Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Security

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 539

Full-Text Articles in Physical Sciences and Mathematics

Trust Models And Risk In The Internet Of Things, Jeffrey Hemmes Apr 2021

Trust Models And Risk In The Internet Of Things, Jeffrey Hemmes

Regis University Faculty Publications

The Internet of Things (IoT) is envisaged to be a large-scale, massively heterogeneous ecosystem of devices with varying purposes and capabilities. While architectures and frameworks have focused on functionality and performance, security is a critical aspect that must be integrated into system design. This work proposes a method of risk assessment of devices using both trust models and static capability profiles to determine the level of risk each device poses. By combining the concepts of trust and secure device fingerprinting, security mechanisms can be more efficiently allocated across networked IoT devices. Simultaneously, devices can be allowed a greater degree of ...


Concentration Inequalities In The Wild: Case Studies In Blockchain & Reinforcement Learning, A. Pinar Ozisik Apr 2021

Concentration Inequalities In The Wild: Case Studies In Blockchain & Reinforcement Learning, A. Pinar Ozisik

Doctoral Dissertations

Concentration inequalities (CIs) are a powerful tool that provide probability bounds on how a random variable deviates from its expectation. In this dissertation, first I describe a blockchain protocol that I have developed, called Graphene, which uses CIs to provide probabilistic guarantees on performance. Second, I analyze the extent to which CIs are robust when the assumptions they require are violated, using Reinforcement Learning (RL) as the domain.

Graphene is a method for interactive set reconciliation among peers in blockchains and related distributed systems. Through the novel combination of a Bloom filter and an Invertible Bloom Lookup Table, Graphene uses ...


Using Grids As Password Entry Devices, Karol Lejmbach Apr 2021

Using Grids As Password Entry Devices, Karol Lejmbach

Master's Theses (2009 -)

The classic text-based password has been around for a very long time. A lot of security research has been conducted on it. A set of best practices has been available for many years stressing the use of longer and more complex passwords. The issue with this approach is that humans have a hard time recalling long complex sequences of characters. Worse, the more complex the string of characters the more prone it is to being written down which is the most detrimental security threat. The goal of this paper is to introduce and provide an introductory analysis of a grid-based ...


New Enhanced Authentication Protocol For Internet Of Things, Mourade Azrour, Jamal Mabrouki, Azedine Guezzaz, Yousef Farhaoui Mar 2021

New Enhanced Authentication Protocol For Internet Of Things, Mourade Azrour, Jamal Mabrouki, Azedine Guezzaz, Yousef Farhaoui

Big Data Mining and Analytics

Internet of Things (IoT) refers to a new extended network that enables to any object to be linked to the Internet in order to exchange data and to be controlled remotely. Nowadays, due to its multiple advantages, the IoT is useful in many areas like environment, water monitoring, industry, public security, medicine, and so on. For covering all spaces and operating correctly, the IoT benefits from advantages of other recent technologies, like radio frequency identification, wireless sensor networks, big data, and mobile network. However, despite of the integration of various things in one network and the exchange of data among ...


Lightweight Encryption Based Security Package For Wireless Body Area Network, Sangwon Shin Jan 2021

Lightweight Encryption Based Security Package For Wireless Body Area Network, Sangwon Shin

Electronic Theses and Dissertations

As the demand of individual health monitoring rose, Wireless Body Area Networks (WBAN) are becoming highly distinctive within health applications. Nowadays, WBAN is much easier to access then what it used to be. However, due to WBAN’s limitation, properly sophisticated security protocols do not exist. As WBAN devices deal with sensitive data and could be used as a threat to the owner of the data or their family, securing individual devices is highly important. Despite the importance in securing data, existing WBAN security methods are focused on providing light weight security methods. This led to most security methods for ...


Improving A Wireless Localization System Via Machine Learning Techniques And Security Protocols, Zachary Yorio Dec 2020

Improving A Wireless Localization System Via Machine Learning Techniques And Security Protocols, Zachary Yorio

Masters Theses, 2020-current

The recent advancements made in Internet of Things (IoT) devices have brought forth new opportunities for technologies and systems to be integrated into our everyday life. In this work, we investigate how edge nodes can effectively utilize 802.11 wireless beacon frames being broadcast from pre-existing access points in a building to achieve room-level localization. We explain the needed hardware and software for this system and demonstrate a proof of concept with experimental data analysis. Improvements to localization accuracy are shown via machine learning by implementing the random forest algorithm. Using this algorithm, historical data can train the model and ...


Thaw Publications, Carl Landwehr, David Kotz Dec 2020

Thaw Publications, Carl Landwehr, David Kotz

Computer Science Technical Reports

In 2013, the National Science Foundation's Secure and Trustworthy Cyberspace program awarded a Frontier grant to a consortium of four institutions, led by Dartmouth College, to enable trustworthy cybersystems for health and wellness. As of this writing, the Trustworthy Health and Wellness (THaW) project's bibliography includes more than 130 significant publications produced with support from the THaW grant; these publications document the progress made on many fronts by the THaW research team. The collection includes dissertations, theses, journal papers, conference papers, workshop contributions and more. The bibliography is organized as a Zotero library, which provides ready access to ...


Energy-Theft Detection Issues For Advanced Metering Infrastructure In Smart Grid, Rong Jiang, Rongxing Lu, Ye Wang, Jun Luo, Changxiang Shen, Xuemin Sherman Shen Nov 2020

Energy-Theft Detection Issues For Advanced Metering Infrastructure In Smart Grid, Rong Jiang, Rongxing Lu, Ye Wang, Jun Luo, Changxiang Shen, Xuemin Sherman Shen

Tsinghua Science and Technology

With the proliferation of smart grid research, the Advanced Metering Infrastructure (AMI) has become the first ubiquitous and fixed computing platform. However, due to the unique characteristics of AMI, such as complex network structure, resource-constrained smart meter, and privacy-sensitive data, it is an especially challenging issue to make AMI secure. Energy theft is one of the most important concerns related to the smart grid implementation. It is estimated that utility companies lose more than $25 billion every year due to energy theft around the world. To address this challenge, in this paper, we discuss the background of AMI and identify ...


Rise: A Reliable And Secure Scheme For Wireless Machine To Machine Communications, Wei Ren, Linchen Yu, Liangli Ma, Yi Ren Nov 2020

Rise: A Reliable And Secure Scheme For Wireless Machine To Machine Communications, Wei Ren, Linchen Yu, Liangli Ma, Yi Ren

Tsinghua Science and Technology

Wireless Machine to Machine (M2M) communications enable ubiquitous sensing, controlling, and acting via sensors, actuators, and actors. Reliability and security are of foremost importance in wireless M2M systems. A simple, target distinguishing attack can result in M2M’s failure. This paper presents a RelIable and SEcure scheme, RISE, which is a package of policies that guarantee the reliability of data (including sensor reports and actuator instructions) and devices (including sensors, actuators, and actors). The data reliability is improved by four algorithms, ChooseMedian, ChooseMost, ChooseNearest, and Trust-based Enhancement. Report attainability is improved via m repeat-sending and n multiple-reporting algorithms. Device reliability ...


Lattice-Based Double-Authentication-Preventing Ring Signature For Security And Privacy In Vehicular Ad-Hoc Networks, Jinhui Liu, Yong Yu, Jianwei Jia, Shijia Wang, Peiru Fan, Houzhen Wang, Huanguo Zhang Oct 2020

Lattice-Based Double-Authentication-Preventing Ring Signature For Security And Privacy In Vehicular Ad-Hoc Networks, Jinhui Liu, Yong Yu, Jianwei Jia, Shijia Wang, Peiru Fan, Houzhen Wang, Huanguo Zhang

Tsinghua Science and Technology

Amidst the rapid development of the Internet of Things (IoT), Vehicular Ad-Hoc NETwork (VANET), a typical IoT application, are bringing an ever-larger number of intelligent and convenient services to the daily lives of individuals. However, there remain challenges for VANETs in preserving privacy and security. In this paper, we propose the first lattice-based Double-Authentication-Preventing Ring Signature (DAPRS) and adopt it to propose a novel privacy-preserving authentication scheme for VANETs, offering the potential for security against quantum computers. The new construction is proven secure against chosen message attacks. Our scheme is more efficient than other ring signature in terms of the ...


Secure Authentication Protocol For Mobile Payment, Kai Fan, Hui Li, Wei Jiang, Chengsheng Xiao, Yintang Yang Oct 2020

Secure Authentication Protocol For Mobile Payment, Kai Fan, Hui Li, Wei Jiang, Chengsheng Xiao, Yintang Yang

Tsinghua Science and Technology

With the increasing popularity of fintech, i.e., financial technology, the e-commerce market has grown rapidly in the past decade, such that mobile devices enjoy unprecedented popularity and are playing an ever-increasing role in e-commerce. This is especially true of mobile payments, which are attracting increasing attention. However, the occurrence of many traditional financial mishaps has exposed the challenges inherent in online authentication technology that is based on traditional modes of realizing the healthy and stable development of mobile payment. In addition, this technology ensures user account security and privacy. In this paper, we propose a Secure Mutual Authentication Protocol ...


Secure Dhcpv6 Mechanism For Dhcpv6 Security And Privacy Protection, Lishan Li, Gang Ren, Ying Liu, Jianping Wu Oct 2020

Secure Dhcpv6 Mechanism For Dhcpv6 Security And Privacy Protection, Lishan Li, Gang Ren, Ying Liu, Jianping Wu

Tsinghua Science and Technology

With the rapid developmen of the Internet, the exhaustion of IPv4 address limited the development of the Internet for years. IPv6, as the core technology of the next generation Internet, has since been rapidly deployed around the world. As the widely deployed address configuration protocol, DHCPv6 is responsible for allocating globally unique IPv6 addresses to clients, which is the basis for all the network services. However, the initial design of the DHCPv6 protocol gave little consideration to the privacy and security issues, which has led to a proliferation of privacy and security accidents breaches in its real deployment. In this ...


Privacy Preserving And Delegated Access Control For Cloud Applications, Xinfeng Ye Oct 2020

Privacy Preserving And Delegated Access Control For Cloud Applications, Xinfeng Ye

Tsinghua Science and Technology

In cloud computing applications, users’ data and applications are hosted by cloud providers. This paper proposed an access control scheme that uses a combination of discretionary access control and cryptographic techniques to secure users’ data and applications hosted by cloud providers. Many cloud applications require users to share their data and applications hosted by cloud providers. To facilitate resource sharing, the proposed scheme allows cloud users to delegate their access permissions to other users easily. Using the access control policies that guard the access to resources and the credentials submitted by users, a third party can infer information about the ...


Secure Framework In Data Processing For Mobile Cloud Computing, Mr.Anand Surendra Shimpi Sep 2020

Secure Framework In Data Processing For Mobile Cloud Computing, Mr.Anand Surendra Shimpi

International Journal of Computer Science and Informatics

Generally Mobile Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users ‘physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose in this paper a new secure framework. In addition to providing traditional computation services, mobile cloud also enhances the operation of ...


Is The Transit Industry Prepared For The Cyber Revolution? Policy Recommendations To Enhance Surface Transit Cyber Preparedness, Scott Belcher, Terri Belcher, Eric Greenwald, Brandon Thomas Sep 2020

Is The Transit Industry Prepared For The Cyber Revolution? Policy Recommendations To Enhance Surface Transit Cyber Preparedness, Scott Belcher, Terri Belcher, Eric Greenwald, Brandon Thomas

Mineta Transportation Institute Publications

The intent of this study is to assess the readiness, resourcing, and structure of public transit agencies to identify, protect from, detect, respond to, and recover from cybersecurity vulnerabilities and threats. Given the multitude of connected devices already in use by the transit industry and the vast amount of data generated (with more coming online soon), the transit industry is vulnerable to malicious cyber-attack and other cybersecurity-related threats. This study reviews the state of best cybersecurity practices in public surface transit; outlines U.S. public surface transit operators’ cybersecurity operations; assesses U.S. policy on cybersecurity in public surface transportation ...


The Future Of Work Now: The Multi-Faceted Mall Security Guard At A Multi-Faceted Jewel, Tom Davenport, Steven Mark Miller Sep 2020

The Future Of Work Now: The Multi-Faceted Mall Security Guard At A Multi-Faceted Jewel, Tom Davenport, Steven Mark Miller

Research Collection School Of Computing and Information Systems

One of the most frequently-used phrases at business events these days is “the future of work.” It’s increasingly clear that artificial intelligence and other new technologies will bring substantial changes in work tasks and business processes. But while these changes are predicted for the future, they’re already present in many organizations for many different jobs. The job and incumbents described below are an example of this phenomenon. Steve Miller of Singapore Management University and I co-authored the story.


Encoding Personal Information On Data Sharing In Cloud Using Base64 Algorithm, P.L. Rini, Y. Gold Anand.N Aug 2020

Encoding Personal Information On Data Sharing In Cloud Using Base64 Algorithm, P.L. Rini, Y. Gold Anand.N

Graduate Research in Engineering and Technology (GRET)

A major feature of cloud services is that user data are processed remotely among machines. But user fears of losing control of their own data, particularly financial and health data can becomes a significant barrier to wide adoption of cloud services in order to avoid this problem we provide a novel approach, namely Cloud Information Accountability (CIA) for clients. So that the authorized client can only access the data in the cloud. Data owner store data in the format of JAR format thus client access data only by the permission of data owner. To strengthen user’s control also provide ...


Crowdsourcing Atop Blockchains, Yuan Lu Aug 2020

Crowdsourcing Atop Blockchains, Yuan Lu

Dissertations

Traditional crowdsourcing systems, such as Amazon's Mechanical Turk (MTurk), though once acquiring great economic successes, have to fully rely on third-party platforms to serve between the requesters and the workers for basic utilities. These third-parties have to be fully trusted to assist payments, resolve disputes, protect data privacy, manage user authentications, maintain service online, etc. Nevertheless, tremendous real-world incidents indicate how elusive it is to completely trust these platforms in reality, and the reduction of such over-reliance becomes desirable.

In contrast to the arguably vulnerable centralized approaches, a public blockchain is a distributed and transparent global "consensus computer" that ...


Secure Mobile Computing By Using Convolutional And Capsule Deep Neural Networks, Rui Ning Aug 2020

Secure Mobile Computing By Using Convolutional And Capsule Deep Neural Networks, Rui Ning

Electrical & Computer Engineering Theses & Disssertations

Mobile devices are becoming smarter to satisfy modern user's increasing needs better, which is achieved by equipping divers of sensors and integrating the most cutting-edge Deep Learning (DL) techniques. As a sophisticated system, it is often vulnerable to multiple attacks (side-channel attacks, neural backdoor, etc.). This dissertation proposes solutions to maintain the cyber-hygiene of the DL-Based smartphone system by exploring possible vulnerabilities and developing countermeasures.

First, I actively explore possible vulnerabilities on the DL-Based smartphone system to develop proactive defense mechanisms. I discover a new side-channel attack on smartphones using the unrestricted magnetic sensor data. I demonstrate that attackers ...


Design And Implementation Of Path Finding And Verification In The Internet, Hao Cai Jul 2020

Design And Implementation Of Path Finding And Verification In The Internet, Hao Cai

Doctoral Dissertations

In the Internet, network traffic between endpoints typically follows one path that is determined by the control plane. Endpoints have little control over the choice of which path their network traffic takes and little ability to verify if the traffic indeed follows a specific path. With the emergence of software-defined networking (SDN), more control over connections can be exercised, and thus the opportunity for novel solutions exists. However, there remain concerns about the attack surface exposed by fine-grained control, which may allow attackers to inject and redirect traffic.

To address these opportunities and concerns, we consider two specific challenges: (1 ...


Denial Of Service Attack Detection Through Machine Learning For The Iot, Naeem Firdous Syed, Zubair Baig, Ahmed Ibrahim, Craig Valli Jun 2020

Denial Of Service Attack Detection Through Machine Learning For The Iot, Naeem Firdous Syed, Zubair Baig, Ahmed Ibrahim, Craig Valli

ECU Publications Post 2013

Sustained Internet of Things (IoT) deployment and functioning are heavily reliant on the use of effective data communication protocols. In the IoT landscape, the publish/subscribe-based Message Queuing Telemetry Transport (MQTT) protocol is popular. Cyber security threats against the MQTT protocol are anticipated to increase at par with its increasing use by IoT manufacturers. In particular, IoT is vulnerable to protocol-based Application layer Denial of Service (DoS) attacks, which have been known to cause widespread service disruption in legacy systems. In this paper, we propose an Application layer DoS attack detection framework for the MQTT protocol and test the scheme ...


Towards Security And Privacy In Networked Medical Devices And Electronic Healthcare Systems, Isabel Jellen Jun 2020

Towards Security And Privacy In Networked Medical Devices And Electronic Healthcare Systems, Isabel Jellen

Master's Theses

E-health is a growing eld which utilizes wireless sensor networks to enable access to effective and efficient healthcare services and provide patient monitoring to enable early detection and treatment of health conditions. Due to the proliferation of e-health systems, security and privacy have become critical issues in preventing data falsification, unauthorized access to the system, or eavesdropping on sensitive health data. Furthermore, due to the intrinsic limitations of many wireless medical devices, including low power and limited computational resources, security and device performance can be difficult to balance. Therefore, many current networked medical devices operate without basic security services such ...


Cybersecurity Methods For Grid-Connected Power Electronics, Stephen Joe Moquin May 2020

Cybersecurity Methods For Grid-Connected Power Electronics, Stephen Joe Moquin

Theses and Dissertations

The present work shows a secure-by-design process, defense-in-depth method, and security techniques for a secure distributed energy resource. The distributed energy resource is a cybersecure, solar inverter and battery energy storage system prototype, collectively called the Cybersecure Power Router. Consideration is given to the use of the Smart Green Power Node for a foundation of the present work. Metrics for controller security are investigated to evaluate firmware security techniques. The prototype's ability to mitigate, respond to, and recover from firmware integrity degradation is examined. The prototype shows many working security techniques within the context of a grid-connected, distributed energy ...


Mitigating Real-Time Relay Phishing Attacks Against Mobile Push Notification Based Two-Factor Authentication Systems, Casey Silver May 2020

Mitigating Real-Time Relay Phishing Attacks Against Mobile Push Notification Based Two-Factor Authentication Systems, Casey Silver

Masters Theses, 2020-current

This paper explores how existing push notification based two-factor authentication systems are susceptible to real-time man-in-the-middle relay attacks and proposes a system for mitigating such attacks. A fully functional reference system of the proposed mitigation was built and compared to an existing push notification two-factor authentication system while undergoing a real-time man-in-the-middle relay attack. The reference systems used cloud infrastructure for hosting, an Apple iPhone as the notification receiver, and Apple’s push notification service to send notifications. A publicly available tool for conducting real-time man-in-the-middle relay attacks was used to conduct the attacks. The results of the tests were ...


Managing Two-Factor Authentication Setup Through Password Managers, Jonathan William Dutson Apr 2020

Managing Two-Factor Authentication Setup Through Password Managers, Jonathan William Dutson

Theses and Dissertations

Two-factor authentication (2FA) provides online accounts with protection against remote account compromise. Despite the security benefits, adoption of 2FA has remained low, in part due to poor usability. We explore the possibility of improving the usability of the 2FA setup process by providing setup automation through password managers. We create a proof-of-concept KeePass (a popular password manager) extension that adds browser-based automation to the 2FA setup process and conduct a 30-participant within-subjects user study to measure user perceptions about the system. Our system is found to be significantly more usable than the current manual method of 2FA setup for multiple ...


Keyless Anti-Jamming Communication Via Randomized Dsss, Ahmad Alagil Apr 2020

Keyless Anti-Jamming Communication Via Randomized Dsss, Ahmad Alagil

Graduate Theses and Dissertations

Nowadays, wireless networking is ubiquitous. In wireless communication systems, multiple nodes exchange data during the transmission time. Due to the natural use of the communication channel, it is crucial to protect the physical layer to make wireless channels between nodes more reliable. Jamming attacks consider one of the most significant threats on wireless communication. Spread spectrum techniques have been widely used to mitigate the effects of the jammer. Traditional anti-jamming approaches like Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS) require a sender and a receiver to share a secret key prior to their communication. If this ...


Iot-Hass: A Framework For Protecting Smart Home Environment, Tarig Mudawi Mar 2020

Iot-Hass: A Framework For Protecting Smart Home Environment, Tarig Mudawi

Masters Theses & Doctoral Dissertations

While many solutions have been proposed for smart home security, the problem that no single solution fully protects the smart home environment still exists. In this research we propose a security framework to protect the smart home environment. The proposed framework includes three engines that complement each other to protect the smart home IoT devices. The first engine is an IDS/IPS module that monitors all traffic in the home network and then detects, alerts users, and/or blocks packets using anomaly-based detection. The second engine works as a device management module that scans and verifies IoT devices in the ...


Apparatus For Securely Configuring A Target Device And Associated Methods, Timothy J. Pierson, Xiaohui Liang, Ronald Peterson, David Kotz Feb 2020

Apparatus For Securely Configuring A Target Device And Associated Methods, Timothy J. Pierson, Xiaohui Liang, Ronald Peterson, David Kotz

Other Faculty Materials

Apparatus and method securely transfer first data from a source device to a target device. A wireless signal having (a) a higher speed channel conveying second data and (b) a lower speed channel conveying the first data is transmitted. The lower speed channel is formed by selectively transmitting the wireless signal from one of a first and second antennae of the source device based upon the first data. The first and second antenna are positioned a fixed distance apart and the target device uses a received signal strength indication (RSSI) of the first signal to decode the lower speed channel ...


Abstraction Techniques In Security Games With Underlying Network Structure, Anjon Basak Jan 2020

Abstraction Techniques In Security Games With Underlying Network Structure, Anjon Basak

Open Access Theses & Dissertations

In a multi-agent system, multiple intelligent agents interact with each other in an environment to achieve their objectives. They can do this because they know which actions are available to them and which actions they prefer to take in a particular situation. The job of game theory is to analyze the interactions of the intelligent agents by different solution techniques and provide analysis such as predicting outcomes or recommending courses of action to specific players. To do so game theory works with a model of real-world scenarios which helps us to make a better decision in our already complex daily ...


Detecting Rogue Manipulation Of Smart Home Device Settings, David Zeichick Jan 2020

Detecting Rogue Manipulation Of Smart Home Device Settings, David Zeichick

CCE Theses and Dissertations

Smart home devices control a home’s environmental and security settings. This includes devices that control home thermostats, sprinkler systems, light bulbs, and home appliances. Malicious manipulation of the settings of these devices by an outside adversary has caused emotional distress and could even cause physical harm. For example, researchers have reported that there is a rise in domestic abuse perpetrated via smart home devices; victims have reported their thermostat settings being unwittingly manipulated and being locked out of their house due to their smart lock code being changed. Rapid adoption of smart home devices by consumers has led to ...