2019 International Conference on Cyber Security and Internet of Things (ICSIoT)最新文献

筛选
英文 中文
Secure Data Exchange Between Nodes in IoT Using TwoFish and DHE 使用TwoFish和DHE在物联网节点之间进行安全数据交换
2019 International Conference on Cyber Security and Internet of Things (ICSIoT) Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00024
B. Asare, Kester Quist-Aphetsi, Laurent Nana
{"title":"Secure Data Exchange Between Nodes in IoT Using TwoFish and DHE","authors":"B. Asare, Kester Quist-Aphetsi, Laurent Nana","doi":"10.1109/ICSIoT47925.2019.00024","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00024","url":null,"abstract":"Internet of Things exists primarily to collect, analyze and communicate data with a central storage or data center. The use of hardware firewalls and network security protocols to support a reliable data communication also exist to handle and mitigate security breaches that occur in these hardware setups. An unsecured data in itself is a threat to data communication networks including the Wireless Sensor Networks. Cryptographic algorithms continue to provide the much needed security framework for data that prevents unauthorized access to data. A strong cryptographic cipher, prevents sensitive data files and critical information from becoming vulnerable to cyber-attack. The sensor nodes have limitations with regards to computational capabilities and power, yet they are supposed to be operating for several hours autonomously. The challenge here is to identify and implement a reliable framework that is secured for data exchanges between nodes in cloud computing environments like the internet-of-Things (IoT). Several cryptographic algorithms are available that use combination of text, numbers and symbols as keys to convert plain text to cipher text thereby preventing data and other critical information to slip into wrong hands and unauthorized persons. We propose an ideal hybrid cryptographic algorithm to ensure a secured data for communication between nodes in IoT environment","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"293 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121147265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Computer Aided Education for Early Childhood: A Focus for Text and Object Identification 儿童早期计算机辅助教育:文本和对象识别的焦点
2019 International Conference on Cyber Security and Internet of Things (ICSIoT) Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00011
P. Owusu, Kester Quist-Aphetsi
{"title":"Computer Aided Education for Early Childhood: A Focus for Text and Object Identification","authors":"P. Owusu, Kester Quist-Aphetsi","doi":"10.1109/ICSIoT47925.2019.00011","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00011","url":null,"abstract":"This study assesses the impact of computer aided education for early childhood focusing on text and object identification. The study's focus was to find out if computer aided education was useful in childhood education. The study adopted the iterative method in modelling the systems different phases and a child moves from phase one which consist of two interfaces with basic text like A and B and if the child is able to recognized the text the computer pronounced continuously then he or she moves to the next phase. The study concluded that children who are encourage in using computer-aided technology in their learning achieve much as compared to children who uses the traditional learning techniques. It was recommended that children within the ages of 2 to 7 years should be motivated in using computer-aided technology in their education to enhance their learning skills.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122739418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Medical IoT Devices Using Diffie-Hellman and DES Cryptographic Schemes 使用Diffie-Hellman和DES加密方案保护医疗物联网设备
2019 International Conference on Cyber Security and Internet of Things (ICSIoT) Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00025
Kester Quist-Aphetsi, Michael Christopher Xenya
{"title":"Securing Medical IoT Devices Using Diffie-Hellman and DES Cryptographic Schemes","authors":"Kester Quist-Aphetsi, Michael Christopher Xenya","doi":"10.1109/ICSIoT47925.2019.00025","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00025","url":null,"abstract":"IoT cuts across almost any field where communication or monitoring is needed. Recent works in IoT focuse on the architecture, secured communication, topologies, platforms etc. In the health sector, real-time access to sensor data like Pulse SpO2 sensor, BP sensor, Weight Scale, ECG sensor, Glucometer, EMG sensor, EEG sensor, and GSR sensor. Most of the recent works focuses on the robustness of the encryption and authentication schemes. Less attention is given to the fact that real time access to low processing nodes require a lightweight security scheme. We seek to address the said gaps by using Diffie-Hellman key sharing for the medical device authentication and DES for encryption of the health related data transfer.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132630822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using RC4 and Whirlpool for the Encryption and Validation of Data in IoT 使用RC4和Whirlpool对物联网中的数据进行加密和验证
2019 International Conference on Cyber Security and Internet of Things (ICSIoT) Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00027
B. Asare, Kester Quist-Aphetsi, Laurent Nana
{"title":"Using RC4 and Whirlpool for the Encryption and Validation of Data in IoT","authors":"B. Asare, Kester Quist-Aphetsi, Laurent Nana","doi":"10.1109/ICSIoT47925.2019.00027","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00027","url":null,"abstract":"We propose a combined cryptographic algorithm involving the RC4 and Whirlpool protocols for the encryption and validation of data in Internet-of-Things (IoT). The RC4 is a symmetric cryptographic algorithm or cipher for encrypting and decrypting the data; and the Whirlpool is a Hash function for ensuring correctness of data (data integrity and authentication) as data is communicated among nodes within the IoT ecosystem. The proposed algorithm is strong, easy to implement and above all, has a faster throughput. Although, it takes less time to implement, it has several advantages over other symmetric ciphers. The whirlpool hash is used to augment the strength of the RC4 to help it stand current cyber-attacks that the cipher suffers from.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116130431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Internet of Economic Things: The Socio-Economic Transformation Value of the Internet of Things (IoT) 经济物联网:物联网(IoT)的社会经济转型价值
2019 International Conference on Cyber Security and Internet of Things (ICSIoT) Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00026
L. Otu
{"title":"The Internet of Economic Things: The Socio-Economic Transformation Value of the Internet of Things (IoT)","authors":"L. Otu","doi":"10.1109/ICSIoT47925.2019.00026","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00026","url":null,"abstract":"the moniker Internet of Economic things seeks to discover household interactions with IoT and how they can drive Efficiency and Innovation in emerging and developing economies. A BN and SEM technique is used to analyze the infusion of IoT on Humans, in Homes, Retail, Offices and Cities and the ensuing impact on the economy. The study employs a survey instrument to deduce insight on the predicted impact of IoT in everyday household activities to drive economic efficiency and innovation (economic impact). The findings of this study highlight some key components of IoT in Human health monitoring and wellness; Automation of Retail, smart CRM; organizational redesign and worker monitoring are key facets of IoT infusion into everyday household activities that can impact the economy.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127589780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Cryptographic Technique for Authentication and Validation of Forensic Account Audit Using SHA256 基于SHA256的法务账户审计认证与验证加密技术
2019 International Conference on Cyber Security and Internet of Things (ICSIoT) Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00008
Michael Christopher Xenya, Kester Quist-Aphetsi
{"title":"A Cryptographic Technique for Authentication and Validation of Forensic Account Audit Using SHA256","authors":"Michael Christopher Xenya, Kester Quist-Aphetsi","doi":"10.1109/ICSIoT47925.2019.00008","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00008","url":null,"abstract":"Fraudulent activities continue to pervade accounting records in many organizations. Though it is difficult task to curtail this crime, there are measures proposed to detect the perpetrators and in some cases prevent unauthorized activities in financial records. Our work proposes the use of cryptographic scheme to ensure that only authorized and valid records are added to the existing block of records which are tagged with timestamps. This has been achieved through the application of blockchain technology. Our approach uses sha256 algorithm for hashing accounting records thereby securing records the sample records which cannot not be altered easily. Moreover any attempt to alter any record would require all computing nodes to update the previously added records to the chain. Due to the structure of the block which disallows any data manipulation, our system proved efficient to maintaining the integrity of the forensic account records efficiently.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116656633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ICSIoT 2019 Preface
2019 International Conference on Cyber Security and Internet of Things (ICSIoT) Pub Date : 2019-05-01 DOI: 10.1109/icsiot47925.2019.00005
{"title":"ICSIoT 2019 Preface","authors":"","doi":"10.1109/icsiot47925.2019.00005","DOIUrl":"https://doi.org/10.1109/icsiot47925.2019.00005","url":null,"abstract":"","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121615421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Cyber Supply Chain Attacks on Cyber Physical Systems Using Bayesian Belief Network 基于贝叶斯信念网络的网络物理系统供应链攻击检测
2019 International Conference on Cyber Security and Internet of Things (ICSIoT) Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00014
Abel Yeboah-Ofori, Shareeful Islam, A. Brimicombe
{"title":"Detecting Cyber Supply Chain Attacks on Cyber Physical Systems Using Bayesian Belief Network","authors":"Abel Yeboah-Ofori, Shareeful Islam, A. Brimicombe","doi":"10.1109/ICSIoT47925.2019.00014","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00014","url":null,"abstract":"Identifying cyberattack vectors on cyber supply chains (CSC) in the event of cyberattacks are very important in mitigating cybercrimes effectively on Cyber Physical Systems CPS. However, in the cyber security domain, the invincibility nature of cybercrimes makes it difficult and challenging to predict the threat probability and impact of cyber attacks. Although cybercrime phenomenon, risks, and treats contain a lot of unpredictability's, uncertainties and fuzziness, cyberattack detection should be practical, methodical and reasonable to be implemented. We explore Bayesian Belief Networks (BBN) as knowledge representation in artificial intelligence to be able to be formally applied probabilistic inference in the cyber security domain. The aim of this paper is to use Bayesian Belief Networks to detect cyberattacks on CSC in the CPS domain. We model cyberattacks using DAG method to determine the attack propagation. Further, we use a smart grid case study to demonstrate the applicability of attack and the cascading effects. The results show that BBN could be adapted to determine uncertainties in the event of cyberattacks in the CSC domain.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114410453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Centralized Data Validation Approach for Distributed Healthcare Systems in Dew-Fog Computing Environment Using Blockchain 基于区块链的露雾计算环境下分布式医疗系统集中式数据验证方法
2019 International Conference on Cyber Security and Internet of Things (ICSIoT) Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00006
Grace Simpson, Kester Quist-Aphetsi
{"title":"A Centralized Data Validation Approach for Distributed Healthcare Systems in Dew-Fog Computing Environment Using Blockchain","authors":"Grace Simpson, Kester Quist-Aphetsi","doi":"10.1109/ICSIoT47925.2019.00006","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00006","url":null,"abstract":"Patients healthcare data should be securely available and accessible to authorized users when needed to facilitate healthcare professionals to make a decision regarding patients. Data from dew systems should be synchronized with the data in the cloud when there is connectivity. Validation of data from the dew system should be done by the cloud server to ensure patients data integrity. This paper proposes an adoption of a framework that validates centralized data for distributed healthcare systems in a dew-fog computing environment using tiger hash function to provide integrity to patient data.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133107838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Centralised Nodal Block Ledger for Remote Edge Devices in IoT 物联网中远程边缘设备的集中式节点块分类账
2019 International Conference on Cyber Security and Internet of Things (ICSIoT) Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00010
Kester Quist-Aphetsi, B. Asare, Laurent Nana
{"title":"Centralised Nodal Block Ledger for Remote Edge Devices in IoT","authors":"Kester Quist-Aphetsi, B. Asare, Laurent Nana","doi":"10.1109/ICSIoT47925.2019.00010","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00010","url":null,"abstract":"The availability of high computing power and relatively faster internet speed in recent times provides a strong incentive to launch attacks in the form of denial-of-service, identity theft, data theft, tampering of data and the like to the skewed requirements of the hacker. Traditional cryptographic data protection mechanisms have undergone successful attacks with great consequences of loss to individuals, institutions and Governments because of the sophistication of tools and platforms available today in the hands of the hackers. We propose a centralized ledger that has these security requirements: Authentication, Availability, Integrity, Confidentiality, and Non-repudiation to support remote edge devices towards the transmission of secured data within the cloud infrastructure.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123982768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信