首页 > 最新文献

Competitive Advantage in the Digital Economy (CADE 2021)最新文献

英文 中文
SECURING DIGITAL ECONOMIES THROUGH SCADA SYSTEMS: AN ANALYSIS ON AUTHENTICATION AND ACCESS CONTROL 通过scada系统保护数字经济:身份验证和访问控制分析
Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2413
B. Urooj, M. Ali Shah
SCADA (Supervisory Control and Data Acquisition) systems are extensively executed in industrial systems to navigate real-time system monitoring, remote access, record, and assembling of data from a centralised unit. SCADA systems are the most essential element in control systems and have a striking influence in industries such as power grids, nuclear power plants and production lines by governing their vital substructure. SCADA has supported the digital economy with a fully automated control that has shown substantial results in lower production costs and increased efficiency in past several years or so. Since more digital field controllers are being implemented around production sites, these formerly unintelligent tools are becoming interconnected and contributing to the digital economy. However, these systems present various vulnerabilities since their frameworks don't enforce core protection metrics. In this paper, we devise certain security measures, for instance, authentication and access control because these control systems are prone to different types of cyber-attacks that can cause major destruction and disruption in production lines. Furthermore, we presented SCADA's future threats and attack hits by conducting an inquiry from several institutes and research areas and explained the facts, predicting to what extent these attacks could rise shortly.
SCADA(监控和数据采集)系统在工业系统中广泛执行,用于导航实时系统监控、远程访问、记录和从集中单元收集数据。SCADA系统是控制系统中最重要的元素,通过控制其重要的子结构,在电网,核电站和生产线等行业中具有显著的影响。在过去的几年里,SCADA通过全自动控制为数字经济提供了支持,在降低生产成本和提高效率方面取得了显著成果。随着越来越多的数字现场控制器被应用于生产现场,这些以前不智能的工具正变得相互关联,并为数字经济做出贡献。然而,这些系统呈现出各种各样的漏洞,因为它们的框架没有强制执行核心保护指标。在本文中,我们设计了一定的安全措施,例如身份验证和访问控制,因为这些控制系统容易受到不同类型的网络攻击,可能导致生产线的重大破坏和中断。此外,我们通过对几个研究所和研究领域的调查,介绍了SCADA未来的威胁和攻击,并解释了事实,预测了这些攻击可能在短期内上升到什么程度。
{"title":"SECURING DIGITAL ECONOMIES THROUGH SCADA SYSTEMS: AN ANALYSIS ON AUTHENTICATION AND ACCESS CONTROL","authors":"B. Urooj, M. Ali Shah","doi":"10.1049/icp.2021.2413","DOIUrl":"https://doi.org/10.1049/icp.2021.2413","url":null,"abstract":"SCADA (Supervisory Control and Data Acquisition) systems are extensively executed in industrial systems to navigate real-time system monitoring, remote access, record, and assembling of data from a centralised unit. SCADA systems are the most essential element in control systems and have a striking influence in industries such as power grids, nuclear power plants and production lines by governing their vital substructure. SCADA has supported the digital economy with a fully automated control that has shown substantial results in lower production costs and increased efficiency in past several years or so. Since more digital field controllers are being implemented around production sites, these formerly unintelligent tools are becoming interconnected and contributing to the digital economy. However, these systems present various vulnerabilities since their frameworks don't enforce core protection metrics. In this paper, we devise certain security measures, for instance, authentication and access control because these control systems are prone to different types of cyber-attacks that can cause major destruction and disruption in production lines. Furthermore, we presented SCADA's future threats and attack hits by conducting an inquiry from several institutes and research areas and explained the facts, predicting to what extent these attacks could rise shortly.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123858082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PRIVACY-PRESERVING AUTHENTICATION SCHEME FOR VANETS IN DIGITAL ECONOMY 数字经济环境下厕所的隐私保护认证方案
Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2418
M. Afzal, M. Shah
As the use of smart vehicles is increasing day by day, issues such as privacy and authentication are also being faced by VANETs. To address these problems, a blockchain technique is used. This paper covers a linkable and decentralised architecture of the Internet of Vehicles system for the contact between smart vehicles by using blockchain for safe access verification among vehicles and roadside units (RSUs). As the concept of distributed storage and cloud computing is introduced with blockchain, the reason behind using distributed technology is to shift the trust from a single third party such as a central authority (CA) towards a decentralised approach. But still, most of the models rely on a single party CA or any other third party, and in most of the cases data is not decentralised, due to the trust issue that may arise under such conditions. Also, when a vehicle broadcasts any message in the network, the authentication process is fully dependent on a single RSU. If an RSU fails, then there is no security about the accurate delivery of messages. Due to that, any malicious user can take part in the network. Centred on the blockchain, this scheme offers a privacy-preserving authentication mechanism between vehicles. A comparison table between different features of VANETs is also made. The future of vehicles is dependent on technology and it will enhance the rise of the digital economy.
随着智能车辆的使用日益增多,vanet也面临着隐私和身份验证等问题。为了解决这些问题,使用了区块链技术。本文介绍了车联网系统的可链接和分散架构,通过使用区块链进行车辆和路边单元(rsu)之间的安全访问验证,实现智能车辆之间的联系。随着区块链引入分布式存储和云计算的概念,使用分布式技术背后的原因是将信任从单一第三方(如中央权威机构(CA))转移到分散的方法。但是,大多数模型仍然依赖于单个CA或任何其他第三方,并且在大多数情况下,由于在这种情况下可能出现的信任问题,数据不是去中心化的。此外,当车辆在网络中广播任何消息时,身份验证过程完全依赖于单个RSU。如果RSU失败,那么消息的准确传递就没有安全性。因此,任何恶意用户都可以加入网络。该方案以区块链为中心,在车辆之间提供了一种保护隐私的身份验证机制。并给出了VANETs不同特征的对比表。汽车的未来依赖于技术,它将促进数字经济的崛起。
{"title":"PRIVACY-PRESERVING AUTHENTICATION SCHEME FOR VANETS IN DIGITAL ECONOMY","authors":"M. Afzal, M. Shah","doi":"10.1049/icp.2021.2418","DOIUrl":"https://doi.org/10.1049/icp.2021.2418","url":null,"abstract":"As the use of smart vehicles is increasing day by day, issues such as privacy and authentication are also being faced by VANETs. To address these problems, a blockchain technique is used. This paper covers a linkable and decentralised architecture of the Internet of Vehicles system for the contact between smart vehicles by using blockchain for safe access verification among vehicles and roadside units (RSUs). As the concept of distributed storage and cloud computing is introduced with blockchain, the reason behind using distributed technology is to shift the trust from a single third party such as a central authority (CA) towards a decentralised approach. But still, most of the models rely on a single party CA or any other third party, and in most of the cases data is not decentralised, due to the trust issue that may arise under such conditions. Also, when a vehicle broadcasts any message in the network, the authentication process is fully dependent on a single RSU. If an RSU fails, then there is no security about the accurate delivery of messages. Due to that, any malicious user can take part in the network. Centred on the blockchain, this scheme offers a privacy-preserving authentication mechanism between vehicles. A comparison table between different features of VANETs is also made. The future of vehicles is dependent on technology and it will enhance the rise of the digital economy.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"22 6S 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115942834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
How Not To Be Seen: Privacy and Security Considerations in the Design of Everyday Wearable Technology 如何不被看到:日常可穿戴技术设计中的隐私和安全考虑
Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2424
Helen Oliver, Richard Mortier
Aim and scope of the study From 2017 to 2020, we conducted a research through design to address a number of identified obstacles to adoption of wearable computing. One obstacle was a perceived failure to design wearables for emotional engagement [1] [2] [3]. To address this, we began the inspiration phase with a participatory design process with an open-ended brief, instead of the typical approach of starting with a design exemplar. In this way, we elicited concepts from the participants to discover what kinds of everyday wearables they desired [4], rather than their preferences for some particular device type like an activity monitor [5]. The obstacles interrelate, and the outcome of our investigations against the obstacle of poor emotional engagement, give cause to reflect on another of the obstacles: privacy. This paper will reflect on the privacy issues evoked by our experience.
从2017年到2020年,我们通过设计进行了一项研究,以解决采用可穿戴计算的一些已确定的障碍。其中一个障碍是设计情感参与的可穿戴设备的失败[1][2][3]。为了解决这个问题,我们开始了一个开放式的参与式设计过程的灵感阶段,而不是从设计范例开始的典型方法。通过这种方式,我们从参与者中引出概念,发现他们想要什么样的日常可穿戴设备[4],而不是他们对某种特定设备类型的偏好,如活动监视器[5]。这些障碍是相互关联的,而我们针对情感投入不足这一障碍的调查结果,让我们有理由反思另一个障碍:隐私。本文将反思我们的经验所引发的隐私问题。
{"title":"How Not To Be Seen: Privacy and Security Considerations in the Design of Everyday Wearable Technology","authors":"Helen Oliver, Richard Mortier","doi":"10.1049/icp.2021.2424","DOIUrl":"https://doi.org/10.1049/icp.2021.2424","url":null,"abstract":"Aim and scope of the study From 2017 to 2020, we conducted a research through design to address a number of identified obstacles to adoption of wearable computing. One obstacle was a perceived failure to design wearables for emotional engagement [1] [2] [3]. To address this, we began the inspiration phase with a participatory design process with an open-ended brief, instead of the typical approach of starting with a design exemplar. In this way, we elicited concepts from the participants to discover what kinds of everyday wearables they desired [4], rather than their preferences for some particular device type like an activity monitor [5]. The obstacles interrelate, and the outcome of our investigations against the obstacle of poor emotional engagement, give cause to reflect on another of the obstacles: privacy. This paper will reflect on the privacy issues evoked by our experience.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127567909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Service Design for Customer Surrogate Interaction: design characteristics for customer acceptance 客户代理交互的服务设计:客户接受的设计特征
Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2406
Dr Stephen R Pearce
The objective of this research is to identify the service design characteristics that provide competitive advantage to organisations in the digital economy. These characteristics relate to the customer and mediating technology interactions that provide resilience, trust and privacy. What are the service design characteristics for customer and mediating technology service systems? A literature review and case studies are used to explore design characteristics for technology-enabled interactions. This research aims to develop a conceptual framework for service design characteristics. The interactions of people, technology and organisations is a socio technical system that forms networks and interactions [1]. These networks of people and digitally enabled devices provide interactive services. The Unified Services Theory (UST) provides a theoretical lens to view service systems [2]. Digital devices require customers to provide inputs, these inputs are themselves, their possessions and their information. Interactions occur between entities creating service processes. These can be mapped using the process chain network (PCN) methodology [3]. Entities can be customers, providers and physical devices. The methodology enables mapping of service processes between entities. These interactions receive and process customer inputs to coproduce service. These interactions occur in the direct and surrogate regions of the PCN diagram, Figure 1.
本研究的目的是确定在数字经济中为组织提供竞争优势的服务设计特征。这些特征与提供弹性、信任和隐私的客户和中介技术交互有关。客户与中介技术服务系统的服务设计特点是什么?通过文献回顾和案例研究来探索技术支持交互的设计特征。本研究旨在建立服务设计特征的概念框架。人、技术和组织的相互作用是一个形成网络和相互作用的社会技术系统[1]。这些由人和数字设备组成的网络提供了交互式服务。统一服务理论(Unified Services Theory, UST)提供了一个观察服务系统的理论视角[2]。数字设备需要客户提供输入,这些输入是他们自己,他们的财产和他们的信息。交互发生在创建服务流程的实体之间。这些可以使用流程链网络(PCN)方法进行映射[3]。实体可以是客户、供应商和物理设备。该方法支持实体之间的服务流程映射。这些交互接收和处理客户输入以共同提供服务。这些相互作用发生在PCN图的直接区域和代理区域,如图1所示。
{"title":"Service Design for Customer Surrogate Interaction: design characteristics for customer acceptance","authors":"Dr Stephen R Pearce","doi":"10.1049/icp.2021.2406","DOIUrl":"https://doi.org/10.1049/icp.2021.2406","url":null,"abstract":"The objective of this research is to identify the service design characteristics that provide competitive advantage to organisations in the digital economy. These characteristics relate to the customer and mediating technology interactions that provide resilience, trust and privacy. What are the service design characteristics for customer and mediating technology service systems? A literature review and case studies are used to explore design characteristics for technology-enabled interactions. This research aims to develop a conceptual framework for service design characteristics. The interactions of people, technology and organisations is a socio technical system that forms networks and interactions [1]. These networks of people and digitally enabled devices provide interactive services. The Unified Services Theory (UST) provides a theoretical lens to view service systems [2]. Digital devices require customers to provide inputs, these inputs are themselves, their possessions and their information. Interactions occur between entities creating service processes. These can be mapped using the process chain network (PCN) methodology [3]. Entities can be customers, providers and physical devices. The methodology enables mapping of service processes between entities. These interactions receive and process customer inputs to coproduce service. These interactions occur in the direct and surrogate regions of the PCN diagram, Figure 1.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"26 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132609531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Management Challenges in the Implementation of an Email Boundary Control for Data Leakage Prevention 为防止数据泄漏而实施电子邮件边界控制的管理挑战
Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2407
J. Dunn, C. Maple, G. Epiphaniou
In a digital economy, more of an organisation's valuable assets are digital, enabling competitive advantage. However, they also represent a threat, illustrated by increasing levels of data leakage. Such leakage via email remains a key concern across organisations and, to combat this, a range of data leakage prevention (DLP) measures exist. One such technology is an email boundary control (or guard). However, even with mature tools there is a gap between availability and adoption, that this paper proposes is due to the management challenges in application, rather than technology. The home working trend, accelerated by the pandemic, has further exacerbated data leakage risks and heightened the need to ensure an organisation's operations remain resilient and enable trust while keeping private data secure. This paper describes work whose methodology combined the results of a literature review with an in-depth practical case study in an industrial company. This was followed by analysis of the management challenges and then proposed steps to address these. The steps require management commitment and subject matter expertise. Finally, this applied research is important to industry to address the gap between technological capability and its application, in order to support the secure sustainment of increasingly digital enterprises.
在数字经济中,企业更多的宝贵资产是数字化的,从而实现竞争优势。然而,它们也代表着一种威胁,数据泄露的水平不断上升就说明了这一点。这种通过电子邮件泄露的数据仍然是各组织关注的一个关键问题,为了解决这个问题,存在一系列数据泄漏预防(DLP)措施。其中一项技术是电子邮件边界控制(或守卫)。然而,即使使用成熟的工具,在可用性和采用之间也存在差距,这篇论文提出的是由于应用程序中的管理挑战,而不是技术挑战。疫情加速了在家办公的趋势,进一步加剧了数据泄露风险,并提高了确保组织运营保持弹性、在确保私人数据安全的同时建立信任的必要性。本文描述的工作,其方法结合了文献综述的结果与深入的实际案例研究在一家工业公司。接下来是对管理挑战的分析,然后提出解决这些挑战的步骤。这些步骤需要管理层的承诺和专业知识。最后,这项应用研究对于解决技术能力与其应用之间的差距,以支持日益数字化的企业的安全维持具有重要意义。
{"title":"Management Challenges in the Implementation of an Email Boundary Control for Data Leakage Prevention","authors":"J. Dunn, C. Maple, G. Epiphaniou","doi":"10.1049/icp.2021.2407","DOIUrl":"https://doi.org/10.1049/icp.2021.2407","url":null,"abstract":"In a digital economy, more of an organisation's valuable assets are digital, enabling competitive advantage. However, they also represent a threat, illustrated by increasing levels of data leakage. Such leakage via email remains a key concern across organisations and, to combat this, a range of data leakage prevention (DLP) measures exist. One such technology is an email boundary control (or guard). However, even with mature tools there is a gap between availability and adoption, that this paper proposes is due to the management challenges in application, rather than technology. The home working trend, accelerated by the pandemic, has further exacerbated data leakage risks and heightened the need to ensure an organisation's operations remain resilient and enable trust while keeping private data secure. This paper describes work whose methodology combined the results of a literature review with an in-depth practical case study in an industrial company. This was followed by analysis of the management challenges and then proposed steps to address these. The steps require management commitment and subject matter expertise. Finally, this applied research is important to industry to address the gap between technological capability and its application, in order to support the secure sustainment of increasingly digital enterprises.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133015841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conceptualization of the dynamic entrepreneur for system innovation and resilience - conceptual paper 制度创新和弹性的动态企业家的概念化-概念性论文
Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2427
F. Maurer
Schumpeter considers crisis as a chance for development and opportunity for (endogenous and exogenous) innovation. He describes innovation as an enabling force to escape systemic malfunction in an economy. Innovation interrupts and changes the economy: it causes economic upswings but is also a driver of economic downswings accompanied by prize- and quantity wars. Innovation causes constant unrest within systems and continuously relocates the economic equilibrium.
熊彼特认为危机是发展的机会,也是(内生和外生)创新的机会。他将创新描述为一种使经济摆脱系统性故障的力量。创新打断并改变了经济:它导致经济上升,但同时也是经济下行的驱动因素,并伴随着奖励战和数量战。创新导致系统内部不断动荡,并不断重新定位经济平衡。
{"title":"Conceptualization of the dynamic entrepreneur for system innovation and resilience - conceptual paper","authors":"F. Maurer","doi":"10.1049/icp.2021.2427","DOIUrl":"https://doi.org/10.1049/icp.2021.2427","url":null,"abstract":"Schumpeter considers crisis as a chance for development and opportunity for (endogenous and exogenous) innovation. He describes innovation as an enabling force to escape systemic malfunction in an economy. Innovation interrupts and changes the economy: it causes economic upswings but is also a driver of economic downswings accompanied by prize- and quantity wars. Innovation causes constant unrest within systems and continuously relocates the economic equilibrium.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124977399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE INTERNET OF MEDICAL THINGS (IOMT): SECURITY THREATS AND ISSUES AFFECTING DIGITAL ECONOMY 医疗物联网:影响数字经济的安全威胁和问题
Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2420
M. Mushtaq, M. A. Shah, A. Ghafoor
In the healthcare industry, we cannot deny, contradict or oppose the importance of the Internet of Medical Things (IoMT). The ultimate purpose of the IoMT system is to gather and transmit health information such as ECG, weight, blood pressure and sugar levels. Such data may be shared with an approved individual, who may be a physician, a participating health company, insurance provider, or an external contractor regardless of their time, location, and device. But the story is not as simple because IoMT faces various emerging cyber-attacks and threats. Day by day new malware attacks are created and launched on IoMT because an attacker knows that this market is worth billions. The purpose of writing this paper is to introduce you to some of the well-known attacks that are launched on IoT. Such as denial of service, router attack, sensor attack, repay attack, fingerprint, and time-based spoofing, and recent malware attacks such as like Miari, Emoted, Gamut and NE curs and ransomware in IOMT.
在医疗行业,我们不能否认、反驳或反对医疗物联网(IoMT)的重要性。IoMT系统的最终目的是收集和传输健康信息,如心电图、体重、血压和血糖水平。这些数据可以与经批准的个人共享,这些个人可以是医生、参与的医疗公司、保险提供商或外部承包商,而不考虑他们的时间、地点和设备。但事情并没有这么简单,因为IoMT面临着各种新兴的网络攻击和威胁。每天都有新的恶意软件攻击在IoMT上创建和启动,因为攻击者知道这个市场价值数十亿美元。撰写本文的目的是向您介绍针对物联网发起的一些众所周知的攻击。例如拒绝服务,路由器攻击,传感器攻击,偿还攻击,指纹和基于时间的欺骗,以及最近的恶意软件攻击,如Miari, Emoted, Gamut和NE curs以及IOMT中的勒索软件。
{"title":"THE INTERNET OF MEDICAL THINGS (IOMT): SECURITY THREATS AND ISSUES AFFECTING DIGITAL ECONOMY","authors":"M. Mushtaq, M. A. Shah, A. Ghafoor","doi":"10.1049/icp.2021.2420","DOIUrl":"https://doi.org/10.1049/icp.2021.2420","url":null,"abstract":"In the healthcare industry, we cannot deny, contradict or oppose the importance of the Internet of Medical Things (IoMT). The ultimate purpose of the IoMT system is to gather and transmit health information such as ECG, weight, blood pressure and sugar levels. Such data may be shared with an approved individual, who may be a physician, a participating health company, insurance provider, or an external contractor regardless of their time, location, and device. But the story is not as simple because IoMT faces various emerging cyber-attacks and threats. Day by day new malware attacks are created and launched on IoMT because an attacker knows that this market is worth billions. The purpose of writing this paper is to introduce you to some of the well-known attacks that are launched on IoT. Such as denial of service, router attack, sensor attack, repay attack, fingerprint, and time-based spoofing, and recent malware attacks such as like Miari, Emoted, Gamut and NE curs and ransomware in IOMT.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122941284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
OFFENSIVE AI: UNIFICATION OF EMAIL GENERATION THROUGH GPT-2 MODEL WITH A GAME-THEORETIC APPROACH FOR SPEAR-PHISHING ATTACKS 攻击性人工智能:通过gpt-2模型统一电子邮件生成,并采用针对鱼叉式网络钓鱼攻击的博弈论方法
Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2422
Hamzullah Khan, M. Alam, S. Al-Kuwari, Y. Faheem
A rising digital economy implies more cybersecurity challenges. As organisations continue with their digital transformations, they need to implement pervasive cyber defense measures to comply with the corresponding severe security threats. The number of organisations and individuals falling victim to targeted attacks such as spear-phishing attacks is growing rapidly. Regardless of substantial exploration in mitigation systems, attackers today are becoming more sophisticated as they cultivate their techniques, employing advanced natural language (NL) capabilities to deceive email security systems. Game theory approaches based on cybersecurity are mostly concentrated on proposing defence algorithms against attacks. This work is comprehensively centred on the role of the attacker in spear-phishing attacks, using OpenAI text generating model Generative Pre-trained Transformer 2 (GPT-2) to generate emails with various malicious content. Attackers use those emails to attack a target and attempt to deceive the defence system. Considering the lack of theoretic analysis from the attacker's perspective, a non-cooperative zero-sum spear-phishing game model is proposed that allows an attacker to choose an optimal strategy for maximising payoff. Moreover, we calculated the Nash equilibrium (NE) in mixed strategies for the attacker-defender game and provided a reasonable scheme for an attacker to gain an advantage over the target.
数字经济的崛起意味着更多的网络安全挑战。随着组织继续进行数字化转型,他们需要实施无处不在的网络防御措施,以应对相应的严重安全威胁。成为针对性攻击(如鱼叉式网络钓鱼攻击)受害者的组织和个人数量正在迅速增长。尽管对缓解系统进行了大量的探索,但如今的攻击者随着技术的发展变得越来越复杂,他们利用先进的自然语言(NL)能力来欺骗电子邮件安全系统。基于网络安全的博弈论方法主要集中在提出针对攻击的防御算法。这项工作全面集中在攻击者在鱼叉式网络钓鱼攻击中的作用,使用OpenAI文本生成模型生成预训练变压器2 (GPT-2)生成具有各种恶意内容的电子邮件。攻击者利用这些电子邮件攻击目标,并试图欺骗防御系统。针对缺乏从攻击者角度进行理论分析的问题,提出了一种非合作零和鱼叉式网络钓鱼博弈模型,该模型允许攻击者选择最优策略以获得最大收益。在此基础上,计算了攻击防御博弈混合策略下的纳什均衡(NE),给出了攻击方获得相对于目标方优势的合理方案。
{"title":"OFFENSIVE AI: UNIFICATION OF EMAIL GENERATION THROUGH GPT-2 MODEL WITH A GAME-THEORETIC APPROACH FOR SPEAR-PHISHING ATTACKS","authors":"Hamzullah Khan, M. Alam, S. Al-Kuwari, Y. Faheem","doi":"10.1049/icp.2021.2422","DOIUrl":"https://doi.org/10.1049/icp.2021.2422","url":null,"abstract":"A rising digital economy implies more cybersecurity challenges. As organisations continue with their digital transformations, they need to implement pervasive cyber defense measures to comply with the corresponding severe security threats. The number of organisations and individuals falling victim to targeted attacks such as spear-phishing attacks is growing rapidly. Regardless of substantial exploration in mitigation systems, attackers today are becoming more sophisticated as they cultivate their techniques, employing advanced natural language (NL) capabilities to deceive email security systems. Game theory approaches based on cybersecurity are mostly concentrated on proposing defence algorithms against attacks. This work is comprehensively centred on the role of the attacker in spear-phishing attacks, using OpenAI text generating model Generative Pre-trained Transformer 2 (GPT-2) to generate emails with various malicious content. Attackers use those emails to attack a target and attempt to deceive the defence system. Considering the lack of theoretic analysis from the attacker's perspective, a non-cooperative zero-sum spear-phishing game model is proposed that allows an attacker to choose an optimal strategy for maximising payoff. Moreover, we calculated the Nash equilibrium (NE) in mixed strategies for the attacker-defender game and provided a reasonable scheme for an attacker to gain an advantage over the target.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131130815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PRIVACY PRESERVATION IN DIGITAL ECONOMY PLATFORMS 数字经济平台中的隐私保护
Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2416
B. Qadeer, M. A. Shah, A. Ishaq
As we know, we are living in the era of the digital economy, which relies on electronic computing. In any technological or digital economy field, privacy preservation is our major concern. Every device that can process, store, or communicate needs privacy. The privacy preservation field is polished by many researchers based on cloud computing and big data. New research on privacy preservation based on cloud computing, big data and other platforms creates innovation in this field. This paper proposes existing different techniques which are helpful in the field of privacy preservation and trying to explore the field from numerous aspects. We are making a comparison of different techniques and analysing it deeply with the multiple types of constraints which relate to privacy. It includes the combined ideas of different authors about their work carried out from the different types of platforms. This paper also addresses the security threats and how to overcome these privacy threats. Future or emerging trends about privacy preservation against big data and cloud computing are discussed.
正如我们所知,我们生活在数字经济时代,这依赖于电子计算。在任何技术或数字经济领域,隐私保护都是我们关注的主要问题。每个可以处理、存储或通信的设备都需要隐私。在云计算和大数据的基础上,隐私保护领域得到了许多研究者的打磨。基于云计算、大数据等平台的隐私保护新研究开创了这一领域的创新。本文提出了现有的各种有助于隐私保护的技术,并试图从多个方面对该领域进行探索。我们正在对不同的技术进行比较,并深入分析与隐私相关的多种类型的约束。它包含了不同作者对他们在不同类型的平台上完成的工作的综合想法。本文还讨论了安全威胁以及如何克服这些隐私威胁。讨论了针对大数据和云计算的隐私保护的未来或新兴趋势。
{"title":"PRIVACY PRESERVATION IN DIGITAL ECONOMY PLATFORMS","authors":"B. Qadeer, M. A. Shah, A. Ishaq","doi":"10.1049/icp.2021.2416","DOIUrl":"https://doi.org/10.1049/icp.2021.2416","url":null,"abstract":"As we know, we are living in the era of the digital economy, which relies on electronic computing. In any technological or digital economy field, privacy preservation is our major concern. Every device that can process, store, or communicate needs privacy. The privacy preservation field is polished by many researchers based on cloud computing and big data. New research on privacy preservation based on cloud computing, big data and other platforms creates innovation in this field. This paper proposes existing different techniques which are helpful in the field of privacy preservation and trying to explore the field from numerous aspects. We are making a comparison of different techniques and analysing it deeply with the multiple types of constraints which relate to privacy. It includes the combined ideas of different authors about their work carried out from the different types of platforms. This paper also addresses the security threats and how to overcome these privacy threats. Future or emerging trends about privacy preservation against big data and cloud computing are discussed.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115841382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Establishing the Core Principles of Servitisation for Application Outside Manufacturing 建立制造业外应用服务化的核心原则
Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2425
Z. Wood, P. Godsiff
Typically considered as being limited to the manufacturing sector, servitisation involves the transition from a product-based to a service-based offering. If the UK is to be an international leader in the adoption of servitisation business models, other sectors must be considered. The EPSRC-funded Digitally Enhanced Advanced Services (DEAS) Network Plus comprises researchers and practitioners working collectively across various disciplines and different sectors. The work of the network has illustrated that manufacturing is an exemplar, rather than the only model that could be followed, and that it would be beneficial if DEAS principles could be established that are not specific to a particular sector or discipline. Although there is an existing body of research there is minimal agreement on the key concepts and terms, making the topic inaccessible to researchers from disciplines outside servitisation. A broad range of disciplines need to come together especially given the reliance on digital transformation. Following reviews of existing research and the DEAS work to date, this paper discusses the principles of servitisation that could, and should, be applied to sectors outside manufacturing. Further work will make use of these principles in establishing a common terminology framework, in the form of an ontology of servitisation.
服务化通常被认为仅限于制造业,它涉及到从基于产品的产品到基于服务的产品的转变。如果英国要成为采用服务化商业模式的国际领导者,就必须考虑其他领域。epsrc资助的数字增强高级服务(DEAS)网络Plus由不同学科和不同领域的研究人员和从业人员共同组成。该网络的工作表明,制造业是一个典范,而不是可以遵循的唯一模式,如果能够建立不针对特定部门或学科的dea原则,将是有益的。尽管有一个现有的研究机构,但在关键概念和术语上的共识很少,这使得来自服务化以外学科的研究人员无法访问该主题。广泛的学科需要结合在一起,特别是考虑到对数字化转型的依赖。在对现有研究和DEAS工作进行回顾之后,本文讨论了可以而且应该应用于制造业以外部门的服务化原则。进一步的工作将利用这些原则,以服务化本体论的形式建立一个共同的术语框架。
{"title":"Establishing the Core Principles of Servitisation for Application Outside Manufacturing","authors":"Z. Wood, P. Godsiff","doi":"10.1049/icp.2021.2425","DOIUrl":"https://doi.org/10.1049/icp.2021.2425","url":null,"abstract":"Typically considered as being limited to the manufacturing sector, servitisation involves the transition from a product-based to a service-based offering. If the UK is to be an international leader in the adoption of servitisation business models, other sectors must be considered. The EPSRC-funded Digitally Enhanced Advanced Services (DEAS) Network Plus comprises researchers and practitioners working collectively across various disciplines and different sectors. The work of the network has illustrated that manufacturing is an exemplar, rather than the only model that could be followed, and that it would be beneficial if DEAS principles could be established that are not specific to a particular sector or discipline. Although there is an existing body of research there is minimal agreement on the key concepts and terms, making the topic inaccessible to researchers from disciplines outside servitisation. A broad range of disciplines need to come together especially given the reliance on digital transformation. Following reviews of existing research and the DEAS work to date, this paper discusses the principles of servitisation that could, and should, be applied to sectors outside manufacturing. Further work will make use of these principles in establishing a common terminology framework, in the form of an ontology of servitisation.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130586322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Competitive Advantage in the Digital Economy (CADE 2021)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1