18 research outputs found
Dictionary of privacy, data protection and information security
The Dictionary of Privacy, Data Protection and Information Security explains the complex technical terms, legal concepts, privacy management techniques, conceptual matters and vocabulary that inform public debate about privacy.
The revolutionary and pervasive influence of digital technology affects numerous disciplines and sectors of society, and concerns about its potential threats to privacy are growing. With over a thousand terms meticulously set out, described and cross-referenced, this Dictionary enables productive discussion by covering the full range of fields accessibly and comprehensively. In the ever-evolving debate surrounding privacy, this Dictionary takes a longer view, transcending the details of today''s problems, technology, and the law to examine the wider principles that underlie privacy discourse.
Interdisciplinary in scope, this Dictionary is invaluable to students, scholars and researchers in law, technology and computing, cybersecurity, sociology, public policy and administration, and regulation. It is also a vital reference for diverse practitioners including data scientists, lawyers, policymakers and regulators
PRISM: Privacy Preserving Healthcare Internet of Things Security Management
Consumer healthcare Internet of Things (IoT) devices are gaining popularity
in our homes and hospitals. These devices provide continuous monitoring at a
low cost and can be used to augment high-precision medical equipment. However,
major challenges remain in applying pre-trained global models for anomaly
detection on smart health monitoring, for a diverse set of individuals that
they provide care for. In this paper, we propose PRISM, an edge-based system
for experimenting with in-home smart healthcare devices. We develop a rigorous
methodology that relies on automated IoT experimentation. We use a rich
real-world dataset from in-home patient monitoring from 44 households of People
Living With Dementia (PLWD) over two years. Our results indicate that anomalies
can be identified with accuracy up to 99% and mean training times as low as
0.88 seconds. While all models achieve high accuracy when trained on the same
patient, their accuracy degrades when evaluated on different patients
Live Demonstration: Hacking Health: Unveiling Vulnerabilities in Wireless Wearable Sensors
This live demonstration showcases the potential
vulnerabilities in some wireless wearable sensors that use
Bluetooth Low Energy (BLE) for communication, focusing on
the risks of Man-in-the-Middle (MITM) attacks, sabotaging
and data manipulation attacks. We show how these attacks
can compromise not only the confidentiality and integrity of
potentially sensitive medical data transmitted by wearable
medical devices, but also patients’ privacy and safety as well as sensors’ reliability
COPSEC: Compliance-Oriented IoT Security and Privacy Evaluation Framework
A rising number of Internet of Things (IoT) security and privacy threats have been documented over the last few years. However, IoT devices' domain designs are out-of-date and do not take into consideration the changing dangers associated with them. In this paper, we present COPSEC, a novel framework for evaluating whether IoT devices are compliant with security guidelines and privacy regulations. We extract metrics from existing guidelines and regulations and test them on a set of devices by performing hundreds of automated experiments. Our results indicate not only that these devices are not compliant with basic security guidelines, but also that their data collection operations may introduce privacy risks for the users that adopt them
Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT Safeguards
Consumer Internet of Things (IoT) devices are increasingly common, from smart speakers to security cameras, in homes. Along with their benefits come potential privacy and security threats. To limit these threats a number of commercial services have become available (IoT safeguards). The safeguards claim to provide protection against IoT privacy risks and security threats. However, the effectiveness and the associated privacy risks of these safeguards remains a key open question. In this paper, we investigate the threat detection capabilities of IoT safeguards for the first time. We develop and release an approach for automated safeguards experimentation to reveal their response to common security threats and privacy risks. We perform thousands of automated experiments using popular commercial IoT safeguards when deployed in a large IoT testbed. Our results indicate not only that these devices may be ineffective in preventing risks, but also their cloud interactions and data collection operations may introduce privacy risks for the households that adopt them
Analysis of DNS Dependencies and their Security Implications in Australia:A Comparative Study of General and Indigenous Populations
This paper investigates the impact of internet centralization on DNS provisioning, particularly its effects on vulnerable populations such as the indigenous people of Australia. We analyze the DNS dependencies of Australian government domains that serve indigenous communities compared to those serving the general population. Our study categorizes DNS providers into leading (hyperscaler, US-headquartered companies), non-leading (smaller Australian-headquartered or non-Australian companies), and Australian government-hosted providers. Then, we build dependency graphs to demonstrate the direct dependency between Australian government domains and their DNS providers and the indirect dependency involving further layers of providers. Additionally, we conduct an IP location analysis of DNS providers to map out the geographical distribution of DNS servers, revealing the extent of centralization on DNS services within or outside of Australia. Finally, we introduce an attacker model to categorize potential cyber attackers based on their intentions and resources. By considering attacker models and DNS dependency results, we discuss the security vulnerability of each population group against any group of attackers and analyze whether the current setup of the DNS services of Australian government services contributes to a digital divide
Experience : Implications of roaming in Europe
The authors appreciate the valuable comments provided by the anonymous reviewers and the guidance of our anonymous shepherd. This work has been partially supported by the European Union H2020-ICT grants 644399 (MONROE) and 688421 (MAMI). The work of Marcelo Bagnulo has been partially funded by H2020 project MONROE/CGNWatcher and the 5G-City project (TEC2016-76795-C6-3-R). The work of Anna Maria Mandalari was partially funded by the H2020 project 5G-Range (777137). Part of this research was supported by Bayrisches Wissenschaftsforum (BayWISS) in the context of the Verbundkolleg “Mobilität und Verkehr”. Part of this work was carried out while Andra Lutu was with Simula Research Laboratory, NorwayPostprin
Measuring Roaming in Europe: Infrastructure and Implications on Users QoE
"Roam like Home" is the initiative of the European Commission to end the levy of extra charges when roaming within the European region. As a result, people can use data services more freely across Europe. However, the implications of roaming solutions on network performance have not been carefully examined yet. This paper provides an in-depth characterization of the implications of international data roaming within Europe. We build a unique roaming measurement platform using 16 different mobile networks deployed in 6 countries across Europe. Using this platform, we measure different aspects of international roaming in 4G networks in Europe, including mobile network configuration, performance characteristics, and quality of experience. We find that operators adopt a common approach to implement roaming called Home-routed roaming. This results in additional latency penalties of 60 ms or more, depending on geographical distance. This leads to worse browsing performance, with an increase in the metrics related to Quality of Experience (QoE) of users (Page Load time and Speed Index) in the order of 15-20%. We further analyze the impact of latency on QoE metrics in isolation and find that the penalty imposed by Home Routing leads to degradation on QoE metrics up to 150% in case of intercontinental roaming. We make our dataset public to allow reproducing the results