{"title":"Towards Formal Methods of IoT Application Layer Protocols","authors":"Katharina Hofer-Schmitz, Branka Stojanović","doi":"10.1109/CMI48017.2019.8962139","DOIUrl":"https://doi.org/10.1109/CMI48017.2019.8962139","url":null,"abstract":"This paper provides an overview of the application of formal methods for two most commonly used application layer protocols in IoT domain, MQTT and CoAP. Formal methods give the possibility to improve security and are even able to provide security guarantees with respect to a given model. Our research shows, that we can distinguish three formal verification fields for the two protocols, namely qualitative and quantitative analysis, implementations and security properties. A formal verification review of selected protocols is provided in accordance with these fields, used tools and considered properties. Based on that research, a short summary and open challenges are given.","PeriodicalId":142770,"journal":{"name":"2019 12th CMI Conference on Cybersecurity and Privacy (CMI)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116966884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alexander Giehl, Peter Schneider, Maximilian Busch, F. Schnoes, Robin Kleinwort, M. Zaeh
{"title":"Edge-computing enhanced privacy protection for industrial ecosystems in the context of SMEs","authors":"Alexander Giehl, Peter Schneider, Maximilian Busch, F. Schnoes, Robin Kleinwort, M. Zaeh","doi":"10.1109/CMI48017.2019.8962138","DOIUrl":"https://doi.org/10.1109/CMI48017.2019.8962138","url":null,"abstract":"The ongoing transformation of the manufacturing landscape introduces new business opportunities for enterprises but also brings new challenges with it. Especially small- and medium-sized companies (SMEs) require an increasing effort to stay competitive. Data produced on the shop-floor can be harnessed to conduct analyses useful to plant operators, e.g., for optimization of production capabilities or for increasing plant security. Therefore, we propose a privacy-preserving edge-computing architecture to facilitate a platform for utilizing such applications. Our approach is motivated by requirements from SMEs in Germany, e.g., protection of intellectual property, and employs suitable privacy models. We demonstrate the viability of the proposed framework by evaluation of uses cases for machine chatter optimization and anomaly detection within plants.","PeriodicalId":142770,"journal":{"name":"2019 12th CMI Conference on Cybersecurity and Privacy (CMI)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115859351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Benjamin Yankson, Farkhund Iqbal, Saiqa Aleem, B. Shah, P. Hung, Anna Priscilla de Albuquerque
{"title":"A Privacy-Preserving Context Ontology (PPCO) for Smart Connected Toys","authors":"Benjamin Yankson, Farkhund Iqbal, Saiqa Aleem, B. Shah, P. Hung, Anna Priscilla de Albuquerque","doi":"10.1109/CMI48017.2019.8962141","DOIUrl":"https://doi.org/10.1109/CMI48017.2019.8962141","url":null,"abstract":"Ubiquitous mobile technology like Smart Connected Toys (SCTs) have unique challenges of clearly defining context data elements due to unstructured, consistent, and persistent changes in the environment. SCTs interact with its context to achieve meaningful functionality while maintaining context data privacy. As SCTs become increasingly pervasive, the toys with their built-in features must be aware of and adapt to their changing contexts while providing a sense of privacy and security to contextual data processed to support its use. This paper presents a context profile through SCT Privacy-Preserving Context Ontology (PPCO) and examines the benefits of designing a context data model for SCT privacy goals. Our proposed data context model is an abstract model, which organizes elements of data and standardizes how they relate to one another. It organizes properties of related entries in SCT based on eXtensible Markup Language (XML) to depict and project how the SCT contextual information - related to the SCTs' environment - is assembled and maintained. Ultimately, the PPCO provides a structured description of the SCT context profile necessary to identify needed privacy controls to support SCT privacy goals.","PeriodicalId":142770,"journal":{"name":"2019 12th CMI Conference on Cybersecurity and Privacy (CMI)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125918185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defying Censorship with Multi-Circuit Tor and Linear Network Coding","authors":"Anna Engelmann, A. Jukan","doi":"10.1109/CMI48017.2019.8962147","DOIUrl":"https://doi.org/10.1109/CMI48017.2019.8962147","url":null,"abstract":"Anonymity networks are an increasingly important part of Internet evolution to providing practical mechanisms to enhance anonymity and security of network users. The best known anonymity network, The Onion Routing (Tor), is not only subject to user deanonymization attacks but also subject to censorship attacks by blocking the public and secret Tor entry routers, e.g., bridges, or by jamming Tor traffic to prevent users to access Tor network. To help further evolution of anonymity networks, we focus in this work on censorship attacks, and propose to enhance the well-known multipath Tor technique with linear network coding (LNC). We analyze anonymity, privacy and censorship success considering different types of adversaries and the amount of honest and compromised components in the Tor and in the underlying network. The results show that LNC can significantly improve the robustness of Tor against censorship and maintain sufficient anonymity and privacy levels.","PeriodicalId":142770,"journal":{"name":"2019 12th CMI Conference on Cybersecurity and Privacy (CMI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124836074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}