Pub Date : 2019-05-01DOI: 10.1109/ICSIoT47925.2019.00022
Kester Quist-Aphetsi, Michael Christopher Xenya
Identifying the right source and target nodes in IoT as well as secure data communication is very vital in ensuring security, validity and reliability of IoT communication. Since more devices are being programmed to exchange data and commands autonomously in IoT and wireless sensor networks, security and authenticity of such transmitted data is very crucial. This calls for strong security approaches to prevent both passive and active attackers against data communication. This work proposed a scheme for securing communication among IoT devices by applying Diffie-Hellman encryption algorithm to authenticate the communicating nodes while using AES and MD5 to encrypt and validate the data transfer among the nodes.
{"title":"Node to Node Secure Data Communication for IoT Devices Using Diffie-Hellman, AES, and MD5 Cryptographic Schemes","authors":"Kester Quist-Aphetsi, Michael Christopher Xenya","doi":"10.1109/ICSIoT47925.2019.00022","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00022","url":null,"abstract":"Identifying the right source and target nodes in IoT as well as secure data communication is very vital in ensuring security, validity and reliability of IoT communication. Since more devices are being programmed to exchange data and commands autonomously in IoT and wireless sensor networks, security and authenticity of such transmitted data is very crucial. This calls for strong security approaches to prevent both passive and active attackers against data communication. This work proposed a scheme for securing communication among IoT devices by applying Diffie-Hellman encryption algorithm to authenticate the communicating nodes while using AES and MD5 to encrypt and validate the data transfer among the nodes.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"47 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121013734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-01DOI: 10.1109/icsiot47925.2019.00002
{"title":"[Title page iii]","authors":"","doi":"10.1109/icsiot47925.2019.00002","DOIUrl":"https://doi.org/10.1109/icsiot47925.2019.00002","url":null,"abstract":"","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115119226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-01DOI: 10.1109/ICSIoT47925.2019.00017
Mamudu Hamidu, J. J. Kponyo, A. Acakpovi
This paper presents a novel model of a closed loop capacitive accelerometer. Capacitive accelerometer is able to detect the displacement/position of a vehicle by means of Position-Velocity-Acceleration (PVA) model. The closed loop design is design to overcome the steady state error obtained in the equivalent open loop design. Therefore, in this paper, a parallel Proportional Integral Derivative (PID) controller with a derivative filter is designed to establish a unity feedback accelerometer for the purpose of reducing or eliminating the steady state error. The accelerometer gave an exact linear dependence of displacement on a step-like function of acceleration signal input. Matlab/Simulink software was used to design the control system and construct the overall proposed mathematical model. Test show that, for acceleration value of ±1 gravity (g) produces displacement of ±1 meter (m). The system produces an initial spike with a transient time of less than 0.1 secs. This is same for an acceleration of ±10 g. The use of PID controller with a derivative filter in this paper provide a significant improvement in predicting the linear dependence relationship between acceleration and displacement than the traditional approach of continuous tuning of PID for accelerometer system stability.
{"title":"Innovative Prediction of Vehicle Position Based on Closed Loop Modeling of Capacitive Accelerometer","authors":"Mamudu Hamidu, J. J. Kponyo, A. Acakpovi","doi":"10.1109/ICSIoT47925.2019.00017","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00017","url":null,"abstract":"This paper presents a novel model of a closed loop capacitive accelerometer. Capacitive accelerometer is able to detect the displacement/position of a vehicle by means of Position-Velocity-Acceleration (PVA) model. The closed loop design is design to overcome the steady state error obtained in the equivalent open loop design. Therefore, in this paper, a parallel Proportional Integral Derivative (PID) controller with a derivative filter is designed to establish a unity feedback accelerometer for the purpose of reducing or eliminating the steady state error. The accelerometer gave an exact linear dependence of displacement on a step-like function of acceleration signal input. Matlab/Simulink software was used to design the control system and construct the overall proposed mathematical model. Test show that, for acceleration value of ±1 gravity (g) produces displacement of ±1 meter (m). The system produces an initial spike with a transient time of less than 0.1 secs. This is same for an acceleration of ±10 g. The use of PID controller with a derivative filter in this paper provide a significant improvement in predicting the linear dependence relationship between acceleration and displacement than the traditional approach of continuous tuning of PID for accelerometer system stability.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"87 42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130376160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-01DOI: 10.1109/ICSIoT47925.2019.00007
E. Ansong, Thomas Quansah Synaepa-Addision
This research reports on security and privacy of user data transmitted in Android mobile banking applications. The basis of this approach was to experiment and urge a choice of development framework which ensures user data privacy in banking mobile applications of banks operating in Ghana. The results obtained directed attention to the fact that mobile banking applications developed using cross platform development frameworks (particularly Cordova) make applications less vulnerable by making use of most of the permissions requested ensuring user data privacy as compared to applications development using native development framework.
{"title":"A Comparative Study of User Data Security and Privacy in Native and Cross Platform Android Mobile Banking Applications","authors":"E. Ansong, Thomas Quansah Synaepa-Addision","doi":"10.1109/ICSIoT47925.2019.00007","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00007","url":null,"abstract":"This research reports on security and privacy of user data transmitted in Android mobile banking applications. The basis of this approach was to experiment and urge a choice of development framework which ensures user data privacy in banking mobile applications of banks operating in Ghana. The results obtained directed attention to the fact that mobile banking applications developed using cross platform development frameworks (particularly Cordova) make applications less vulnerable by making use of most of the permissions requested ensuring user data privacy as compared to applications development using native development framework.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129317689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-01DOI: 10.1109/ICSIoT47925.2019.00020
Abel Yeboah-Ofori, Daniel Opoku-Akyea
Cyber supply chain (CSC) provide an organizationwith the ability to align its business processes, informationflows and data structures with other organization. However, the increase interdependencies have brought about inherent, threats, risks, attacks and vulnerabilities that adversaries maybe able to exploit when not properly mitigated. Additionally, every cyberattack on each organization increases theprobability of the risk cascading to others. The CSC risk hasincreased exponentially due to uncertainties surroundingcyberattacks and the cyber threat landscape. Recent CSCthreats have been disruptive and impacting on the smooth flowof delivery of products and services. CSC risk has beenobserved as one of the areas that impact greatly and causesbudget overruns. The aim of this paper is to mitigate CSCrisks in an organizational landscape. In particular, the paperidentifies supply inbound and outbound chain threatlandscape using a risk breakdown structure. Further, weassess the risk to gather cyber threat intelligence. Furthermore, we use the probability distribution method todetermine the CSC risks and analyze the risk probabilities andlikelihood of risk cascading impact. Our results show thatCSC risk can be neutralized using probability distributionmethods to detect and mitigate the risks and their impactlevels.
{"title":"Mitigating Cyber Supply Chain Risks in Cyber Physical Systems Organizational Landscape","authors":"Abel Yeboah-Ofori, Daniel Opoku-Akyea","doi":"10.1109/ICSIoT47925.2019.00020","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00020","url":null,"abstract":"Cyber supply chain (CSC) provide an organizationwith the ability to align its business processes, informationflows and data structures with other organization. However, the increase interdependencies have brought about inherent, threats, risks, attacks and vulnerabilities that adversaries maybe able to exploit when not properly mitigated. Additionally, every cyberattack on each organization increases theprobability of the risk cascading to others. The CSC risk hasincreased exponentially due to uncertainties surroundingcyberattacks and the cyber threat landscape. Recent CSCthreats have been disruptive and impacting on the smooth flowof delivery of products and services. CSC risk has beenobserved as one of the areas that impact greatly and causesbudget overruns. The aim of this paper is to mitigate CSCrisks in an organizational landscape. In particular, the paperidentifies supply inbound and outbound chain threatlandscape using a risk breakdown structure. Further, weassess the risk to gather cyber threat intelligence. Furthermore, we use the probability distribution method todetermine the CSC risks and analyze the risk probabilities andlikelihood of risk cascading impact. Our results show thatCSC risk can be neutralized using probability distributionmethods to detect and mitigate the risks and their impactlevels.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131918839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}