submit Opinions CrossRef Open Access Subscribe New Journal Ideal

Click on image to enlarge

Indexed in Scopus

Journal of Cyber Security and Mobility

Hybrid Journal

Ashutosh Dutta, Johns Hopkins University, USA
Ruby Lee, Princeton University, USA
Neeli R. Prasad, International Technological University, San Jose, USA
Wojciech Mazurczyk, Warsaw University of Technology, Poland

ISSN: 2245-1439 (Print Version),

ISSN: 2245-4578 (Online Version)
Vol: 4   Issue: 1

Published In:   January 2015

Publication Frequency: Quarterly

Articles in 2020

Search Available Volume and Issue for Journal of Cyber Security and Mobility

Journal Description        Editorial Foreword        Read Full Articles        Editorial Board        Subscription        Indexed       Opinions

Torrent-Based Dissemination in Infrastructure-Less Wireless Networks

Kyriakos Manousakis1, Sharanya Eswaran1, David Shur1, Gaurav Naik2, Pavan Kantharaju2,William Regli2 and Brian Adamson3

1Applied Communication Sciences
2Drexel University
3Naval Research Laboratory

Abstract: [+]    |    Download File [ 3191KB ]    |   Read Article Online

Abstract: Content dissemination in peer-to-peer mobile ad-hoc networks is subject to disruptions due to erratic link performance and intermittent connectivity. Distributed protocols such as BitTorrent are now ubiquitously used for content dissemination in wired Internet-scale networks, but are not infrastructure-less, which makes them unsuitable for MANETs. Our approach (called SISTO) is a fully distributed and torrent-based solution, with four key features: (i) freedom from any reliance on infrastructure; (ii) network and topology aware selection of information sources; (iii) robust multiple-path routing of content via a proactive peer selection technique; (iv) an integrated distributed content discovery capability, not found in other torrent systems. We have implemented SISTO in software, and evaluated its performance using emulation and realistic mobile network models derived from field measurements.We have measured significant improvements in download latency, resiliency and packet delivery compared to traditional data delivery models and conventional BitTorrent. We have implemented SISTO on both Linux and Android platforms, and integrated it with several android applications for content sharing.

Keywords: Mobile ad-hoc networks, peer-to-peer, data dissemination, algorithms, performance, design, reliability, experimentation.

Cyber Security for IntelligentWorld with Internet of Things and Machine to Machine Communication

Vandana Rohokale and Ramjee Prasad

Center for TeleInFrastruktur (CTIF), Aalborg University, Aalborg, Denmark

Abstract: [+]    |    Download File [ 1073KB ]    |   Read Article Online

Abstract: The growth of interconnected objects through Internet of Things (IoT) and Machine to Machine Communication (M2M) is no doubt inevitable. The researchers have predicted that by 2020, around fifty billion objects throughout the world will be connected with each other with the help of internetwork of smart objects. With the number of networked objects, grows the number of cyber-crime threats. Forthcoming fifth generation of mobile communication will be the converged version of all the wired and wireless networking services and technologies. The heterogeneous networking approach gives rise to various cyber threats. Design of robust cyber security solutions for such heterogeneous networks with smart devices is challenging task.

Keywords: Internet of Things (IoT), Machine to Machine Communication (M2M), Cyber Security, Cybercrime, etc.

How to Use Garbling for Privacy Preserving Electronic Surveillance Services

Tommi Meskanen1, Valtteri Niemi1 and Noora Nieminen1,2

1Department of Mathematics and Statistics, University of Turku, 20014 Turun yliopisto, FINLAND
1Turku Centre for Computer Science (TUCS), FINLAND

Abstract: [+]    |    Download File [ 1166KB ]    |   Read Article Online

Abstract: Various applications following the Internet of Things (IoT) paradigm have become a part of our everyday lives. Therefore, designing mechanisms for security, trust and privacy for this context is important. As one example, applications related to electronic surveillance and monitoring have serious issues related to privacy. Research is needed on how to design privacy preserving surveillance system consisting of networked devices. One way to implement privacy preserving electronic surveillance is to use tools for multiparty computations. In this paper, we present an innovative way of using garbling, a powerful cryptographic primitive for secure multiparty computation, to achieve privacy preserving electronic surveillance. We illustrate the power of garbling in a context of a typical surveillance scenario.We discuss the different security measures related to garbling as well as efficiency of garbling schemes. Furthermore, we suggest further scenarios in which garbling can be used to achieve privacy preservation.

Keywords: Internet of Things, privacy, electronic surveillance, garbling schemes.

Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks

Mohamed Abomhara and Geir M. Køien

Department of Information and Communication Technology, University of Agder, Norway

Abstract: [+]    |    Download File [ 469KB ]    |   Read Article Online

Abstract: Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT devices and services.

Keywords: Internet of Things, Cyber-attack, Security threats.

River Publishers: Journal of Cyber Security and Mobility