2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ)最新文献

筛选
英文 中文
Keeping Connected in Internet-Isolated Locations 在互联网隔离的地方保持连接
2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ) Pub Date : 2022-02-26 DOI: 10.1109/MobiSecServ50855.2022.9727216
Kirsten Lunde Skaug, Elise Breivik Smebye, Besmir Tola, Yuming Jiang
{"title":"Keeping Connected in Internet-Isolated Locations","authors":"Kirsten Lunde Skaug, Elise Breivik Smebye, Besmir Tola, Yuming Jiang","doi":"10.1109/MobiSecServ50855.2022.9727216","DOIUrl":"https://doi.org/10.1109/MobiSecServ50855.2022.9727216","url":null,"abstract":"In many scenarios, Internet connectivity may not be available. In such situations, device-to-device (D2D) communication may be utilized to establish a peer-to-peer (P2P) network among mobile users in the vicinity. However, this raises a fundamental question as is how to ensure secure communication in such an infrastructure-less network. In this paper, we present an approach that enables connectivity between mobile devices in the vicinity and supports secure communication between users in Internet-isolated locations. Specifically, the proposed solution uses Wi-Fi Aware for establishing a P2P network and the mTLS (mutual Transport Layer Security) protocol to provide mutually authenticated and encrypted message transfer. Besides, a novel decentralized peer authentication (DPA) scheme compatible with Wi-Fi Aware and TLS is proposed, which enables peers to verify other peers to join the network. A proof-of-concept instant messaging application has been developed to test the proposed DPA scheme and to evaluate the performance of the proposed overall approach. Experimental results, which validate the proposed solution, are presented with findings and limitations discussed.","PeriodicalId":176376,"journal":{"name":"2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124972013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating Handover Behavior with 5G and Beyond TurboRAN Testbed 研究5G及以上TurboRAN测试平台的切换行为
2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ) Pub Date : 2022-02-26 DOI: 10.1109/MobiSecServ50855.2022.9727204
Muhammad Nabeel, Marvin Manalastas, Aneeqa Ijaz, H. Refai, A. Imran
{"title":"Investigating Handover Behavior with 5G and Beyond TurboRAN Testbed","authors":"Muhammad Nabeel, Marvin Manalastas, Aneeqa Ijaz, H. Refai, A. Imran","doi":"10.1109/MobiSecServ50855.2022.9727204","DOIUrl":"https://doi.org/10.1109/MobiSecServ50855.2022.9727204","url":null,"abstract":"With a recent roll out of Fifth Generation (5G), the focus of cellular industry and research community is now turned towards Sixth Generation (6G). The aim of 6G is to provide substantially higher capacity, seamless connectivity, better energy efficiency, spectral efficiency, reliability, and latency among others. To achieve this goal, new technologies and concepts are being proposed, however, to demonstrate their actual performance, it is important to integrate them in practical networks and then analyze the performance. Nowadays, testbeds are considered as an essential tool to evaluate realistic performance of cellular networks. Nevertheless, deploying a large-scale testbed often involves complex steps including network, site planning and choosing the appropriate hardware. In this work, we present our newly deployed TurboRAN testbed, and report all the findings, that are indispensable for evaluating different concepts of next generation cellular networks. The TurboRAN testbed is a complete integrated mobile cellular network deployed over 300 000 m2 area with the combination of indoor and outdoor cell deployment. It supports a variety of essential cellular networks features and aims to offer free access to the community for conducting experiments. In order to illustrate some of the capabilities of TurboRAN, in this work, we also investigate handover procedure and mobility management in different settings. In a nutshell, this work serves as a guide for readers who are planning to deploy a testbed for 5G and Beyond testing networks.","PeriodicalId":176376,"journal":{"name":"2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ)","volume":"17 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114028808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Recent Advances in Post-Quantum Cryptography for Networks: A Survey 网络后量子密码学的最新进展:综述
2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ) Pub Date : 2022-02-26 DOI: 10.1109/MobiSecServ50855.2022.9727214
E. Zeydan, Yekta Turk, Berkin Aksoy, S. B. Ozturk
{"title":"Recent Advances in Post-Quantum Cryptography for Networks: A Survey","authors":"E. Zeydan, Yekta Turk, Berkin Aksoy, S. B. Ozturk","doi":"10.1109/MobiSecServ50855.2022.9727214","DOIUrl":"https://doi.org/10.1109/MobiSecServ50855.2022.9727214","url":null,"abstract":"The development of quantum computers poses a new security threat to network infrastructures and services, as they will be powerful enough to break the most common forms of digital encryption. Existing encryption services based on Rivest–Shamir–Adleman (RSA), Diffie-Hellman (DH), Elliptic Curve Cryptography (ECC) and so on are vulnerable to attacks by quantum computers. Although the gap between today’s quantum computers and the threats they pose to current public-key cryptography is large, the telecommunications landscape should begin planning for the transition to the post-quantum era as early as possible. In this paper, we examine recent advances in Post Quantum Cryptography (PQC) algorithms from the perspective of the networking and telecommunications industries. The efforts are categorized at three levels, namely communication, computation (consisting of design, implementation and Public Key System (PKS)), and network. Some of the existing challenges and future recommendations for securing communication networks in the post-quantum era are also listed at the end of the paper.","PeriodicalId":176376,"journal":{"name":"2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123863865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Mobile Anonymization and Pseudonymization of Structured Health Data for Research 用于研究的结构化健康数据的移动匿名化和假名化
2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ) Pub Date : 2022-02-26 DOI: 10.1109/MobiSecServ50855.2022.9727206
Stella Dimopoulou, Chrysostomos Symvoulidis, Konstantinos Koutsoukos, Athanasios Kiourtis, Argyro Mavrogiorgou, D. Kyriazis
{"title":"Mobile Anonymization and Pseudonymization of Structured Health Data for Research","authors":"Stella Dimopoulou, Chrysostomos Symvoulidis, Konstantinos Koutsoukos, Athanasios Kiourtis, Argyro Mavrogiorgou, D. Kyriazis","doi":"10.1109/MobiSecServ50855.2022.9727206","DOIUrl":"https://doi.org/10.1109/MobiSecServ50855.2022.9727206","url":null,"abstract":"Healthcare Organizations need to share the health data of the patients with Research Centers in order to fulfill research purposes and improve the healthcare services provided to the patients. However, the information being processed by the Research Centers includes personal and/or sensitive data, which puts the privacy of the individuals at stake. To mitigate the risk of identity disclosure and privacy violation, a variety of privacy mechanisms, such as anonymization and pseudonymization, can be applied to the personal data of the data subjects. In this paper a mobile library is presented in order to either anonymize or pseudonymize the individuals’ personal information which follows the Fast Healthcare Interoperability Resources protocol. To evaluate the implementation and the functionalities of the library two case studies are described – one for each privacy mechanism.","PeriodicalId":176376,"journal":{"name":"2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126356062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Keynote Speech: 6G, revolution or continuity? 主题演讲:6G,革命还是延续?
2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ) Pub Date : 2022-02-26 DOI: 10.1109/mobisecserv50855.2022.9727215
{"title":"Keynote Speech: 6G, revolution or continuity?","authors":"","doi":"10.1109/mobisecserv50855.2022.9727215","DOIUrl":"https://doi.org/10.1109/mobisecserv50855.2022.9727215","url":null,"abstract":"","PeriodicalId":176376,"journal":{"name":"2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130205494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet Of Secure Elements Concepts And Applications. : Invited Paper 安全元素互联网的概念和应用。:特邀论文
2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ) Pub Date : 2022-02-26 DOI: 10.1109/MobiSecServ50855.2022.9727207
P. Urien
{"title":"Internet Of Secure Elements Concepts And Applications. : Invited Paper","authors":"P. Urien","doi":"10.1109/MobiSecServ50855.2022.9727207","DOIUrl":"https://doi.org/10.1109/MobiSecServ50855.2022.9727207","url":null,"abstract":"This paper introduces internet of secure elements paradigm and some applications. The main idea is to integrate TLS1.3 server in secure element (TLS-SE). These servers are identified by their server name (SN) attributes. On the client side authentication procedures are optionally hosted in dedicated identity module (TLS-IM). In internet of things context, TLS-SE stacks enhance object security. For example TLS-SE provides cryptographic resources (keystore), or interacts with sensors and actuators. We present grids of secure elements, optionally associated to secure element processors (SEP), called internet of secure elements servers (IOSE). Such server supports on-demand TLS-SE deployment; it also connect TLS-SE devices to internet. Finally we detail a procedure for transferring exclusive property of TLS-SE server to its user.","PeriodicalId":176376,"journal":{"name":"2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116833235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Privacy Leak Identification in Third-Party Android Libraries 第三方Android库中的隐私泄漏识别
2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ) Pub Date : 2022-02-26 DOI: 10.1109/MobiSecServ50855.2022.9727217
Christopher M. Schindler, Müslüm Atas, Thomas Strametz, J. Feiner, Reinhard Hofer
{"title":"Privacy Leak Identification in Third-Party Android Libraries","authors":"Christopher M. Schindler, Müslüm Atas, Thomas Strametz, J. Feiner, Reinhard Hofer","doi":"10.1109/MobiSecServ50855.2022.9727217","DOIUrl":"https://doi.org/10.1109/MobiSecServ50855.2022.9727217","url":null,"abstract":"Developers of mobile applications rely on the trust of their customers. On the one hand the requirement exists to create feature-rich and secure apps, which adhere to privacy standards to not deliberately disclose user information. On the other hand the development process must be streamlined to reduce costs. Here third-party libraries come into play. Inclusion of many, possibly nested libraries pose security risks, app-creators are often not aware of. This paper presents a way to combine free open-source tools to support developers in checking their application that it does not induce security issues by using third-party libraries. The tools FlowDroid, Frida, and mitm-proxy are used in combination in a simple and viable way to perform checks to identify privacy leaks of third-party apps. Our proposed setup and configuration empowers average app developers to preserve user privacy without being dedicated security experts and without expensive external advice.","PeriodicalId":176376,"journal":{"name":"2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114121458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Persistent S/MIME signature in e-mails forwarding 电子邮件转发中的持久S/MIME签名
2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ) Pub Date : 2022-02-26 DOI: 10.1109/MobiSecServ50855.2022.9727222
Charles Dubos, A. Serhrouchni
{"title":"Persistent S/MIME signature in e-mails forwarding","authors":"Charles Dubos, A. Serhrouchni","doi":"10.1109/MobiSecServ50855.2022.9727222","DOIUrl":"https://doi.org/10.1109/MobiSecServ50855.2022.9727222","url":null,"abstract":"The e-mail is nowadays one of the primary communication mean, that still lacks some simple security possibilities. Among them, the electronic signature is a powerful technology, but it can regrettably leads to misconceptions for the users in some case. In particular, considering the forwarding of an e-mail, the security attributes of the content set by the initial sender are not preserved. More precisely, when a signed e-mail is forwarded, the signature is lost after the forwarding. This is also misleading because, if the forwarder uses his own signature, the final receiver will see the message as signed, and will consider the signature as valid, whereas the signature is not the one of the authentic author of the e-mail. To address this problem, we propose the use of a header to indicate the forwarding of the e-mail without modifying its initial signature and content. With this simple header, the forwarding of an e-mail preserves its integrity and grants the receiver that the initial e-mail has not been modified. We also take into account the use of encrypted e-mails and propose a scheme for the proposed header to be operative. We also prove the proposed header is usable with the common e-mail providers and agents.","PeriodicalId":176376,"journal":{"name":"2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126147066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信