The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As wireless and telecommunicaton infrastructure communications have been integrated into modern vehicle systems (i.e., infotainment systems and vehicle to vehicle systems), the security implications on the relatively unchanged underlying network protocols inside the vehicles are investigated by researchers and industrial experts in the corresponding domain. Some researchers have achieved the investigation...
Smart IoT applications require connecting multiple IoT devices and networks with multiple services running in fog and cloud computing platforms. One approach to connecting IoT devices with cloud and fog services is to create a federated virtual network. The main benefit of this approach is that IoT devices can then interact with multiple remote services using an application specific federated network...
Advances in nanotechnology, large scale computing and communications infrastructure, coupled with recent progress in big data analytics, have enabled linking several billion devices to the Internet. These devices provide unprecedented automation, cognitive capabilities, and situational awareness. This new ecosystem--termed as the Internet-of-Things (IoT)--also provides many entry points into the network...
The digital transformation of industrial production is driven by the advance of Cyber-Physical Production Systems (CPPS) within which raw materials, machines and operations are interconnected to form a sophisticated network. Making such systems self-adaptable is a priority concern for the future implementation of Industry 4.0 application scenarios. In this position paper, we design a meta-model and...
The state of art secure digital computing systems heavily rely on secure hardware as the Trusted Computing Base to build upon the chain of trust for trusted computing. Attack Protection Blocks are added to the hardware to prevent an adversary from bypassing the security provided by hardware using various side channel, voltage, frequency, temperature, and other attacks. However, attackers can target...
It is the aim of IoT-Testware to supply a rich set of TTCN-3 test suites and test cases for IoT technologies to enable developers in setting up a comprehensive test environment of their own, if needed from the beginning of a project. Initially, IoT-Testware will focus on protocols like CoAP and MQTT. To ensure test and implementation technology independence, the test suites will be realized in TTCN-3...
A novel Denial-of-Service attack for Networks-on-Chip, namely illegal packet request attack (IPRA), has been proposed and measures to mitigate the same have been addressed. Hardware Trojans, which cause these attacks, are conditionally triggered inside the routers at the buffer sites associated with local core, when the core is idle. These attacks contribute to the degradation of network performance...
The number of connected Internet of Things (IoT) devices was about 8.9 billion in 2012 and it is statistically estimated to grow up to 50 billion devices in the beginning of 2020. The security of the IoT plays an important role in the correct and advantageous functionality of the interconnected devices. For efficiency considerations, some of the IoT data processing is optimal to be implemented in...
In this paper we proposed policy based security architecture for securing the communication in multiple Autonomous System (AS) domains with Software Defined Networks (SDN). We will present a high level overview of the architecture and detail discussion on some of the important components for securing the communication in multiple AS domains. A key component of the security architecture is the specification...
The paper presents an implementation of IoT gateway for smart metering in electrical power systems. The gateway is based on Ubuntu Core operating system and connects power meters with external cloud services. Several software architecture design patterns are evaluated. Adaptation of them for the design of the software architecture of the gateway application is described in the paper. Based on the...
As an enabler of sustainable and innovative progress in wide range of applications from automotive to IoT, embedded non-volatile memory (eNVM) including embedded Flash (eFlash) has been and will be playing key roles. To meet more stringent and/or diversified requirements while overcoming many challenges along with memory cell scaling, hierarchical optimization in eNVM design from memory cell to hard...
This paper discusses some challenges that user mobility imposes over the user-centric protection model against security threats. This model is based on the idea of offloading the security applications from the end user device, and placing them in a trusted network node at the network's edge. Our research perspective is particularly centered around three interrelated mobility challenges, i) the allocation...
Fault Attacks methods like Electro-Magnetic PulseInjection or Body Biasing Injection have recently been demon-strated to be efficient against smartcards and Systems on Chip. As of now, security is a main constraint in product development, even for low-cost products riding the trend of the IoT (mostof these devices operate in hostile environments). Unfortunately, the implementation of hardware countermeasures...
With the miniaturization of devices and development of network infrastructure, the use of Machine-to-Machine (M2M) or Internet of Things (IoT) services are becoming widespread. The arrival of M2M/IoT raises many questions such as how to suit the current computer security standard to IoT devices, how to accommodate the huge number of IoT devices, and how to meet the heterogonous requirements from a...
Devices to provide one-way data transfer are known as one-way gateways and used in various security applications. The main problem to be solved by one-way gateways is to make secure communication between network segments with different security levels to maintain multilevel security policy. Although one-way gateways are utilized in lot of information systems, there is no solution, including ‘air gap’,...
This paper describes a high assurance architecture for smart metering. Hacking the smart metering infrastructure can have an enormous physical impact, therefore, it is essential that the components in this architecture are proven to be secure. In order for components to be verifiable, however, they need to be sufficiently simple. In this paper, we map the functionalities and different software modules...
Network centric warfare has been serving the defence mechanism since last few decades. Contemporary network oriented solutions exhibit vertical silos which lack in inefficient connected approach. Internet of Things holds the key potential to interconnect the battlefield with the digital world in ways that promise to fundamentally change military operations. This study proposes a novel architectural...
We present an IoT privacy architecture covering End-2-End data handling at devices, connections and in the cloud. The system is driven by privacy policies negotiated between service providers and consumers.
Business process (BP) stakeholders want to enjoy the benefits of the cloud, but they are also reluctant to expose their BP models which express the know-how of their companies. To prevent such a know-how exposure, this paper proposes a design-time approach for transforming a BP model into BP fragments so that these BP fragments externalized in a multi-cloud context do not allow a cloud resource provider...
Protecting the environment from many threats has become a priority worldwide. The existing sensor technology enables the continuous monitoring of various parameters related to environment status, such as air quality and many others. In this paper we propose a secure architecture based on cellular networks to collect such sensors' information in real time. The cell phones can interact with the cellular...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.