Catálogo de publicaciones - libros

Compartir en
redes sociales


Título de Acceso Abierto

Security in Computer and Information Sciences

Erol Gelenbe ; Paolo Campegiani ; Tadeusz Czachórski ; Sokratis K. Katsikas ; Ioannis Komnios ; Luigi Romano ; Dimitrios Tzovaras (eds.)

En conferencia: 1º International ISCIS Security Workshop (Euro-CYBERSEC) . London, United Kingdom . February 26, 2018 - February 27, 2018

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Security; Information Systems Applications (incl. Internet); Data Encryption; Special Purpose and Application-Based Systems; Computer Communication Networks

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere 2018 SpringerLink acceso abierto

Información

Tipo de recurso:

libros

ISBN impreso

978-3-319-95188-1

ISBN electrónico

978-3-319-95189-8

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© The Editor(s) (if applicable) and The Author(s) 2018

Tabla de contenidos

Some Current Cybersecurity Research in Europe

Mehmet Ufuk Çag̃layan

We present a brief summary of the papers that were presented at the Security Workshop 2018 of the International Symposium on Computer and Information Sciences (ISCIS) that was held on February 26, 2018 at Imperial College, London. These papers are primarily based on several research projects funded by the European Commission. The subjects that are covered include the cybersecurity of the Internet of Things (IoT), the security of networked health systems that are used to provide health services, the security of mobile telephony, and the security of software itself. The papers include overall presentations project objectives, plans and achievements, and their specific research findings.

Pp. 1-10

KONFIDO: An OpenNCP-Based Secure eHealth Data Exchange System

Mariacarla Staffa; Luigi Coppolino; Luigi Sgaglione; Erol Gelenbe; Ioannis Komnios; Evangelos Grivas; Oana Stan; Luigi Castaldo

Allowing cross-border health-care data exchange by establishing a uniform QoS level of health-care systems across European states, represents one of the current main goals of the European Commission. For this purpose epSOS project was funded with the objective to overcome interoperability issues in patients health information exchange among European healthcare systems. A main achievement of the project was the OpenNCP platform. Settled over the results of the epSOS project, KONFIDO aims at increasing trust and security of eHealth data exchange by adopting a holistic approach, as well as at increasing awareness of security issues among the healthcare community. In this light, the paper describes the KONFIDO project’s approach and discusses its design and its representation as a system of interacting agents. It finally discusses the deployment of the provided platform.

Pp. 11-27

Random Number Generation from a Secure Photonic Physical Unclonable Hardware Module

Marialena Akriotou; Charis Mesaritakis; Evaggelos Grivas; Charidimos Chaintoutis; Alexandros Fragkos; Dimitris Syvridis

In this work, a photonic physical unclonable function module, based on an optical waveguide, is demonstrated. The physical scrambling mechanism is based on the random and complex coherent interference of high order optical transverse modes. The proposed scheme allows the generation of random bit- strings, through a simple wavelength tuning of the laser source, that are suitable for a variety of cryptographic applications. The experimental data are evaluated in terms of unpredictability, employing typical information theory benchmark tests and the NIST statistical suit.

Pp. 28-37

Building an Ethical Framework for Cross-Border Applications: The KONFIDO Project

G. Faiella; I. Komnios; M. Voss-Knude; I. Cano; P. Duquenoy; M. Nalin; I. Baroni; F. Matrisciano; F. Clemente

Innovative eHealth technologies and solutions are changing the way healthcare is delivered, raising many challenges regarding the ethical concerns that need to be addressed. There is a growing demand for tools that enable the assessments of the ethical impact in order to assure compatibility or highlight areas of incompatibility. This paper aims to address the ethical challenges that will arise during KONFIDO EU-funded project. KONFIDO project aims to develop tools and procedures to create a paradigm for secure inner and cross-border exchange of healthcare data in a legal and ethical way at both national and European level. The paper proposes an ethical framework that consists of a set of ethical principles derived from recent literature and European regulation and a supporting checklist. The ethical framework represents a concrete and practical guidance for healthcare professionals and developers in order to build ethically acceptable KONFIDO solutions.

Pp. 38-45

Blockchain-Based Logging for the Cross-Border Exchange of eHealth Data in Europe

Luigi Castaldo; Vincenzo Cinque

On an EU level, the topic of electronic health data is a high priority. Many projects have been developed to realise a standard health data format to share information on a regional, national or EU level. All the projects favour and contribute to the development and improvement of the prerequisites for intra- and cross-border patient mobility. This work presents a new approach for the implementation of disruptive logging: an audit mechanism for cross-border exchange of eHealth data on OpenNCP, providing traceability and liability support within the OpenNCP infrastructure. Relevant parties could be legally obliged to keep a log of all privacy-critical operations performed by OpenNCP users.

Pp. 46-56

Problem Domain Analysis of IoT-Driven Secure Data Markets

Máté Horváth; Levente Buttyán

The Internet of Things (IoT) provides us with a vast amount of new data day by day, however, currently, most of these are only stored without utilizing their full potential. The attractive concept of data markets can change this situation in the near future and thus we initiate the study of security aspects of such systems. In this work, as a first step, we analyse the data markets based on the possible security requirements of the different participants. We identify more than 30 possible scenarios and connect these to the relevant areas of cryptography. Our analysis also highlights several open problems motivating further research on certain cryptographic primitives.

Pp. 57-67

GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control

A. Collen; N. A. Nijdam; J. Augusto-Gonzalez; S. K. Katsikas; K. M. Giannoutakis; G. Spathoulas; E. Gelenbe; K. Votis; D. Tzovaras; N. Ghavami; M. Volkamer; P. Haller; A. Sánchez; M. Dimas

We present the European research project GHOST, (Safe-guarding home IoT environments with personalised real-time risk control), which challenges the traditional cyber security solutions for the IoT by proposing a novel reference architecture that is embedded in an adequately adapted smart home network gateway, and designed to be vendor-independent. GHOST proposes to lead a paradigm shift in consumer cyber security by coupling usable security with transparency and behavioural engineering.

Pp. 68-78

Deep Learning with Dense Random Neural Networks for Detecting Attacks Against IoT-Connected Home Environments

Olivier Brun; Yonghua Yin; Erol Gelenbe; Y. Murat Kadioglu; Javier Augusto-Gonzalez; Manuel Ramos

In this paper, we analyze the network attacks that can be launched against IoT gateways, identify the relevant metrics to detect them, and explain how they can be computed from packet captures. We also present the principles and design of a deep learning-based approach using dense random neural networks (RNN) for the online detection of network attacks. Empirical validation results on packet captures in which attacks were inserted show that the Dense RNN correctly detects attacks.

Pp. 79-89

Using Blockchains to Strengthen the Security of Internet of Things

Charalampos S. Kouzinopoulos; Georgios Spathoulas; Konstantinos M. Giannoutakis; Konstantinos Votis; Pankaj Pandey; Dimitrios Tzovaras; Sokratis K. Katsikas; Anastasija Collen; Niels A. Nijdam

Blockchain is a distributed ledger technology that became popular as the foundational block of the Bitcoin cryptocurrency. Over the past few years it has seen a rapid growth, both in terms of research and commercial usage. Due to its decentralized nature and its inherent use of cryptography, Blockchain provides an elegant solution to the Byzantine Generals Problem and is thus a good candidate for use in areas that require a decentralized consensus among untrusted peers, eliminating the need for a central authority. Internet of Things is a technology paradigm where a multitude of small devices, including sensors, actuators and RFID tags, are interconnected via a common communications medium to enable a whole new range of tasks and applications. However, existing IoT installations are often vulnerable and prone to security and privacy concerns. This paper studies the use of Blockchain to strengthen the security of IoT networks through a resilient, decentralized mechanism for the connected home that enhances the network self-defense by safeguarding critical security-related data. This mechanism is developed as part of the Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control (GHOST) project.

Pp. 90-100

Research and Innovation Action for the Security of the Internet of Things: The SerIoT Project

Joanna Domanska; Erol Gelenbe; Tadek Czachorski; Anastasis Drosou; Dimitrios Tzovaras

The Internet of Things (IoT) was born in the mid 2010’s, when the threshold of connecting more objects than people to the Internet, was crossed. Thus, attacks and threats on the content and quality of service of the IoT platforms can have economic, energetic and physical security consequences that go way beyond the traditional Internet’s lack of security, and way beyond the threats posed by attacks to mobile telephony. Thus, this paper describes the H2020 project “Secure and Safe Internet of Things” (SerIoT) which will optimize the information security in IoT platforms and networks in a holistic, cross-layered manner (i.e. IoT platforms and devices, honeypots, SDN routers and operator’s controller) in order to offer a secure SerIoT platform that can be used to implement secure IoT platforms and networks anywhere and everywhere.

Pp. 101-118