Dastres, Roza Soori, Mohsen
Networks are vulnerable devices due to their basic feature of facilitating remote access and data communication. The information in the networks needs to be kept secured and safe in order to provide an effective communication and sharing device in the web of data. Due to challenges and threats of the data in networks, the network security is one of...
Kim, Pyung Lee, Younho Hong, Youn-Sik Kwon, Taekyoung
Published in
Sensors (Basel, Switzerland)
To meet password selection criteria of a server, a user occasionally needs to provide multiple choices of password candidates to an on-line password meter, but such user-chosen candidates tend to be derived from the user’s previous passwords—the meter may have a high chance to acquire information about a user’s passwords employed for various purpos...
Dahlmanns, Markus Lohmöller, Johannes Pennekamp, Jan Bodenhausen, Jörn Wehrle, Klaus Henze, Martin
The ongoing trend to move industrial appliances from previously isolated networks to the Internet requires fundamental changes in security to uphold secure and safe operation. Consequently, to ensure end-to-end secure communication and authentication, (i) traditional industrial protocols, e.g., Modbus, are retrofitted with TLS support, and (ii) mod...
You, Xiaohu Wang, Cheng-Xiang Huang, Jie Gao, Xiqi Zhang, Zaichen Wang, Mao Huang, Yongming Zhang, Chuan Jiang, Yanxiang Wang, Jiaheng
...
Published in
Science China Information Sciences
The fifth generation (5G) wireless communication networks are being deployed worldwide from 2020 and more capabilities are in the process of being standardized, such as mass connectivity, ultra-reliability, and guaranteed low latency. However, 5G will not meet all requirements of the future in 2030 and beyond, and sixth generation (6G) wireless com...
Klasson, Sebastian Lindström, Nina
The internet is one of the most widely used mediums for communication in modern society and it has become an everyday necessity for many. It is therefore of utmost importance that it remains as secure as possible. SSL and TLS are the backbones of internet security and an integral part of these technologies are the certificates used. Certificate aut...
Kohnhäuser, Florian Meier, David Patzer, Florian Finster, Sören
A key technology for the communication in the Industrial Internet of Things (IIoT) is the Open Platform Communications Unified Architecture (OPC UA). OPC UA is a standard that enables interoperable, secure, and reliable communication between industrial devices. To defend against cyber attacks, OPC UA has built-in security mechanisms that protect th...
Öknegård Enavall, Isabell Mineur, Julia
Online behavioural targeted advertising has become a leading method to increase theeffectiveness of advertisement online. The advertisement is based on information aboutusers’ internet activities collected by third party tracking services. However, there is a fineline between whether this should be considered a privacy leakage or an unharmful way t...
Weber, Lara
As internet use is ever-growing, the cyber threats and exploitation of vulnerabilities increase as well. Nonexperts are particularly vulnerable to cybersecurity threats, as they lack the resources to take proper precautions. In this thesis, we redesign a serious game on cybersecurity, NetVisGame, to address the lack of motivation, awareness, and kn...
Kim, J Sim, A Kim, J Wu, K
Botnet detection is an active research topic as botnets are a source of many malicious activities, including distributed denial-of-service (DDoS), click-fraud, spamming, and crypto-mining attacks. However, it is getting more complicated to identify botnets due to the continuous evolution of botnet software and families that harness new types of dev...
Shen, Shuaiqi Zhang, Kuan Zhou, Yi Ci, Song
Published in
Science China Information Sciences
The flourish of 5th generation wireless systems (5G) network has brought numerous benefits to the Internet of Things (IoT) with universal connectivity, improved data rate, and decreased latency. The development of IoT extends the computation-intensive applications from centralized servers to the edge of the network, promoting the paradigm of edge c...