Pub Date : 2023-10-02DOI: 10.1109/lcn58197.2023.10223363
Abdelhamid Garah, Nader Mbarek, Sergey Kirgizov
{"title":"Decision Tree-Based Confidentiality Self-Management in the Internet of Things","authors":"Abdelhamid Garah, Nader Mbarek, Sergey Kirgizov","doi":"10.1109/lcn58197.2023.10223363","DOIUrl":"https://doi.org/10.1109/lcn58197.2023.10223363","url":null,"abstract":"","PeriodicalId":178458,"journal":{"name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125079657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-02DOI: 10.1109/lcn58197.2023.10223376
Amirahmad Chapnevis, E. Bulut
{"title":"AoI-Optimal Cellular-Connected UAV Trajectory Planning for IoT Data Collection","authors":"Amirahmad Chapnevis, E. Bulut","doi":"10.1109/lcn58197.2023.10223376","DOIUrl":"https://doi.org/10.1109/lcn58197.2023.10223376","url":null,"abstract":"","PeriodicalId":178458,"journal":{"name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123216798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-02DOI: 10.1109/lcn58197.2023.10223338
Giulio Meucci, B. Karahoda, A. Oveis, Francesco Mancuso, Edmond Jajaga, Alessandro Cantelli-Forti
{"title":"Naval Cybersecurity in the Age of AI: deceptive ISAR Images Generation with GANs","authors":"Giulio Meucci, B. Karahoda, A. Oveis, Francesco Mancuso, Edmond Jajaga, Alessandro Cantelli-Forti","doi":"10.1109/lcn58197.2023.10223338","DOIUrl":"https://doi.org/10.1109/lcn58197.2023.10223338","url":null,"abstract":"","PeriodicalId":178458,"journal":{"name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123471115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-02DOI: 10.1109/lcn58197.2023.10223367
Aya Jaradat, M. Mowafi, E. Taqieddin
{"title":"A Steganographic Method for Color Images using the Salp Swarm Algorithm and Chaotic Maps","authors":"Aya Jaradat, M. Mowafi, E. Taqieddin","doi":"10.1109/lcn58197.2023.10223367","DOIUrl":"https://doi.org/10.1109/lcn58197.2023.10223367","url":null,"abstract":"","PeriodicalId":178458,"journal":{"name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129807497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-02DOI: 10.1109/lcn58197.2023.10223384
Eric Wagner, †. NilsRothaug, Konrad Wolsing, L. Bader, Klaus Wehrle, Martin Henze, Cyber Analysis, Fraunhofer Defense, Fkie
—Industrial networks become increasingly interconnected, which opens the floodgates for cyberattacks on legacy networks designed without security in mind. Consequently, the vast landscape of legacy industrial communication protocols urgently demands a universal solution to integrate security features retroactively. However, current proposals are hardly adaptable to new scenarios and protocols, even though most industrial protocols share a common theme: Due to their progressive development, previously important legacy features became irrelevant and resulting unused protocol fields now offer a unique opportunity for retrofitting security. Our analysis of three prominent protocols shows that headers offer between 36 and 63 bits of unused space. To take advantage of this space, we designed the REtrofittable ProtEction Library (RePeL), which supports embedding authentication tags into arbitrary combinations of unused header fields. We show that RePeL incurs negligible overhead beyond the cryptographic processing, which can be adapted to hit performance targets or fulfill legal requirements.
{"title":"Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols","authors":"Eric Wagner, †. NilsRothaug, Konrad Wolsing, L. Bader, Klaus Wehrle, Martin Henze, Cyber Analysis, Fraunhofer Defense, Fkie","doi":"10.1109/lcn58197.2023.10223384","DOIUrl":"https://doi.org/10.1109/lcn58197.2023.10223384","url":null,"abstract":"—Industrial networks become increasingly interconnected, which opens the floodgates for cyberattacks on legacy networks designed without security in mind. Consequently, the vast landscape of legacy industrial communication protocols urgently demands a universal solution to integrate security features retroactively. However, current proposals are hardly adaptable to new scenarios and protocols, even though most industrial protocols share a common theme: Due to their progressive development, previously important legacy features became irrelevant and resulting unused protocol fields now offer a unique opportunity for retrofitting security. Our analysis of three prominent protocols shows that headers offer between 36 and 63 bits of unused space. To take advantage of this space, we designed the REtrofittable ProtEction Library (RePeL), which supports embedding authentication tags into arbitrary combinations of unused header fields. We show that RePeL incurs negligible overhead beyond the cryptographic processing, which can be adapted to hit performance targets or fulfill legal requirements.","PeriodicalId":178458,"journal":{"name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126710181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-02DOI: 10.1109/lcn58197.2023.10223383
I. Amer, Sarah Adel Bargal, Sharief M. A. Oteafy, Hossam S. Hassanein
{"title":"Demo: Leveraging Edge Intelligence for Affective Communication over URLLC","authors":"I. Amer, Sarah Adel Bargal, Sharief M. A. Oteafy, Hossam S. Hassanein","doi":"10.1109/lcn58197.2023.10223383","DOIUrl":"https://doi.org/10.1109/lcn58197.2023.10223383","url":null,"abstract":"","PeriodicalId":178458,"journal":{"name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128565804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}