2019 12th CMI Conference on Cybersecurity and Privacy (CMI)最新文献

筛选
英文 中文
Towards Formal Methods of IoT Application Layer Protocols 物联网应用层协议的形式化方法
2019 12th CMI Conference on Cybersecurity and Privacy (CMI) Pub Date : 2019-11-01 DOI: 10.1109/CMI48017.2019.8962139
Katharina Hofer-Schmitz, Branka Stojanović
{"title":"Towards Formal Methods of IoT Application Layer Protocols","authors":"Katharina Hofer-Schmitz, Branka Stojanović","doi":"10.1109/CMI48017.2019.8962139","DOIUrl":"https://doi.org/10.1109/CMI48017.2019.8962139","url":null,"abstract":"This paper provides an overview of the application of formal methods for two most commonly used application layer protocols in IoT domain, MQTT and CoAP. Formal methods give the possibility to improve security and are even able to provide security guarantees with respect to a given model. Our research shows, that we can distinguish three formal verification fields for the two protocols, namely qualitative and quantitative analysis, implementations and security properties. A formal verification review of selected protocols is provided in accordance with these fields, used tools and considered properties. Based on that research, a short summary and open challenges are given.","PeriodicalId":142770,"journal":{"name":"2019 12th CMI Conference on Cybersecurity and Privacy (CMI)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116966884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
[Copyright notice] (版权)
2019 12th CMI Conference on Cybersecurity and Privacy (CMI) Pub Date : 2019-11-01 DOI: 10.1109/cmi48017.2019.8962132
{"title":"[Copyright notice]","authors":"","doi":"10.1109/cmi48017.2019.8962132","DOIUrl":"https://doi.org/10.1109/cmi48017.2019.8962132","url":null,"abstract":"","PeriodicalId":142770,"journal":{"name":"2019 12th CMI Conference on Cybersecurity and Privacy (CMI)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124095751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge-computing enhanced privacy protection for industrial ecosystems in the context of SMEs 边缘计算增强了中小企业环境下工业生态系统的隐私保护
2019 12th CMI Conference on Cybersecurity and Privacy (CMI) Pub Date : 2019-11-01 DOI: 10.1109/CMI48017.2019.8962138
Alexander Giehl, Peter Schneider, Maximilian Busch, F. Schnoes, Robin Kleinwort, M. Zaeh
{"title":"Edge-computing enhanced privacy protection for industrial ecosystems in the context of SMEs","authors":"Alexander Giehl, Peter Schneider, Maximilian Busch, F. Schnoes, Robin Kleinwort, M. Zaeh","doi":"10.1109/CMI48017.2019.8962138","DOIUrl":"https://doi.org/10.1109/CMI48017.2019.8962138","url":null,"abstract":"The ongoing transformation of the manufacturing landscape introduces new business opportunities for enterprises but also brings new challenges with it. Especially small- and medium-sized companies (SMEs) require an increasing effort to stay competitive. Data produced on the shop-floor can be harnessed to conduct analyses useful to plant operators, e.g., for optimization of production capabilities or for increasing plant security. Therefore, we propose a privacy-preserving edge-computing architecture to facilitate a platform for utilizing such applications. Our approach is motivated by requirements from SMEs in Germany, e.g., protection of intellectual property, and employs suitable privacy models. We demonstrate the viability of the proposed framework by evaluation of uses cases for machine chatter optimization and anomaly detection within plants.","PeriodicalId":142770,"journal":{"name":"2019 12th CMI Conference on Cybersecurity and Privacy (CMI)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115859351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Privacy-Preserving Context Ontology (PPCO) for Smart Connected Toys 智能连接玩具的隐私保护上下文本体(PPCO
2019 12th CMI Conference on Cybersecurity and Privacy (CMI) Pub Date : 2019-11-01 DOI: 10.1109/CMI48017.2019.8962141
Benjamin Yankson, Farkhund Iqbal, Saiqa Aleem, B. Shah, P. Hung, Anna Priscilla de Albuquerque
{"title":"A Privacy-Preserving Context Ontology (PPCO) for Smart Connected Toys","authors":"Benjamin Yankson, Farkhund Iqbal, Saiqa Aleem, B. Shah, P. Hung, Anna Priscilla de Albuquerque","doi":"10.1109/CMI48017.2019.8962141","DOIUrl":"https://doi.org/10.1109/CMI48017.2019.8962141","url":null,"abstract":"Ubiquitous mobile technology like Smart Connected Toys (SCTs) have unique challenges of clearly defining context data elements due to unstructured, consistent, and persistent changes in the environment. SCTs interact with its context to achieve meaningful functionality while maintaining context data privacy. As SCTs become increasingly pervasive, the toys with their built-in features must be aware of and adapt to their changing contexts while providing a sense of privacy and security to contextual data processed to support its use. This paper presents a context profile through SCT Privacy-Preserving Context Ontology (PPCO) and examines the benefits of designing a context data model for SCT privacy goals. Our proposed data context model is an abstract model, which organizes elements of data and standardizes how they relate to one another. It organizes properties of related entries in SCT based on eXtensible Markup Language (XML) to depict and project how the SCT contextual information - related to the SCTs' environment - is assembled and maintained. Ultimately, the PPCO provides a structured description of the SCT context profile necessary to identify needed privacy controls to support SCT privacy goals.","PeriodicalId":142770,"journal":{"name":"2019 12th CMI Conference on Cybersecurity and Privacy (CMI)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125918185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Defying Censorship with Multi-Circuit Tor and Linear Network Coding 用多电路Tor和线性网络编码对抗审查
2019 12th CMI Conference on Cybersecurity and Privacy (CMI) Pub Date : 2019-07-08 DOI: 10.1109/CMI48017.2019.8962147
Anna Engelmann, A. Jukan
{"title":"Defying Censorship with Multi-Circuit Tor and Linear Network Coding","authors":"Anna Engelmann, A. Jukan","doi":"10.1109/CMI48017.2019.8962147","DOIUrl":"https://doi.org/10.1109/CMI48017.2019.8962147","url":null,"abstract":"Anonymity networks are an increasingly important part of Internet evolution to providing practical mechanisms to enhance anonymity and security of network users. The best known anonymity network, The Onion Routing (Tor), is not only subject to user deanonymization attacks but also subject to censorship attacks by blocking the public and secret Tor entry routers, e.g., bridges, or by jamming Tor traffic to prevent users to access Tor network. To help further evolution of anonymity networks, we focus in this work on censorship attacks, and propose to enhance the well-known multipath Tor technique with linear network coding (LNC). We analyze anonymity, privacy and censorship success considering different types of adversaries and the amount of honest and compromised components in the Tor and in the underlying network. The results show that LNC can significantly improve the robustness of Tor against censorship and maintain sufficient anonymity and privacy levels.","PeriodicalId":142770,"journal":{"name":"2019 12th CMI Conference on Cybersecurity and Privacy (CMI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124836074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信