首页 > 最新文献

2021 Eighth International Conference on Software Defined Systems (SDS)最新文献

英文 中文
The Eighth International Conference on Software Defined Systems (SDS-2021) [Front matter] 第八届软件定义系统国际会议(SDS-2021)[简报]
Pub Date : 2021-12-06 DOI: 10.1109/sds54264.2021.9732088
{"title":"The Eighth International Conference on Software Defined Systems (SDS-2021) [Front matter]","authors":"","doi":"10.1109/sds54264.2021.9732088","DOIUrl":"https://doi.org/10.1109/sds54264.2021.9732088","url":null,"abstract":"","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115690093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel File-Checksum Method for Data Duplication Removal of Patients 一种消除病人数据重复的文件校验和方法
Pub Date : 2021-12-06 DOI: 10.1109/SDS54264.2021.9732163
Abdul Razaque, Muder Almiani, Bandar Alotaibi, M. Alotaibi, Mohammed Alweshah
Nowadays, with rapid technology development, individuals have become capable of storing a large amount of information in virtual storage. Even medical organizations use virtual repositories to store important patient data, including personal data, medical histories, and records for medical services. With the database, medical organizations process the available data and take measures to improve the quality of services. When processing statistical and customer review information, there may be inaccuracies due to duplication of patient data. Duplication of data usually occurs through the mistakes of staff members. In this paper, we introduce a novel checksum method for data duplication (CMDD). The checksum method is implemented using Java Platform. Based on the testing results, we are capable of handling data duplication.
如今,随着科技的飞速发展,个人已经能够在虚拟存储中存储大量的信息。甚至医疗组织也使用虚拟存储库来存储重要的患者数据,包括个人数据、病史和医疗服务记录。借助该数据库,医疗机构可以处理可用数据并采取措施提高服务质量。在处理统计和客户评论信息时,由于患者数据的重复,可能存在不准确性。数据重复通常是由于工作人员的错误造成的。本文提出了一种新的数据复制校验和方法。校验和方法是在Java平台上实现的。根据测试结果,我们能够处理数据重复。
{"title":"Novel File-Checksum Method for Data Duplication Removal of Patients","authors":"Abdul Razaque, Muder Almiani, Bandar Alotaibi, M. Alotaibi, Mohammed Alweshah","doi":"10.1109/SDS54264.2021.9732163","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9732163","url":null,"abstract":"Nowadays, with rapid technology development, individuals have become capable of storing a large amount of information in virtual storage. Even medical organizations use virtual repositories to store important patient data, including personal data, medical histories, and records for medical services. With the database, medical organizations process the available data and take measures to improve the quality of services. When processing statistical and customer review information, there may be inaccuracies due to duplication of patient data. Duplication of data usually occurs through the mistakes of staff members. In this paper, we introduce a novel checksum method for data duplication (CMDD). The checksum method is implemented using Java Platform. Based on the testing results, we are capable of handling data duplication.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116981131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Joint Controller Placement for Latency and Reliability-Aware Control Plane 时延和可靠性感知控制平面的联合控制器布局评估
Pub Date : 2021-12-06 DOI: 10.1109/SDS54264.2021.9731852
Kurdman Abdulrahman Rasol Rasol, J. Domingo-Pascual
The separation of the forwarding and control planes in software-defined networking provides flexibility for network management. The Controller Placement Problem (CPP) is an important issue affecting network performance. This paper presents an evaluation of the Joint Latency and Reliability-aware Controller Placement (LRCP) optimization model. LRCP provides network administrators with flexible choices to simultaneously achieve a trade-off between the switch-to-controller latency and the controller-to-controller latency, including the reliability aspect using alternative backup paths. Control plane latency (CPL) is used as the evaluation metric and it is defined as the sum of average switch-to-controller latency and the average inter-controller latency. For each optimal placement in the network, the control plane latency using the real latencies of the real network topology is computed. Results from the control plane latency metric show how the number and location of controllers influence the reliability of the network. In the event of a single link failure, the real CPL for LRCP placements is computed and assesses how good the LRCP placements are. The CPL metric is used to compare with other models using latency and reliability metrics.
软件定义组网中转发平面和控制平面的分离为网络管理提供了灵活性。控制器放置问题是影响网络性能的一个重要问题。本文对联合时延和可靠性感知控制器布局优化模型进行了评价。LRCP为网络管理员提供了灵活的选择,可以同时在交换机到控制器的延迟和控制器到控制器的延迟之间实现权衡,包括使用备用备份路径的可靠性方面。控制平面时延(CPL)作为评价指标,定义为切换到控制器的平均时延和控制器间的平均时延之和。对于网络中的每个最优位置,使用实际网络拓扑的实际延迟计算控制平面延迟。控制平面延迟度量的结果显示了控制器的数量和位置如何影响网络的可靠性。在单链路故障的情况下,计算LRCP放置的实际CPL,并评估LRCP放置的好坏。CPL指标用于与使用延迟和可靠性指标的其他模型进行比较。
{"title":"Evaluation of Joint Controller Placement for Latency and Reliability-Aware Control Plane","authors":"Kurdman Abdulrahman Rasol Rasol, J. Domingo-Pascual","doi":"10.1109/SDS54264.2021.9731852","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9731852","url":null,"abstract":"The separation of the forwarding and control planes in software-defined networking provides flexibility for network management. The Controller Placement Problem (CPP) is an important issue affecting network performance. This paper presents an evaluation of the Joint Latency and Reliability-aware Controller Placement (LRCP) optimization model. LRCP provides network administrators with flexible choices to simultaneously achieve a trade-off between the switch-to-controller latency and the controller-to-controller latency, including the reliability aspect using alternative backup paths. Control plane latency (CPL) is used as the evaluation metric and it is defined as the sum of average switch-to-controller latency and the average inter-controller latency. For each optimal placement in the network, the control plane latency using the real latencies of the real network topology is computed. Results from the control plane latency metric show how the number and location of controllers influence the reliability of the network. In the event of a single link failure, the real CPL for LRCP placements is computed and assesses how good the LRCP placements are. The CPL metric is used to compare with other models using latency and reliability metrics.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122507571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SDS Organizers and Sponsors SDS组织者和发起人
Pub Date : 2021-12-06 DOI: 10.1109/sds54264.2021.9732110
{"title":"SDS Organizers and Sponsors","authors":"","doi":"10.1109/sds54264.2021.9732110","DOIUrl":"https://doi.org/10.1109/sds54264.2021.9732110","url":null,"abstract":"","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117250590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cognitive and Autonomic IoT System Design 认知与自主物联网系统设计
Pub Date : 2021-12-06 DOI: 10.1109/SDS54264.2021.9732121
B. Athamena, Z. Houhamdi
Currently, the Internet of Things (IoT) usage observes a drastic growth in several areas and participates in the rapid universe digitalization. Henceforward, the IoT systems next generation will be more difficult to develop and monitor. Gathering real-time data created by IoT triggers some novel opportunities for businesses to take at the right time more accurate and precise decisions. However, several challenges (such as IoT systems complexity and heterogeneous data management, and IoT system scalability) restrain the elaboration of IoT systems that are smart and impel business decision-making. This paper proposes to automatize IoT systems management using an autonomic computing approach. Nevertheless, autonomic computing is insufficient for smart IoT systems development. Actually, a smart IoT system implements cognitive abilities that allow its learning and decision-making in real-time. Therefore, this study proposes a model for designing smart IoT systems. It defines a set of cognitive design patterns that delineate the dynamiccooperation between management processes (MPs) (to handle the requirements evolvement and the system's environment unpredictability) and add cognitive capabilities to IoT systems (to generate new insights, perceive big data, and communicate with users). The study's primary goal is to support the developer in designing smart IoT systems that are flexible by choosing an appropriate pattern (or a set of patterns) to meet complex system requirements.
目前,物联网(IoT)在多个领域的应用急剧增长,并参与了快速的宇宙数字化。因此,下一代物联网系统将更加难以开发和监控。收集物联网创建的实时数据为企业带来了一些新的机会,可以在正确的时间做出更准确和精确的决策。然而,一些挑战(如物联网系统的复杂性和异构数据管理,以及物联网系统的可扩展性)限制了智能物联网系统的细化,并推动了业务决策。本文提出使用自主计算方法实现物联网系统管理的自动化。然而,自主计算对于智能物联网系统的开发是不够的。实际上,智能物联网系统实现了认知能力,使其能够实时学习和决策。因此,本研究提出了一个设计智能物联网系统的模型。它定义了一组认知设计模式,描述了管理流程(MPs)之间的动态合作(处理需求演变和系统环境的不可预测性),并为物联网系统增加了认知能力(产生新的见解,感知大数据,并与用户沟通)。该研究的主要目标是支持开发人员通过选择适当的模式(或一组模式)来设计灵活的智能物联网系统,以满足复杂的系统需求。
{"title":"Cognitive and Autonomic IoT System Design","authors":"B. Athamena, Z. Houhamdi","doi":"10.1109/SDS54264.2021.9732121","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9732121","url":null,"abstract":"Currently, the Internet of Things (IoT) usage observes a drastic growth in several areas and participates in the rapid universe digitalization. Henceforward, the IoT systems next generation will be more difficult to develop and monitor. Gathering real-time data created by IoT triggers some novel opportunities for businesses to take at the right time more accurate and precise decisions. However, several challenges (such as IoT systems complexity and heterogeneous data management, and IoT system scalability) restrain the elaboration of IoT systems that are smart and impel business decision-making. This paper proposes to automatize IoT systems management using an autonomic computing approach. Nevertheless, autonomic computing is insufficient for smart IoT systems development. Actually, a smart IoT system implements cognitive abilities that allow its learning and decision-making in real-time. Therefore, this study proposes a model for designing smart IoT systems. It defines a set of cognitive design patterns that delineate the dynamiccooperation between management processes (MPs) (to handle the requirements evolvement and the system's environment unpredictability) and add cognitive capabilities to IoT systems (to generate new insights, perceive big data, and communicate with users). The study's primary goal is to support the developer in designing smart IoT systems that are flexible by choosing an appropriate pattern (or a set of patterns) to meet complex system requirements.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122945628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
[Copyright notice] (版权)
Pub Date : 2021-12-06 DOI: 10.1109/sds54264.2021.9732146
{"title":"[Copyright notice]","authors":"","doi":"10.1109/sds54264.2021.9732146","DOIUrl":"https://doi.org/10.1109/sds54264.2021.9732146","url":null,"abstract":"","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125378403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can the User Help? Leveraging User Actions for Network Profiling 用户能提供帮助吗?利用用户操作进行网络分析
Pub Date : 2021-12-06 DOI: 10.1109/SDS54264.2021.9732164
Zorigtbaatar Chuluundorj, Curtis R. Taylor, R. Walls, Craig A. Shue
Enterprises have difficulty gaining insight into the steps preceding anomalous activity in end-user machines. En-terprises may log events to later reconstruct anomalies to gain insight and determine their causes. Unfortunately, most logs are low-level and lack contextual information, making manual inspection arduous. Accordingly, enterprises may fail to promptly respond to anomalies, leading to outages or security breaches. To help these enterprises, we monitor and log each user's interactions with the machine's user interface (UI) and link them to the resulting network flows. We design, implement, and evaluate an SDN system, called Harbinger, for the Microsoft Windows OS that provides user activity context for flows. Enterprises can use the context we gather to complement traditional analysis. We explore how Harbinger can help differentiate normal and abnormal network traffic. While IP or DNS host name profiling can have error rates between 29%-38 % for URL-based traffic, UI-aware sensors can reduce such errors to 0.2%. We further find that with the help of user action tracking, we can detect errant network traffic 99.1% of the time in our tests. HARBINGERhas good performance, introducing less than 6 milliseconds of delay in 95% of new network flows.
企业很难深入了解终端用户机器中异常活动之前的步骤。企业可能会记录事件,以便以后重建异常,以获得洞察力并确定其原因。不幸的是,大多数日志都是低级的,缺乏上下文信息,这使得手工检查非常困难。因此,企业可能无法及时应对异常,导致业务中断或安全漏洞。为了帮助这些企业,我们监视并记录每个用户与机器用户界面(UI)的交互,并将它们链接到生成的网络流。我们设计、实现和评估了一个SDN系统,称为Harbinger,用于Microsoft Windows操作系统,为流提供用户活动上下文。企业可以使用我们收集的上下文来补充传统的分析。我们将探讨Harbinger如何帮助区分正常和异常的网络流量。虽然IP或DNS主机名分析对于基于url的流量可能有29%- 38%的错误率,但ui感知传感器可以将此类错误率降低到0.2%。我们进一步发现,在用户动作跟踪的帮助下,我们可以在测试中检测到99.1%的错误网络流量。harbinger具有良好的性能,在95%的新网络流中引入不到6毫秒的延迟。
{"title":"Can the User Help? Leveraging User Actions for Network Profiling","authors":"Zorigtbaatar Chuluundorj, Curtis R. Taylor, R. Walls, Craig A. Shue","doi":"10.1109/SDS54264.2021.9732164","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9732164","url":null,"abstract":"Enterprises have difficulty gaining insight into the steps preceding anomalous activity in end-user machines. En-terprises may log events to later reconstruct anomalies to gain insight and determine their causes. Unfortunately, most logs are low-level and lack contextual information, making manual inspection arduous. Accordingly, enterprises may fail to promptly respond to anomalies, leading to outages or security breaches. To help these enterprises, we monitor and log each user's interactions with the machine's user interface (UI) and link them to the resulting network flows. We design, implement, and evaluate an SDN system, called Harbinger, for the Microsoft Windows OS that provides user activity context for flows. Enterprises can use the context we gather to complement traditional analysis. We explore how Harbinger can help differentiate normal and abnormal network traffic. While IP or DNS host name profiling can have error rates between 29%-38 % for URL-based traffic, UI-aware sensors can reduce such errors to 0.2%. We further find that with the help of user action tracking, we can detect errant network traffic 99.1% of the time in our tests. HARBINGERhas good performance, introducing less than 6 milliseconds of delay in 95% of new network flows.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133031394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Zero-Trust Access Control Focusing on Imbalanced Distribution in Browser Clickstreams 零信任访问控制关注浏览器点击流的不平衡分布
Pub Date : 2021-12-06 DOI: 10.1109/SDS54264.2021.9732109
Taisho Sasada, Yuto Masuda, Yuzo Taenaka, Y. Kadobayashi, Doudou Fall
The further spread of cloud computing and telework has led to an increase in borderless activities, which has expanded the demand for constructing Zero-Trust Access Control (ZTAC). In this context, preventing information leakage is an important issue, and to protect sensitive data and confidential information in a zero-trust, it is necessary to monitor the user's behavior after authentication and make sequential decisions about authorization. In this research, we monitor account's behavior such clickstreams on the browser and incorporate it to evaluation of user's trust in access control system. Through the construction of behavior-based ZTAC system based on clickstreams, we have achieved access control that considers the naturalness of clicks without relying on the results of authentication. Moreover, toward solving the mismatch of click count between the system side and the end-user side, we synchronously updated the clickstream by the user-agent which observing and retrieving the click events in the DOM. As experimental evaluation, we verified that our ZTAC can deal with click count discrepancy and completely prevent various insider threat to sensitive data from even authenticated accounts. Also, we confirmed no significant differences in response time, memory usage, or CPU usage before and after the migration of zero-trust, indicating that it can be deployed in existing enterprise networks.
云计算和远程办公的进一步普及导致无边界活动的增加,这扩大了构建零信任访问控制(ZTAC)的需求。在这种情况下,防止信息泄露是一个重要的问题,为了在零信任的状态下保护敏感数据和机密信息,需要对用户认证后的行为进行监控,并对授权进行顺序决策。在本研究中,我们监测帐户在浏览器上的行为,如点击流,并将其纳入访问控制系统中用户信任的评估。通过构建基于点击流的基于行为的ZTAC系统,实现了在不依赖于认证结果的情况下,考虑点击自然度的访问控制。此外,为了解决系统端和最终用户端点击次数不匹配的问题,我们通过用户代理在DOM中观察和检索点击事件来同步更新点击流。作为实验评估,我们验证了我们的ZTAC可以处理点击计数差异,并完全防止各种内部威胁,甚至通过身份验证的帐户的敏感数据。此外,我们确认零信任迁移前后在响应时间、内存使用或CPU使用方面没有显著差异,这表明它可以部署在现有的企业网络中。
{"title":"Zero-Trust Access Control Focusing on Imbalanced Distribution in Browser Clickstreams","authors":"Taisho Sasada, Yuto Masuda, Yuzo Taenaka, Y. Kadobayashi, Doudou Fall","doi":"10.1109/SDS54264.2021.9732109","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9732109","url":null,"abstract":"The further spread of cloud computing and telework has led to an increase in borderless activities, which has expanded the demand for constructing Zero-Trust Access Control (ZTAC). In this context, preventing information leakage is an important issue, and to protect sensitive data and confidential information in a zero-trust, it is necessary to monitor the user's behavior after authentication and make sequential decisions about authorization. In this research, we monitor account's behavior such clickstreams on the browser and incorporate it to evaluation of user's trust in access control system. Through the construction of behavior-based ZTAC system based on clickstreams, we have achieved access control that considers the naturalness of clicks without relying on the results of authentication. Moreover, toward solving the mismatch of click count between the system side and the end-user side, we synchronously updated the clickstream by the user-agent which observing and retrieving the click events in the DOM. As experimental evaluation, we verified that our ZTAC can deal with click count discrepancy and completely prevent various insider threat to sensitive data from even authenticated accounts. Also, we confirmed no significant differences in response time, memory usage, or CPU usage before and after the migration of zero-trust, indicating that it can be deployed in existing enterprise networks.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133656338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication of Mobile IoT Devices using HyperLedger Fabric Blockchain 使用HyperLedger Fabric区块链的移动物联网设备认证
Pub Date : 2021-12-06 DOI: 10.1109/SDS54264.2021.9732141
Nathalie Banoun, Nafissatou Diarra
The Internet of Things is a rapidly evolving field which gives rise to new needs related to devices management and security. In addition to being intelligent, devices become more and more mobile, and mobility could lead to security and performance issues if not correctly managed. In this paper, we propose an IoT authentication system considering mobile devices and using the Hyperledger Fabric Blockchain as a broker. Our system is scalable, and proproses two ways of managing device mobility. To demonstrate the reliability of our approachs, we provide a proof-of-concept based on a scenario example and an evaluation of the performance obtained.
物联网是一个快速发展的领域,它对设备管理和安全提出了新的需求。除了智能之外,设备变得越来越具有移动性,如果管理不当,移动性可能会导致安全和性能问题。在本文中,我们提出了一个考虑移动设备并使用超级账本结构区块链作为代理的物联网认证系统。我们的系统是可扩展的,并提出了两种管理设备移动性的方法。为了证明我们方法的可靠性,我们提供了一个基于场景示例的概念验证,并对所获得的性能进行了评估。
{"title":"Authentication of Mobile IoT Devices using HyperLedger Fabric Blockchain","authors":"Nathalie Banoun, Nafissatou Diarra","doi":"10.1109/SDS54264.2021.9732141","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9732141","url":null,"abstract":"The Internet of Things is a rapidly evolving field which gives rise to new needs related to devices management and security. In addition to being intelligent, devices become more and more mobile, and mobility could lead to security and performance issues if not correctly managed. In this paper, we propose an IoT authentication system considering mobile devices and using the Hyperledger Fabric Blockchain as a broker. Our system is scalable, and proproses two ways of managing device mobility. To demonstrate the reliability of our approachs, we provide a proof-of-concept based on a scenario example and an evaluation of the performance obtained.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126946780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Digital Signature and Elliptic Curve Digital Signature Algorithms for the Validation of QR Code Vulnerabilities 数字签名与椭圆曲线数字签名算法在QR码漏洞验证中的比较分析
Pub Date : 2021-12-06 DOI: 10.1109/SDS54264.2021.9732150
Abdul Razaque, Vladislav Alexandrov, Muder Almiani, Bandar Alotaibi, M. Alotaibi, Ayman Al-Dmour
Quick response (QR) codes are currently used ubiq-uitously. Their interaction protocol design is initially unsecured. It forces users to scan QR codes, which makes it harder to differentiate a genuine code from a malicious one. Intruders can change the original QR code and make it fake, which can lead to phishing websites that collect sensitive data. The interaction model can be improved and made more secure by adding some modifications to the backend side of the application. This paper addresses the vulnerabilities of QR codes and recommends improvements in security design. Furthermore, two state-of-the-art algorithms, Digital Signature (DS) and Elliptic Curve Digital Signature (ECDS), are analytically compared to determine their strengths in QR code security.
快速响应码(QR码)目前普遍使用。它们的交互协议设计最初是不安全的。它迫使用户扫描QR码,这使得区分正版代码和恶意代码变得更加困难。入侵者可以改变原始的QR码,使其成为假的,这可能导致网络钓鱼网站收集敏感数据。通过向应用程序的后端添加一些修改,可以改进交互模型并使其更加安全。本文讨论了QR码的漏洞,并提出了改进安全设计的建议。此外,分析比较了两种最先进的算法,数字签名(DS)和椭圆曲线数字签名(ECDS),以确定它们在QR码安全性方面的优势。
{"title":"Comparative Analysis of Digital Signature and Elliptic Curve Digital Signature Algorithms for the Validation of QR Code Vulnerabilities","authors":"Abdul Razaque, Vladislav Alexandrov, Muder Almiani, Bandar Alotaibi, M. Alotaibi, Ayman Al-Dmour","doi":"10.1109/SDS54264.2021.9732150","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9732150","url":null,"abstract":"Quick response (QR) codes are currently used ubiq-uitously. Their interaction protocol design is initially unsecured. It forces users to scan QR codes, which makes it harder to differentiate a genuine code from a malicious one. Intruders can change the original QR code and make it fake, which can lead to phishing websites that collect sensitive data. The interaction model can be improved and made more secure by adding some modifications to the backend side of the application. This paper addresses the vulnerabilities of QR codes and recommends improvements in security design. Furthermore, two state-of-the-art algorithms, Digital Signature (DS) and Elliptic Curve Digital Signature (ECDS), are analytically compared to determine their strengths in QR code security.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125452554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2021 Eighth International Conference on Software Defined Systems (SDS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1