首页 > 最新文献

2019 International Conference on Cyber Security and Internet of Things (ICSIoT)最新文献

英文 中文
Node to Node Secure Data Communication for IoT Devices Using Diffie-Hellman, AES, and MD5 Cryptographic Schemes 使用Diffie-Hellman、AES和MD5加密方案实现物联网设备节点到节点的安全数据通信
Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00022
Kester Quist-Aphetsi, Michael Christopher Xenya
Identifying the right source and target nodes in IoT as well as secure data communication is very vital in ensuring security, validity and reliability of IoT communication. Since more devices are being programmed to exchange data and commands autonomously in IoT and wireless sensor networks, security and authenticity of such transmitted data is very crucial. This calls for strong security approaches to prevent both passive and active attackers against data communication. This work proposed a scheme for securing communication among IoT devices by applying Diffie-Hellman encryption algorithm to authenticate the communicating nodes while using AES and MD5 to encrypt and validate the data transfer among the nodes.
识别正确的物联网源节点和目标节点以及安全的数据通信对于确保物联网通信的安全性、有效性和可靠性至关重要。由于越来越多的设备被编程为在物联网和无线传感器网络中自主交换数据和命令,因此传输数据的安全性和真实性非常重要。这需要强有力的安全方法来防止被动和主动攻击者对数据通信的攻击。本文提出了一种物联网设备间通信安全方案,采用Diffie-Hellman加密算法对通信节点进行认证,同时使用AES和MD5对节点间数据传输进行加密验证。
{"title":"Node to Node Secure Data Communication for IoT Devices Using Diffie-Hellman, AES, and MD5 Cryptographic Schemes","authors":"Kester Quist-Aphetsi, Michael Christopher Xenya","doi":"10.1109/ICSIoT47925.2019.00022","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00022","url":null,"abstract":"Identifying the right source and target nodes in IoT as well as secure data communication is very vital in ensuring security, validity and reliability of IoT communication. Since more devices are being programmed to exchange data and commands autonomously in IoT and wireless sensor networks, security and authenticity of such transmitted data is very crucial. This calls for strong security approaches to prevent both passive and active attackers against data communication. This work proposed a scheme for securing communication among IoT devices by applying Diffie-Hellman encryption algorithm to authenticate the communicating nodes while using AES and MD5 to encrypt and validate the data transfer among the nodes.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"47 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121013734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
[Title page iii] [标题页iii]
Pub Date : 2019-05-01 DOI: 10.1109/icsiot47925.2019.00002
{"title":"[Title page iii]","authors":"","doi":"10.1109/icsiot47925.2019.00002","DOIUrl":"https://doi.org/10.1109/icsiot47925.2019.00002","url":null,"abstract":"","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115119226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovative Prediction of Vehicle Position Based on Closed Loop Modeling of Capacitive Accelerometer 基于电容式加速度计闭环建模的创新性车辆位置预测
Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00017
Mamudu Hamidu, J. J. Kponyo, A. Acakpovi
This paper presents a novel model of a closed loop capacitive accelerometer. Capacitive accelerometer is able to detect the displacement/position of a vehicle by means of Position-Velocity-Acceleration (PVA) model. The closed loop design is design to overcome the steady state error obtained in the equivalent open loop design. Therefore, in this paper, a parallel Proportional Integral Derivative (PID) controller with a derivative filter is designed to establish a unity feedback accelerometer for the purpose of reducing or eliminating the steady state error. The accelerometer gave an exact linear dependence of displacement on a step-like function of acceleration signal input. Matlab/Simulink software was used to design the control system and construct the overall proposed mathematical model. Test show that, for acceleration value of ±1 gravity (g) produces displacement of ±1 meter (m). The system produces an initial spike with a transient time of less than 0.1 secs. This is same for an acceleration of ±10 g. The use of PID controller with a derivative filter in this paper provide a significant improvement in predicting the linear dependence relationship between acceleration and displacement than the traditional approach of continuous tuning of PID for accelerometer system stability.
提出了一种新颖的闭环电容式加速度计模型。电容式加速度计通过位置-速度-加速度(PVA)模型来检测车辆的位移/位置。闭环设计是为了克服等效开环设计中的稳态误差而设计的。因此,本文设计了一种带导数滤波器的并联比例积分导数(PID)控制器来建立一个单位反馈加速度计,以减小或消除稳态误差。加速度计给出了位移与加速度信号输入的阶跃函数的精确线性关系。利用Matlab/Simulink软件对控制系统进行了设计,并构建了所提出的整体数学模型。试验表明,当加速度为±1重力(g)时,系统产生的位移为±1米(m),系统产生的初始峰值瞬时时间小于0.1秒。对于±10g的加速度也是一样的。与传统的PID连续整定方法相比,本文使用带有导数滤波器的PID控制器在预测加速度与位移之间的线性依赖关系方面有了显著的改进。
{"title":"Innovative Prediction of Vehicle Position Based on Closed Loop Modeling of Capacitive Accelerometer","authors":"Mamudu Hamidu, J. J. Kponyo, A. Acakpovi","doi":"10.1109/ICSIoT47925.2019.00017","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00017","url":null,"abstract":"This paper presents a novel model of a closed loop capacitive accelerometer. Capacitive accelerometer is able to detect the displacement/position of a vehicle by means of Position-Velocity-Acceleration (PVA) model. The closed loop design is design to overcome the steady state error obtained in the equivalent open loop design. Therefore, in this paper, a parallel Proportional Integral Derivative (PID) controller with a derivative filter is designed to establish a unity feedback accelerometer for the purpose of reducing or eliminating the steady state error. The accelerometer gave an exact linear dependence of displacement on a step-like function of acceleration signal input. Matlab/Simulink software was used to design the control system and construct the overall proposed mathematical model. Test show that, for acceleration value of ±1 gravity (g) produces displacement of ±1 meter (m). The system produces an initial spike with a transient time of less than 0.1 secs. This is same for an acceleration of ±10 g. The use of PID controller with a derivative filter in this paper provide a significant improvement in predicting the linear dependence relationship between acceleration and displacement than the traditional approach of continuous tuning of PID for accelerometer system stability.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"87 42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130376160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparative Study of User Data Security and Privacy in Native and Cross Platform Android Mobile Banking Applications 原生和跨平台Android手机银行应用中用户数据安全和隐私的比较研究
Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00007
E. Ansong, Thomas Quansah Synaepa-Addision
This research reports on security and privacy of user data transmitted in Android mobile banking applications. The basis of this approach was to experiment and urge a choice of development framework which ensures user data privacy in banking mobile applications of banks operating in Ghana. The results obtained directed attention to the fact that mobile banking applications developed using cross platform development frameworks (particularly Cordova) make applications less vulnerable by making use of most of the permissions requested ensuring user data privacy as compared to applications development using native development framework.
本研究报告了Android手机银行应用程序中用户数据传输的安全性和隐私性。这种方法的基础是试验和敦促选择一种开发框架,以确保在加纳经营的银行移动应用程序中的用户数据隐私。与使用本地开发框架的应用程序开发相比,使用跨平台开发框架(特别是Cordova)开发的移动银行应用程序通过使用大多数请求的权限来确保用户数据隐私,从而使应用程序不那么容易受到攻击。
{"title":"A Comparative Study of User Data Security and Privacy in Native and Cross Platform Android Mobile Banking Applications","authors":"E. Ansong, Thomas Quansah Synaepa-Addision","doi":"10.1109/ICSIoT47925.2019.00007","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00007","url":null,"abstract":"This research reports on security and privacy of user data transmitted in Android mobile banking applications. The basis of this approach was to experiment and urge a choice of development framework which ensures user data privacy in banking mobile applications of banks operating in Ghana. The results obtained directed attention to the fact that mobile banking applications developed using cross platform development frameworks (particularly Cordova) make applications less vulnerable by making use of most of the permissions requested ensuring user data privacy as compared to applications development using native development framework.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129317689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mitigating Cyber Supply Chain Risks in Cyber Physical Systems Organizational Landscape 降低网络物理系统组织结构中的网络供应链风险
Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00020
Abel Yeboah-Ofori, Daniel Opoku-Akyea
Cyber supply chain (CSC) provide an organizationwith the ability to align its business processes, informationflows and data structures with other organization. However, the increase interdependencies have brought about inherent, threats, risks, attacks and vulnerabilities that adversaries maybe able to exploit when not properly mitigated. Additionally, every cyberattack on each organization increases theprobability of the risk cascading to others. The CSC risk hasincreased exponentially due to uncertainties surroundingcyberattacks and the cyber threat landscape. Recent CSCthreats have been disruptive and impacting on the smooth flowof delivery of products and services. CSC risk has beenobserved as one of the areas that impact greatly and causesbudget overruns. The aim of this paper is to mitigate CSCrisks in an organizational landscape. In particular, the paperidentifies supply inbound and outbound chain threatlandscape using a risk breakdown structure. Further, weassess the risk to gather cyber threat intelligence. Furthermore, we use the probability distribution method todetermine the CSC risks and analyze the risk probabilities andlikelihood of risk cascading impact. Our results show thatCSC risk can be neutralized using probability distributionmethods to detect and mitigate the risks and their impactlevels.
网络供应链(CSC)为组织提供了使其业务流程、信息流和数据结构与其他组织保持一致的能力。然而,相互依赖性的增加带来了固有的威胁、风险、攻击和漏洞,如果不适当减轻,对手可能会利用这些威胁、风险、攻击和漏洞。此外,针对每个组织的每一次网络攻击都增加了风险层叠到其他组织的可能性。由于网络攻击和网络威胁环境的不确定性,CSC风险呈指数级增长。最近的csc威胁具有破坏性,影响了产品和服务的顺利交付。CSC风险被认为是影响巨大并导致预算超支的领域之一。本文的目的是减轻组织环境中的cscs风险。特别是,本文使用风险分解结构确定了供应入库和出库链的威胁情况。此外,我们评估收集网络威胁情报的风险。在此基础上,运用概率分布法确定了CSC风险,分析了风险概率和风险级联影响的可能性。我们的研究结果表明,csc风险可以使用概率分布方法来检测和减轻风险及其影响水平。
{"title":"Mitigating Cyber Supply Chain Risks in Cyber Physical Systems Organizational Landscape","authors":"Abel Yeboah-Ofori, Daniel Opoku-Akyea","doi":"10.1109/ICSIoT47925.2019.00020","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00020","url":null,"abstract":"Cyber supply chain (CSC) provide an organizationwith the ability to align its business processes, informationflows and data structures with other organization. However, the increase interdependencies have brought about inherent, threats, risks, attacks and vulnerabilities that adversaries maybe able to exploit when not properly mitigated. Additionally, every cyberattack on each organization increases theprobability of the risk cascading to others. The CSC risk hasincreased exponentially due to uncertainties surroundingcyberattacks and the cyber threat landscape. Recent CSCthreats have been disruptive and impacting on the smooth flowof delivery of products and services. CSC risk has beenobserved as one of the areas that impact greatly and causesbudget overruns. The aim of this paper is to mitigate CSCrisks in an organizational landscape. In particular, the paperidentifies supply inbound and outbound chain threatlandscape using a risk breakdown structure. Further, weassess the risk to gather cyber threat intelligence. Furthermore, we use the probability distribution method todetermine the CSC risks and analyze the risk probabilities andlikelihood of risk cascading impact. Our results show thatCSC risk can be neutralized using probability distributionmethods to detect and mitigate the risks and their impactlevels.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131918839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 International Conference on Cyber Security and Internet of Things (ICSIoT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1