal person is increasingly become the difficult activity with the progression of time. Some attempts are introduced in that same respect, in particular by utilizing human movements such as fingerprints, facial recognition, palm scanning, retinal identification, DNA checking, breathing, speech checker, and so on. A number of methods for effective iris detection have indeed been suggested and researched. A general overview of current and state-of-the-art approaches to iris recognition is presented in this paper. In addition, significant advances in techniques, algorithms, qualified classifiers, datasets and methodologies for the extraction of features are also discussed.
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...IJCNCJournal
Radio Frequency IDentification (RFID) and Wireless Sensor Networks (WSN) are the two most prominent wireless technologies for implementing a complete smart environment for the Internet of Things (IoT). Both RFID and WSN are resource constraint devices, which forces us to go for lightweight cryptography for security purposes. Security in terms of confidentiality, integrity, authentication, authorization, and
availability. Key management is one of the major constraints for resource constraint mobile sensor devices. This work is an extension of the work done by Kumar et al. using efficient error prediction and limit of agreement for anomaly score. This work ensures cryptographic property, availability, in RFID-WSN
integrated network through outlier detection mechanism for 50 to 5000 nodes network. Through detection ratios and anomaly scores system is tested against outliers. The proposed outlier detection mechanism identifies the inliers and outliers through anomaly score for protection against Denial-of-Service (DoS)
attack. Intruders can be detected in few milliseconds without giving any conflict to the access rights. In terms of throughput, a minimum improvement of 6.2% and a maximum of 219.9% is observed for the proposed protocol as compared to Kumar et al. Protocol and in terms of percentage of Packet Delivery Ratio (PDR), a minimum improvement of 8.9% and a maximum of 19.5% is observed for the proposed protocol as compared
to Kumar et al. protocol.
Digital enhancement of indian manuscript, yashodhar charitracsandit
Over the years, many of our ancient manuscripts have been damaged by natural elements or
intentionally erased and re-used to record other information. While manual preservation
techniques are being carried out for the conservation of our ancient texts, digital image
processing is an alternative for the archival storage of the invaluable text contained in them. To
successfully recover text from such documents, it is important to understand the nature of the
writing and materials on which they are written. Different imaging and processing techniques
are needed, depending on the the condition of the manuscript. In recent years, modern imaging
techniques have been applied to ancient manuscripts to recover writings that are not visible to
the naked eye or not recognizable due to various factors. In this paper, we apply imaging
techniques on an ancient manuscript, Yashodhar Charitra, and restore it digitally.
Numerous security metrics have been proposed in the past for protecting computer networks.
However we still lack effective techniques to accurately measure the predictive security risk of
an enterprise taking into account the dynamic attributes associated with vulnerabilities that can
change over time. In this paper we present a stochastic security framework for obtaining
quantitative measures of security using attack graphs. Our model is novel as existing research
in attack graph analysis do not consider the temporal aspects associated with the
vulnerabilities, such as the availability of exploits and patches which can affect the overall
network security based on how the vulnerabilities are interconnected and leveraged to
compromise the system. Gaining a better understanding of the relationship between
vulnerabilities and their lifecycle events can provide security practitioners a better
understanding of their state of security. In order to have a more realistic representation of how
the security state of the network would vary over time, a nonhomogeneous model is developed
which incorporates a time dependent covariate, namely the vulnerability age. The daily
transition-probability matrices are estimated using Frei's Vulnerability Lifecycle model. We
also leverage the trusted CVSS metric domain to analyze how the total exploitability and impact
measures evolve over a time period for a given network.
Constructing a classification model is important in machine learning for a particular task. A
classification process involves assigning objects into predefined groups or classes based on a
number of observed attributes related to those objects. Artificial neural network is one of the
classification algorithms which, can be used in many application areas. This paper investigates
the potential of applying the feed forward neural network architecture for the classification of
medical datasets. Migration based differential evolution algorithm (MBDE) is chosen and
applied to feed forward neural network to enhance the learning process and the network
learning is validated in terms of convergence rate and classification accuracy. In this paper,
MBDE algorithm with various migration policies is proposed for classification problems using
medical diagnosis.
Encrypting an audio file based on integer wavelet transform and hand geometryTELKOMNIKA JOURNAL
A new algorithm suggested for audio file encryption and decryption utilizing integer wavelet transform to take advantage of the property for adaptive context-based lossless audio coding. In addition, biometrics are used to give a significant level of classification and unwavering quality because the procedure has numerous qualities and points of interest. The offered algorithm utilized many properties of hand geometry estimations as keys to encode and decode the audio file. Many tests were carried out on a set of audio files and quality metrics such as mean square error and correlations were calculated which in turn confirmed the efficiency and quality of the work.
oT applications usually rely on cloud computing services to perform data analysis such as filtering,
aggregation, classification, pattern detection, and prediction. When applied to specific domains, the IoT
needs to deal with unique constraints. Besides the hostile environment such as vibration and electric-
magnetic interference, resulting in malfunction, noise, and data loss, industrial plants often have Internet
access restricted or unavailable, forcing us to design stand-alone fog and edge computing solutions.
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
Over the past decades, research in security has concentrated on the development of algorithms and protocols for authentication, encryption and integrity of data. Despite tremendous advances, several security problems still afflict system’s. In this android app watermarking and encryption is being applied on images and data. Because of the human visual system’s low sensitivity to small changes and the high flexibility of digital media, anyone can easily make small changes in digital data with low perceptibility. Here watermarking and encryption are being performed in wavelet domain. Here in watermarking, the coefficients of watermarks are being embedded with the coefficients of the original image. Encryption is being done in wavelet domain so that the probability of an intruder trying to access the contents is very much minimized. Thus, this model provides a high level of security.
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEijcsit
This paper proposes an encryption-based image watermarking scheme for medical images using a customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding, an R-level discrete wavelet transform was applied to the host image. The high frequency wavelet coefficients are selected to carry these scrambled-watermarks by using adaptive quantization low bit modulation (LBM). The proposed image watermarking method endures entirety attacks and rightly extracts the hidden watermark without significant degradation in the image quality, Thus, when the Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) performance of the proposed algorithm is compared with other related techniques.
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
The mobile device is one of the fasted growing technologies that is widely used in a diversifying sector.
Mobile devices are used for everyday life, such as personal information exchange – chatting, email,
shopping, and mobile banking, contributing to information security threats. Users' behavior can influence
information security threats. More research is needed to understand users' threat avoidance behavior and
motivation. Using Technology threat avoidance theory (TTAT), this study assessed factors that influenced
mobile device users' threat avoidance motivations and behaviors as it relates to phishing attacks.
Improved method for image security based on chaotic-shuffle and chaotic-diffu...IJECEIAES
In this paper, we propose to enhance the security performance of the color image encryption algorithm which depends on multi-chaotic systems. The current cryptosystem utilized a pixel-chaotic-shuffle system to encode images, in which the time of shuffling is autonomous to the plain-image. Thus, it neglects to the picked plaintext and known-plaintext attacks. Also, the statistical features of the cryptosystem are not up to the standard. Along these lines, the security changes are encircled to make the above attacks infeasible and upgrade the statistical features also. It is accomplished by altering the pixel-chaotic-shuffle component and including another pixel-chaotic-diffusion system to it. The keys for diffusion of pixels are extracted from the same chaotic arrangements created in the past stage. The renovation investigations and studies are performed to exhibit that the refreshed version of cryptosystem has better statistical features and invulnerable to the picked plaintext and known plaintext attacks than the current algorithm.
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
As per the recent studies, the volatile growth has been seen in the use of mobile devices as
the supporting technology for accessing Internet based services, as well as for personal
communication needs in networking. Various studies indicate that it is impossible to utilize strong
cryptographic functions for implementing security protocols on mobile devices. Our research negates
this. Explicitly, a performance analysis focused on the most commonly used cryptographic protocols
based on the location address (latitude & longitude) of the user for mobile applications and projected
provably secure authentication protocol that is more efficient than any of the prevailing
authentication protocol is being used by the network security methods. Understanding the use of
public key cryptography which makes potential use of discrete logarithms problem. The security of
ECC depends on the difficulty of Elliptic Curve Discrete Logarithm. To provide secure
communication for mobile devices, authenticated protocol is an important primitive for establishing
trusted connection. In this paper, it has been shown that the location based system using improved
Rabin Algorithm provides a better security and acquires much less energy consumption than the
existing authentication protocols.
The Impact on Security due to the Vulnerabilities Existing in the network a S...IJAEMSJORNAL
Software Defined Networking, the emerging technology is taking the network sector to a new variant. Networking sector completely focused on hardware infrastructure is now moving towards software programming. Due to an exponential growth in the number of user and the amount of information over wires, there arises a great risk with the existing IP Network architecture. Software Defined Networking paves a platform identifying a feasible solution to the problem by virtualization. Software Defined Networking provides a viable path in virtualization and managing the network resources in an “On Demand Manner”. This study is focused on the drawbacks of the existing technology and a fine grained introduction to Software Defined Networking. Further adding to the above topic, this study also passes over the current steps taken in the industrial sector in implementing Software Defined Networking. This study makes a walkthrough about the security features of Software Defined Networking, its advantages, limitations and further scope in identifying the loopholes in the security.
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYijcsit
Protection has become one of the biggest fields of study for several years, however the demand for this is growing exponentially mostly with rise in sensitive data. The quality of the research can differ slightly from any workstation to cloud, and though protection must be incredibly important all over. Throughout the past two decades, sufficient focus has been given to substantiation along with validation in the technology model. Identifying a legal person is increasingly become the difficult activity with the progression of time. Some attempts are introduced in that same respect, in particular by utilizing human movements such as fingerprints, facial recognition, palm scanning, retinal identification, DNA checking, breathing, speech checker, and so on. A number of methods for effective iris detection have indeed been suggested and researched. A general overview of current and state-of-the-art approaches to iris recognition is presented in this paper. In addition, significant advances in techniques, algorithms, qualified classifiers, datasets and methodologies for the extraction of features are also discussed.
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...IJCNCJournal
Radio Frequency IDentification (RFID) and Wireless Sensor Networks (WSN) are the two most prominent wireless technologies for implementing a complete smart environment for the Internet of Things (IoT). Both RFID and WSN are resource constraint devices, which forces us to go for lightweight cryptography for security purposes. Security in terms of confidentiality, integrity, authentication, authorization, and
availability. Key management is one of the major constraints for resource constraint mobile sensor devices. This work is an extension of the work done by Kumar et al. using efficient error prediction and limit of agreement for anomaly score. This work ensures cryptographic property, availability, in RFID-WSN
integrated network through outlier detection mechanism for 50 to 5000 nodes network. Through detection ratios and anomaly scores system is tested against outliers. The proposed outlier detection mechanism identifies the inliers and outliers through anomaly score for protection against Denial-of-Service (DoS)
attack. Intruders can be detected in few milliseconds without giving any conflict to the access rights. In terms of throughput, a minimum improvement of 6.2% and a maximum of 219.9% is observed for the proposed protocol as compared to Kumar et al. Protocol and in terms of percentage of Packet Delivery Ratio (PDR), a minimum improvement of 8.9% and a maximum of 19.5% is observed for the proposed protocol as compared
to Kumar et al. protocol.
Digital enhancement of indian manuscript, yashodhar charitracsandit
Over the years, many of our ancient manuscripts have been damaged by natural elements or
intentionally erased and re-used to record other information. While manual preservation
techniques are being carried out for the conservation of our ancient texts, digital image
processing is an alternative for the archival storage of the invaluable text contained in them. To
successfully recover text from such documents, it is important to understand the nature of the
writing and materials on which they are written. Different imaging and processing techniques
are needed, depending on the the condition of the manuscript. In recent years, modern imaging
techniques have been applied to ancient manuscripts to recover writings that are not visible to
the naked eye or not recognizable due to various factors. In this paper, we apply imaging
techniques on an ancient manuscript, Yashodhar Charitra, and restore it digitally.
Numerous security metrics have been proposed in the past for protecting computer networks.
However we still lack effective techniques to accurately measure the predictive security risk of
an enterprise taking into account the dynamic attributes associated with vulnerabilities that can
change over time. In this paper we present a stochastic security framework for obtaining
quantitative measures of security using attack graphs. Our model is novel as existing research
in attack graph analysis do not consider the temporal aspects associated with the
vulnerabilities, such as the availability of exploits and patches which can affect the overall
network security based on how the vulnerabilities are interconnected and leveraged to
compromise the system. Gaining a better understanding of the relationship between
vulnerabilities and their lifecycle events can provide security practitioners a better
understanding of their state of security. In order to have a more realistic representation of how
the security state of the network would vary over time, a nonhomogeneous model is developed
which incorporates a time dependent covariate, namely the vulnerability age. The daily
transition-probability matrices are estimated using Frei's Vulnerability Lifecycle model. We
also leverage the trusted CVSS metric domain to analyze how the total exploitability and impact
measures evolve over a time period for a given network.
Constructing a classification model is important in machine learning for a particular task. A
classification process involves assigning objects into predefined groups or classes based on a
number of observed attributes related to those objects. Artificial neural network is one of the
classification algorithms which, can be used in many application areas. This paper investigates
the potential of applying the feed forward neural network architecture for the classification of
medical datasets. Migration based differential evolution algorithm (MBDE) is chosen and
applied to feed forward neural network to enhance the learning process and the network
learning is validated in terms of convergence rate and classification accuracy. In this paper,
MBDE algorithm with various migration policies is proposed for classification problems using
medical diagnosis.
User centric personalized multifacet model trust in online social networkcsandit
Online Social Network (OSN) has become the most popular platform on the Internet that can
provide an interesting and creative ways to communicate, sharing and meets with peoples. As
OSNs mature, issues regarding proper use of OSNs are also growing. In this research, the
challenges of online social networks have been investigated. The current issues in some of the
Social Network Sites are being studied and compared. Cyber criminals, malware attacks,
physical threat, security and usability and some privacy issues have been recognized as the
challenges of the current social networking sites. Trust concerns have been raised and the
trustworthiness of social networking sites has been questioned. Currently, the trust in social
networks is using the single- faceted approach, which is not well personalized, and doesn’t
account for the subjective views of trust, according to each user, but only the general trust
believes of a group of population. The trust level towards a person cannot be calculated and
trust is lack of personalization. From our initial survey, we had found that most people can
share their information without any doubts on OSN but they normally do not trust all their
friends equally and think there is a need of trust management. We had found mixed opinions in
relation to the proposed rating feature in OSNs too. By adopting the idea of multi-faceted trust
model, a user-centric model that can personalize the comments/photos in social network with
user’s customized traits of trust is proposed. This model can probably solve many of the trust
issues towards the social networking sites with personalized trust features, in order to keep the
postings on social sites confidential and integrity.
Effect of grid adaptive interpolation over depth imagescsandit
A suitable interpolation method is essential to keep the noise level minimum along with the timedelay.
In recent years, many different interpolation filters have been developed for instance
H.264-6 tap filter, and AVS- 4 tap filter. This work demonstrates the effects of a four-tap lowpass
tap filter (Grid-adaptive filter) on a hole-filled depth image. This paper provides (i) a
general form of uniform interpolations for both integer and sub-pixel locations in terms of the
sampling interval and filter length, and (ii) compares the effect of different finite impulse
response filters on a depth-image. Furthermore, the author proposed and investigated an
integrated Grid-adaptive filter, that implement hole-filling and interpolation concurrently,
causes reduction in time-delay noticeably along with high PSNR .
com cinco horas de duração, o workshop, que passeia pela teoria e pela prática, tem como objetivo compartilhar uma maneira um tanto mais elaborada de pensar uma apresentação.
sem contra-indicações ou restrições, é uma boa pedida para todos que, por um motivo ou por outro, precisam apresentar uma ideia a um público de forma clara e objetiva.
MENSCHEN STATT SEITEN - Ein Plädoyer für People AnalyticsDatentreiber
„Märkte sind Gespräche“ stellte das Cluetrain-Manifest mit seiner ersten These bereits 1999 zu den Hochzeiten der New Economy fest. Es dauerte allerdings fast noch ein Jahrzehnt bis aus dem Web ein Social Web wurde und der Übergang vom e- zum Social Commerce steht uns erst noch bevor. Doch unsere Messinstrumente, Analytics-Werkzeuge wie Google Analytics, sind weitgehend dieselben geblieben. Sie messen Seitenaufrufe, Klick-Pfade und Konversionstrichter. Mark Zuckerberg, Gründer von Facebook, gab hingegen früh die Parole aus: „people, not pages“. Denn: „Die Märkte bestehen aus Menschen“, so das Cluetrain-Manifest in seiner zweiten These. Wer also Märkte verstehen will, muss die Menschen messen – und nicht die Seiten. Was die People Analytics von den Page Analytics unterscheidet, wo die Vorteile liegen und wohin die Reise geht, beleuchtet dieser Vortrag von Martin Szugat, Gründer von Datentreiber.de.
ação de arrecadação de natal desenvolvida para o blog da thássia, em conjunto com a relações públicas, aline alcântara.
vista solidariedade, dezembro de 2012.
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
Gowtham.T ,Pradeep Kumar.G " Security Based Data Transfer and Privacy Storage through Watermark Detection ", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Digital watermarking has been proposed as a technology to ensure copyright protection by embedding an imperceptible, yet detectable signal in visual multimedia content such as images or video. In every field key aspect is the security Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service. Several attempts has been made for increasing the security related works and avoidance of data loss. Existing system had attain its solution up to its level where it can be further able to attain the parameter refinement. In this paper improvising factor been made on the successive compressive sensing reconstruction part and Peak Signal-to-Noise Ratio (PSNR).Another consideration factor is to increase (CS) rate through de-emphasize the effect of predictive variables that become uncorrelated with the measurement data which eliminates the need of (CS) reconstruction.
Next Generation Network: Security and Architectureijsrd.com
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. Wireless Sensor Networks (WSN) are a most challenging and emerging technology for the Research due to their vital scope in the field coupled with their low processing power and associated low energy. As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design staring with a brief overview of the sensor networks security, a review is made of and how to provide the security in the wireless sensor networks. This paper studies the security problems, Requirement, Architecture of WSN and different platform, characterized by severely constrained computational and energy resources, and an ad hoc operational environment.
Internet of things (IoT) has become one of the eminent phenomena in human
life along with its collaboration with wireless sensor networks (WSNs), due
to enormous growth in the domain; there has been a demand to address the
various issues regarding it such as energy consumption, redundancy, and
overhead. Data aggregation (DA) is considered as the basic mechanism to
minimize the energy efficiency and communication overhead; however,
security plays an important role where node security is essential due to the
volatile nature of WSN. Thus, we design and develop proximate node aware
secure data aggregation (PNA-SDA). In the PNA-SDA mechanism, additional
data is used to secure the original data, and further information is shared with
the proximate node; moreover, further security is achieved by updating the
state each time. Moreover, the node that does not have updated information is
considered as the compromised node and discarded. PNA-SDA is evaluated
considering the different parameters like average energy consumption, and
average deceased node; also, comparative analysis is carried out with the
existing model in terms of throughput and correct packet identification.
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
The rapid growth of cloud computing and Internet of Things (IoT) applications faces several threats, such as latency, security, network failure, and performance. These issues are solved with the development of fog computing, which brings storage and computation closer to IoT-devices. However, there are several challenges faced by security designers, engineers, and researchers to secure this environment. To ensure the confidentiality of data that passes between the connected devices, digital signature protocols have been applied to the authentication of identities and messages. However, in the traditional method, a user's private key is directly stored on IoTs, so the private key may be disclosed under various malicious attacks. Furthermore, these methods require a lot of energy, which drains the resources of IoT-devices. A signature scheme based on the elliptic curve digital signature algorithm (ECDSA) is proposed in this paper to improve the security of the private key and the time taken for key-pair generation. ECDSA security is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP), which allows one to use much smaller groups. Smaller group sizes directly translate into shorter signatures, which is a crucial feature in settings where communication bandwidth is limited, or data transfer consumes a large amount of energy. In this paper, we have chosen the safe curve types of elliptic-curve cryptography (ECC) such as M221, SECP256r1, curve 25519, Brainpool P256t1, and M-551. These types of curves are the most secure curves of other curves of ECC as their security is based on the complexity of the ECDLP of the curve. And these types of curves exceed the complexity of the ECDLP. A valid signature can be generated without reestablishing the whole private key. ECDSA ensures data security and successfully reduces intermediate attacks. The efficiency and effectiveness of ECDSA in the IoT environment are validated by experimental evaluation and comparison analysis. The results indicate that, in comparison to the two-party ECDSA and RSA, the proposed ECDSA decreases computation time by 65% and 87%, respectively. Additionally, as compared to two-party ECDSA and RSA, respectively, it reduces energy consumption by 77% and 82%.
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
The rapid growth of cloud computing and Internet of Things (IoT) applications faces several threats, such as latency, security, network failure, and performance. These issues are solved with the development of fog computing, which brings storage and computation closer to IoT-devices. However, there are several challenges faced by security designers, engineers, and researchers to secure this environment. To ensure the confidentiality of data that passes between the connected devices, digital signature protocols have been applied to the authentication of identities and messages. However, in the traditional method, a user's private key is directly stored on IoTs, so the private key may be disclosed under various malicious attacks. Furthermore, these methods require a lot of energy, which drains the resources of IoT-devices. A signature scheme based on the elliptic curve digital signature algorithm (ECDSA) is proposed in this paper to improve the security of the private key and the time taken for key-pair generation. ECDSA security is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP), which allows one to use much smaller groups. Smaller group sizes directly translate into shorter signatures, which is a crucial feature in settings where communication bandwidth is limited, or data transfer consumes a large amount of energy. In this paper, we have chosen the safe curve types of elliptic-curve cryptography (ECC) such as M221, SECP256r1, curve 25519, Brainpool P256t1, and M-551. These types of curves are the most secure curves of other curves of ECC as their security is based on the complexity of the ECDLP of the curve. And these types of curves exceed the complexity of the ECDLP. A valid signature can be generated without reestablishing the whole private key. ECDSA ensures data security and successfully reduces intermediate attacks. The efficiency and effectiveness of ECDSA in the IoT environment are validated by experimental evaluation and comparison analysis. The results indicate that, in comparison to the two-party ECDSA and RSA, the proposed ECDSA decreases computation time by 65% and 87%, respectively. Additionally, as compared to two-party ECDSA and RSA, respectively, it reduces energy consumption by 77% and 82%.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
2.espk external agent authentication and session key establishment using publ...EditorJST
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed and deployed in a un attend environment, these are vulnerable to numerous security threats. In this paper, describe the design and implementation of public-key-(PK)-based protocols that allow authentication and session key establishment between a sensor network and a third party. WSN have limitations on computational capacity, battery etc which provides scope for challenging problems. We fundamentally focused on the security issue of WSNs The proposed protocol is efficient and secure in compared to other public key based protocols in WSNs.
History based on traditional instruments, followed
by interface bus and cards to access data to measure and control,
thus elaborating the concept of Cloud Instrumentation is a
fundamental step in knowing more about instruments accessed
from cloud.
The measurement technology sounds to be the new era of
development of parameters to be measured and co
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...TELKOMNIKA JOURNAL
Watermarking is the process of embedding information into a carrier file for the protection of ownership/copyright of digital media, whilst steganography is the art of hiding information. This paper presents, a hybrid steganographic watermarking algorithm based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) transforms in order to enhance the security of digital fingerprint images. A facial watermark is embedded into fingerprint image using a method of singular value replacement. First, the DWT is used to decompose the fingerprint image from the spatial domain to the frequency domain and then the facial watermark is embedded in singular values (SV’s) obtained by application of SVD. In addition, the original fingerprint image is not required to extract the watermark. Experimental results provided demonstrate the methods robustness to image degradation and common signal processing attacks, such as histogram and filtering, noise addition, JPEG and JPEG2000 compression with various levels of quality.
An efficient approach for secured communication in wireless sensor networks IJECEIAES
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraints. Inspite of these constraints, WSN is useful where communication happens without infrastructure support. The main concern of WSN is the security as the sensor nodes may be attacked and information may be hacked. Security of WSN should have the capability to ensure that the message received was sent by the particular sent node and not modified during transmission. WSN applications require lightweight and strong authentication mechanisms for obtaining data from unprivileged users. In wireless sensor networks, authentication is the effective method to stop unauthorized and undisrupted communication service. In order to strengthen the authenticated communication, several researchers have developed mechanisms. Some of the techniques work with identifying the attacked node or detecting injected bogus message in the network. Encryption and decryption are the popular methods of providing the security. These are based on either public-key or symmetric-key cryptosystems.Many of the existing solutions have limitations in communication and computational expertise. Also, the existing mechanisms lack in providing strength and scalability of the network. In order address these issues; a polynomial based method was introduced in recent days. Key distribution is a significant aspect in key management in WSNs. The simplest method of distribution of key is by hand which was used in the days of couriers. Now a day, most distribution of keys is done automatically. The automatic distribution of keys is essential and convenient in networks that require two parties to transmit their security keys in the same communication medium. In this work, a new type of key exchange mechanism is proposed. The proposed method for authentication among sensor nodes proves to be promising as per the simulation results. The nodes which are unknown to each other setup a private however arbitrary key for the symmetric key cryptosystem.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Multi-stage secure clusterhead selection using discrete rule-set against unkn...IJECEIAES
Security is the rising concern of the wireless network as there are various forms of reonfigurable network that is arised from it. Wireless sensor network (WSN) is one such example that is found to be an integral part of cyber-physical system in upcoming times. After reviewing the existing system, it can be seen that there are less dominant and robust solutions towards mitigating the threats of upcoming applications of WSN. Therefore, this paper introduces a simple and cost-effective modelling of a security system that offers security by ensuring secure selection of clusterhead during the data aggregation process in WSN. The proposed system also makes construct a rule-set in order to learn the nature of the communication iin order to have a discrete knowledge about the intensity of adversaries. With an aid of simulation-based approach over MEMSIC nodes, the proposed system was proven to offer reduced energy consumption with good data delivery performance in contrast to existing approach.
A data quarantine model to secure data in edge computingIJECEIAES
Edge computing provides an agile data processing platform for latencysensitive and communication-intensive applications through a decentralized cloud and geographically distributed edge nodes. Gaining centralized control over the edge nodes can be challenging due to security issues and threats. Among several security issues, data integrity attacks can lead to inconsistent data and intrude edge data analytics. Further intensification of the attack makes it challenging to mitigate and identify the root cause. Therefore, this paper proposes a new concept of data quarantine model to mitigate data integrity attacks by quarantining intruders. The efficient security solutions in cloud, ad-hoc networks, and computer systems using quarantine have motivated adopting it in edge computing. The data acquisition edge nodes identify the intruders and quarantine all the suspected devices through dimensionality reduction. During quarantine, the proposed concept builds the reputation scores to determine the falsely identified legitimate devices and sanitize their affected data to regain data integrity. As a preliminary investigation, this work identifies an appropriate machine learning method, linear discriminant analysis (LDA), for dimensionality reduction. The LDA results in 72.83% quarantine accuracy and 0.9 seconds training time, which is efficient than other state-of-the-art methods. In future, this would be implemented and validated with ground truth data.
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading to the suggestion of a new method of the combination between encryption and concealment of information so as to make it difficult to identify the transmitted datavia networks. This study has used two force secure (2FS) to encrypt the images, in other words, the SF is frequent twice on the image, to obtain powerful encryption then the concealing of the secret message is done inside the cryptography of the image has been performed using a secret key (cosine curve), and this stego-encryption image has been transformed forthe Internet of things storage in the database in IoT (data flow), when the user needs any information can be access inviaof internet of things (IoTs). The outcome of the proposed system is obtained tobe evaluated through different measures, such aspeak signal noise ratio (PSNR), mean square error (MSE), entropy,correlation coefficient, and histogram. The proposed system is good, efficient, fast, has high security, robustness, and transparency.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
2. 128 Computer Science & Information Technology (CS & IT)
watermarking in WSN is feasible. Hence the research in the area of watermarking and WSN is
becoming increasingly important. Watermarking technique is a lightweight technique that was
used traditionally for providing copyright protection for multimedia data like images and video
clips. Watermarking algorithms are much lighter and require less battery power and processing
capabilities than cryptographic-based algorithms. Another advantage for the watermarking-based
algorithms is that the watermark is embedded directly into the sensor data; there is no increase in
the payload. While cryptography provides no protection after the content is decrypted,
watermarking provides protection in secrecy at all times because the watermark is an inseparable
constituent part of the host media [6-8]. Hence the research in the area of watermarking and WSN
is becoming increasingly important. With the concept of cyber physical system, i.e., on web of
things this research is becoming main stream and the importance of this research has become
even more significant. The objective of this paper we present on secure data trnasmittion in
WSNs using watermarking technique.
2. RELATED WORKS
In the last few years, there are many researches who studies on digital watermarking technique
for normal data types for example texts, images, audios, videos. and even relational databases [2-
4] But there are only a few research works on digital watermarking techniques for WNSs [5] [6,
7]. Feng, J.P et.al [5] developed the first system of watermarking technique to embed crypto
logically encoded authorship signatures into data and information acquired by wireless embedded
sensor networks. Sion et.al [6] provided copyright protection to data stream owners and
authorized users. Consider the case where a stream is generated and safely transmitted from the
sensors to the base station. A watermark is applied to the stream at the base station. The data are
then transmitted to an authorized user. The owner and authorized users need a way to show that
the data were generated by them and they want to prove that the stream was illegally obtained by
the attacker. One commonly accepted way to prove ownership is the use of embedded
watermarks. This technique works by embedding a watermark bit into major extremes, which are
extremes that will survive any uniform sampling. F. Koushanfar et.al [8] present an active
watermarking technique that can be used on the data that is processing during the common sensor
fusion application from sensor of different modalities. Xiaoet.al [9]proposed a watermarking
technique for protecting copyright by taking advantage of the characteristic of the sending time.
Based on digital watermarking, Zhang, W, et.al [10] proposed an end-to-end, watermark
statistical approach for data authentication that provides inherent support for in-network
processing. In this technique authentication information is modulated as watermark and then is
embedded to the sensory data at the sensor nodes. Communication protocol for WSN is
introduced by Xuejun R et.al [11] for sensitive data transmission. The technique use sensitive
information as watermark. The watermark is then embedded into sensory data in the sensor
nodes. A threshold is used for avoiding the alteration of the lowest to make a big influence to
sensory data’s precision. Kamel et.al [12] introduced a technique for providing data integrity.
This technique based on distortion free watermarking embeds the watermark in the order the data
element so that it does not cause distortion to the data.
Usually there are two main purposes for watermarking. One of is to protect the copyright of the
author. The other is to provide data integrity and to do authentication by using user’s identity as
watermark information. Compared with authentication schemes based on public key ciphers, the
watermarking based authentication has the advantages of lower computational complexity and
being invisible to adversaries. In fact, besides these purposes, watermarking technique can also be
used to transmit some secret information through unsecure channels without encryption. The
table1 shows their approach and their purpose many researchers who work on the watermarking
technique for WSNs.
3. Computer Science & Information Technology (CS & IT) 129
Although some research works attempted to apply digital watermarking technique into wireless
sensor networks for copyright protection, authentication and integrity purposes, most of existing
studies were only limited to secure data communication. No watermarking based secure data
communication method has been found in related works. Therefore the purpose of this paper is
that it presents secure data transmission in WSNs using watermarking technique
Table 1 Watermark embedding approaches and their purpose
Author Watermark embedding technique Purpose
Feng et al. [5] Adding watermark constraint to processing step during network
operation
Copyright
protection
Sion et al. [6] Selection criteria using MSB Copyright
protection
Koushanfar et
al. [8]
Adding watermark constraint to processing step during network
operation
Copyright
protection
Xiao et al. [9] By modification the embedding bit of each packet. LSB Copyright
protection
Zhang et al.
[10]
The watermark sensory data, d(x,y) = w(x,y)+o(x,y), w(x,y) is
the watermark for sensor node and O(x,y) is sensory data
Authentication
Xuejun et al.
[11]
IIS = input integer stream, IBs=input binary stream. T =
Threshold, If IIS ≥T
“IBS=1” become “IBS=0”
Else “IBS=0” become “IBS=0”
Authentication
Kamel et al.
[13]
Concatenation of the current group hash value group gi and
next group hash value group gi+1. Wi = HASH (K || gi || SN)
SN = serial number
Integrity
3. AN OVERVIEW OF DIGITAL WATERMARK
Watermarking technique is the process of embedding information which allows an individual to
add hidden copyright notices or other verification messages to digital audio, video, or image
signals and documents object [14-16]. Such hidden message is a group of bits describing
information pertaining to the signal or to the author of the signal. The signal may be audio,
pictures or video, for example, if the signal is copied, then the information is also carried in the
copy. Watermarking seeks to embed a unique piece of data into the cover medium. The specific
requirements of each watermarking technique may vary with the applications and there is no
universal watermarking technique that satisfies all the requirements completely for all
application.
Watermarking system as a communication task consists of three main stages: watermark
generation process, watermark embedding process that including information transmission and
possible attacks through the communication channel and detecting process that watermark
retrieval
3.1 Watermark generation process
Generation process is the first step and a very critical of the process. The requirements of
watermark generation process are unique and complexity. The watermark message contains
information that must be unique such as simple text [5] [8] The key embedding is also unique in
order to make a secrecy key such as binary stream [13] [17] [18] [9] [19] and pseudorandom
sequence [10]. Both the watermark message and the key embedding are as input and they then
are processed in the watermark generator to produce a watermark signal. Examples of the
4. 130 Computer Science & Information Technology (CS & IT)
watermark generator are Hash function [13] [5] [8] [17] [18] [19] and product function . The
watermark signal is a kind of signal or pattern that can be embedded into cover medium. There
two types of watermark signal, i.e., meaningful and meaningless watermark. Examples of the
watermark meaningful are logo
3.2 Watermark embedding Process
Embedding process is the second step of the watermarking system. This process is undertaken by
an embedder and can be done in the transform domain such as Discrete Cosine Transform (DCT),
Discrete Fourier Transform (DFT), Fast Fourier Transform (FFT) and Discrete Wavelet
Transform (DWT). The embedder combines the cover medium, the watermark signal, the sensed
data and key embedding and it then creates watermarked cover medium. Examples of the cover
medium are packed data, text, image, audio signal and video. The watermarked cover medium is
perceptually identical to the cover medium. The watermarked cover medium is then transmitted
by the sender through the unsecure communication channel such as wireless and radio channel.
During transmission, there is anything that interfere in the communication process such noise,
decreasing the quality of transmitting and a watermarked cover medium dropped. The other thing
is that watermark attacks such as cropping, compression, and filtering, the aim of this attack is
removed the watermark signal from the watermarked cover medium
3.3 Detecting and Extracting Process
The end of the watermarking system detects or extracts process that is a crucial part because the
sender can identify and provide information to the intended receiver. The detecting or extracting
is undertaken by a detector. The detecting process consists of an extraction unit to first extract the
watermark signal and later compare it with the cover medium or not inserted. The extracting
process can be divided into two phases, locating the watermark and recovering the watermark
information. There are two types detection: Informed detection and blind detection according
whether the cover medium is needed or not in the detection process. For informed detection
which means the cover medium such as a packet data, original image and original signal, the
watermarking system is called private watermarking. For the blind detection that does not need
the cover medium is used for detection, the watermarking system is called a public watermarking.
4. PROBLEM DESCRIPTION
In application the wireless sensor networks, all communication between different nodes are send
in broadcast fashion through communication channel where any node become attack target with
external and internal security risk including eavesdropping, leak, temper, disrupt and other. In the
special application fields, if the data transmission is not reliable, the security of the whole
networks will be affected. Secure data transmission between sensors nodes have become
important issue because an attacker can easily eavesdrop on, inject and manipulate a sensor node.
Secure data sensor networks use many cryptographic algorithms. These techniques need
thousands or even millions of multiplication instructions in order to perform operations [20-24].
The essence of the public key encryption for WSNs is keeping information the plain packet data
secret namely securing communication in the presence of attackers, verifying authenticity of
trusted parties and maintaining transaction integrity. In the previous section, we conducted an in-
depth literature survey of watermarking approach in WSNs solution and their purposes and we
identified that only limited presented. a solution to the address of issues. This gives us the
rationale to present our solution secure data transmission model based on watermarking technique
5. Computer Science & Information Technology (CS & IT) 131
5. PROPOSED MODEL WATERMARKING TECHNIQUE
In this section, we give a general overview of our solution watermarking technique to protect the
reliability of data transmissions. The secure data communication model based on watermarking is
illustrated in Figure 1. According to the model, this model consists of four steps : (a) cover
medium process (b) Watermark generator process (c) Embedder process (d) Detecting or
extracting process. The cover medium process is the process to generate a cover medium by using
an atomic trilateration process. The watermark generator process is to create watermark constraint
and message sensed data. This process requires a sensed data whereas the data through the LFSR
process, partitioned process and Kolmogorof rule process. The embedder process is the process to
generate a cover medium watermarked and the process of detecting is to detect the watermark
signal
Figure 1 secure data transmission model based on watermarking
We next explain the four steps, we begin cover medium process
6. 132 Computer Science & Information Technology (CS & IT)
5.1 Generate Cover medium
In this section, we explain the process of generating cover medium by using atomic trilateration
process (Pseudocode 1) With respect to a two-dimensional sensor networks, atomic trilateration is
a well-known procedure by which a sensor node in a networks can determine its position by
using the position of and distances to at least three other sensor nodes of know location. From
these distance and position, a sensor node which is trying to determine its location can generate a
nonlinear system programming.
Pseudocode 1. Generate Cover Medium
Input : ( ) ),(,, ByBxAyAx , ( ),, cC yx cT , ,DAt ,DBt ,DCt
( )DD yx ,
, tε , DAε , DBε , DCε 21 ,δδ , 3δ
Output: The cover medium is
3
))))((6.04.331()(
2
)(
2
)((
2
))))((6.04.331()(
2
)(
2
)((
1))))((6.04.331()(
2
)(
2
)((
sConstraint
321min
δεε
δεε
δεε
δδδεεεε
≤+++−−−−+−
≤+++−−−−+−
≤+++−−+−+−
++++++=
DCDCttcT
C
z
D
zCyDyCxDx
DBDBttcT
B
z
D
zByDyBxDx
DADAttcT
A
z
D
zAyDyAxDx
DCDBDAtf
Steps :
1.Compute cTsV 6.04.331 +=
2.Compute DAtsVDAd *= , DBtsVDBd *= , DCtsVDCd *= . Where DAd DBd and DCd
is
between node D and the sensor nodes are then measured using
TDoA.
3.Append tε error of measurement time to step (2)
4.Append DAε , DBε , and DCε errors of measurement distance to step
(2).
5.Compute 2)(2)( AyDyAxDxDAd −+−= 2)(2)( ByDyBxDxDBd −+−=
2)(2)( CyDyCxDxDAd −+−=
6.Append 21 ,δδ and 3δ errors between the Euclidean distances step
(3)
7. Replacing ,DAd DBd and DCd from step (2) to step (3)and then
compute them.
8. Print cover medium
5.2 Watermark generation process
Generation process is the first step and a very critical of the process. The requirements of
watermark generation process are unique and complexity. The watermark message contains
information that must be unique such as text and sensed data. The watermark key is also unique
in order to make a secrecy key such as binary stream, integer and amplitude. Both the watermark
message and the watermark key generator are as input and they then are processed in the
watermark generator to produce a watermark signal. The process of generate watermark signal
consists of five steps: (1) converting sensitive data into binary sequence, (2) Linear Feedback
Shift Register ( LFSR ) to create watermark signal, (3) Kolmogorof rule to produce watermark
constraints, (4) Partitioning and convert to decimal number from watermark signal to produce
message sensed data and. Let we explain each of steps
Eq (1)
7. Computer Science & Information Technology (CS & IT) 133
5.2.1 Converting Sensitive data into binary sequence
The first step is that converting sensitive data into binary sequence. Any data of which the
compromise with respect to confidentiality, integrity, and/or availability could have a material
adverse effect on coventry interest, the conduct of agency programs. This data is called a sensitive
data. The sensitive data is directly proportional to the materiality of a compromise of the data
with respect to these criteria. Shih, F et.al [25] present finding sensitive data and privacy issue of
applications in Body Sensor Networks(BSN). In BSN, the applications collect sensitive
physiological data of the user and send to other parties for further analyses. The sensitive data are
heart rate and Blood Pressure. These data are required to be protected and then these data will be
converted scalar data into binary stream. WSN has gathered a blood pressure patient. The patient
blood pressure is 120 so the digit sequence of 120 padded with zeros so that it is of total length 8.
d= dec2bin([120],8) = 01111000
5.2.2 Generating watermark signal using LFSR
One method of forming a binary sequence for generating watermark is to apply a LFSR whose
characteristic polynomial is primitive [26, 27]. LFSR is a shift register whose input bit is a linear
function of its previous state. The only linear function of single bits is exclusive-or (xor),
therefore it is a shift register whose input bit is driven by xor of some bits of the overall shift
register value.
LFSR can be defined by a recurrence relation:
.1such thatconstantsbinaryarethe
and
1
0
,0where,1
=
∈∑
−
=
≥+=+
ocic
Z
n
i
nkksicnKs
, Eq (2)
associated with such a recurrence relation is a binary polynomial
kk
k xxcxccxf ++++= −
−
1
110 ...)( , Eq (3)
called the characteristic polynomial of the LFSR. The coefficient ci are feedback constants. Such
sequence can be mechanized by using a LFSR whose tap setting are defined by the feedback
constants.
We implemented (pseudocode 2) to generate a watermark signal, we use the sensory data as the
initial state of LFSR , i.e., “01111000” and the binary polynomial 765
1)( xxxxxf ++++= .
This binary polynomial is written by [ 1 2 5 6 ] as key embedding . We then get the 28 binary
sequence is 00011110 000011011100 1100 0111 .This binary sequence is called a watermark
signal.
Pseudocode 2. Generate watermark signal
Input : Sensed data, coefficients ci of the binary polynomial
as watermark key
Output : 28 bits watermark signal
Steps :
1.Convert sensed data into binary sequence.
2.Use the coefficients ci of the binary polynomial )(xf as
watermark key
8. 134 Computer Science & Information Technology (CS & IT)
3.Generate an infinite binary sequence using the coefficient ci
into a LFSR ( nKs + ).
4. The infinite binary sequence cut from 1 to 28 as watermark
signal.
5. Print 28 bits watermark signal
5.2.3 Kolmogorov rule to create watermark constraints
Andrew nikolaevich Kolmogorov [28] states that complexity of an object is the length of shortest
computer program that can reproduce the object. The Kolmogorov complexity is defined a
probability distribution under which worst-case and average-case running time are the same. We
know that kolmogorof rule is the short description length of overall description interpreted by
computer. The three papers [5, 29, 30] used the kolmogorov rule for numbering the variables of
linear combination in the optimization objective function and a set of constrains. We also use the
kolmogorov rule. This rule can be seen in Table 2
Table 2 the kolmogorov rule
1 2 3 4 5 6 7
tε DAε DBε DCε 1δ 2δ 3δ
We number ( pseudocode 3) these variables by using kolmogorov rule.
Pseudocode3. Generate watermark constraints
Input : 28 bits watermark signal
Output: Watermark constraints
Steps
1. Group 28 bits watermark signal into group of 7 bits each.
2. Match the bit number with corresponding variable number from
table 2.
3. If a bit one is assigned a variable with in a group that
variable is included in the linear
4. Else a bit zero is assigned a variable with in a group that
variable is not included in the linear.
5. Go to 2
6. Print watermark constraints
5.2.4 Partitioned and convert to create message sensed data
In this section, we explain how a message sensed data created. To create this message sensed data
( pseudocode 4), 28 bits watermark binary that resulting from generating watermark signal is
used.
Pseudocode 4. Generate create message data
Input : 28 bits watermark signal
Output: message sensed data
Steps:
1.Group 28 bits watermark signal into group of 4 bits each.
2.Convert each of group into decimal number to get weight
factors.
3.Print message sensed data
9. Computer Science & Information Technology (CS & IT) 135
5.3 Watermark Embedding process
Embedding process is the second step of the watermarking system that is undertaken by an
watermark embedder. The embedder combines the cover medium, the watermark constraints and
the message sensed data and it then creates watermarked cover medium. The watermarked cover
medium is perceptually identical to the cover medium. The figure 2 shows the watermark
embedding process. The watermark signal is converted to become watermark constraints by
using kolmogorov rule. The watermark constraints consist of four constraints that will be added
into the Equation 1. The message sensed data is also inserted into the coefficient objective of
Equation 1. This message sensed data is a weight factors that obtained by partitioning the
watermark signal into 7 sections. The watermark signal is converted to become watermark
constraints by using kolmogorov rule. The watermark constraints consist of four constraints that
will be added into the Equation 1. This message sensed data is a weight factors that obtained by
partitioning the watermark signal into 7 sections. The redundant constraints are added into the
Equation 1. The watermarking embedding process ( Pseudocode 5) can be shown in Figure 2.
00011110
( )cC yxC ,( )AA yxA ,
),( BB yxB
),( DD yxD
DAd DCd
DBd
4
3
2
1
3))))((6.04.331(2)(2)((
2))))((6.04.331(2)(2)((
1))))((6.04.331(2)(2)((
:sConstraint
71212130141min
FunctionObjective
321
3
32
321
321
δδδδε
δδεεε
δδδ
δδδδε
δεε
δεε
δεε
δδδεεεε
≤+++
≤+++
≤+
≤+++
≤+∆++−−+−
≤+∆++−−+−
≤+∆++−−+−
++++++=
t
DCDBDA
DC
DCDBDAt
DCDCttcTCyDyCxDx
DBDBttcTCyDyCxDx
DADAttcTCyDyCxDx
f
3
))))((6.04.331()(
2
)(
2
)((
2
))))((6.04.331()(
2
)(
2
)((
1))))((6.04.331()(
2
)(
2
)((
sConstraint
321min
δεε
δεε
δεε
δδδεεεε
≤+++−−−−+−
≤+++−−−−+−
≤+++−−+−+−
++++++=
DCDCttcT
C
z
D
zCyDyCxDx
DBDBttcT
B
z
D
zByDyBxDx
DADAttcT
A
z
D
zAyDyAxDx
DCDBDAtf
Figure 2 Watermark Embedding Process
Pseudocode 5. The process of embedding
Input: cover medium, Watermark constraints, message sensed data.
Output: ( )DD yx ,
, tε , DAε , DBε , DCε 21 ,δδ , 3δ
and min f
Steps :
1. Generate ( ) ),(,, ByBxAyAx and ( ),, cC yx using uniform distribution on
interval [0,1].
2. Generate ,DAt ,DBt and DCt using uniform distribution on interval
[0.02,0.1].
3. Generate 21 ,δδ and 3δ using gauss distribution on interval
[0,1].
10. 136 Computer Science & Information Technology (CS & IT)
4. Generate 31 ,2, τττ and 4τ using gauss distribution on interval [0,1],
So that these value do not harm to the feasibility of the
solution of the cover medium
5. Generate cT using gauss distribution on interval [0,1].
6. Change coefficient objective f to weight factor of message
sensed data respectively.
7. Append watermark constraints into cover medium
8. Compute and print ( )DD yx ,
, tε , DAε , DBε , DCε 21 ,δδ , 3δ and min f
5.4 Watermark detecting and extracting process
The process of detecting watermark into has not yet explained in Feng Jasica P et.al [5] and F.
Koushanfar et.al [8]. Both of them are only explain the process of embedding watermark. To
verify the presence of the watermark, we adopt the concept of Cox et al [31]. Cox draw parallels
between their technology and spread-spectrum communication since the watermark is spread over
a set of visually important frequency components Let X be the error from the optimal solution
without watermark and X’ be the error form the optimal solution with watermark. For detecting
the watermark, a correlation value or similarity measure is used in most of these methods. Here to
verify the presence of the watermark constraints, the similarity measure between the normalized
difference error from the optimal solution between the watermarked solution and the solution
obtained without watermarked XXC −= ''
. Adding the message sensed data into the Equation 1 is
called the equation without watermark constraints. Adding the message sensed data and the
watermark constraints are called the Equation 1with watermark. The similarity measure is given
by the normalized correlation coefficient
'.'
'.
'
)','(
XX
XC
XCsim = . Subsequently, since the expected
result is dyadic (i.e. the cover medium ‘is ’ or ‘is not ’ watermark), some kind of threshold is
needed. The watermarking detecting process can be shown in Figure 3. This process (Pseudocode
6) is also can be used to obtain the value of threshold. This threshold is extracted by statistical
rules and usually has a strong mathematical formulation. There are two kinds of errors in such
schemes. False-positive corresponds to the case of detection of non-existing watermarks signal.
False-mark
11. Computer Science & Information Technology (CS & IT) 137
321
321, ,,,,,,,
δδδεεεε
δδδεεεε
++++++= DCDBDAt
DCDBDAtDD
f
yx
321
'
3
'
2
'
1
''''
,
''
,,,,,,,
δδδεεεε
δδδεεεε
++++++= DCDBDAt
DCDBDAtDD
f
yx
3
))))((6.04.331(
2
)(
2
)((
2
))))((6.04.331(
2
)(
2
)((
1))))((6.04.331(
2
)(
2
)((
:sConstraint
min
FunctionObjective
321 741212130141
δεε
δεε
δεε
δδδεεεε
≤+∆++−−+−
≤+∆++−−+−
≤+∆++−−+−
++++++=
DCDCttcTCyDyCxDx
DBDBttcTCyDyCxDx
DADAttcTCyDyCxDx
DCDBDAtf
4
3
2
1
3
))))((6.04.331(
2
)(
2
)((
2
))))((6.04.331(
2
)(
2
)((
1))))((6.04.331(
2
)(
2
)((
:sConstraint
min
FunctionObjective
321
3
32
321
321 71212130141
δ
δ
δ
δ
δεε
δεε
δεε
δδδε
δεεε
δδ
δδδε
δδδεεεε
≤
≤
≤
≤
≤+∆++−−+−
≤+∆++−−+−
≤+∆++−−+−
+++
+++
+
+++
++++++=
t
DCDBDA
DC
DCDBDAt
DCDCttcTCyDyCxDx
DBDBttcTCyDyCxDx
DADAttcTCyDyCxDx
f
i
NNH ≠=1
i
NNH ==0
Figure 3 Watermark detecting process
stands for the case that the watermark signal exists but cannot be detected. Although well-
reasoned, the existing thresholds many times lead to false-negative errors. We use False-negative
to determine the watermark signal presents or not.
'
1 NNH ≠= the cover medium is watermarked
'0 NNH == the cover medium is not watermarked
Pseudocode 6. The process of detecting
Input : x=[ tε , DAε , DBε , DCε 21 ,δδ , 3δ ], x’=[ '
tε , '
DAε , '
DBε , '
DCε , '
2
'
1,δδ , '
3δ ] and x”=[ "
tε , "
DAε ,
"
DBε , "
DCε , "
2
"
1 ,δδ , "
3δ ]
Output : Watermark signal robust or not robust
Steps :
1.Compute N = | [ tε , DAε , DBε , DCε 21 ,δδ , 3δ ]| , N’ = | [ '
tε , '
DAε , '
DBε , '
DCε , '
2
'
1,δδ , '
3δ ]| and
N’’ = | [ "
tε , "
DAε , "
DBε , "
DCε , "
2
"
1 ,δδ , "
3δ ]|
2.Compute c=x’-x and c’=x”-x
3.Compute normalized correlation the results of error the cover
medium without watermark constraints
'.'
'.
XX
XC
treshold = )
4.Compute normalized correlation the results of error the cover
medium with watermark constraints
'.'
'.
'
)','(
XX
XC
XCsim = .
5.If i
NN ≠ watermark signal exits
12. 138 Computer Science & Information Technology (CS & IT)
6.If i
NN = watermark signal does not exist
7.If threshold ),( ''
XCsimtreshold < watermark signal is robust go to 9
8.If threshold ),( ''
XCsimtreshold < watermark signal is not robust
9.Algorithm the process of extracting message sensed data
The extracting process (Pseudocode 7) is also undertaken in the watermark detector, we want to
recovery the message sensed data from the cover medium. Based on the statistical rule of false-
negative, we accept H1 that means the cover medium is watermarked.
We then can do the process of extracting a watermark message sensed data into sensed data as
shown in Figure 4. By using the pseudo code 7 the value of errors the cover medium with
watermark constraints, we check whether these watermark constraints do not change or not. If
these constraints do not change, we can do the process of extracting watermark signal. In this
case, the coefficients objective function form the cover medium are 1 14 0 13 12 12
and 7.
4
3
2
1
3
))))((6.04.331(
2
)(
2
)((
2
))))((6.04.331(
2
)(
2
)((
1))))((6.04.331(
2
)(
2
)((
:sConstraint
min
FunctionObjective
321
3
32
321
321 71212130141
δ
δ
δ
δ
δεε
δεε
δεε
δδδε
δεεε
δδ
δδδε
δδδεεεε
≤
≤
≤
≤
≤+∆++−−+−
≤+∆++−−+−
≤+∆++−−+−
+++
+++
+
+++
++++++=
t
DCDBDA
DC
DCDBDAt
DCDCttcTCyDyCxDx
DBDBttcTCyDyCxDx
DADAttcTCyDyCxDx
f
Figure 4 Watermark extracting Process
Pseudocode 7. The process of extracting sensed data
Input : tε , DAε , DBε , DCε 21 ,δδ , 3δ watermark key
Output : Sensed data
Steps :
1.Compute the value of the objective f using tε , DAε , DBε , DCε 21 ,δδ , and
3δ
2.If the value of the objective do not change go to 3
3.Else the value of the objective change goes to step 1.
4.Take the coefficients of objective f.
5.Convert the coefficient of objective f into 4 bits each.
6.Merge all of these 4 bits to 28 bits
7.Use reverse LFSR with watermark key to get sensed data.
6. EXPERIMENT SETUP
In this section, we describe the experiment setup for testing the purpose of the secure data
transmission model, based on watermarking technique. We used TOMLAB which is a general
purpose development environment in MATLAB for research and practical solution of
optimization problems. TOMLAB has grown out of the need for advanced, robust and reliable
13. Computer Science & Information Technology (CS & IT) 139
tools to be used in the development of algorithms and software for the solution of many different
types of applied optimization problems.
6.1 NETWORK SETUP
In this section, the scenario of the atomic trilateration process is used as shown in Figure 4
AyAxA ,
),( ByBxB
),( DyDxD
DAd
DCd
DBdDAt
),( CyCxC
DCt
DBt
Figure 4 Atomic trilateration
With respect to a two-dimensional sensor networks, atomic trilateration is the means by which a
sensor node in a networks can be used to determine its position by using the position of and
distances to at least three other multimedia sensor nodes of know location. From these distance
and position, a multimedia sensor node which is trying to determine its location can generate a
nonlinear system equation. A typical scenario of atomic trilateration can be shown in Figure 4.
Sensor node D trilaterates with another three sensor nodes A, B, and C which have coordinates
( ) ),(,, BBAA yxyx , and ( )CyCx , . The distance is computed using time differences of arrival
(TDoA) between acoustic signals simultaneously, which are emitted from a sensor nodes and
received at the node D and radio frequency (RF). The sensor node D turns on a timer upon
receiving the RF signal from the sensor node to measure the difference between the arrival of the
RF and acoustic signals from that sensor node. The time measurements have an error. The speed
of the acoustic signal is a function of the temperature of the propagation media. The relationship
between the speed of the acoustic signal Vs (m/s) and the temperature cT is as follows:
cTsV 6.04.331 +=
Eq.(4)
By using the pseudocode 1, we find that the objective function is to minimize the overall error in
the system, and can be stated as shown in Equation (1)
6.2 PERFORMANCE METRICS
The existing performance of the watermarking technique for secure data transmitting is evaluated
against the following performance metrics:
14. 140 Computer Science & Information Technology (CS & IT)
Table 3 Performance Metrics secure data transmitting
Parameter explain Metric Value
Node Sensor Number of sensor node Integer 100
( )
nji
yx ji
,...2,1
,,
==
Position of two-dimensional sensor
networks
Coordinate ix =115,5693
iy =273,2856
cT the temperature of the propagation media Degree cT =36
,DAt DBt DCt time transmission between node D to A, D
to B and D to C
second =DAt 0,771625
=DBt 0,106793
=DCt 0,09282
Vs Speed acoustic signal (m/s) ≥sV 331.4
tε the error in the measurement of the
temperature
- tε =0
DAε , DBε ,
DCε
the error in the measurement of the timer
from D to A , D to B and D to C
- 0.0473=DAε
-0.0141=DBε ,
0=DCε
21 ,δδ , 3δ the error in the measurement between the
Euclidean measurement and the measured
using time differences of optimal D to A,
D to B and D to C.
- 0,0 21 == δδ 03 =δ
31 ,2, τττ 4τ the values are selected such that the
feasibility of the solution space of the
optimization problem is not harmed
- 1τ =0.16947616
2τ = 0.16947616,
3τ = 0.24915965
4τ = 0.992920660
Sensed data Data sensed by a sensor node Bit 01111000
Watermark
signal
Result from LFSR Bit 00011110
000011011100 1100
Message
sensed data
Result from pseudo code 4 Integer 1 14 0 13 12 12 7
treshold normalized correlation the results of error
the cover medium with watermark
constraints
- 0.799153536405721
)','( XCsim normalized correlation the results of error
the cover medium with watermark
constraints attack
- 0.2.154207742903002
7. EXPERIMENT AND RESULTS FOR SECURE DATA TRANSMITTING
WSNs have an additionally vulnerability because node are often placed in a hostile environment
where they are not physically protected. An attack is considered successful if it is not detected by
the receiver. In this section we discuss various types of attacks that can be launched in the WSNs
scenario and how the proposed security scheme can be used to thwart these attacks.
We consider in detail the corresponding weakness for this model watermarking technique that
could be used by the attacker. Assume that the watermarks constraints are estimated by the
attacker that should be change, modify and remove. The corresponding attacks are:
7.1 False data insertion attack
A number of different watermarks constraints that are generated by the LFSR, hoping to find the
new results of error the cover medium that will map into existing solution.
15. Computer Science & Information Technology (CS & IT) 141
We get the results of the error of the cover medium by false insertion watermark constraints:
tε =2.154233085444387, DAε = 0.007135532211399, DBε =- -0.000927368803587, DCε =
0.001724459319967, 021 == δδ and 3δ = 0.
Implementing a pseudo-code 6, we conclude that the value of similarity is greater than the value
of threshold: the value of similarity = 2.154207742903002e+002>the value of threshold =
0.799153536405721. This means that the watermark signal is not robust to false data insertion
attack.
7.2 Data modification attack
Data modification attack makes impersonation of different watermarks constraints that are
generated by the LFSR, hoping also to find the new results of error the cover medium that will
map into existing solution.
We get the results of the error of the cover medium by modification watermark constraints:
tε =0.100170911928198, DAε = 1.118559233568045, DBε =- -0.167216683069220, DCε =
0.000000000000137, 021 == δδ and 3δ = 0.145088180096586
Implementing a pseudo-code 6, we conclude that the value of similarity is greater than the value
of threshold: the value of similarity =0.923139703988680 > the value of threshold =
0.799153536405721. This means that the watermark signal is not robust enough to modification
the attack.
16. 142 Computer Science & Information Technology (CS & IT)
7.3 Data Deletion Attack
Data deletion attack is similar to the spoofed data attack in the sense that deleting watermark
constraints make the error results of the cover medium invalid Delete a number of watermarks
constraints hope to find new results of error the cover medium.
We get the results of the error of the cover medium by deleting watermark constraints: tε =0,
DAε = 0.931857673282008, DBε =- 0.870667531648967, DCε = 0.145088180096586,
021 == δδ and 3δ = 0.
Implementing a pseudo-code 7, we conclude that the value of similarity is greater than the value
of threshold: the value of similarity = 0.352844500181367< the value of threshold =
0.799153536405721. This means that the watermark signal is robust enough to delete the attack.
7.4 Replication Attack
Data replication attack is quite simple: an attacker seeks to add new constraints to the cover
medium by replicating the new constraints with the existing constraints. New constraints
replicated in this fashion can severely disrupt this solution of the cover medium’s performance.
Data replication attack hopes to find the new results of error the cover medium that will map into
existing solution.
We get the results of the error of the cover medium by replication watermark constraints:
tε =0.122299414900832, DAε = 0.428473573865247, DBε =- 0.500740473660944, DCε = 0,
021 == δδ and 3δ = 0.145088180096586.
17. Computer Science & Information Technology (CS & IT) 143
Implementing a pseudo-code 7, we conclude that the value of similarity is greater than the value
of threshold: the value of similarity = 0.285586856097203< the value of threshold =
0.799153536405721. This means that the watermark signal is robust to Replication Attack.
7.5 Sybil attack
A Sybil attack data occurs when the attacker creates multiple identities and exploits them in order
to manipulate a reputation score. The Sybil attack data is defined as a malicious device
illegitimately taking on multiple data identities., The Sybil attack data in communication channel
watermarking is an attack wherein a reputation network system is subverted by forging more than
one identity constraints in the cover medium A Sybil hopes to find aresults of error the cover
medium.
We get the results of the error of the cover medium by Sybil watermark constraints: tε =
0.100170911928198, DAε = 0.118559233568045, DBε =- 0.013888456874134, DCε =
0.000000000000137, 021 == δδ and 3δ = 0.
Implementing a pseudo-code 7, we conclude that the value of similarity is greater than the value
of threshold: the value of similarity = 0.103640805769825 < the value of threshold =
0.799153536405721. This means that the watermark signal is robust enough to Sybil attack the
attack.
The results of these experiments have been shown in Table 3.
Table 3 The robustness of a watermark constraints, and watermark signal
No. Kind of attacks Watermark constraints Watermark Signal
1. False data insertion Change Not robust
2. Data modification attack Change Not robust
3. Data deletion Not change Robust
4. Packet replication. Not change Robust
5. Sybil attack Not change Robust
8. PERFORMANCE EVALUATION
In this section, we perform a comparative analysis of our technique with other techniques
proposed by different researchers. The results of this comparative analysis are given in Table 4
18. 144 Computer Science & Information Technology (CS & IT)
Table 4 Comparative analysis with other approach
Kind of attacks
Feng
et al.
[5]
Sion
et al.
[6]
Koushan
far et al.
[8]
Zhang
et al.
[10]
Xiao
et al.
[9]
Xuejun
et al. [11]
Kamel
et al.
[13]
Harjito
B
False data
insertion
X X X √ X X √ X
data modification
attack
X X X √ X X √ X
Data deletion X X X X X X √ √
Packet replication. X X X X X X X √
Sybil attack X X X X X X X √
√ provide secure data communication and robust x not provide secure data communication
We then do many experiments of these attacks above to test the performance of the model of
secure data communication in WSNs. The results of these experiments can be shown in Table 3.
In this works, we compare 8 approaches in term of false data insertion, data modification attack,
data deletion, packet replication, and Sybil attack. The [5], [6], [8], [9] approaches do not provide
secure data communication against 6 attack. But [10] provide data for copy right protection and
[13] provide for data integrity against these attacks. Our approach provides secure data
communication against data deletion, packet replication and Sybil attacks. However our approach
does not provide secure communication against false data insertion, and modification data
9. CONCLUSIONS
In this paper, we propose a watermarking technique for secure data transmitting in WSNs. Our
strategy aims to protect data transmitting between sensor nodes in WSNs against these attacks.
We verify our technique by brute force attacks. We can make secure data from data deletion,
packet replication and Sybil attacks. However we cannot protect secure data from false data
insertion, and modification data. Therefore, we still need to improve our technique under the
circumstance that attacker launch different attack for the future work.
REFERENCES
[1] Yick, J., B. Mukherjee, and D. Ghosal, Wireless sensor network survey. Computer Networks, 2008.
52(12): p. 2292-2330.
[2] Jian, L. and H. Xiangjian. A Review Study on Digital Watermarking. in Information and
Communication Technologies, 2005. ICICT 2005. First International Conference on. 2005.
[3] Rakesh, A. and K. Jerry, Watermarking relational databases, in Proceedings of the 28th international
conference on Very Large Data Bases. 2002, VLDB Endowment: Hong Kong, China.
[4] Sion, R., M. Atallah, and P. Sunil, Rights protection for relational data. Knowledge and Data
Engineering, IEEE Transactions on, 2004. 16(12): p. 1509-1525.
[5] Fang Jessica, P., Miodrag Real-time watermarking techniques for sensor networks Proceedings-SPIE
The International Society for optical Engineering 2003(ISSU 5020): p. 391-402
[6] Radu, S., A. Mikhail, and P. Sunil, Resilient rights protection for sensor streams, in Proceedings of
the Thirtieth international conference on Very large data bases - Volume 30. 2004, VLDB
Endowment: Toronto, Canada.
[7] Xiao, X., Sun, Xingming Lincong, Yang Minggang, Chen. Secure Data Transmission of Wireless
Sensor Network Based on Information Hiding. in Mobile and Ubiquitous Systems: Networking &
Services, 2007. MobiQuitous 2007. Fourth Annual International Conference on. 2007.
19. Computer Science & Information Technology (CS & IT) 145
[8] F. Koushanfar, M.P., Watermarking Technique for Sensor Networks: Foundations and Applications.
Book chapter, in ‘Security in Sensor Networks’, Yang Xiao 2007.
[9] Rong, X., S. Xingming, and Y. Ying. Copyright Protection in Wireless Sensor Networks by
Watermarking. in Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP
'08 International Conference on. 2008.
[10] Zhang, W., Liu, Y, Sajal K, Das Aggregation Supportive Authentication in Wireless Sensor
Networks: A Watermark Based Approach. in World of Wireless, Mobile and Multimedia Networks,
2007. WoWMoM 2007. IEEE International Symposium on a. 2007.
[11] Xuejun, R., A sensitivity data communication protocol for WSN based on digital watermarking
School of Information and Technology, Northwestern University, Xi’an 710127, China, 2010.
[12] Kamel, I.A.K., O. Al Dakkak , A. Distortion-Free Watermarking Scheme for Wireless Sensor
Networks. in Intelligent Networking and Collaborative Systems, 2009. INCOS '09. International
Conference on. 2009.
[13] Kamel, I., A Lightweight Data Integrity Scheme for Sensor Networks. Sensors, 2011. 11(4): p. 4118.
[14] Wang, X.-Y., Z.-H. Xu, and H.-Y. Yang, A robust image watermarking algorithm using SVR
detection. Expert Systems with Applications, 2009. 36(5): p. 9056-9064.
[15] Potdar, V., Subjective and Objective Watermark Detection Using a Novel Approach–Barcode
Watermarking ed. C.I.a. Security. 2007. 576.
[16] Vidyasagar, P., J. Christopher, and C. Elizabeth, Multiple image watermarking using the SILE
approach, in Proceedings of the 6th WSEAS international conference on Multimedia systems &
signal processing. 2006, World Scientific and Engineering Academy and Society (WSEAS):
Hangzhou, China.
[17] Albath, J., Practical algorithm for data security (PADS) in wireless sensor networks Proceedings of
the 6th CM international workshop on Data engineering for wireless and mobile access - MobiDE
'07. 2007. 9.
[18] Juma, H.K., I.Kaya, L. Watermarking sensor data for protecting the integrity. in Innovations in
Information Technology, 2008. IIT 2008. International Conference on. 2008.
[19] Xiaomei, D.X., Li. An Authentication Method for Self Nodes Based on Watermarking in
Wireless]Sensor Networks. in Wireless Communications, Networking and Mobile Computing, 2009.
WiCom '09. 5th International Conference on. 2009.
[20] Haowen, C. and A. Perrig, Security and privacy in sensor networks. Computer, 2003. 36(10): p. 103-
105.
[21] Adrian, P.R., Szewczyk J. D. Tygar Victor, Wen David, E. Culler, SPINS: security protocols for
sensor networks. Wirel. Netw., 2002. 8(5): p. 521-534.
[22] Bartosz, P., S. Dawn, and P. Adrian, SIA: secure information aggregation in sensor networks, in
Proceedings of the 1st international conference on Embedded networked sensor systems. 2003, ACM:
Los Angeles, California, USA.
[23] Xiaolong, L., et al., A Key Distribution Scheme Based on Public Key Cryptography for Sensor
Networks, in Computational Intelligence and Security, W. Yuping, C. Yiu-Ming, and L. Hailin,
Editors. 2007, Springer-Verlag. p. 725-732.
[24] Yao, J., A security architecture for wireless sensor networks based-on public key cryptography2009
5th International Conference on Wireless Communications, Networking and Mobile Computing.
2009. 1.
[25] Shih, F., Zhang, M, Towards Supporting Contextual Privacy in Body Sensor Networks for Health
Monitoring Service. W3C Workshop on Privacy and data usage control, 04/05 October 2010
Cambridge (MA).
[26] E. Dawson, J.A., P. Gray, Australasian Journal of Combinatorics 1(1990), pp. 53-65.
[27] Harjito, B., Watermarking Technique based on Linear Feed Back Shift Register ( LFSR), . Seminar
Nasional Konferda ke –9 Himpunan Matematika Wilayah Jateng dan DIY di FMIPA UNS 2003.
[28] O’connor, J., and Roberstson, E,F Andrew nikolaevich Kolmogorof school of mathematics and
Statistics, university of St Andrews, Scotland, 1999.
[29] Koushanfar, F. and M. Potkonjak, Watermarking Technique for Sensor Networks: Foundations and
Applications. Book chapter, in ‘Security in Sensor Networks’, Yang Xiao (ed.), Auerbach
publications 2006.
[30] Wong, J.L., Feng, J, Kirovski, D, Potkonjack M, Security in sensor networks: watermarking
techniques in Wireless sensor networks. 2004. 305.
[31] Cox, I.J., Secure spread spectrum watermarking for multimedia. IEEE transactions on image
processing, 1997. 6(12): p. 1673.
20. 146 Computer Science & Information Technology (CS & IT)
AUTHORS
Bambang Harjito is now as head of computer science department at Mathematics and
Natural Science, Sebelas Maret University Surakarta, Indonesia. He received the master
degree in computer science department at James Cook University in 2000 and He received
PhD in School of information System, Curtin University Perth Australia in 2013.
Vidyasagar Potdar is a Senior Research Fellow working with School of Information
Systems, Curtin Business School, Curtin University, Perth, Western Australia. He received
the Bachelor of Science, Gujrat University, India 2001 and the Master of Informatoin
Technology - University of Newcastle, Australia in 2002 and Doctor of Philosophy - Curtin
University of Technology, Australia 2006. He is the Director of Anti-Spam Research Lab &
Co-Director of Wireless Sensor Network Lab at the School of Information Systems.