Pub Date : 2024-03-14DOI: 10.1007/s10207-024-00823-1
Diana-Elena Petrean, Rodica Potolea
In recent years, machine learning (ML) has become increasingly popular in various fields of activity. Cloud platforms have also grown in popularity, as they offer services that are more secure and accessible worldwide. In this context, cloud-based technologies emerged to support ML, giving rise to the machine learning as a service (MLaaS) concept. However, the clients accessing ML services in order to obtain classification results on private data may be reluctant to upload sensitive information to cloud. The model owners may also prefer not to outsource their models in order to prevent model inversion attacks and to protect intellectual property. The privacy-preserving evaluation of ML models is possible through multi-key homomorphic encryption (MKHE), that allows both the client data and the model to be encrypted under different keys. In this paper, we propose an MKHE evaluation method for decision trees and we extend the proposed method for random forests. Each decision tree is evaluated as a single lookup table, and voting is performed at the level of groups of decision trees in the random forest. We provide both theoretical and experimental evaluations for the proposed method. The aim is to minimize the performance degradation introduced by the encrypted model compared to a plaintext model while also obtaining practical classification times. In our experiments with the proposed MKHE random forest evaluation method, we obtained minimal (less than 0.6%) impact on the main ML performance metrics considered for each scenario, while also achieving reasonable classification times (of the order of seconds).
近年来,机器学习(ML)在各行各业越来越受欢迎。云平台也越来越受欢迎,因为它们提供的服务更加安全,而且在全球范围内都可以访问。在这种情况下,出现了支持 ML 的云技术,从而产生了机器学习即服务(MLaaS)的概念。然而,访问 ML 服务以获取私人数据分类结果的客户可能不愿意将敏感信息上传到云端。为了防止模型反转攻击和保护知识产权,模型所有者可能也不愿意外包他们的模型。通过多密钥同态加密(MKHE)可以对 ML 模型进行保护隐私的评估,这种加密允许客户端数据和模型在不同密钥下加密。在本文中,我们提出了决策树的 MKHE 评估方法,并将所提方法扩展到随机森林。每棵决策树都作为单个查找表进行评估,投票则在随机森林中的决策树组层面上进行。我们对提出的方法进行了理论和实验评估。目的是尽量减少加密模型与明文模型相比所带来的性能下降,同时获得实用的分类时间。在使用所提出的 MKHE 随机森林评估方法进行的实验中,我们发现该方法对每种情况下考虑的主要 ML 性能指标的影响最小(小于 0.6%),同时还能获得合理的分类时间(约为几秒)。
{"title":"Random forest evaluation using multi-key homomorphic encryption and lookup tables","authors":"Diana-Elena Petrean, Rodica Potolea","doi":"10.1007/s10207-024-00823-1","DOIUrl":"https://doi.org/10.1007/s10207-024-00823-1","url":null,"abstract":"<p>In recent years, machine learning (ML) has become increasingly popular in various fields of activity. Cloud platforms have also grown in popularity, as they offer services that are more secure and accessible worldwide. In this context, cloud-based technologies emerged to support ML, giving rise to the machine learning as a service (MLaaS) concept. However, the clients accessing ML services in order to obtain classification results on private data may be reluctant to upload sensitive information to cloud. The model owners may also prefer not to outsource their models in order to prevent model inversion attacks and to protect intellectual property. The privacy-preserving evaluation of ML models is possible through multi-key homomorphic encryption (MKHE), that allows both the client data and the model to be encrypted under different keys. In this paper, we propose an MKHE evaluation method for decision trees and we extend the proposed method for random forests. Each decision tree is evaluated as a single lookup table, and voting is performed at the level of groups of decision trees in the random forest. We provide both theoretical and experimental evaluations for the proposed method. The aim is to minimize the performance degradation introduced by the encrypted model compared to a plaintext model while also obtaining practical classification times. In our experiments with the proposed MKHE random forest evaluation method, we obtained minimal (less than 0.6%) impact on the main ML performance metrics considered for each scenario, while also achieving reasonable classification times (of the order of seconds).</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"50 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140152896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Due to its plug-and-play functionality and wide device support, the universal serial bus (USB) protocol has become one of the most widely used protocols. However, this widespread adoption has introduced a significant security concern: the implicit trust provided to USB devices, which has created a vast array of attack vectors. Malicious USB devices exploit this trust by disguising themselves as benign peripherals and covertly implanting malicious commands into connected host devices. Existing research employs supervised learning models to identify such malicious devices, but our study reveals a weakness in these models when faced with sophisticated data poisoning attacks. We propose, design and implement a sophisticated adversarial data poisoning attack to demonstrate how these models can be manipulated to misclassify an attack device as a benign device. Our method entails generating keystroke data using a microprogrammable keystroke attack device. We develop adversarial attacker by meticulously analyzing the data distribution of data features generated via USB keyboards from benign users. The initial training data is modified by exploiting firmware-level modifications within the attack device. Upon evaluating the models, our findings reveal a significant decrease from 99 to 53% in detection accuracy when an adversarial attacker is employed. This work highlights the critical need to reevaluate the dependability of machine learning-based USB threat detection mechanisms in the face of increasingly sophisticated attack methods. The vulnerabilities demonstrated highlight the importance of developing more robust and resilient detection strategies to protect against the evolution of malicious USB devices.
由于其即插即用的功能和广泛的设备支持,通用串行总线(USB)协议已成为使用最广泛的协议之一。然而,这种广泛的应用带来了一个重大的安全隐患:USB 设备所具有的隐含信任,产生了大量的攻击载体。恶意 USB 设备利用这种信任,将自己伪装成良性外设,并暗中向连接的主机设备植入恶意命令。现有研究采用监督学习模型来识别此类恶意设备,但我们的研究揭示了这些模型在面对复杂的数据中毒攻击时的弱点。我们提出、设计并实施了一种复杂的对抗性数据中毒攻击,以演示如何操纵这些模型,将攻击设备错误分类为良性设备。我们的方法需要使用微可编程按键攻击设备生成按键数据。我们通过对良性用户的 USB 键盘生成的数据特征的数据分布进行细致分析,从而开发出对抗攻击器。初始训练数据是通过利用攻击设备内的固件级修改进行修改的。在对模型进行评估后,我们的研究结果表明,当采用对抗攻击者时,检测准确率从 99% 显著下降到 53%。这项工作强调,面对日益复杂的攻击方法,亟需重新评估基于机器学习的 USB 威胁检测机制的可靠性。所展示的漏洞凸显了开发更强大、更有弹性的检测策略以防范恶意 USB 设备演变的重要性。
{"title":"Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards","authors":"Anil Kumar Chillara, Paresh Saxena, Rajib Ranjan Maiti, Manik Gupta, Raghu Kondapalli, Zhichao Zhang, Krishnakumar Kesavan","doi":"10.1007/s10207-024-00834-y","DOIUrl":"https://doi.org/10.1007/s10207-024-00834-y","url":null,"abstract":"<p>Due to its plug-and-play functionality and wide device support, the universal serial bus (USB) protocol has become one of the most widely used protocols. However, this widespread adoption has introduced a significant security concern: the implicit trust provided to USB devices, which has created a vast array of attack vectors. Malicious USB devices exploit this trust by disguising themselves as benign peripherals and covertly implanting malicious commands into connected host devices. Existing research employs supervised learning models to identify such malicious devices, but our study reveals a weakness in these models when faced with sophisticated data poisoning attacks. We propose, design and implement a sophisticated adversarial data poisoning attack to demonstrate how these models can be manipulated to misclassify an attack device as a benign device. Our method entails generating keystroke data using a microprogrammable keystroke attack device. We develop adversarial attacker by meticulously analyzing the data distribution of data features generated via USB keyboards from benign users. The initial training data is modified by exploiting firmware-level modifications within the attack device. Upon evaluating the models, our findings reveal a significant decrease from 99 to 53% in detection accuracy when an adversarial attacker is employed. This work highlights the critical need to reevaluate the dependability of machine learning-based USB threat detection mechanisms in the face of increasingly sophisticated attack methods. The vulnerabilities demonstrated highlight the importance of developing more robust and resilient detection strategies to protect against the evolution of malicious USB devices.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"21 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140152902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-13DOI: 10.1007/s10207-024-00828-w
Vagner E. Quincozes, Silvio E. Quincozes, Juliano F. Kazienko, Simone Gama, Omar Cheikhrouhou, Anis Koubaa
The Internet of Things (IoT) plays a fundamental role in contemporary society, necessitating an in-depth comprehension of its application layer protocols, intertwined technologies, security issues, and effective countermeasures. This survey delivers an exhaustive analysis of these protocols, emphasizing the escalating significance of explainable artificial intelligence in IoT (XAIoT). To elucidate its practical implications, we conducted a case study examining a real-world scenario where XAIoT significantly bolstered IoT security. This case study demonstrated XAIoT’s potential to enhance transparency and trustworthiness in IoT systems. Furthermore, the survey critically evaluates existing literature, pinpointing specific opportunities and gaps in the present state of IoT application layer security. For instance, our analysis revealed a pressing need for more robust security protocols and the integration of advanced machine-learning techniques for anomaly detection in IoT applications. This survey, designed to provide a comprehensive perspective, seeks to stimulate additional innovation and research in the realm of secure and intelligent IoT applications. In doing so, it contributes to the ongoing dialogue on improving IoT security, offering valuable insights for researchers and practitioners alike.
{"title":"A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT)","authors":"Vagner E. Quincozes, Silvio E. Quincozes, Juliano F. Kazienko, Simone Gama, Omar Cheikhrouhou, Anis Koubaa","doi":"10.1007/s10207-024-00828-w","DOIUrl":"https://doi.org/10.1007/s10207-024-00828-w","url":null,"abstract":"<p>The Internet of Things (IoT) plays a fundamental role in contemporary society, necessitating an in-depth comprehension of its application layer protocols, intertwined technologies, security issues, and effective countermeasures. This survey delivers an exhaustive analysis of these protocols, emphasizing the escalating significance of explainable artificial intelligence in IoT (XAIoT). To elucidate its practical implications, we conducted a case study examining a real-world scenario where XAIoT significantly bolstered IoT security. This case study demonstrated XAIoT’s potential to enhance transparency and trustworthiness in IoT systems. Furthermore, the survey critically evaluates existing literature, pinpointing specific opportunities and gaps in the present state of IoT application layer security. For instance, our analysis revealed a pressing need for more robust security protocols and the integration of advanced machine-learning techniques for anomaly detection in IoT applications. This survey, designed to provide a comprehensive perspective, seeks to stimulate additional innovation and research in the realm of secure and intelligent IoT applications. In doing so, it contributes to the ongoing dialogue on improving IoT security, offering valuable insights for researchers and practitioners alike.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"139 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140114765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-13DOI: 10.1007/s10207-024-00829-9
Hussain Al-Aqrabi, Ahmed M. Manasrah, Richard Hill, Mohammed Q. Shatnawi, Mohammad Sh Daoud, Hoda Alkhzaimi
Sensor clouds are formed by IP-enabled wireless sensors and Internet of Things devices that are used for sensing and actuation in commercial and industrial applications. Data collected by the sensors are consolidated by distributed cloud data consolidation (DCS) servers to be utilized as raw sensory information by applications running data analytics and actuation functions. Alternatively, DC servers may feed sensor data to the cloud-hosted Big Data Analytics (BDS) servers. Sensor clouds and their respective DCS servers, as well as BDS servers, may form different security realms. These security realms’ ownership structures are complicated and differ from standard database servers, necessitating a dependable authentication technique to provide trusted access to DC and BDS servers. This paper proposes a new multiparty authentication framework to authenticate applications requesting access to the DCS and BDS servers without direct human or application access to the sensors and actuators. Only DC servers are permitted to communicate with sensors/actuators, and only applications certified by a Session Authority Cloud are granted access to DCS/BDS servers via an authentication protocol that includes many information and key exchanges. This solution may assure the reliable deployment of sensor clouds in different critical application domains (i.e., industry, commercial, national security, and defense, etc.) while reducing the potential of direct espionage of sensed/actuated systems. Linear Temporal Logic is used to explicitly analyze and establish the correctness of the presented framework. OPNET modeling and simulations are used to illustrate the protocol’s design and operations. The results demonstrate that multiparty authentication is conceivable for Sensor cloud computing systems.
传感器云由支持 IP 的无线传感器和物联网设备组成,用于商业和工业应用中的传感和执行。传感器收集的数据由分布式云数据整合(DCS)服务器整合,作为原始传感信息供运行数据分析和执行功能的应用程序使用。另外,DCS 服务器还可将传感器数据馈送至云托管大数据分析 (BDS) 服务器。传感器云及其各自的 DCS 服务器和 BDS 服务器可形成不同的安全域。这些安全域的所有权结构复杂,且不同于标准数据库服务器,因此需要一种可靠的身份验证技术来提供对 DC 和 BDS 服务器的可信访问。本文提出了一种新的多方认证框架,用于对请求访问 DCS 和 BDS 服务器的应用程序进行认证,而无需人工或应用程序直接访问传感器和执行器。只有 DC 服务器被允许与传感器/执行器通信,只有经过会话授权云认证的应用程序才能通过包括许多信息和密钥交换的认证协议访问 DCS/BDS 服务器。该解决方案可确保在不同的关键应用领域(如工业、商业、国家安全和国防等)可靠部署传感器云,同时降低直接间谍传感/执行系统的可能性。线性时态逻辑用于明确分析和建立所提出框架的正确性。OPNET 建模和仿真用于说明协议的设计和运行。结果表明,多方身份验证在传感器云计算系统中是可行的。
{"title":"Dynamic authentication for intelligent sensor clouds in the Internet of Things","authors":"Hussain Al-Aqrabi, Ahmed M. Manasrah, Richard Hill, Mohammed Q. Shatnawi, Mohammad Sh Daoud, Hoda Alkhzaimi","doi":"10.1007/s10207-024-00829-9","DOIUrl":"https://doi.org/10.1007/s10207-024-00829-9","url":null,"abstract":"<p>Sensor clouds are formed by IP-enabled wireless sensors and Internet of Things devices that are used for sensing and actuation in commercial and industrial applications. Data collected by the sensors are consolidated by distributed cloud data consolidation (DCS) servers to be utilized as raw sensory information by applications running data analytics and actuation functions. Alternatively, DC servers may feed sensor data to the cloud-hosted Big Data Analytics (BDS) servers. Sensor clouds and their respective DCS servers, as well as BDS servers, may form different security realms. These security realms’ ownership structures are complicated and differ from standard database servers, necessitating a dependable authentication technique to provide trusted access to DC and BDS servers. This paper proposes a new multiparty authentication framework to authenticate applications requesting access to the DCS and BDS servers without direct human or application access to the sensors and actuators. Only DC servers are permitted to communicate with sensors/actuators, and only applications certified by a Session Authority Cloud are granted access to DCS/BDS servers via an authentication protocol that includes many information and key exchanges. This solution may assure the reliable deployment of sensor clouds in different critical application domains (i.e., industry, commercial, national security, and defense, etc.) while reducing the potential of direct espionage of sensed/actuated systems. Linear Temporal Logic is used to explicitly analyze and establish the correctness of the presented framework. OPNET modeling and simulations are used to illustrate the protocol’s design and operations. The results demonstrate that multiparty authentication is conceivable for Sensor cloud computing systems.\u0000</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"4 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140114992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-10DOI: 10.1007/s10207-024-00818-y
Josep-Lluís Ferrer-Gomila, M. Francisca Hinarejos
Electronic contract signing requires the design of protocols that guarantee that the exchange is fair. In the past 5 years, we have observed that trusted third parties (TTPs) can be replaced by blockchain. However, none of the analyzed blockchain-based solutions meets the abuse-freeness requirement (established by Garay et al. in 1999), i.e., that neither party has the power to decide whether the protocol terminates or aborts. In this article, we present the first blockchain-based contract signing protocol that meets the abuse-freeness requirement. We analyze the economic impact that the use of blockchain has on the participants of a contract signing, concluding that the solution is both technically feasible and cost effective.
{"title":"Abuse-freeness in contract signing: a blockchain-based proposal","authors":"Josep-Lluís Ferrer-Gomila, M. Francisca Hinarejos","doi":"10.1007/s10207-024-00818-y","DOIUrl":"https://doi.org/10.1007/s10207-024-00818-y","url":null,"abstract":"<p>Electronic contract signing requires the design of protocols that guarantee that the exchange is fair. In the past 5 years, we have observed that trusted third parties (TTPs) can be replaced by blockchain. However, none of the analyzed blockchain-based solutions meets the abuse-freeness requirement (established by Garay et al. in 1999), i.e., that neither party has the power to decide whether the protocol terminates or aborts. In this article, we present the first blockchain-based contract signing protocol that meets the abuse-freeness requirement. We analyze the economic impact that the use of blockchain has on the participants of a contract signing, concluding that the solution is both technically feasible and cost effective.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"71 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140098964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-07DOI: 10.1007/s10207-024-00827-x
W. M. A. B. Wijesundara, Joong-Sun Lee, Dara Tith, Eleni Aloupogianni, Hiroyuki Suzuki, Takashi Obi
With the increase of IoT devices generating large amounts of user-sensitive data, improper firmware harms users’ security and privacy. Latest home appliances are integrated with features to assure compatibility with smart home IoT. However, applying complex security mechanisms to IoT is limited by device hardware capabilities, making them vulnerable to attacks. Such attacks have recently become frequent. To address this issue, we developed a secure verification mechanism for firmware released by the device’s manufacturer. We proposed an IoT gateway for secure firmware verification and updating for smart home IoT devices utilizing the IOTA MAM (Masked Authenticated Messaging) protocol and a distributed file system with IPFS (Inter-Planetary File System) protocol. These two communication protocols ensure decentralized communication and firmware file distribution between the IoT device vendor and the IoT end device. The proposed scheme securely shares latest firmware content over IOTA and IPFS networks, performs a secure firmware update on IoT end devices and ensures authenticity and integrity of the firmware. Two types of validation methods were proposed for firmware updating and validation. We implemented the proposed scheme using three entities, Vendor, IoT gateway, and IoT end device. Our system yielded promising results in performing secure automated firmware updates on IoT end devices with very low computational power. The system’s functionality was implemented using IOTA’s MAM run on Raspberry Pi as an IoT gateway along with an ESP8266 Wi-Fi microcontroller, demonstrating the effectiveness of our approach. Our proposed methodology can be used for secure firmware distribution on home IoT applications.
{"title":"Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies","authors":"W. M. A. B. Wijesundara, Joong-Sun Lee, Dara Tith, Eleni Aloupogianni, Hiroyuki Suzuki, Takashi Obi","doi":"10.1007/s10207-024-00827-x","DOIUrl":"https://doi.org/10.1007/s10207-024-00827-x","url":null,"abstract":"<p>With the increase of IoT devices generating large amounts of user-sensitive data, improper firmware harms users’ security and privacy. Latest home appliances are integrated with features to assure compatibility with smart home IoT. However, applying complex security mechanisms to IoT is limited by device hardware capabilities, making them vulnerable to attacks. Such attacks have recently become frequent. To address this issue, we developed a secure verification mechanism for firmware released by the device’s manufacturer. We proposed an IoT gateway for secure firmware verification and updating for smart home IoT devices utilizing the IOTA MAM (Masked Authenticated Messaging) protocol and a distributed file system with IPFS (Inter-Planetary File System) protocol. These two communication protocols ensure decentralized communication and firmware file distribution between the IoT device vendor and the IoT end device. The proposed scheme securely shares latest firmware content over IOTA and IPFS networks, performs a secure firmware update on IoT end devices and ensures authenticity and integrity of the firmware. Two types of validation methods were proposed for firmware updating and validation. We implemented the proposed scheme using three entities, Vendor, IoT gateway, and IoT end device. Our system yielded promising results in performing secure automated firmware updates on IoT end devices with very low computational power. The system’s functionality was implemented using IOTA’s MAM run on Raspberry Pi as an IoT gateway along with an ESP8266 Wi-Fi microcontroller, demonstrating the effectiveness of our approach. Our proposed methodology can be used for secure firmware distribution on home IoT applications.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"13 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140071091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-07DOI: 10.1007/s10207-024-00830-2
Eslam Abdelkreem, Sherif Hussein, Ashraf Tammam
The vehicular ad-hoc network is a technology that enables vehicles to interact with each other and the surrounding infrastructure, aiming to enhance road safety and driver comfort. However, it is susceptible to various security attacks. Among these attacks, the position falsification attack is regarded as one of the most serious, in which the malicious nodes tamper with their transmitted location. Thus, developing effective misbehavior detection schemes capable of detecting such attacks is crucial. Many of these schemes employ machine learning techniques to detect misbehavior based on the features of the exchanged messages. However, the studies that identify the impact of feature engineering on schemes’ performance and highlight the most efficient features and algorithms are limited. This paper conducts a comprehensive literature survey to identify the key features and algorithms used in the literature that lead to the best-performing models. Then, a comparative study using the VeReMi dataset, which is publicly available, is performed to assess six models implemented using three different machine learning algorithms and two feature sets: one comprising selected and derived features and the other including all message features. The findings show that two of the suggested models that employ feature engineering perform almost equally to existing studies in identifying two types of position falsification attacks while exhibiting performance improvements in detecting other types. Furthermore, the results of evaluating the proposed models using another simulation exhibit a substantial improvement achieved by employing feature engineering techniques, where the average accuracy of the models is increased by 6.31–47%, depending on the algorithm used.
{"title":"Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network","authors":"Eslam Abdelkreem, Sherif Hussein, Ashraf Tammam","doi":"10.1007/s10207-024-00830-2","DOIUrl":"https://doi.org/10.1007/s10207-024-00830-2","url":null,"abstract":"<p>The vehicular ad-hoc network is a technology that enables vehicles to interact with each other and the surrounding infrastructure, aiming to enhance road safety and driver comfort. However, it is susceptible to various security attacks. Among these attacks, the position falsification attack is regarded as one of the most serious, in which the malicious nodes tamper with their transmitted location. Thus, developing effective misbehavior detection schemes capable of detecting such attacks is crucial. Many of these schemes employ machine learning techniques to detect misbehavior based on the features of the exchanged messages. However, the studies that identify the impact of feature engineering on schemes’ performance and highlight the most efficient features and algorithms are limited. This paper conducts a comprehensive literature survey to identify the key features and algorithms used in the literature that lead to the best-performing models. Then, a comparative study using the VeReMi dataset, which is publicly available, is performed to assess six models implemented using three different machine learning algorithms and two feature sets: one comprising selected and derived features and the other including all message features. The findings show that two of the suggested models that employ feature engineering perform almost equally to existing studies in identifying two types of position falsification attacks while exhibiting performance improvements in detecting other types. Furthermore, the results of evaluating the proposed models using another simulation exhibit a substantial improvement achieved by employing feature engineering techniques, where the average accuracy of the models is increased by 6.31–47%, depending on the algorithm used.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"16 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140054718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-06DOI: 10.1007/s10207-024-00824-0
Rajiv Shah, Deniz Cemiloglu, Cagatay Yucel, Raian Ali, Vasilis Katos
Spurred by the rapid modernisation of the sector and the advent of Internet Protocol Television (IPTV), audiovisual (AV) piracy is at epidemic levels, with interventions having limited effect. To date, the dominant themes in interventions have been around personal deterrence (i.e. the threat of legal action) and have not considered other factors that may influence an individual’s decision to consume infringing content. In this paper, we consider psychological factors, including perceptions around risk-taking, security behaviours, problematic internet use and personality traits, to gain a comprehensive understanding of factors influencing engagement with IPTV and the potential implications for cyber security. For this purpose, a survey was conducted with 283 participants living in the UK (age range 18–74, male 104), and an integrated structural equation model was constructed. Our findings showed a positive relationship between security behaviours and the perceived risk of viewing IPTV and a negative relationship between the dark personality triad and the perceived risk of viewing IPTV. They suggest that security behaviours fully mediate the relationship between problematic internet use and IPTV risk-taking, indicating a potential new path for anti-piracy interventions with greater efficacy.
{"title":"Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices","authors":"Rajiv Shah, Deniz Cemiloglu, Cagatay Yucel, Raian Ali, Vasilis Katos","doi":"10.1007/s10207-024-00824-0","DOIUrl":"https://doi.org/10.1007/s10207-024-00824-0","url":null,"abstract":"<p>Spurred by the rapid modernisation of the sector and the advent of Internet Protocol Television (IPTV), audiovisual (AV) piracy is at epidemic levels, with interventions having limited effect. To date, the dominant themes in interventions have been around personal deterrence (i.e. the threat of legal action) and have not considered other factors that may influence an individual’s decision to consume infringing content. In this paper, we consider psychological factors, including perceptions around risk-taking, security behaviours, problematic internet use and personality traits, to gain a comprehensive understanding of factors influencing engagement with IPTV and the potential implications for cyber security. For this purpose, a survey was conducted with 283 participants living in the UK (age range 18–74, male 104), and an integrated structural equation model was constructed. Our findings showed a positive relationship between security behaviours and the perceived risk of viewing IPTV and a negative relationship between the dark personality triad and the perceived risk of viewing IPTV. They suggest that security behaviours fully mediate the relationship between problematic internet use and IPTV risk-taking, indicating a potential new path for anti-piracy interventions with greater efficacy.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"66 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140054613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-04DOI: 10.1007/s10207-024-00822-2
Yash Sharma, Anshul Arora
The first Android-ready “G1” phone debuted in late October 2008. Since then, the growth of Android malware has been explosive, analogous to the rise in the popularity of Android. The major positive aspect of Android is its open-source nature, which empowers app developers to expand their work. However, authors with malicious intentions pose grave threats to users. In the presence of such threats, Android malware detection is the need of an hour. Consequently, researchers have proposed various techniques involving static, dynamic, and hybrid analysis to address such threats to numerous features in the last decade. However, the feature that most researchers have extensively used to perform malware analysis and detection in Android security is Android permission. Hence, to provide a clarified overview of the latest and past work done in Android malware analysis and detection, we perform a comprehensive literature review using permissions as a central feature or in combination with other components by collecting and analyzing 205 studies from 2009 to 2023. We extracted information such as the choice opted by researchers between analysis or detection, techniques used to select or rank the permissions feature set, features used along with permissions, detection models employed, malware datasets used by researchers, and limitations and challenges in the field of Android malware detection to propose some future research directions. In addition, on the basis of the information extracted, we answer the six research questions designed considering the above factors.
{"title":"A comprehensive review on permissions-based Android malware detection","authors":"Yash Sharma, Anshul Arora","doi":"10.1007/s10207-024-00822-2","DOIUrl":"https://doi.org/10.1007/s10207-024-00822-2","url":null,"abstract":"<p>The first Android-ready “G1” phone debuted in late October 2008. Since then, the growth of Android malware has been explosive, analogous to the rise in the popularity of Android. The major positive aspect of Android is its open-source nature, which empowers app developers to expand their work. However, authors with malicious intentions pose grave threats to users. In the presence of such threats, Android malware detection is the need of an hour. Consequently, researchers have proposed various techniques involving static, dynamic, and hybrid analysis to address such threats to numerous features in the last decade. However, the feature that most researchers have extensively used to perform malware analysis and detection in Android security is Android permission. Hence, to provide a clarified overview of the latest and past work done in Android malware analysis and detection, we perform a comprehensive literature review using permissions as a central feature or in combination with other components by collecting and analyzing 205 studies from 2009 to 2023. We extracted information such as the choice opted by researchers between analysis or detection, techniques used to select or rank the permissions feature set, features used along with permissions, detection models employed, malware datasets used by researchers, and limitations and challenges in the field of Android malware detection to propose some future research directions. In addition, on the basis of the information extracted, we answer the six research questions designed considering the above factors.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"7 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140032586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-02DOI: 10.1007/s10207-024-00825-z
Joel Höglund, Simon Bouget, Martin Furuhed, John Preuß Mattsson, Göran Selander, Shahid Raza
IoT deployments grow in numbers and size, which makes questions of long-term support and maintainability increasingly important. Without scalable and standard-compliant capabilities to transfer the control of IoT devices between service providers, IoT system owners cannot ensure long-term maintainability, and risk vendor lock-in. The manual overhead must be kept low for large-scale IoT installations to be economically feasible. We propose AutoPKI, a lightweight protocol to update the IoT PKI credentials and shift the trusted domains, enabling the transfer of control between IoT service providers, building upon the latest IoT standards for secure communication and efficient encodings. We show that the overhead for the involved IoT devices is small and that the overall required manual overhead can be minimized. We analyse the fulfilment of the security requirements, and for a subset of them, we demonstrate that the desired security properties hold through formal verification using the Tamarin prover.
{"title":"AutoPKI: public key infrastructure for IoT with automated trust transfer","authors":"Joel Höglund, Simon Bouget, Martin Furuhed, John Preuß Mattsson, Göran Selander, Shahid Raza","doi":"10.1007/s10207-024-00825-z","DOIUrl":"https://doi.org/10.1007/s10207-024-00825-z","url":null,"abstract":"<p>IoT deployments grow in numbers and size, which makes questions of long-term support and maintainability increasingly important. Without scalable and standard-compliant capabilities to transfer the control of IoT devices between service providers, IoT system owners cannot ensure long-term maintainability, and risk vendor lock-in. The manual overhead must be kept low for large-scale IoT installations to be economically feasible. We propose AutoPKI, a lightweight protocol to update the IoT PKI credentials and shift the trusted domains, enabling the transfer of control between IoT service providers, building upon the latest IoT standards for secure communication and efficient encodings. We show that the overhead for the involved IoT devices is small and that the overall required manual overhead can be minimized. We analyse the fulfilment of the security requirements, and for a subset of them, we demonstrate that the desired security properties hold through formal verification using the Tamarin prover.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"4 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140019896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}