2020 4th Cyber Security in Networking Conference (CSNet)最新文献

筛选
英文 中文
Activation of LoRaWAN End Devices by Using Public Key Cryptography 使用公钥加密技术激活LoRaWAN终端设备
2020 4th Cyber Security in Networking Conference (CSNet) Pub Date : 2020-10-21 DOI: 10.1109/CSNet50428.2020.9265530
Fredrik Mårlind, I. Butun
{"title":"Activation of LoRaWAN End Devices by Using Public Key Cryptography","authors":"Fredrik Mårlind, I. Butun","doi":"10.1109/CSNet50428.2020.9265530","DOIUrl":"https://doi.org/10.1109/CSNet50428.2020.9265530","url":null,"abstract":"This paper aims to design a new process to assign root keys to the devices in Long Range Wide Area Network (LoRaWAN) by using Public Key Cryptography (PKC). This process is used to propose a new activation method called Public Key Over the Air Activation (PK-OTAA). The feasibility of the proposed method is also evaluated scientifically via experiments. The new activation method allows a device to get the root keys dynamically and for them to be replaced at will. However, PKC requires longer keys to get equivalent cryptographic strength to a symmetric encryption scheme. This increased key size in turn requires more processing power to use, thus increasing battery consumption. The feasibility of the new method is evaluated based on the increase in power usage since Internet of Things (IoT) devices are usually battery powered. It has been shown that by sacrificing very small portion of the energy available in the battery; a more flexible and secure key distribution scheme is integrated in LoRaWAN.","PeriodicalId":234911,"journal":{"name":"2020 4th Cyber Security in Networking Conference (CSNet)","volume":"351 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134430084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Policy-based Interaction Protocol between Software Defined Security Controller and Virtual Security Functions 一种基于策略的软件安全控制器与虚拟安全功能交互协议
2020 4th Cyber Security in Networking Conference (CSNet) Pub Date : 2020-10-21 DOI: 10.1109/CSNet50428.2020.9265460
Sara Farahmandian, D. Hoang
{"title":"A Policy-based Interaction Protocol between Software Defined Security Controller and Virtual Security Functions","authors":"Sara Farahmandian, D. Hoang","doi":"10.1109/CSNet50428.2020.9265460","DOIUrl":"https://doi.org/10.1109/CSNet50428.2020.9265460","url":null,"abstract":"Cloud, Software-Defined Networking (SDN), and Network Function Virtualization (NFV) technologies have introduced a new era of cybersecurity threats and challenges. To protect cloud infrastructure, in our earlier work, we proposed Software Defined Security Service (SDS2) to tackle security challenges centered around a new policy-based interaction model. The security architecture consists of three main components: a Security Controller, Virtual Security Functions (VSF), and a Sec-Manage Protocol. However, the security architecture requires an agile and specific protocol to transfer interaction parameters and security messages between its components where OpenFlow considers mainly as network routing protocol. So, The Sec-Manage protocol has been designed specifically for obtaining policy-based interaction parameters among cloud entities between the security controller and its VSFs. This paper focuses on the design and the implementation of the Sec-Manage protocol and demonstrates its use in setting, monitoring, and conveying relevant policy-based interaction security parameters.","PeriodicalId":234911,"journal":{"name":"2020 4th Cyber Security in Networking Conference (CSNet)","volume":"442 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115920665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative performance study of cryptographic algorithms for connected vehicles 网联车辆加密算法的性能比较研究
2020 4th Cyber Security in Networking Conference (CSNet) Pub Date : 2020-10-21 DOI: 10.1109/CSNet50428.2020.9265529
Abdessamad Fazzat, R. Khatoun, H. Labiod, Renaud Dubois
{"title":"A comparative performance study of cryptographic algorithms for connected vehicles","authors":"Abdessamad Fazzat, R. Khatoun, H. Labiod, Renaud Dubois","doi":"10.1109/CSNet50428.2020.9265529","DOIUrl":"https://doi.org/10.1109/CSNet50428.2020.9265529","url":null,"abstract":"For security applications for connected vehicles, choosing the best cryptographic algorithm is a real challenge. Traditional cryptography does not fit the constraints on the communication (e.g., bandwidth, delay) environment and the protocols defined in the standards do not allow flexibility. In this work, we provide an analysis of the cryptographic algorithms used to secure V2X communications and an overview of lightweight cryptography algorithms in order to select algorithms that might fit the connected vehicles constraints.","PeriodicalId":234911,"journal":{"name":"2020 4th Cyber Security in Networking Conference (CSNet)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115451841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Blockgraph: A blockchain for mobile ad hoc networks Blockgraph:用于移动自组织网络的区块链
2020 4th Cyber Security in Networking Conference (CSNet) Pub Date : 2020-10-21 DOI: 10.1109/CSNet50428.2020.9265532
David Cordova, Alexandre Laubé, T. Nguyen, G. Pujolle
{"title":"Blockgraph: A blockchain for mobile ad hoc networks","authors":"David Cordova, Alexandre Laubé, T. Nguyen, G. Pujolle","doi":"10.1109/CSNet50428.2020.9265532","DOIUrl":"https://doi.org/10.1109/CSNet50428.2020.9265532","url":null,"abstract":"Blockchain is one of the most prominent emerging technologies. It offers the ability to maintain an anti-tamper distributed database, ensuring the integrity and authenticity of data in a decentralized system. However, when using blockchain in a dynamic community, such as mobile nodes in an ad hoc and mesh networks, the chain structure is no longer enough to deal with node mobility. In this paper, we address the challenges of using a DAG-based blockchain for mobile and ad hoc networks (MANETs) that we call “blockgraph”. We define the characteristics of the blockgraph framework. This includes: the requirement needed for a consensus protocol in order to be resilient to network partitions; the specifications of the blockgraph protocol that ensure the maintenance of the blockgraph data structure; and a group management system that reacts to network topology changes that provide with relevant network topology information to the blockgraph framework. Finally, we implemented our framework in the discrete event network simulator NS3 as a proof-of-concept for our blockgraph.","PeriodicalId":234911,"journal":{"name":"2020 4th Cyber Security in Networking Conference (CSNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129058393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Message Fabrication Detection Model based on Reactive Protocols in VANET 基于响应式协议的VANET消息伪造检测模型
2020 4th Cyber Security in Networking Conference (CSNet) Pub Date : 2020-10-21 DOI: 10.1109/CSNet50428.2020.9265458
Fadlallah Chbib, W. Fahs, Jamal Haydar, L. Khoukhi, R. Khatoun
{"title":"Message Fabrication Detection Model based on Reactive Protocols in VANET","authors":"Fadlallah Chbib, W. Fahs, Jamal Haydar, L. Khoukhi, R. Khatoun","doi":"10.1109/CSNet50428.2020.9265458","DOIUrl":"https://doi.org/10.1109/CSNet50428.2020.9265458","url":null,"abstract":"The ever-increasing necessity to manage various issues in road mobility led to the growth of Vehicular Ad hoc Networks (VANETs). Nowadays, VANETs has the potential to improve vehicle and road safety, traffic efficiency, convenience, as well as comfort to both drivers and passengers. Vehicular communication is exposed to several vulnerabilities such as Denial of Service attacks (DOS), Blackhole, Grey hole and fabrication attacks. Among the most known attacks are the fabrication attacks. Fabrication attack consists of a malicious node that modifies information in the packet that causes critical damage in the network like congestion and high delay. In this paper, we propose a new fabrication model which consist of two algorithms attack and anti-attack. In this attack, the malicious node fabricates the content of the message; in other words, the destination address of the input packet is replaced by another one. In the antiattack, our new proposed algorithm has the role to detect the fabrication attack during the communication. It continuously checks the buffer of each node so that the input destination address must be the same as the output destination address; otherwise, the node is identified as malicious and a message is sent to other nodes to remove it from their routing table. The proposed algorithm aims to minimize the delay of packets. We use Network Simulator NS-2.35 to implement and evaluate the performance of the proposed algorithms. The results show good improvements in terms of packet delivery ratio and the end to end delay.","PeriodicalId":234911,"journal":{"name":"2020 4th Cyber Security in Networking Conference (CSNet)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127907264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On Darknet HoneyBots 在Darknet HoneyBots上
2020 4th Cyber Security in Networking Conference (CSNet) Pub Date : 2020-10-21 DOI: 10.1109/CSNet50428.2020.9265528
Joanna Moubarak, C. Bassil
{"title":"On Darknet HoneyBots","authors":"Joanna Moubarak, C. Bassil","doi":"10.1109/CSNet50428.2020.9265528","DOIUrl":"https://doi.org/10.1109/CSNet50428.2020.9265528","url":null,"abstract":"In this new technological era, illegal activities shifted into the Darknet where anonymization allow free communication. Thus concerns from unsolicited movements are risen. A few research is ongoing with the purpose of investigating the TOR network. The current work is focused around integrating an advanced chatbot on the darknet as part of a research honeypot. A lot of research work tackled bots development, but none till now covered the creation of chatbots dealing specifically with darknet activities. Several techniques contribute in building chatbots, mainly Natural Language Processing (NLP). This paper consolidate the work done previously in [1] to elaborate on a solution that can be integrated in a darknet chatroom. Thus the algorithmic used for honeybots are described.","PeriodicalId":234911,"journal":{"name":"2020 4th Cyber Security in Networking Conference (CSNet)","volume":"377 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130142629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection EagerNet:神经网络对高效入侵检测的早期预测
2020 4th Cyber Security in Networking Conference (CSNet) Pub Date : 2020-07-27 DOI: 10.1109/CSNet50428.2020.9265467
Fares Meghdouri, Maximilian Bachl, T. Zseby
{"title":"EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection","authors":"Fares Meghdouri, Maximilian Bachl, T. Zseby","doi":"10.1109/CSNet50428.2020.9265467","DOIUrl":"https://doi.org/10.1109/CSNet50428.2020.9265467","url":null,"abstract":"Fully Connected Neural Networks (FCNNs) have been the core of most state-of-the-art Machine Learning (ML) applications in recent years and also have been widely used for Intrusion Detection Systems (IDSs). Experimental results from the last years show that generally deeper neural networks with more layers perform better than shallow models. Nonetheless, with the growing number of layers, obtaining fast predictions with less resources has become a difficult task despite the use of special hardware such as GPUs. We propose a new architecture to detect network attacks with minimal resources. The architecture is able to deal with either binary or multiclass classification problems and trades prediction speed for the accuracy of the network. We evaluate our proposal with two different network intrusion detection datasets. Results suggest that it is possible to obtain comparable accuracies to simple FCNNs without evaluating all layers for the majority of samples, thus obtaining early predictions and saving energy and computational efforts.","PeriodicalId":234911,"journal":{"name":"2020 4th Cyber Security in Networking Conference (CSNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129874630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信