{"title":"Authentication, access control and scalability models in Internet of Things Security–A review","authors":"M Kokila, Srinivasa Reddy K","doi":"10.1016/j.csa.2024.100057","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100057","url":null,"abstract":"<div><p>The Internet of Things (IoT) leads to the next phase of human interaction with technology. With the help of the IoT, physical objects can be given the ability to generate, receive, and seamlessly trade data with one another. The IoT includes a wide variety of applications, each of which focuses on automating a specific task and works to give inanimate objects the ability to act independently of human intervention. The currently available and upcoming IoT applications hold a great deal of promise for enhancing the level of convenience, productivity, and automation enjoyed by users. High levels of security, privacy, authentication, and the ability to recover from attacks are required for the implementation of such a world in a manner that is constantly expanding. In this light, it is necessary to make the necessary adjustments to the architecture of IoT applications to accomplish end-to-end security in IoT environments. In this article, a comprehensive review of the security-related challenges and potential sources of danger posed by IoT applications is provided. Following a discussion of security concerns, a variety of new and established technologies that are focused on achieving a high degree of trust in the applications of the IoT are covered. Machine learning, fog computing, edge computing, and blockchain are just a few of the technologies that help the IoT provide greater security.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100057"},"PeriodicalIF":0.0,"publicationDate":"2024-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000237/pdfft?md5=8fa317b32e24d44f6351a63506f93d8a&pid=1-s2.0-S2772918424000237-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140645449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Navigating the landscape: Safeguarding privacy and security in the era of ambient intelligence within healthcare settings","authors":"Tarun Vats , Sudhakar Kumar , Sunil K. Singh , Uday Madan , Mehak Preet , Varsha Arya , Ritika Bansal , Ammar Almomani","doi":"10.1016/j.csa.2024.100046","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100046","url":null,"abstract":"<div><p>Ambient intelligence technologies have the potential to transform healthcare by providing personalized, context-aware, and proactive support for patients and healthcare providers. However, the use of these technologies in healthcare settings raises important privacy and security concerns that must be addressed to ensure patient trust and acceptance. This paper explores the privacy and security considerations related to the utilization of ambient intelligence in healthcare, aiming to address the associated risks and establish a robust security infrastructure. By reviewing the inherent privacy and security risks in healthcare settings employing ambient intelligence, discussing the ethical and legal considerations, and proposing mitigation strategies, the focus is on ensuring patient trust and acceptance.The architecture that is being presented is a comprehensive one with interconnected layers that guarantees data confidentiality, integrity, and privacy in the ambient intelligence healthcare system. This protects sensitive data and maintains its continuous availability. This research helps to establish a safe environment that supports the transformational potential of ambient intelligence in healthcare while putting patient privacy and data protection first by thoroughly addressing privacy and security concerns.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"2 ","pages":"Article 100046"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000122/pdfft?md5=efe7200683f294a4dc27ed3363c6368a&pid=1-s2.0-S2772918424000122-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140112969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security analysis of cyber physical system using digital forensic incident response","authors":"Pranita Binnar , Sunil Bhirud , Faruk Kazi","doi":"10.1016/j.csa.2023.100034","DOIUrl":"10.1016/j.csa.2023.100034","url":null,"abstract":"<div><p>There is a great demand for an efficient security tool which can secure IIoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IIoT considering the closed, dynamic and distributed architecture. This motivates the researchers to focus more on investigating the role of forensic tools such as DFIR in the designing of security models. A brief analysis of the security issues, challenges and attacks on IIoT systems is presented in this paper with an emphasis of DFIR for the security of ICS, CPS, and SCADA. The security recommendations for IIoT, forensic challenges in SCADA, ICS and CPS are discussed. The study suggests that forensic tools can overcome the drawbacks of conventional security solutions in terms of maintaining the privacy of data while sharing information with other systems. The study discusses different models, overview, comparisons, and summarization of DFIR and intrusion detection systems (IDS)-based techniques for IIoT security. In addition, this review analyzes the challenges and research gaps based on the existing literary works.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"2 ","pages":"Article 100034"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918423000218/pdfft?md5=5043651ac8c83a8df31150d7471fc04a&pid=1-s2.0-S2772918423000218-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139014533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Himanshu Setia , Amit Chhabra , Sunil K. Singh , Sudhakar Kumar , Sarita Sharma , Varsha Arya , Brij B. Gupta , Jinsong Wu
{"title":"Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments","authors":"Himanshu Setia , Amit Chhabra , Sunil K. Singh , Sudhakar Kumar , Sarita Sharma , Varsha Arya , Brij B. Gupta , Jinsong Wu","doi":"10.1016/j.csa.2024.100037","DOIUrl":"10.1016/j.csa.2024.100037","url":null,"abstract":"<div><p>Vehicular ad-hoc network (VANET) technology has gained prominence, especially in the context of the emerging field of VANET Cloud as an integral part of connected and autonomous vehicles. The automotive industry’s move towards automation and the integration of vehicles into the digital ecosystem has revolutionized wireless network communications. Nevertheless, security remains a paramount concern in these advanced technological landscapes. Safeguarding system integrity and data privacy is of utmost importance before the widespread adoption of VANET Cloud solutions. This study addresses the critical challenge of security within the context of VANET Cloud. Specifically, the focus is on anticipating and mitigating Distributed Denial of Service (DDoS) attacks, which can potentially disrupt the functioning of connected vehicles and associated cloud-based services. To tackle this issue, an innovative architectural framework is proposed to capture and analyze network flows within the VANET Cloud environment. Additionally, it leverages machine learning techniques for classification and predictive analytics with an accuracy of 99.59%. The architecture presented in this research offers the potential to significantly enhance security measures in VANET Cloud deployments. Its adaptability ensures practical applicability to real-world systems, enabling timely responses to security threats and breaches.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"2 ","pages":"Article 100037"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000031/pdfft?md5=cb4f1ca958fe6310acbd1c05c848dec3&pid=1-s2.0-S2772918424000031-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139538768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arun Sekar Rajasekaran , L. Sowmiya , Azees Maria , R. Kannadasan
{"title":"A survey on exploring the challenges and applications of wireless body area networks (WBANs)","authors":"Arun Sekar Rajasekaran , L. Sowmiya , Azees Maria , R. Kannadasan","doi":"10.1016/j.csa.2024.100047","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100047","url":null,"abstract":"<div><p>Networks play an important role in the day-to-day life of every individual. Networks are involved in the transmission of necessary information between the sender and receiver in the channel. Wireless Body Area Network (WBAN) is a major advancement in the field of network communication. Due to the arrival of the Micro Electromechanical System (MEMS) and several intelligent sensors, collaboration with WBAN makes accurate predictions of parameters in the human body. WBAN has numerous applications in medical and non-medical fields. WBANs have demonstrated remarkable capabilities in real-time health monitoring, facilitating the collection of vital physiological data from individuals in diverse environments. Firstly, their low-power and energy-efficient design ensures prolonged device operation, making them suitable for continuous monitoring over extended periods. Additionally, the miniaturization of sensors and the integration of wireless communication technologies enable seamless data transmission to centralized healthcare systems. Furthermore, the integration of artificial intelligence and machine learning algorithms in WBAN systems has enabled personalized health analytics, allowing for more precise and context-aware health monitoring. This paper gives a survey of the WBAN standard, security in WBAN, several authentication approaches, routing, and MAC protocols. In addition, this paper describes the challenges faced by WBAN, such as network partitioning, changes in postures, lifetime issues, and quality of service (QoS). At last, the advancement in WBAN is for future improvement in the area of body area networks.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"2 ","pages":"Article 100047"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000134/pdfft?md5=5a090b0e0ca2657e5efe18d1e6a0a2a6&pid=1-s2.0-S2772918424000134-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140160591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure and sustainable food processing supply chain framework based on Hyperledger Fabric technology","authors":"Mosiur Rahaman , Farhin Tabassum , Varsha Arya , Ritika Bansal","doi":"10.1016/j.csa.2024.100045","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100045","url":null,"abstract":"<div><p>Food processing supply chains are gradually facing the problem of incorporation and sustainability because of the complexity of many participants involved in the supply chain network. Customers are very aware of and particularly interested in the quality, safety, and provenance of food processing products. However, conventional supply chains, on the other hand, rely heavily on a third party for transactions and confidence. Traditional supply chain models only partially reveal information about an organization to other parties, which results in inadequate data and a communication gap. Although emails and printed papers offer some information, the capacity to provide utterly accurate visibility and traceability information is impossible since the items throughout the supply chain are difficult to trace. In this research, we provide a fully distributed method, Hyperledger Fabric, to establish a food processing supply chain system incorporating a Hyperledger Fabric framework designed to demonstrate the efficiency of the approach and analyze the main use cases needed in a food processing supply chain network.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"2 ","pages":"Article 100045"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000110/pdfft?md5=21823af031b7f937fc1204baedd4b75f&pid=1-s2.0-S2772918424000110-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140179613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prathibha Muraleedhara , Mary Subaja Christo , Jaya J , Yuvasini D
{"title":"Any Bluetooth device can be hacked. Know how?","authors":"Prathibha Muraleedhara , Mary Subaja Christo , Jaya J , Yuvasini D","doi":"10.1016/j.csa.2024.100041","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100041","url":null,"abstract":"<div><p>In today's world, Bluetooth technology is integrated into almost every device we use, from wireless headsets, mice, and keyboards to cars and smart home devices. But with the convenience of this technology comes the risk of privacy and security breaches. Each Bluetooth device has potential vulnerabilities that cybercriminals can exploit and take advantage of. It is important to create awareness about various Bluetooth vulnerabilities, exploits, and ways to prevent them. This article examines the dark side of Bluetooth technology by explaining how hackers can find ways to bypass the advanced security features of laptops, phones, cars, or smart home devices to compromise the devices and steal personal sensitive data. Whether it is a casual user of Bluetooth technology or a business owner with multiple devices, understanding these risks is crucial to protecting yourself and your information.</p><p>This article begins by explaining the basics of Bluetooth technology and how it works. Followed by a list of security risks involved while using Bluetooth and finally, it highlights the best practices to protect the devices and the data they contain.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"2 ","pages":"Article 100041"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000079/pdfft?md5=b7264e407ecc26cf9b9c2a72b2cd62da&pid=1-s2.0-S2772918424000079-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139748889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Emmanuel Song Shombot , Gilles Dusserre , Robert Bestak , Nasir Baba Ahmed
{"title":"An application for predicting phishing attacks: A case of implementing a support vector machine learning model","authors":"Emmanuel Song Shombot , Gilles Dusserre , Robert Bestak , Nasir Baba Ahmed","doi":"10.1016/j.csa.2024.100036","DOIUrl":"10.1016/j.csa.2024.100036","url":null,"abstract":"<div><p>The imminent threat that phishing websites poses is a major concern for internet users worldwide. These fraudulent websites are crafted by cyber attackers to appear trustworthy and deceive vulnerable users into divulging confidential data like medical health records, credit card details, passwords, and Personal Identifiable information (PII). To bait their victims, cybercriminals employ tactics such as social engineering, spear-phishing attacks, and email phishing scams. As a result, unsuspecting individuals may be enticed to visit these websites, putting their sensitive information at risk. This work presents an application designed to predict phishing attacks after comparing polynomial and radial basis function of support vector machine (SVM). The proposed application leverages a dataset of known legitimate, suspicious and phishing attacks stored in a database and employs an SVM algorithm for classification based on user input. The application provides a user-friendly graphical user interface (GUI) that allows reporting of new phishing incidents based on the features that have strong relationship in determining if a website is phishing or not. The proposed application utilizes the inherent scalability of database technology to support record expansion whenever there is an instance of a user initiating phishing prediction thereby, making it suitable for use in a wide range of organizational settings.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"2 ","pages":"Article 100036"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S277291842400002X/pdfft?md5=029e223b071a8cdaaec160468cac57c7&pid=1-s2.0-S277291842400002X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139633005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Wazid , Amit Kumar Mishra , Noor Mohd , Ashok Kumar Das
{"title":"A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact","authors":"Mohammad Wazid , Amit Kumar Mishra , Noor Mohd , Ashok Kumar Das","doi":"10.1016/j.csa.2024.100040","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100040","url":null,"abstract":"<div><p>Deepfake refers to synthetic media generated through artificial intelligence (AI) techniques. It involves creating or altering video, audio, or images to make them appear as though they depict something or someone else. Deepfake technology advances just like the mechanisms that are used to detect them. There’s an ongoing cat-and-mouse game between creators of deepfakes and those developing detection methods. As the technology that underpins deepfakes continues to improve, we are obligated to confront the repercussions that it will have on society. The introduction of educational initiatives, regulatory frameworks, technical solutions, and ethical concerns are all potential avenues via which this matter can be addressed. Multiple approaches need to be combined to identify deepfakes effectively. Detecting deepfakes can be challenging due to their increasingly sophisticated nature, but several methods and techniques are being developed to identify them. Mitigating the negative impact of deepfakes involves a combination of technological advancements, awareness, and policy measures. In this paper, we propose a secure deepfake mitigation framework. We have also provided a security analysis of the proposed framework via the Scyhter tool-based formal security verification. It proves that the proposed framework is secure against various cyber attacks. We also discuss the societal impact of deepfake events along with its detection process. Then some AI models, which are used for creating and detecting the deepfake events, are highlighted. Ultimately, we provide the practical implementation of the proposed framework to observe its functioning in a real-world scenario.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"2 ","pages":"Article 100040"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000067/pdfft?md5=04e4b598d9efad782ad0da18f0460890&pid=1-s2.0-S2772918424000067-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139743904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-efficient classification strategy for detecting interference and malicious sensor nodes in wireless body area Networks","authors":"Mohd Kaleem, Ganesh Gopal Devarajan","doi":"10.1016/j.csa.2024.100048","DOIUrl":"10.1016/j.csa.2024.100048","url":null,"abstract":"<div><p>Wireless Body Area Networks (WBANs) play a vital role in healthcare monitoring, using wireless sensors to track physiological parameters and predict illness onset. This study proposes a novel approach for detecting interference and malicious sensor nodes in WBANs, crucial for maintaining system integrity and performance. The method combines feature-based techniques with classification strategies to accurately identify anomalies. Features are taken from WBAN nodes and used to train Support Vector Machine (SVM) classifiers, which makes interference detection work well. A neurofuzzy inference system (ANFIS) classifier is also used to train the system on trusted and untrusted nodes at the start, which makes classification easier in real-world WBAN situations. Link failures due to rogue sensor nodes can severely impact WBAN performance, emphasizing the need for efficient detection and correction mechanisms. The proposed strategy introduces a weight metric to identify broken links, enhancing system reliability. Evaluation metrics, including LFD latency and packet delivery ratio, are analyzed to assess the efficacy of the approach. By improving interference detection and addressing link failures, this study contributes to enhancing the efficiency and reliability of WBAN networks, critical for advancing healthcare monitoring technologies.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"2 ","pages":"Article 100048"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000146/pdfft?md5=1f2586c9ff0787c84a1192d3baddb7e9&pid=1-s2.0-S2772918424000146-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140280627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}