Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 5 de 5
Filter
Add more filters










Database
Language
Publication year range
1.
Sensors (Basel) ; 23(23)2023 Nov 29.
Article in English | MEDLINE | ID: mdl-38067877

ABSTRACT

The advancement of cellular communication technology has profoundly transformed human life. People can now watch high-definition videos anytime, anywhere, and aim for the implementation of advanced autonomous driving capabilities. However, the sustainability of such an environment is threatened by false base stations. False base stations execute attacks in the Radio Access Network (RAN) of cellular systems, adversely affecting the network or its users. To address this challenge, we propose a behavior rule specification-based false base station detection system, SMDFbs. We derive behavior rules from the normal operations of base stations and convert these rules into a state machine. Based on this state machine, we detect network anomalies and mitigate threats. We conducted experiments detecting false base stations in a 5G RAN simulator, comparing our system with seven machine learning-based detection techniques. The experimental results showed that our proposed system achieved a detection accuracy of 98% and demonstrated lower overhead compared to other algorithms.

2.
Sensors (Basel) ; 23(12)2023 Jun 11.
Article in English | MEDLINE | ID: mdl-37420667

ABSTRACT

The Medical Internet-of-Things (MIoT) has developed revolutionary ways of delivering medical care to patients. An example system, showing increasing demand, is the artificial pancreas system that offers convenience and reliable support care to patients with Type 1 Diabetes. Despite the apparent benefits, the system cannot escape potential cyber threats that may worsen a patient's condition. The security risks need immediate attention to ensure the privacy of the patient and preserve safe functionality. Motivated by this, we proposed a security protocol for the APS environment wherein support to essential security requirements is guaranteed, the security context negotiation is resource-friendly, and the protocol is resilient to emergencies. Accordingly, the security requirements and correctness of the design protocol were formally verified using BAN logic and AVISPA, and proved its feasibility through the emulation of APS in a controlled environment using commercial off-the-shelf devices. Moreover, the results of our performance analysis indicate that the proposed protocol is more efficient than the other existing works and standards.


Subject(s)
Internet of Things , Pancreas, Artificial , Humans , Computer Security , Privacy
3.
IEEE J Biomed Health Inform ; 27(2): 710-721, 2023 02.
Article in English | MEDLINE | ID: mdl-35763469

ABSTRACT

The Internet of Medical Things (IoMT) has risen to prominence as a possible backbone in the health sector, with the ability to improve quality of life by broadening user experience while enabling crucial solutions such as near real-time remote diagnostics. However, privacy and security problems remain largely unresolved in the safety area. Various rule-based methods have been considered to recognize aberrant behaviors in IoMT and have demonstrated high accuracy of misbehavior detection appropriate for lightweight IoT devices. However, most of these solutions have privacy concerns, especially when giving context during misbehavior analysis. Moreover, falsified or modified context generates a high percentage of false positives and sometimes causes a by-pass in misbehavior detection. Relying on the recent powerful consolidation of blockchain and federated learning (FL), we propose an efficient privacy-preserving framework for secure misbehavior detection in lightweight IoMT devices, particularly in the artificial pancreas system (APS). The proposed approach employs privacy-preserving bidirectional long-short term memory (BiLSTM) and augments the security through integrating blockchain technology based on Ethereum smart contract environment. The effectiveness of the proposed model is bench-marked empirically in terms of sustainable privacy preservation, commensurate incentive scheme with an untraceability feature, exhaustiveness, and the compact results of a variant neural network approach. As a result, the proposed model has a 99.93% recall rate, showing that it can detect virtually all possible malicious events in the targeted use case. Furthermore, given an initial ether value of 100, the solution's average gas consumption and Ether spent are 84,456.5 and 0.03157625, respectively.


Subject(s)
Blockchain , Privacy , Humans , Quality of Life , Internet of Things
4.
Sensors (Basel) ; 21(6)2021 Mar 15.
Article in English | MEDLINE | ID: mdl-33804023

ABSTRACT

Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military, aerospace, reconnaissance, agriculture, and many more. The development and implementation of these devices have become vital in terms of usability and reachability. Unfortunately, as they become widespread and their demand grows, they are becoming more and more vulnerable to several security attacks, including, but not limited to, jamming, information leakage, and spoofing. In order to cope with such attacks and security threats, a proper design of robust security protocols is indispensable. Although several pieces of research have been carried out with this regard, there are still research gaps, particularly concerning UAV-to-UAV secure communication, support for perfect forward secrecy, and provision of non-repudiation. Especially in a military scenario, it is essential to solve these gaps. In this paper, we studied the security prerequisites of the UAV communication protocol, specifically in the military setting. More importantly, a security protocol (with two sub-protocols), that serves in securing the communication between UAVs, and between a UAV and a Ground Control Station, is proposed. This protocol, apart from the common security requirements, achieves perfect forward secrecy and non-repudiation, which are essential to a secure military communication. The proposed protocol is formally and thoroughly verified by using the BAN-logic (Burrow-Abadi-Needham logic) and Scyther tool, followed by performance evaluation and implementation of the protocol on a real UAV. From the security and performance evaluation, it is indicated that the proposed protocol is superior compared to other related protocols while meeting confidentiality, integrity, mutual authentication, non-repudiation, perfect forward secrecy, perfect backward secrecy, response to DoS (Denial of Service) attacks, man-in-the-middle protection, and D2D (Drone-to-Drone) security.

5.
IEEE J Biomed Health Inform ; 25(10): 3763-3775, 2021 10.
Article in English | MEDLINE | ID: mdl-33651704

ABSTRACT

Advances of implantable medical devices (IMD) are transforming the traditional method of providing medical treatment, especially those patients under the most challenging condition. Accordingly, the IMD-enabled artificial pancreas system (APS) has now reached global market. It helped many patients suffering from chronic disease, called diabetes mellitus, in monitoring and maintaining blood glucose level conveniently. However, this advancement is accompanied by various security threats that place the life of patients at risk. Hence, protective measures, especially against yet unknown threats, are of paramount importance. This paper proposes a specification-based misbehavior detection system (SMDS) as an alternative solution to effectively mitigate security threats. Moreover, an outlier detection algorithm is also introduced to validate integrity of unprotected data transmitted by the different components. The monitor agent applies a smoothened-trust-based scheme to assess the trustworthiness of the APS. To demonstrate effectiveness of the proposed method, we first extend the UVA/Padova simulator for glucose-insulin data collection and subsequently simulate scenario with well-behave and malicious APS in MATLAB. The results show that there exists an optimal trust threshold that can achieve high specificity and sensitivity rate. Moreover, the proposed technique was compared to contemporary machine learning classifier including decision tree, support vector machine, k-nearest neighbor, and the SMDS called SMDAps. It is shown that our approach can dominate detection performance, especially to malicious behavior that manifests habitually (hidden mode).


Subject(s)
Diabetes Mellitus, Type 1 , Pancreas, Artificial , Blood Glucose , Humans , Prostheses and Implants , Trust
SELECTION OF CITATIONS
SEARCH DETAIL
...