45 research outputs found
Demystifying COVID-19 digital contact tracing: A survey on frameworks and mobile apps
The coronavirus pandemic is a new reality and it severely affects the modus
vivendi of the international community. In this context, governments are
rushing to devise or embrace novel surveillance mechanisms and monitoring
systems to fight the outbreak. The development of digital tracing apps, which
among others are aimed at automatising and globalising the prompt alerting of
individuals at risk in a privacy-preserving manner is a prominent example of
this ongoing effort. Very promptly, a number of digital contact tracing
architectures has been sprouted, followed by relevant app implementations
adopted by governments worldwide. Bluetooth, and specifically its Low Energy
(BLE) power-conserving variant has emerged as the most promising short-range
wireless network technology to implement the contact tracing service. This work
offers the first to our knowledge, full-fledged review of the most concrete
contact tracing architectures proposed so far in a global scale. This endeavour
does not only embrace the diverse types of architectures and systems, namely
centralised, decentralised, or hybrid, but it equally addresses the client
side, i.e., the apps that have been already deployed in Europe by each country.
There is also a full-spectrum adversary model section, which does not only
amalgamate the previous work in the topic, but also brings new insights and
angles to contemplate upon.Comment: 34 pages, 3 figure
Efficient Certification Path Discovery for MANET
A Mobile Ad Hoc Network (MANET) is characterized by the lack of any infrastructure, absence of any kind of centralized administration, frequent mobility of nodes, network partitioning, and wireless connections. These properties make traditional wireline security solutions not straightforwardly applicable in MANETs, and of course, constitute the establishment of a Public Key Infrastructure (PKI) in such networks a cumbersome task. After surveying related work, we propose a novel public key management scheme using the well-known web-of-trust or trust graph model. Our scheme is based on a binary tree formation of the network's nodes. The binary tree structure is proved very effective for building certificate chains between communicating nodes that are multihops away and the cumbersome problem of certificate chain discovery is avoided. We compare our scheme with related work and show that it presents several advantages, especially when a fair balancing between security and performance is desirable. Simulations of the proposed scheme under different scenarios demonstrate that it is effective in terms of tree formation, join and leave occurrences, and certificate chain establishment
Industrial and Critical Infrastructure Security: Technical Analysis of Real-Life Security Incidents
Critical infrastructures and industrial organizations aggressively move towards integrating elements of modern Information Technology (IT) into their monolithic Operational Technology (OT) architectures. Yet, as OT systems progressively become more and more interconnected, they silently have turned into alluring targets for diverse groups of adversaries. Meanwhile, the inherent complexity of these systems, along with their advanced-in-age nature, prevents defenders from fully applying contemporary security controls in a timely manner. Forsooth, the combination of these hindering factors has led to some of the most severe cybersecurity incidents of the past years. This work contributes a full-fledged and up-to-date survey of the most prominent threats and attacks against Industrial Control Systems and critical infrastructures, along with the communication protocols and devices adopted in these environments. Our study highlights that threats against critical infrastructure follow an upward spiral due to the mushrooming of commodity tools and techniques that can facilitate either the early or late stages of attacks. Furthermore, our survey exposes that existing vulnerabilities in the design and implementation of several of the OT-specific network protocols and devices may easily grant adversaries the ability to decisively impact physical processes. We provide a categorization of such threats and the corresponding vulnerabilities based on various criteria. The selection of the discussed incidents and identified vulnerabilities aims to provide a holistic view of the specific threats that target Industrial Control Systems and critical infrastructures. As far as we are aware, this is the first time an exhaustive and detailed survey of this kind is attempted