{"title":"SSH Key Management Challenges and Requirements","authors":"T. Ylonen","doi":"10.1109/NTMS.2019.8763773","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763773","url":null,"abstract":"SSH (Secure Shell) uses public keys for authenticating servers and users. This paper summarizes progress in SSH key management so far, highlights outstanding problems, and presents requirements for a long-term solution. Proposals are solicited from the research community to address the issue. The problem is of high practical importance, as most of our critical Internet infrastructure, cloud services, and open source software development is protected using these keys.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127486752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shagufta Henna, A. Davy, Hasan Ali Khattak, A. A. Minhas
{"title":"An Internet of Things (IoT)-Based Coverage Monitoring for Mission Critical Regions","authors":"Shagufta Henna, A. Davy, Hasan Ali Khattak, A. A. Minhas","doi":"10.1109/NTMS.2019.8763837","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763837","url":null,"abstract":"Barrier coverage is one of the popular applications of Wireless Sensor Networks (WSNs). A barrier construction algorithm which takes into account both energy efficiency and fault tolerance is critical for the security of mission-critical regions. Sensor devices of a sensor network have the capability to monitor and understand the critical environment, and if part of the internet of things (IoT), they can communicate this information to a remote location for immediate action. This paper deals with the barrier coverage achieved through sensor nodes and communicate coverage information to a mission partner agency. The contributions of this paper are two folds. First, we propose a disjoint barrier construction algorithm based on the residual energy of sensors. Second, we propose an IoT-enabled paradigm to report barrier coverage information to a mission partner agency for immediate action. Simulation results show that the proposed algorithm improves barrier coverage and ensures better barrier lifetime compared to 2- barrier and LABC algorithms.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129644808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Influence of Internet Protocols and CDN on Web Browsing","authors":"Antoine Saverimoutou, B. Mathieu, Sandrine Vaton","doi":"10.1109/NTMS.2019.8763827","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763827","url":null,"abstract":"The Web ecosystem has been evolving over the past years and new Internet protocols, namely HTTP/2 over TLS/TCP and QUIC/UDP, are now used to deliver Web contents. Similarly, CDNs (Content Delivery Network) are deployed worldwide, caching contents close to end-users to optimize web browsing quality. We present in this paper an analysis of the influence of the Internet protocols and CDN on the Top 10,000 Alexa websites, based on a 12-month measurement campaign (from April 2018 to April 2019) performed via our tool Web View [1]. Part of our measurements are made public, represented on a monitoring website1, showing the results for the Top 50 Alexa Websites plus few specific websites and 8 french websites, suggested by the French Agency in charge of regulating telecommunications. Our analysis of this long-term measurement campaign allows to better analyze the delivery of public websites. For instance, it shows that even if some argue that QUIC optimizes the quality, it is not observed in the real-life since QUIC is not largely deployed. Our method for analyzing CDN delivery in the Web browsing allows us to evaluate its influence, which is important since their usage can decrease the web pages' loading time, on average 43.1% with HTTP/2 and 38.5% with QUIC, when requesting a second time the same home page.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125420586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Color Medical Image Encryption using 3D Chaotic Cat Map and NCA","authors":"U. Choi, Sung-Jin Cho, S. Kang","doi":"10.1109/NTMS.2019.8763779","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763779","url":null,"abstract":"In this paper, we propose a secure and reliable color medical image encryption algorithm based on NCA and a generalized 3D chaotic cat map. The NCA is an effective pseudorandom number generator (PRNG) which is a group cellular automata (CA) obtained by combining two nonlinear CA and a maximum length CA (MLCA) which has nonlinearity and expand key space. It can also change pixel values of a plain image to be unpredictable. And we use a generalized 3D chaotic cat map for the efficient shuffling of color medical image encryption. This map can change the positions of pixels in R, G and B channels of color image. The proposed method performs a thorough experiment test through detailed analysis to demonstrate the high security and reliability of the new color medical image encryption system.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117308248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of LoRa Technology in Wireless Sensor Networks","authors":"D. Sacaleanu, Irina Petra Manciu, L. Perisoara","doi":"10.1109/NTMS.2019.8763774","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763774","url":null,"abstract":"Low-power wide area network (LPWAN) is increasingly used in wireless sensor networks (WSN), especially for the wide data transmission range. A representative technology for LPWAN is LoRa, which, although it has been used for a few years, is still regarded as an emerging technology. LoRa permits data communication within large areas, allowing the elimination of multi-hop data transmission, a transmission type that requires a very precise synchronization. This paper presents a performance evaluation of LoRa technology by considering different values for antenna spreading factor, transceiver power level, area coverage and data time on air. At the same time, for a commercial sensor node, an energy consumption evaluation is performed. The paper finally analyzes the feasibility of a practical application.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131619609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Bio-Inspired Framework to Mitigate DoS Attacks in Software Defined Networking","authors":"Heena Rathore, A. Samant, M. Guizani","doi":"10.1109/NTMS.2019.8763818","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763818","url":null,"abstract":"Software Defined Networking (SDN) is an emerging architecture providing services on a priority basis for real-time communication, by pulling out the intelligence from the hardware and developing a better management system for effective networking. Denial of service (DoS) attacks pose a significant threat to SDN, as it can disable the genuine hosts and routers by exhausting their resources. It is thus vital to provide efficient traffic management, both at the data layer and the control layer, thereby becoming more responsive to dynamic network threats such as DoS. Existing DoS prevention and mitigation models for SDN are computationally expensive and are slow to react. This paper introduces a novel biologically inspired architecture for SDN to detect DoS flooding attacks. The proposed biologically inspired architecture utilizes the concepts of the human immune system to provide a robust solution against DoS attacks in SDNs. The two layer immune inspired framework, viz innate layer and adaptive layer, is initiated at the data layer and the control layer of SDN, respectively. The proposed model is reactive and lightweight for DoS mitigation in SDNs.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130611238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating Spread of ‘Gasless Send’ in Ethereum Smart Contracts","authors":"David Prechtel, Tobias Groß, Tilo Müller","doi":"10.1109/NTMS.2019.8763848","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763848","url":null,"abstract":"We present an approach for analyzing Ethereum smart contracts regarding to the issue of ‘gasless send’ [1, p. 8]. Gasless send is about contracts which lose the ability to receive Ether due to gas depletion when executing the contract's fallback function. Our approach is based on the security analysis tool Mythril which is a framework for analyzing security issues in Ethereum smart contracts. Mythril's analysis engine is based on symbolic code execution and features different analyses for security vulnerabilities in smart contracts. We upgraded the analysis engine in order to model the gas usage of Ethereum smart contracts during execution. In order to utilize the newly acquired data, we added an analysis module to detect fallback functions, whose execution may exceed the defined threshold of gas. Our analysis of 167,698 smart contracts currently deployed to the live Ethereum network shows that a total of 96.3 thousand (or 57%) might be affected by the issue of gasless send.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131344575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fadlallah Chbib, L. Khoukhi, W. Fahs, R. Khatoun, Jamal Haydar
{"title":"Wave Performance Analysis and Enhancement for Safety Applications in Vehicular Networks","authors":"Fadlallah Chbib, L. Khoukhi, W. Fahs, R. Khatoun, Jamal Haydar","doi":"10.1109/NTMS.2019.8763783","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763783","url":null,"abstract":"Vehicular ad hoc networks (VANETs) have become an active area of research, standardization, and development. The communication between vehicles will lead to more efficient and secured roads by providing information about traffic and road conditions to vehicle drivers. In this paper, we propose Markovian chain models to ensure the delivery of urgent safety message to the receiver, regardless of the buffer status by controlling the rate of the beacon messages in the control channel (CCH) according to 802.11 EDCA back off analysis. In the first Markov method, we control the rate of beacon message according to the buffer state to minimize the drop and delay of urgent message. In the second model, we compute the transmission probability of Access Category (AC) by modifying the contention window size with respect to buffer threshold. The third Markov method describes the probability of collision of AC. The simulations results prove that our proposed model performs better compared to the original IEEE 802.11p in terms of packet delivery ratio and throughput.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115070797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk Analysis on C-ITS Pseudonymity Aspects","authors":"Farah Haidar, Arnaud Kaiser, B. Lonc, P. Urien","doi":"10.1109/NTMS.2019.8763826","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763826","url":null,"abstract":"In the near future, vehicles will communicate with their environment by broadcasting Vehicle to everything (V2x) messages over the vehicular network (IEEE 802.11p). The exchanged messages contain data related to driver's privacy. As the laws in Europe require the privacy protection, the solution is to use pseudonym identities (certificates) in the communication. However, the use of these certificates can create new vulnerabilities that must be taken into account. In this paper, we do a state of art on the existing vulnerabilities, we applied the TVRA method and propose new vulnerabilities. Finally, we propose new countermeasures that could be implemented.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130348186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Asynchronous Dual Radio Opportunistic Beacon Network Protocol for Wildlife Monitoring System","authors":"E. D. Ayele, N. Meratnia, P. Havinga","doi":"10.1109/NTMS.2019.8763854","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763854","url":null,"abstract":"In this paper, we introduce an asynchronous dual interface opportunistic beacon network for wildlife monitoring. Unlike conventional opportunistic networks which are based on multi-copy data replication techniques, our approach utilizes an optimized single-copy beacon data transmission to achieve high energy efficiency. Furthermore, the collected data is aggregated and relayed to the central system by leveraging a low power and long range radio to provide high connectivity coverage. This approach will allow ultra-low power IoT devices to be deployed for sustainable wildlife monitoring applications. We evaluate the proposed approach in an actual animal movement use-case scenario. The results indicate that the proposed approach outperforms the traditional opportunistic network protocols in- terms of energy consumption and packet delivery ratio.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126351382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}