16 research outputs found

    An advanced Study on Cryptography Mechanisms for Wireless Sensor Networks

    Get PDF
    Wireless Sensor Network (WSN) is consisting of independent and distributed sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. The most crucial and fundamental challenge facing WSN is security. Due to minimum capacity in-term of memory cost, processing and physical accessibility to sensors devices the security attacks are problematic. They are mostly deployed in open area, which expose them to different kinds of attacks. In this paper, we present an illustration of different attacks and vulnerabilities in WSN. Then we describe and analyze security requirement, countermeasures based on cryptography mechanisms in literature. Finally, we present possible directions in future research

    Security attacks and Analysis of Recent Intrusion Detection Schemes In Wireless Sensor Networks

    Get PDF
    Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs have a wide range of potential applications, including security and surveillance, control, actuation and maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor nodes. Those networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent Intrusion Detection schemes in WSNs

    Etude et développement d'un protocole symétrique pour sécuriser les communications des RCSF

    No full text
    Wireless Sensor Network (WSN) is consisting of independent and distributed sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. The most crucial and fundamental challenge facing WSN is security. Due to minimum capacity in-term of memory cost, processing and physical accessibility to sensors devices the security attacks are problematic. They are mostly deployed in open area, which expose them to different kinds of attacks. In this paper, we present an illustration of different attacks and vulnerabilities in WSN. Then we proposed a new lightweight cryptography algorithm for identifying compromised node in WSN called Leap Enhanced. Our evaluations on TOSSIM give a precise and detailed idea of the extra cost of consumption of resources needed to ensure the high level of expected security compared to other cryptography schemes in literature.Durant cette dernière décennie, les réseaux de capteurs sans fil (RCSF) ont attiré l'attention des chercheurs et des services de recherche et développement en raison de leur facilité de déploiement et de leur champs d'application dans divers domaines, y compris la sécurité et la surveillance, le contrôle, la maintenance des systèmes complexes, l'agriculture, e-santé, etc. Toutefois, en raison des ressources limitées de capteurs et les environnements de déploiement hostiles, ce type de réseaux est vulnérable à plusieurs types d'attaques. La sécurité est l'un des défis les plus cruciaux que les RCSF peuvent confronter. Les réseaux de capteurs sont très vulnérables contre les attaques. Par conséquent, il est nécessaire d'utiliser des mécanismes efficaces pour protéger ce type de réseau. Les mécanismes de cryptographie assurent la sécurité et ses services et jouent un rôle très important dans la détection et la prévention contre les attaques. Dans ce travail, nous nous concentrons dans un premier temps sur l'étude et l'analyse des algorithmes de cryptographie pour les RCSF. Par la suite, nous proposons un nouveau prototype léger à base de LEAP+ pour sécuriser les communications. Notre contribution est destinée aux applications utilisant les noeuds avec une faible mobilité et nécessitant un niveau de sécurité élevé. Contrairement à la plupart des méthodes proposées dans la littérature pour des topologies spécifiques, notre prototype de sécurité peut couvrir à la fois les besoins des topologies plats et hiérarchiques. L'évaluation de notre solution a été effectuée en utilisant le simulateur de TOSSIM. Les résultats ont montré que notre schéma assure le passage à l'échelle, résiste contre la majorité des attaques, avec une consommation d'énergie faible. Enfin, la complexité du protocole est analysée et comparer avec d'autres systèmes symétriques

    A comprehensive taxonomy of social engineering attacks and defense mechanisms: toward effective mitigation strategies

    No full text
    Social engineering (SE) attacks are a growing concern for organizations that rely on technology to protect sensitive data. Identifying and preventing these attacks can be challenging, as they frequently rely on manipulating human behavior rather than exploiting technical vulnerabilities. Although various studies have explored SE attacks and their defense mechanisms, there remains a gap in the literature concerning the holistic and layered classification of these threats and countermeasures. To address this, we conducted a comprehensive literature survey to understand existing taxonomies and subsequently identified areas that required a more structured and exhaustive categorization. Based on the survey results, we propose a comprehensive taxonomy of SE attacks, classifying them based on three levels: environment, approaches, and mediums. Additionally, we present a taxonomy of social engineering countermeasures, encompassing both technical and non-technical solutions. The proposed taxonomies serve as a foundation for future research and offer organizations a valuable framework for developing effective strategies to detect, prevent, and respond to social engineering incidents

    A Comprehensive Taxonomy of Social Engineering Attacks and Defense Mechanisms: Toward Effective Mitigation Strategies

    No full text
    Social engineering (SE) attacks are a growing concern for organizations that rely on technology to protect sensitive data. Identifying and preventing these attacks can be challenging, as they frequently rely on manipulating human behavior rather than exploiting technical vulnerabilities. Although various studies have explored SE attacks and their defense mechanisms, there remains a gap in the literature concerning the holistic and layered classification of these threats and countermeasures. To address this, we conducted a comprehensive literature survey to understand existing taxonomies and subsequently identified areas that required a more structured and exhaustive categorization. Based on the survey results, we propose a comprehensive taxonomy of SE attacks, classifying them based on three levels: environment, approaches, and mediums. Additionally, we present a taxonomy of social engineering countermeasures, encompassing both technical and non-technical solutions. The proposed taxonomies serve as a foundation for future research and offer organizations a valuable framework for developing effective strategies to detect, prevent, and respond to social engineering incidents

    Cybersecurity-based blockchain for cyber-physical systems: challenges and applications

    No full text
    Cyber-physical systems are increasingly connected to the Internet. This connectivity allows information to be fed back to them at ever higher and more distributed levels of abstraction. This increase in density, complexity and number of access points increases the attack surface of these systems. Blockchain technology holds the potential for innovation in cybersecurity. This chapter elucidates different concepts where blockchain can be applied to cybersecurity in cyber-physical systems. The first section discusses the challenges and applications of blockchain in cyber-physical systems. Before going into depth about blockchain, applications in cyber-physical systems, and cybersecurity are discussed

    A maturity capability framework for security operation center

    No full text
    Owning a Security Operation Center (SOC) is becoming increasingly common for organizations as part of their cybersecurity strategy to ensure near-real-time detection and adequately respond to cyber-attack engaging the SOC’s humans, technology, and processes. However, SOC investments only sometimes achieve the best possible outcomes and only provide an acceptable protection level in some cases due to the challenges related to the technologies, processes and especially the human factor. This paper proposes a new practical maturity framework for Security Operation Center. This will serve as a roadmap for IT auditors and security experts when they evaluate the maturity of a security operation center in terms of safeguarding the assets of the company, its partners, and its clients

    Machine Intelligence and Big Data Analytics for Cybersecurity Applications

    No full text
    This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, for cybersecurity intrusion detection and monitoring, and malware analysis. Cyber-attacks have posed real and wide-ranging threats for the information society. Detecting cyber-attacks becomes a challenge, not only because of the sophistication of attacks but also because of the large scale and complex nature of today’s IT infrastructures. It discusses novel trends and achievements in machine intelligence and their role in the development of secure systems and identifies open and future research issues related to the application of machine intelligence in the cybersecurity field. Bridging an important gap between machine intelligence, big data, and cybersecurity communities, it aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this area or those interested in grasping its diverse facets and exploring the latest advances on machine intelligence and big data analytics for cybersecurity applications.

    Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications

    No full text
    Blockchain technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction in the blocking chain, the industry does not matter. Blockchain technology has infiltrated all areas of our lives, from manufacturing to healthcare and beyond. Cybersecurity is an industry that has been significantly affected by this technology and may be more so in the future.Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications is an invaluable resource to discover the blockchain applications for cybersecurity and privacy. The purpose of this book is to improve the awareness of readers about blockchain technology applications for cybersecurity and privacy. This book focuses on the fundamentals, architectures, and challenges of adopting blockchain for cybersecurity. Readers will discover different applications of blockchain for cybersecurity in IoT and healthcare. The book also includes some case studies of the blockchain for e-commerce online payment, retention payment system, and digital forensics.The book offers comprehensive coverage of the most essential topics, including:Blockchain architectures and challengesBlockchain threats and vulnerabilitiesBlockchain security and potential future use casesBlockchain for securing Internet of ThingsBlockchain for cybersecurity in healthcareBlockchain in facilitating payment system security and privacyThis book comprises a number of state-of-the-art contributions from both scientists and practitioners working in the fields of blockchain technology and cybersecurity. It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on the blockchain for cybersecurity and privacy

    Cybersecurity and privacy in cyber physical systems

    No full text
    This title encourages both researchers and practitioners to share and exchange their experiences and recent studies between academia and industry to highlight and discuss the recent development and emerging trends cybercrime and computer digital forensics in the Cloud of Things; to propose new models, practical solutions, and technological advances related to cybercrime and computer digital forensics in the Cloud of Things; and to discuss new cybercrime and computer digital forensics models, prototypes, and protocols for the Cloud of Things environment
    corecore