The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper a system for increasing children's safety is proposed. The focus is on the daily route from home to school and vice versa, assuming the use of school buses. IoT paradigm is exploited together with different localization techniques i.e. RFID and GPS, in order to design a solution for parents willing to make certain of their child's following the main steps to school or home, i.e. taking...
Existing attestation solutions based on Linux Integrity Measurement Architecture treat the network as an untrusted input. Thus, they often employ strict access control mechanisms with tunneling policies to prevent network flows from tainting the system. However, these different access control policies are challenging for administrators to model and verify for different Linux deployments, making them...
As the widespread deployment and usage of 802.11-based wireless local area networks (WLANs), Wi-Fi users are vulnerable to be attacked by a security threat called evil twins. The evil twin, a kind of rogue access points (RAPs), masquerades as a legitimate access point (AP) to lure users to connect it. Malicious adversaries can easily configure evil twins on a laptop to induce victim wireless users...
Today numerous information security (IS) incidents in organizations' networks have become not only more sophisticated but also damaging. Hence the systems with proper security services in place to mitigate and promptly respond to IS threats by helping organizations better understand their current network situation, as well as to perform routine work in big IS-related data processing in automatic mode...
A wireless sensor network (WSN) can provide a low cost and flexible solution to sensing and monitoring for large distributed applications. To save energy and prolong the network lifetime, the WSN is often partitioned into a set of spatial clusters. Each cluster includes sensor nodes with similar sensing data, and only a few sensor nodes (samplers) report their sensing data to a base node. Then the...
Social events like carnival parades are major activities for modern urban life. However, public authorities should tackle a series of challenges in order to successfully manage such spectacles that take place in specific time periods and urban areas inside a city. Such challenges mainly concern crowd management and resource planning operations. Local public authorities should be able to take fast...
The paper presents the work-in-progress in developing since 2016 and using the "Network Security Intelligence" educational and research center (NSIC) in the framework of the NRNU MEPhI's Institute of Cyber Intelligence Systems (ICIS). The NSIC currently consists of two bearing laboratories with Next-Generation Firewall (NGFW) and Data Loss Prevention (DLP) system as their cores respectively...
Proposals and some implementations of Internet of Things (IoT) systems for healthcare are described. Implications of current European Union legislation, the new General Data Protection Regulation, for the security and reliability of healthcare IoT systems and for the privacy of users of these systems are presented. Analytics of healthcare IoT data for the requirements of evidence based healthcare...
Information technologies can assist the elderly in their daily lives and thus improve their quality of life. Here, we present a system that was developed within the framework of the EU H2020 project IN LIFE to make the elderly feel more secure. The system consists of a smartwatch, a tablet, and a web portal for carers. The smartwatch has several functionalities; the most important are automatic fall...
Virtual machine introspection (VMI) is a critical functionality for cloud management because of the capability of security monitoring. Recently, a concept of writable VMI was proposed to update the state of guest OS from out-of-VM, which is suitable for an automated cloud management due to the feature of high automation. However, current solution of writable VMI lacks practicability because it has...
Medical devices equipped with wireless connectivity and remote monitoring features are increasingly becoming connected to each other, to an outside programmer and even to the Internet. While Internet of Things technology enables health-care professionals to fine tune or modify medical device settings without invasive procedures, this also opens up large attack surfaces and introduces potential security...
There is no doubt that security issues are on the rise and defense mechanisms are becoming one of the leading subjects for academic and industry experts. In this paper, we focus on the security domain and envision a new way of looking at the security life cycle. We utilize our vision to propose an asset-based approach to countermeasure zero day attacks. To evaluate our proposal, we built a prototype...
Organizations are exposed to various cyber-attacks. When a component is exploited, the overall computed damage is impacted by the number of components the network includes. This work is focuses on estimating the Target Distribution characteristic of an attacked network. According existing security assessment models, Target Distribution is assessed by using ordinal values based on users' intuitive...
Digital microfluidics biochips are an emerging technology that are increasingly being evaluated as a viable platform for rapid diagnosis and point-of-care field deployment. In such a technology, processing errors are inherent. Cyber-physical digital biochips offer higher reliability through the inclusion of automated error recovery mechanisms that can reconfigure the electrode array. The potential...
Before inception of Internet of Things (IoT), personal computers and laptop were used to handle daily tasks of individuals like mail surfing, access to bank portal, observing current temperature, among others. Nowadays, IoT-enabled smart devices like smart mobile phones, PDAs, and tablets are being used by them for such tasks due to rapid growth in IoT. Smart homes have been widely accepted by individuals...
Cloud computing has expanded rapidly as a promising technology in the recent years and has drastically altered the majority of opinions about computing mode and application deployment. While the cloud has been proved to improve efficiency and earn benefit for a great number of various services providers, yet a good few enterprises still hesitate to move to the cloud because of security threats. In...
In order to solve the problems of complex experiment management, complicated teaching task arrangement, limited student experiment conditions, and to provide a high efficiency of experiment teaching and security experiment environment for the majority of teachers and students, this paper investigates and analyzes the present situation of experiment management in colleges and universities. Based on...
In this work, an advanced vehicle monitoring and tracking system is proposed and designed for the purpose of monitoring the vehicles which are moving from one place to the other in order to provide safety and security. The proposed method puts together superior exercise of contemporary technology by means of Embedded C programming language and the unit developed via LPC2148 and its sophisticated features...
With the introduction of virtual machine introspection into IaaS cloud, indirect inspection of the state about guest VMs is supported with strong isolation. But it requires the privilege access to the virtual machine monitor and lacks manageability due to the need of installing various security vendors' agents in a privileged VM. In this paper, we propose an agentless and uniform introspection framework,...
This research demonstrates how to monitor an Internet of Things (IoT) construct and use the data captured from the network's IoT devices to gather information about end-users in the operating environment. The purpose for this study is to expose unsophisticated capabilities that malicious entities can perform when the aggregation of the raw data created from the low-level processing operation of IoT...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.