Loading...
Search for:
network-security
0.012 seconds
Total 155 records
Maximizing the secrecy energy efficiency of the cooperative rate-splitting aided downlink in multi-carrier uav networks
, Article IEEE Transactions on Vehicular Technology ; Volume 71, Issue 11 , 2022 , Pages 11803-11819 ; 00189545 (ISSN) ; Moradikia, M ; Abdelhadi, A ; Behroozi, H ; Clerckx, B ; Hanzo, L ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2022
Abstract
Although Unmanned Aerial Vehicles (UAVs) are capable of significantly improving the information security by detecting the eavesdropper's location, their limited energy motivates our research to propose a secure and energy efficient scheme. Thanks to the common-message philosophy introduced by Rate-Splitting (RS), we no longer have to allocate a portion of the transmit power to radiate Artificial Noise (AN), and yet both the Energy Efficiency (EE) and secrecy can be improved. Hence we define and study the Secrecy Energy Efficiency (SEE) of a multi-carrier multi-UAV network, in which Cooperative Rate-Splitting (CRS) is employed by each multi-antenna UAV Base-Station (UAV-BS) for protecting...
CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities
, Article Microprocessors and Microsystems ; Volume 90 , 2022 ; 01419331 (ISSN) ; Javadpour, A ; Ja'fari, F ; Pinto, P ; Ahmadi, H ; Zhang, W ; Sharif University of Technology
Elsevier B.V
2022
Abstract
This research aims to represent a novel approach to detect malicious nodes in Ad-hoc On-demand Distance Vector (AODV) within the next-generation smart cities. Smart city applications have a critical role in improving public services quality, and security is their main weakness. Hence, a systematic multidimensional approach is required for data storage and security. Routing attacks, especially sinkholes, can direct the network data to an attacker and can also disrupt the network equipment. Communications need to be with integrity, confidentiality, and authentication. So, the smart city and urban Internet of Things (IoT) network, must be secure, and the data exchanged across the network must...
Gramian-based vulnerability analysis of dynamic networks
, Article IET Control Theory and Applications ; Volume 16, Issue 6 , 2022 , Pages 625-637 ; 17518644 (ISSN) ; Sharif University of Technology
John Wiley and Sons Inc
2022
Abstract
In this paper, the vulnerability of large-dimensional dynamic networks to false data injections is analysed. The malicious data can manipulate input injection at the control nodes and affect the outputs of the network. The objective is to analyse and quantify the potential vulnerability of the dynamics by such adversarial inputs when the opponents try to avoid being detected as much as possible. A joint set of most effective actuation nodes and most vulnerable target nodes are introduced with minimal detectability by the monitoring system. Detection of this joint set of actuation-target nodes is carried out by introducing a Gramian-based measure and reformulating the vulnerability problem as...
Hardware-Impaired PHY Secret Key Generation With Man-in-the-Middle Adversaries
, Article IEEE Wireless Communications Letters ; Volume 11, Issue 4 , 2022 , Pages 856-860 ; 21622337 (ISSN) ; Behroozi, H ; Khalaj, B. H ; Jorswieck, E. A ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2022
Abstract
In this letter, we examine the PHY layer secret key generation (PHY-SKG) scheme in the presence of man-in-the-middle (MiM) adversary, while legitimate parties suffer from hardware impairments (HIs). Different from previous works on PHY-SKG that consider adversaries who simply try to make an interference in the communication link, the MiM aims to deceive legitimate entities about the source of common randomness. To conquer the MiM attack, legitimate parties utilize randomized pilots (RPs) in our proposed scheme. We analyze the effect of HIs on the performance of system by deriving the achievable secret key rate (SKR). Our results highlight a fundamental limit, as a ceiling phenomena, on the...
Context-Aware ontology-based security measurement model
, Article Journal of Information Security and Applications ; Volume 67 , 2022 ; 22142134 (ISSN) ; Aref, M. R ; Rasti, M ; Sharif University of Technology
Elsevier Ltd
2022
Abstract
Security measurement models (SMMs) and quantitative security metrics (QSMs) are crucial pillars of systematic security measurement. How to design the enhanced SMMs and effective QSMs has been seriously considered in recent years. However, to the best of our knowledge, a desirable SMM has not yet been provided to measure the security effectiveness of a national-level network (NLN) due to its specific attributes. NLN has three main attributes, including plurality and diversity of network components, continuous changes, and simultaneous functionalities. These attributes cause three major challenges to designing a desirable SMM for NLN, including complexity, dynamic measurement, and...
A content-based deep intrusion detection system
, Article International Journal of Information Security ; Volume 21, Issue 3 , 2022 , Pages 547-562 ; 16155262 (ISSN) ; Siavoshani, M. J ; Jahangir, A. H ; Sharif University of Technology
Springer Science and Business Media Deutschland GmbH
2022
Abstract
The growing number of Internet users and the prevalence of web applications make it necessary to deal with very complex software and applications in the network. This results in an increasing number of new vulnerabilities in the systems, and leading to an increase in cyber threats and, in particular, zero-day attacks. The cost of generating appropriate signatures for these attacks is a potential motive for using machine learning-based methodologies. Although there are many studies on using learning-based methods for attack detection, they generally use extracted features and overlook raw contents. This approach can lessen the performance of detection systems against content-based attacks...
Stochastic model predictive control-based countermeasure methodology for satellites against indirect kinetic cyber-attacks
, Article International Journal of Control ; 2022 ; 00207179 (ISSN) ; Assadian, N ; Khorasani, K ; Sharif University of Technology
Taylor and Francis Ltd
2022
Abstract
The objective of this paper is to provide a stochastic framework to optimally avoid collision between a maneuverable spacecraft and a space object or debris. The satellite collision can be caused through a cyber-attack on a satellite by colliding it with a considered strategic satellite. Consequently, it is highly imperative that critical operational space assets be provided with autonomous collision avoidance systems. The collision avoidance methodology proposed in this paper will reduce the collision probability to an acceptable level and protect the satellite against indirect kinetic cyber-attacks initiated by designing optimal collision avoidance maneuvers using a stochastic model...
RAD: A statistical mechanism based on behavioral analysis for DDOS attack countermeasure
, Article IEEE Transactions on Information Forensics and Security ; Volume 17 , 2022 , Pages 2732-2745 ; 15566013 (ISSN) ; Jalili, R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2022
Abstract
Nowadays, Distributed Denial of Service (DDoS) attacks are among the most prevailing and costly attacks across the networks which challenge a variety of services. While many defense mechanisms are presented to detect and mitigate DDoS attacks, attackers constantly explore alternative approaches for orchestrating novel DDoS attacks. Distribution of the mechanism and its deployment into different zones can improve the accuracy and coverage of DDoS attack varieties. In this paper, we propose a 3-phase DDoS attack countermeasure, named RAD, based on a statistical model for scoring users in order to detect DDoS attacks. In the first phase, users are classified into either suspicious or benign...
Security enhancement of an auditing scheme for shared cloud data
, Article International Journal of Internet Protocol Technology ; Volume 15, Issue 1 , 2022 , Pages 60-68 ; 17438209 (ISSN) ; Attari, M. A ; Asaar, M. R ; Aref, M. R ; Sharif University of Technology
Inderscience Publishers
2022
Abstract
In cloud storage services, public auditing mechanisms allow a third party to verify integrity of the outsourced data on behalf of data owners without the need to retrieve data from the cloud server. In some applications, the identity of data users should be kept private from the third party auditor. Oruta is a privacy preserving public auditing scheme for shared data in the cloud which exploits ring signatures to protect the identity privacy. In this paper, we propose two attacks and demonstrate that the scheme is insecure and a dishonest server can arbitrarily tamper the outsourced data without being detected by the auditor. We also propose a solution to remedy this weakness with the...
On learning-assisted content-based secure image transmission for delay-aware systems with randomly-distributed eavesdroppers
, Article IEEE Transactions on Communications ; Volume 70, Issue 2 , 2022 , Pages 1125-1139 ; 00906778 (ISSN) ; Behroozi, H ; Khalaj, B. H ; Jorswieck, E. A ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2022
Abstract
In this paper, a learning-aided content-based image transmission scheme is proposed, where a multi-antenna source wishes to securely deliver an image to a legitimate destination in the presence of randomly-distributed passive eavesdroppers (Eves). We take into account the fact that not all regions of an image have the same importance from the security perspective. Hence, we employ a hybrid method to realize both the error-free data delivery of public regions - containing less-important pixels; and an artificial noise (AN)-aided transmission scheme for securing the confidential packets. To reinforce system's security, fountain-based packet delivery is also adopted, where the source node...
A new reliability-based task scheduling algorithm in cloud computing
, Article International Journal of Communication Systems ; Volume 35, Issue 3 , 2022 ; 10745351 (ISSN) ; Movaghar, A ; Rahmani, A. M ; Sharif University of Technology
John Wiley and Sons Ltd
2022
Abstract
In the last decade, the scale of heterogeneous computing (HC) systems such as heterogeneous cloud computing environments was growing like never before. So network failures are unavoidable in such systems, which affect system reliability. Since the task scheduling algorithm in HC is challenging, we investigate a new reliability-aware task scheduling algorithm (RATSA) in this paper. RATSA is designed to schedule tasks on directed acyclic graphs (DAGs) by using the shuffled frog-leaping algorithm (SFLA) and genetic algorithm (GA) as evolutionary algorithms. The population-based SFLA-GA is applied to optimize makespan in the RATSA as an NP-complete problem. Moreover, the proposed algorithm...
An identity based authentication protocol for smart grid environment using physical uncloneable function
, Article IEEE Transactions on Smart Grid ; Volume 12, Issue 5 , 2021 , Pages 4426-4434 ; 19493053 (ISSN) ; Qadri, S ; Shamshad, S ; Faizan Ayub, M ; Mahmood, K ; Kumar, N ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2021
Abstract
Smart grid plays an important role in managing demand response management in modern smart city using Information and Communication Technologies (ICTs). In smart grid environment, sensors are widely used for surveillance. These are deployed on the high tension power supply lines which help to share the information to control center about line breakage or any other flaw. Besides the cyber-attacks, sensors may also experience physical attacks as they are deployed on high-tension power lines in an open environment. Moreover, an attacker can also impersonate the information exchanged between sensors, gateways and control centers. Therefore, the most indispensable requirement is to prevent these...
Solving fully dynamic bin packing problem for virtual machine allocation in the cloud environment by the futuristic greedy algorithm
, Article Journal of Intelligent and Fuzzy Systems ; Volume 40, Issue 3 , 2021 , Pages 4737-4760 ; 10641246 (ISSN) ; Izadi, M ; Sharif University of Technology
IOS Press BV
2021
Abstract
Many scientists apply fully dynamic bin packing problem solving for resource allocation of virtual machines in cloud environments. The goal of problem-solving is to reduce the number of allocated hosts (bins) and virtual machines (items) migration rates for reducing energy consumption. This study demonstrates a greedy futuristic algorithm (proposed algorithm) for fully dynamic bin packaging with an average asymptotic approximation ratio of 1.231, better than other existing algorithms. The proposed algorithm identifies inappropriate local selections using special futuristic conditions to prevent them as much as possible. Eventually, suitable choices determine and discard the improper ones....
Outage-Constrained robust and secure design for downlink rate-splitting UAV networks
, Article 2021 IEEE International Conference on Communications Workshops, ICC Workshops 2021, 14 June 2021 through 23 June 2021 ; 2021 ; 9781728194417 (ISBN) ; Moradikia, M ; Letafati, M ; Abdelhadi, A ; Behroozi, H ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2021
Abstract
Unmanned aerial vehicles (UAVs) are developing rapidly owing to flexible deployment and access services as the air base stations. In this paper, by taking the realistic assumption of imperfect channel state information at transmitter (CSIT), we investigate the robust and secure design of downlink UAV network while considering the worst-case outage constraints due to communication link uncertainties. In our proposed heterogeneous network, comprised of both UAV-cells and macro-users, rate splitting technique is deployed by UAV base-station (UAV-BS) to enhance the system performance in terms of security, power saving, and robustness against imperfect CSIT. Through our proposed design, we...
Hardware architecture for supersingular isogeny diffie-hellman and key encapsulation using a fast montgomery multiplier
, Article IEEE Transactions on Circuits and Systems I: Regular Papers ; Volume 68, Issue 5 , 2021 , Pages 2042-2050 ; 15498328 (ISSN) ; Bayat Sarmadi, S ; Mosanaei Boorani, H ; Alivand, A ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2021
Abstract
Public key cryptography lies among the most important bases of security protocols. The classic instances of these cryptosystems are no longer secure when a large-scale quantum computer emerges. These cryptosystems must be replaced by post-quantum ones, such as isogeny-based cryptographic schemes. Supersingular isogeny Diffie-Hellman (SIDH) and key encapsulation (SIKE) are two of the most important such schemes. To improve the performance of these protocols, we have designed several modular multipliers. These multipliers have been implemented for all the prime fields used in SIKE round 3, on a Virtex-7 FPGA, showing a time and area-time product improvement of up to 60.1% and 64.5%,...
A unified benchmark for security and reliability assessment of the integrated chemical plant, natural gas and power transmission networks
, Article Journal of Natural Gas Science and Engineering ; Volume 96 , 2021 ; 18755100 (ISSN) ; Bozorgmehry Boozarjomehry, R ; Babaei, F ; Pishvaie, M. R ; Sharif University of Technology
Elsevier B. V
2021
Abstract
This work presents a simulation framework to investigate the rigorous transient behavior of integrated systems comprising natural gas and power transmission networks, and a chemical plant whose feedstock is natural gas. This framework entails dynamic models for the gas transmission network and the SynGas plant, and a continuous-time AC-power flow formulation with dispatchable loads. It addresses the following key challenges: (i) analyzing energy and chemical system interdependencies, and their impacts on each other's supply reliability and security; (ii) providing an environment conducive to settling a critical question of how to prioritize the natural gas consumption as fuels of power...
On learning-assisted content-based secure image transmission for delay-aware systems with randomly-distributed eavesdroppers
, Article IEEE Transactions on Communications ; 2021 ; 00906778 (ISSN) ; Behroozi, H ; Khalaj, B. H ; Jorswieck, E. A ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2021
Abstract
In this paper, a learning-aided content-based image transmission scheme is proposed, where a multi-antenna source wishes to securely deliver an image to a legitimate destination in the presence of randomly-distributed passive eavesdroppers (Eves). We take into account the fact that not all regions of an image have the same importance from the security perspective. Hence, we employ a hybrid method to realize both the error-free data delivery of public regions—containing less-important pixels; and an artificial noise (AN)-aided transmission scheme for securing the confidential packets. To reinforce system’s security, fountain-based packet delivery is also adopted, where the source node encodes...
Can a multi-hop link relying on untrusted amplify-and-forward relays render security?
, Article Wireless Networks ; Volume 27, Issue 1 , 2021 , Pages 795-807 ; 10220038 (ISSN) ; Kuhestani, A ; Behroozi, H ; Sharif University of Technology
Springer
2021
Abstract
Cooperative relaying is utilized as an efficient method for data communication in wireless sensor networks and the Internet of Things. However, sometimes due to the necessity of multi-hop relaying in such communication networks, it is challenging to guarantee the secrecy of cooperative transmissions when the relays may themselves be eavesdroppers, i.e., we may face with the untrusted relaying scenario where the relays are both necessary helpers and potential adversary. To obviate this issue, a new cooperative jamming scheme is proposed in this paper, in which the data can be confidentially communicated from the source to the destination through multiple untrusted relays. In our proposed...
A new delay attack detection algorithm for PTP network in power substation
, Article International Journal of Electrical Power and Energy Systems ; Volume 133 , 2021 ; 01420615 (ISSN) ; Jahangir, A. H ; Sharif University of Technology
Elsevier Ltd
2021
Abstract
Time synchronization is one of the main issues for guaranteeing the correctness of actions depending on the time of measured data or detected events by electronic devices across industrial networks. According to the accuracy needed in different applications and networks, several synchronization protocols or algorithms have been proposed so far. The Precision Time Protocol, PTP, is one of the most accurate synchronization protocols introduced for automation applications. It has also been used in power grids and digital substations. However, due to the variety of cyber-attacks in electrical power systems in recent years, its security should be considered and evaluated as other substation...
A content-based deep intrusion detection system
, Article International Journal of Information Security ; 2021 ; 16155262 (ISSN) ; Siavoshani, M. J ; Jahangir, A. H ; Sharif University of Technology
Springer Science and Business Media Deutschland GmbH
2021
Abstract
The growing number of Internet users and the prevalence of web applications make it necessary to deal with very complex software and applications in the network. This results in an increasing number of new vulnerabilities in the systems, and leading to an increase in cyber threats and, in particular, zero-day attacks. The cost of generating appropriate signatures for these attacks is a potential motive for using machine learning-based methodologies. Although there are many studies on using learning-based methods for attack detection, they generally use extracted features and overlook raw contents. This approach can lessen the performance of detection systems against content-based attacks...