Security

Session Chair/ Co-Chairs

Yoshiaki Kasahara (Chair)

kasahara@nc.kyushu-u.ac.jp

Rakesh Jha (Co-Chair)

jharakesh.45@gmail.com

Jamie Gillespie (Co-Chair)

jamie@apnic.net

Topic of Presentation/WorkshopSecurity WG Session

Wednesday 5th August

 10am-11am

== IoT and Network Monitoring ==

(1) Directory Service System for Enabling New IoT Applications Requiring Realtime Secured Communications

* Ved Kafle, NICT, Japan

* kafle@nict.go.jp

Abstract:

Internet of Things (IoT) has the great potential to create new ICT services for addressing challenged faced by society and providing more comfort. IoT requires connecting a huge number of devices, not only computers and smartphones, but also various types of sensors and machines. In order to enable these devices to be managed remotely as well as enable them to communicate to one another instantly and securely, their control information (e.g. name, ID, address, location, purpose, security keys, certificates, etc.) has to be stored as records in a secured and performance guaranteed directory service system. In this paper, we present the architecture and operation of an IoT directory service system that can store a huge volume of IoT device records in distributed cache servers. The directory system has the features of providing instant access to the IoT device records (latency as low as a few milliseconds), updating the records dynamically, and protecting the privacy of records. The system also includes the network and computational resource usage monitoring and control mechanism so that the instance access to the IoT records in guaranteed despite fluctuation in workloads. We present some examples of IoT directory service system use cases in automated driving and smart transport management.

(2) Security Attack In NB-IoT Using Game theory and Hardware Analysis

* Abhimanyu Pandey, ICT4D Nepal

* Rakesh Kumar Jha, Shri Mata Vaishno Devivi University,  India

* jharakesh.45@gmail.com

Abstract:

In recent years, Internet of Things (IoT) plays a vital role in our daily life. IoT is dominating in many areas like industries, healthcare, smart home, social network, defense sector, and the education sector. In the last couple of years, users are facing different challenges like security issues related to social network and defense sector. In this paper, our prime focus is to secure the social and defense network associated with Narrowband-Internet of Things (NB-IoT). This paper proposes the Artificial Intelligence (AI) based defense security attacks using Unmanned Aerial Vehicle (UAV). In the first part of the paper, we have proposed attack modeling on smart home scenario and finalize the critical parameter for performance analysis. In the next section, the performance analysis based on Game Theory (GT) (AI based) approach is attained, using different techniques like Nash Equilibrium (NE), Prisoner’s Dilemma (PD). In the last section, detailed hardware analysis has been carried out for analyzing attack in real time scenario and is illustrated with the help of step by step process. Our proposed model proves that UAV based Router (UAVR) can spoof by the intruder with the probability of 0.4 using GT and hardware analysis.

(3) LAN-Security Monitoring Project: Preliminary Analysis on Suspicious Behaviors

* Hideya Ochiai, University of Tokyo, Japan

* jo2lxq@hongo.wide.ad.jp

Abstract:

LAN-security monitoring project works together with ASEAN universities and has been deploying LAN-monitoring devices into campus networks for capturing suspicious behaviors caused by malware.  This presentation reports the preliminary analysis on the suspicious behaviors observed in such local area networks.

Wednesday 5th August

 11am-12pm

== COVID-19 ==

(4) On-line Cybersecurity education in Kyushu University

* Koji Okamura, Kyushu University, Japan

* oka@ec.kyushu-u.ac.jp

Abstract:

Due to COVID19, every classes in Kyushu University has been changed to on-line style. The speaker has several kind of classes related to Cybersecurity and all of them have been done by on-line style. The class are primary education of Cybersecurity for freshman and advanced education of Cybersecurity. The number of students was about 200 on primary class and 1,000 on advanced one. Also the speaker had an experience of on-line Cybersecurity drill for more than 100 students. In this talk, those experience of on-line Cybersecurity education is introduced.

(5) A Novel proposal to detect viral infections (COVID-19) at first stage in Humans

* Haneet Kour, Shri Mata Vaishno Devi University, India

Abstract:

The outbreak of COVID-19 (Corona Virus Disease 2019) has currently become a subject of global concern due to the rising count in the number of cases confirmed and deaths worldwide. Originated in Wuhan, China the virus spreads with human-to-human- interaction with the infected person or touching any object infected by the virus. As the pandemic has resulted in everyone going in self-quarantine and isolation, the damage could have been limited to where it originated if proper ways and means were followed in it’s initial stage. In this article, we present a novel proposal for detecting infected people travelling to and from a country. This proposal can be incorporated at International airports to begin with and then can be extended wherever it finds utility. With the help of an intelligent system, we can detect and isolate infected people at airports travelling to and from a country, by the use of thermography. The proposal helps detect, segregate and track the location of an infected person with the aid of a system that performs thermal imaging based on body temperature to detect a contagious ailment. This method can be of use in the event of any such outbreaks arising in the future due to any contagious virus carried by human beings.

Leave a Reply

Your email address will not be published. Required fields are marked *

Scroll to top