Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Digital Communications and Networking

Traffic Privacy Study On Internet Of Things – Smart Home Applications, Ayan Patel Aug 2020

Traffic Privacy Study On Internet Of Things – Smart Home Applications, Ayan Patel

Master's Theses

Internet of Things (IoT) devices have been widely adopted in many different applications in recent years, such as smart home applications. An adversary can capture the network traffic of IoT devices and analyze it to reveal user activities even if the traffic is encrypted. Therefore, traffic privacy is a major concern, especially in smart home applications. Traffic shaping can be used to obfuscate the traffic so that no meaningful predictions can be drawn through traffic analysis. Current traffic shaping methods have many tunable variables that are difficult to optimize to balance bandwidth overheads and latencies. In this thesis, we study …


Identification Of Users Via Ssh Timing Attack, Thomas J. Flucke Jul 2020

Identification Of Users Via Ssh Timing Attack, Thomas J. Flucke

Master's Theses

Secure Shell, a tool to securely access and run programs on a remote machine, is an important tool for both system administrators and developers alike. The technology landscape is becoming increasingly distributed and reliant on tools such as Secure Shell to protect information as a user works on a system remotely. While Secure Shell accounts for the abuses the security of older tools such as telnet overlook, it still has fundamental vulnerabilities which leak information about both the user and their activities through timing attacks. The OpenSSH client, the implementation included in all Linux, Mac, and Windows computers, sends each …


Privacy-Aware Security Applications In The Era Of Internet Of Things, Abbas Acar Apr 2020

Privacy-Aware Security Applications In The Era Of Internet Of Things, Abbas Acar

FIU Electronic Theses and Dissertations

In this dissertation, we introduce several novel privacy-aware security applications. We split these contributions into three main categories: First, to strengthen the current authentication mechanisms, we designed two novel privacy-aware alternative complementary authentication mechanisms, Continuous Authentication (CA) and Multi-factor Authentication (MFA). Our first system is Wearable-assisted Continuous Authentication (WACA), where we used the sensor data collected from a wrist-worn device to authenticate users continuously. Then, we improved WACA by integrating a noise-tolerant template matching technique called NTT-Sec to make it privacy-aware as the collected data can be sensitive. We also designed a novel, lightweight, Privacy-aware Continuous Authentication (PACA) protocol. PACA …


Algorithms For Achieving Fault-Tolerance And Ensuring Security In Cloud Computing Systems, Md. Tariqul Islam Jan 2020

Algorithms For Achieving Fault-Tolerance And Ensuring Security In Cloud Computing Systems, Md. Tariqul Islam

Theses and Dissertations--Computer Science

Security and fault tolerance are the two major areas in cloud computing systems that need careful attention for its widespread deployment. Unlike supercomputers, cloud clusters are mostly built on low cost, unreliable, commodity hardware. Therefore, large-scale cloud systems often suffer from performance degradation, service outages, and sometimes node and application failures. On the other hand, the multi-tenant shared architecture, dynamism, heterogeneity, and openness of cloud computing make it susceptible to various security threats and vulnerabilities. In this dissertation, we analyze these problems and propose algorithms for achieving fault tolerance and ensuring security in cloud computing systems.

First, we perform a …