126 research outputs found
Information Security Theory and Practice: Securing the Internet of Things: 8th IFIP WG 11.2 InternationalWorkshop, WISTP 2014, Heraklion, Crete, Greece, June 30-July 2, 2014
International audienceBook Front Matter of LNCS 850
Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements
International audienc
Multi-objective function-based node-disjoint multipath routing for mobile ad hoc networks
Funding Information: This work was supported Korea Environmental Industry & Technology Institute (KEITI) grant funded by the Korea government (Ministry of Environment). Project No. RE202101551, the development of IoT-based technology for collecting and managing Big data on environmental hazards and health effects.Peer reviewedPublisher PD
Secure mobile edge server placement using multi-agent reinforcement learning
Funding Information: Funding: This work is supported by King Khaled University under Grant Agreement No. 6204.Peer reviewedPublisher PD
An efficient, secure and trusted channel protocol for avionics wireless networks
Avionics networks rely on a set of stringent reliability and safety
requirements. In existing deployments, these networks are based on a wired
technology, which supports these requirements. Furthermore, this technology
simplifies the security management of the network since certain assumptions can
be safely made, including the inability of an attacker to access the network,
and the fact that it is almost impossible for an attacker to introduce a node
into the network. The proposal for Avionics Wireless Networks (AWNs), currently
under development by multiple aerospace working groups, promises a reduction in
the complexity of electrical wiring harness design and fabrication, a reduction
in the total weight of wires, increased customization possibilities, and the
capacity to monitor otherwise inaccessible moving or rotating aircraft parts
such as landing gear and some sections of the aircraft engines. While providing
these benefits, the AWN must ensure that it provides levels of safety that are
at minimum equivalent to those offered by the wired equivalent. In this paper,
we propose a secure and trusted channel protocol that satisfies the stated
security and operational requirements for an AWN protocol. There are three main
objectives for this protocol. First, the protocol has to provide the assurance
that all communicating entities can trust each other, and can trust their
internal (secure) software and hardware states. Second, the protocol has to
establish a fair key exchange between all communicating entities so as to
provide a secure channel. Finally, the third objective is to be efficient for
both the initial start-up of the network and when resuming a session after a
cold and/or warm restart of a node. The proposed protocol is implemented and
performance measurements are presented based on this implementation. In
addition, we formally verify our proposed protocol using CasperFDR.Comment: 10 pages, 2 figures, 4 tables, IEEE DAS
Serverless protocols for inventory and tracking with a UAV
It is widely acknowledged that the proliferation of Unmanned Aerial Vehicles
(UAVs) may lead to serious concerns regarding avionics safety, particularly
when end-users are not adhering to air safety regulations. There are, however,
domains in which UAVs may help to increase the safety of airplanes and the
management of flights and airport resources that often require substantial
human resources. For instance, Paris Charles de Gaulle airport (CDG) has more
than 7,000 staff and supports 30,000 direct jobs for more than 60 million
passengers per year (as of 2016). Indeed, these new systems can be used
beneficially for several purposes, even in sensitive areas like airports. Among
the considered applications are those that suggest using UAVs to enhance safety
of on-ground airplanes; for instance, by collecting (once the aircraft has
landed) data recorded by different systems during the flight (like the sensors
of the Aircraft Data Networks - ADN) or by examining the state of airplane
structure. In this paper, our proposal is to use UAVs, under the control of the
airport authorities, to inventory and track various tagged assets, such as
luggage, supplies required for the flights, and maintenance tools. The aim of
our proposal is to make airport management systems more efficient for
operations requiring inventory and tracking, along with increasing safety
(sensitive assets such as refueling tanks, or sensitive pieces of luggage can
be tracked), thus raising financial profit.Comment: 11 pages, Conference, The 36th IEEE/AIAA Digital Avionics Systems
Conference (DASC'17
Security and performance comparison of different secure channel protocols for Avionics Wireless Networks
The notion of Integrated Modular Avionics (IMA) refers to inter-connected
pieces of avionics equipment supported by a wired technology, with stringent
reliability and safety requirements. If the inter-connecting wires are
physically secured so that a malicious user cannot access them directly, then
this enforces (at least partially) the security of the network. However,
substituting the wired network with a wireless network - which in this context
is referred to as an Avionics Wireless Network (AWN) - brings a number of new
challenges related to assurance, reliability, and security. The AWN thus has to
ensure that it provides at least the required security and safety levels
offered by the equivalent wired network. Providing a wired-equivalent security
for a communication channel requires the setting up of a strong, secure
(encrypted) channel between the entities that are connected to the AWN. In this
paper, we propose three approaches to establish such a secure channel based on
(i) pre-shared keys, (ii) trusted key distribution, and (iii) key-sharing
protocols. For each of these approaches, we present two representative protocol
variants. These protocols are then implemented as part of a demo AWN and they
are then compared based on performance measurements. Most importantly, we have
evaluated these protocols based on security and operational requirements that
we define in this paper for an AWN.Comment: 8 page, 4 images, 2 tables, conference, IEEE DAS
Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and their Countermeasures
International audienceSmart cards, in their traditional deployment architecture referred to as the Issuer Centric Smart Card Ownership Model (ICOM), have a restricted application lifecycle. In this model, an application is installed onto a smart card by the relevant card issuer. In most cases, the card issuer is also the centralised controlling authority for different lifecycle stages of the application. The installed application might not be deleted for the whole duration of the smart card's operation. The interaction of the application is controlled and closely monitored by the card issuer. ICOM-based smart cards have only one application, in the majority of deployments. Therefore, the likelihood of Feature Interaction Problems (FIPs) is minimal. By contrast, in open and dynamic smart card models like the GlobalPlatform Consumer-Centric Model (GP-CCM), and the User Centric Smart Card Ownership Model (UCOM) the probability of FIPs is substantially higher. The nature of these models allows users to install and delete applications as they require. This change in the application landscape might create a situation in which features (functions) of an application do not execute properly due to their reliance on an application that might be removed by the user or updated/modified by the Service Provider (SP). In this paper, we will focus on the problems related to application deletion that can potentially cause an FIP on the smart card platform. The paper proposes a framework to minimise such problems so the users can gain maximum service from their device and "freedom of choice" without concerns about application interdependencies
Security, privacy and safety evaluation of dynamic and static fleets of drones
Inter-connected objects, either via public or private networks are the near
future of modern societies. Such inter-connected objects are referred to as
Internet-of-Things (IoT) and/or Cyber-Physical Systems (CPS). One example of
such a system is based on Unmanned Aerial Vehicles (UAVs). The fleet of such
vehicles are prophesied to take on multiple roles involving mundane to
high-sensitive, such as, prompt pizza or shopping deliveries to your homes to
battlefield deployment for reconnaissance and combat missions. Drones, as we
refer to UAVs in this paper, either can operate individually (solo missions) or
part of a fleet (group missions), with and without constant connection with the
base station. The base station acts as the command centre to manage the
activities of the drones. However, an independent, localised and effective
fleet control is required, potentially based on swarm intelligence, for the
reasons: 1) increase in the number of drone fleets, 2) number of drones in a
fleet might be multiple of tens, 3) time-criticality in making decisions by
such fleets in the wild, 4) potential communication congestions/lag, and 5) in
some cases working in challenging terrains that hinders or mandates-limited
communication with control centre (i.e., operations spanning long period of
times or military usage of such fleets in enemy territory). This self-ware,
mission-focused and independent fleet of drones that potential utilises swarm
intelligence for a) air-traffic and/or flight control management, b) obstacle
avoidance, c) self-preservation while maintaining the mission criteria, d)
collaboration with other fleets in the wild (autonomously) and e) assuring the
security, privacy and safety of physical (drones itself) and virtual (data,
software) assets. In this paper, we investigate the challenges faced by fleet
of drones and propose a potential course of action on how to overcome them.Comment: 12 Pages, 7 Figures, Conference, The 36th IEEE/AIAA Digital Avionics
Systems Conference (DASC'17
- …