Security, Privacy, and Anonymity in Computation, Communication, and Storage
SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings
- 2017
- Book
- Editors
- Guojun Wang
- Dr. Mohammed Atiquzzaman
- Zheng Yan
- Kim-Kwang Raymond Choo
- Book Series
- Lecture Notes in Computer Science
- Publisher
- Springer International Publishing
About this book
This book constitutes the refereed proceedings of 11 symposia and workshops held at the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017.
The total of 75 papers presented in this volume was carefully reviewed and selected from a total of 190 submissions to all workshops:
UbiSafe 2017: The 9th IEEE International Symposium on UbiSafe Computing
ISSR 2017: The 9th IEEE International Workshop on Security in e-Science and e-Research
TrustData 2017: The 8th International Workshop on Trust, Security and Privacy for Big Data
TSP 2017: The 7th International Symposium on Trust, Security and Privacy for Emerging Applications
SPIoT 2017: The 6th International Symposium on Security and Privacy on Internet of Things
NOPE 2017: The 5th International Workshop on Network Optimization and Performance Evaluation
DependSys 2017: The Third International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications
SCS 2017: The Third International Symposium on Sensor-Cloud Systems
WCSSC 2017: The Second International Workshop on Cloud Storage Service and Computing
MSCF 2017: The First International Symposium on Multimedia Security and Digital Forensics
SPBD 2017: The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity
Table of Contents
-
The 6th International Symposium on Security and Privacy on Internet of Things (SPIoT 2017)
-
Frontmatter
-
Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks
He Xu, Daniele Sgandurra, Keith Mayes, Peng Li, Ruchuan WangAbstractThe Internet of Things (IoT) technology is being widely integrated in many areas like smart-homes, smart-cities, healthcare, and critical infrastructures. As shown by some recent incidents, like the Mirai and BrickerBot botnets, security is a key issue for current and future IoT systems. In this paper, we examine the security of different categories of IoT devices to understand their resilience under different security conditions for attackers. In particular, we analyse IoT robustness against attacks performed under two threat models, namely (i) physical access of the attacker, (ii) close proximity of the attacker (i.e., RFID and WiFi ranges). We discuss the results of the tests we performed on different categories of IoT devices, namely IP cameras, OFo bike locks, RFID-based smart-locks, and smart-home WiFi routers. The results show that most of IoT devices do not address basic vulnerabilities, which can be exploitable under different threat models. -
Ensuring IoT/M2M System Security Under the Limitation of Constrained Gateways
Kuan-Lin Chen, Fuchun Joseph LinAbstractThe Internet of Things (IoT)/Machine to Machine (M2M) service must provide security mechanisms to avoid illegal usage of the service. However, in some situation the gateways involved in the IoT/M2M systems are resource-constrained. Hence, the commonly used Transport Layer Security (TLS) protocol cannot be readily applicable to ensure the security of the IoT/M2M systems. Our research focuses on providing IoT/M2M system security under the limitation of constrained gateways. We design a security mechanism on top of the security framework defined in the oneM2M standard to address this problem. Furthermore, we implement this mechanism on the OM2M platform and evaluate it in terms of cost and performance. -
Spatial Reconfigurable Physical Unclonable Functions for the Internet of Things
Armin Babaei, Gregor SchieleAbstractInternet of Things (IoT) devices encounter security and resource constrains as two confronting challenges. In this paper we demonstrate a ring oscillator Physical Unclonable Function (PUF) that uses spatial reconfiguration on an FPGA to provide secure authentication for resource constrained IoT devices. We discuss our main design decisions and present an example implementation of our approach. Our experimental evaluations shows that our approach can increase the number of unique challenge response pairs by a factor of six without increasing the size of the PUF implementation takes on the FPGA. This confirms the applicability of our proposed solution. -
Localizing Wireless Jamming Attacks with Minimal Network Resources
Jing Yang Koh, Pengfei ZhangAbstractWireless networks such as the wireless sensor networks (WSNs) are increasingly becoming ubiquitous in today’s Internet of Things (IoT) environment. However, wireless networks are very vulnerable to jamming attacks which can be easily carried out by small concealable wireless transmitters. Thus, there is a need to quickly localize and remove the jammer node to prevent further disruptions to the network. In addition, an efficient jammer node localization algorithm should use minimal network resources, e.g., number of reporting nodes. Based on this idea, we propose a maximum likelihood estimator (MLE)-based localization method for the jammer node which allows each node that detected a jammed link to probabilistically transmit a jamming report. The node transmission probabilities are optimized using the cross-entropy (CE) method to ensure that the localization algorithm satisfies a pre-defined reliability threshold. Our simulation results show that the proposed scheme performs significantly better than the simple centroid-based localization methods while using lesser number of reporting nodes and traffic.
-
-
The 5th International Workshop on Network Optimization and Performance Evaluation (NOPE 2017)
-
Frontmatter
-
An Architecture of Urban Regional Health Information System and Its Data Conversion Algorithm
Jinfu Chen, Lin Zhang, Ackah-Arthur Hilary, Omari Michael, Jiaxiang XiAbstractWith the development of health information systems, people are placing increasing demand for better medical care. In order to improve the convenience and intelligence of medical service, many researchers have begun to study the regional health information system in recent years. In this paper, based on the existing integrated digital city information infrastructure, an architecture of urban regional health information system is proposed, and the application of this architecture within cities in China is also presented. To start with, the overall architecture of health information system is presented. In this architecture, we mainly focus on the application portal, the regional health information application platform, the business systems, and the application support platform. Additionally, a data conversion algorithm is proposed. Finally, the paper analyzes the application performance of the proposed architecture of urban regional health information system in China. The experimental results show that the architecture proposed in this paper is feasible and effective. -
CCN Hotspot Cache Placement Strategy Based on Genetic Algorithm
Hongjia Wu, Nao Wang, Gaocai WangAbstractContent-centric networks provide effective support for content services through a caching mechanism, so the caching of the placement strategy has become a hot research. In this paper, the problem of content placement in CCN is taken as the starting point, focusing on the allocation of caching resources for district partitioning according to the number of users given the content of predictable hotspots. When the hot topic breaks out, the first to the user from the content of the nearest as the goal, from the user’s point of view as its characteristics, nested using improved genetic algorithms to select hotspot cache placement points, and a CCN hotspot cache placement strategy based on genetic algorithm is proposed. In the simulation experiment, the cache placement strategy proposed in this paper is compared with other traditional strategies in network performance. The simulation results show that the strategy can effectively reduce the access hops and average access latency, reduce the server load and improve the user satisfaction. -
The Impact of Routing Protocols on the Performance of a Mobility Model in Mobile Ad Hoc Network (MANET)
Martin Appiah, Rita CudjoeAbstractMobile Ad Hoc Network (MANET) comprises a group of mobile or wireless nodes that are placed randomly and dynamically which causes the constant change between nodes. When considering a routing protocol to deploy in any given situation on MANET, factors such as the mobility model, mobility of nodes, the network size and packet size should be carefully considered because the routing protocols configured with the mobility model can highly affect the performance of MANET. This paper analysed the impact of two different routing protocols (i.e. Dynamic Source Routing (DSR) and Optimized Link State Routing (OLSR)) on the performance of Random WayPoint (RWP) mobility model. Three measures of performance metrics (i.e. average throughput, average delay and average traffic received) were used. In all three-performance metrics, the simulated results indicated that Random WayPoint (RWP) configured with OLSR protocol performed better than RWP configured with DSR protocol. This indicates that the choice of a routing protocol for a specific mobility model should be considered in a network design. -
A Comparative Study of Zynq-Based OpenFlow Switches in a Software/Hardware Co-design
Jian Kang, Xiaojun Hei, Jianjian SongAbstractThe end-to-end design principle has been re-examined over the years with the increasing number of middle-boxes on the Internet. The newly released Xilinx Zyqn-based chipsets have been reshaping popular embedded computing platforms, which provide cost-effective but all programmable approaches to enable intelligence at the network edge. In this paper, we design and implement a software defined networking (SDN) switch on ONetSwitch based on Zynq series chip. The previous switch implements the software-based switching functions running in the Linux kernel. We added the FPGA hardware structure to the software switch for accelerating packet processing and flow-table matching; therefore some functions of the SDN switch were transformed to FPGA. We constructed an SDN testbed using the re-constructed switch system, the Ryu controller and the client building software to evaluate the performance of the pure software switch and the new switch. We utilized network performance testing tools, such as iPerf and Ping, to evaluate the streaming performance including throughput, delay and delay jitter for these two SDN switches. The experiment results demonstrated the accelerating capability of hardware-based flow-table matching, indicating that the hardware and software co-design method is promising to provide a broad design and optimization space for network systems. As a case study, this switch project demonstrated the design process, verified the hardware platform and the software tool chain to accomplish a hardware/software co-design. -
Design and Implementation of a Low-Cost Software Defined Wireless Network Testbed for Smart Home
Watipatsa W. Nsunza, Samuel Rutunda, Xiaojun HeiAbstractThe evolvable nature of software defined wireless networking offers great opportunities toward the design and implementation of a low-cost network testbed for smart home. Programmability is an essential component on a network gateway to enable efficient management of energy and other network resources for secure, scalable, and cost-effective solutions. In this paper, we proposed a software defined edge-cloud network architecture for smart home. We studied the programmable features of several popular SoC and FPGA platforms and design a software defined wireless network testbed for smart home by integrating several open-source projects including OpenWrt, Lede, and OpenFlow, which may be extended for other application scenarios such as smart grid and Internet-of-Things. We implemented WiFi, BLE, and ZigBee networking features on our low-cost FPGA and SoC platforms and evaluated the TCP and UDP throughput on our testbed. We conducted a series of experiments on our testbed and examined optimization issues based on recent developments in SDN. Our testbed may provide experiment supports for advancing smart home research and development. -
Energy-Efficiency Aware Cooperative Caching Strategy for Content-Centric Networks
Wenfei Han, Gaocai Wang, Peng YingAbstractContent-Centric Networking (CCN) is a new network architecture approach that each content router in it has caching capability, it can shorten the distance of user requests and improve network content distribution efficiency through the content cache of the routing nodes. In-network caching is one of the key technologies of CCN, which is widely concerned recently. However, most of the current caching strategies mainly concern about the performance of CCN, without considering the problem of transmission cost when the network provides service for users, and the energy efficiency of CCN is largely ignored. In this paper, to overcome this problem, firstly, an energy consumption model for content distribution is built and a judging condition for energy efficiency optimization in caching is designed. And in combination with content popularity the node centrality, a method is presented to calculate the probability that the content is cached by the node. Use the probability to measure the Content cache priority, then consider the Content cache priority and the Energy Efficiency Decision Conditions together, on this basis, an energy-efficiency aware cooperative caching strategy for content-centric networks (EEACC) is proposed. Simulation results demonstrate that the proposed strategy can effectively reduce the overall energy consumption of the network while ensuring a high cache hit rate and a smaller average response hops.
-
- Title
- Security, Privacy, and Anonymity in Computation, Communication, and Storage
- Editors
-
Guojun Wang
Dr. Mohammed Atiquzzaman
Zheng Yan
Kim-Kwang Raymond Choo
- Copyright Year
- 2017
- Publisher
- Springer International Publishing
- Electronic ISBN
- 978-3-319-72395-2
- Print ISBN
- 978-3-319-72394-5
- DOI
- https://doi.org/10.1007/978-3-319-72395-2
Accessibility information for this book is coming soon. We're working to make it available as quickly as possible. Thank you for your patience.