Pub Date : 2019-10-01DOI: 10.1109/CSNet47905.2019.9108938
Fathima James
The Internet of Things (IoT) devices are becoming more popular in various domains such as e-Home, e-Health, e-Commerce, e-banking, e-Enterprises, e-Learning and e-Trafficking. The IoT is not only connecting computer and mobile devices, it also interconnects smart homes, buildings, companies and cities.With increased deployment of IoT devices in domestic smart home environment, the threats and challenges also need to be addressed in order to improve and build a secure and resilient cybersecurity based IoT smart infrastructure. Moreover, IoT smart environment tackles more security issues than traditional computer networks usually do. While many researchers are trying to explore the security challenges and open problems in smart home based IoT infrastructure, there is a lack of a systematic study of the security challenges in the IoT cybersecurity landscape. However, Smart home environment and IoT services will introduce significant security challenges due to the substantial increase in the number of computing resources, attack surface, communications infrastructure and attack rates. In this paper, we intent to fulfil this gap by executing the IoT cybersecurity-based attacks to detect the most critical attacks for smart home IoT end devices. At the same time, we present our intrusion prevention system methodology in order to protect the affected system from future attacks.
{"title":"IoT Cybersecurity based Smart Home Intrusion Prevention System","authors":"Fathima James","doi":"10.1109/CSNet47905.2019.9108938","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108938","url":null,"abstract":"The Internet of Things (IoT) devices are becoming more popular in various domains such as e-Home, e-Health, e-Commerce, e-banking, e-Enterprises, e-Learning and e-Trafficking. The IoT is not only connecting computer and mobile devices, it also interconnects smart homes, buildings, companies and cities.With increased deployment of IoT devices in domestic smart home environment, the threats and challenges also need to be addressed in order to improve and build a secure and resilient cybersecurity based IoT smart infrastructure. Moreover, IoT smart environment tackles more security issues than traditional computer networks usually do. While many researchers are trying to explore the security challenges and open problems in smart home based IoT infrastructure, there is a lack of a systematic study of the security challenges in the IoT cybersecurity landscape. However, Smart home environment and IoT services will introduce significant security challenges due to the substantial increase in the number of computing resources, attack surface, communications infrastructure and attack rates. In this paper, we intent to fulfil this gap by executing the IoT cybersecurity-based attacks to detect the most critical attacks for smart home IoT end devices. At the same time, we present our intrusion prevention system methodology in order to protect the affected system from future attacks.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115491617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/CSNet47905.2019.9108846
Nour El Madhoun, E. Bertin, G. Pujolle
EMV (Europay MasterCard Visa) is the technical international protocol implemented to secure the communication, between a client’s payment device and a PoS (Point of Sale), during a contact or contactless-NFC purchase transaction. In this paper, we are interested in examining the reliability of this protocol.
{"title":"The EMV Payment System: Is It Reliable?","authors":"Nour El Madhoun, E. Bertin, G. Pujolle","doi":"10.1109/CSNet47905.2019.9108846","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108846","url":null,"abstract":"EMV (Europay MasterCard Visa) is the technical international protocol implemented to secure the communication, between a client’s payment device and a PoS (Point of Sale), during a contact or contactless-NFC purchase transaction. In this paper, we are interested in examining the reliability of this protocol.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130337600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/CSNet47905.2019.9108970
Kodjo Edem Agbezoutsi, P. Urien, Toundé Mesmin Dandjinou
This paper discusses a new approach to mobile money, a money transfer solution via mobile phone, which uses accounts associated with SIM (Subscriber Identity Module) identifiers, and which are managed by the Mobile Network Operators (MNOs). The first solution launched in Kenya in 2007, M-PESA is one of the world major mobile money services. Mobile money becomes the new monopoly of MMOs in an economic system where the rate of unbanked adults is very high. Currently in 2019 Orange Money makes nearly 1.5 million transactions per day, which corresponds to a monetary value of nearly 15 billion CFA francs per day. The USSD is the technology at the heart of the Mobile-money transactions. Blockchain, which is the underlying technology of the first crypto currency Bitcoin, has drawn a lot of global attention in recent years. Blockchain does not stop seeing its field of action widen. The field of action of the Blockchain has not yet completed its enlargement. The rate of unbanked is still very high in developing countries; this rate is a factor that does not favor the emergence of the economy. It is necessary to count on the mobile money to skip this obstacle (according to the World Bank) we make here the state of the art on the mobile money and its underlying technologies in the sub-Saharan countries and in Burkina-Faso. We propose a mobile-money solution based on the Blockchain, in order to increase security, trust, and move towards a federation of mobile-money platforms.
{"title":"Towards Blockchain Services For Mobile Money Traceability And Federation","authors":"Kodjo Edem Agbezoutsi, P. Urien, Toundé Mesmin Dandjinou","doi":"10.1109/CSNet47905.2019.9108970","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108970","url":null,"abstract":"This paper discusses a new approach to mobile money, a money transfer solution via mobile phone, which uses accounts associated with SIM (Subscriber Identity Module) identifiers, and which are managed by the Mobile Network Operators (MNOs). The first solution launched in Kenya in 2007, M-PESA is one of the world major mobile money services. Mobile money becomes the new monopoly of MMOs in an economic system where the rate of unbanked adults is very high. Currently in 2019 Orange Money makes nearly 1.5 million transactions per day, which corresponds to a monetary value of nearly 15 billion CFA francs per day. The USSD is the technology at the heart of the Mobile-money transactions. Blockchain, which is the underlying technology of the first crypto currency Bitcoin, has drawn a lot of global attention in recent years. Blockchain does not stop seeing its field of action widen. The field of action of the Blockchain has not yet completed its enlargement. The rate of unbanked is still very high in developing countries; this rate is a factor that does not favor the emergence of the economy. It is necessary to count on the mobile money to skip this obstacle (according to the World Bank) we make here the state of the art on the mobile money and its underlying technologies in the sub-Saharan countries and in Burkina-Faso. We propose a mobile-money solution based on the Blockchain, in order to increase security, trust, and move towards a federation of mobile-money platforms.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125991149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/CSNet47905.2019.9108941
Fathima James
Security has been identified as one of the top barriers of Internet of Things (IoT) based smart home environment. The vulnerabilities in IoT based systems produce security threats and challenges that affect smart environment applications. Since smart home is the fastest developing field of IoT technology, it provides innovative, intellectual, ubiquitous and interactive services to users using different operations. Due to internet-connected, dynamic and heterogeneous nature, smart home environment creates new security, authentication, access control and privacy challenges. To increase information security and integrity, the IoT based smart environment crucially needs an attack model along with a risk management framework. In this paper, we propose the finite state automata-based attack model in order to investigate smart home based security attacks and then evaluate their impact with our proposed risk management framework in order to mitigate IoT smart home related crucial attacks. Finally, through the analysis of typical attack behavior and risk management framework, it shows that the proposed framework is practicable and effective.
{"title":"A Risk Management Framework and A Generalized Attack Automata for IoT based Smart Home Environment","authors":"Fathima James","doi":"10.1109/CSNet47905.2019.9108941","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108941","url":null,"abstract":"Security has been identified as one of the top barriers of Internet of Things (IoT) based smart home environment. The vulnerabilities in IoT based systems produce security threats and challenges that affect smart environment applications. Since smart home is the fastest developing field of IoT technology, it provides innovative, intellectual, ubiquitous and interactive services to users using different operations. Due to internet-connected, dynamic and heterogeneous nature, smart home environment creates new security, authentication, access control and privacy challenges. To increase information security and integrity, the IoT based smart environment crucially needs an attack model along with a risk management framework. In this paper, we propose the finite state automata-based attack model in order to investigate smart home based security attacks and then evaluate their impact with our proposed risk management framework in order to mitigate IoT smart home related crucial attacks. Finally, through the analysis of typical attack behavior and risk management framework, it shows that the proposed framework is practicable and effective.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"93 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120850651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/CSNet47905.2019.9108962
C. Tietz, Eric Klieme, Lukas Behrendt, Pawel Böning, Leonard Marschke, C. Meinel
This paper evaluates authentication based on sounds emitted while typing on a laptop’s keyboard only with the help of the integrated microphones and a smartphone placed nearby. The sound samples of 26 individuals were recorded in a novel real-world scenario using only web technologies. The data of laptop and the smartphone was compared based on existing approaches. They can reach Equal-Error-Rates (EERs) of 11.2% on the laptop data and 9.3% on the smartphone data.
{"title":"Verification of Keyboard Acoustics Authentication on Laptops and Smartphones Using WebRTC","authors":"C. Tietz, Eric Klieme, Lukas Behrendt, Pawel Böning, Leonard Marschke, C. Meinel","doi":"10.1109/CSNet47905.2019.9108962","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108962","url":null,"abstract":"This paper evaluates authentication based on sounds emitted while typing on a laptop’s keyboard only with the help of the integrated microphones and a smartphone placed nearby. The sound samples of 26 individuals were recorded in a novel real-world scenario using only web technologies. The data of laptop and the smartphone was compared based on existing approaches. They can reach Equal-Error-Rates (EERs) of 11.2% on the laptop data and 9.3% on the smartphone data.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122785969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/CSNet47905.2019.9108945
R. Koning, A. Deljoo, Lydia Meijer, C. D. Laat, P. Grosso
Collaborative defences against, for example, Distributed Denial of Service attacks require trust between the collaborators. Even in a trusted alliance of collaborators, some members are more trusted than others with the execution of a specific task. This paper shows that trust can be used as a criterion in collaborative defences against attacks on computer infrastructures. We evaluate the implementation of a trust based defence in an overlay network and compare its’ performance to other collaborative defences in the same environment. Results show that the trust-based defence has comparable results to the other collaborative defences after the trust values converge to reflect the behaviour of the nodes.
{"title":"Trust-based collaborative defences in multi network alliances","authors":"R. Koning, A. Deljoo, Lydia Meijer, C. D. Laat, P. Grosso","doi":"10.1109/CSNet47905.2019.9108945","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108945","url":null,"abstract":"Collaborative defences against, for example, Distributed Denial of Service attacks require trust between the collaborators. Even in a trusted alliance of collaborators, some members are more trusted than others with the execution of a specific task. This paper shows that trust can be used as a criterion in collaborative defences against attacks on computer infrastructures. We evaluate the implementation of a trust based defence in an overlay network and compare its’ performance to other collaborative defences in the same environment. Results show that the trust-based defence has comparable results to the other collaborative defences after the trust values converge to reflect the behaviour of the nodes.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133336139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/CSNet47905.2019.9108944
Solange Ghernaouti, L. Cellier, Bastien Wanner
This article focuses on the importance of information sharing practices for capacity building competences in the field of cybersecurity.It analyses needs and constraints of information sharing to produce security and cyberresilience that promote trust and confidence in cyberspace. It identifies the different types of information that can be shared as well as the main vectors for supporting information sharing. By proposing five applications of information sharing in cybersecurity, it focusses on education and warning in order to enforce people competencies.High-level recommendations are proposed in conclusion for the establishment of a platform for information sharing and analysis.
{"title":"Information sharing in cybersecurity : Enhancing security, trust and privacy by capacity building","authors":"Solange Ghernaouti, L. Cellier, Bastien Wanner","doi":"10.1109/CSNet47905.2019.9108944","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108944","url":null,"abstract":"This article focuses on the importance of information sharing practices for capacity building competences in the field of cybersecurity.It analyses needs and constraints of information sharing to produce security and cyberresilience that promote trust and confidence in cyberspace. It identifies the different types of information that can be shared as well as the main vectors for supporting information sharing. By proposing five applications of information sharing in cybersecurity, it focusses on education and warning in order to enforce people competencies.High-level recommendations are proposed in conclusion for the establishment of a platform for information sharing and analysis.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124055056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}