Qossay Ismail, Osama Saleh, Mohammed Hashayka, Ahmed Awad, Amjad Hawash, O. Othman
Data is considered an important asset for organizations, companies, and even people. Crucial decisions depend mainly on data. Exchanging data is essential in order to negotiate ideas, thoughts, and decisions. Networks are the communication channels of data exchange although data is exposed to different attacks, threats, and loss. Because of this, data security has become a key concern for different parties through their daily data manipulation. There are different ways to ensure data security. Paying attention to network threats, data encryption, and using strong passwords are all examples. However, a firewall represents the first defense line against malicious traffic throughout the network. Firewalls have a set of rules to be applied in the time of data exchange between inside and outside of data networks. Some of the firewalls apply such rules in a sequential manner, which degrades the performance of the firewall. In this work, we are utilizing a dynamic ontology of different firewall rules managed by SPARQL queries, so that the rules are applied faster, and thus, increasing the firewall performance. Experimental results show that our proposed methodology totally eliminates the anomalies in the firewall rules as a result of conducting longest matching with proper rules from the dynamically constructed ontology.
{"title":"Improve the Firewall Accuracy By using Dynamic Ontology","authors":"Qossay Ismail, Osama Saleh, Mohammed Hashayka, Ahmed Awad, Amjad Hawash, O. Othman","doi":"10.1145/3440749.3442607","DOIUrl":"https://doi.org/10.1145/3440749.3442607","url":null,"abstract":"Data is considered an important asset for organizations, companies, and even people. Crucial decisions depend mainly on data. Exchanging data is essential in order to negotiate ideas, thoughts, and decisions. Networks are the communication channels of data exchange although data is exposed to different attacks, threats, and loss. Because of this, data security has become a key concern for different parties through their daily data manipulation. There are different ways to ensure data security. Paying attention to network threats, data encryption, and using strong passwords are all examples. However, a firewall represents the first defense line against malicious traffic throughout the network. Firewalls have a set of rules to be applied in the time of data exchange between inside and outside of data networks. Some of the firewalls apply such rules in a sequential manner, which degrades the performance of the firewall. In this work, we are utilizing a dynamic ontology of different firewall rules managed by SPARQL queries, so that the rules are applied faster, and thus, increasing the firewall performance. Experimental results show that our proposed methodology totally eliminates the anomalies in the firewall rules as a result of conducting longest matching with proper rules from the dynamically constructed ontology.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124226365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Krasov, I. Pestov, A. Gelfand, A. Kazantsev, Anna Polyanicheva
The size of the network, the number of nodes and connected devices are exponentially increasing due to the development of the Internet of Things (IoT). It becomes difficult to administer the monitoring of heterogeneous networks. It is necessary to use predictive models (Model Predictive Control) to deploy decision support systems related to the IoT network security. The article examines three popular mathematical forecasting methods, evaluates their accuracy and their using possibility in predictive models to solve the problem of assessing the load on the computing power of IoT devices, including servers and services.
{"title":"Using mathematical forecasting methods to estimate the load on the computing power of the IoT network","authors":"A. Krasov, I. Pestov, A. Gelfand, A. Kazantsev, Anna Polyanicheva","doi":"10.1145/3440749.3442605","DOIUrl":"https://doi.org/10.1145/3440749.3442605","url":null,"abstract":"The size of the network, the number of nodes and connected devices are exponentially increasing due to the development of the Internet of Things (IoT). It becomes difficult to administer the monitoring of heterogeneous networks. It is necessary to use predictive models (Model Predictive Control) to deploy decision support systems related to the IoT network security. The article examines three popular mathematical forecasting methods, evaluates their accuracy and their using possibility in predictive models to solve the problem of assessing the load on the computing power of IoT devices, including servers and services.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123260210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, the advent of cloud computing has transformed the field of computing and information technology. It enabled customers to rent virtual instances and take advantage of various services on-demand with the lowest costs. Despite the advantages offered by cloud computing, it faces several threats; an example is DDoS attack which is considered one of the most serious ones. This paper proposes a real-time monitoring and detection of DDoS attacks on the cloud using machine learning approach. Naïve Bayes, K-Nearest Neighbor, and Random Forest machine learning classifiers have been selected to build predictive models. This model will be evaluated on the cloud for its accuracy and efficiency.
{"title":"Real-Time DDoS flood Attack Monitoring and Detection (RT-AMD) Model for Cloud Computing","authors":"Alaa Alsaeedi, O. Bamasag, A. Munshi","doi":"10.1145/3440749.3442606","DOIUrl":"https://doi.org/10.1145/3440749.3442606","url":null,"abstract":"In recent years, the advent of cloud computing has transformed the field of computing and information technology. It enabled customers to rent virtual instances and take advantage of various services on-demand with the lowest costs. Despite the advantages offered by cloud computing, it faces several threats; an example is DDoS attack which is considered one of the most serious ones. This paper proposes a real-time monitoring and detection of DDoS attacks on the cloud using machine learning approach. Naïve Bayes, K-Nearest Neighbor, and Random Forest machine learning classifiers have been selected to build predictive models. This model will be evaluated on the cloud for its accuracy and efficiency.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121744331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A novel Radon–Nikodym approach to machine learning (ML) is developed, implemented numerically, tested on various datasets, and it’s parallelization is discussed. It consists in building a “wavefunction” ψ(x), a linear function on input attributes x then constructing a classificator of the form ⟨ψ2f⟩/⟨ψ2⟩. The solution is obtained from a generalized eigenproblem |f|ψ[i]⟩ = λ[i]|ψ[i]⟩ with left– and right– hand side matrices calculated from the input dataset. A solution to classification problem (predict f on an unseen x) is found without using a norm testing how predicted f differs from the one observed. Possible outcomes and their probabilities are obtained separately using the Lebesgue quadrature technique, this makes the method robust to input data with outliers, spikes, etc. A remarkable feature is the knowledge of the invariant group (what input attributes transforms do not change the solution). Radon–Nikodym approach is typically slower than the other methods used, this is the cost of being a “norm–free”. A parallel implementation is expected to improve this deficiency.
{"title":"On The Radon–Nikodym Machine Learning Parallelization","authors":"A. Bobyl, Vadim V. Davydov, V. Malyshkin","doi":"10.1145/3440749.3442604","DOIUrl":"https://doi.org/10.1145/3440749.3442604","url":null,"abstract":"A novel Radon–Nikodym approach to machine learning (ML) is developed, implemented numerically, tested on various datasets, and it’s parallelization is discussed. It consists in building a “wavefunction” ψ(x), a linear function on input attributes x then constructing a classificator of the form ⟨ψ2f⟩/⟨ψ2⟩. The solution is obtained from a generalized eigenproblem |f|ψ[i]⟩ = λ[i]|ψ[i]⟩ with left– and right– hand side matrices calculated from the input dataset. A solution to classification problem (predict f on an unseen x) is found without using a norm testing how predicted f differs from the one observed. Possible outcomes and their probabilities are obtained separately using the Lebesgue quadrature technique, this makes the method robust to input data with outliers, spikes, etc. A remarkable feature is the knowledge of the invariant group (what input attributes transforms do not change the solution). Radon–Nikodym approach is typically slower than the other methods used, this is the cost of being a “norm–free”. A parallel implementation is expected to improve this deficiency.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132868082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Khakimov, Aleksandr Loborchuk, Ibodulaev Ibodullokhodzha, Dmitry Poluektov, I. Elgendy, A. Muthanna
Edge computing is the key to building 5G Networks and Future 2030 Networks. Edge computing extends the cloud computing paradigm by placing resources close to the network edges to cope with the upcoming growth of connected devices. Future applications: health monitoring and predictive services within the framework of the Smart City, Internet of things (IoT), vehicular ad hoc network, autonomous vehicles present a new set of strict requirements, such as low latency. In this paper, we develop a set of methods for managing and orchestrating new intelligent services in a new network and computing infrastructure. In addition, we consider a new prototype using an orchestration system for managing the autonomous vehicles’ resources in comparison with the existing approaches to the design of high-load networks. This orchestration platform is based on independent Docker containers that running the orchestration system. The main goal of our proposed system is to build an efficient network architecture with a minimum delay to process the information based on neural networks. Finally, simulation results proved that the proposed system can significantly not only reduce the overall network load but also increase the quality of the transmitted stream across the network in comparison with traditional network architectures.
{"title":"Edge Computing Resource Allocation Orchestration System for Autonomous Vehicles","authors":"A. Khakimov, Aleksandr Loborchuk, Ibodulaev Ibodullokhodzha, Dmitry Poluektov, I. Elgendy, A. Muthanna","doi":"10.1145/3440749.3442594","DOIUrl":"https://doi.org/10.1145/3440749.3442594","url":null,"abstract":"Edge computing is the key to building 5G Networks and Future 2030 Networks. Edge computing extends the cloud computing paradigm by placing resources close to the network edges to cope with the upcoming growth of connected devices. Future applications: health monitoring and predictive services within the framework of the Smart City, Internet of things (IoT), vehicular ad hoc network, autonomous vehicles present a new set of strict requirements, such as low latency. In this paper, we develop a set of methods for managing and orchestrating new intelligent services in a new network and computing infrastructure. In addition, we consider a new prototype using an orchestration system for managing the autonomous vehicles’ resources in comparison with the existing approaches to the design of high-load networks. This orchestration platform is based on independent Docker containers that running the orchestration system. The main goal of our proposed system is to build an efficient network architecture with a minimum delay to process the information based on neural networks. Finally, simulation results proved that the proposed system can significantly not only reduce the overall network load but also increase the quality of the transmitted stream across the network in comparison with traditional network architectures.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130142979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Today nearly everyone needs strong and reliable access to the Internet. Usually, such access is provided by Internet-providers. They lay lines of communication and hire specialists. This costs money so customers should pay for the access. Accordingly, the provider wants to distinguish between clients who paid for access and those who do not. That is why providers require methods to control access with usage of authentication. Sometimes, one provider gets hardware of another provider under own control. However, there are a lot of different authentication protocols developed. The target of that work is to connect such authentication methods on hardware with providers services, such as user access control panel (billing). The result of the work is development of running software which can control users’ authentication depending on rules applied in billing panel.
{"title":"Development of multifunctional system for controlling user access to the Internet","authors":"Arseniy D. Prosvirin, Vadim V. Davydov, A. Moroz","doi":"10.1145/3440749.3442618","DOIUrl":"https://doi.org/10.1145/3440749.3442618","url":null,"abstract":"Today nearly everyone needs strong and reliable access to the Internet. Usually, such access is provided by Internet-providers. They lay lines of communication and hire specialists. This costs money so customers should pay for the access. Accordingly, the provider wants to distinguish between clients who paid for access and those who do not. That is why providers require methods to control access with usage of authentication. Sometimes, one provider gets hardware of another provider under own control. However, there are a lot of different authentication protocols developed. The target of that work is to connect such authentication methods on hardware with providers services, such as user access control panel (billing). The result of the work is development of running software which can control users’ authentication depending on rules applied in billing panel.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"553 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130444801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The algorithms for generating and finding the shortest path in two-dimensional labyrinths and their characteristics are considered. The aim of the study is to determine the dependence of the working time of the shortest path search algorithms on the characteristics of mazes. This may allow these algorithms to be used to optimise routing processes in packet switching networks. All of the characteristics of the algorithms under consideration are described in detail. These search algorithms also allow for paralleling, so they can be used when creating games or any special applications. Such generation algorithms have been selected, the resulting mazes of which have different characteristics, thus making it possible to determine the required dependence. The peculiarity of applying the result of this research is that the fastest search algorithm can be selected for the generation algorithm or for specific characteristics of an already generated maze. The search algorithms can be improved to find paths in mazes in N-dimensional spaces. This search extension possibility can be widely used not only for working with mazes, but also with any other structure of a given coordinate system.
{"title":"Generation and Search for the Shortest Path in Two-dimensional Labyrinths as A Model for Optimizing Routing Processes in the Packet Switching Network","authors":"A. Dagaev, Y. Borodyansky, A. Pomogalova","doi":"10.1145/3440749.3442636","DOIUrl":"https://doi.org/10.1145/3440749.3442636","url":null,"abstract":"The algorithms for generating and finding the shortest path in two-dimensional labyrinths and their characteristics are considered. The aim of the study is to determine the dependence of the working time of the shortest path search algorithms on the characteristics of mazes. This may allow these algorithms to be used to optimise routing processes in packet switching networks. All of the characteristics of the algorithms under consideration are described in detail. These search algorithms also allow for paralleling, so they can be used when creating games or any special applications. Such generation algorithms have been selected, the resulting mazes of which have different characteristics, thus making it possible to determine the required dependence. The peculiarity of applying the result of this research is that the fastest search algorithm can be selected for the generation algorithm or for specific characteristics of an already generated maze. The search algorithms can be improved to find paths in mazes in N-dimensional spaces. This search extension possibility can be widely used not only for working with mazes, but also with any other structure of a given coordinate system.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124333087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Virtual reality and teleportation, to telepresence, augmented reality, and remotely‑controlled robotics are future applications that are bound to achieve unprecedented development for society, economics and culture and to revolutionize the way we live, learn, work and play. Unfortunately, today’s Internet is simply not able to provide the stringent performance requirements needed by such applications to run smoothly and to offer a perfect quality of experience. This is due to several fundamental limitations in the design of the current network architecture and communication protocols. As a result, it is now the time to put into question the tenets of today’s Internet and think novel architecture and protocols that take into account recent technological advances in cloud computing, virtualization and network softwarization to design the future Tactile Internet. In this talk, we start by analyzing the characteristics and requirements of future networking applications and highlight the limitations of the today’s Internet architecture and protocols. We then provide an overview of FlexNGIA, a Flexible Next-Generation Internet Architecture that leverages cloud computing infrastructures, services and technologies as the keystone of the future Internet providing high performance and fully flexibility for future Internet applications and services. We also discuss through some use-cases how FlexNGIA could ensure the performance guarantees required by some of the future network applications.
{"title":"FlexNGIA - Towards the Cloudification of the Internet","authors":"M. Zhani","doi":"10.1145/3440749.3442649","DOIUrl":"https://doi.org/10.1145/3440749.3442649","url":null,"abstract":"Virtual reality and teleportation, to telepresence, augmented reality, and remotely‑controlled robotics are future applications that are bound to achieve unprecedented development for society, economics and culture and to revolutionize the way we live, learn, work and play. Unfortunately, today’s Internet is simply not able to provide the stringent performance requirements needed by such applications to run smoothly and to offer a perfect quality of experience. This is due to several fundamental limitations in the design of the current network architecture and communication protocols. As a result, it is now the time to put into question the tenets of today’s Internet and think novel architecture and protocols that take into account recent technological advances in cloud computing, virtualization and network softwarization to design the future Tactile Internet. In this talk, we start by analyzing the characteristics and requirements of future networking applications and highlight the limitations of the today’s Internet architecture and protocols. We then provide an overview of FlexNGIA, a Flexible Next-Generation Internet Architecture that leverages cloud computing infrastructures, services and technologies as the keystone of the future Internet providing high performance and fully flexibility for future Internet applications and services. We also discuss through some use-cases how FlexNGIA could ensure the performance guarantees required by some of the future network applications.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125249237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Podgornov, R. Davydov, D. Zotov, V. Antonov, V. Maslikov, E. Maslikova
Due to the increase in the number of floods, the urgent task is to reduce the risk of flooding the important areas. The existing hydraulic structures for flood accumulation may no longer be enough; therefore, it is necessary to place new objects in the river basin. The paper proposes an improved previous mathematical model for the analysis and selection of the location and basic parameters of self-regulating hydroelectric systems in a river basin using computer modelling with the possibility of parallel computations. It is possible to quickly evaluate the results of adding new structures and their contribution to reducing the risk of floods.
{"title":"Mathematical modelling of the operation of a multistage flood control system using parallel computations","authors":"N. Podgornov, R. Davydov, D. Zotov, V. Antonov, V. Maslikov, E. Maslikova","doi":"10.1145/3440749.3442616","DOIUrl":"https://doi.org/10.1145/3440749.3442616","url":null,"abstract":"Due to the increase in the number of floods, the urgent task is to reduce the risk of flooding the important areas. The existing hydraulic structures for flood accumulation may no longer be enough; therefore, it is necessary to place new objects in the river basin. The paper proposes an improved previous mathematical model for the analysis and selection of the location and basic parameters of self-regulating hydroelectric systems in a river basin using computer modelling with the possibility of parallel computations. It is possible to quickly evaluate the results of adding new structures and their contribution to reducing the risk of floods.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123529596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The advent of communication technologies and smart storage gave rise to the concept of smart cities. One of the key enabling technologies of smart living is the Internet of Things (IoT). In recent years, IoT has developed into many areas of application including critical national infrastructure (CNI) such as transport, hospitals and power distribution grid. The proliferation in IoT applications raised many serious security and privacy concerns to citizens, businesses and governments. CNI systems depend heavily on IoT devices and Cyber Physical Systems (CPS) to perform autonomous actions or inform human decision makers through the exchange and processing of data. Recently, blockchain has been advocated as a solution for secure data storage and sharing. Blockchain cryptographically offers a secure platform for maintaining a decentralised, ”append-only”, publicly verifiable and immutable data structure, which is timestamped and sequentially ordered by its reference to previous block hashes. The immutability and security of blockchain can improve the CNI protection. Two specific smart CNI enabling technologies that would highly benefit from blockchain are IoT and CPS. Digital twins are virtual replica of the network and logic layer of physical system. A digital twin provides a platform to solve major IoT related CNI cybersecurity challenges in tomorrow’s secure infrastructure, energy distribution, smart cities, smart manufacturing (Industrial IoT and Industry4.0) and autonomous transit systems. This key note discussion outlines how to implement blockchain as a fundamental theory for trustless security for connected CNI. It will investigate technologies which can be utilised to achieve a trustless matrix such as blockchain and peer-distributed security systems, for instance onion-routing, with the wider aim of defining trustless security further. The research also considers the feasibility of trustless IoT security systems and their application in CNI. It investigate the present state-of-the-art in cybersecurity as it relates to trustless security technologies and blockchain and what is the present state of the art of cybersecurity in IoT-enabled CNI systems.
{"title":"Blockchain, Internet of Things and Digital Twins in Trustless Security of Critical National Infrastructure","authors":"Mohammad Hammoudeh","doi":"10.1145/3440749.3442650","DOIUrl":"https://doi.org/10.1145/3440749.3442650","url":null,"abstract":"The advent of communication technologies and smart storage gave rise to the concept of smart cities. One of the key enabling technologies of smart living is the Internet of Things (IoT). In recent years, IoT has developed into many areas of application including critical national infrastructure (CNI) such as transport, hospitals and power distribution grid. The proliferation in IoT applications raised many serious security and privacy concerns to citizens, businesses and governments. CNI systems depend heavily on IoT devices and Cyber Physical Systems (CPS) to perform autonomous actions or inform human decision makers through the exchange and processing of data. Recently, blockchain has been advocated as a solution for secure data storage and sharing. Blockchain cryptographically offers a secure platform for maintaining a decentralised, ”append-only”, publicly verifiable and immutable data structure, which is timestamped and sequentially ordered by its reference to previous block hashes. The immutability and security of blockchain can improve the CNI protection. Two specific smart CNI enabling technologies that would highly benefit from blockchain are IoT and CPS. Digital twins are virtual replica of the network and logic layer of physical system. A digital twin provides a platform to solve major IoT related CNI cybersecurity challenges in tomorrow’s secure infrastructure, energy distribution, smart cities, smart manufacturing (Industrial IoT and Industry4.0) and autonomous transit systems. This key note discussion outlines how to implement blockchain as a fundamental theory for trustless security for connected CNI. It will investigate technologies which can be utilised to achieve a trustless matrix such as blockchain and peer-distributed security systems, for instance onion-routing, with the wider aim of defining trustless security further. The research also considers the feasibility of trustless IoT security systems and their application in CNI. It investigate the present state-of-the-art in cybersecurity as it relates to trustless security technologies and blockchain and what is the present state of the art of cybersecurity in IoT-enabled CNI systems.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117030068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}