Open Access
submit Opinions CrossRef Open Access Subscribe New Journal Ideal

Click on image to enlarge

Indexed in Scopus

Journal of Cyber Security and Mobility

Ashutosh Dutta, Johns Hopkins University, USA
Ruby Lee, Princeton University, USA
Neeli R. Prasad, International Technological University, San Jose, USA
Wojciech Mazurczyk, Warsaw University of Technology, Poland

Associate Editor:
Debdeep Mukhopadhyay, Indian Institute of Technology Kharagpur, India

ISSN: 2245-1439 (Print Version),

ISSN: 2245-4578 (Online Version)
Vol: 3   Issue: 4

Published In:   October 2014

Publication Frequency: Quarterly

Search Available Volume and Issue for Journal of Cyber Security and Mobility

Journal Description        Editorial Foreword        Read Full Articles        Editorial Board        Subscription        Indexed       Opinions

Dynamic Encryption

doi: 10.13052/jcsm2245-1439.341
Lars R. Knudsen

DTU Compute Technical University of Denmark

Abstract: [+]    |    Download File [ 572KB ]    |   Read Article Online

Abstract: This paper considers the concept of dynamic encryption1, which is about cryptosystems used for secrecy.

Keywords: This paper considers the concept of dynamic encryption1, which is about cryptosystems used for secrecy.

Measurable Security, Privacy and Dependability in Smart Grids

doi: 10.13052/jcsm2245-1439.342
Josef Noll1, 2, Iñaki Garitano2, Seraj Fayyad1, 2, Erik Åsberg3 and Habtamu Abie4

1University of Oslo, Oslo, Norway,
2UNIK, Kjeller, Norway,
3eSmartSystems, Halden, Norway,
4Norwegian Computing Centre (NR), Oslo, Norway

Abstract: [+]    |    Download File [ 1386KB ]    |   Read Article Online

Abstract: This paper presents a methodology for assessing security, privacy and dependability (SPD) of embedded systems. The methodology, developed through the European collaboration SHIELD, is applied for the smart grid network as deployed in the South of Norway. Three Smart Grid use cases are analysed in detail, being billing, home control and alarm. The SHIELD methodology uses a Multi-Metrics approach to evaluate the system SPD level during running processes and compares it with use case goals for S, P, and D. The simplicity, applicability, and scalability of the suggested Multi-Metrics approach is demonstrated in this paper. It shows that a single configuration is not sufficient to satisfy the given goals for all use cases.

Keywords: Smart Grid, Security, Privacy, Dependability, Embedded Systems, Internet of Things, Measurable Security, Advanced Metering Infrastructure, AMI.

Study on Estimating Buffer Overflow Probabilities in High-Speed Communication Networks

doi: 10.13052/jcsm2245-1439.343
Izabella Lokshina

Department of Management, Marketing and Information Systems SUNY–Oneonta, NY 13820, USA

Abstract: [+]    |    Download File [ 1054KB ]    |   Read Article Online

Abstract: The paper recommends new methods to estimate effectively the probabilities of buffer overflow in high-speed communication networks. The frequency of buffer overflow in queuing system is very small; therefore the overflow is defined as rare event and can be estimated using rare event simulation with continuous-time Markov chains. First, a two-node queuing system is considered and the buffer overflow at the second node is studied. Two efficient rare event simulation algorithms, based on the Importance sampling and Cross-entropy methods, are developed and applied to accelerate the buffer overflow simulation with Markov chain modeling. Then, the buffer overflow in self-similar queuing system is studied and the simulations with long-range dependent self-similar traffic source models are conducted. A new efficient simulation algorithm, based on the RESTART method with limited relative error technique, is developed and applied to accelerate the buffer overflow simulation with SSM/M/1/B modeling using different parameters of arrival processes and different buffer sizes. Numerical examples and simulation results are provided for all methods to estimate the probabilities of buffer overflow, proposed in this paper.

Keywords: high-speed communication networks, estimating probability of buffer overflow, two-node queuing system with feedback, Importance sampling method, Cross-entropy method, self-similar queuing system, RESTART method with limited relative error technique.

River Publishers: Journal of Cyber Security and Mobility