The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of Things (IoT) is slowly taking over the world where its predicted that by 2025, it will grow to 1-3 trillion connected machines/devices. With large scale deployments, maintaining these devices is a seeming burden on the operations. Also, with huge deployments of IoT devices, most concerns center around privacy and security. To reduce the efforts of on-field maintenance and to perform such...
The development and adoption of new protocols (or of extensions to existing protocols) is arguably central to the Internet’s evolution. However, and in spite of over 40 years of experience with this process, we have limited understanding of what factors may contribute to a protocol’s success. A sound technical design and a well-grounded purpose are obviously important, but we have many examples of...
In the next future, IoT systems will be “ubiquitous” and “pervasive”, bringing several benefits to mankind and also many issues about interoperability, security and privacy. The intrinsic vulnerabilities of IoT devices, with limited resources and heterogeneous technologies, together with the lack of specifically designed IoT standards, represent a fertile ground for the expansion of specific cyber...
One of the popular concepts nowadays is the Internet of Things (IoT). IoT will convert our daily life objects into smart objects. In order to become a part of the IoT network, these smart devices will require some technologies and protocols. In this paper, we will study the different te chnologies that enable the smart objects to be come a part of the IoT network. Furthermore, we will have a look...
The article considers one of the actual threats of the Internet of things related to the transmission of malicious or incorrect electronic messages between agents. Methods of the transmitted data automatic verification and filtering by some set of features in Internet systems of things are analyzed. Authors propose an approach to the intelligent detection of unnatural requests between agents, which...
Modern security protocols may involve humans in order to compare or copy short strings between different devices. Multi-factor authentication protocols, such as Google 2-factor or 3D-secure are typical examples of such protocols. However, such short strings may be subject to brute force attacks. In this paper we propose a symbolic model which includes attacker capabilities for both guessing short...
There are several works on the formalization of security protocols and proofs of their security in Isabelle/HOL; there have also been tools for automatically generating such proofs. This is attractive since a proof in Isabelle gives a higher assurance of the correctness than a pen-and-paper proof or the positive output of a verification tool. However several of these works have used a typed model,...
Software-defined networking (SDN) overcomes many limitations of traditional networking architectures because of its programmable and flexible nature. Security applications, for instance, can dynamically reprogram a network to respond to ongoing threats in real time. However, the same flexibility also creates risk, since it can be used against the network. Current SDN architectures potentially allow...
In the article describes the main perspective directions of development of Worldwide network the Internet reveal: Internet of things, Industrial Internet of things, tactile Internet of things. These directions it is planned to unite in the general concept of Internet of with the basic principle “Always in touch”. Potentially it means increase number of connections to the Internet to 70 trillion by...
It is the aim of IoT-Testware to supply a rich set of TTCN-3 test suites and test cases for IoT technologies to enable developers in setting up a comprehensive test environment of their own, if needed from the beginning of a project. Initially, IoT-Testware will focus on protocols like CoAP and MQTT. To ensure test and implementation technology independence, the test suites will be realized in TTCN-3...
The concept of Extension Headers, newly introduced with IPv6, is elusive and enables new types of threats in the Internet. Simply dropping all traffic containing any Extension Header — a current practice by operators-seemingly is an effective solution, but at the cost of possibly dropping legitimate traffic as well. To determine whether threats indeed occur, and evaluate the actual nature of the traffic,...
A new quantum key distribution (QKD) scheme, based on quantum state fusion and fission, is proposed. By using quantum state fusion and a spatial-temporal mode conversion circuit, two polarization modes of two photons can be converted into one temporal-polarization mode of one photon. Also, by using quantum state fission and a temporal-spatial mode conversion circuit one temporal-polarization mode...
Network engineers and security experts are constantly confronted with new threats that have yet to be handled. Mitigation of zero day attacks requires the implementation of machine learning algorithms for the detection of abnormalities and malicious behavior on the network. These processes are often time consuming and can add significant resource cost in terms of network speed and compute power. The...
This paper proposes a novel two-way free-space quantum key distribution (QKD) protocol, which can be implemented using standard free-space optical (FSO) systems with subcarrier intensity-modulation (SIM) binary phase-shift-keying (BPSK) and direct-detection (DD) receiver. Different eavesdropping threats, including unauthorized receiver, beam-splitting, and intercept-resend attacks, are considered...
KNX is a worldwide open standard for home and building automation, which originated from a classical fieldbus protocol. While the needs for interacting with the upcoming Internet of Things (IoT) were already partially addressed by the recent KNX Web Services application note, KNX IP networking still supports IPv4 only. This paper proposes the usage of IPv6 networking as native KNX medium. The most...
The incredible rapid development of internet technologies, primarily thanks to omnipresent access of high speed broadband internet access and supporting technologies like Big Data, Cloud Computing, REST/Web services as well as cheap electronic equipment that use new wireless communications standards, lead to equal rapid growth of number of smart devices - “things” - connected to the internet. Increased...
Internet of Things (IoT) connect different types of devices to control different things or simply read data from then, such as room temperature, location, pressure and others, in a variety of application domains using the World Wide Web. This is a challenge for technology and Information Security (IS). Therefore, this paper surveys advances in IoT-based with an eye towards security, where discusses...
Radio Frequency Identification (RFID) security has not been properly handled in numerous applications, such as in public transportation systems. In this paper, a methodology to reverse engineer and detect security flaws is put into practice. Specifically, the communications protocol of an ISO/IEC 14443-B public transportation card used by hundreds of thousands of people in Spain was analyzed. By applying...
The railway domain is a complex critical infras-tructure (CI) linking communication and control elements, and susceptible to multiple security threats similar to thoseencountered by industrial control systems. However, protectingmodern railway signalling systems is a challenging task giventhe rigorous human safety standards that must be adhered towhile augmenting the systems with security mechanisms...
Thanks to their crucial role in different areas such as supply chain and healthcare, Radio Frequency Identification (RFID) technologies have currently attracted a lot of attention. They are mainly used for identifying objects and people based on a combination of tags and readers. Nevertheless, this identification brings out many challenges and concerns including security which still remains an open...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.