2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)最新文献

筛选
英文 中文
A testbed for SCADA cyber security and intrusion detection SCADA网络安全与入侵检测测试平台
Prateek Singh, S. Garg, Vinod Kumar, Zia U H. Saquib
{"title":"A testbed for SCADA cyber security and intrusion detection","authors":"Prateek Singh, S. Garg, Vinod Kumar, Zia U H. Saquib","doi":"10.1109/SSIC.2015.7245683","DOIUrl":"https://doi.org/10.1109/SSIC.2015.7245683","url":null,"abstract":"Power grid is an important element of the cyber physical systems. Attacks on such infrastructure may have catastrophic impact and hence the mitigation solutions for the attacks are necessary. It is impractical to test attacks and mitigation strategies on real networks. A testbed as a platform bridges the cyber-physical divide by bringing in the physical system inside the cyber domain, and test the attack scenarios. We are proposing such a testbed here that can simulate power systems Supervisory Control and Data Acquisition (SCADA). The testbed consists of traffic generator, simulated devices like Remote Terminal Units (RTUs), Master Terminal Unit (MTU), Human Machine Interface (HMI) etc. and the communication channel wrapped around industrial communication protocols such as IEC-60870-5-101 and DNP3. The proposed testbed includes with a comparator module which helps in detecting potential intrusions at RTU. A compromised RTU can be manipulated to send fabricated commands in the grid or to send polled responses from the grid. Detecting compromised systems at early stages helps in reducing damage to Industrial Control System (ICS) and providing higher security measures.","PeriodicalId":242945,"journal":{"name":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127501980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
On the use of security analytics for attack detection in vehicular ad hoc networks 安全分析在车载自组织网络攻击检测中的应用
Dhavy Gantsou
{"title":"On the use of security analytics for attack detection in vehicular ad hoc networks","authors":"Dhavy Gantsou","doi":"10.1109/SSIC.2015.7245674","DOIUrl":"https://doi.org/10.1109/SSIC.2015.7245674","url":null,"abstract":"A vehicular ad hoc network (VANET) is a special kind of mobile ad hoc network built on top of the IEEE802.11p standard for a better adaptability to the wireless mobile environment. As it is used for both supporting vehicle-to-vehicle (V2V) as well as vehicle-to-infrastructure (V2I) communications, and connecting vehicles to external resources including cloud services, Internet, and user devices while improving the road traffic conditions, VANET is a Key component of intelligent transportation systems (ITS). As such, VANET can be exposed to cyber attacks related to the wireless environment, and those of traditional information technologies systems it is connected to. However, when looking at solutions that have been proposed to address VANET security issues, it emerges that guaranteeing security in VANET essentially amounts to resorting to cryptographic-centric mechanisms. Although the use of public key Infrastructure (PKI) fulfills most VANET' security requirements related to physical properties of the wireless transmissions, simply relying on cryptography does not secure a network. This is the case for vulnerabilities at layers above the MAC layer. Because of their capability to bypass security policy control, they can still expose VANET, and thus, the ITS to cyber attacks. Thereby, one needs security solutions that go beyond cryptographic mechanisms in order cover multiple threat vectors faced by VANET. In this paper focusing on attack detection, we show how using an implementation combining observation of events and incidents from multiple sources at different layers Sybil nodes can be detected regardless of the VANET architecture.","PeriodicalId":242945,"journal":{"name":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115837945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Secure Public Key Regime (SPKR) in vehicular networks 车载网络中的安全公钥体系(SPKR)
Hengchuan Tan, Jun Zhang, M. Ma, P. Chong, H. Labiod
{"title":"Secure Public Key Regime (SPKR) in vehicular networks","authors":"Hengchuan Tan, Jun Zhang, M. Ma, P. Chong, H. Labiod","doi":"10.1109/SSIC.2015.7245678","DOIUrl":"https://doi.org/10.1109/SSIC.2015.7245678","url":null,"abstract":"Public Key Regime (PKR) was proposed as an alternative to certificate based PKI in securing Vehicular Networks (VNs). It eliminates the need for vehicles to append their certificate for verification because the Road Side Units (RSUs) serve as Delegated Trusted Authorities (DTAs) to issue up-to-date public keys to vehicles for communications. If a vehicle's private/public key needs to be revoked, the root TA performs real time updates and disseminates the changes to these RSUs in the network. Therefore, PKR does not need to maintain a huge Certificate Revocation List (CRL), avoids complex certificate verification process and minimizes the high latency. However, the PKR scheme is vulnerable to Denial of Service (DoS) and collusion attacks. In this paper, we study these attacks and propose a pre-authentication mechanism to secure the PKR scheme. Our new scheme is called the Secure Public Key Regime (SPKR). It is based on the Schnorr signature scheme that requires vehicles to expend some amount of CPU resources before RSUs issue the requested public keys to them. This helps to alleviate the risk of DoS attacks. Furthermore, our scheme is secure against collusion attacks. Through numerical analysis, we show that SPKR has a lower authentication delay compared with the Elliptic Curve Digital Signature (ECDSA) scheme and other ECDSA based counterparts.","PeriodicalId":242945,"journal":{"name":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129477006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A solution based analysis of attack vectors on smart home systems 基于智能家居系统攻击向量分析的解决方案
Andreas Brauchli, Depeng Li
{"title":"A solution based analysis of attack vectors on smart home systems","authors":"Andreas Brauchli, Depeng Li","doi":"10.1109/SSIC.2015.7245682","DOIUrl":"https://doi.org/10.1109/SSIC.2015.7245682","url":null,"abstract":"The development and wider adoption of smart home technology also created an increased requirement for safe and secure smart home environments with guaranteed privacy constraints. After a short survey of privacy and security in the more broad smart-world context this paper lists, analyzes and ranks possible attack vectors or entry points into a smart home system and proposes solutions to remedy or diminish the risk of compromised security or privacy. Further, we evaluate the usability impacts resulting from the proposed solutions. The smart home system used for the analysis in this paper is a digitalSTROM installation, a home-automation solution that is quickly gaining popularity in central Europe, the findings, however, aim to be as solution independent as possible.","PeriodicalId":242945,"journal":{"name":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129506387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Analysis of cyber security for industrial control systems 工业控制系统的网络安全分析
Zakarya Drias, A. Serhrouchni, Olivier Vogel
{"title":"Analysis of cyber security for industrial control systems","authors":"Zakarya Drias, A. Serhrouchni, Olivier Vogel","doi":"10.1109/SSIC.2015.7245330","DOIUrl":"https://doi.org/10.1109/SSIC.2015.7245330","url":null,"abstract":"Industrial control systems (ICS) are specialized information systems that differs significantly form traditional information systems used in the IT world. The main use of ICS is to manage critical infrastructures such as, Oil and Natural Gas facilities, nuclear plants, smart grids, water and waste water ... etc. ICS have many unique functional characteristics, including a need for real-time response and extremely high availability, predictability, reliability, as well as distributed intelligence. Which for, many advanced computing, communication and internet technologies were integrated to the ICS to cover more costumers requirements such as mobility, data analytics, extensibility ... etc The integration of these technologies makes from the ICS open systems to the external world; this openness exposes the critical infrastructures to several Cyber security critical issues. Nowadays, cyber security emerges to be one of the most critical issues because of the immediate impact and the high cost of cyber-attacks. In this paper, we present a comprehensive analysis of cyber security issues for ICS. Specifically we focus on discussing and reviewing the different types and architectures of an ICS, security requirements, different threats attacks, and existing solutions to secure Industrial control systems. By this survey, we desire to provide a clear understanding of security issues in ICS and clarify the different research issues to solve in the future.","PeriodicalId":242945,"journal":{"name":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123014441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Security in MIMO wireless hybrid channel with artificial noise 具有人工噪声的MIMO无线混合信道的安全性
Xiao Chen, Liang Pang, Yuhuan Tang, Hongpeng Yang, Zhi Xue
{"title":"Security in MIMO wireless hybrid channel with artificial noise","authors":"Xiao Chen, Liang Pang, Yuhuan Tang, Hongpeng Yang, Zhi Xue","doi":"10.1109/SSIC.2015.7245676","DOIUrl":"https://doi.org/10.1109/SSIC.2015.7245676","url":null,"abstract":"Security is an important issue in the field of wireless channel. In this paper, the security problem of Gaussian MIMO wireless hybrid channel is considered where a transmitter with multiple antennas sends information to an intended receiver with one antenna in the presence of an eavesdropper with multiple antennas. Through utilizing some of the power to produce `artificial noise', the transmitter can only degrade the eavesdropper's channel to ensure the security of the communication. But there is an inherent weakness in this scheme. Then a Hybrid Blind Space Elimination (HBSE) scheme is proposed and proved to fix the design flaw in order to strengthen the original scheme.","PeriodicalId":242945,"journal":{"name":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126483908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Dempster-Shafer theory based traffic information trust model in vehicular ad hoc networks 基于Dempster-Shafer理论的车辆自组织网络交通信息信任模型
Yue Wu, F. Meng, Guanghao Wang, P. Yi
{"title":"A Dempster-Shafer theory based traffic information trust model in vehicular ad hoc networks","authors":"Yue Wu, F. Meng, Guanghao Wang, P. Yi","doi":"10.1109/SSIC.2015.7245329","DOIUrl":"https://doi.org/10.1109/SSIC.2015.7245329","url":null,"abstract":"Road congestion has troubled hundreds of thousands of drivers for a long time. In recent years, an application named dynamic routing, in which vehicles reroute themselves around congested areas with road information received, is proposed to deal with traffic jam. Due to lack of trust for traffic information data in vehicular ad hoc networks (VANETs), malicious vehicles can easily disseminate false road information and mislead other vehicles to choose the wrong route. This paper proposes a new data centric trust model for traffic information in VANETs, which is based on data trust rather than entity trust to verify road information, and utilizes Dempster-Shafer theory in general voting algorithm to increase robustness. Simulation results show that our model avoids malicious fake road information and effectively improves the vehicle's travelling time performance without additional information exchange.","PeriodicalId":242945,"journal":{"name":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116742582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A random key management scheme for heterogeneous wireless sensor network 一种异构无线传感器网络随机密钥管理方案
Lina Zhu, Zuochang Zhan
{"title":"A random key management scheme for heterogeneous wireless sensor network","authors":"Lina Zhu, Zuochang Zhan","doi":"10.1109/SSIC.2015.7245677","DOIUrl":"https://doi.org/10.1109/SSIC.2015.7245677","url":null,"abstract":"Key management is one of the most challenging security problems in wireless sensor network (WSN). A complete key management scheme should include key generation, key distribution, and key updating. Random key predistribution scheme is widely considered as the most suitable for WSN. However, network security connectivity contradicts resilience, and related research lacks key updating. To address these problems, a random key management scheme for heterogeneous WSN is proposed. Deployment knowledge is introduced into q-composite random key predistribution, and key updating mechanism is designed. Theoretical analysis and simulation show that the scheme can effectively improve network connectivity, support scalability, and ensure key effective without affecting security connectivity and resilience.","PeriodicalId":242945,"journal":{"name":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133854531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Malicious data identification in smart grid based on residual error method 基于残差法的智能电网恶意数据识别
Zongshuai Hu, Yong Wang, C. Gu, Dejun Mengm, Xiaoli Yang, Shuai Chen
{"title":"Malicious data identification in smart grid based on residual error method","authors":"Zongshuai Hu, Yong Wang, C. Gu, Dejun Mengm, Xiaoli Yang, Shuai Chen","doi":"10.1109/SSIC.2015.7245325","DOIUrl":"https://doi.org/10.1109/SSIC.2015.7245325","url":null,"abstract":"Most of methods on malicious data identification are based on the residual in power system applications. Residual error method, which is an effective method to identify a single malicious data can be basically divided into weighted residual error method and normalized residual error method. In this paper the states and measurement estimated value can be calculated firstly by the traditional weighted least squares state estimation algorithm. Then the measurement residual and the objective function value can be also calculated. The algorithm of weighted residual error method is tested on IEEE5 bus system by MATLAB and the analysis on the results of calculation example shows that this method is an effective one which a single malicious data can be effectively dealt with, and it can be applied to malicious data identification. In this paper the largest weighted residues in the case of single malicious data are 8.361 and correspond to real power injection at bus2, which are far above the threshold to improve the efficiency of malicious data identification.","PeriodicalId":242945,"journal":{"name":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127656853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data security and threat modeling for smart city infrastructure 智慧城市基础设施的数据安全和威胁建模
Paul Wang, Amjad Ali, W. Kelly
{"title":"Data security and threat modeling for smart city infrastructure","authors":"Paul Wang, Amjad Ali, W. Kelly","doi":"10.1109/SSIC.2015.7245322","DOIUrl":"https://doi.org/10.1109/SSIC.2015.7245322","url":null,"abstract":"Smart city opens up data with a wealth of information that brings innovation and connects government, industry and citizens. Cyber insecurity, on the other hand has raised concerns among data privacy and threats to smart city systems. In this paper, we look into security issues in smart city infrastructure from both technical and business operation perspectives and propose an approach to analyze threats and to improve data security of smart city systems. The assessment process takes hundreds of features into account. Data collected during the assessment stage are then imported into an algorithm that calculates the threat factor. Mitigation strategies are provided to help reducing risks of smart city systems from being hacked into and to protect data from being misused, stolen or identifiable. Study shows that the threat factor can be reduced significantly by following this approach. Experiments show that this comprehensive approach can reduce the risks of cyber intrusions to smart city systems. It can also deal with privacy concerns in this big data arena.","PeriodicalId":242945,"journal":{"name":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128010568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信