首页 > 最新文献

2019 3rd Cyber Security in Networking Conference (CSNet)最新文献

英文 中文
Bluetooth Low Energy Makes “Just Works” Not Work 低功耗蓝牙使“刚刚工作”不工作
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108931
K. Lounis, Mohammad Zulkernine
BLE (Bluetooth Low Energy) is being heavily deployed in many devices and IoT (Internet of Things) smart applications of various fields, such as medical, home automation, transportation and agriculture. It has transformed the classic Bluetooth into a technology that can be embedded into resource constrained devices running on a cell coin battery for months or years. Most BLE devices that are sold in the market use the Just Works pairing mode to establish a connection with peer devices. This mode is so lightweight that it leaves the implementation of security to application developers and device manufacturers. Unfortunately, as the market does not want to pay for security, a number of vulnerable smart devices are strolling around in the market. In this paper, we discuss how Bluetooth devices that use the Just Works pairing mode can be exploited to become nonoperational. We conduct a case study on three different Bluetooth smart devices. We show how these devices can be attacked and abused to not work properly. We also present a vulnerability that is due to the behavior of BLE smart devices and the Just Works pairing mode. This vulnerability can be exploited to generate an attack that affects BLE availability. We propose a solution to mitigate the attack.
BLE(低功耗蓝牙)正被大量部署在医疗、家庭自动化、交通和农业等各个领域的许多设备和IoT(物联网)智能应用中。它将传统的蓝牙技术转变为一种技术,可以嵌入到资源有限的设备中,使用纽扣电池运行数月或数年。市场上销售的BLE设备大多采用Just Works配对模式与对端设备建立连接。这种模式非常轻量级,它将安全的实现留给了应用程序开发人员和设备制造商。不幸的是,由于市场不愿意为安全付费,许多易受攻击的智能设备在市场上闲逛。在本文中,我们讨论了使用Just Works配对模式的蓝牙设备如何被利用成为不可操作的。我们对三种不同的蓝牙智能设备进行了案例研究。我们将展示这些设备是如何被攻击和滥用而无法正常工作的。我们还提出了一个漏洞,该漏洞是由于BLE智能设备和Just Works配对模式的行为。可利用此漏洞生成影响BLE可用性的攻击。我们提出了一个减轻攻击的解决方案。
{"title":"Bluetooth Low Energy Makes “Just Works” Not Work","authors":"K. Lounis, Mohammad Zulkernine","doi":"10.1109/CSNet47905.2019.9108931","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108931","url":null,"abstract":"BLE (Bluetooth Low Energy) is being heavily deployed in many devices and IoT (Internet of Things) smart applications of various fields, such as medical, home automation, transportation and agriculture. It has transformed the classic Bluetooth into a technology that can be embedded into resource constrained devices running on a cell coin battery for months or years. Most BLE devices that are sold in the market use the Just Works pairing mode to establish a connection with peer devices. This mode is so lightweight that it leaves the implementation of security to application developers and device manufacturers. Unfortunately, as the market does not want to pay for security, a number of vulnerable smart devices are strolling around in the market. In this paper, we discuss how Bluetooth devices that use the Just Works pairing mode can be exploited to become nonoperational. We conduct a case study on three different Bluetooth smart devices. We show how these devices can be attacked and abused to not work properly. We also present a vulnerability that is due to the behavior of BLE smart devices and the Just Works pairing mode. This vulnerability can be exploited to generate an attack that affects BLE availability. We propose a solution to mitigate the attack.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114327983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Dynamic security management driven by situations: An exploratory analysis of logs for the identification of security situations 由情况驱动的动态安全管理:对日志进行探索性分析,以识别安全情况
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108976
A. Benzekri, R. Laborde, Arnaud Oglaza, Darine Rammal, F. Barrère
Situation awareness consists of "the perception of the elements in the environment within a volume of time and space, the comprehension of their meaning, and the projection of their status in the near future". Being aware of the security situation is then mandatory to launch proper security reactions in response to cybersecurity attacks. Security Incident and Event Management solutions are deployed within Security Operation Centers. Some vendors propose machine learning based approaches to detect intrusions by analysing networks behaviours. But cyberattacks like Wannacry and NotPetya, which shut down hundreds of thousands of computers, demonstrated that networks monitoring and surveillance solutions remain insufficient. Detecting these complex attacks (a.k.a. Advanced Persistent Threats) requires security administrators to retain a large number of logs just in case problems are detected and involve the investigation of past security events. This approach generates massive data that have to be analysed at the right time in order to detect any accidental or caused incident. In the same time, security administrators are not yet seasoned to such a task and lack the desired skills in data science. As a consequence, a large amount of data is available and still remains unexplored which leaves number of indicators of compromise under the radar. Building on the concept of situation awareness, we developed a situation-driven framework, called dynSMAUG, for dynamic security management. This approach simplifies the security management of dynamic systems and allows the specification of security policies at a high-level of abstraction (close to security requirements). This invited paper aims at exposing real security situations elicitation, coming from networks security experts, and showing the results of exploratory analysis techniques using complex event processing techniques to identify and extract security situations from a large volume of logs. The results contributed to the extension of the dynSMAUG solution.
态势感知包括“在一定时间和空间范围内对环境要素的感知,对其意义的理解,以及对其近期状态的预测”。了解安全状况是必须的,这样才能针对网络安全攻击发起适当的安全反应。安全事件和事件管理解决方案部署在安全运营中心内。一些供应商提出了基于机器学习的方法,通过分析网络行为来检测入侵。但是,像Wannacry和NotPetya这样导致数十万台电脑关闭的网络攻击表明,网络监控和监控解决方案仍然不够。检测这些复杂的攻击(又称高级持久威胁)需要安全管理员保留大量日志,以备检测到问题时使用,并涉及对过去安全事件的调查。这种方法产生了大量的数据,必须在适当的时候进行分析,以检测任何意外或引起的事件。与此同时,安全管理员还没有足够的经验来完成这样的任务,并且缺乏所需的数据科学技能。因此,大量的数据是可用的,但仍未被探索,这使得许多妥协的指标在雷达之下。在态势感知概念的基础上,我们开发了一个态势驱动框架,称为dynSMAUG,用于动态安全管理。这种方法简化了动态系统的安全管理,并允许在高级抽象(接近安全需求)上规范安全策略。这篇特邀论文旨在揭示来自网络安全专家的真实安全情况,并展示利用复杂事件处理技术从大量日志中识别和提取安全情况的探索性分析技术的结果。这些结果有助于扩展dynSMAUG解决方案。
{"title":"Dynamic security management driven by situations: An exploratory analysis of logs for the identification of security situations","authors":"A. Benzekri, R. Laborde, Arnaud Oglaza, Darine Rammal, F. Barrère","doi":"10.1109/CSNet47905.2019.9108976","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108976","url":null,"abstract":"Situation awareness consists of \"the perception of the elements in the environment within a volume of time and space, the comprehension of their meaning, and the projection of their status in the near future\". Being aware of the security situation is then mandatory to launch proper security reactions in response to cybersecurity attacks. Security Incident and Event Management solutions are deployed within Security Operation Centers. Some vendors propose machine learning based approaches to detect intrusions by analysing networks behaviours. But cyberattacks like Wannacry and NotPetya, which shut down hundreds of thousands of computers, demonstrated that networks monitoring and surveillance solutions remain insufficient. Detecting these complex attacks (a.k.a. Advanced Persistent Threats) requires security administrators to retain a large number of logs just in case problems are detected and involve the investigation of past security events. This approach generates massive data that have to be analysed at the right time in order to detect any accidental or caused incident. In the same time, security administrators are not yet seasoned to such a task and lack the desired skills in data science. As a consequence, a large amount of data is available and still remains unexplored which leaves number of indicators of compromise under the radar. Building on the concept of situation awareness, we developed a situation-driven framework, called dynSMAUG, for dynamic security management. This approach simplifies the security management of dynamic systems and allows the specification of security policies at a high-level of abstraction (close to security requirements). This invited paper aims at exposing real security situations elicitation, coming from networks security experts, and showing the results of exploratory analysis techniques using complex event processing techniques to identify and extract security situations from a large volume of logs. The results contributed to the extension of the dynSMAUG solution.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124411964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Information Security Management Frameworks in Higher Education Institutions: An Overview 高等教育机构信息安全管理框架:综述
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108845
Jorge Merchan-Lima, Fabian Astudillo-Salinas, Luis Tello-Oquendo, Franklin L. Sanchez, Gabriel López, D. Quiroz
An overview of academic articles focused on information security management (ISM) in higher education institutions (HEIs) is presented. For this purpose, an empirical study was carried out. The articles found were then analyzed following a methodological procedure consisted of a systematic mapping study with their research questions, inclusion and exclusion criteria, selection of digital libraries, and analysis of the respective search strings. As a result, a set of information security management frameworks (ISMF) for HEIs were identified. They are based on standards such as ISO 27000, COBIT, ITIL, NIST and EDUCAUSE.
概述了高等教育机构(HEIs)信息安全管理(ISM)的学术文章。为此,本文进行了实证研究。然后,按照方法学程序对发现的文章进行分析,该方法学程序包括系统的测绘研究,研究问题,纳入和排除标准,数字图书馆的选择以及各自搜索字符串的分析。结果,为高等教育机构确定了一套资讯保安管理架构(ISMF)。它们基于ISO 27000、COBIT、ITIL、NIST和EDUCAUSE等标准。
{"title":"Information Security Management Frameworks in Higher Education Institutions: An Overview","authors":"Jorge Merchan-Lima, Fabian Astudillo-Salinas, Luis Tello-Oquendo, Franklin L. Sanchez, Gabriel López, D. Quiroz","doi":"10.1109/CSNet47905.2019.9108845","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108845","url":null,"abstract":"An overview of academic articles focused on information security management (ISM) in higher education institutions (HEIs) is presented. For this purpose, an empirical study was carried out. The articles found were then analyzed following a methodological procedure consisted of a systematic mapping study with their research questions, inclusion and exclusion criteria, selection of digital libraries, and analysis of the respective search strings. As a result, a set of information security management frameworks (ISMF) for HEIs were identified. They are based on standards such as ISO 27000, COBIT, ITIL, NIST and EDUCAUSE.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122612891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure and Fault-Tolerant Architecture for LoRaWAN Based on Blockchain 基于b区块链的LoRaWAN安全容错架构
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108933
Victor Pasknel de Alencar Ribeiro, R. H. Filho, A. Ramos
The Internet of Things (IoT) paradigm aims to bring continuous interaction between small embedded devices and humans. The IoT has the potential to affect our daily lives and bring many benefits to society. Low-Power Wide-Area Networks (LPWAN) is a new IoT technology that offers long distance connectivity for a massive number of devices. LPWAN is a promising solution to enable complex IoT scenarios, such as smart cities and smart healthcare. LoRa is currently one of the leading LPWAN solutions available for public use. Due to the great number of connected devices and, in some cases, sensitive data transmitted in IoT networks, security is one of the main concerns in LPWAN. In this paper, we focus on the issues of key management in LoRaWAN. We propose a secure architecture for key management based on private blockchain and smart contracts in order to increase the levels of security and availability in LoRaWAN environments. In order to show the feasibility of the proposed architecture, a working prototype was implemented using open-source tools and commodity hardware.
物联网(IoT)范式旨在实现小型嵌入式设备与人类之间的持续交互。物联网有可能影响我们的日常生活,并为社会带来许多好处。低功耗广域网(LPWAN)是一种新的物联网技术,可为大量设备提供长距离连接。LPWAN是一种很有前途的解决方案,可实现复杂的物联网场景,如智能城市和智能医疗保健。LoRa是目前可供公众使用的领先的LPWAN解决方案之一。由于连接的设备数量众多,在某些情况下,物联网网络中传输的敏感数据,安全性是LPWAN的主要关注点之一。本文主要研究LoRaWAN中的密钥管理问题。我们提出了一种基于私有区块链和智能合约的密钥管理安全架构,以提高LoRaWAN环境中的安全性和可用性。为了证明所提出的体系结构的可行性,使用开源工具和商用硬件实现了一个工作原型。
{"title":"A Secure and Fault-Tolerant Architecture for LoRaWAN Based on Blockchain","authors":"Victor Pasknel de Alencar Ribeiro, R. H. Filho, A. Ramos","doi":"10.1109/CSNet47905.2019.9108933","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108933","url":null,"abstract":"The Internet of Things (IoT) paradigm aims to bring continuous interaction between small embedded devices and humans. The IoT has the potential to affect our daily lives and bring many benefits to society. Low-Power Wide-Area Networks (LPWAN) is a new IoT technology that offers long distance connectivity for a massive number of devices. LPWAN is a promising solution to enable complex IoT scenarios, such as smart cities and smart healthcare. LoRa is currently one of the leading LPWAN solutions available for public use. Due to the great number of connected devices and, in some cases, sensitive data transmitted in IoT networks, security is one of the main concerns in LPWAN. In this paper, we focus on the issues of key management in LoRaWAN. We propose a secure architecture for key management based on private blockchain and smart contracts in order to increase the levels of security and availability in LoRaWAN environments. In order to show the feasibility of the proposed architecture, a working prototype was implemented using open-source tools and commodity hardware.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"110 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128733363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
XSStudent: Proposal to Avoid Cross-Site Scripting (XSS) Attacks in Universities 避免跨站脚本攻击(XSS)的建议
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108965
Germán E. Rodríguez, Jenny G. Torres, Pamela Flores, Eduardo Benavides, Daniel Nuñez-Agurto
QR codes are the means to offer more direct and instant access to information. However, QR codes have shown their deficiency, being a very powerful attack vector, for example, to execute phishing attacks. In this study, we have proposed a solution that allows controlling access to the information offered by QR codes. Through a scanner designed in APP Inventor which has been called XSStudent, a system has been built that analyzes the URLs obtained and compares them with a previously trained system. This study was executed by means of a controlled attack to the users of the university who through a flyer with a QR code and a fictional link accessed an infected page with JavaScript code that allowed a successful cross-site scripting attack. The results indicate that 100% of the users are vulnerable to this type of attacks, so also, with our proposal, an attack executed in the universities using the Beef software would be totally blocked.
QR码是提供更直接和即时获取信息的手段。然而,QR码已经显示出其不足之处,作为一种非常强大的攻击媒介,例如执行网络钓鱼攻击。在这项研究中,我们提出了一种解决方案,可以控制对QR码提供的信息的访问。通过在APP Inventor中设计的扫描器XSStudent,建立了一个系统,对获得的url进行分析,并将其与之前训练过的系统进行比较。这项研究是通过对大学用户的控制攻击来执行的,他们通过带有QR码和虚构链接的传单访问带有JavaScript代码的受感染页面,该JavaScript代码允许成功的跨站点脚本攻击。结果表明,100%的用户容易受到这种类型的攻击,因此,根据我们的建议,使用Beef软件在大学中执行的攻击将被完全阻止。
{"title":"XSStudent: Proposal to Avoid Cross-Site Scripting (XSS) Attacks in Universities","authors":"Germán E. Rodríguez, Jenny G. Torres, Pamela Flores, Eduardo Benavides, Daniel Nuñez-Agurto","doi":"10.1109/CSNet47905.2019.9108965","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108965","url":null,"abstract":"QR codes are the means to offer more direct and instant access to information. However, QR codes have shown their deficiency, being a very powerful attack vector, for example, to execute phishing attacks. In this study, we have proposed a solution that allows controlling access to the information offered by QR codes. Through a scanner designed in APP Inventor which has been called XSStudent, a system has been built that analyzes the URLs obtained and compares them with a previously trained system. This study was executed by means of a controlled attack to the users of the university who through a flyer with a QR code and a fictional link accessed an infected page with JavaScript code that allowed a successful cross-site scripting attack. The results indicate that 100% of the users are vulnerable to this type of attacks, so also, with our proposal, an attack executed in the universities using the Beef software would be totally blocked.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129866700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CSNet 2019 Program
Pub Date : 2019-10-01 DOI: 10.1109/csnet47905.2019.9108926
{"title":"CSNet 2019 Program","authors":"","doi":"10.1109/csnet47905.2019.9108926","DOIUrl":"https://doi.org/10.1109/csnet47905.2019.9108926","url":null,"abstract":"","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115325700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain-Encryption-Based Approach to Protect Fog Federations from Rogue Nodes 一种基于区块链加密的方法来保护雾联邦免受流氓节点的攻击
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108975
Mohammed S. Alshehri, B. Panda
People have used cloud computing approach to store their data remotely. As auspicious as this approach is, it brings forth many challenges: from data security to time latency issues with data computation as well as delivery to end users. Fog computing has emerged as an extension for cloud computing to bring data processing and storage close to end-users; however, it minimizes the time latency issue but still suffers from data security challenges. For instance, when a fog node providing services to end users is compromised, the users’ data security can be violated. Thus, this paper proposes a secure and fine-grained data access control scheme by integrating the Ciphertext Policy Attribute-Based Encryption (CP-ABE) algorithm and blockchain concept to prevent fog nodes from violating end users’ data security in a situation where a compromised fog node is being ousted. We also classify the fog nodes into fog federations, based on their attributes such as services and locations, to minimize the time latency and communication overhead between fog nodes and cloud server. Further, the exploitation and integration of the blockchain concept and the CP-ABE algorithm enables fog nodes in the same fog federation to perform the authorization process in a distributed manner. In addition, to solve time latency and communication overhead problems, we equip every fog node with an off-chain database to store most frequently accessed data files for specific time, and with an on-chain access control policies table (On-chain Files Tracking Table) which must be protected from being tampered by malicious (rogue) fog nodes. Therefore, blockchain plays a vital role here as it is tamper-proof by nature. We demonstrate our scheme’s efficiency and feasibility by designing algorithms and conducting a security analysis. The provided analysis shows that the proposed scheme is efficient and feasible in ousting malicious (rogue) fog nodes.
人们使用云计算方法来远程存储他们的数据。尽管这种方法很好,但它带来了许多挑战:从数据安全性到数据计算的时间延迟问题以及向最终用户的交付。雾计算作为云计算的延伸而出现,使数据处理和存储更接近最终用户;然而,它最大限度地减少了时间延迟问题,但仍然面临数据安全方面的挑战。例如,当向最终用户提供服务的雾节点受到损害时,可能会侵犯用户的数据安全性。因此,本文提出了一种安全的、细粒度的数据访问控制方案,该方案将基于密文策略属性的加密(cipher - abe)算法与区块链概念相结合,在被攻破的雾节点被驱逐的情况下,防止雾节点侵犯最终用户的数据安全。我们还根据雾节点的属性(如服务和位置)将雾节点分类为雾联盟,以最大限度地减少雾节点和云服务器之间的时间延迟和通信开销。此外,区块链概念和CP-ABE算法的利用和集成使同一雾联邦中的雾节点能够以分布式方式执行授权过程。此外,为了解决时间延迟和通信开销问题,我们为每个雾节点配备了一个链下数据库,用于存储特定时间访问最频繁的数据文件,并配备了一个链上访问控制策略表(链上文件跟踪表),必须防止被恶意(流氓)雾节点篡改。因此,区块链在这里起着至关重要的作用,因为它本质上是防篡改的。通过算法设计和安全性分析,验证了该方案的有效性和可行性。分析表明,该方案在驱逐恶意(流氓)雾节点方面是有效可行的。
{"title":"A Blockchain-Encryption-Based Approach to Protect Fog Federations from Rogue Nodes","authors":"Mohammed S. Alshehri, B. Panda","doi":"10.1109/CSNet47905.2019.9108975","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108975","url":null,"abstract":"People have used cloud computing approach to store their data remotely. As auspicious as this approach is, it brings forth many challenges: from data security to time latency issues with data computation as well as delivery to end users. Fog computing has emerged as an extension for cloud computing to bring data processing and storage close to end-users; however, it minimizes the time latency issue but still suffers from data security challenges. For instance, when a fog node providing services to end users is compromised, the users’ data security can be violated. Thus, this paper proposes a secure and fine-grained data access control scheme by integrating the Ciphertext Policy Attribute-Based Encryption (CP-ABE) algorithm and blockchain concept to prevent fog nodes from violating end users’ data security in a situation where a compromised fog node is being ousted. We also classify the fog nodes into fog federations, based on their attributes such as services and locations, to minimize the time latency and communication overhead between fog nodes and cloud server. Further, the exploitation and integration of the blockchain concept and the CP-ABE algorithm enables fog nodes in the same fog federation to perform the authorization process in a distributed manner. In addition, to solve time latency and communication overhead problems, we equip every fog node with an off-chain database to store most frequently accessed data files for specific time, and with an on-chain access control policies table (On-chain Files Tracking Table) which must be protected from being tampered by malicious (rogue) fog nodes. Therefore, blockchain plays a vital role here as it is tamper-proof by nature. We demonstrate our scheme’s efficiency and feasibility by designing algorithms and conducting a security analysis. The provided analysis shows that the proposed scheme is efficient and feasible in ousting malicious (rogue) fog nodes.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115630287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Human Interaction Proofs (HIPs) based on Emerging Images and Topological Data Analysis (TDA) Techniques 基于新兴图像和拓扑数据分析(TDA)技术的人机交互证明
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108952
Maria Alejandra Osorio Angarita, E. Izquierdo, A. M. Cañadas
In this paper, we introduce an algorithm to generate emerging images which can be used to implement Human Interaction Proofs (HIPs) based on this kind of images. In a general setting we propose the design of proofs easy to solve by human beings but hard to solve by computer algorithms. These tests are able to tell apart human from bots (or robots) in order to protect online environments (as social networks, wikis, ticket sellers, free-email providers, etc) from different kind of security threats.Our proposal uses tools and techniques arising from TDA (point clouds, simplicial complexes and spatial triangulation among others), in order to create shapes which can be identified by humans as recognizable images hard to detect by machines.
本文介绍了一种生成新兴图像的算法,该算法可用于基于此类图像实现人机交互证明(HIPs)。在一般情况下,我们建议设计易于由人类解决但难以由计算机算法解决的证明。这些测试能够区分人类和机器人(或机器人),以保护在线环境(如社交网络、维基、售票员、免费电子邮件提供商等)免受不同类型的安全威胁。我们的提案使用了来自TDA(点云、简单复合体和空间三角测量等)的工具和技术,以创建可以被人类识别为难以被机器识别的可识别图像的形状。
{"title":"Human Interaction Proofs (HIPs) based on Emerging Images and Topological Data Analysis (TDA) Techniques","authors":"Maria Alejandra Osorio Angarita, E. Izquierdo, A. M. Cañadas","doi":"10.1109/CSNet47905.2019.9108952","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108952","url":null,"abstract":"In this paper, we introduce an algorithm to generate emerging images which can be used to implement Human Interaction Proofs (HIPs) based on this kind of images. In a general setting we propose the design of proofs easy to solve by human beings but hard to solve by computer algorithms. These tests are able to tell apart human from bots (or robots) in order to protect online environments (as social networks, wikis, ticket sellers, free-email providers, etc) from different kind of security threats.Our proposal uses tools and techniques arising from TDA (point clouds, simplicial complexes and spatial triangulation among others), in order to create shapes which can be identified by humans as recognizable images hard to detect by machines.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116361610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CSNet 2019 Copyright Page CSNet 2019版权页面
Pub Date : 2019-10-01 DOI: 10.1109/csnet47905.2019.9108959
{"title":"CSNet 2019 Copyright Page","authors":"","doi":"10.1109/csnet47905.2019.9108959","DOIUrl":"https://doi.org/10.1109/csnet47905.2019.9108959","url":null,"abstract":"","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129397503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain-based Lightweight Authentication Solution for IoT 基于区块链的物联网轻量级认证解决方案
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108958
Achraf Fayad, Badis Hammi, R. Khatoun, A. Serhrouchni
Internet of Things (IoT) systems are almost a part of our daily lives. The security of this new paradigm had always faced many challenge in order to insure user privacy and authentication. These security issues are still far from being solved by the classical centralized architectures which reaches their limits in terms of scalability especially when thousands or tens of thousands of IoT devices are connected in the same network. To remedy this architectural issue, we rely on blockchains in order to propose a simple and lightweight blockchain-based authentication solution for IoT systems. We provided a real implementation of our proposed scheme relying on Ethereum blockchain and using different devices in order to confirm its feasibility and evaluate its initial performances. The results obtained confirm its suitability to such environments.
物联网(IoT)系统几乎是我们日常生活的一部分。为了确保用户隐私和身份验证,这种新范式的安全性一直面临着许多挑战。这些安全问题还远远不能通过经典的集中式架构来解决,这些架构在可扩展性方面达到了极限,特别是当数千或数万个物联网设备连接在同一个网络中时。为了解决这个架构问题,我们依靠区块链来为物联网系统提出一个简单轻量级的基于区块链的身份验证解决方案。我们提供了一个基于以太坊区块链的方案的真实实现,并使用不同的设备来确认其可行性并评估其初始性能。实验结果证实了该方法在这种环境下的适用性。
{"title":"A Blockchain-based Lightweight Authentication Solution for IoT","authors":"Achraf Fayad, Badis Hammi, R. Khatoun, A. Serhrouchni","doi":"10.1109/CSNet47905.2019.9108958","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108958","url":null,"abstract":"Internet of Things (IoT) systems are almost a part of our daily lives. The security of this new paradigm had always faced many challenge in order to insure user privacy and authentication. These security issues are still far from being solved by the classical centralized architectures which reaches their limits in terms of scalability especially when thousands or tens of thousands of IoT devices are connected in the same network. To remedy this architectural issue, we rely on blockchains in order to propose a simple and lightweight blockchain-based authentication solution for IoT systems. We provided a real implementation of our proposed scheme relying on Ethereum blockchain and using different devices in order to confirm its feasibility and evaluate its initial performances. The results obtained confirm its suitability to such environments.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130110233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 3rd Cyber Security in Networking Conference (CSNet)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1