首页 > 最新文献

2019 12th CMI Conference on Cybersecurity and Privacy (CMI)最新文献

英文 中文
Towards Formal Methods of IoT Application Layer Protocols 物联网应用层协议的形式化方法
Pub Date : 2019-11-01 DOI: 10.1109/CMI48017.2019.8962139
Katharina Hofer-Schmitz, Branka Stojanović
This paper provides an overview of the application of formal methods for two most commonly used application layer protocols in IoT domain, MQTT and CoAP. Formal methods give the possibility to improve security and are even able to provide security guarantees with respect to a given model. Our research shows, that we can distinguish three formal verification fields for the two protocols, namely qualitative and quantitative analysis, implementations and security properties. A formal verification review of selected protocols is provided in accordance with these fields, used tools and considered properties. Based on that research, a short summary and open challenges are given.
本文概述了物联网领域中最常用的两种应用层协议MQTT和CoAP形式化方法的应用。形式化方法提供了改进安全性的可能性,甚至能够为给定模型提供安全性保证。我们的研究表明,我们可以区分两个协议的三个形式验证领域,即定性和定量分析,实现和安全属性。根据这些领域、使用的工具和考虑的特性,对选定的协议进行正式的验证审查。在此基础上,对该研究进行了简要总结,并提出了一些挑战。
{"title":"Towards Formal Methods of IoT Application Layer Protocols","authors":"Katharina Hofer-Schmitz, Branka Stojanović","doi":"10.1109/CMI48017.2019.8962139","DOIUrl":"https://doi.org/10.1109/CMI48017.2019.8962139","url":null,"abstract":"This paper provides an overview of the application of formal methods for two most commonly used application layer protocols in IoT domain, MQTT and CoAP. Formal methods give the possibility to improve security and are even able to provide security guarantees with respect to a given model. Our research shows, that we can distinguish three formal verification fields for the two protocols, namely qualitative and quantitative analysis, implementations and security properties. A formal verification review of selected protocols is provided in accordance with these fields, used tools and considered properties. Based on that research, a short summary and open challenges are given.","PeriodicalId":142770,"journal":{"name":"2019 12th CMI Conference on Cybersecurity and Privacy (CMI)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116966884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
[Copyright notice] (版权)
Pub Date : 2019-11-01 DOI: 10.1109/cmi48017.2019.8962132
{"title":"[Copyright notice]","authors":"","doi":"10.1109/cmi48017.2019.8962132","DOIUrl":"https://doi.org/10.1109/cmi48017.2019.8962132","url":null,"abstract":"","PeriodicalId":142770,"journal":{"name":"2019 12th CMI Conference on Cybersecurity and Privacy (CMI)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124095751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge-computing enhanced privacy protection for industrial ecosystems in the context of SMEs 边缘计算增强了中小企业环境下工业生态系统的隐私保护
Pub Date : 2019-11-01 DOI: 10.1109/CMI48017.2019.8962138
Alexander Giehl, Peter Schneider, Maximilian Busch, F. Schnoes, Robin Kleinwort, M. Zaeh
The ongoing transformation of the manufacturing landscape introduces new business opportunities for enterprises but also brings new challenges with it. Especially small- and medium-sized companies (SMEs) require an increasing effort to stay competitive. Data produced on the shop-floor can be harnessed to conduct analyses useful to plant operators, e.g., for optimization of production capabilities or for increasing plant security. Therefore, we propose a privacy-preserving edge-computing architecture to facilitate a platform for utilizing such applications. Our approach is motivated by requirements from SMEs in Germany, e.g., protection of intellectual property, and employs suitable privacy models. We demonstrate the viability of the proposed framework by evaluation of uses cases for machine chatter optimization and anomaly detection within plants.
制造业格局的持续转型为企业带来了新的商机,但也带来了新的挑战。特别是中小型企业(SMEs)需要越来越多的努力来保持竞争力。车间产生的数据可以用来进行对工厂操作员有用的分析,例如优化生产能力或提高工厂安全性。因此,我们提出了一种保护隐私的边缘计算架构,以促进利用这些应用程序的平台。我们的方法是由德国中小企业的需求驱动的,例如保护知识产权,并采用合适的隐私模型。我们通过评估机器颤振优化和工厂内异常检测的用例来证明所提出框架的可行性。
{"title":"Edge-computing enhanced privacy protection for industrial ecosystems in the context of SMEs","authors":"Alexander Giehl, Peter Schneider, Maximilian Busch, F. Schnoes, Robin Kleinwort, M. Zaeh","doi":"10.1109/CMI48017.2019.8962138","DOIUrl":"https://doi.org/10.1109/CMI48017.2019.8962138","url":null,"abstract":"The ongoing transformation of the manufacturing landscape introduces new business opportunities for enterprises but also brings new challenges with it. Especially small- and medium-sized companies (SMEs) require an increasing effort to stay competitive. Data produced on the shop-floor can be harnessed to conduct analyses useful to plant operators, e.g., for optimization of production capabilities or for increasing plant security. Therefore, we propose a privacy-preserving edge-computing architecture to facilitate a platform for utilizing such applications. Our approach is motivated by requirements from SMEs in Germany, e.g., protection of intellectual property, and employs suitable privacy models. We demonstrate the viability of the proposed framework by evaluation of uses cases for machine chatter optimization and anomaly detection within plants.","PeriodicalId":142770,"journal":{"name":"2019 12th CMI Conference on Cybersecurity and Privacy (CMI)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115859351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Privacy-Preserving Context Ontology (PPCO) for Smart Connected Toys 智能连接玩具的隐私保护上下文本体(PPCO
Pub Date : 2019-11-01 DOI: 10.1109/CMI48017.2019.8962141
Benjamin Yankson, Farkhund Iqbal, Saiqa Aleem, B. Shah, P. Hung, Anna Priscilla de Albuquerque
Ubiquitous mobile technology like Smart Connected Toys (SCTs) have unique challenges of clearly defining context data elements due to unstructured, consistent, and persistent changes in the environment. SCTs interact with its context to achieve meaningful functionality while maintaining context data privacy. As SCTs become increasingly pervasive, the toys with their built-in features must be aware of and adapt to their changing contexts while providing a sense of privacy and security to contextual data processed to support its use. This paper presents a context profile through SCT Privacy-Preserving Context Ontology (PPCO) and examines the benefits of designing a context data model for SCT privacy goals. Our proposed data context model is an abstract model, which organizes elements of data and standardizes how they relate to one another. It organizes properties of related entries in SCT based on eXtensible Markup Language (XML) to depict and project how the SCT contextual information - related to the SCTs' environment - is assembled and maintained. Ultimately, the PPCO provides a structured description of the SCT context profile necessary to identify needed privacy controls to support SCT privacy goals.
由于环境中的非结构化、一致和持续变化,无处不在的移动技术(如智能连接玩具(sct))面临着清晰定义上下文数据元素的独特挑战。sct与其上下文交互以实现有意义的功能,同时维护上下文数据隐私。随着sct变得越来越普遍,具有内置功能的玩具必须意识到并适应不断变化的上下文,同时为经过处理的上下文数据提供隐私和安全性,以支持其使用。本文通过SCT隐私保护上下文本体(PPCO)提出了一个上下文概要文件,并研究了为SCT隐私目标设计上下文数据模型的好处。我们提出的数据上下文模型是一个抽象模型,它组织数据元素并标准化它们之间的关系。它基于可扩展标记语言(XML)组织SCT中相关条目的属性,以描述和规划SCT上下文信息(与SCT的环境相关)是如何组装和维护的。最后,PPCO提供了SCT上下文概要文件的结构化描述,这些概要文件用于识别支持SCT隐私目标所需的隐私控制。
{"title":"A Privacy-Preserving Context Ontology (PPCO) for Smart Connected Toys","authors":"Benjamin Yankson, Farkhund Iqbal, Saiqa Aleem, B. Shah, P. Hung, Anna Priscilla de Albuquerque","doi":"10.1109/CMI48017.2019.8962141","DOIUrl":"https://doi.org/10.1109/CMI48017.2019.8962141","url":null,"abstract":"Ubiquitous mobile technology like Smart Connected Toys (SCTs) have unique challenges of clearly defining context data elements due to unstructured, consistent, and persistent changes in the environment. SCTs interact with its context to achieve meaningful functionality while maintaining context data privacy. As SCTs become increasingly pervasive, the toys with their built-in features must be aware of and adapt to their changing contexts while providing a sense of privacy and security to contextual data processed to support its use. This paper presents a context profile through SCT Privacy-Preserving Context Ontology (PPCO) and examines the benefits of designing a context data model for SCT privacy goals. Our proposed data context model is an abstract model, which organizes elements of data and standardizes how they relate to one another. It organizes properties of related entries in SCT based on eXtensible Markup Language (XML) to depict and project how the SCT contextual information - related to the SCTs' environment - is assembled and maintained. Ultimately, the PPCO provides a structured description of the SCT context profile necessary to identify needed privacy controls to support SCT privacy goals.","PeriodicalId":142770,"journal":{"name":"2019 12th CMI Conference on Cybersecurity and Privacy (CMI)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125918185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Defying Censorship with Multi-Circuit Tor and Linear Network Coding 用多电路Tor和线性网络编码对抗审查
Pub Date : 2019-07-08 DOI: 10.1109/CMI48017.2019.8962147
Anna Engelmann, A. Jukan
Anonymity networks are an increasingly important part of Internet evolution to providing practical mechanisms to enhance anonymity and security of network users. The best known anonymity network, The Onion Routing (Tor), is not only subject to user deanonymization attacks but also subject to censorship attacks by blocking the public and secret Tor entry routers, e.g., bridges, or by jamming Tor traffic to prevent users to access Tor network. To help further evolution of anonymity networks, we focus in this work on censorship attacks, and propose to enhance the well-known multipath Tor technique with linear network coding (LNC). We analyze anonymity, privacy and censorship success considering different types of adversaries and the amount of honest and compromised components in the Tor and in the underlying network. The results show that LNC can significantly improve the robustness of Tor against censorship and maintain sufficient anonymity and privacy levels.
匿名网络为提高网络用户的匿名性和安全性提供了切实可行的机制,是互联网发展的重要组成部分。最著名的匿名网络洋葱路由(Tor)不仅受到用户去匿名化攻击,而且还受到审查攻击,通过阻止公共和秘密Tor入口路由器,例如桥接器,或通过干扰Tor流量来阻止用户访问Tor网络。为了帮助匿名网络的进一步发展,我们将重点放在审查攻击上,并提出用线性网络编码(LNC)增强著名的多路径Tor技术。我们分析匿名、隐私和审查成功,考虑到不同类型的对手,以及Tor和底层网络中诚实和受损组件的数量。结果表明,LNC可以显著提高Tor对审查的鲁棒性,并保持足够的匿名性和隐私水平。
{"title":"Defying Censorship with Multi-Circuit Tor and Linear Network Coding","authors":"Anna Engelmann, A. Jukan","doi":"10.1109/CMI48017.2019.8962147","DOIUrl":"https://doi.org/10.1109/CMI48017.2019.8962147","url":null,"abstract":"Anonymity networks are an increasingly important part of Internet evolution to providing practical mechanisms to enhance anonymity and security of network users. The best known anonymity network, The Onion Routing (Tor), is not only subject to user deanonymization attacks but also subject to censorship attacks by blocking the public and secret Tor entry routers, e.g., bridges, or by jamming Tor traffic to prevent users to access Tor network. To help further evolution of anonymity networks, we focus in this work on censorship attacks, and propose to enhance the well-known multipath Tor technique with linear network coding (LNC). We analyze anonymity, privacy and censorship success considering different types of adversaries and the amount of honest and compromised components in the Tor and in the underlying network. The results show that LNC can significantly improve the robustness of Tor against censorship and maintain sufficient anonymity and privacy levels.","PeriodicalId":142770,"journal":{"name":"2019 12th CMI Conference on Cybersecurity and Privacy (CMI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124836074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 12th CMI Conference on Cybersecurity and Privacy (CMI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1