SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Butun Ismail) "

Sökning: WFRF:(Butun Ismail)

  • Resultat 1-46 av 46
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Amouri, Amar, et al. (författare)
  • IDS and IPS in LPWAN (LoRaWAN, Sigfox, and NB-IoT)
  • 2023
  • Ingår i: Low-Power Wide-Area Networks: Opportunities, Challenges, Risks and Threats. - : Springer International Publishing. ; , s. 39-82
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • Information security is of vital importance in any industry. Due to the emergence of smart devices, the need has only soared. Especially in wireless devices with low computation power, such as Low-Power Wide Area Network (LPWAN) it is increasingly difficult to design and provide secure passage to the data. Unlike its counterpart in the IoT realm, 6LoWPAN, LPWAN serves a much wider area. This renders it more challenging in terms of node placements for optimal coverage, link establishment and quality support. Adding to this, intrusion detection for LPWANs is not heavily researched upon. In face of all these issues surrounding LPWANs, we try to put forward a review of the intrusion detection and prevention approaches that are currently in place and are supposed to be state-of-the-art techniques. This chapter primarily focuses on the security considerations and mechanisms that are suitable for leading LPWAN technologies such as Sigfox, LoRaWAN, Narrow-Band IoT (NB-IoT) etc. After our thorough literature search, we identified several IDS and IPS schemes proposed for Sigfox, LoRaWAN, and NB-IoT. This is presented in a tabular form by comparing each scheme according to their unique features such as advantages and limitations. We also briefly address the research gaps associated before and after the installation of IDS or IPS on an LPWAN network, starting from its deployment and conclude the chapter with an emphasis on future work in this area.
  •  
2.
  • Aydin, Mustafa, et al. (författare)
  • Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs
  • 2020
  • Ingår i: 2020 10th Annual Computing and Communication Workshop and Conference, CCWC 2020. ; , s. 774-779
  • Konferensbidrag (refereegranskat)abstract
    • Phishing is a malicious form of online theft and needs to be prevented in order to increase the overall trust of the public on the Internet. In this study, for that purpose, the authors present their findings on the methods of detecting phishing websites. Data mining algorithms along with classifier algorithms are used in order to achieve a satisfactory result. In terms of classifiers, the Naïve Bayes, SMO, and J48 algorithms are used. As for the feature selection algorithm; Gain Ratio Attribute and ReliefF Attribute are selected. The results are provided in a comparative way. Accordingly; SMO and J48 algorithms provided satisfactory results in the detection of phishing websites, however, Naïve Bayes performed poor and is the least recommended method among all.
  •  
3.
  • Aydogan, Emre, et al. (författare)
  • A Central Intrusion Detection System for RPL-Based Industrial Internet of Things
  • 2019
  • Ingår i: 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS). - : IEEE. - 9781728112688
  • Konferensbidrag (refereegranskat)abstract
    • Although Internet-of-Things (IoT) is revolutionizing the IT sector, it is not mature yet as several technologies are  still being offered to be candidates for supporting the backbone of this system. IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is one of those promising candidate technologies to be adopted by IoT and Industrial IoT (IIoT). Attacks against RPL have shown to be possible, as the attackers utilize the unauthorized parent selection system of the RLP protocol. In this work, we are proposing a methodology and architecture to detect intrusions against IIoT. Especially, we are targeting to detect attacks against RPL by using genetic programming. Our results indicate that the developed framework can successfully (with high accuracy, along with high true positive and low false positive rates) detect routing attacks in RPL-based Industrial IoT networks.
  •  
4.
  • Butun, Ismail, 1981, et al. (författare)
  • A Review of Distributed Access Control for Blockchain Systems towards Securing the Internet of Things
  • 2021
  • Ingår i: IEEE Access. - 2169-3536 .- 2169-3536. ; 9, s. 5428-5441
  • Forskningsöversikt (refereegranskat)abstract
    • As the Internet of Things (IoT) paradigm gets more attention from academia and industry, implementation tools of IoT will be explored more and more. One example is the applicability of blockchain systems to provide security and privacy of IoT networks, which is the topic of this article. Blockchain systems are on the rise, as crypto-currency payment systems (such as Bitcoin, Litecoin, etc.) boomed in the last few years due to their attractive de-centralized and anonymous features. As in every transaction, access of the users to IoT systems needs to be controlled. However, these systems are peer-to-peer systems and do not have centralized control, which means that traditional access control techniques will not be optimal. As a result, distributed access control schemes are needed and this paper aims at providing the state of the art in the literature. Thereby, we introduce and discuss the details and applicability of centralized (rolebased) and distributed (threshold-signature, reputation, trusted-computing, identity, capability, ACL, groupsignature, and hybrid) access control schemes to blockchain systems under the IoT ecosystems. Moreover, permissioned vs. permissionless blockchain systems are also discussed. Finally, challenges and research directions related to the application of all those presented blockchain systems to IoT are discussed.
  •  
5.
  • Butun, Ismail, et al. (författare)
  • AI-Enabled Smart Sensing Technologies for Human-Centered Healthcare Applications
  • 2022
  • Ingår i: Sensors. - : MDPI Multidisciplinary Digital Publishing Institute. - 1424-8220. ; , s. 2
  • Tidskriftsartikel (populärvet., debatt m.m.)abstract
    • Lead Guest Editor, Special Issue ‘AI-Enabled Smart Sensing Technologies for Human-Centered Healthcare Applications’, Sensors, MDPI, from Jan 2022 to Oct 2023, https://www.mdpi.com/journal/sensors/special_issues/AESSTHCHA
  •  
6.
  • Butun, Ismail, et al. (författare)
  • Analysis of LoRaWAN V1.1 Security
  • 2018
  • Ingår i: Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects (SMARTOBJECTS '18).. - New York, NY, USA : ACM Digital Library. - 9781450358576
  • Konferensbidrag (refereegranskat)abstract
    • LoRa and the LoRaWAN specification is a technology for Low Power Wide Area Networks (LPWAN) designed to allow connectivity for connected objects, such as remote sensors. Several previous works revealed various weaknesses regarding the security of LoRaWAN v1.0 (the official 1st draft) and these led to improvements included in LoRaWAN v1.1, released on Oct 11, 2017. In this work, we provide the first look into the security of LoRaWAN v1.1. We present an overview of the protocol and, importantly, present several threats to this new version of the protocol. Besides, we propose our own ramification strategies for the mentioned threats, to be used in developing next version of LoRaWAN. The threats presented were not previously discussed, they are possible even within the security assumptions of the specification and are relevant for practitioners implementing LoRa-based applications as well researchers and the future evolution of the LoRaWAN specification.
  •  
7.
  • Butun, Ismail, et al. (författare)
  • Application Layer Packet Processing Using PISA Switches
  • 2021
  • Ingår i: Sensors. - : MDPI. - 1424-8220. ; 21:23
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper investigates and proposes a solution for Protocol Independent Switch Architecture (PISA) to process application layer data, enabling the inspection of application content. PISA is a novel approach in networking where the switch does not run any embedded binary code but rather an interpreted code written in a domain-specific language. The main motivation behind this approach is that telecommunication operators do not want to be locked in by a vendor for any type of networking equipment, develop their own networking code in a hardware environment that is not governed by a single equipment manufacturer. This approach also eases the modeling of equipment in a simulation environment as all of the components of a hardware switch run the same compatible code in a software modeled switch. The novel techniques in this paper exploit the main functions of a programmable switch and combine the streaming data processor to create the desired effect from a telecommunication operator perspective to lower the costs and govern the network in a comprehensive manner. The results indicate that the proposed solution using PISA switches enables application visibility in an outstanding performance. This ability helps the operators to remove a fundamental gap between flexibility and scalability by making the best use of limited compute resources in application identification and the response to them. The experimental study indicates that, without any optimization, the proposed solution increases the performance of application identification systems 5.5 to 47.0 times. This study promises that DPI, NGFW (Next-Generation Firewall), and such application layer systems which have quite high costs per unit traffic volume and could not scale to a Tbps level, can be combined with PISA to overcome the cost and scalability issues.
  •  
8.
  • Butun, Ismail, et al. (författare)
  • Detecting Intrusions in Cyber-Physical Systems of Smart Cities : Challenges and Directions
  • 2019
  • Ingår i: Secure Cyber-Physical Systems for Smart Cities. - Hershey, USA : IGI Global. - 9781522571896 ; , s. 74-102
  • Bokkapitel (refereegranskat)abstract
    • Interfacing the smart cities with cyber-physical systems (CPSs) improves cyber infrastructures while introducing security vulnerabilities that may lead to severe problems such as system failure, privacy violation, and/or issues related to data integrity if security and privacy are not addressed properly. In order for the CPSs of smart cities to be designed with proactive intelligence against such vulnerabilities, anomaly detection approaches need to be employed. This chapter will provide a brief overview of the security vulnerabilities in CPSs of smart cities. Following a thorough discussion on the applicability of conventional anomaly detection schemes in CPSs of smart cities, possible adoption of distributed anomaly detection systems by CPSs of smart cities will be discussed along with a comprehensive survey of the state of the art. The chapter will discuss challenges in tailoring appropriate anomaly detection schemes for CPSs of smart cities and provide insights into future directions for the researchers working in this field.
  •  
9.
  • Butun, Ismail, 1981, et al. (författare)
  • Hardware security of fog end-devices for the internet of things
  • 2020
  • Ingår i: Sensors. - : MDPI AG. - 1424-8220. ; 20:20, s. 1-28
  • Forskningsöversikt (refereegranskat)abstract
    • The proliferation of the Internet of Things (IoT) caused new application needs to emerge as rapid response ability is missing in the current IoT end-devices. Therefore, Fog Computing has been proposed to be an edge component for the IoT networks as a remedy to this problem. In recent times, cyber-attacks are on the rise, especially towards infrastructure-less networks, such as IoT. Many botnet attack variants (Mirai, Torii, etc.) have shown that the tiny microdevices at the lower spectrum of the network are becoming a valued participant of a botnet, for further executing more sophisticated attacks against infrastructural networks. As such, the fog devices also need to be secured against cyber-attacks, not only software-wise, but also from hardware alterations and manipulations. Hence, this article first highlights the importance and benefits of fog computing for IoT networks, then investigates the means of providing hardware security to these devices with an enriched literature review, including but not limited to Hardware Security Module, Physically Unclonable Function, System on a Chip, and Tamper Resistant Memory.
  •  
10.
  • Butun, Ismail, 1981, et al. (författare)
  • Intrusion Detection in Industrial Networks via Data Streaming
  • 2020
  • Ingår i: Industrial IoT: Challenges, Design Principles, Applications, and Security. - Cham : Springer International Publishing. ; , s. 213-238
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • Given the increasing threat surface of industrial networks due to distributed, Internet-of-Things (IoT) based system architectures, detecting intrusions in  Industrial IoT (IIoT) systems is all the more important, due to the safety implications of potential threats. The continuously generated data in such systems form both a challenge but also a possibility: data volumes/rates are high and require processing and communication capacity but they contain information useful for system operation and for detection of unwanted situations. In this chapter we explain that  stream processing (a.k.a. data streaming) is an emerging useful approach both for general applications and for intrusion detection in particular, especially since it can enable data analysis to be carried out in the continuum of edge-fog-cloud distributed architectures of industrial networks, thus reducing communication latency and gradually filtering and aggregating data volumes. We argue that usefulness stems also due to  facilitating provisioning of agile responses, i.e. due to potentially smaller latency for intrusion detection and hence also improved possibilities for intrusion mitigation. In the chapter we outline architectural features of IIoT networks, potential threats and examples of state-of-the art intrusion detection methodologies. Moreover, we give an overview of how leveraging distributed and parallel execution of streaming applications in industrial setups can influence the possibilities of protecting these systems. In these contexts, we give examples using electricity networks (a.k.a. Smart Grid systems). We conclude that future industrial networks, especially their Intrusion Detection Systems (IDSs), should take advantage of data streaming concept by decoupling semantics from the deployment.
  •  
11.
  • Butun, Ismail, et al. (författare)
  • Location Privacy Assured Internet of Things
  • 2019
  • Ingår i: Proceedings of the 5th International Conference on Information Systems Security and Privacy. - Setúbal, Portugal : SciTePress. - 9789897583599 ; , s. 623-630
  • Konferensbidrag (refereegranskat)abstract
    • Internet of Things (IoT) is in the booming age of its growth, therefore a vast amount of applications, projects, hardware/software solutions, and customized concepts are being developed. The proliferation of IoT will enable location-based services to be available everywhere for everyone, and this will raise a large number of privacy issues related to the collection, usage, retention, and disclosure of the user’s location information. In order to provide a solution to this unique problem of IoT, this paper proposes Location Privacy Assured Internet of Things (LPA-IoT) scheme, which uses the concepts of Mix-Zone, location-obfuscation along with context-awareness. To the authors’ best knowledge, the proposed LPA-IoT scheme is the first location-based privacy-preserving scheme for IoT that provides flexible privacy levels associated with the present context of the user.
  •  
12.
  • Butun, Ismail, et al. (författare)
  • Low-power wide-area networks: Opportunities, challenges, risks and threats
  • 2023
  • Bok (övrigt vetenskapligt/konstnärligt)abstract
    • This book offers the most suitable methods of applying Low-Power Wide-Area Network (LPWAN) technology to conceptual works and/or research studies. For instance, existing IoT protocols such as CoAP and MQTT are complemented by LPWAN to provide better service quality (QoS) to enable the notion of "sensor as a service" to endpoint users which is demonstrated in this book. LPWAN is a new enabling technology for IoT, filling the gap that existed between the legacy network technologies (WLAN, LAN, PAN) in terms of power, range, and data rates. It is also an alternative solution to implementations of IoT via cellular (4G/5G/6G) technologies, as it operates on the ISM band and also provides long-term battery life. Due to the several advantages, it brings, LPWAN raises high enthusiasm for many stakeholders of IoT. However, there still exist many research challenges to be tackled within this technology. As such this book aims at shedding light on those research problems. Moreover, practical users can also benefit from this book: Emergency response teams can leverage IoT systems with the extended communications-range capability provided by LPWAN technology. Moreover, machine-to-machine (M2M) and thing-to-thing (T2T) communications also benefit from this notion, as well as the Social IoT (SIoT) concept, owing to the "low-power" consumption advantage that is brought up by LPWAN technologies, e.g., 10 years battery lifetime projection for the LoRaWAN end-devices is very promising. Eventually, this proposed book aims at covering all aspects of LPWANs, from A to Z, theoretical aspects, hardware platforms and technologies, along with applications, opportunities, and, finally, challenges. Cyber-attacks and incidences are on the rise within the last decade, especially cases in large corporates and critical infrastructures have shown that cybersecurity should become one of the important pillars of computer network infrastructures as well as any kind of relevant technology being introduced. As such, cybersecurity is bringing attention not only from practitioners and academicians but also from other parties such as media, politicians, etc. Eventually, to reflect this important point of view, this book includes three chapters to investigate various aspects of LPWAN cybersecurity. Researchers working in wireless communications technologies and advanced-level students taking courses in electrical engineering or computer science will benefit from this book as a reference. Professionals working within this related field will also want to purchase this book.
  •  
13.
  • Butun, Ismail, 1981 (författare)
  • Preface
  • 2021
  • Ingår i: Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities. ; , s. xvii-xxi
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)
  •  
14.
  • Butun, Ismail (författare)
  • Preface
  • 2021
  • Ingår i: Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities. - : IGI Global. ; , s. xvii-xxi
  • Bokkapitel (refereegranskat)
  •  
15.
  • Butun, Ismail, 1981 (författare)
  • Preface to Industrial IoT
  • 2020
  • Ingår i: Industrial IoT: Challenges, Design Principles, Applications, and Security. ; , s. IX-X
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)
  •  
16.
  • Butun, Ismail, et al. (författare)
  • Preserving location privacy in cyber-physical systems
  • 2019
  • Ingår i: 2019 IEEE Conference on Communications and Network Security (CNS). - : IEEE. ; , s. 1-6
  • Konferensbidrag (refereegranskat)abstract
    • The trending technological research platform is Internet of Things (IoT)and most probably it will stay that way for a while. One of the main application areas of IoT is Cyber-Physical Systems (CPSs), in which IoT devices can be leveraged as actuators and sensors in accordance with the system needs. The public acceptance and adoption of CPS services and applications will create a huge amount of privacy issues related to the processing, storage and disclosure of the user location information. As a remedy, our paper proposes a methodology to provide location privacy for the users of CPSs. Our proposal takes advantage of concepts such as mix-zone, context-awareness, and location-obfuscation. According to our best knowledge, the proposed methodology is the first privacy-preserving location service for CPSs that offers adaptable privacy levels related to the current context of the user.
  •  
17.
  • Butun, Ismail, 1981, et al. (författare)
  • Security and privacy in smart grids: Challenges, current solutions and future opportunities
  • 2020
  • Ingår i: ICISSP 2020 - Proceedings of the 6th International Conference on Information Systems Security and Privacy. - : SCITEPRESS - Science and Technology Publications. ; , s. 733-741
  • Konferensbidrag (refereegranskat)abstract
    • Smart grids are a promising upgrade to legacy power grids due to enhanced cooperation of involved parties, such as consumers and utility providers. These newer grids improve the efficiency of electricity generation and distribution by leveraging communication networks to exchange information between those different parties. However, the increased connection and communication also expose the control networks of the power grid to the possibility of cyber-attacks. Therefore, research on cybersecurity for smart grids is crucial to ensure the safe operation of the power grid and to protect the privacy of consumers. In this paper, we investigate the security and privacy challenges of the smart grid; present current solutions to these challenges, especially in the light of intrusion detection systems; and discuss how future grids will create new opportunities for cybersecurity.
  •  
18.
  • Butun, Ismail, et al. (författare)
  • Security Implications of Fog Computing on the Internet of Things
  • 2019
  • Ingår i: International Conference on Consumer Electronics (ICCE). - : IEEE. - 9781538679104
  • Konferensbidrag (refereegranskat)abstract
    • Recently, the use of IoT devices and sensors has been rapidly increased which also caused data generation (information and logs), bandwidth usage, and related phenomena to be increased. To our best knowledge, a standard definition for the integration of fog computing with IoT is emerging now. This integration will bring many opportunities for the researchers, especially while building cyber-security related solutions. In this study, we surveyed about the integration of fog computing with IoT and its implications. Our goal was to find out and emphasize problems, specifically security related problems that arise with the employment of fog computing by IoT. According to our findings, although this integration seems to be non-trivial and complicated, it has more benefits than the implications. Index Terms—IoT, IIoT, vulnerabilities, trust, end-device, confidentiality, integrity, availability.
  •  
19.
  • Butun, Ismail, et al. (författare)
  • Security of the Internet of Things : Vulnerabilities, Attacks, and Countermeasures
  • 2020
  • Ingår i: IEEE Communications Surveys and Tutorials. - 1553-877X. ; 22:1, s. 616-644
  • Tidskriftsartikel (refereegranskat)abstract
    • Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium technologies and have wide range of applications in our surrounding environment. The reason behind the vast adoption of WSNs in various applications is that they have tremendously appealing features, e.g., low production cost, low installation cost, unattended network operation, autonomous and longtime operation. WSNs have started to merge with the Internet of Things (IoT) through the introduction of Internet access capability in sensor nodes and sensing ability in Internet-connected devices. Thereby, the IoT is providing access to huge amount of data, collected by the WSNs, over the Internet. Hence, the security of IoT should start with foremost securing WSNs ahead of the other components. However, owing to the absence of a physical line-of-defense, i.e., there is no dedicated infrastructure such as gateways to watch and observe the flowing information in the network, security of WSNs along with IoT is of a big concern to the scientific community. More specifically, for the application areas in which CIA (confidentiality, integrity, availability) has prime importance, WSNs and emerging IoT technology might constitute an open avenue for the attackers. Besides, recent integration and collaboration of WSNs with IoT will open new challenges and problems in terms of security. Hence, this would be a nightmare for the individuals using these systems as well as the security administrators who are managing those networks. Therefore, a detailed review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks are provided in this paper. In this text, attacks are categorized and treated into mainly two parts, most or all types of attacks towards WSNs and IoT are investigated under that umbrella: 'Passive Attacks' and 'Active Attacks'. Understanding these attacks and their associated defense mechanisms will help paving a secure path towards the proliferation and public acceptance of IoT technology. 
  •  
20.
  • Butun, Ismail, et al. (författare)
  • Security Risk Analysis of LoRaWAN and Future Directions
  • 2019
  • Ingår i: Future Internet. - : MDPI AG. - 1999-5903. ; 11:1
  • Tidskriftsartikel (refereegranskat)abstract
    • LoRa (along with its upper layers definition—LoRaWAN) is one of the most promising Low Power Wide Area Network (LPWAN) technologies for implementing Internet of Things (IoT)-based applications. Although being a popular technology, several works in the literature have revealed vulnerabilities and risks regarding the security of LoRaWAN v1.0 (the official 1st specification draft). The LoRa-Alliance has built upon these findings and introduced several improvements in the security and architecture of LoRa. The result of these efforts resulted in LoRaWAN v1.1, released on 11 October 2017. This work aims at reviewing and clarifying the security aspects of LoRaWAN v1.1. By following ETSI guidelines, we provide a comprehensive Security Risk Analysisof the protocol and discuss several remedies to the security risks described. A threat catalog is presented, along with discussions and analysis in view of the scale, impact, and likelihood of each threat. To the best of the authors’ knowledge, this work is one of the first of its kind, by providing a detailed security risk analysis related to the latest version of LoRaWAN. Our analysis highlights important practical threats, such as end-device physical capture, rogue gateway and self-replay, which require particular attention by developers and organizations implementing LoRa networks.
  •  
21.
  • Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities
  • 2021
  • Samlingsverk (redaktörskap) (refereegranskat)abstract
    • Internet of things (IoT) is an emerging research field that is rapidly becoming an important part of our everyday lives including home automation, smart buildings, smart things, and more. This is due to cheap, efficient, and wirelessly-enabled circuit boards that are enabling the functions of remote sensing/actuating, decentralization, autonomy, and other essential functions. Moreover, with the advancements in embedded artificial intelligence, these devices are becoming more self-aware and autonomous, hence making decisions themselves. Current research is devoted to the understanding of how decision support systems are integrated into industrial IoT. Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities presents the internet of things and its place during the technological revolution, which is taking place now to bring us a better, sustainable, automated, and safer world. This book also covers the challenges being faced such as relations and implications of IoT with existing communication and networking technologies; applications like practical use-case scenarios from the real world including smart cities, buildings, and grids; and topics such as cyber security, user privacy, data ownership, and information handling related to IoT networks. Additionally, this book focuses on the future applications, trends, and potential benefits of this new discipline. This book is essential for electrical engineers, computer engineers, researchers in IoT, security, and smart cities, along with practitioners, researchers, academicians, and students interested in all aspects of industrial IoT and its applications.
  •  
22.
  • Eldefrawy, Mohamed, et al. (författare)
  • Formal security analysis of LoRaWAN
  • 2019
  • Ingår i: Computer Networks. - : Elsevier BV. - 1389-1286 .- 1872-7069. ; 148, s. 328-339
  • Tidskriftsartikel (refereegranskat)abstract
    • Recent Low Power Wide Area Networks (LPWAN) protocols are receiving increased attention from industry and academia to offer accessibility for Internet of Things (IoT) connected remote sensors and actuators. In this work, we present a formal study of LoRaWAN security, an increasingly popular technology, which defines the structure and operation of LPWAN networks based on the LoRa physical layer. There are previously known security vulnerabilities in LoRaWAN that lead to the proposal of several improvements, some already incorporated into the latest protocol specification. Our analysis of LoRaWAN security uses Scyther, a formal security analysis tool and focuses on the key exchange portion of versions 1.0 (released in 2015) and 1.1 (the latest, released in 2017). For version 1.0, which is still the most widely deployed version of LoRaWAN, we show that our formal model allowed to uncover weaknesses that can be related to previously reported vulnerabilities. Our model did not find weaknesses in the latest version of the protocol (v1.1), and we discuss what this means in practice for the security of LoRaWAN as well as important aspects of our model and tools employed that should be considered. The Scyther model developed provides realistic models for LoRaWAN v1.0 and v1.1 that can be used and extended to formally analyze, inspect, and explore the security features of the protocols. This, in turn, can clarify the methodology for achieving secrecy, integrity, and authentication for designers and developers interested in these LPWAN standards. We believe that our model and discussion of the protocols security properties are beneficial for both researchers and practitioners. To the best of our knowledge, this is the first work that presents a formal security analysis of LoRaWAN.
  •  
23.
  • Forsström, Stefan, 1984-, et al. (författare)
  • Challenges of Securing the Industrial Internet of Things Value Chain
  • 2018
  • Ingår i: 2018 Workshop on Metrology for Industry 4.0 and IoT, MetroInd 4.0 and IoT 2018 - Proceedings. - : IEEE. - 9781538624975 - 9781538624982 ; , s. 218-223
  • Konferensbidrag (refereegranskat)abstract
    • We see a shift from todays Internet-of-Things (IoT)to include more industrial equipment and metrology systems,forming the Industrial Internet of Things (IIoT). However, thisleads to many concerns related to confidentiality, integrity,availability, privacy and non-repudiation. Hence, there is a needto secure the IIoT in order to cater for a future with smart grids,smart metering, smart factories, smart cities, and smart manufacturing.It is therefore important to research IIoT technologiesand to create order in this chaos, especially when it comes tosecuring communication, resilient wireless networks, protectingindustrial data, and safely storing industrial intellectual propertyin cloud systems. This research therefore presents the challenges,needs, and requirements of industrial applications when it comesto securing IIoT systems.
  •  
24.
  • Fortuna, P., et al. (författare)
  • A framework for web application integrity
  • 2018
  • Ingår i: ICISSP 2018 - Proceedings of the 4th International Conference on Information Systems Security and Privacy. - : SciTePress. - 9789897582820 ; , s. 487-493
  • Konferensbidrag (refereegranskat)abstract
    • Due to their universal accessibility, interactivity and scaling ease, Web applications relying on client-side code execution are currently the most common form of delivering applications and it is likely that they will continue to enter into less common realms such as IoT-based applications. We reason that modern Web applications should be able to exhibit advanced security protection mechanisms and review the research literature that points to useful partial solutions. Then, we propose a framework to support such characteristics and the features needed to implement them, providing a roadmap for a comprehensive solution to support Web application integrity. 
  •  
25.
  • Gaba, Gurjot Singh, et al. (författare)
  • MAKE-IT—A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things
  • 2020
  • Ingår i: Sensors. - : MDPI AG. - 1424-8220. ; 20:18, s. 1-21
  • Tidskriftsartikel (refereegranskat)abstract
    • Continuous development of the Industrial Internet of Things (IIoT) has opened up enormous opportunities for the engineers to enhance the efficiency of the machines. Despite the development, many industry administrators still fear to use Internet for operating their machines due to untrusted nature of the communication channel. The utilization of internet for managing industrial operations can be widespread adopted if the authentication of the entities are performed and trust is ensured. The traditional schemes with their inherent security issues and other complexities, cannot be directly deployed to resource constrained network devices. Therefore, we have proposed a strong mutual authentication and secret key exchange protocol to address the vulnerabilities of the existing schemes. We have used various cryptography operations such as hashing, ciphering, and so forth, for providing secure mutual authentication and secret key exchange between different entities to restrict unauthorized access. Performance and security analysis clearly demonstrates that the proposed work is energy efficient (computation and communication inexpensive) and more robust against the attacks in comparison to the traditional schemes
  •  
26.
  • Gunler Pirim, M. Altinay, et al. (författare)
  • Two-Stage Feature Generator for Handwritten Digit Classification
  • 2023
  • Ingår i: Sensors. - : MDPI AG. - 1424-8220. ; 23:20
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, a novel feature generator framework is proposed for handwritten digit classification. The proposed framework includes a two-stage cascaded feature generator. The first stage is based on principal component analysis (PCA), which generates projected data on principal components as features. The second one is constructed by a partially trained neural network (PTNN), which uses projected data as inputs and generates hidden layer outputs as features. The features obtained from the PCA and PTNN-based feature generator are tested on the MNIST and USPS datasets designed for handwritten digit sets. Minimum distance classifier (MDC) and support vector machine (SVM) methods are exploited as classifiers for the obtained features in association with this framework. The performance evaluation results show that the proposed framework outperforms the state-of-the-art techniques and achieves accuracies of 99.9815% and 99.9863% on the MNIST and USPS datasets, respectively. The results also show that the proposed framework achieves almost perfect accuracies, even with significantly small training data sizes.
  •  
27.
  • Hacks, Simon, et al. (författare)
  • Integrating Security Behavior into Attack Simulations
  • 2021
  • Ingår i: ARES 2021: The 16th International Conference on Availability, Reliability and Security. - New York, NY, USA : Association for Computing Machinery.
  • Konferensbidrag (refereegranskat)abstract
    • The increase of cyber-attacks raised security concerns for critical assets worldwide in the last decade. Leading to more efforts spent towards increasing the cyber security among companies and countries. For the sake of enhancing cyber security, representation and testing of attacks have prime importance in understanding system vulnerabilities. One of the available tools for simulating attacks on systems is the Meta Attack Language (MAL), which allows representing the effects of certain cyber-attacks. However, only understanding the component vulnerabilities is not enough in securing enterprise systems. Another important factor is the "human", which constitutes the biggest "insider threat". For this, Security Behavior Analysis (SBA) helps understanding which system components that might be directly affected by the "human". As such, in this work, the authors present an approach for integrating user actions, so called "security behavior", by mapping SBA to a MAL-based language through MITRE ATT&CK techniques.
  •  
28.
  • Iacovazzi, Alfonso, et al. (författare)
  • Towards Cyber Threat Intelligence for the IoT
  • 2023
  • Ingår i: <em>Proceedings - 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things, DCOSS-IoT 2023</em>. - : Institute of Electrical and Electronics Engineers Inc.. ; , s. 483-490
  • Konferensbidrag (refereegranskat)abstract
    • With the proliferation of digitization and its usage in critical sectors, it is necessary to include information about the occurrence and assessment of cyber threats in an organization’s threat mitigation strategy. This Cyber Threat Intelligence (CTI) is becoming increasingly important, or rather necessary, for critical national and industrial infrastructures. Current CTI solutions are rather federated and unsuitable for sharing threat information from low-power IoT devices. This paper presents a taxonomy and analysis of the CTI frameworks and CTI exchange platforms available today. It proposes a new CTI architecture relying on the MISP Threat Intelligence Sharing Platform customized and focusing on IoT environment. The paper also introduces a tailored version of STIX (which we call tinySTIX), one of the most prominent standards adopted for CTI data modeling, optimized for low-power IoT devices using the new lightweight encoding and cryptography solutions. The proposed CTI architecture will be very beneficial for securing IoT networks, especially the ones working in harsh and adversarial environments. 
  •  
29.
  • Industrial IoT: Challenges, design principles, applications, and security
  • 2020
  • Samlingsverk (redaktörskap) (refereegranskat)abstract
    • Proliferation of Internet of Things (IoT) enabled rapid enhancements for the applications not only in home and environment scenarios, but also in factory automation. Now, Industrial Internet of Things (IIoT) offers all the advantages of IoT to the industrial scenarios, applications ranging from remote sensing and actuating to de-centralization and autonomy. In this book, the editor aims at presenting the IIoT and its place during the industrial revolution (Industry 4.0), while they are taking us to a better, sustainable, automated and safer world. The book covers the cross relations and implications of IIoT with existing wired/wireless communication/networking and safety technologies of the Industrial Networks. Moreover, practical use-case scenarios from the industry, for the application of IIoT on smart factories, smart cities and smart grid are presented. Especially, IoT-driven advances in commercial and industrial building lighting and in street lighting are presented as a specific example to shed light on the application domain of IIoT. The state of the art in Industrial Automation is also presented not only to give a better understanding of the enabling technologies, potential advantages and challenges of the Industry 4.0 and IIoT but also to foster interest on exploring this promising area. Finally yet importantly, the security section of the book covers the cyber-security related needs of the IIoT users and the services that might address these needs. First, user privacy, data ownership, proprietary information handling related to IIoT networks are investigated. Then, the intrusion prevention, detection and mitigation part conclude the book.
  •  
30.
  • Khelifi, M., et al. (författare)
  • Localization in Unprecedentedly Crowded Airspace for UAVs and SUAVs
  • 2022
  • Ingår i: IEEE Access. - : Institute of Electrical and Electronics Engineers (IEEE). - 2169-3536. ; 10, s. 65206-65220
  • Tidskriftsartikel (refereegranskat)abstract
    • The unprecedented proliferation of Unmanned Aerial Vehicles (UAVs), and Swarm Unmanned Aerial Vehicles (SUAVs) have garnered considerable attention from industry and academia owing to their extensive landscape of applications from disaster relief towards smart agriculture. However, flying several UAVs at once poses many challenges to safely and efficiently localizing and monitoring them. Further, they need to maintain their formation distance to avoid collision between team members and any environmental obstacles. Besides, SUAVs are mainly equipped with an on-board Global Positioning System (GPS) receivers to obtain their positions, but they are not accurate enough and suffer from several vulnerabilities that restrict their applications. Thus, in GPS-denied situations, the acquisition of the positions of UAVs can be assisted by alternative technologies and solutions. This paper is one of the foremost in-depth works that present the topic of localization of SUAVs from various perspectives including current research challenges on positioning systems, telecommunication, and path planning, along with future opportunities on automated delivery services such as medicine, remote inspection of industrial sites, and precision agriculture. 
  •  
31.
  • Khelifi, Manel, et al. (författare)
  • Swarm Unmanned Aerial Vehicles (SUAVs) : A Comprehensive Analysis of Localization, Recent Aspects, and Future Trends
  • 2022
  • Ingår i: Journal of Sensors. - : Hindawi Limited. - 1687-725X .- 1687-7268. ; 2022
  • Forskningsöversikt (refereegranskat)abstract
    • Within the last decade, Swarm Unmanned Aerial Vehicles (SUAVs) are booming and growing at a surprisingly rapid pace. From military combat, environmental surveillance, and air transport to the blossoming public entertainment sector, there is a wide range of UAV applications. For these above use cases, the accurate location of the target of interest can be requested/queried, which is very important for their mission accomplishment. In the case of GPS-armed SUAVs, this is an easy task. However, the GPS signal can be obscured, affected by environmental conditions, or suppressive jamming. Therefore, location information needs to be improved/assisted by some other localization techniques, which constitutes the main scope of this article. Besides, with the advancements in localization, guidance, and communication technologies; future SUAVs will be operating autonomously by distributing tasks and coordinating the operation of many UAVs. Thus, UAV to UAV communication is presented as it constitutes the SUAV's autonomous coordination ability. In addition, future research directions and open challenges that need to be addressed, including autonomous SUAVs, are also discussed.
  •  
32.
  • Marlind, Fredrik, et al. (författare)
  • Activation of LoRaWAN End Devices by Using Public Key Cryptography
  • 2020
  • Ingår i: 2020 4th Cyber Security in Networking Conference, CSNet 2020.
  • Konferensbidrag (refereegranskat)abstract
    • This paper aims to design a new process to assign root keys to the devices in Long Range Wide Area Network (LoRaWAN) by using Public Key Cryptography (PKC). This process is used to propose a new activation method called Public Key Over the Air Activation (PK-OTAA). The feasibility of the proposed method is also evaluated scientifically via experiments. The new activation method allows a device to get the root keys dynamically and for them to be replaced at will. However, PKC requires longer keys to get equivalent cryptographic strength to a symmetric encryption scheme. This increased key size in turn requires more processing power to use, thus increasing battery consumption. The feasibility of the new method is evaluated based on the increase in power usage since Internet of Things (IoT) devices are usually battery powered. It has been shown that by sacrificing very small portion of the energy available in the battery; a more flexible and secure key distribution scheme is integrated in LoRaWAN.
  •  
33.
  • Mohamed, Ali, et al. (författare)
  • Enhancing Cyber Security of LoRaWAN Gateways under Adversarial Attacks
  • 2022
  • Ingår i: Sensors. - : MDPI AG. - 1424-8220. ; 22:9
  • Tidskriftsartikel (refereegranskat)abstract
    • The Internet of Things (IoT) has disrupted the IT landscape drastically, and Long Range Wide Area Network (LoRaWAN) is one specification that enables these IoT devices to have access to the Internet. Former security analyses have suggested that the gateways in LoRaWAN in their current state are susceptible to a wide variety of malicious attacks, which can be notoriously difficult to mitigate since gateways are seen as obedient relays by design. These attacks, if not addressed, can cause malfunctions and loss of efficiency in the network traffic. As a solution to this unique problem, this paper presents a novel certificate authentication technique that enhances the cyber security of gateways in the LoRaWAN network. The proposed technique considers a public key infrastructure (PKI) solution that considers a two-tier certificate authority (CA) setup, such as a root-CA and intermediate-CA. This solution is promising, as the simulation results validate that about 66.67% of the packets that are arriving from an illegitimate gateway (GW) are discarded in our implemented secure and reliable solution.
  •  
34.
  • Oztoprak, Kasim, et al. (författare)
  • Technological Transformation of Telco Operators towards Seamless IoT Edge-Cloud Continuum
  • 2023
  • Ingår i: Sensors. - : MDPI AG. - 1424-8220. ; 23:2, s. 1004-
  • Tidskriftsartikel (refereegranskat)abstract
    • This article investigates and discusses challenges in the telecommunication field from multiple perspectives, both academic and industry sides are catered for, surveying the main points of technological transformation toward edge-cloud continuum from the view of a telco operator to show the complete picture, including the evolution of cloud-native computing, Software-Defined Networking (SDN), and network automation platforms. The cultural shift in software development and management with DevOps enabled the development of significant technologies in the telecommunication world, including network equipment, application development, and system orchestration. The effect of the aforementioned cultural shift to the application area, especially from the IoT point of view, is investigated. The enormous change in service diversity and delivery capabilities to mass devices are also discussed. During the last two decades, desktop and server virtualization has played an active role in the Information Technology (IT) world. With the use of OpenFlow, SDN, and Network Functions Virtualization (NFV), the network revolution has got underway. The shift from monolithic application development and deployment to micro-services changed the whole picture. On the other hand, the data centers evolved in several generations where the control plane cannot cope with all the networks without an intelligent decision-making process, benefiting from the AI/ML techniques. AI also enables operators to forecast demand more accurately, anticipate network load, and adjust capacity and throughput automatically. Going one step further, zero-touch networking and service management (ZSM) is proposed to get high-level human intents to generate a low-level configuration for network elements with validated results, minimizing the ratio of faults caused by human intervention. Harmonizing all signs of progress in different communication technologies enabled the use of edge computing successfully. Low-powered (from both energy and processing perspectives) IoT networks have disrupted the customer and end-point demands within the sector, as such paved the path towards devising the edge computing concept, which finalized the whole picture of the edge-cloud continuum.
  •  
35.
  • Qadir, Junaid, et al. (författare)
  • Mitigating Cyber Attacks in LoRaWAN via Lightweight Secure Key Management Scheme
  • 2023
  • Ingår i: IEEE Access. - : Institute of Electrical and Electronics Engineers (IEEE). - 2169-3536. ; 11, s. 68301-68315
  • Tidskriftsartikel (refereegranskat)abstract
    • Owing to the geographically scattered end devices (EDs) in long-range wide area networks (LoRaWAN), devices that combat challenging cyber threats and attacks are of critical significance. In this perspective, LoRa Alliance((R)) is continuously evolving the security of LoRaWAN and recently introduced a new version i.e., LoRaWAN 1.1x that is featured with security improvement. However, the wireless nature of LoRaWAN implementation still leaves it vulnerable to security breaches that compromise its integrity. Several problems have been pinpointed in the newer version such as one issue with key distribution in LoRaWAN 1.1 is that the keys are often pre-installed on the devices at the time of manufacturing. It can introduce security risks if the keys are not adequately protected or if the devices are compromised before they are deployed. In other words, the pre-installed keys may not be updated regularly, which can also introduce security risks. Thus, the keys need to be handled securely to maintain the security of the network and the over-the-air firmware updates feature could introduce new security challenges for the key distribution. This paper presents a key generation and distribution (KGD) mechanism that securely exchanges the root key between the ED and the application server (AS). The KGD protocol provides authentication by integrating Advanced Encryption Standard (AES-128) in addition to a secure hash function known as Argon2. The proposed protocol utilizes Elliptic-Curve Diffie-Hellman (ECDH) key exchange method that makes the protocol resilient to cyber threats. The ECDH algorithm exchanges the keys on the insecure channels and is, therefore, vulnerable to Man-in-the-Middle (MITM) attacks in the network. Therefore, to validate the key agreement and avoid adversaries, the KGD protocol considers the Elliptic Curve Digital Signature Algorithm (ECDSA) that authenticates and allows legitimate instances in the network. In last, a formal security analysis using the Scyther tool validates the security enhancement of the KGD protocol.
  •  
36.
  • Qadir, Junaid, et al. (författare)
  • Review of Security Vulnerabilities in LoRaWAN
  • 2023
  • Ingår i: Applications in Electronics Pervading Industry, Environment and Society - APPLEPIES 2022. - : Springer Nature. ; , s. 248-254
  • Konferensbidrag (refereegranskat)abstract
    • The realm of Low Power Wide Area Network (LPWAN) has a paramount influence on the way we work and live. For instance, real-time applications and rapid packet transiting for long-range have now come into practice that was previously considered mysterious. However, euphoria becomes a problem when it comes to security considerations, as low-power devices possess limited processing units that are unable to elucidate robust security algorithms. In this case, the Low Power Wide Area Network (LoRaWAN) stepped into a technological competition that filled the gap by adopting the end-to-end security feature. Though, LoRaWAN protocol entails fundamental security requirements but the implementation matters. This paper presents security analyses in the LoRaWAN networks. In addition, we provide a bibliometric overview of security considerations in LoRaWAN that helps researchers for thorough insights and implementation.
  •  
37.
  • Qadir, Junaid, et al. (författare)
  • Towards Smart Sensing Systems : A New Approach to Environmental Monitoring Systems by Using LoRaWAN
  • 2022
  • Ingår i: IEEE Zooming Innovation in Consumer Electronics International Conference 2022 (ZINC 2022). - Novi Sad, Serbia : Institute of Electrical and Electronics Engineers Inc..
  • Konferensbidrag (refereegranskat)abstract
    • The proliferation of monitoring in unpredictableenvironments has aided the world in solving challenges that werepreviously thought to be insurmountable. Drastic advancementhas been pinpointed in the way we live, work, and play; however,the data odyssey has yet started. From sensing to monitoring,the endless possibility enabled by LoRa, the long-range lowpower solution has made its mark on the technological world.With the adoption of the LoRaWAN, the long-range low powerwide area network has appeared in existence to cope with theconstraints associated with the Internet of Things (IoT) infrastructure. This paper presents a practical experiment for sensingthe environmental condition using the LoRaWAN solution. Theproposed work allows the users to check the environmentaleffects (temperature, and humidity) online. Furthermore, thesignal behavior has been recorded and cross-verified by usingMATLAB software implementation.
  •  
38.
  • Rencelj Ling, Engla, 1990-, et al. (författare)
  • Securing Communication and Identifying Threats in RTUs : A Vulnerability Analysis
  • 2022
  • Ingår i: ARES 2022: Proceedings of the 17th International Conference on Availability, Reliability and Security. - New York, NY, USA : Association for Computing Machinery (ACM). - 9781450396707 ; , s. 1-7
  • Konferensbidrag (refereegranskat)abstract
    • This paper investigates methods to secure Remote Terminal Units (RTUs) which are the building blocks of a smart grid systems - the next generation version to replace the power grid systems that are being used today. RTUs are identified as the heart of automation and control (SCADA) systems by the systems engineers. As such, security and maintaining nominal operability of such devices has prime importance, especially for the industrial automation networks such as the smart grid. A way of measuring the security of systems and networks is executing a series of cybersecurity weakness assessment tests called penetration testing. Another way of such an assessment is called vulnerability analysis by threat modelling which involves careful investigation and modelling of each and every component of a network/system under investigation. This article, aims at marrying these two methodologies for the vulnerability assessment of the RTUs in a methodological and scientific way.
  •  
39.
  • Rydell, J. B., et al. (författare)
  • Delay Considerations for Reliable Communications in LoRaWAN
  • 2022
  • Ingår i: Proceedings - IEEE Consumer Communications and Networking Conference, CCNC. - : Institute of Electrical and Electronics Engineers (IEEE). - 2331-9860.
  • Konferensbidrag (refereegranskat)abstract
    • With the advent of the latest technologies, the Internet of Things (IoT) is the most widely used field in which billions of devices have been connected over the Internet. Long Range Wide Area Network (LoRaWAN) is among one of the most emerging technologies that deliver packets over very long-range with extremely low power consumption. However, it faces the problem of high latency. To cope with this problem, this paper aims to evaluate LoRaWAN in terms of latency by comparing how the default latency method that exists in LoRaWAN fair against an alternative method that has been researched and presented in the literature. Furthermore, having the concrete results of the latency will help companies to determine whether LoRaWAN is a suitable technology to use for Industrial IoT (IIoT) devices. Moreover, due to its backbone TCP/IP communication support, LoRaWAN will also facilitate the future architecture for the Web of Things (WoT). 
  •  
40.
  • Sari, Alparslan, et al. (författare)
  • A case study of decision support system and warehouse management system integration
  • 2021
  • Ingår i: Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities. - : IGI Global. ; , s. 111-138
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • A warehouse is an indispensable part of the logistics. A warehouse management system (WMS) is designed to improve efficiency in warehouses to increase their throughput and potential. The rise of IoT and its commercialization enabled 'smart things' to be widely adopted by hobbyists and companies. Cheap sensors and smart devices triggered better automation opportunities. Many devices and sensors that are being deployed in the industry and warehousing are affected by this trend. A well-designed WMS is needed to connect devices and humans in a heterogenous warehouse environment. This chapter introduces a prototype of a WMS powered by a decision support system (DSS) based on real-life requirements. In order to have fast, reliable, and efficient decision making in warehousing, the importance of employing DSS in the WMS is emphasized. Warehouse-related IoT technology is briefly introduced, and its security considerations are discussed thoroughly. The main contribution of this chapter is to show how warehouse operations can be modeled in business process model notation and executed in a DSS.
  •  
41.
  • Sari, Alparslan, et al. (författare)
  • A Highly Scalable Instruction Scheduler Design based on CPU Stall Elimination
  • 2021
  • Ingår i: 2021 Zooming Innovation in Consumer Technologies Conference, ZINC 2021. ; , s. 105-110
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, by targeting low-level code optimization, an instruction scheduler is designed and experimented with a synergistic processor unit (SPU) to show its effectiveness on a basic block and data dependency graph (DDG) called compiler instruction scheduler (CIS). In our methodology, a source C/C++ file is converted to an assembly file via spu-gcc to detect stalls in basic code blocks and CIS generates the DDG of executable code to eliminate stalls to find optimization opportunities and increase the program performance. The CIS simply shuffles the instruction sequences of the assembly code to eliminate CPU stalls in a given basic instruction block. Random and sliding window schedulers are implemented to generate a new assembly code sequence based on DDG and a basic block in parallel. Finally, this paper describes how CIS finds the optimized code sequence for a given file without any conflicts and hazards. Compared to the original code compilation process, we have shown that CIS improves the code execution metrics, and also our evaluated speedup results are found to be promising.
  •  
42.
  • Sari, Alparslan, et al. (författare)
  • Designing a Distributed Multi-agent System for Compiler Optimization
  • 2021
  • Ingår i: 2021 Zooming Innovation in Consumer Technologies Conference, ZINC 2021. ; , s. 269-274
  • Konferensbidrag (refereegranskat)abstract
    • This paper explores the run time performance improvements using different GCC optimization flags in program compilation. As multi-core microprocessor systems replacing legacy single-core ones, tremendous effort is needed to address to optimize the associated compilers for newly designed architectures in order to suit them for running parallel programming on multiple cores. Therefore, the aim of this paper is to address this challenge by designing an optimum distributed multi-agent system to perform compiler optimization. A multi-agent framework is adopted to utilize random and genetic algorithm-based search algorithm to find the best GCC optimization flags for a given program. The framework is highly scalable and can be extended with distributed system concept to perform code compilation in parallel to find the best-optimized code sequence in a short amount of time. The initial performance results have promising indicators which clearly show that the performance improvement is achieved.
  •  
43.
  • Sari, Alparslan, et al. (författare)
  • Early Detection and Recovery Measures for Smart Grid Cyber-Resilience
  • 2021
  • Ingår i: Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities. - Hershey, PA, USA : IGI Global. ; , s. 91-110
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • The internet of things (IoT) has recently brought major technological advances in many domains, including the smart grid. Despite the simplicity and efficiency that IoT brings, there are also underlying risks that are slowing down its adoption. These risks are caused by the presence of legacy systems inside existing infrastructures that were built with no security in mind. In this chapter, the authors propose a method for early-stage detection of cyber-security incidents and protection against them through applicable security measures. This chapter introduces security techniques such as anomaly detection, threat investigation through a highly automated decision support system (DSS), as well as incident response and recovery for smart grid systems. The introduced framework can be applied to industrial environments such as cyber-threats targeting the production generator as well as the electricity smart meters, etc. The chapter also illustrates the framework's cyber-resilience against zero-day threats and its ability to distinguish between operational failures as well as cyber-security incidents.
  •  
44.
  • Sari, Alparslan, et al. (författare)
  • Industrial networks and IIoT: Now and future trends
  • 2020
  • Ingår i: Industrial IoT: Challenges, Design Principles, Applications, and Security. - Cham : Springer International Publishing. ; , s. 3-55
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • Connectivity is the one word summary for Industry 4.0 revolution. The importance of Internet of Things (IoT) and Industrial IoT (IIoT) have been increased dramatically with the rise of industrialization and industry 4.0. As new opportunities bring their own challenges, with the massive interconnected devices of the IIoT, cyber security of those networks and privacy of their users have become an important aspect. Specifically, intrusion detection for industrial networks (IIoT) has great importance. For instance, it is a key factor in improving the safe operation of the smart grid systems yet protecting the privacy of the consumers at the same time. In the same manner, data streaming is a valid option when the analysis is to be pushed from the cloud to the fog for industrial networks to provide agile response, since it brings the advantage of fast action on intrusion detection and also can buy time for intrusion mitigation. In order to dive deep in industrial networks, basic ground needs to be settled. Hence, this chapter serves in this manner, by presenting basic and emerging technologies along with ideas and discussions: First, an introduction of semiconductor evolution is provided along with the up-to-date hi-tech wired/wireless communication solutions for industrial networks. This is followed by a thorough representation of future trends in industrial environments. More importantly, enabling technologies for industrial networks is also presented. Finally, the chapter is concluded with a summary of the presentations along with future projections of IIoT networks.
  •  
45.
  • Urrea Cabus, Jose Eduardo, et al. (författare)
  • Security Considerations for Remote Terminal Units
  • 2022
  • Ingår i: 2022 IEEE Zooming Innovation in Consumer Technologies Conference (ZINC), May 25-26 2022, Novi Sad,  Serbia. - Novi Sad, Serbia : Institute of Electrical and Electronics Engineers Inc.. ; , s. 47-52
  • Konferensbidrag (refereegranskat)abstract
    • Carbon-neutral societies are moving closer tousing renewable electricity as their primary source of energy. Indeed, decarbonization, decentralization, and digitization areall aspects of a paradigm change in burgeoning power systems. Furthermore, the design, fault rate, load demand, and climate all have a role in the complexity of the electrical network. This research 1 looks at its use and deployment in network security, with a particular emphasis on the vulnerabilities of RTU frameworks. The necessity for risk management in today’s environment, the requirement for a networked power grid, and the hardware and software components of the SCADA system have been thoroughly examined. Finally, a literature review of interoperable power grids with detailed specifics of RTU deployment was provided.
  •  
46.
  • Åxeland, A., et al. (författare)
  • Implications of cybersecurity breaches in LPWANs
  • 2021
  • Ingår i: Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities. - : IGI Global. ; , s. 1-18
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • With the contrast of limited performance and big responsibility of IoT devices, potential security breaches can have serious impacts in means of safety and privacy. Potential consequences of attacks on IoT devices could be leakage of individuals daily habits and political decisions being influenced. While the consequences might not be avoidable in their entirety, adequate knowledge is a fundamental part of realizing the importance of IoT security and during the assessment of damages following a breach. This chapter will focus on two low-powered wide area network (LPWAN) technologies, narrow-band iot (NB-IoT) and long-range wide area network (LoRaWAN). Further, three use cases will be considered-healthcare, smart cities, and industry-which all to some degree rely on IoT devices. It is shown that with enough knowledge of possible attacks and their corresponding implications, more secure IoT systems can be developed. 
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-46 av 46
Typ av publikation
konferensbidrag (19)
tidskriftsartikel (11)
bokkapitel (10)
forskningsöversikt (3)
samlingsverk (redaktörskap) (2)
bok (1)
visa fler...
visa färre...
Typ av innehåll
refereegranskat (36)
övrigt vetenskapligt/konstnärligt (9)
populärvet., debatt m.m. (1)
Författare/redaktör
Butun, Ismail (30)
Butun, Ismail, 1981 (16)
Gidlund, Mikael, 197 ... (7)
Sari, Alparslan (7)
Österberg, Patrik, 1 ... (6)
Lagerström, Robert, ... (5)
visa fler...
Qadir, Junaid (4)
Pereira, Nuno (3)
Oztoprak, Kasim (3)
Forsström, Stefan, 1 ... (2)
Tuncel, Yusuf Kursat (2)
Lekidis, Alexios (2)
Eldefrawy, Mohamed (2)
Carlsson, M (1)
Khelifi, M. (1)
Almgren, Magnus, 197 ... (1)
Gulisano, Vincenzo M ... (1)
Papatriantafilou, Ma ... (1)
Amouri, Amar (1)
Alaparthy, Vishwa Te ... (1)
Hacks, Simon (1)
Raza, Shahid, 1980- (1)
Aydin, Mustafa (1)
Bicakci, Kemal (1)
Baykal, Nazife (1)
Aydogan, Emre (1)
Yilmaz, Selim (1)
Sen, Sevil (1)
Pereira, N. (1)
Jennehag, Ulf, 1972- (1)
Kumar, Pardeep (1)
Wang, Han (1)
Sodhro, Ali (1)
Muzammal, Muhammad (1)
Sabir Hussain Bukhar ... (1)
Akyildiz, Ian F. (1)
Dos Santos, Daniel R ... (1)
Song, Houbing (1)
Iacovazzi, Alfonso (1)
Fortuna, P. (1)
Gaba, Gurjot Singh (1)
Choudhary, Karanjeet (1)
Gunler Pirim, M. Alt ... (1)
Tora, Hakan (1)
Buhaiu, Andrei (1)
Georgiadou, Anna (1)
Michalitsi Psarrou, ... (1)
Rencelj Ling, Engla, ... (1)
Olegård, Johannes (1)
Khelifi, Manel (1)
visa färre...
Lärosäte
Kungliga Tekniska Högskolan (20)
Chalmers tekniska högskola (20)
Mittuniversitetet (13)
Högskolan Kristianstad (1)
Stockholms universitet (1)
RISE (1)
Språk
Engelska (46)
Forskningsämne (UKÄ/SCB)
Teknik (32)
Naturvetenskap (31)
Samhällsvetenskap (2)
Medicin och hälsovetenskap (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy