The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Often considered as the brain of an industrial process, Industrial control systems are presented as the vital part of today's critical infrastructure due to their crucial role in process control and monitoring. Any failure or error in the system will have a considerable damage. Their openness to the internet world raises the risk related to cyber-attacks. Therefore, it's necessary to consider cyber...
With the rise of smart cities, Cooperative intelligent Transportation Systems (C-ITS) became one of the main use case scenarios. Within these environments, Public Key Infrastructures (PKI) represent the major solution to ensure the needed security requirements. Knowing that communications between the PKI and the vehicle stations or the Road Side Unit stations must be secure, the traditional way to...
The blockchain technology is gaining momentum because of its possible application to other systems than the cryptocurrency one. Indeed, blockchain, as a de-centralized system based on a distributed digital ledger, can be utilized to securely manage any kind of assets, constructing a system that is independent of any authorization entity. In this paper, we briefly present blockchain and our work in...
The IoT is a technology that enables the inter-connection of smart physical and virtual objects and provides advanced services. Objects or things are generally constrained devices which are limited by their energy, computing and storage capacity. A Wireless Sensor Networks (WSN) is a network composed of devices managed by a CPAN (Personal Area Network Coordinator). The network is used in order to...
In the era of Internet and electronic devices bullying shifted its place from schools and backyards into the cyberspace; it is now known as Cyberbullying. Children of the Arab countries are suffering from cyberbullying same as children worldwide. Thus concerns from cyberbullying are elevating. A lot of research is done for the purpose of handling this situation. The current research is focusing on...
Internet of Things (IoT) is slowly but steadily becoming part of different aspects of our lives, with its applications ranging from smart homes, to wearable devices, to healthcare, etc. This wide spectrum of applications results in shared data containing large amount of users' private information. The security of such information becomes a paramount concern. The IoT security requirements include data...
Homomorphic Encryption (HE) is a new cryptographic topic that allows untrusted parties to compute over encrypted data. This new encryption scheme is very famous in a cloud scenario, because it leverages cryptographic techniques in the cloud by allowing it to store encrypted data, and to process encrypted query over it. In this paper, we consider two important HE schemes: Dijk-Gentry-Halevi-Vaikutanathan...
Nowadays, coins and banknotes are familiar to us and, on a daily basis, we make cash payments of small amounts of less than 10 Euros. However, concerning high amounts, we cannot pay for everything in cash: firstly because the conservation of cash is risky and, secondly, in the case of loss or fraud, there is no recourse. Therefore, according to several recent studies, the most preferred and used method...
In this paper, we discuss the singular characteristics of the Internet of Things (IoT) in regard to security issues and present a security architecture with special focus on Edge networks and Smart Things. The architecture is based on the assumption that data integrity, authentication, and service/device access control are the most important aspects that have to be guaranteed for safe operation of...
Interconnected embedded machines in the Internet of Things (IoT) play a key role for collecting and managing data from the real environment. These machines adopt Machine-to-Machine (M2M) networks in order to exchange information. Securing this information is therefore essential. However, these machines have reduced capabilities giving the opportunity to be easily compromised. IoT trust agents in embedded...
Cyber-attacks have become more threatening as Internet evolves, particularly for Internet Service Providers (ISPs) that play a rule of carrying them to their subscribers. In order to protect themselves and their subscribers, ISPs invest in typical protection systems like IDS, IPS, or Firewalls, that are designed for perimeter-based operation. Even though these expensive systems are efficient to protect...
This study presents BotHook, a cyber pedophile trend characterization platform and a hook for computer criminals on the Internet. This work in progress represents a proposal of a distributed platform (chatbot) that includes a module of attraction of pedophile interest, an intelligent engine of a question-answer analysis, and an automatic characterization of pedophile trends. In order to perform this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.