Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security最新文献

筛选
英文 中文
Intrusion Detection in the RPL-connected 6LoWPAN Networks rpl连接的6LoWPAN网络中的入侵检测
Dharmini Shreenivas, S. Raza, T. Voigt
{"title":"Intrusion Detection in the RPL-connected 6LoWPAN Networks","authors":"Dharmini Shreenivas, S. Raza, T. Voigt","doi":"10.1145/3055245.3055252","DOIUrl":"https://doi.org/10.1145/3055245.3055252","url":null,"abstract":"The interconnectivity of 6LoWPAN networks with the Internet raises serious security concerns, as constrained 6LoWPAN devices are accessible anywhere from the untrusted global Internet. Also, 6LoWPAN devices are mostly deployed in unattended environments, hence easy to capture and clone. Despite that state of the art crypto solutions provide information security, IPv6 enabled smart objects are vulnerable to attacks from outside and inside 6LoWPAN networks that are aimed to disrupt networks. This paper attempts to identify intrusions aimed to disrupt the Routing Protocol for Low-Power and Lossy Networks (RPL).In order to improve the security within 6LoWPAN networks, we extend SVELTE, an intrusion detection system for the Internet of Things, with an intrusion detection module that uses the ETX (Expected Transmissions) metric. In RPL, ETX is a link reliability metric and monitoring the ETX value can prevent an intruder from actively engaging 6LoWPAN nodes in malicious activities. We also propose geographic hints to identify malicious nodes that conduct attacks against ETX-based networks. We implement these extensions in the Contiki OS and evaluate them using the Cooja simulator.","PeriodicalId":215275,"journal":{"name":"Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133962696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Session details: Session 1: Design & Primitives 会议细节:会议1:设计和原语
S. Raza
{"title":"Session details: Session 1: Design & Primitives","authors":"S. Raza","doi":"10.1145/3254082","DOIUrl":"https://doi.org/10.1145/3254082","url":null,"abstract":"","PeriodicalId":215275,"journal":{"name":"Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133593405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Data Provenance for the Internet of Things 物联网的安全数据来源
M. Aman, K. Chua, B. Sikdar
{"title":"Secure Data Provenance for the Internet of Things","authors":"M. Aman, K. Chua, B. Sikdar","doi":"10.1145/3055245.3055255","DOIUrl":"https://doi.org/10.1145/3055245.3055255","url":null,"abstract":"The vision of smart environments, systems, and services is driven by the development of the Internet of Things (IoT). IoT devices produce large amounts of data and this data is used to make critical decisions in many systems. The data produced by these devices has to satisfy various security related requirements in order to be useful in practical scenarios. One of these requirements is data provenance which allows a user to trust the data regarding its origin and location. The low cost of many IoT devices and the fact that they may be deployed in unprotected spaces requires security protocols to be efficient and secure against physical attacks. This paper proposes a light-weight protocol for data provenance in the IoT. The proposed protocol uses physical unclonable functions (PUFs) to provide physical security and uniquely identify an IoT device. Moreover, wireless channel characteristics are used to uniquely identify a wireless link between an IoT device and a server/user. A brief security and performance analysis are presented to give a preliminary validation of the protocol.","PeriodicalId":215275,"journal":{"name":"Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132088178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography 环- lwe密文压缩和纠错:轻量级后量子密码的工具
Markku-Juhani O. Saarinen
{"title":"Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography","authors":"Markku-Juhani O. Saarinen","doi":"10.1145/3055245.3055254","DOIUrl":"https://doi.org/10.1145/3055245.3055254","url":null,"abstract":"Some lattice-based public key cryptosystems allow one to transform ciphertext from one lattice or ring representation to another efficiently and without knowledge of public and private keys. In this work we explore this lattice transformation property from cryptographic engineering viewpoint. We apply ciphertext transformation to compress Ring-LWE ciphertexts and to enable efficient decryption on an ultra-lightweight implementation targets such as Internet of Things, Smart Cards, and RFID applications. Significantly, this can be done without modifying the original encryption procedure or its security parameters. Such flexibility is unique to lattice-based cryptography and may find additional, unique real-life applications. Ciphertext compression can significantly increase the probability of decryption errors. We show that the frequency of such errors can be analyzed, measured and used to derive precise failure bounds for n-bit error correction. We introduce XECC, a fast multi-error correcting code that allows constant time implementation in software. We use these tools to construct and explore TRUNC8, a concrete Ring-LWE encryption and authentication system. We analyze its implementation, security, and performance. We show that our lattice compression technique reduces ciphertext size by more than 40% at equivalent security level, while also enabling public key cryptography on previously unreachable ultra-lightweight platforms. The experimental public key encryption and authentication system has been implemented on an 8-bit AVR target, where it easily outperforms elliptic curve and RSA-based proposals at similar security level. Similar results have been obtained with a Cortex M0 implementation. The new decryption code requires only a fraction of the software footprint of previous Ring-LWE implementations with the same encryption parameters, and is well suited for hardware implementation.","PeriodicalId":215275,"journal":{"name":"Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121426278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Session details: Keynote Address 会议详情:主题演讲
Christina Poepper
{"title":"Session details: Keynote Address","authors":"Christina Poepper","doi":"10.1145/3254081","DOIUrl":"https://doi.org/10.1145/3254081","url":null,"abstract":"","PeriodicalId":215275,"journal":{"name":"Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121168523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 2: Attacks & Preventions 会话详细信息:会话2:攻击与预防
Markku-Juhani O. Saarinen
{"title":"Session details: Session 2: Attacks & Preventions","authors":"Markku-Juhani O. Saarinen","doi":"10.1145/3254083","DOIUrl":"https://doi.org/10.1145/3254083","url":null,"abstract":"","PeriodicalId":215275,"journal":{"name":"Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125888411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain Engineering for the Internet of Things: Systems Security Perspective 物联网区块链工程:系统安全视角
D. Svetinovic
{"title":"Blockchain Engineering for the Internet of Things: Systems Security Perspective","authors":"D. Svetinovic","doi":"10.1145/3055245.3055256","DOIUrl":"https://doi.org/10.1145/3055245.3055256","url":null,"abstract":"The Internet of Things (IoT) technology has a potential to bring the benefits of intelligently interconnecting not just computers and humans, but most of everyday things. IoT has a promise of opening significant business process improvement opportunities leading to economic growth and cost reductions. However, there are many challenges facing IoT, including significant scalability and security challenges due to the integration of potentially huge number of things into the network. Many of scalability and security issues stem from a centralized, primarily client/server, architecture of IoT systems and frameworks. Blockchain technology, as a relativelly new approach to decentralized computation and assets management and transfer, has a potential to help solve a number of scalability and security issues that IoT is facing, primarilly through the removal of centralized points of failure for such systems. As such, blockchain technology and IoT integration provides a promising direction and it has recently generated significant research interest, e.g., [4]. In this talk, we present our experiences based on our recent project in enhancing security and privacy in decentralized energy trading in smart grids using blockchain, multi-signatures and anonymous messaging streams [1], that has built upon our previous work on Bitcoin-based decentralized carbon emissions trading infrastructure model [2]. In particular, we present the blockchain systems security issues within the context of IoT security and privacy requirements [3]. This is done with the intention of producing an early integrated security model for blockchain-powered IoT systems [5]. The presentation is constrained to the discussion of the architecture-level requirements [6]. Finally, we will present the main opportunity loss if the integration ignores the full realization of the real-world asset transaction paradigm.","PeriodicalId":215275,"journal":{"name":"Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128999120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
IoTScanner: Detecting Privacy Threats in IoT Neighborhoods IoTScanner:检测物联网社区中的隐私威胁
S. Siby, R. Maiti, Nils Ole Tippenhauer
{"title":"IoTScanner: Detecting Privacy Threats in IoT Neighborhoods","authors":"S. Siby, R. Maiti, Nils Ole Tippenhauer","doi":"10.1145/3055245.3055253","DOIUrl":"https://doi.org/10.1145/3055245.3055253","url":null,"abstract":"In the context of the emerging Internet of Things (IoT), a proliferation of wireless connectivity can be expected. That ubiquitous wireless communication will be hard to centrally manage and control, and can be expected to be opaque to end users. As a result, owners and users of physical space are threatened to lose control over their digital environments. In this work, we propose the idea of an IoTScanner. The IoTScanner integrates a range of radios to allow local reconnaissance of existing wireless infrastructure and participating nodes. It enumerates such devices, identifies connection patterns, and provides valuable insights for technical support and home users alike. Using our IoTScanner, we investigate metrics that could be used to classify devices and identify privacy threats in an IoT neighborhood.","PeriodicalId":215275,"journal":{"name":"Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131555637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things 让猫从袋子里出来:物联网安全分析的整体方法
V. Sachidananda, Shachar Siboni, A. Shabtai, Jinghui Toh, Suhas Bhairav, Y. Elovici
{"title":"Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things","authors":"V. Sachidananda, Shachar Siboni, A. Shabtai, Jinghui Toh, Suhas Bhairav, Y. Elovici","doi":"10.1145/3055245.3055251","DOIUrl":"https://doi.org/10.1145/3055245.3055251","url":null,"abstract":"The exponential increase of Internet of Things (IoT) devices have resulted in a range of new and unanticipated vulnerabilities associated with their use. IoT devices from smart homes to smart enterprises can easily be compromised. One of the major problems associated with the IoT is maintaining security; the vulnerable nature of IoT devices poses a challenge to many aspects of security, including security testing and analysis. It is trivial to perform the security analysis for IoT devices to understand the loop holes and very nature of the devices itself. Given these issues, there has been less emphasis on security testing and analysis of the IoT. In this paper, we show our preliminary efforts in the area of security analysis for IoT devices and introduce a security IoT testbed for performing security analysis. We also discuss the necessary design, requirements and the architecture to support our security analysis conducted via the proposed testbed.","PeriodicalId":215275,"journal":{"name":"Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security","volume":"50 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132463115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security 第三届ACM物联网隐私、信任和安全国际研讨会论文集
Richard Chow, G. Saldamli
{"title":"Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security","authors":"Richard Chow, G. Saldamli","doi":"10.1145/3055245","DOIUrl":"https://doi.org/10.1145/3055245","url":null,"abstract":"It is our great pleasure to welcome you to the 2017 ACM Workshop on IoT Privacy, Trust, and Security -- IoTPTS'17. The Internet of Things (IoT) refers to an exploding complex ecosystem that ranges from cloud backend services and big-data analytics to home, public, industrial, and wearable sensor devices and appliances. IoTPTS'17 explores opportunities to design privacy, trust, and security into these systems. \u0000 \u0000This is the third year of the IoTPTS Workshop and the call for papers attracted 14 submissions worldwide from 8 countries. The final program contained 5 papers (representing an acceptance rate of 35%) and a keynote Blockchain Engineering for the Internet of Things: Systems Security Perspective by Professor Davor Svetinovic from the Masdar Institute of Science and Technology, Abu Dhabi.","PeriodicalId":215275,"journal":{"name":"Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133643085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信