首页 > 最新文献

2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)最新文献

英文 中文
CliMBOS: A Modular NFV Cloud Backend for the Internet of Things CliMBOS:面向物联网的模块化NFV云后端
Massimo Gallo, S. Ghamri-Doudane, Fabio Pianese
The emergence of the Internet of Things (IoT) as an increasingly pervasive influx of connected devices into people's everyday lives calls for an appropriate level of support by the network. Considering societal issues related to the data produced by IoT devices such as privacy and data ownership, together with technical issues of confidentiality, isolation, and scalability of the IoT server infrastructure, we observe that the present cloud computing model based on large-scale consolidated databases and services may not be universally applicable. In this paper we make a case for supporting IoT backends via network function virtualization (NFV) as a way to better align user privacy needs with the strong technical guarantees that purpose-built virtualized network functions can provide.
随着越来越多的连接设备进入人们的日常生活,物联网(IoT)的出现要求网络提供适当水平的支持。考虑到与物联网设备产生的数据相关的社会问题,如隐私和数据所有权,以及物联网服务器基础设施的保密性、隔离性和可扩展性等技术问题,我们认为,目前基于大规模整合数据库和服务的云计算模型可能并不普遍适用。在本文中,我们通过网络功能虚拟化(NFV)来支持物联网后端,作为一种更好地将用户隐私需求与专用虚拟化网络功能可以提供的强大技术保证结合起来的方法。
{"title":"CliMBOS: A Modular NFV Cloud Backend for the Internet of Things","authors":"Massimo Gallo, S. Ghamri-Doudane, Fabio Pianese","doi":"10.1109/NTMS.2018.8328684","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328684","url":null,"abstract":"The emergence of the Internet of Things (IoT) as an increasingly pervasive influx of connected devices into people's everyday lives calls for an appropriate level of support by the network. Considering societal issues related to the data produced by IoT devices such as privacy and data ownership, together with technical issues of confidentiality, isolation, and scalability of the IoT server infrastructure, we observe that the present cloud computing model based on large-scale consolidated databases and services may not be universally applicable. In this paper we make a case for supporting IoT backends via network function virtualization (NFV) as a way to better align user privacy needs with the strong technical guarantees that purpose-built virtualized network functions can provide.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121201792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
In-Store Payments Using Bitcoin 使用比特币进行店内支付
Mikael Asplund, Jakob Lovhall, S. Nadjm-Tehrani
The possibility of in-store payments would further increase the potential usefulness of cryptocurrencies. However, this would require much faster transaction verification than current solutions provide (one hour for Bitcoin) since customers are likely not prepared to wait a very long time for their purchase to be accepted by a store. We propose a solution for enabling in-store payments with waiting times in the order of a few seconds, which is still compatible with the current Bitcoin protocol. The idea is based on a payment card in combination with a protocol for ensuring that losing a card does not mean losing the money on it. We analyse the required transaction verification delay and also the potentially added risks that the solution brings compared to current systems.
店内支付的可能性将进一步增加加密货币的潜在用途。然而,这将需要比当前解决方案提供的更快的交易验证(比特币一小时),因为客户可能不准备等待很长时间才能被商店接受。我们提出了一种解决方案,可以在几秒钟的时间内实现店内支付,这仍然与当前的比特币协议兼容。这个想法是基于一张支付卡,并结合一种协议,以确保丢失卡并不意味着丢失卡上的钱。我们分析了所需的交易验证延迟,以及与当前系统相比,该解决方案带来的潜在附加风险。
{"title":"In-Store Payments Using Bitcoin","authors":"Mikael Asplund, Jakob Lovhall, S. Nadjm-Tehrani","doi":"10.1109/NTMS.2018.8328738","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328738","url":null,"abstract":"The possibility of in-store payments would further increase the potential usefulness of cryptocurrencies. However, this would require much faster transaction verification than current solutions provide (one hour for Bitcoin) since customers are likely not prepared to wait a very long time for their purchase to be accepted by a store. We propose a solution for enabling in-store payments with waiting times in the order of a few seconds, which is still compatible with the current Bitcoin protocol. The idea is based on a payment card in combination with a protocol for ensuring that losing a card does not mean losing the money on it. We analyse the required transaction verification delay and also the potentially added risks that the solution brings compared to current systems.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"465 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115629141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Oblivious Transfer Protocols Based on Commutative Encryption 基于交换加密的无关传输协议
Jen-Chieh Hsu, R. Tso, Yu-Chi Chen, Mu-En Wu
Oblivious transfer (OT) protocol is a fundamental building block of cryptography and can be applied widely in many fields. A secure oblivious transfer protocol is supposed to ensure the privacy of both senders and receivers. The privacy of receivers means that the information being selected by receivers would never be revealed to senders. On the other hand, the privacy of senders means that receivers have no further information except for the one that has been selected. In this case, senders are able to deceive receivers by sending same messages. Likewise, in existing 1-out-of-n OT protocols, malicious senders can make all the n messages the same, so that receivers will always get the specific one assigned by senders. This indicates that privacy of receivers wouldnt work under the 1-out-of-n OT protocol. To prevent this kind of attack, this paper provides a general framework on how to design a secure OT protocol based on commutative and ciphertext equality test and take RSA as an example to explain how the protocol is processed.
遗忘传输(OT)协议是密码学的基本组成部分,在许多领域有着广泛的应用。安全无关传输协议应该确保发送方和接收方的隐私。接收方的隐私性意味着接收方选择的信息永远不会泄露给发送方。另一方面,发送者的隐私意味着接收者除了已选择的信息之外没有其他信息。在这种情况下,发送方可以通过发送相同的消息来欺骗接收方。同样,在现有的1 / n OT协议中,恶意的发送方可以使所有n条消息都相同,因此接收方总是得到发送方分配的特定消息。这表明接收者的隐私在1-out- n OT协议下无法工作。为了防止这种攻击,本文提供了一个基于交换和密文相等性检验的安全OT协议设计的一般框架,并以RSA为例说明了协议的处理过程。
{"title":"Oblivious Transfer Protocols Based on Commutative Encryption","authors":"Jen-Chieh Hsu, R. Tso, Yu-Chi Chen, Mu-En Wu","doi":"10.1109/NTMS.2018.8328707","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328707","url":null,"abstract":"Oblivious transfer (OT) protocol is a fundamental building block of cryptography and can be applied widely in many fields. A secure oblivious transfer protocol is supposed to ensure the privacy of both senders and receivers. The privacy of receivers means that the information being selected by receivers would never be revealed to senders. On the other hand, the privacy of senders means that receivers have no further information except for the one that has been selected. In this case, senders are able to deceive receivers by sending same messages. Likewise, in existing 1-out-of-n OT protocols, malicious senders can make all the n messages the same, so that receivers will always get the specific one assigned by senders. This indicates that privacy of receivers wouldnt work under the 1-out-of-n OT protocol. To prevent this kind of attack, this paper provides a general framework on how to design a secure OT protocol based on commutative and ciphertext equality test and take RSA as an example to explain how the protocol is processed.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115740466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Star Projection Technologies in the Modern Planetarium Industry 现代天文馆产业中的恒星投影技术
A. Adli
Star projection was always the central part of planetarium since the first planetarium opened its doors to the public in 1923. Since then a lot of things changes, and new technologies become available with the digital planetariums and their advantages. We will briefly describe some of these technologies and the industry possible future trends.
自1923年第一座天文馆向公众开放以来,星体投影一直是天文馆的核心部分。从那时起,很多事情都发生了变化,随着数字天文馆及其优势,新技术变得可用。我们将简要介绍其中的一些技术和行业可能的未来趋势。
{"title":"Star Projection Technologies in the Modern Planetarium Industry","authors":"A. Adli","doi":"10.1109/NTMS.2018.8328730","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328730","url":null,"abstract":"Star projection was always the central part of planetarium since the first planetarium opened its doors to the public in 1923. Since then a lot of things changes, and new technologies become available with the digital planetariums and their advantages. We will briefly describe some of these technologies and the industry possible future trends.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114374812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Addressing Security in OCPP: Protection Against Man-in-the-Middle Attacks 解决OCPP中的安全问题:防止中间人攻击
J. E. Rubio, Cristina Alcaraz, Javier López
The Open Charge Point Protocol (OCPP) is a communication standard for the exchange of data between a Charge Point (CP) and the Central Server (CS) in the electric vehicle domain. This protocol is envisioned to offer interoperability between the different manufacturers of charging points, network systems and IT back-end vendors. However, the current version of the specification is quite vague in terms of handling security and privacy, which results in a set of non-addressed threats, which we look at in this paper. Specifically, this paper focuses on Man-in-the-Middle attacks between the CP and the CS that may expose sensitive data of special interest to the various stake-holders involved in this context. As a counter-measure, we present a feasible solution and assess its behaviour in a simulator. The inclusion of additional security mechanisms is also studied, in compliance with the IEC 62351 standard.
开放充电点协议(OCPP)是电动汽车领域充电点(CP)与中央服务器(CS)之间数据交换的通信标准。该协议旨在为不同的充电点制造商、网络系统和IT后端供应商之间提供互操作性。然而,规范的当前版本在处理安全和隐私方面相当模糊,这导致了一系列未解决的威胁,我们将在本文中讨论这些威胁。具体来说,本文关注的是CP和CS之间的中间人攻击,这种攻击可能会将特殊利益的敏感数据暴露给这种情况下涉及的各种利益相关者。作为应对措施,我们提出了一个可行的解决方案,并在模拟器中评估了其行为。还研究了符合IEC 62351标准的附加安全机制。
{"title":"Addressing Security in OCPP: Protection Against Man-in-the-Middle Attacks","authors":"J. E. Rubio, Cristina Alcaraz, Javier López","doi":"10.1109/NTMS.2018.8328675","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328675","url":null,"abstract":"The Open Charge Point Protocol (OCPP) is a communication standard for the exchange of data between a Charge Point (CP) and the Central Server (CS) in the electric vehicle domain. This protocol is envisioned to offer interoperability between the different manufacturers of charging points, network systems and IT back-end vendors. However, the current version of the specification is quite vague in terms of handling security and privacy, which results in a set of non-addressed threats, which we look at in this paper. Specifically, this paper focuses on Man-in-the-Middle attacks between the CP and the CS that may expose sensitive data of special interest to the various stake-holders involved in this context. As a counter-measure, we present a feasible solution and assess its behaviour in a simulator. The inclusion of additional security mechanisms is also studied, in compliance with the IEC 62351 standard.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114869986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Wireless Vital Signal Tracking for Drivers Using Micro-Doppler Seatback Radar 基于微多普勒椅背雷达的驾驶员生命信号无线跟踪
Dong Kyoo Kim
This study presents wireless vital signal tracking results of multi-carrier micro-Doppler radar installed in driver's seatback, which can be used to develop new e-healthcare services of smart cars in the future. The multi-carrier micro-Doppler radar utilize multiple frequencies to measure driver's vital signal in order to overcome the measurement deterioration by unwanted radar and radar movement. The method is briefly described in this paper. To evaluate the performance of the method for the driver's vital signal tracking, we installed the radar into driver's seatback in an automobile. In some scenarios, driver's heartbeat and respiration rate are measured in the automobile. We present the experiment setup and results for four volunteers' measurement data. The results show that the heartbeat rate tracking performance of the driver's seatback radar is better than the respiration tracking.
本研究展示了安装在驾驶员座椅靠背上的多载波微多普勒雷达的无线生命信号跟踪结果,可用于未来智能汽车新型电子医疗服务的开发。多载波微多普勒雷达利用多频测量驾驶员的生命信号,克服了雷达干扰和雷达运动对测量结果的影响。本文简要介绍了该方法。为了评估该方法对驾驶员生命信号跟踪的性能,我们将雷达安装在汽车驾驶员座椅靠背上。在某些情况下,驾驶员的心跳和呼吸频率是在汽车中测量的。本文介绍了四名志愿者测量数据的实验设置和结果。结果表明,驾驶员座椅靠背雷达的心率跟踪性能优于呼吸跟踪。
{"title":"Wireless Vital Signal Tracking for Drivers Using Micro-Doppler Seatback Radar","authors":"Dong Kyoo Kim","doi":"10.1109/NTMS.2018.8328724","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328724","url":null,"abstract":"This study presents wireless vital signal tracking results of multi-carrier micro-Doppler radar installed in driver's seatback, which can be used to develop new e-healthcare services of smart cars in the future. The multi-carrier micro-Doppler radar utilize multiple frequencies to measure driver's vital signal in order to overcome the measurement deterioration by unwanted radar and radar movement. The method is briefly described in this paper. To evaluate the performance of the method for the driver's vital signal tracking, we installed the radar into driver's seatback in an automobile. In some scenarios, driver's heartbeat and respiration rate are measured in the automobile. We present the experiment setup and results for four volunteers' measurement data. The results show that the heartbeat rate tracking performance of the driver's seatback radar is better than the respiration tracking.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122856210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Classification of Unknown Web Sites Based on Yearly Changes of Distribution Information of Malicious IP Addresses 基于恶意IP地址分布信息年变化的未知网站分类
Yoshitaka Nakamura, Shihori Kanazawa, H. Inamura, Osamu Takahashi
Recently, cyber attacks through Web sites such as Drive-by download attacks or phishing attacks are increasing rapidly. The attackers can illegally acquire personal information of users by these attacks and cause economical damages. We aim to detect malicious Web sites which cause economic damages. The analysis of the features of the network address part of the IP address revealed that the features of malicious IP address has time change. Therefore, reflecting the time changes of these features, we classified unknown malicious Web sites. As a result of the evaluation experiment, classification accuracy could be improved.
最近,通过“Drive-by下载攻击”或“钓鱼攻击”等网站进行的网络攻击正在迅速增加。攻击者可以通过这些攻击非法获取用户的个人信息,并造成经济损失。我们的目标是检测造成经济损失的恶意网站。通过对IP地址中网络地址部分的特征分析,可以发现恶意IP地址的特征是随时间变化的。因此,我们根据这些特征的时间变化,对未知恶意网站进行分类。通过评价实验,可以提高分类精度。
{"title":"Classification of Unknown Web Sites Based on Yearly Changes of Distribution Information of Malicious IP Addresses","authors":"Yoshitaka Nakamura, Shihori Kanazawa, H. Inamura, Osamu Takahashi","doi":"10.1109/NTMS.2018.8328683","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328683","url":null,"abstract":"Recently, cyber attacks through Web sites such as Drive-by download attacks or phishing attacks are increasing rapidly. The attackers can illegally acquire personal information of users by these attacks and cause economical damages. We aim to detect malicious Web sites which cause economic damages. The analysis of the features of the network address part of the IP address revealed that the features of malicious IP address has time change. Therefore, reflecting the time changes of these features, we classified unknown malicious Web sites. As a result of the evaluation experiment, classification accuracy could be improved.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129848763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data 外包加密数据不需要查询转换的高效多用户可搜索加密方案
D. Rao, D. S. Kumar, P. S. Thilagam
Searchable Encryption (SE) schemes provide security and privacy to the cloud data. The existing SE approaches enable multiple users to perform search operation by using various schemes like Broadcast Encryption (BE), Attribute-Based Encryption (ABE), etc. However, these schemes do not allow multiple users to perform the search operation over the encrypted data of multiple owners. Some SE schemes involve a Proxy Server (PS) that allow multiple users to perform the search operation. However, these approaches incur huge computational burden on PS due to the repeated encryption of the user queries for transformation purpose so as to ensure that users' query is searchable over the encrypted data of multiple owners. Hence, to eliminate this computational burden on PS, this paper proposes a secure proxy server approach that performs the search operation without transforming the user queries. This approach also returns the top-k relevant documents to the user queries by using Euclidean distance similarity approach. Based on the experimental study, this approach is efficient with respect to search time and accuracy.
可搜索加密(SE)方案为云数据提供安全性和隐私性。现有的搜索引擎方法通过使用广播加密(BE)、基于属性的加密(ABE)等多种方案,使多个用户能够执行搜索操作。但是,这些方案不允许多个用户对多个所有者的加密数据执行搜索操作。一些SE方案涉及一个允许多个用户执行搜索操作的代理服务器(PS)。但是,为了保证用户的查询在多个所有者的加密数据上是可搜索的,为了进行转换,这些方法需要对用户查询进行多次加密,这给PS带来了巨大的计算负担。因此,为了消除PS的计算负担,本文提出了一种安全代理服务器方法,该方法在不转换用户查询的情况下执行搜索操作。该方法还使用欧几里得距离相似度方法返回用户查询的top-k相关文档。实验研究表明,该方法在搜索时间和搜索精度方面都是有效的。
{"title":"An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data","authors":"D. Rao, D. S. Kumar, P. S. Thilagam","doi":"10.1109/NTMS.2018.8328677","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328677","url":null,"abstract":"Searchable Encryption (SE) schemes provide security and privacy to the cloud data. The existing SE approaches enable multiple users to perform search operation by using various schemes like Broadcast Encryption (BE), Attribute-Based Encryption (ABE), etc. However, these schemes do not allow multiple users to perform the search operation over the encrypted data of multiple owners. Some SE schemes involve a Proxy Server (PS) that allow multiple users to perform the search operation. However, these approaches incur huge computational burden on PS due to the repeated encryption of the user queries for transformation purpose so as to ensure that users' query is searchable over the encrypted data of multiple owners. Hence, to eliminate this computational burden on PS, this paper proposes a secure proxy server approach that performs the search operation without transforming the user queries. This approach also returns the top-k relevant documents to the user queries by using Euclidean distance similarity approach. Based on the experimental study, this approach is efficient with respect to search time and accuracy.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128802407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Penetration and Security of OpenSSH Remote Secure Shell Service on Raspberry Pi 2 OpenSSH远程安全外壳服务在树莓派2上的渗透与安全性
Hesham H. Alsaadi, M. Aldwairi, May Al Taei, Mansoor AlBuainain, Maktoom AlKubaisi
This research presents a penetration testing approach to help secure OpenSSH service on Raspberry Pi 2. The study discusses a technique for penetrating Debian v7.1p2, installed on Raspberry Pi 2, using Kali Linux. We exploit the vulnerability found in SSH protocol exchange keys, which causes multiple CRLF injections in Raspberry Pi 2 Model B, allowing remote authenticated users to bypass intended shell-command restrictions via well crafted X11 data forwarding. We propose an innovative security model to solve the issues of allowing remote authentication access using SSH protocol exchange keys without affecting the encrypted protocols transmissions. We conclude with recommendations on how to securely mitigate MITM attacks using our secure proposed model.
本研究提出了一种渗透测试方法来帮助确保Raspberry Pi 2上OpenSSH服务的安全。该研究讨论了一种使用Kali Linux渗透安装在Raspberry Pi 2上的Debian v7.1p2的技术。我们利用在SSH协议交换密钥中发现的漏洞,该漏洞导致Raspberry Pi 2 Model B中的多个CRLF注入,允许远程认证用户通过精心制作的X11数据转发绕过预期的shell命令限制。我们提出了一种创新的安全模型来解决使用SSH协议交换密钥允许远程身份验证访问而不影响加密协议传输的问题。最后,我们就如何使用我们建议的安全模型安全地减轻MITM攻击提出了建议。
{"title":"Penetration and Security of OpenSSH Remote Secure Shell Service on Raspberry Pi 2","authors":"Hesham H. Alsaadi, M. Aldwairi, May Al Taei, Mansoor AlBuainain, Maktoom AlKubaisi","doi":"10.1109/NTMS.2018.8328710","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328710","url":null,"abstract":"This research presents a penetration testing approach to help secure OpenSSH service on Raspberry Pi 2. The study discusses a technique for penetrating Debian v7.1p2, installed on Raspberry Pi 2, using Kali Linux. We exploit the vulnerability found in SSH protocol exchange keys, which causes multiple CRLF injections in Raspberry Pi 2 Model B, allowing remote authenticated users to bypass intended shell-command restrictions via well crafted X11 data forwarding. We propose an innovative security model to solve the issues of allowing remote authentication access using SSH protocol exchange keys without affecting the encrypted protocols transmissions. We conclude with recommendations on how to securely mitigate MITM attacks using our secure proposed model.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116745842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Evolving AL-FEC Application Towards 5G NGMN 演进AL-FEC在5G NGMN中的应用
C. Bouras, N. Kanakis
The fifth generation of mobile technology (5G) is positioned to address the demands and business contexts of 2020 and beyond. Therefore, in 5G, there is a need to push the envelope of performance to provide, where needed, for example, much greater throughput, much lower latency, ultra-high reliability, much higher connectivity density, and higher mobility range. A crucial point in the effective provisioning of 5G Next Generation Mobile Networks (NGMN) lies in the efficient error control and in more details in the utilization of Forward Error Correction (FEC) codes on the application layer. FEC is a method for error control of data transmission adopted in several mobile multicast standards. FEC is a feedback free error recovery method where the sender introduces redundant data in advance with the source data enabling the recipient to recover from different arbitrary packet losses. Recently, the adoption of FEC error control method has been boosted by the introduction of powerful Application Layer FEC (AL-FEC) codes. Furthermore, several works have emerged aiming to address the efficient application of ALFEC protection introducing deterministic or randomized online algorithms. In this work we propose a novel AL-FEC scheme based on online algorithms forced by the well stated AL-FEC policy online problem. We present an algorithm which exploits feedback capabilities of the mobile users regarding the outcome of a transmission, and adapts the introduced protection respectively. Moreover, we provide an extensive analysis of the proposed ALFEC algorithm accompanied by a performance evaluation against common error protection schemes.
第五代移动技术(5G)旨在满足2020年及以后的需求和业务环境。因此,在5G中,需要突破性能极限,在需要的地方提供更大的吞吐量、更低的延迟、超高的可靠性、更高的连接密度和更高的移动范围。有效提供5G下一代移动网络(NGMN)的关键在于有效的错误控制,更具体地说是在应用层使用前向纠错(Forward error Correction, FEC)码。FEC是多种移动组播标准中采用的一种数据传输错误控制方法。FEC是一种无反馈错误恢复方法,发送方预先引入冗余数据与源数据,使接收方能够从不同的任意数据包丢失中恢复。近年来,强大的应用层FEC (AL-FEC)码的引入促进了FEC误差控制方法的采用。此外,已经出现了一些旨在解决引入确定性或随机在线算法的ALFEC保护的有效应用的工作。在这项工作中,我们提出了一种新的基于在线算法的AL-FEC方案,该算法是由明确的AL-FEC策略在线问题所强制的。我们提出了一种利用移动用户对传输结果的反馈能力的算法,并分别适应所引入的保护。此外,我们对所提出的ALFEC算法进行了广泛的分析,并对常见的错误保护方案进行了性能评估。
{"title":"Evolving AL-FEC Application Towards 5G NGMN","authors":"C. Bouras, N. Kanakis","doi":"10.1109/NTMS.2018.8328691","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328691","url":null,"abstract":"The fifth generation of mobile technology (5G) is positioned to address the demands and business contexts of 2020 and beyond. Therefore, in 5G, there is a need to push the envelope of performance to provide, where needed, for example, much greater throughput, much lower latency, ultra-high reliability, much higher connectivity density, and higher mobility range. A crucial point in the effective provisioning of 5G Next Generation Mobile Networks (NGMN) lies in the efficient error control and in more details in the utilization of Forward Error Correction (FEC) codes on the application layer. FEC is a method for error control of data transmission adopted in several mobile multicast standards. FEC is a feedback free error recovery method where the sender introduces redundant data in advance with the source data enabling the recipient to recover from different arbitrary packet losses. Recently, the adoption of FEC error control method has been boosted by the introduction of powerful Application Layer FEC (AL-FEC) codes. Furthermore, several works have emerged aiming to address the efficient application of ALFEC protection introducing deterministic or randomized online algorithms. In this work we propose a novel AL-FEC scheme based on online algorithms forced by the well stated AL-FEC policy online problem. We present an algorithm which exploits feedback capabilities of the mobile users regarding the outcome of a transmission, and adapts the introduced protection respectively. Moreover, we provide an extensive analysis of the proposed ALFEC algorithm accompanied by a performance evaluation against common error protection schemes.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128404847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1