101 research outputs found

    Cyber Forensics on Internet of Things: Slicing and Dicing Raspberry Pi

    Get PDF
    Any device can now connect to the Internet, and Raspberry Pi is one of the more popular applications, enabling single-board computers to make robotics, devices, and appliances part of the Internet of Things (IoT). The low cost and customizability of Raspberry Pi makes it easily adopted and widespread. Unfortunately, the unprotected Raspberry Pi device—when connected to the Internet—also paves the way for cyber-attacks. Our ability to investigate, collect, and validate digital forensic evidence with confidence using Raspberry Pi has become important. This article discusses and presents techniques and methodologies for the investigation of timestamp variations between different Raspberry Pi ext4 filesystems (Raspbian vs. UbuntuMATE), comparing forensic evidence with that of other ext4 filesystems (i.e., Ubuntu), based on interactions within a private cloud, as well as a public cloud. Sixteen observational principles of file operations were documented to assist in our understanding of Raspberry Pi’s behavior in the cloud environments. This study contributes to IoT forensics for law enforcement in cybercrime investigations

    Distributed Group Authentication for RFID Supply Management

    Get PDF
    We investigate an application of Radio Frequency Identification (RFID) referred to in the literature as group scanning, in which an RFID reader device interrogates several RFID tags to establish “simultaneous” presence of a group of tags. Our goal is to study the group scanning problem in strong adversarial settings and show how group scanning can be used in distributed applications for supply chain management. We present a security framework for group scanning and give a formal description of the attending security requirements. Our model is based on the Universal Composability framework and supports re-usability (through modularity of security guarantees). We propose two novel protocols that realize group scanning in this security model, based on off-the-shelf components such as low-cost (highly optimized) pseudorandom functions, and show how these can be integrated into RFID supply-chain management system

    RFID ownership transfer with positive secrecy capacity channels

    Get PDF
    RFID ownership transfer protocols (OTPs) transfer tag ownership rights. Recently, there has been considerable interest in such protocols, however, guaranteeing privacy for symmetric-key settings without trusted third parties (TTPs) is a challenge still unresolved. In this paper, we address this issue and show that it can be solved by using channels with positive secrecy capacity. We implement these channels with noisy tags and provide practical values, thus proving that perfect secrecy is theoretically possible. We then define a communication model that captures spatiotemporal events and describe a first example of symmetric-key based OTP that: (i) is formally secure in the proposed communication model and (ii) achieves privacy with a noisy tag wiretap channel without TTPs

    Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments

    Get PDF
    Sundaresan et al proposed recently a novel ownership transfer protocol for multi-tag multi-owner RFID environments that complies with the EPC Class1 Generation2 standard. The authors claim that this provides individual-owner privacy and prevents tracking attacks. In this paper we show that this protocol falls short of its security objectives. We describe attacks that allow: a) an eavesdropper to trace a tag, b) the previous owner to obtain the private information that the tag shares with the new owner, and c) an adversary that has access to the data stored on a tag to link this tag to previous interrogations (forward-secrecy). We then analyze the security proof and show that while the first two cases can be solved with a more careful design, for lightweight RFID applications strong privacy remains an open problem

    An enhanced symmetric-key based 5G-AKA protocol

    Get PDF
    5G technology is called to support the next generation of wireless communications and realize the “Internet of Everything” through its mMTC (massive Machine-Type-Communications) service. The recently standardized 5G-AKA protocol is intended to deal with security and privacy issues detected in earlier generations. Nevertheless, several 5G-AKA shortcomings have been reported, including a possibly excessive computational complexity for many IoT devices. To address these, a promising lightweight 2-pass authentication and key agreement (AKA) protocol for 5G mobile communications has recently been proposed by Braeken. Compared to the 5G-AKA protocol, this does not require the use of public key encryption. This paper analyzes the security claims of Braeken’s protocol and shows that it does not provide full unlinkability, but only session unlinkability, and is (still) subject to Linkability of AKA Failure Messages (LFM) attacks. We propose solutions to such problems and prove that symmetric-key based protocols cannot offer higher privacy protection levels without compromising availability. We then describe an enhanced version of this protocol that addresses these vulnerabilities and supports forward secrecy, which is a desirable feature for low-cost IoT devices.This work was supported in part by Funding for open access charge: Universidad de Málaga/CBUA, FEDER funds (Junta de Andalucía-University of Málaga) under Project UMA18-FEDERJA-172 and by Junta de Andalucía and ERDF under Project UMA-CEIATECH-11, and in part by NSF, USA under Grant 1565215

    Secure Random Key Pre-Distribution Against Semi-Honest Adversaries

    Get PDF
    Recently, Eschenauer and Gligor [EG02] proposed a model (the EG-model) for random key pre-distribution in distributed sensor networks (DSN) that allows sensors to establish private shared keys. In this model, each sensor is randomly assigned a set of keys, called a key-ring, from a secret key-pool. Two nodes can communicate securely by using a shared key (direct key) or via a chain of shared keys (key-path). The authors show how the key-ring size can be chosen so that nodes are guaranteed to be linked either by direct keys or by key-paths. Security of this system is proven for an eavesdropping (passive) adversary. In this paper we assume the same key pre-distribution set-up but consider a semi-honest adversary. Semi-honest adversaries are privacy adversaries that have access to a fraction of the keys in the key pool, the compromised keys, but are otherwise passive, in the sense that they do not cause nodes to deviate from protocol executions (to remain undetectable). Since they can decrypt messages secured by key-paths with compromised keys, the security guarantees of the EG model break down. We revisit the security of key establishment in the presence of such adversaries and make a number of contributions. First, we show that it is possible to choose the size of the key-rings so that any two nodes can exchange a private key securely in the presence of a semi-honest adversary. Second, we give a protocol that achieves this guarantee and prove its security. Third, we introduce a new efficiency parameter for the EG-model that allows the protocol designer to trade-off the communication required for key establishment with the key-ring size. Finally, we propose a concrete key establishment protocol (based on the DSR protocol) that guarantees security in the presence of a semi-honest adversary

    The POM Monoclonals: A Comprehensive Set of Antibodies to Non-Overlapping Prion Protein Epitopes

    Get PDF
    PrPSc, a misfolded and aggregated form of the cellular prion protein PrPC, is the only defined constituent of the transmissible agent causing prion diseases. Expression of PrPC in the host organism is necessary for prion replication and for prion neurotoxicity. Understanding prion diseases necessitates detailed structural insights into PrPC and PrPSc. Towards this goal, we have developed a comprehensive collection of monoclonal antibodies denoted POM1 to POM19 and directed against many different epitopes of mouse PrPC. Three epitopes are located within the N-terminal octarepeat region, one is situated within the central unstructured region, and four epitopes are discontinuous within the globular C-proximal domain of PrPC. Some of these antibodies recognize epitopes that are resilient to protease digestion in PrPSc. Other antibodies immunoprecipitate PrPC, but not PrPSc. A third group was found to immunoprecipitate both PrP isoforms. Some of the latter antibodies could be blocked with epitope-mimicking peptides, and incubation with an excess of these peptides allowed for immunochromatography of PrPC and PrPSc. Amino-proximal antibodies were found to react with repetitive PrPC epitopes, thereby vastly increasing their avidity. We have also created functional single-chain miniantibodies from selected POMs, which retained the binding characteristics despite their low molecular mass. The POM collection, thus, represents a unique set of reagents allowing for studies with a variety of techniques, including western blotting, ELISA, immunoprecipitation, conformation-dependent immunoassays, and plasmon surface plasmon resonance-based assays
    corecore