VAP1: IoT Security and 5G economy

Tuesday, 16 June 2020, 12:15-14:30 CEST, Recommended re-viewing, https://www.youtube.com/playlist?list=PLjQu6nB1DfNDsvimIkYpR8B2AREY8jkIG

Tuesday, 16 June 2020, 12:15-17:00 CEST, Non-Live interaction (Chat),  link sent only to Registered people

 

Design and Implementation of IoT DDoS Attacks Detection System Based on Machine Learning

Yi-wen Chen and Jang-Ping Sheu (National Tsing Hua University, Taiwan); Yung Ching Kuo (National TsingHua University, Taiwan); Nguyen Van Cuong (National Tsing Hua University, Taiwan)
DDoS attacks often happen in cloud servers and cause a devastating problem. However, an increasing number of Internet of Things devices makes us not ignore the influence of large-scale DDoS attacks from IoT devices. In this paper, we propose a machine learning-based on a multi-layer IoT DDoS attack detection system, including IoT devices, IoT gateways, SDN switches, and cloud servers. Firstly, we build eight smart poles with various sensors on our campus and collect sensor data as our datasets through wireless networks or wired networks. Next, we extract the features based on DDoS attack types. The feature selection can result in high accuracy DDoS attack detection in the real IoT environment. The experimental results show that our multi-layer DDoS detection system can accurately detect DDoS attacks. And the SDN controller can block venomous devices effectively according to blacklists from the results of our IoT DDoS attacks detection system.

 

Consideration on Data Conformance Toward Building Trust in Supply Chain

Yuto Nakano (KDDI Research, Inc., Japan); Toru Nakamura (Advanced Telecommunications Research Institute International, Japan); Yasuaki Kobayashi and Masahito Ishizaka (KDDI Research, Inc., Japan); Masayuki Hashimoto (Advanced Telecommunications Research Institute International, Japan); Hiroyuki Yokoyama (ATR, Japan); Yutaka Miyake (KDDI Research, Inc., Japan); Shinsaku Kiyomoto (Information Security Laboratory, KDDI Research Inc., Japan)
New threats and risks against supply chains are increasing and countermeasures against these threats are required. In Cross-ministerial Strategic Innovation Promotion Program (SIP) “Cyber Physical Security for IoT Society”, a framework to enhance trustworthiness of supply chain is considered. In this paper, we focus on data transmitted between organisations and propose a framework to enhance trustworthiness of data supply chain by validating a conformance of its management and usage. The framework consist of 1) a profile which defines correct management and usage of data, 2) a conformance validation logic which ensures management and usage comply the profile and 3) Trust Store which manages results of validation through entire supply chain.

 

The CARAMEL Project: a Secure Architecture for Connected and Autonomous Vehicles

Christian Vitale (KIOS CoE, Cyprus); Nikos Piperigkos (University of Patras, Greece); Christos Laoudias and Georgios Ellinas (University of Cyprus, Cyprus); Jordi Casademont (Technical University of Catalonia (UPC), Spain); Pouria Sayyad Khodashenas (i2CAT Foundation (i2CAT), Spain); Andreas Kloukiniotis, Aris S. Lalos and Konstantinos Moustakas (University of Patras, Greece); Pablo Barrientos Lobato (Atos IT Solutions and Services Iberia, Spain); Javier Moreno Castillo (FICOSA, Spain); Petros Kapsalas (Panasonic Automotive, Germany); Klaus-Peter Hofmann (T-Systems Enterprise Services GmbH, Germany)
The main goals of the CARAMEL project are to enhance the protection of modern vehicles against cybersecurity threats related to automated driving, smart charging of Electric Vehicles, and communication among vehicles or between vehicles and the roadside infrastructure. This work focuses on the latter and presents the CARAMEL architecture for improving the security and privacy of communication for connected and autonomous driving. The proposed architecture includes: (i) multiradio access technology capabilities, with simultaneous 802.11p and LTE-Uu support; (ii) a MEC platform, where algorithms for detecting attacks are implemented; (iii) an intelligent On-Board Unit with anti-hacking features inside the vehicle; (iv) a Public Key Infrastructure that validates in real-time the integrity of vehicle’s data transmissions. As an indicative application scenario, the interaction between the entities of the CARAMEL architecture is showcased in the case that the GPS locations used by vehicles are spoofed.

 

Hierarchical Blockchain Topologies for Quality Control in Food Supply Chains

Spyros Voulgaris (Athens University of Economics and Business, Greece); Nikos Fotiou (Mobile Multimedia Lab, Athens University of Economics and Business, Greece); Vasilios A. Siris and George C. Polyzos (Athens University of Economics and Business, Greece); Artemios Tomaras and Sotiris Karachontzitis (Synelixis Solutions Ltd., Greece)
The use of blockchains to improve product quality and safety control in food supply chains through transparent, trusted, and secure end-to-end traceability frameworks, has received increased attention in the last few years. The use of blockchains, though, does not come at no cost. Poor design of blockchain-based applications can lead to prohibitive costs, intolerable delays, and nonscalable systems. In this work we explore different architectures for blockchain-based traceability and quality control of produce, proposing, evaluating, and comparing four different scenarios. Our evaluation uses public and private Ethereum instances, and assesses the considered architectures in terms of cost and overall throughput.

 

5G Ecosystem Dilemmas: Sharing Roles and Revenues

Costas Kalogiros (Athens University of Economics and Business, Greece); Hanne Kristine Hallingby (Telenor, Norway); Olai-Bendik Erdal (Telenor Research and Innovation, Norway)
This paper introduces the platform ecosystem approach and applies it in a 5G setting. It seeks to answer successful strategies to decision dilemma of collective action in a context with high dependency between actors. We develop a model for a duopoly case where two 5G platform ecosystem exist and suggest six scenarios which combine compatibility between 5G platforms and Mobile Network Operators’ (MNOs’) willingness to share market in the total ecosystem. We show that under certain market conditions, MNOs will be more profitable by allowing 5G platform compatibility and that there are several realistic cases where showing moderation in capturing market shares is their best strategy.