Explore chapters and articles related to this topic
Security and Privacy Issues in Fog Computing
Published in Ravi Tomar, Avita Katal, Susheela Dahiya, Niharika Singh, Tanupriya Choudhury, Fog Computing, 2023
Smriti Gaba, Susheela Dahiya, Keshav Kaushik
With the implementation of fog networking, wireless security issues increase potential attack surface. Wireless devices connected in a foggy environment transmit private data; if this communication is not secure, it may lead to sniffing attacks and leakage of private data. Wireless access points are also visible to the devices that are not connected. Moreover, implementation of weak encryption techniques makes the communication insecure due to which the attacker can enter the network via impersonation attack or sybil attack and execute DoS attacks or even try to intercept network traffic by MITM and obtain sensitive information (Pathan et al., 2006). For prevention of these attacks, communications in fog networks must be encrypted and authenticated.
AI-enabled IoT penetration testing: state-of-the-art and research challenges
Published in Enterprise Information Systems, 2023
Claudia Greco, Giancarlo Fortino, Bruno Crispo, Kim-Kwang Raymond Choo
Giaretta, Donno, and Dragoni (2018) tested the security of Pepper, a commercial humanoid social robot by SoftBank Robotics, performing both automated and manual assessment, which revealed a relevant number of security flaws. Automated assessment showed that Pepper was running outdated software and supporting SSH weak encryption and SSH weak MAC (Message Authentication Code) algorithms, but neither X-Frame-Options Header nor Web Browser XSS Protection were enabled. Then, several attacks were made possible, including spoofing login credentials, privilege escalation, stealing data stored in the robot, hacking other devices connected to it, and even physically harm people. Also, Pepper turned out to be prone to Meltdown and Spectre attacks. Larsson Forsberg and Olsson (2019) examined the security of a robot vacuum cleaner. The tests are performed on a device designed and produced by the Chinese company Shenzhen Jisiwei Intelligent Technology Co., Ltd, revealing that the communication between the mobile application and the server takes place over insecure HTTP, allowing an attacker to steal sensitive information such as username and password. Also, the authors discovered that the attacker can easily guess the device QR-code needed to bind the targeted robot vacuum cleaner to his own account. Hollerer et al. (2021) tested Panda robot by Franka Emika, revealing serious vulnerabilities on the web application such as broken authentication and exposure to attacks such as DoS, valid credentials theft, and XSS.
Signal fingerprint feature extraction and recognition method for communication satellite
Published in Connection Science, 2022
Maritime communication has become an essential part of the communication service industry. With the rapid development of marine communication informatisation, various challenges have emerged. Poor data availability, insufficient data authenticity assurance, available channels, and weak encryption are tough nuts to crack under the open ocean network communication environment. Marine communication networks are used primarily on mobile platforms (aircraft, mobile buoys, ships), offshore and shore-based platforms, and offshore fixed platforms. In these application scenarios, the communication distance is relatively long, and only satellite and wireless communication can be used to achieve a communication guarantee. Therefore, it is necessary to explore a method of fingerprint feature extraction and identification of communication satellite signals based on the marine environment.
An efficient color image encryption scheme based on a matrix scrambling method and a new hybrid chaotic map
Published in Cogent Engineering, 2021
Many chaos-based image cryptosystems are proposed in this field recently and most of them contain confusion and diffusion structures. However, some of them are successfully broken (Fan & Li, 2017; Mastan & Pandian, 2020) due to their small key spaces, limited key parameters and weak encryption algorithms (Alhadawi et al., 2019). Among these weaknesses, the most serious one is that system parameters that are used to generate secret key are limited due to the chaotic system used in the cipher does not have sufficient complexity. In this study, two different chaotic systems, Sine map and Cubic map are combined under a single model thus the total number of parameter belonging the system is increased and the result is a better, more complex and larger key space of the system. In the designed model, the existence of the chaos dynamics will ensure that the whole system will be sensitive to key parameters. A new hybrid chaotic model containing Sine map and Cubic map, called SINCU map is used as a key generator for the proposed image encryption structure in this paper. Chaos-based discrete time systems, shortly chaotic maps have high efficiency comparing with the continuous time chaotic systems because of their implementations in both software and hardware are easy to apply. However, these systems have disadvantages of limited or discontinuous range of chaotic behaviors and generally show non-uniform data distribution of output sequences. This situation may create serious drawbacks in a cryptosystem such as small key space, weak security and poor efficiency which threat the security of the whole cryptosystem (Alawida et al., 2019). As a result, there are many studies that use different approaches to develop weaker chaotic maps to achieve better chaotic features such as in Gong et al. (2020). In this field, these new chaotic maps have been used in real-time applications especially in secure multimedia data communication. For instance, in Al-Saidi et al. (2020), a new hyperchaotic map is designed for a secure data communication and successfully implemented on a digital hardware for real-time message data transmission. In another study presented by Ogras and Türk in 2017, the hardware simulation of the chaotic Cubic map was successfully applied in the FPGA environment. In short, these studies show that existing and improved chaotic maps can be successfully implemented in a real-time hardware environment.