Pub Date : 2024-01-18DOI: 10.1007/s43926-023-00054-1
Ishfaq Ahmad, Addison Clark, Muhammad Ali, Hansheng Lei, David Ferris, Alex Aved
{"title":"Determining critical nodes in optimal cost attacks on networked infrastructures","authors":"Ishfaq Ahmad, Addison Clark, Muhammad Ali, Hansheng Lei, David Ferris, Alex Aved","doi":"10.1007/s43926-023-00054-1","DOIUrl":"https://doi.org/10.1007/s43926-023-00054-1","url":null,"abstract":"","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139614816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative analysis of audio classification with MFCC and STFT features using machine learning techniques","authors":"Mahendra Kumar Gourisaria, Rakshit Agrawal, Manoj Sahni, Pradeep Kumar Singh","doi":"10.1007/s43926-023-00049-y","DOIUrl":"https://doi.org/10.1007/s43926-023-00049-y","url":null,"abstract":"","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139389403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-01DOI: 10.1007/s43926-023-00050-5
Riya Punia, Aruna Malik, Samayveer Singh
{"title":"Innovative image interpolation based reversible data hiding for secure communication","authors":"Riya Punia, Aruna Malik, Samayveer Singh","doi":"10.1007/s43926-023-00050-5","DOIUrl":"https://doi.org/10.1007/s43926-023-00050-5","url":null,"abstract":"","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138624760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-30DOI: 10.1007/s43926-023-00053-2
Rawshan Ara Mowri, Madhuri Siddula, Kaushik Roy
{"title":"Is iterative feature selection technique efficient enough? A comparative performance analysis of RFECV feature selection technique in ransomware classification using SHAP","authors":"Rawshan Ara Mowri, Madhuri Siddula, Kaushik Roy","doi":"10.1007/s43926-023-00053-2","DOIUrl":"https://doi.org/10.1007/s43926-023-00053-2","url":null,"abstract":"","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139198677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-20DOI: 10.1007/s43926-023-00051-4
Ernesto Quisbert-Trujillo, Panagiota Morfouli
{"title":"Using a data driven approach for comprehensive Life Cycle Assessment and effective eco design of the Internet of Things: taking LoRa-based IoT systems as examples","authors":"Ernesto Quisbert-Trujillo, Panagiota Morfouli","doi":"10.1007/s43926-023-00051-4","DOIUrl":"https://doi.org/10.1007/s43926-023-00051-4","url":null,"abstract":"","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139258457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-20DOI: 10.1007/s43926-023-00052-3
Boniface Ntambara, D. Nyambo, Andreas Solsbach
{"title":"Internet of things (IoT)-based on real-time and remote boiler fuel monitoring system: a case of Raha Beverages Company Limited, Arusha-Tanzania","authors":"Boniface Ntambara, D. Nyambo, Andreas Solsbach","doi":"10.1007/s43926-023-00052-3","DOIUrl":"https://doi.org/10.1007/s43926-023-00052-3","url":null,"abstract":"","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139255642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-09DOI: 10.1007/s43926-023-00048-z
Riya Punia, Aruna Malik, Samayveer Singh
Abstract The exponential growth of the Internet of Things (IoT) has led to an increased demand for secure and efficient data transmission methods. However, there is a tradeoff in the image quality and hiding capacity in the data hiding methods. Therefore, the maximum amount of data that could be stored in the image media is a difficult challenge while maintaining the image quality. Thus, to make the balance between the quality of the images and the embedding capacity, a novel interpolation-based revisable data hiding (RDH) approach is developed for IoT applications. The proposed interpolation technique takes the average of the root value for the product of two neighboring original pixel values and the third original pixel value. And for the central pixel, it takes an average of two interpolated pixels. By doing so, most of the original pixels are considered and the calculated interpolated pixel is much enhanced as its average value. Furthermore, the data hiding is performed in two stages. In the first stage, RSA is performed on the secret message, and then embedding is done based on which intensity range group. The experimental results indicate that the proposed technique enhanced the embedding capacity by 17.58% and produced 7.80% higher PSNR values for the test images as compared to the baseline methods.
{"title":"An interpolation-based reversible data hiding scheme for internet of things applications","authors":"Riya Punia, Aruna Malik, Samayveer Singh","doi":"10.1007/s43926-023-00048-z","DOIUrl":"https://doi.org/10.1007/s43926-023-00048-z","url":null,"abstract":"Abstract The exponential growth of the Internet of Things (IoT) has led to an increased demand for secure and efficient data transmission methods. However, there is a tradeoff in the image quality and hiding capacity in the data hiding methods. Therefore, the maximum amount of data that could be stored in the image media is a difficult challenge while maintaining the image quality. Thus, to make the balance between the quality of the images and the embedding capacity, a novel interpolation-based revisable data hiding (RDH) approach is developed for IoT applications. The proposed interpolation technique takes the average of the root value for the product of two neighboring original pixel values and the third original pixel value. And for the central pixel, it takes an average of two interpolated pixels. By doing so, most of the original pixels are considered and the calculated interpolated pixel is much enhanced as its average value. Furthermore, the data hiding is performed in two stages. In the first stage, RSA is performed on the secret message, and then embedding is done based on which intensity range group. The experimental results indicate that the proposed technique enhanced the embedding capacity by 17.58% and produced 7.80% higher PSNR values for the test images as compared to the baseline methods.","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135240927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-31DOI: 10.1007/s43926-023-00045-2
Shahid Ul Haq, Yashwant Singh, Amit Sharma, Rahul Gupta, Dipak Gupta
Abstract IoT and Embedded devices grow at an exponential rate, however, without adequate security mechanisms in place. One of the key challenges in the cyber world is the security of these devices. One of the main reasons that these devices are active targets for large-scale cyber-attacks is a lack of security standards and thorough testing by manufacturers. Manufacturer-specific operating systems or firmware of various architectures and characteristics are typically included with these devices. However, due to a lack of security testing and/or late patching, the underlying firmware or operating systems are vulnerable to numerous types of vulnerabilities. Reverse engineering and in-depth research of the firmware is required to detect the vulnerabilities. In this paper, we've delved into various aspects of IoT and embedded devices. This includes a comprehensive survey on the architecture of firmware, techniques for firmware extraction, and state-of-the-art vulnerability analysis frameworks for the detection of vulnerabilities using various approaches like static, dynamic, and hybrid approaches. Furthermore, we’ve scrutinized the challenges of existing vulnerability analysis frameworks and proposed a novel framework to address these issues.
{"title":"A survey on IoT & embedded device firmware security: architecture, extraction techniques, and vulnerability analysis frameworks","authors":"Shahid Ul Haq, Yashwant Singh, Amit Sharma, Rahul Gupta, Dipak Gupta","doi":"10.1007/s43926-023-00045-2","DOIUrl":"https://doi.org/10.1007/s43926-023-00045-2","url":null,"abstract":"Abstract IoT and Embedded devices grow at an exponential rate, however, without adequate security mechanisms in place. One of the key challenges in the cyber world is the security of these devices. One of the main reasons that these devices are active targets for large-scale cyber-attacks is a lack of security standards and thorough testing by manufacturers. Manufacturer-specific operating systems or firmware of various architectures and characteristics are typically included with these devices. However, due to a lack of security testing and/or late patching, the underlying firmware or operating systems are vulnerable to numerous types of vulnerabilities. Reverse engineering and in-depth research of the firmware is required to detect the vulnerabilities. In this paper, we've delved into various aspects of IoT and embedded devices. This includes a comprehensive survey on the architecture of firmware, techniques for firmware extraction, and state-of-the-art vulnerability analysis frameworks for the detection of vulnerabilities using various approaches like static, dynamic, and hybrid approaches. Furthermore, we’ve scrutinized the challenges of existing vulnerability analysis frameworks and proposed a novel framework to address these issues.","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135809205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-19DOI: 10.1007/s43926-023-00046-1
Christoph Lipps, Jan Herbst, Steffen Klingel, Lars Franke, Alexander Wolff, Matthias Rüb, Rekha Reddy, Marco Rahm, Hans Dieter Schotten
Abstract What are the key drivers of the (Industrial) Internet of Things ((I)IoT)? Alongside the interconnection of the various devices, sensors, and actuators, it is above all the data collected and transmitted that is of particular significance, the (I)IoT itself is the source and recipient of various types of data. Within this, there are two main aspects that need to be considered: (i) the transmission of data with appropriate latency and reliability requirements, and (ii) the safeguarding of this data. Both requirements are taken into account during the development of the Sixth Generation (6G) Wireless Systems. This is conceived to deliver higher data rates, reduced cost deployment, and enhanced reliability while providing universal connectivity. Hence, to assist such a vast network domain, (new) 6G-enabling technologies are developed, which include Reconfigurable Intelligent Surfaces (RISs), that are capable of modifying and reconfiguring the wireless propagation channels. This work describes concepts on how security, in particular Physical Layer Security (PhySec) methods, can be supported by RISs. Furthermore, an effective impedance surface model is presented, allowing efficient simulation of beamsplitting and shaping properties of RISs. Finally, the applicability of the use cases is mentioned, with a particular focus on Visible Light Communication (VLC).
{"title":"Connectivity in the era of the (I)IoT: about security, features and limiting factors of reconfigurable intelligent surfaces","authors":"Christoph Lipps, Jan Herbst, Steffen Klingel, Lars Franke, Alexander Wolff, Matthias Rüb, Rekha Reddy, Marco Rahm, Hans Dieter Schotten","doi":"10.1007/s43926-023-00046-1","DOIUrl":"https://doi.org/10.1007/s43926-023-00046-1","url":null,"abstract":"Abstract What are the key drivers of the (Industrial) Internet of Things ((I)IoT)? Alongside the interconnection of the various devices, sensors, and actuators, it is above all the data collected and transmitted that is of particular significance, the (I)IoT itself is the source and recipient of various types of data. Within this, there are two main aspects that need to be considered: (i) the transmission of data with appropriate latency and reliability requirements, and (ii) the safeguarding of this data. Both requirements are taken into account during the development of the Sixth Generation (6G) Wireless Systems. This is conceived to deliver higher data rates, reduced cost deployment, and enhanced reliability while providing universal connectivity. Hence, to assist such a vast network domain, (new) 6G-enabling technologies are developed, which include Reconfigurable Intelligent Surfaces (RISs), that are capable of modifying and reconfiguring the wireless propagation channels. This work describes concepts on how security, in particular Physical Layer Security (PhySec) methods, can be supported by RISs. Furthermore, an effective impedance surface model is presented, allowing efficient simulation of beamsplitting and shaping properties of RISs. Finally, the applicability of the use cases is mentioned, with a particular focus on Visible Light Communication (VLC).","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135779421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-16DOI: 10.1007/s43926-023-00047-0
Eralda Caushaj, Vijayan Sugumaran
Abstract Current mobile platforms pose many privacy risks for the users. Android applications (apps) request access to device resources and data, such as storage, GPS location, camera, microphone, SMS, phone identity, and network information. Legitimate mobile apps, advertisements (ads), and malware all require access to mobile resources and data to function properly. Therefore, it is difficult for the user to make informed decisions that effectively balance their privacy and app functionality. This study analyzes the Android application permissions, ad networks and the impact on end-user’s privacy. Dangerous combinations of app permissions, and ad networks are used as features in our prediction models to understand the behavior of apps. Our models have a high classification accuracy of 95.9% considering the imbalance in real life between benign and malicious apps. Our assumption that certain app permissions can be a potential threat to the privacy of end users is confirmed to be one of the most impactful features of our prediction models. Since our study considers the impact of ad networks and malware permissions, it will help end-users make more informed decision about the app permissions they grant and understand that the app permissions open doors to more vulnerabilities, and at some point, benign apps can behave maliciously.
{"title":"Classification and security assessment of android apps","authors":"Eralda Caushaj, Vijayan Sugumaran","doi":"10.1007/s43926-023-00047-0","DOIUrl":"https://doi.org/10.1007/s43926-023-00047-0","url":null,"abstract":"Abstract Current mobile platforms pose many privacy risks for the users. Android applications (apps) request access to device resources and data, such as storage, GPS location, camera, microphone, SMS, phone identity, and network information. Legitimate mobile apps, advertisements (ads), and malware all require access to mobile resources and data to function properly. Therefore, it is difficult for the user to make informed decisions that effectively balance their privacy and app functionality. This study analyzes the Android application permissions, ad networks and the impact on end-user’s privacy. Dangerous combinations of app permissions, and ad networks are used as features in our prediction models to understand the behavior of apps. Our models have a high classification accuracy of 95.9% considering the imbalance in real life between benign and malicious apps. Our assumption that certain app permissions can be a potential threat to the privacy of end users is confirmed to be one of the most impactful features of our prediction models. Since our study considers the impact of ad networks and malware permissions, it will help end-users make more informed decision about the app permissions they grant and understand that the app permissions open doors to more vulnerabilities, and at some point, benign apps can behave maliciously.","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136112464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}