Dora Lapkova, David Malaník, L. Kralik, Lukas Kotek
{"title":"Cybersecurity in Protection of Soft Targets","authors":"Dora Lapkova, David Malaník, L. Kralik, Lukas Kotek","doi":"10.1109/NTMS.2019.8763806","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763806","url":null,"abstract":"This article is focused on the cybersecurity in the protection of Soft targets. From 2014, the Soft targets are the much-discussed topic in the security area. The most security measures are against violent attacks, but the threat is also inside cyber-attacks. In our research, we analyzed possible ways of attacks, and we tried to find the best way for security measures. We create the module for the PSIM, which we use for viewing and categorizing of data from protected objects. In this article, we present the initial study about our research, in which we are focused the transport system. There is a big threat in a disruption, damage or destruction of this system. The cyber-attacks do not have losses of life, but it would not be true in future. We propose the usage of penalization factors, which help us to process a security audit and to find out the security situation in our objects or events.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115673271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Reliability of Wireless Virtual Reality at Terahertz (THz) Frequencies","authors":"Christina Chaccour, Ramy Amer, Bo Zhou, W. Saad","doi":"10.1109/NTMS.2019.8763780","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763780","url":null,"abstract":"Guaranteeing ultra reliable low latency communications (URLLC) with high data rates for virtual reality (VR) services is a key challenge to enable a dual VR perception: visual and haptic. In this paper, a terahertz (THz) cellular network is considered to provide high-rate VR services, thus enabling a successful visual perception. For this network, guaranteeing URLLC with high rates requires overcoming the uncertainty stemming from the THz channel. To this end, the achievable reliability and latency of VR services over THz links are characterized. In particular, a novel expression for the probability distribution function of the transmission delay is derived as a function of the system parameters. Subsequently, the end-to-end (E2E) delay distribution that takes into account both processing and transmission delay is found and a tractable expression of the reliability of the system is derived as a function of the THz network parameters such as the molecular absorption loss and noise, the transmitted power, and the distance between the VR user and its respective small base station (SBS). Numerical results show the effects of various system parameters such as the bandwidth and the region of non-negligible interference on the reliability of the system. In particular, the results show that THz can deliver rates up to 16.4 Gbps and a reliability of 99.999% (with a delay threshold of 30 ms) provided that the impact of the molecular absorption on the THz links, which substantially limits the communication range of the SBS, is alleviated by densifying the network accordingly.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123107521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication Layer for IEC 61113-3 Applications","authors":"Aydin E. Homay, C. Chrysoulas, M. Sousa","doi":"10.1109/NTMS.2019.8763839","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763839","url":null,"abstract":"Mid 2010, the Stuxnet ICS attack targeted the Siemens automation products, and after this attack the ICS security was thrust into spotlight, automation products suppliers started to re-examine their business approach to cyber security. The OPC Foundation made also significant changes and improvements on its new design OPC-UA to increase security of automation applications but, what is still missing and seems to be not resolved any time soon is having security in depth for industrial automation applications. In this paper, we propose a simple but strong security control solution, what we will call a logic application level security particularly for SCADA and DCS. This proposed method is based on message integrity and should not be viewed as the main, nor the only level of protection that an industrial automation system is expected to have, but can be a low-level security procedure that avoids intelligent attacks such as Stuxnet.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126006755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}