2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)最新文献

筛选
英文 中文
A Permissioned Blockchain-Based System for Verification of Academic Records 基于区块链的学术记录验证系统
Ahmed Badr, Laura Rafferty, Q. Mahmoud, Khalid Elgazzar, P. Hung
{"title":"A Permissioned Blockchain-Based System for Verification of Academic Records","authors":"Ahmed Badr, Laura Rafferty, Q. Mahmoud, Khalid Elgazzar, P. Hung","doi":"10.1109/NTMS.2019.8763831","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763831","url":null,"abstract":"While academic institutions maintain records such as transcripts and certificates, they are often requested to share these records with other institutions at the request of students for credit transfer, or prerequisites for acceptance into new academic programs. While the transfer of academic records is a regular daily activity for the institutions, there is often significant overhead involved as the process of transfer and verification is extremely manual. The need for an automated end-to-end solution for the transfer and verification of academic records between institutions is on the edge to reduce wait times for students to transfer their records, as well as to provide a reliable verification method to avoid academic fraud. This paper presents a permissioned blockchain-based system to allow institutions to securely and dependably transfer and verify academic records at the student request. Permissioned blockchains, such as Hyperledger, provide a more scalable and cost-effective and private solution for enterprise applications. Our solution is comprised of a web interface for enrolling and requesting the transfer, with a backend using Hyperledger Fabric and Hyperledger Composer to retain the hash of the records on the blockchain for verification.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125042899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Evaluating CoAP End to End Security for Constrained Wireless Sensor Networks 受限无线传感器网络CoAP端到端安全性评估
A. Fournaris, S. Giannoulis, C. Koulamas
{"title":"Evaluating CoAP End to End Security for Constrained Wireless Sensor Networks","authors":"A. Fournaris, S. Giannoulis, C. Koulamas","doi":"10.1109/NTMS.2019.8763857","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763857","url":null,"abstract":"In the past few years, Internet Engineering Task Force (IETF) has standardized \"lightweight\" IPv4/IPv6 protocol variations for Wireless Sensor Network (WSN) on resource constrained devices. In the above approaches, security is considered a strong requirement, however, adapting IP oriented security protocols (like the IETF Data-gram Transport Layer Protocol DTLS) to actual WSN security enabled implementations requires tradeoffs between performance, energy consumption and security level. In this paper, the above tradeoffs are explored for the latest version of the widely accepted Contiki OS (version 3.x) when DTLS security is enabled for the IETF supported Constrained Application Protocol (CoAP). More specifically, the DTLS framework is integrated in the Contiki 3 CoAP stack for 2 different cipher suites and the performance in comparison with non secure CoAP applications is evaluated through simulation, in terms of speed, memory overhead and energy consumption for various WSN clientserver network environment. Finally, tradeoff and recommendation for balanced performance versus security are proposed.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124122372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PriDe: A Quantitative Measure of Privacy-Loss in Interactive Querying Settings 骄傲:交互式查询设置中隐私损失的定量测量
Muhammad Imran Khan, S. Foley, B. O’Sullivan
{"title":"PriDe: A Quantitative Measure of Privacy-Loss in Interactive Querying Settings","authors":"Muhammad Imran Khan, S. Foley, B. O’Sullivan","doi":"10.1109/NTMS.2019.8763781","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763781","url":null,"abstract":"This paper presents, PriDe, a model to measure the deviation of an analyst's (user) querying behaviour from normal querying behaviour. The deviation is measured in terms of privacy, that is to say, how much of the privacy loss has incurred due to this shift in querying behaviour. The shift is represented in terms of a score - a privacy-loss score, the higher the score the more the loss in privacy. Querying behaviour of analysts are modelled using n-grams of SQL query and subsequently, behavioural profiles are constructed. Profiles are then compared in terms of privacy resulting in a quantified score indicating the privacy loss.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130029550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving Strong Mobile Authentication with Structural Diversity and User-Friendliness 利用结构多样性和用户友好性改进强移动认证
Samy Kambou, A. Bouabdallah
{"title":"Improving Strong Mobile Authentication with Structural Diversity and User-Friendliness","authors":"Samy Kambou, A. Bouabdallah","doi":"10.1109/NTMS.2019.8763821","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763821","url":null,"abstract":"This paper introduces an original and strong authentication method using a two-factor scheme enhanced by network channels and devices diversity. The proposed solution combines an OTP-based approach using an IoT object as secondary device in addition to the mobile phone. Authentication factors are transmitted over different channels (LTE, LPWAN, ... ) via different devices thus greatly reducing the attack surface. To avoid depending on the protocol security specificities used to instantiate a channel, we use a security layer ensuring end-to- end encryption of the transferred sensitive contents. In addition, diversity can be leveraged by exploiting its inherent modularity to infer other approaches. We give an example of another authentication method equivalent for the robustness to the first one but which is more ergonomic and user friendly.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130218603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Threat Investigation of SCADA Modbus Activities SCADA Modbus活动的网络威胁调查
Claude Fachkha
{"title":"Cyber Threat Investigation of SCADA Modbus Activities","authors":"Claude Fachkha","doi":"10.1109/NTMS.2019.8763817","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763817","url":null,"abstract":"The use of inter-connectivity of Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) networks in smart technologies have exposed them to a large variety of security threats. Furthermore, very few investigations are done in this field from the Internet (cyber) perspective. Therefore, this paper investigates unauthorized, malicious and suspicious SCADA activities by leveraging the darknet address space. In particular, this work investigates Modbus service, which is a de facto standard protocol for communication and it is the most available and used to connect electronic devices in critical and industrial infrastructures. This study is based on real Internet data collected throughout a one-month period. Among the 8 various inferred scanning activities, we find that TCP distributed portscan is the only non-typical Modbus scan. Furthermore, our analyses fingerprint a large variety of Modbus scanners and uncover 6 other services that tag along with Modbus 74% of the time. Finally, we list case studies related to synchronized and automated SCADA scanning campaigns originated from unknown sources.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116495674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Porthos: Macroprogramming Blockchain Systems Porthos:宏观编程区块链系统
A. Mizzi, J. Ellul, Gordon J. Pace
{"title":"Porthos: Macroprogramming Blockchain Systems","authors":"A. Mizzi, J. Ellul, Gordon J. Pace","doi":"10.1109/NTMS.2019.8763784","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763784","url":null,"abstract":"The rise of blockchain technology has paved the way for an increasing number of blockchain systems, each having different characteristics. The need for distributed applications that span across multiple blockchain systems is increasing. However, it is currently not possible to write a single-description smart contract which can be compiled to span across multiple blockchain systems. In this paper we present PORTHOS, a macroprogramming framework and domain specific language for writing commitment-based smart contracts that span multiple blockchain systems. The language allows programmers to write smart contracts at a higher level of abstraction by composing together contract blocks, without the need to specify how logic should be split across different blockchain instances. A runtime framework, including both on-chain and off-chain functionality, harmonises the features of different blockchain systems as well as enables communication across the smart contracts. A proof of concept, built on the Ethereum and Hyperledger Fabric blockchain systems and extendible to other systems, illustrates the technique and framework. We also show how the PORTHOS language is expressive enough to define a variety of applications.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122270366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches 可穿戴设备的取证分析:Fitbit, Garmin和HETP手表
Áine MacDermott, Stephen Lea, Farkhund Iqbal, I. Idowu, B. Shah
{"title":"Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches","authors":"Áine MacDermott, Stephen Lea, Farkhund Iqbal, I. Idowu, B. Shah","doi":"10.1109/NTMS.2019.8763834","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763834","url":null,"abstract":"Wearable technology has been on an exponential rise and shows no signs of slowing down. One category of wearable technology is Fitness bands, which have the potential to show a user's activity levels and location data. Such information stored in fitness bands is just the beginning of a long trail of evidence fitness bands can store, which represents a huge opportunity to digital forensic practitioners. On the surface of recent work and research in this area, there does not appear to be any similar work that has already taken place on fitness bands and particularly, the devices in this study, a Garmin Forerunner 110, a Fitbit Charge HR and a Generic low-cost HETP fitness tracker. In this paper, we present our analysis of these devices for any possible digital evidence in a forensically sound manner, identifying files of interest and location data on the device. Data accuracy and validity of the evidence is shown, as a test run scenario wearing all of the devices allowed for data comparison analysis.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"19 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133171126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
An IoT-Blockchain Architecture Based on Hyperledger Framework for Healthcare Monitoring Application 基于超级账本框架的物联网-区块链架构医疗监控应用
Oumaima Attia, I. Khoufi, A. Laouiti, C. Adjih
{"title":"An IoT-Blockchain Architecture Based on Hyperledger Framework for Healthcare Monitoring Application","authors":"Oumaima Attia, I. Khoufi, A. Laouiti, C. Adjih","doi":"10.1109/NTMS.2019.8763849","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763849","url":null,"abstract":"Blockchains are one of the most promising technologies in the domain of the Internet of Things (IoT). At the same time, healthcare monitoring is one of IoT applications where many devices are connected, and collect data that need to be stored in a highly secure way. In this context, we focus on IoT-Blockchain architectures for healthcare monitoring applications. We start our study by exploring both IoT and blockchain technologies and identify how Fabric Hyperledger is a blockchain framework that fits our application needs. In this paper, we propose a security architecture based on this framework. We validate our approach first at a design level through concrete examples, then by showing some implemented functionalities.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"933 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123061952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Managing the Secure Software Development 管理安全的软件开发
R. Fujdiak, P. Mlynek, Pavel Mrnustik, M. Barabas, Petr Blazek, Filip Borcik, J. Misurec
{"title":"Managing the Secure Software Development","authors":"R. Fujdiak, P. Mlynek, Pavel Mrnustik, M. Barabas, Petr Blazek, Filip Borcik, J. Misurec","doi":"10.1109/NTMS.2019.8763845","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763845","url":null,"abstract":"Nowadays, software development is a more complex process than ever was and it faces the challenges, where security became one of the most crucial. The security issues became an essential part of software engineers and understanding the vulnerabilities, risks and others became the everyday bread. The needs of security in software development resulted in the creation of the so-called Secure Software Development Life Cycle (SSDLC). This is a methodological concept included in classical Software Development Life-Cycle, which is described by five main phases - analysis, design, implementation (building), testing, and evaluation (deployment and maintenance). The SSDLC adds another dimension ensuring the security. We introduce our same named tool \"Secure Software Development Life-cycle\", which follows the general idea and goes beyond it. Our tool helps to create security, hardening, testing, and validation reporting guidelines for selected use-cases. This tool is an environment for defining the current and future security requirements based on the collection of standards, recommendations, best practice, and many others. Connecting the SSDLC with other tools improves the general level of automation of the Product Life Cycle (PLC). The SSDLC gives a connection and context among security, safety and performance parameters. Compared with static security requirements definition, the SSDLC provides simple future extension and straight integration to the PLC process with non- or nearly-non personal (human) interaction.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"44 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128917229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Real-Time Detection of Cyberbullying in Arabic Twitter Streams 阿拉伯语Twitter流中的网络欺凌实时检测
D. Mouheb, Masa Hilal Abushamleh, Maya Hilal Abushamleh, Z. Aghbari, I. Kamel
{"title":"Real-Time Detection of Cyberbullying in Arabic Twitter Streams","authors":"D. Mouheb, Masa Hilal Abushamleh, Maya Hilal Abushamleh, Z. Aghbari, I. Kamel","doi":"10.1109/NTMS.2019.8763808","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763808","url":null,"abstract":"Cyberbullying is a form of psychological abuse, which is very dangerous as the victims of cyberbullying, especially children and teenagers, suffer from many mental issues that could lead to suicide thoughts. Cyberbullying is also becoming a significant issue in the Middle East. Existing contributions for cyberbullying detection focus mainly on English language. This paper presents an approach to detect cyberbullying in Arabic Twitter streams in real-time. In addition, it classifies the bullying messages based on their strength. In case a cyberbullying message is detected, the system notifies the user and proposes a set of actions to take based on the strength of the bullying message. We demonstrate the relevance of the proposed approach by showing how it could be used by a parent to monitor his kids' activities and get notified in case a suspicious activity is detected. The experiments show that the proposed system was able to effectively identify the cyberbullying messages in near real-time.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126876224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信