{"title":"Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis","authors":"Muhammad Ali, S. Shiaeles, M. Papadaki, B. Ghita","doi":"10.1109/GIIS.2018.8635598","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635598","url":null,"abstract":"Malicious software is detected and classified by either static analysis or dynamic analysis. In static analysis, malware samples are reverse engineered and analyzed so that signatures of malware can be constructed. These techniques can be easily thwarted through polymorphic, metamorphic malware, obfuscation and packing techniques, whereas in dynamic analysis malware samples are executed in a controlled environment using the sandboxing technique, in order to model the behavior of malware. In this paper, we have analyzed Petya, Spyeye, VolatileCedar, PAFISH etc. through Agent-based and Agentless dynamic sandbox systems in order to investigate and benchmark their efficiency in advanced malware detection.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115491123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of LoraWan physical layer integration on IoT devices","authors":"C. Bouras, V. Kokkinos, Nikolaos Papachristos","doi":"10.1109/GIIS.2018.8635715","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635715","url":null,"abstract":"Due to the constant motion of wireless devices in the Internet of Things $(mathrm {I}mathrm {o}mathrm {T})$, current wireless networks cannot provide connectivity in each case using altering topolgoies, in comparison with ad hoc networks. LoraWan, as a Long Range Wide Area Network recommended by the LoRa Alliance, is an upcoming candidate for low power and long distance communication $mathrm {I}mathrm {o}mathrm {T}$ environments and applications to different concepts such as tracking, healthcare agriculture. This $mathrm {I}mathrm {o}mathrm {T}$ concept is gaining a rapid growth on the $mathrm {I}mathrm {o}mathrm {T}$ market and is simultaneously improving our living environment. In this paper, we first briefly introduce LoRa as an efficient solution of physical layer integration on the $mathrm {I}mathrm {o}mathrm {T}$ devices. We then conduct a performance evaluation taking into consideration values such as bit error rate, time on air transmission based on Signal to Noise Ratio (SNR) and Spreading Factors modifications for different bandwidth values.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116708005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Physical Layer Security Enhancement","authors":"D. Efstathiou","doi":"10.1109/GIIS.2018.8635755","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635755","url":null,"abstract":"Excellent quality of security is very important in Internet of Things (IoT). The last few years there has been an increased research interest to deploy security techniques that fit to the low power constraints and complexity features of state-of-the art IoT devices. In this paper, we propose a simple technique to increase physical layer security performance for IoT devices, taking advantage of the OFDM transmission characteristics.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115340941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vasileios Kotsiou, Georgios Z. Papadopoulos, P. Chatzimisios, Fabrice Théoleyre
{"title":"Adaptive Multi-Channel Offset Assignment for Reliable IEEE 802.15.4 TSCH Networks","authors":"Vasileios Kotsiou, Georgios Z. Papadopoulos, P. Chatzimisios, Fabrice Théoleyre","doi":"10.1109/GIIS.2018.8635751","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635751","url":null,"abstract":"More and more IoT applications require low-power operations and high reliability (close to 100%). Unfortunately, radio transmissions are unreliable by nature since they are prone to collision and external interference. The IEEE 802.15.4–2015 TSCH standard has been recently proposed to provide high reliability through radio channel hopping and by appropriately scheduling all the transmissions. Since some of the radio channels still suffer from external interference, blacklisting techniques consist in detecting bad radio channels, and in privileging the good ones to transmit the packets. MABO-TSCH is a centralized scheduling algorithm which allocates several channel offsets to allow each radio link to apply a localized blacklist. However, such strategy is inefficient for large blacklists. In this study, we propose to allocate the channel offsets dynamically at each timeslot according to the number of parallel transmissions, while still avoiding collisions. We evaluate the performance of our solution relying on a real experimental dataset, highlighting the relevance of dynamic and per timeslot channel offset assignment for environments with high external interference, such as a smart building.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128582273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Application Protocols Optimisation for Future Integrated M2M-Satellite Networks","authors":"R. Soua, M. Palattella, T. Engel","doi":"10.1109/GIIS.2018.8635784","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635784","url":null,"abstract":"Satellites are playing a key role in driving the vision for a truly connected world, providing ubiquitous coverage and reliability in places where no other terrestrial technology could. While the potentials of satellites for Internet of Things (IoT) are well recognised, to allow a smooth integration of Machine-toMachine (M2M) and satellite networks, a lot of tweaking and optimising is still required. The M2MSAT project, funded by the European space Agency (ESA) is contributing to fill this gap, investigating optimisations for Message Queuing Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP), identified as IoT Application Protocols suitable for IoT data collection over satellite. This work outlines the efficient configuration of MQTT and CoAP in an integrated M2MSatellite network, and presents some optimisations, designed taking into account the peculiarities of satellite links.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123931465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Kounavis, David M. Durham, Sergej Deutsch, Saeedeh Komijani, Antonios Papadimitriou, K. Grewal
{"title":"There is No Need to Waste Communication Bandwidth on MACs","authors":"M. Kounavis, David M. Durham, Sergej Deutsch, Saeedeh Komijani, Antonios Papadimitriou, K. Grewal","doi":"10.1109/GIIS.2018.8635779","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635779","url":null,"abstract":"We address the problem of detecting data corruption in computer and device communications without generating, transmitting or verifying integrity metadata. Such metadata typically hold mathematical summaries of the content which is being transmitted, such as checksums, Integrity Check Values (ICVs) or Message Authentication Codes (MACs), and are costly to generate and transmit. In the paper we discuss a data integrity methodology, which is alternative to MACs or ICVs, and is based on a novel concept of ‘implicit integrity’. Implicit integrity supports the detection of corruption based on the observation that regular unencrypted user data typically exhibit patterns, such as repeated bytes words etc. When some encrypted content becomes corrupted and is decrypted, it no longer exhibits patterns. It is the absence or presence of patterns in decrypted content which denotes whether some content is modified or not. In the paper we summarize some of our findings including discovered entropy properties of server and client data, security bounds associated with implicit integrity and proposals for constructions that are practical and can be used in communication systems, supporting implicit integrity at low cost.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"1979 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130234137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collision-Free Sensor Data Collection using LoRaWAN and Drones","authors":"Dimitrios Zorbas, B. O’flynn","doi":"10.1109/GIIS.2018.8635601","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635601","url":null,"abstract":"An open issue in Wireless Sensor Networks (WSNs) is the data collection from nodes placed at distant positions where no Internet or fixed gateway coverage is available. In this paper, we propose a reliable and energy-efficient solution using drones as mobile gateways that periodically fly over the network and collect data. We consider a point-to-point communication model between the nodes and the drones using the LoRaWAN communication protocol. Due to the nature of the default LoRaWAN MAC protocol, we modify its ALOHA-style transmission policy introducing a synchronized time-scheduled transmission mechanism to eliminate potential packet collisions. Simulation results show that a single drone can collect the data of an entire day (5760 bytes) of an area of more than $1500times 1500m^{2}$ and 80 nodes while achieving 0% packet collisions.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131727559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aarón Garrido Martín, R. P. Leal, A. G. Armada, A. Fernández-Durán
{"title":"NBIoT Random Access Procedure: System Simulation and Performance","authors":"Aarón Garrido Martín, R. P. Leal, A. G. Armada, A. Fernández-Durán","doi":"10.1109/GIIS.2018.8635738","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635738","url":null,"abstract":"The 3rd Generation Partnership Project (3GPP) has defined the Narrow-Band Internet of Things (NBIoT) standard in Long Term Evolution release 13. This paper presents a model of the NB-IoT random-access procedure (RAP) and analyzes and compares its performance allowing decision-making from a system point of view. It includes a fully configurable signal propagation model, and quantifies the number of users camped on a cell and cell and RAP configuration parameters. The paper shows a novel framework to evaluate the RAP proposed in NB-IoT Re1–13 standard with a comprehensive and realistic approach. The contention-based random access is treated considering Msg3 collisions of the RAP instead of the Msgl collisions, where Msgl collisions are treated as a multi-path transmission. This framework includes the machine traffic generation models defined by the 3GPP, the radio transmission effect on the probability of access success, and the random-access (RA) itself. From the foregoing, single-tone and multi-tone transmission performance results have been obtained to show the impact of some parameters that are not typically considered such as the Msg3 transmission mode, Msg3 modulation and coding scheme (MCS), the use of power control mechanisms, and the power ramping step. The results provide interesting information about how these configuration parameters impact on the RAP global performance and insight into its evolution in future systems.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125747310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Anagnostopoulos, T. Arul, Yufan Fan, C. Hatzfeld, J. Lotichius, Ratika Sharma, Felipe Fernandes, Fatemeh Tehranipoor, S. Katzenbeisser
{"title":"Securing IoT Devices Using Robust DRAM PUFs","authors":"N. Anagnostopoulos, T. Arul, Yufan Fan, C. Hatzfeld, J. Lotichius, Ratika Sharma, Felipe Fernandes, Fatemeh Tehranipoor, S. Katzenbeisser","doi":"10.1109/GIIS.2018.8635789","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635789","url":null,"abstract":"In this work, we present a novel way in which DRAM modules, which are found inherently in many IoT devices, can be used to enhance the security of such devices. We test the robustness of two DRAM-based security primitives, namely DRAM retention-based PUFs and Row Hammer PUFs, to two external factors, i.e., ambient temperature and voltage variations. As both types of PUFs are proven to be highly dependent on temperature, we, then, present and discuss ways in which such PUFs can be used to implement cryptographic applications in a robust way, no longer being affected by temperature variations. Finally, we also present a proof-of-concept robust DRAM PUF-based cryptographic protocol that can be adapted for different security applications. In this way, our work demonstrates a cost-efficient, lightweight and practical manner in which even low-end, resource-constrained IoT devices can be easily protected.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124606351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power Consumption and Throughput of Wireless Communication Technologies for Smartphones","authors":"Evan Fallis, P. Spachos","doi":"10.1109/GIIS.2018.8635665","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635665","url":null,"abstract":"As the popularity of smartphones increases, so does the need for their power efficiency. Many hardware components such as sensors are added to smartphones which contribute to higher power consumption. Although battery efficiency tries to balance this issue, sometimes it is not enough. In this paper, we evaluate the power consumption, throughput, and data transmission efficiency of three wireless technologies on smartphones. Specifically, through extensive experimentation, we examine the performance of Wi-Fi, Bluetooth and LTE of four smartphones. The results can help designers estimate the power usage of wireless technologies commonly found in smartphones of today.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"339 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124776173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}