scispace - formally typeset
Search or ask a question

Showing papers by "Robin Doss published in 2020"


Journal ArticleDOI
TL;DR: An RFID-based anti-counterfeiting and anti-theft scheme that can be used to detect counterfeit items at the point of purchase by a consumer is proposed and satisfies the formal requirements of security correctness and is resistant to compromise through security attacks.
Abstract: Product counterfeiting and theft are on-going problems in supply chains and retail environments, but not a lot of work has been done to address these problems through the cost-effective use of auto-identification technologies such as bar-codes, near-field communication (NFC), or radio-frequency identification (RFID). In this paper, we propose an RFID-based anti-counterfeiting and anti-theft scheme that can be used to detect counterfeit items at the point of purchase by a consumer. The proposed system is lightweight and suited for deployment in large-scale retail environments using low-cost passive tags. We also undertake an analysis of a recent scheme proposed by Tran and Hong to highlight some of the weaknesses of their scheme. A detailed security analysis of the proposed scheme shows that it satisfies the formal requirements of security correctness and is resistant to compromise through security attacks.

21 citations


Journal ArticleDOI
01 May 2020
TL;DR: This protocol can be used to simultaneously identify groups of items that share a set of attribute values and is designed to be lightweight, suited for resource-constrained basic passive tags, and compliant with the EPC standards.
Abstract: We develop a secure attribute-based search protocol for Radio Frequency Identification (RFID) systems. This protocol can be used to simultaneously identify groups of items that share a set of attribute values. To the best of our knowledge, this is the first such work with the potential to significantly enhance the security and intelligence of RFID-enabled applications in inventory control and supply chain management. The protocol is designed to be lightweight, suited for resource-constrained basic passive tags, and compliant with the Electronic Product Code (EPC) standards. This is achieved by exploiting the zero knowledge properties of quadratic residues. The security and privacy properties offered by the protocol are rigorously proven through formal verification.

18 citations


Book ChapterDOI
25 Nov 2020
TL;DR: In this paper, the authors conducted an exploratory study on 86 distinct bytecode versions of Ethereum smart contract wallets and analyzed them using four popular security scanning tools and found that 10.2% of them are vulnerable to different problems.
Abstract: Ethereum is a leading blockchain platform that supports decentralised applications (Dapps) using smart contract programs. It executes cryptocurrency transactions between user accounts or smart contract accounts. Wallets are utilised to integrate with Dapps to manage and hold users’ transactions and private keys securely and effectively. Ethereum wallets are available in different forms, and we especially examine on-chain smart contract wallets to measure their safeness property. We have conducted an exploratory study on 86 distinct bytecode versions of Ethereum smart contract wallets and analysed them using four popular security scanning tools. We have identified that, on average, 10.2% of on-chain wallets on the Ethereum platform are vulnerable to different problems. We propose a novel analysis framework to classify the security problems in smart contract wallets using the experimental data. Most of the vulnerabilities detected from smart contract wallets are related to security issues in programming code and interaction with external sources. Our experimental results and analysis data are available at https://github.com/ppraithe/on-chain-wallet-contracts.

16 citations


Journal ArticleDOI
TL;DR: A distributed security architecture scheme based on blockchain technology for the existing intelligent traffic light system, where the smart contract is improved to achieve redundant cutting of ledger data in the process of block consensus, which greatly reduces the pressure of blockchain ledger data transmission.
Abstract: In recent years, under the background that the rapid development of traffic volume makes the current traffic lights far from meeting the urban traffic demand, intelligent traffic lights based on the centralized architecture began to appear. However, in the traffic network with complex structure and private data flow, there are many malicious attacks against the centralized architecture, such as Sybil and ghost car attacks, which undoubtedly brings great security risks to the traditional intelligent traffic lights. Blockchain technology is a popular security framework nowadays. Based on its outstanding characteristics in the distributed architecture and the development of Edge Intelligence (EI) technology, this paper proposes a distributed security architecture scheme based on blockchain technology for the existing intelligent traffic light system. At the same time, based on the model cutting technology proposed by EI, the smart contract is improved to achieve redundant cutting of ledger data in the process of block consensus, which greatly reduces the pressure of blockchain ledger data transmission. In the end of this paper, the superiority of this scheme compared with the traditional intelligent traffic light scheme in communication cost and time cost is demonstrated by simulation experiment.

12 citations


Proceedings ArticleDOI
01 Jan 2020
TL;DR: This work intends to review the tools plus models needed for the VANETs experimental work and provides a detailed overview of the innovative work carried along with mobility models as well as tools of VANets.
Abstract: Vehicular Ad-hoc Networks (VANETs), has appeared to be the leading research area across the years due to its scope to increase road safety. This paper provides a detailed overview of the innovative work carried along with mobility models as well as tools of VANETs. Beginning with the manual creation of a network through the node, edge, as well as route till the allocation of a casual tour to the map that is being converted into a SUMO network. This work intends to review the tools plus models needed for the VANETs experimental work. As per the earlier researchers, VANET permits the vehicles to develop a wireless connection but forming the wireless connections and interacting with nodes in real-time situations is a challenging job. Therefore various simulation platforms are given for carrying out the communication part in VANETs, for instance, NS-2, NS-3, OMNET++, GloMoSiM, SNS, JiST/SWANS, and many more.

10 citations


Proceedings ArticleDOI
01 Jan 2020
TL;DR: Comprehensive research in this field of vehicle ad hoc networking including the research trends of this field is presented to benefit researchers to recognize and identify the main characteristics encircling VANET in one solid report.
Abstract: From the last several years, there has been a striking concern as well as development in the domain of vehicular ad-hoc networks. It involves many communications such as V2V, V2I based on broadcast local area network technologies. This area is being categorized as an appeal of the mobile ad-hoc network (MANET) that has the capability in increasing the security of road as well as in contributing traveler's convenience. Lately, the VANETs domain has developed to shift the awareness of researchers in the domain of broadcast including mobile communications, they vary from MANETs through their design, difficulties, as well as features. In this paper, we display features associated with this field to benefit researchers to recognize and identify the main characteristics encircling VANET in one solid report. This article presents comprehensive research in this field beginning with detailed information about the physical components and protocol stack for VANETs. Then we outline the challenges, applications as well as the routing protocols of VANETs. Through this article, scholars can have an extra precise perception of vehicle ad hoc networking including the research trends of this field.

8 citations


Proceedings ArticleDOI
01 Jan 2020
TL;DR: A blended use of the mobile application, computer vision and IoT technologies to counter the problems faced by the parking lots in large cities and if it is implemented, it will surely save some valuable time.
Abstract: Some elemental problems faced by the parking lots in large cities include the difficulty in locating a free parking spot, security of the parked vehicle as well as people parking in a reserved parking spot. In this paper we propose a blended use of the mobile application, computer vision and IoT technologies to counter these problems and if it is implemented, it will surely save some valuable time. We will also be able to guarantee the security of the parked vehicle using automatic security bollards. We will be using Node MCU as a microcontroller and ultrasonic sensors as proximity sensors. We will also be using CCTV camera live footage for verifying readings from the IoT devices to eliminate all the false positives. At all times the system will display the live status of the parking spaces in the parking lots to all the users of the mobile application.

7 citations


Journal ArticleDOI
TL;DR: A decentralized revocation approach based on Shamir’s secret sharing to revoke misbehaving vehicles with very low delays is presented and is experimentally evaluated to demonstrate that it provides a reliable solution to the scalability, efficiency and security of VANETs.

6 citations


Journal ArticleDOI
TL;DR: This research paper addresses the issue of counterfeiting while using radio frequency identification RFID technology in retail systems or other industries by presenting a new anti-counterfeiting and anti-theft system for the retail market.
Abstract: Counterfeiting and theft have always been problems that incur high costs and result in considerable losses for international markets. In this research paper, we address the issue of counterfeiting while using radio frequency identification RFID technology in retail systems or other industries by presenting a new anti-counterfeiting and anti-theft system for the retail market. This system addresses the two abovementioned issues and provides a solution that can save retail systems millions of dollars yearly. The proposed system achieves the objective of preventing or minimising the counterfeiting and theft of tagged products. At the same time, it provides a strong indication of suspiciously sold or obtained items. Furthermore, we conducted a security analysis to prove the correctness of our protocol on the basis of the strand spaces.

6 citations


Proceedings ArticleDOI
24 Nov 2020
TL;DR: CrowdPatching protocol is proposed, a blockchain-based decentralized protocol allowing manufacturers to delegate the delivery of software updates to self-interested distributors in exchange for cryptocurrency, and the trustworthiness of distributors is considered in the protocol, rewarding the honest distributors' engagements.
Abstract: Internet of Things (IoT) devices are being deployed in huge numbers around the world, and often present serious vulnerabilities. Accordingly, delivering regular software updates is critical to secure IoT devices. Manufactures face two predominant challenges in providing software updates to IoT devices: 1) scalability of the current client-server model and 2) integrity of the distributed updates - exacerbated due to the devices' computing power and lightweight cryptographic primitives. Motivated by these limitations, we propose CrowdPatching, a blockchain-based decentralized protocol, allowing manufacturers to delegate the delivery of software updates to self-interested distributors in exchange for cryptocurrency. Manufacturers announce updates by deploying a smart contract (SC), which in turn will issue cryptocurrency payments to any distributor who provides an unforgeable proof-of-delivery. The latter is provided by IoT devices authorizing the SC to issue payment to a distributor when the required conditions are met. These conditions include the requirement for a distributor to generate a zero-knowledge proof, generated with a novel proving system called zk-SNARKs. Compared with related work, CrowdPatching protocol offers three main advantages. First, the number of distributors can scale indefinitely by enabling the addition of new distributors at any time after the initial distribution by manufacturers (i.e., redistribution among the distributor network). The latter is not possible in existing protocols and is not account for. Secondly, we leverage the recent common integration of gateway or Hub in IoT deployments in our protocol to make CrowdPatching feasible even for the more constraint IoT devices. Thirdly, the trustworthiness of distributors is considered in our protocol, rewarding the honest distributors' engagements. We provide both informal and formal security analysis of CrowdPatching using Tamarin Prover.

5 citations


Posted Content
TL;DR: This paper explores and analyses the frameworks proposed by previous studies in the context of inter-enterprise SOA for SMEs, and offers solutions, including the system architecture, technology adoption, specific elements, and collaboration model.
Abstract: Lack of resources is a challenge for small and medium enterprises (SMEs) in implementing an IT-based system to facilitate more efficient business decisions and expanding the market. A community system based on service-oriented architecture (SOA) can help SMEs alleviate this problem. This paper explores and analyses the frameworks proposed by previous studies in the context of inter-enterprise SOA for SMEs. Several problems being the background of the system implementation are identified. Afterward, the offered solutions are presented, including the system architecture, technology adoption, specific elements, and collaboration model. The study also discusses the system architecture patterns of the reviewed studies as well as the collaboration organizational structures.

Proceedings ArticleDOI
01 Jan 2020
TL;DR: This article offers a complete review of strategies used for controlling the congestion in the domain of VANETs and offers amazing supplementary ideas for creating a vehicle to vehicle communication protocols as well as exciting and accessible research difficulties to be handled in the future.
Abstract: The evolution of VANETs (Vehicular Ad-Hoc Networks) is assumed to be an essential move for obtaining security as well as productivity in ITS (Intelligent Transportation Systems). One most significant provision of security applications is that vehicles can interact with adjacent vehicles, through extremely low latency as well as packet loss. The great movement, unstable quality of channel as well as high information rates make all this as a challenging query in the field of VANETs. There occurred an important investigation exercise in recent times for the evolution of congestion control algorithms that guarantees safe and secure transmission of security data in vehicle-to-vehicle communication. In this article, we offer a complete review of strategies used for controlling the congestion in the domain of VANETs. We recognize the important metrics as well as special parameters which is used to estimate these strategies moreover examine every method based on various factors for example metrics applied, type of messages, rate/power control and simulators used. We end this article with amazing supplementary ideas for creating a vehicle to vehicle communication protocols as well as exciting and accessible research difficulties to be handled in the future.

Journal ArticleDOI
TL;DR: E-ID proposes an all-inclusive pipeline that generates and transmits appropriate sound signals, and extracts a user-specific imprint from the recorded signals (E-Sign) and makes use of deep-learning and SVM classifier for accurate identification of the corresponding user given an E-Sign sample.
Abstract: In this article, we present a novel user identification mechanism for smart spaces called Echo-ID (referred to as E-ID). Our solution relies on inaudible sound signals for capturing the user’s behavioral tapping/typing characteristics while s/he types the PIN on a PIN-PAD, and uses them to identify the corresponding user from a set of ${N}$ enrolled inhabitants. E-ID proposes an all-inclusive pipeline that generates and transmits appropriate sound signals, and extracts a user-specific imprint from the recorded signals (E-Sign). For accurate identification of the corresponding user given an E-Sign sample, E-ID makes use of deep-learning (i.e., CNN for feature extraction) and SVM classifier (for making the identification decision). We implemented a proof of the concept of E-ID by leveraging the commodity speaker and microphone. Our evaluations revealed that E-ID can identify the users with an average accuracy of 93% to 78% from an enrolled group of 2-5 subjects, respectively.

Proceedings ArticleDOI
01 Dec 2020
TL;DR: In this paper, the authors proposed a lightweight and secure continuous authentication protocol that leverages communication channel properties and a tunable mathematical function to generate dynamically changing session keys for device-to-device (d2d) communication.
Abstract: Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity attacks that exploit conventional static authentication mechanisms that authenticate users only at an ingress point. However, widely researched human user characteristics-based CA mechanisms cannot be extended to continuously authenticate Internet of Things (IoT) devices. The challenges are exacerbated with the increased adoption of device-to-device (d2d) communication in critical infrastructures. Existing d2d authentication protocols proposed in the literature are either prone to subversion or are computationally infeasible to be deployed on constrained IoT devices. In view of these challenges, we propose a novel, lightweight and secure CA protocol that leverages communication channel properties and a tunable mathematical function to generate dynamically changing session keys. Our preliminary informal protocol analysis suggests that the proposed protocol is resistant to known attack vectors and thus has strong potential for deployment in securing critical and resource-constrained d2d communication.

Proceedings ArticleDOI
01 Dec 2020
TL;DR: In this article, the authors combine opportunistic network technology with cyber-physical systems and propose a reliable routing algorithm for nodes tracking in opportunistic networks, where nodes are usually mobile, forwarding messages from one device to another, not relying on external infrastructure like WiFi.
Abstract: Cyber-Physical Systems raise a new dimension of security concerns as they open up the opportunity for attackers to affect a real-world environment. These systems are often applied in specific environments with special requirements and a common issue is to keep track of movements in a mobile system, e.g., involving autonomous robots, drones or sensory I/O devices. In Opportunistic Networks, nodes are usually mobile, forwarding messages from one device to another, not relying on external infrastructure like WiFi. Due to compact and convenient wearability, the nodes of an OppNet might be used to detect the absence and presence of devices or even people in an area where classical networks may not be reliable enough. In this paper, we combine opportunistic network technology with cyber-physical systems and propose a reliable routing algorithm for nodes tracking. Our real-world setup implements hardware sensor tags to evaluate the algorithm in a state-of-the-art environment. Efficiency and performance are compared with established algorithms i. e., Epidemic and Prophet, in terms of latency, network overhead, as well as message delivery probability, and to evaluate the algorithm's scalability, we simulate the tracking in a huge environment.

Posted Content
TL;DR: This work proposes a novel, lightweight and secure CA protocol that leverages communication channel properties and a tunable mathematical function to generate dynamically changing session keys that has strong potential for deployment in securing critical and resource-constrained d2d communication.
Abstract: Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity attacks that exploit conventional static authentication mechanisms that authenticate users only at an ingress point. However, widely researched human user characteristics-based CA mechanisms cannot be extended to continuously authenticate Internet of Things (IoT) devices. The challenges are exacerbated with increased adoption of device-to-device (d2d) communication in critical infrastructures. Existing d2d authentication protocols proposed in the literature are either prone to subversion or are computationally infeasible to be deployed on constrained IoT devices. In view of these challenges, we propose a novel, lightweight, and secure CA protocol that leverages communication channel properties and a tunable mathematical function to generate dynamically changing session keys. Our preliminary informal protocol analysis suggests that the proposed protocol is resistant to known attack vectors and thus has strong potential for deployment in securing critical and resource-constrained d2d communication.

Proceedings ArticleDOI
27 Sep 2020
TL;DR: In this paper, the authors simulate a network map of a gas leakage warning system so as to showcase its implementation in an apartment-based setup based on their proof-of-concept.
Abstract: Liquefied Petroleum Gas (LPG) gas is the most commonly used gas for cooking in India and it is considered highly flammable since it is a combination of hydrocarbon gases such as Propane (C3H8), N-butane and Isobutane (C4H10). These elements contribute to its high density and long-distance travelling capabilities. This results in an extensive gas outspread during leakage with multiple avenues for ignition, primarily due to the electric circuitry at home. The primary focus of our project is to simulate a network map of a gas leakage warning system so as to showcase its implementation in an apartment-based setup. The network map can be scaled up for implementation in residential sectors, petroleum and oil fields, sewage lines, etc. based on our proof of concept. In our use case, we would implement LPG Gas Sensors to Microcontroller for providing a logical binary output of fire warning indication.

Proceedings ArticleDOI
01 Jan 2020
TL;DR: This article concludes with wondrous additional opinions for choosing of new parameters for the detection of congestion as well as new methods or approaches that can be proposed to handle and control the data congestion in the future.
Abstract: The term VANETs (Vehicular AdHoc Networks) has gained so much attention from a decade. It is considered to be a crucial move for achieving safety in the field of ITS (Intelligent Transportation Systems). There are many challenges faced in this field of VANETs and data congestion is one of the foremost challenges among all. In this article, initially, detection of the data congestion is done and later few methods have been proposed to control as well as manage this detected data congestion. This paper is divided into two main units named as Congestion Detection Unit, in which two main parameters are elaborated that are being utilized for the detection of data congestion as well as Congestion Control Unit, in which three methods have been proposed to control as well as manage the data congestion. We conclude this article with wondrous additional opinions for choosing of new parameters for the detection of congestion as well as new methods or approaches that can be proposed to handle and control the data congestion in the future.

Proceedings ArticleDOI
19 Oct 2020
TL;DR: The proposed reference model consists of three layers: technology and engineering layer, management layer, and legal layer, which aims to guide organizations, companies, and governments in developing a secure digital system with a comprehensive perspective.
Abstract: This paper presents a survey and proposal of a digital security reference model. The proposed reference model consists of three layers: technology and engineering layer, management layer, and legal layer. The first layer focuses on technologies and engineering processes to build a secure digital system. Then, the second layer is all about management or organizational procedures. Finally, the last layer consists of compliance with existing laws and regulations. The correlation between each layer is, first, focusing on the technology and engineering layer to get anything to build an organization’s secure digital system. Then, create policies for all parties of the organizations. Last, make sure all of the technology used and procedures applied complied with the existing law. The last layer also has a role as if security breach success penetrates the two previous layers. The next is digital forensics to reveal the cyber incident and punish the criminals by the existing law. In general, this proposed reference model aims to guide organizations, companies, and governments in developing a secure digital system with a comprehensive perspective. In particular, the reference model has two use case actors, engineers, and researchers. For the engineer, this reference model guides to starting and developing a digital security system. There are five steps to creating a secure digital system using this reference model: preparation, specifications, system design, implementation, and evaluation. For the researcher, this reference model gives a comprehensive understanding. So the researcher gets a big picture of the secure digital system’s research field before starting the research. After it, the researcher determines which topic they want.

Posted Content
TL;DR: CrowdPatching as discussed by the authors is a blockchain-based decentralized protocol, allowing IoT manufacturers to delegate the delivery of software updates to self-interested distributors in exchange for cryptocurrency, which can scale indefinitely by enabling the addition of new distributors at any time after the initial distribution by manufacturers.
Abstract: We propose CrowdPatching, a blockchain-based decentralized protocol, allowing Internet of Things (IoT) manufacturers to delegate the delivery of software updates to self-interested distributors in exchange for cryptocurrency. Manufacturers announce updates by deploying a smart contract (SC), which in turn will issue cryptocurrency payments to any distributor who provides an unforgeable proof-of-delivery. The latter is provided by IoT devices authorizing the SC to issue payment to a distributor when the required conditions are met. These conditions include the requirement for a distributor to generate a zero-knowledge proof, generated with a novel proving system called zk-SNARKs. Compared with related work, CrowdPatching protocol offers three main advantages. First, the number of distributors can scale indefinitely by enabling the addition of new distributors at any time after the initial distribution by manufacturers (i.e., redistribution among the distributor network). The latter is not possible in existing protocols and is not account for. Secondly, we leverage the recent common integration of gateway or Hub in IoT deployments in our protocol to make CrowdPatching feasible even for the more constraint IoT devices. Thirdly, the trustworthiness of distributors is considered in our protocol, rewarding the honest distributors' engagements. We provide both informal and formal security analysis of CrowdPatching using Tamarin Prover.

Proceedings ArticleDOI
01 Dec 2020
TL;DR: In this article, the authors proposed a reputation system for the Internet of Vehicles (IoV), which uses the results of any false message detection method to generate and share feedback in the network, this feedback is then collected and filtered to remove potentially malicious feedback in order to produce a dynamic reputation score for each node.
Abstract: Most applications of Internet of Vehicles (IoVs) rely on collaboration between nodes. Therefore, false information flow in-between these nodes poses the challenging trust issue in rapidly moving IoV nodes. To resolve this issue, a number of mechanisms have been proposed in the literature for the detection of false information and establishment of trust in IoVs, most of which employ reputation scores as one of the important factors. However, it is critical to have a robust and consistent scheme that is suitable to aggregate a reputation score for each node based on the accuracy of the shared information. Such a mechanism has therefore been proposed in this paper. The proposed system utilises the results of any false message detection method to generate and share feedback in the network, this feedback is then collected and filtered to remove potentially malicious feedback in order to produce a dynamic reputation score for each node. The reputation system has been experimentally validated and proved to have high accuracy in the detection of malicious nodes sending false information and is robust or negligibly affected in the presence of spurious feedback.