{"title":"Secure Data Exchange Between Nodes in IoT Using TwoFish and DHE","authors":"B. Asare, Kester Quist-Aphetsi, Laurent Nana","doi":"10.1109/ICSIoT47925.2019.00024","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00024","url":null,"abstract":"Internet of Things exists primarily to collect, analyze and communicate data with a central storage or data center. The use of hardware firewalls and network security protocols to support a reliable data communication also exist to handle and mitigate security breaches that occur in these hardware setups. An unsecured data in itself is a threat to data communication networks including the Wireless Sensor Networks. Cryptographic algorithms continue to provide the much needed security framework for data that prevents unauthorized access to data. A strong cryptographic cipher, prevents sensitive data files and critical information from becoming vulnerable to cyber-attack. The sensor nodes have limitations with regards to computational capabilities and power, yet they are supposed to be operating for several hours autonomously. The challenge here is to identify and implement a reliable framework that is secured for data exchanges between nodes in cloud computing environments like the internet-of-Things (IoT). Several cryptographic algorithms are available that use combination of text, numbers and symbols as keys to convert plain text to cipher text thereby preventing data and other critical information to slip into wrong hands and unauthorized persons. We propose an ideal hybrid cryptographic algorithm to ensure a secured data for communication between nodes in IoT environment","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"293 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121147265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer Aided Education for Early Childhood: A Focus for Text and Object Identification","authors":"P. Owusu, Kester Quist-Aphetsi","doi":"10.1109/ICSIoT47925.2019.00011","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00011","url":null,"abstract":"This study assesses the impact of computer aided education for early childhood focusing on text and object identification. The study's focus was to find out if computer aided education was useful in childhood education. The study adopted the iterative method in modelling the systems different phases and a child moves from phase one which consist of two interfaces with basic text like A and B and if the child is able to recognized the text the computer pronounced continuously then he or she moves to the next phase. The study concluded that children who are encourage in using computer-aided technology in their learning achieve much as compared to children who uses the traditional learning techniques. It was recommended that children within the ages of 2 to 7 years should be motivated in using computer-aided technology in their education to enhance their learning skills.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122739418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Medical IoT Devices Using Diffie-Hellman and DES Cryptographic Schemes","authors":"Kester Quist-Aphetsi, Michael Christopher Xenya","doi":"10.1109/ICSIoT47925.2019.00025","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00025","url":null,"abstract":"IoT cuts across almost any field where communication or monitoring is needed. Recent works in IoT focuse on the architecture, secured communication, topologies, platforms etc. In the health sector, real-time access to sensor data like Pulse SpO2 sensor, BP sensor, Weight Scale, ECG sensor, Glucometer, EMG sensor, EEG sensor, and GSR sensor. Most of the recent works focuses on the robustness of the encryption and authentication schemes. Less attention is given to the fact that real time access to low processing nodes require a lightweight security scheme. We seek to address the said gaps by using Diffie-Hellman key sharing for the medical device authentication and DES for encryption of the health related data transfer.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132630822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using RC4 and Whirlpool for the Encryption and Validation of Data in IoT","authors":"B. Asare, Kester Quist-Aphetsi, Laurent Nana","doi":"10.1109/ICSIoT47925.2019.00027","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00027","url":null,"abstract":"We propose a combined cryptographic algorithm involving the RC4 and Whirlpool protocols for the encryption and validation of data in Internet-of-Things (IoT). The RC4 is a symmetric cryptographic algorithm or cipher for encrypting and decrypting the data; and the Whirlpool is a Hash function for ensuring correctness of data (data integrity and authentication) as data is communicated among nodes within the IoT ecosystem. The proposed algorithm is strong, easy to implement and above all, has a faster throughput. Although, it takes less time to implement, it has several advantages over other symmetric ciphers. The whirlpool hash is used to augment the strength of the RC4 to help it stand current cyber-attacks that the cipher suffers from.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116130431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Internet of Economic Things: The Socio-Economic Transformation Value of the Internet of Things (IoT)","authors":"L. Otu","doi":"10.1109/ICSIoT47925.2019.00026","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00026","url":null,"abstract":"the moniker Internet of Economic things seeks to discover household interactions with IoT and how they can drive Efficiency and Innovation in emerging and developing economies. A BN and SEM technique is used to analyze the infusion of IoT on Humans, in Homes, Retail, Offices and Cities and the ensuing impact on the economy. The study employs a survey instrument to deduce insight on the predicted impact of IoT in everyday household activities to drive economic efficiency and innovation (economic impact). The findings of this study highlight some key components of IoT in Human health monitoring and wellness; Automation of Retail, smart CRM; organizational redesign and worker monitoring are key facets of IoT infusion into everyday household activities that can impact the economy.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127589780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cryptographic Technique for Authentication and Validation of Forensic Account Audit Using SHA256","authors":"Michael Christopher Xenya, Kester Quist-Aphetsi","doi":"10.1109/ICSIoT47925.2019.00008","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00008","url":null,"abstract":"Fraudulent activities continue to pervade accounting records in many organizations. Though it is difficult task to curtail this crime, there are measures proposed to detect the perpetrators and in some cases prevent unauthorized activities in financial records. Our work proposes the use of cryptographic scheme to ensure that only authorized and valid records are added to the existing block of records which are tagged with timestamps. This has been achieved through the application of blockchain technology. Our approach uses sha256 algorithm for hashing accounting records thereby securing records the sample records which cannot not be altered easily. Moreover any attempt to alter any record would require all computing nodes to update the previously added records to the chain. Due to the structure of the block which disallows any data manipulation, our system proved efficient to maintaining the integrity of the forensic account records efficiently.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116656633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICSIoT 2019 Preface","authors":"","doi":"10.1109/icsiot47925.2019.00005","DOIUrl":"https://doi.org/10.1109/icsiot47925.2019.00005","url":null,"abstract":"","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121615421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Cyber Supply Chain Attacks on Cyber Physical Systems Using Bayesian Belief Network","authors":"Abel Yeboah-Ofori, Shareeful Islam, A. Brimicombe","doi":"10.1109/ICSIoT47925.2019.00014","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00014","url":null,"abstract":"Identifying cyberattack vectors on cyber supply chains (CSC) in the event of cyberattacks are very important in mitigating cybercrimes effectively on Cyber Physical Systems CPS. However, in the cyber security domain, the invincibility nature of cybercrimes makes it difficult and challenging to predict the threat probability and impact of cyber attacks. Although cybercrime phenomenon, risks, and treats contain a lot of unpredictability's, uncertainties and fuzziness, cyberattack detection should be practical, methodical and reasonable to be implemented. We explore Bayesian Belief Networks (BBN) as knowledge representation in artificial intelligence to be able to be formally applied probabilistic inference in the cyber security domain. The aim of this paper is to use Bayesian Belief Networks to detect cyberattacks on CSC in the CPS domain. We model cyberattacks using DAG method to determine the attack propagation. Further, we use a smart grid case study to demonstrate the applicability of attack and the cascading effects. The results show that BBN could be adapted to determine uncertainties in the event of cyberattacks in the CSC domain.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114410453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Centralized Data Validation Approach for Distributed Healthcare Systems in Dew-Fog Computing Environment Using Blockchain","authors":"Grace Simpson, Kester Quist-Aphetsi","doi":"10.1109/ICSIoT47925.2019.00006","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00006","url":null,"abstract":"Patients healthcare data should be securely available and accessible to authorized users when needed to facilitate healthcare professionals to make a decision regarding patients. Data from dew systems should be synchronized with the data in the cloud when there is connectivity. Validation of data from the dew system should be done by the cloud server to ensure patients data integrity. This paper proposes an adoption of a framework that validates centralized data for distributed healthcare systems in a dew-fog computing environment using tiger hash function to provide integrity to patient data.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133107838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Centralised Nodal Block Ledger for Remote Edge Devices in IoT","authors":"Kester Quist-Aphetsi, B. Asare, Laurent Nana","doi":"10.1109/ICSIoT47925.2019.00010","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00010","url":null,"abstract":"The availability of high computing power and relatively faster internet speed in recent times provides a strong incentive to launch attacks in the form of denial-of-service, identity theft, data theft, tampering of data and the like to the skewed requirements of the hacker. Traditional cryptographic data protection mechanisms have undergone successful attacks with great consequences of loss to individuals, institutions and Governments because of the sophistication of tools and platforms available today in the hands of the hackers. We propose a centralized ledger that has these security requirements: Authentication, Availability, Integrity, Confidentiality, and Non-repudiation to support remote edge devices towards the transmission of secured data within the cloud infrastructure.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123982768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}