The book presents the proceedings of four conferences: The 19th International Conference on Security & Management (SAM'20), The 19th International Conference on Wireless Networks (ICWN'20), The 21st International Conference on Internet Computing & Internet of Things (ICOMP'20), and The 18th International Conference on Embedded Systems, Cyber-physical Systems (ESCS'20). The conferences took place in Las Vegas, NV, USA, July 27-30, 2020. The conferences are part of the larger 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20), which features 20 major tracks. Authors include academics, researchers, professionals, and students.
Presents the proceedings of four conferences as part of the 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20);
Includes the tracks on security & management, wireless networks, internet computing and IoT, and embedded systems as well as cyber-physical systems;
Features papers from SAM’20, ICWN’20, ICOMP’20 and ESCS’20.
Author(s): Kevin Daimi, Hamid R. Arabnia, Leonidas Deligiannidis, Min-Shiang Hwang, Fernando G. Tinetti
Series: Transactions on Computational Science and Computational Intelligence
Publisher: Springer
Year: 2021
Language: English
Pages: 900
City: Cham
Preface
Security and Management
SAM 2020 – Program Committee
Wireless Networks
ICWN 2020 – Program Committee
Internet Computing & IoT
ICOMP 2020 – Program Committee
Embedded Systems, Cyber-physical Systems, & Applications
ESCS 2020 – Program Committee
Contents
Part I Authentication, Biometrics, and Cryptographic Technologies
Statistical Analysis of Prime Number Generators Putting Encryption at Risk
1 Introduction
2 Related Work and Basics
2.1 Deterministic RNG
2.2 Non-deterministic RNG
2.3 Prime Number Generator
2.4 Evaluation of PRNG
3 Statistical Analysis
3.1 Largest and Smallest Prime Numbers
3.2 Mean Value of Prime Numbers
3.3 Standard Deviation of Prime Numbers
3.4 Largest and Smallest Prime Distances
3.5 Maximum Distance
3.6 Mean Value of Prime Distances
3.7 Standard Deviation of Prime Distances
4 Occurrence of Primes Near the Threshold Values
5 Occurrence of Distances Near the Threshold Values
6 Patterns Within Primes
7 Searching for Last Digits
8 Benefits from the Statistics
9 Conclusions
References
Secure Authentication Protocol for Drones in LTE Networks
1 Introduction
2 Related Works
3 LTE Drone Control System
3.1 General System Architecture
3.2 LTE Authentication Protocol
3.3 Security Analysis
4 Proposed Protocol
4.1 Architecture of Proposed Protocol
4.2 Phase of Proposed Protocol
4.3 Security Analysis of Proposed Protocol
5 Formal Analysis
5.1 Protocol Verification Tool : Scyther
5.2 Specification
5.3 Analysis of the Verification Results
6 Conclusion
References
Memorable Password Generation with AES in ECB Mode
1 Introduction
2 Concerns
3 Methodology/Experimental Setup
4 Experiment Results
5 Conclusion
References
A Comprehensive Survey on Fingerprint Liveness Detection Algorithms by Database and Scanner Model
1 Introduction
2 A Brief Review of the LivDet Competition Series
3 The LivDet-2009 Competition Dataset
4 The LivDet-2011 Competition Dataset
5 The LivDet-2013 Competition Dataset
6 The LivDet-2015 Competition Dataset
7 The LivDet-2017 Competition Dataset
8 Traditional Machine Learning Algorithms
9 Performance on Other Datasets
9.1 Performance on ATVS Data by Scanner Type (Capacitive, Optical, and Thermal)
9.2 Performance on Miscellaneous Datasets Using ACE, FAR, and FRR
10 Conclusion
References
Suitability of Voice Recognition Within the IoT Environment
1 Introduction
2 Background
2.1 Filter Bank Analysis
2.2 Linear Predictive Coding [LPC]
3 Related Work
4 Motivation
5 Our Proposed Model
6 Implementation
6.1 Description of the Implementation
6.2 Open Source Software
6.3 Dataset
6.4 Preprocessing
6.5 Feature Extraction
6.6 Voice Model Training/Server Side
6.7 Verification
6.8 Result and Discussion
7 Conclusion
References
Chor-Rivest Knapsack Cryptosystem in a Post-quantum World
1 Introduction
2 Post-quantum Proposals
2.1 Hash-Based Cryptography
2.2 Merkle Trees
2.3 Code-Based Cryptography
2.4 Lattice-Based Cryptography
2.5 Multivariate-Quadratic-Equations Cryptography
2.6 Elliptic-Curve-Isogeny-Based Cryptography
3 Chor-Rivest Knapsack Cryptosystem
3.1 Key Generation System
3.2 Encryption Process
3.3 Decryption Process
3.4 Safe Parameters
3.5 Experimental Results
4 Discussion and Future Work
References
An Effective Tool for Assessing the Composite Vulnerability of Multifactor Authentication Technologies
1 Introduction
2 Related Work
2.1 Prior Research on CVSS
2.2 Prior Research on Multifactor Authentication
3 Problem Statement, Hypothesis, and Research Question
3.1 Problem Statement
3.2 Hypothesis
3.3 Research Question
4 Methodology
4.1 Definitions
4.2 Math Formula for the Aggregation
5 Application Example
5.1 Authentication Factor Vulnerability Summary
5.2 CVSS Metrics Calculations
5.3 CVSS Composite Vulnerability Scores Calculations
6 Conclusion
References
Part II Computer and Network Security and Related Issues
Phishing Prevention Using Defense in Depth
1 Introduction
2 Web Security Gateway
2.1 Web Security Functionality
2.2 Web Security Challenges
3 Email Security Gateway
3.1 Gateway Functionality
3.2 Email Gateway Challenges
4 Security Awareness Training
4.1 Build a Training Plan
4.2 The Human Firewall
4.3 Security Awareness Training Challenges
5 Discussion
6 Conclusion
References
Phishing Detection using Deep Learning
1 Introduction
2 Background
2.1 Definition of Phishing
2.2 Related Work
3 Phishing Detector
4 Results and Analysis
5 Conclusion
References
Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach
1 Introduction
2 Intrusion and Intrusion Detection System
2.1 Intrusion in Mobile Devices
2.2 Intrusion in the Cloud Infrastructure
2.3 Types of IDS
2.4 IDS Detection Method
3 Methodology and Results
3.1 CC-Based IDS Solutions and Frameworks
3.2 MD-Based IDS Solutions and Frameworks
3.3 MCC-Based IDS Solutions and Frameworks
4 Issues Identified in the Review
5 The Proposed Model
5.1 Functional Description of the Model
5.2 System Design Procedures
5.3 Implementation and Evaluation Procedures
6 Conclusion and Future Works
References
Vulnerability of Virtual Private Networks to Web FingerprintingAttack
1 Introduction
2 Background
2.1 Security Protocols in VPN
2.2 VPN Services
2.3 Fingerprinting Approach
3 Related Work
3.1 Web Traffic Classification
3.2 Web Fingerprinting Through Encrypted Communication
3.3 Web Fingerprinting Through Tor Communication
3.4 Web Fingerprinting Through VPN
4 Objective
5 Methodology
6 Data Collection and Setup
6.1 Data Collection for Website Fingerprinting Through VPN
6.2 Data Collection for Web Traffic Classification Through VPN
6.3 Data Setup for Cai Classifier
7 Fingerprinting Techniques
8 Results and Analysis
8.1 Website Fingerprinting Through VPN
8.2 Web Traffic Classification Through VPN
9 Discussion
9.1 Challenges of Data Storage
9.2 Web Browsers Variety
9.3 Diversity of Data Collection Ways
10 Conclusion
References
Intrusion Detection Through Gradient in Digraphs
1 Introduction
2 Background
3 Mathematical Model
4 Simulation Results
5 Conclusion
References
A Practice of Detecting Insider Threats within a Network
1 Introduction
2 Related Work
3 Research Design and Methodology
4 Results and Findings
5 Limitations
6 Conclusion and Future Work
References
Toward Home Area Network Hygiene: Device Classification and Intrusion Detection for Encrypted Communications
1 Introduction
2 Related Work
3 Problem Description
4 Proposed Solution
4.1 PCAP Content Extraction
4.2 Conversation Extraction
4.3 SMOTE
4.4 The Artificial Neural Network
4.5 Boundaries
5 Experiment Design and Results
5.1 The Data
5.2 The Neural Network
5.3 The Results
5.4 Data Error
5.5 Task 1
5.6 Task 2
5.7 Task 3
6 Conclusions and Future Work
References
Part III Security Education, Training, and Related Tools
The Impact of Twenty-first Century Skills and Computing Cognition Cyber Skills on Graduates' Work Readiness in CyberSecurity
1 Background
2 Methodology
2.1 Research Design
2.2 Survey
2.3 Sample and Recruitment
2.4 Data Analysis
3 Significance
4 Conclusion
References
Enhancing the Cybersecurity Education Curricula Through Quantum Computation
1 Introduction
2 Cybersecurity Overview
3 Cybersecurity Educational Model
4 Conclusion
References
CyberCheck.me: A Review of a Small to Medium Enterprise Cyber Security Awareness Program
1 Introduction
1.1 The Background
1.2 CyberCheck.me 2019 and Beyond
2 The CyberCheck.me Engagement Model
2.1 Outreach Sessions Uncover Serious Attacks
3 Survey Results Section
3.1 Survey Demographics
3.2 Business Devices and Access
3.3 Maturity of Wi-Fi Security
3.4 Applied Countermeasures
3.5 Applying Updates
3.6 Backups Often the Last Great Refuge of Clean Data
3.7 Cyber Security Responses, Planning, Maintenance and Insurance for the Lack Thereof
4 Conclusion
References
Part IV Security, Forensics, Management and Applications
A Hybrid AI and Simulation-Based Optimization DSS for Post-Disaster Logistics
1 Introduction
2 Preliminaries
2.1 Humanitarian Logistics
2.2 Information and Decision Making: ERDSS
2.3 Simulation and Data-Driven Modeling
3 ERDSS: Concept and Framework
3.1 Disaster Scenario
3.2 Simulation Model
3.3 Control Tower
3.4 Prediction Algorithm
3.5 Management Cockpit
4 Case Study: Long-Term Disaster Scenario
4.1 Assumptions of This Work
4.2 Model Selected
5 First Results
6 Conclusions and Future Work
References
A Posteriori Access Control with an Administrative Policy
1 Introduction
2 Event Calculus
3 AMABAC
4 Our Proposal
4.1 Getting the Rules that Held at Access Time
4.2 Monitoring Administrative Actions
4.3 Detecting Violations
5 Use Case
6 Implementation
7 Related Work
8 Conclusion and Future Perspectives
References
An Analysis of Applying STIR/SHAKEN to Prevent Robocalls
1 Introduction
2 Authentication of Call Identity
2.1 Session Initiation Protocol (SIP)
2.2 Call Identity
2.3 Encryption of Call Identity
2.4 SHAKEN and Attestation
3 Interworking Between IP and PSTN
3.1 UNI and NNI
3.2 SIP and ISUP Interworking
3.3 SIP as NNI
4 Challenges
4.1 Unprotected IP-PBX
4.2 Unscrupulous ITSP
4.3 Interworking Between SIP and ISUP
5 Conclusions
References
Supervised Learning for Detecting Stealthy False Data Injection Attacks in the Smart Grid
1 Introduction
2 Related Works
3 Stealthy False Data Injection Attacks on State Estimation
3.1 Formulation of State Estimation
3.2 Stealthy FDI Attacks
4 Machine Learning-Based Method
4.1 Data Preprocessing
4.2 Feature Selection
4.3 Individual Classifiers
4.4 Ensemble Classifiers
4.5 Best Performing Models
5 Experiments and Results
5.1 Attack Model
5.2 Simulation and Data Generation
5.3 Data Preprocessing
5.4 Feature Reduction
5.5 Model Training
5.6 Evaluation Metrics
5.7 Discussion of Results
6 Conclusion
References
Vulnerability Analysis of 2500 Docker Hub Images
1 Introduction
2 Preliminaries
2.1 Vulnerability Databases and Categorization Method
3 Docker Hub Vulnerability Landscape
3.1 The Distribution of Vulnerabilities in Each Severity Category
3.2 Central Tendency of the Vulnerability Distribution
3.3 Vulnerabilities in Each Image Type
3.4 Images That Contain the Most Critical Vulnerabilities
3.5 Percentage of Images with Critical and High Vulnerabilities
3.6 The Trend in CVE Vulnerabilities
3.7 Days Since Last Update
4 Correlation Between Image Features and Vulnerabilities
5 The Most Severe Vulnerabilities
5.1 The Most Represented Critical Vulnerabilities
5.2 Vulnerability Characteristics
6 Vulnerabilities in Packages
6.1 The Most Vulnerable Packages
6.2 Vulnerabilities in Popular Packages
7 Conclusions and Future Work
References
Analysis of Conpot and Its BACnet Features for Cyber-Deception
1 Introduction
2 Literature Review
2.1 BACnet
2.2 SCADA Honeypots
2.3 Conpot
3 Research Approach
4 Observations and Results
4.1 Analysis of Conpot's Built-In Templates
4.2 NMAP Scan Discussion
4.3 Conpot's Default bacnet.xml File
5 Conclusions and Future Work
6 Abbreviations
References
Automotive Vehicle Security Metrics
1 Introduction
2 Vehicle Communication
2.1 Intra-vehicle Communication Protocols
2.2 Inter-vehicle Communication Protocols
3 Automotive Vehicle Security
3.1 Automotive Vehicle Threats and Vulnerabilities
3.2 Automotive Vehicle Security Attacks
3.3 Industry and Government Initiatives
4 Automotive Vehicle Security Metrics
4.1 Common Vulnerability Scoring System
4.2 Common Methodology for IT Security Evaluation (CEM) [39]
5 Conclusion and Future Research Directions
References
Requirements for IoT Forensic Models: A Review
1 Introduction
2 Related Work
3 Issues and Challenges in IoT Forensics
4 IoT Forensic Model Requirements
5 Mapping the Requirements to Existing Models
6 Conclusion
References
Mobile Malware Forensic Review: Issues and Challenges
1 Introduction
2 Impact of Malware on the Mobile Industry
3 Mobile Malware Threat and Exposure Analysis
4 Categorizing Mobile Malware
5 Mobile Malware Forensics
6 Efficiency and Effectiveness of Mobile Malware Analysis
7 Mobile Malware Detection Techniques
8 Conclusion
References
The Organizational Cybersecurity Success Factors: An Exhaustive Literature Review
1 Introduction
1.1 Significance and Pragmatic Implications
2 Literature Overview
3 Discussion and Analysis
3.1 Technology
3.1.1 Current Security Technology
3.1.2 Security Usability
3.1.3 Design Process
3.2 Management Procedures
3.3 Organizational Structure
3.3.1 Strategies for Strengthening the Cybersecurity in Organizations and Reducing the Costs of Cyberattacks
3.3.2 Designing a Unified Security Platform to Integrate all Security Tools
3.3.3 Consideration of Insider Threat in the Design of Cybersecurity Systems
3.4 Legal Environment
3.5 Human Factors
3.5.1 Human-Centric Technology Design
3.5.2 Cross-Cultural Technology Design
4 Conclusion and Recommendations for Future Research
References
A Hybrid Recommender System for Cybersecurity Based on a Rating Approach
1 Introduction
2 Theoretical Background
2.1 Cybersecurity Incident
2.2 Recommendation Systems
2.3 Types of Recommendation Systems
2.4 Recommenders Based on Collaborative Filtering
2.5 Knowledge-Based Recommender
3 Research Methodology
4 System Description
4.1 Logical Architecture
4.2 Physical Architecture of the Recommendation System
4.3 User Interface
5 Evaluation
6 Discussion
7 Conclusions
References
Secure Stor: A Novel Hybrid Secure Edge Server Architecture and CDN to Enhance the Security and Response Time for Edge Devices
1 Introduction
2 Architecture and Data Management
2.1 Security Management Controller
3 Real-Time Application Example
4 The Proposed Algorithm of Secure Stor
5 Experimental Results
5.1 Impact of Arrival Edge Device Request and Level of Security
6 Conclusion
References
Leveraging Security Management with Low-Level System Monitoring and Visualization
1 Introduction
2 SMAD Underlying Technologies
3 SMAD System Architecture
3.1 SMAD Module: Anomaly Detection Sensor
3.2 SMAD Module: Monitoring Sensor
3.3 SMAD Module: User Interface
4 SMAD Evaluation
4.1 Stress Testing
4.2 Vulnerability Testing
4.3 Intrusion Testing
5 Conclusion
References
Lightweight Network Steganography for Distributed Electronic Warfare System Communications
1 Introduction
2 Background
2.1 Blackboard Architecture
2.2 Distributed Electronic Warfare System
2.3 Steganography
2.4 Network Steganography
2.5 StegBlocks TCP Method
3 Implementation
3.1 Encoding Scheme
3.2 Scenario
3.3 Client-Side Implementation
3.4 Server-Side Implementation
4 Data Collection
5 Assessment
5.1 Usability
5.2 Versatility
5.3 Applicability
5.4 Undetectability
6 Conclusions and Future Work
References
Security of DBMSs
1 Security of ADABAS
2 Security of Adaptive Server Enterprise
3 Security of Advantage Database Server
4 Security of Datacom
5 Security of FileMaker
6 Security of IDMS
7 Security of Informix Dynamic Server 2000
8 Security of Ingres
9 Security of InterBase
10 Security of InterSystems Caché
11 Security of Microsoft SQL Server
12 Security of MS-Access
References
Static Analysis for Software Reliability and Security
1 Introduction
2 Background
2.1 Software Reliability
2.2 Software Security
2.3 Static Analysis
3 Binary Search Code
3.1 Software Reliability Perspective
3.2 Software Security Perspective
4 Static Analysis and Secure Coding
5 Conclusion
References
Part V Wireless Networks, Novel Technologies and Applications
A Tool for the Analysis of MANET Routing Protocols Based on Abstract State Machines
1 Introduction
2 Related Works
3 Background
3.1 MANET and Routing Protocols
3.2 Abstract State Machines
3.3 ASMETA
4 MOTION
4.1 General Behavior
4.2 Defining the Mobility Model
4.3 The Abstract State Machine-Based Models
4.4 Specific Behavior of the Tool
5 The Empirical Study
6 Conclusions and Future Work
References
A New Real-Time Geolocation Tracking Tool Enhanced with Signal Filtering
1 Introduction
2 Kalman Filter for GPS Data Enhancement
3 Averaging Filter for GPS Data Enhancement
4 Results and Analysis
5 Conclusions
References
A Self-adaptivity Indoor Ranging Algorithm Based on Channel State Information with Weight Gray Prediction Model
1 Introduction
2 Preliminaries
2.1 The Indoor Ranging Model of Channel State Information
2.2 Gray Prediction GM (1,1) Model and Residual Test
3 Methodology
3.1 Indoor Positioning System Architecture
3.2 CSI Ranging Algorithm Based on the Weight Gray Prediction Model
4 Experiments and Performance Evaluation
4.1 Experimental Scenarios
4.2 Performance Evaluation
5 Conclusions and Future Research
References
Autonomous Vehicle Security Model
1 Introduction
2 Autonomous Vehicle Systems Operation Overview
2.1 Perception
2.2 Planning
2.3 Control
3 Autonomous Vehicle Security Architecture
4 Autonomous Vehicle Security Protocol
4.1 Initialization
4.2 S and P Communication
4.3 P and PL Communication
4.4 PL and C Communication
4.5 PL and I Communication
4.6 PL and V Communication
5 Conclusion
References
Wi-Fi Direct Issues and Challenges
1 Introduction
2 Wi-Fi Direct
2.1 Device Discovery
2.2 Service Discovery
2.3 Group Formation
2.4 Power-Saving Schemes
3 Wi-Fi Direct Network Limitations
4 Research Work
4.1 Wi-Fi Direct Intergroup Communications
4.1.1 Discussion
4.2 Single-Group Optimization
4.2.1 Discussion
5 Conclusion
References
RFID Assisted Vehicle Navigation Based on VANETs
1 Introduction
2 Related Works
3 System Model
4 Problem Formulation
4.1 Placement of RFID System
4.2 RFID-enhanced VANET Bellman–Ford Algorithm
4.3 VANET (Vehicular Ad Hoc Network)
5 Simulation
5.1 Simulation Setup
5.2 Experimental Results
6 Conclusions
References
Regular Plans with Differentiated Services Using Cuckoo Algorithm
1 Introduction
2 Model Description
3 Mathematical Analysis
4 Cuckoo Search
5 CSDS
6 ECSDS
7 Simulation
8 Conclusions
References
Using Multimodal Biometrics to Secure Vehicles
1 Introduction
2 Biometric Overview
3 Vehicle Owner Registration
4 Vehicle Security Initialization
5 Drivers' Multimodal Biometrics
6 Vehicle Entrance Multimodal Biometrics
7 Securing Communications
8 Overriding with Passwords and Pins
9 Conclusion
References
Part VI Internet Computing, Internet of Things, and Applications
Per-user Access Control Framework for Link Connectivity and Network Bandwidth
1 Introduction
2 Building Block Technologies
2.1 Software Defined Networking (SDN)
2.2 Public-Key Infrastructure Using X. 509 (PKIX)
3 Proposed Architecture
3.1 Architecture Overview
3.2 Access Control Policy
3.3 Authentication and Authorization Function
3.4 Resource Assignment Function
4 Evaluation
4.1 Experimental Environment
4.2 Evaluation Method
4.3 Result
5 Related Work
6 Conclusion
References
Comparative Study of Hybrid Machine Learning Algorithms for Network Intrusion Detection
1 Introduction
1.1 Background
1.2 Related Work
1.3 Contribution
2 Methodology and Procedure
2.1 Proposed Idea
2.2 Kitsune Dataset
3 Results and Discussion
4 Conclusion and Future Work
References
Unquantize: Overcoming Signal Quantization Effects in IoT Time Series Databases
1 Introduction
2 Methodology
2.1 Overview of Unquantize Methodology
2.2 Testing Signals
2.3 Determine QL in the Signals
2.4 Fourier Decomposition (for QL > 4)
2.5 Bin-Switching Frequency (for QL =≤ 4)
3 Evaluation and Discussions
3.1 Negative Impact of Quantized Signals
3.2 Comparisons of Signal Reproductions between Quantized and Unquantized Signals
3.3 Performance Gains with Unquantized Signals in ML Prognostics
4 Conclusion
References
Information Diffusion Models in Microblogging Networks Based on Hidden Markov Theory and Conditional Random Fields
1 Introduction
2 Proposed Models
2.1 HMT-Based Information Diffusion Model
2.1.1 HMT-Based Mapping
2.1.2 Parameter Estimation
2.2 CRF-Based Multi-information Diffusion Model
2.2.1 CRF-Based Formulation
2.2.2 Feature Functions Definition
2.2.3 Parameter Estimation
3 Network Structure of Models
3.1 Network Features
3.2 Graph Partitioning
4 Experiments Results and Analysis
4.1 Dataset
4.2 Metrics
4.3 Impact Factors Analysis
4.4 Comparisons and Analysis
5 Conclusion
References
ISLSTM: An Intelligent Scheduling Algorithm for Internet of Things
1 Introduction
2 Methodology
2.1 Architecture
2.2 Long-Short Term Memory
2.3 ISLSTM: The Intelligent Scheduling Algorithm
3 Experiment and Test
4 Discussion and Conclusion
References
The Implementation of Application for Comparison and Output of Fine Dust and Public Database Using Fine Dust Sensor
1 Introduction
2 Theory
3 Implementation
4 Test and Result
Dynamic Clustering Method for the Massive IoT System
1 Introduction
2 Static Clustering Method
2.1 Basic Concept
2.2 Problems from the Static Clustering Method
3 Dynamic Clustering Method
3.1 Overview of the Dynamic Clustering Method
3.2 Dynamic Clustering System Control Architecture
4 Design of the Dynamic Clustering System
4.1 Cluster Control Structure
4.2 Cluster Management
4.3 Comparative Evaluation of the Dynamic Clustering Method
5 Conclusion
References
A Network Traffic Reduction Method for a Smart Dust IoT System by Sensor Clustering
1 Introduction
2 Our Earlier Works
3 Network Traffic Reduction Method
4 Experiment
5 Conclusion
References
Part VII Embedded Systems, Cyber-physical Systems, Related Tools, and Applications
On the Development of Low-Cost Autonomous UAVs for Generation of Topographic Maps
1 Introduction
1.1 UAV Development and Navigation
1.2 Environmental Data Acquisition, Processing, and User Interface
2 Related Works
3 Development of a Cost-Efficient, Replicatable UAV
3.1 LiDAR Lite V3
3.2 Raspberry Pi 4
3.3 Ultrasonic Range Sensors
3.4 DC Motors and Propellers
4 UAV Area Coverage Approach
4.1 Obstacle Avoidance and Boustrophedon Cellular Decomposition
5 UAV Navigation Flight Plane
5.1 Calculating Altitude Using the Barometric Sensor
6 Elevational Data Acquisition
6.1 LiDAR Gimbal Development
6.2 Point Cloud Data
7 Data Transfer, Storage, and Usage
8 Conclusions and Future Work
References
Wireless Blind Spot Detection and Embedded Microcontroller
1 Introduction
2 Technical Backgrounds
3 The Proposed Approach
4 Experimental Design
4.1 Ultrasonic Rangefinder: JSN-SR04T
4.2 LCD Display ILI9341
4.3 Receiver Flowchart
5 Results and Discussion
5.1 Receiver
5.2 Sensor
5.3 Wireless Charging Tray
6 Operational Results and Testing
7 Conclusion
References
BumpChat: A Secure Mobile Communication System
1 Introduction
2 Architecture
2.1 Client Database
2.2 Server Database
3 Communication Structures
3.1 Direct Client–Client Communication Over NFC
3.2 Client–Server Communication
4 Implementation
4.1 Server Overview
4.2 Server API Endpoints
4.3 Android Client Overview
4.4 Master Password Setup (Activity)
4.5 Database Unlock/Login (Activity)
4.6 Message Inbox (Activity)
4.7 Contact Creation
4.8 Message List (Activity)
4.9 Contact Edit (Activity)
5 Conclusion
References
Data Collection and Generation for Radio Frequency Signal Security
1 Introduction
1.1 Chapter Organization
2 RF Signal Communication
3 Security
3.1 UAS Security
3.2 RF Signal Attacks
3.3 Security Enhancements Through Machine Learning
4 Data Collection and Generation
4.1 Methodology
4.2 Equipment Setup
4.3 Dataset Attributes and Descriptions
4.4 Dataset Snapshots
5 Machine Learning
5.1 Preliminary Results
6 Conclusion and Future Research Directions
References
Real-Time Operating Systems: Course Development
1 Introduction
2 Operating System Fundamentals
2.1 What Makes an Operating System Real-Time?
2.2 Soft Versus Hard Real-Time Operating Systems
2.3 Real-Time-Specific Functions
2.4 Threads and Tasks
3 FreeRTOS
3.1 Co-routines
3.2 Arduino
3.3 Raspberry Pi
4 RT Linux
4.1 Multi-Environment Real Time
4.2 Building a Kernel
4.3 Pre-patched Kernels
4.4 Consistency
4.5 Dual Function
4.6 Installing RT Linux
5 RT Linux Scheduling
5.1 SCHED_OTHER
5.2 SCHED_FIFO
5.3 SCHED_RR
5.4 SCHED_DEADLINE
6 Scheduling Algorithms
6.1 Priority-Based Scheduling
6.2 Rate Monotonic Scheduling
6.3 Earliest Deadline First
6.4 Overview
7 Benchmarking and Results
7.1 Primitive Stress Testing
7.2 Adding More Threads
7.3 Restricting to One Core
7.4 First-in First-out Scheduling
7.5 Round-Robin Scheduling
7.6 Default Scheduling
7.7 Comparison
7.8 Deadline Testing
8 Demonstration
8.1 Course Background
8.2 Interactive Examples
8.3 Installation Documentation
References
Piano Player with Embedded Microcontrollers
1 Introduction
2 System Specifications Overview
3 Technical Approach
4 Testing Approach
5 Final Product/Project Results
6 Conclusions and Final Remarks
References
Software-Defined Global Navigation Satellite Systems and Resilient Navigation for Embedded Automation
1 Virtualization and Navigation Systems
2 Software-Defined Dual-Frequency GNSS
3 Inertial Navigation Systems and Inertial Measurement Unit Processing
4 Software-Defined Navigation: The Multi-PNT Integration and Estimation Framework
5 Relative Navigation
6 Results and Summary
References
Smart Automation of an Integrated Water System
1 Introduction
2 System Development Methodology
2.1 Collection/Generation Side
2.1.1 Mechanical System
2.1.2 Electrical System
2.2 Delivery/Consumption Side
2.2.1 Mechanical System
2.2.2 Electrical System
3 Results
3.1 Collection/Generation Side
3.1.1 Mechanical System
3.1.2 Electrical System
3.2 Delivery/Consumption Side
3.2.1 Mechanical System
3.2.2 Electrical System
4 Discussion and Conclusion
References
Quadratic Integer Programming Approach for Reliability Optimization of Cyber-Physical Systems Under Uncertainty Theory
1 Introduction
2 Related Work
3 Uncertainty Model
3.1 Problem Setup
3.2 Optimization Problem Metrics
3.3 Optimization Problem Formulation
4 Research Contribution: Solution with 0–1 Quadratic Integer Programming Heuristic
5 Preliminary Results
6 Conclusion
References
Brief Review of Low-Power GPU Techniques
1 Introduction
2 Understanding the GPU Architecture
3 Background
3.1 Power Consumption – An Overview
3.2 GPU Power Analysis and Breakdown
4 Common Low-Power Techniques
4.1 DVFS
4.2 Clock and Power Gating
5 Advancements in Low-Power Architecture Design
6 Conclusions and Future Work
References
Ethical Issues of the Use of AI in Healthcare
1 The Use of Artificial Intelligence in Healthcare
2 Ethical Issues Related to the Use of AI in Healthcare
3 Legal Issues Related to the Use of AI in Healthcare
4 Solutions to Ethical Dilemmas Resulting from Using AI in Healthcare
References
Index