Current Issue : October - December Volume : 2017 Issue Number : 4 Articles : 5 Articles
Internet of Things (IoT) transforms network communication to Machine-to-Machine (M2M) basis and provides open access and\nnew services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G\nnetworks. However, as the resources of IoT�s front devices are constrained, many security mechanisms are hard to be implemented\nto protect the IoT networks. Intrusion detection system (IDS) is an efficient technique that can be used to detect the attackers\nwhen cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion\ndetection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT\nnetworks based on an automata model.The proposedmethod can detect and report the possible IoT attacks with three types: jamattack,\nfalse-attack, and reply-attack automatically.We also design an experiment to verify the proposed IDS method and examine\nthe attack of RADIUS application....
Android malware detection is a complex and crucial issue. In this paper, we propose a malware detection model using a support\nvector machine (SVM) method based on feature weights that are computed by information gain (IG) and particle swarm\noptimization (PSO) algorithms. The IG weights are evaluated based on the relevance between features and class labels, and the\nPSO weights are adaptively calculated to result in the best fitness (the performance of the SVM classification model). Moreover,\nto overcome the defects of basic PSO, we propose a new adaptive inertia weight method called fitness-based and chaotic adaptive\ninertia weight-PSO (FCAIW-PSO) that improves on basic PSO and is based on the fitness and a chaotic term.The goal is to assign\nsuitable weights to the features to ensure the best Android malware detection performance. The results of experiments indicate that\nthe IG weights and PSO weights both improve the performance of SVM and that the performance of the PSO weights is better than\nthat of the IG weights....
Obtaining complete information regarding discovered vulnerabilities looks\nextremely difficult. Yet, developing statistical models requires a great deal of\nsuch complete information about the vulnerabilities. In our previous studies,\nwe introduced a new concept of ââ?¬Å?Risk Factorââ?¬Â of vulnerability which was calculated\nas a function of time. We introduced the use of Markovian approach\nto estimate the probability of a particular vulnerability being at a particular\nââ?¬Å?stateââ?¬Â of the vulnerability life cycle. In this study, we further develop our\nmodels, use available data sources in a probabilistic foundation to enhance the\nreliability and also introduce some useful new modeling strategies for vulnerability\nrisk estimation. Finally, we present a new set of Non-Linear Statistical\nModels that can be used in estimating the probability of being exploited as a\nfunction of time. Our study is based on the typical security system and vulnerability\ndata that are available. However, our methodology and system structure\ncan be applied to a specific security system by any software engineer and\nusing their own vulnerabilities to obtain their probability of being exploited as\na function of time. This information is very important to a companyââ?¬â?¢s security\nsystem in its strategic plan to monitor and improve its process for not being\nexploited....
The crowdsourcing-based parking reservation system is a new computing paradigm, where private owners can rent their parking\nspots out. Security is the main concern for parking reservation systems. However, current schemes cannot provide user privacy\nprotection for drivers and have no key agreement functions, resulting in a lot of security problems. Moreover, current schemes\nare typically based on the time-consuming bilinear pairing and not suitable for real-time applications. To solve these security and\nefficiency problems, we present a novel security protocol with user privacy called SCPR. Similar to protocols of this field, SCPR can\nauthenticate drivers involved in the parking reservation system. However, different from other well-known approaches, SCPR uses\npseudonyms instead of real identities for providing user privacy protection for drivers and designs a novel pseudonym-based key\nagreement protocol. Finally, to reduce the time cost, SCPR designs several novel cryptographic algorithms based on the algebraic\nsignature technique. By doing so, SCPR can satisfy a number of security requirements and enjoy high efficiency. Experimental\nresults show SCPR is feasible for real world applications....
Young generations make extensive use of mobile devices, such as smartphones, tablets and\nlaptops, while a plethora of security risks associated with such devices are induced by vulnerabilities\nrelated to user behavior. Furthermore, the number of security breaches on or via portable devices\nincreases exponentially. Thus, deploying suitable risk treatments requires the investigation of how\nthe digital natives (young people, born and bred in the digital era) use their mobile devices and\ntheir level of security awareness, in order to identify common usage patterns with negative security\nimpact. In this article, we present the results of a survey performed across a multinational sample of\ndigital natives with distinct backgrounds and levels of competence in terms of security, to identify\ndivergences in user behavior due to regional, educational and other factors. Our results highlight\nsignificant influences on the behavior of digital natives, arising from user confidence, educational\nbackground, and parameters related to usability and accessibility. The outcomes of this study justify\nthe need for further analysis of the topic, in order to identify the influence of fine-grained semantics,\nbut also the consolidation of wide and robust user-models....
Loading....