2019 International Conference on Cyber Security and Internet of Things (ICSIoT)最新文献

筛选
英文 中文
Node to Node Secure Data Communication for IoT Devices Using Diffie-Hellman, AES, and MD5 Cryptographic Schemes 使用Diffie-Hellman、AES和MD5加密方案实现物联网设备节点到节点的安全数据通信
2019 International Conference on Cyber Security and Internet of Things (ICSIoT) Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00022
Kester Quist-Aphetsi, Michael Christopher Xenya
{"title":"Node to Node Secure Data Communication for IoT Devices Using Diffie-Hellman, AES, and MD5 Cryptographic Schemes","authors":"Kester Quist-Aphetsi, Michael Christopher Xenya","doi":"10.1109/ICSIoT47925.2019.00022","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00022","url":null,"abstract":"Identifying the right source and target nodes in IoT as well as secure data communication is very vital in ensuring security, validity and reliability of IoT communication. Since more devices are being programmed to exchange data and commands autonomously in IoT and wireless sensor networks, security and authenticity of such transmitted data is very crucial. This calls for strong security approaches to prevent both passive and active attackers against data communication. This work proposed a scheme for securing communication among IoT devices by applying Diffie-Hellman encryption algorithm to authenticate the communicating nodes while using AES and MD5 to encrypt and validate the data transfer among the nodes.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"47 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121013734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
[Title page iii] [标题页iii]
2019 International Conference on Cyber Security and Internet of Things (ICSIoT) Pub Date : 2019-05-01 DOI: 10.1109/icsiot47925.2019.00002
{"title":"[Title page iii]","authors":"","doi":"10.1109/icsiot47925.2019.00002","DOIUrl":"https://doi.org/10.1109/icsiot47925.2019.00002","url":null,"abstract":"","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115119226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovative Prediction of Vehicle Position Based on Closed Loop Modeling of Capacitive Accelerometer 基于电容式加速度计闭环建模的创新性车辆位置预测
2019 International Conference on Cyber Security and Internet of Things (ICSIoT) Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00017
Mamudu Hamidu, J. J. Kponyo, A. Acakpovi
{"title":"Innovative Prediction of Vehicle Position Based on Closed Loop Modeling of Capacitive Accelerometer","authors":"Mamudu Hamidu, J. J. Kponyo, A. Acakpovi","doi":"10.1109/ICSIoT47925.2019.00017","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00017","url":null,"abstract":"This paper presents a novel model of a closed loop capacitive accelerometer. Capacitive accelerometer is able to detect the displacement/position of a vehicle by means of Position-Velocity-Acceleration (PVA) model. The closed loop design is design to overcome the steady state error obtained in the equivalent open loop design. Therefore, in this paper, a parallel Proportional Integral Derivative (PID) controller with a derivative filter is designed to establish a unity feedback accelerometer for the purpose of reducing or eliminating the steady state error. The accelerometer gave an exact linear dependence of displacement on a step-like function of acceleration signal input. Matlab/Simulink software was used to design the control system and construct the overall proposed mathematical model. Test show that, for acceleration value of ±1 gravity (g) produces displacement of ±1 meter (m). The system produces an initial spike with a transient time of less than 0.1 secs. This is same for an acceleration of ±10 g. The use of PID controller with a derivative filter in this paper provide a significant improvement in predicting the linear dependence relationship between acceleration and displacement than the traditional approach of continuous tuning of PID for accelerometer system stability.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"87 42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130376160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparative Study of User Data Security and Privacy in Native and Cross Platform Android Mobile Banking Applications 原生和跨平台Android手机银行应用中用户数据安全和隐私的比较研究
2019 International Conference on Cyber Security and Internet of Things (ICSIoT) Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00007
E. Ansong, Thomas Quansah Synaepa-Addision
{"title":"A Comparative Study of User Data Security and Privacy in Native and Cross Platform Android Mobile Banking Applications","authors":"E. Ansong, Thomas Quansah Synaepa-Addision","doi":"10.1109/ICSIoT47925.2019.00007","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00007","url":null,"abstract":"This research reports on security and privacy of user data transmitted in Android mobile banking applications. The basis of this approach was to experiment and urge a choice of development framework which ensures user data privacy in banking mobile applications of banks operating in Ghana. The results obtained directed attention to the fact that mobile banking applications developed using cross platform development frameworks (particularly Cordova) make applications less vulnerable by making use of most of the permissions requested ensuring user data privacy as compared to applications development using native development framework.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129317689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mitigating Cyber Supply Chain Risks in Cyber Physical Systems Organizational Landscape 降低网络物理系统组织结构中的网络供应链风险
2019 International Conference on Cyber Security and Internet of Things (ICSIoT) Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00020
Abel Yeboah-Ofori, Daniel Opoku-Akyea
{"title":"Mitigating Cyber Supply Chain Risks in Cyber Physical Systems Organizational Landscape","authors":"Abel Yeboah-Ofori, Daniel Opoku-Akyea","doi":"10.1109/ICSIoT47925.2019.00020","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00020","url":null,"abstract":"Cyber supply chain (CSC) provide an organizationwith the ability to align its business processes, informationflows and data structures with other organization. However, the increase interdependencies have brought about inherent, threats, risks, attacks and vulnerabilities that adversaries maybe able to exploit when not properly mitigated. Additionally, every cyberattack on each organization increases theprobability of the risk cascading to others. The CSC risk hasincreased exponentially due to uncertainties surroundingcyberattacks and the cyber threat landscape. Recent CSCthreats have been disruptive and impacting on the smooth flowof delivery of products and services. CSC risk has beenobserved as one of the areas that impact greatly and causesbudget overruns. The aim of this paper is to mitigate CSCrisks in an organizational landscape. In particular, the paperidentifies supply inbound and outbound chain threatlandscape using a risk breakdown structure. Further, weassess the risk to gather cyber threat intelligence. Furthermore, we use the probability distribution method todetermine the CSC risks and analyze the risk probabilities andlikelihood of risk cascading impact. Our results show thatCSC risk can be neutralized using probability distributionmethods to detect and mitigate the risks and their impactlevels.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131918839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信