Enhancing data security on a self-defensive Jacket Along with Microphone using IoT Technology and Cloud Computing
Wearables Security 2022 - In the twenty-first century, given the worldwide situation, the first concern of any female is her personal protection. Women Labor Day and night to sustain themselves and their families. These women are more susceptible to attacks and assaults, and their security and safety are paramount issues. This technique proposed several new goods to safeguard women. Among the products that may be employed is a smart jacket for women s safety. The proposed approach also includes features to send alert notification to family members with Geo location live tracking and live camera video streaming placed on the jacket for the emergency attention when women are not secure. This gadget is an appeal to all women to earn the right to a safe and secure planet.
Authored by Malathi Acharya, Prasad N
Wearables Security 2022 - In aura and era of the Internet of Things (IoT) and the fourth industrial revolution, modern wearable electronic devices and their communication networks are marching into every corner of modern society and changing every aspect of our daily life. Thus, the progress of digitalization including miniaturization of sensor and wearable technology and its growing importance of physical and psychological wellbeing have a tremendous impact on almost all consumer goods from wearable to nonwearable industries. Different types of signals are used in communication between the devices for wireless transmission of data. such as Radio Frequency, Infrared, and Lightwave Transmissions. Wearable devices are becoming a hot topic in many fields such as medical, fashion, education, etc. Digital dependency of WIoT devices, introduced new security challenges, and vulnerabilities. This research is focused on Fitness Wearable Technology Devices Security and Privacy Vulnerability Analysis and highlights the importance of this topic by revealing the potential security concerns. Fog Computing, Sidera and Blockchain technologies were researched as Security Techniques to enhance security and efficiency while providing access to medical and personal records.
Authored by Mohammed Saleh, Thair Kdour, Azzeddine Ferrah, Hamad Ahmed, Saleel Ap, Rula Azzawi, Mohammed Hassouna, Issam Hamdan, Samer Aoudi, Khaleefa Mohammed, Ammar Ali
Wearables Security 2022 - Mobile devices such as smartphones are increasingly being used to record personal, delicate, and security information such as images, emails, and payment information due to the growth of wearable computing. It is becoming more vital to employ smartphone sensor-based identification to safeguard this kind of information from unwanted parties. In this study, we propose a sensor-based user identification approach based on individual walking patterns and use the sensors that are pervasively embedded into smartphones to accomplish this. Individuals were identified using a convolutional neural network (CNN). Four data augmentation methods were utilized to produce synthetically more data. These approaches included jittering, scaling, and time-warping. We evaluate the proposed identification model’s accuracy, precision, recall, F1-score, FAR, and FRR utilizing a publicly accessible dataset named the UIWADS dataset. As shown by the experiment findings, the CNN with the timewarping approach operates with very high accuracy in user identification, with the lowest false positive rate of 8.80\% and the most incredible accuracy of 92.7\%.
Authored by Sakorn Mekruksavanich, Ponnipa Jantawong, Anuchit Jitpattanakul
Wearables Security 2022 - Healthcare has become one of the most important aspects of people s lives, resulting in a surge in medical big data. Healthcare providers are increasingly using Internet of Things (IoT)-based wearable technologies to speed up diagnosis and treatment. In recent years, Through the Internet, billions of sensors, gadgets, and vehicles have been connected. One such example is for the treatment and care of patients, technology—remote patient monitoring—is already commonplace. However, these technologies also offer serious privacy and data security problems. Data transactions are transferred and logged. These medical data security and privacy issues might ensue from a pause in therapy, putting the patient s life in jeopardy. We planned a framework to manage and analyse healthcare large data in a safe manner based on blockchain. Our model s enhanced privacy and security characteristics are based on data sanitization and restoration techniques. The framework shown here make data and transactions more secure.
Authored by Nidhi Raghav, Anoop Bhola
An Intelligent Robust One Dimensional HAR-CNN Model for Human Activity Recognition using Wearable Sensor Data
Wearables Security 2022 - One of the biggest new trends in artificial intelligence is the ability to recognise people s movements and take their actions into account. It can be used in a variety of ways, including for surveillance, security, human-computer interaction, and content-based video retrieval. There have been a number of researchers that have presented vision-based techniques to human activity recognition. Several challenges need to be addressed in the creation of a vision-based human activity recognition system, including illumination variations in human activity recognition, interclass similarity between scenes, the environment and recording setting, and temporal variation. To overcome the above mentioned problem, by capturing or sensing human actions with help of wearable sensors, wearable devices, or IoT devices. Sensor data, particularly one-dimensional time series data, are used in the work of human activity recognition. Using 1D-Convolutional Neural Network (CNN) models, this works aims to propose a new approach for identifying human activities. The Wireless Sensor Data Mining (WISDM) dataset is utilised to train and test the 1D-CNN model in this dissertation. The proposed HAR-CNN model has a 95.2\%of accuracy, which is far higher than that of conventional methods.
Authored by P. Deepan, Santhosh Kumar, B. Rajalingam, Santosh Patra, S. Ponnuthurai
Wearables Security 2022 - Interoperability remains one of the biggest challenges facing healthcare organizations today. Despite the advancements made through digital transformation and API that allow increased interoperability, patients still have to contend with a different patient portal for each provider they visit. Several health systems are unable to successfully exchange EHR data. API transfer and consolidate patient information including medical history and treatment records across the disparate healthcare systems. Mobile apps use API to gather data from various medical wearables and add the data to a patient’s health record. However, API exposes application logic and sensitive data information giving patient data a window to the World Wide Web and has thus increasingly become a target for attackers. As the need for tighter API security grows, managing APIs becomes more important than ever. The goal of this paper is to provide an overview and discuss research questions that can aid in understanding and building the knowledge base on API data integration and interoperability.
Authored by Md Faruk, Arleen Patinga, Lornna Migiro, Hossain Shahriar, Sweta Sneha
Preliminary Investigation on Location Estimation using Temperature Time Series Data obtained from Wearable Devices
Wearables Security 2022 - As it becomes easier to obtain various data from wearable devices, it is known that biometric and behavioral information must be handled with care. On the other hand, data on the surrounding environment, such as outside temperature, is seen as having a weak relationship with the wearer, and data handling is considered to be a chore. We believe that even data with weak relationships have the potential to infer information about the wearer if a large amount of data is acquired. In this paper, we verify whether it is possible to estimate the wearer’s location from time series data of outside air temperature using only the temperature sensor. We calculated the average absolute error between the temperature data from the wearable device and the same time-series data obtained from the Japan Meteorological Agency, and we evaluated the wearer’s position estimation. It was found that the location where the temperature was sampled appeared at the top of the estimation ranking, and that cities near the sampling location were estimated to be at the high ranking. It was also found that the number of data to be used can be a factor that increases the estimation ranking.
Authored by Sayuki Shingai, Kazuya Murao
Wearables Security 2022 - As 5G is deployed and applied, a large number of mobile devices have been increasingly deployed on the network. Scenarios such as smartphones, smart car, smart transportation, smart wearable devices, and smart industry are increasingly demanding for networks. And the Internet of Things (IoT), as a new and high technology, will play an important role and generate huge economic benefits. However, IoT security also faces many challenges due to the inherent security vulnerabilities in multiple device interactions and the data also needs more accurate processing. Big data and deep learning have been gradually applied in various industries. Therefore, we have summarized and analyzed the use of big data and deep learning technology to solve the hidden dangers of the IoT security under the consideration of some suggestions and thinking for industry applications.
Authored by Jian-Liang Wang, Ping Chen
Wearables Security 2022 - Wearable devices are becoming increasingly popular since they are used in a variety of services. A variety of personal data is collected by the smartwatch. Although devices can give convenience to consumers, there are additional security threats that warn of cybersecurity risks, device penetration, and exploiting vulnerabilities. Devices are prone to attack, and hacking might reveal the acquired data. The lack of authentication and location monitoring, as well as Bluetooth issues and security holes, are all problems in these devices. Although there are security recommendations for such devices, consumers are typically unaware of the risks. The goal of this study is to provide awareness regarding cybersecurity to the common people while using the wearable device.
Authored by Manal Alshammari, Mona Alshammari
Wearables Security 2022 - In recent years, technological industry has made a large investment in the design of wearable devices. Wearable devices are attractive to a variety of different age groups within the majority of population. The main reasons for such popularity are related to ease of wear and friendly use, affordable prices with competitive products, as well as providing different services. Usually, wearable devices are collecting different kinds of data. Some of these data are sensitive and personal data of the wearer/user. Such data can be attacked, leaked, misused or edited. Therefore, privacy and security issues are among the main important issues to be considered carefully and discussed clearly when wearable devices are designed and used. Presenting unclear privacy and security strategies will lead the user to mistrust wearable technology with its application. In this research, we present our proposed wearable security protocol to create a secure environment of wearable data and their processing. The main idea of our protocol is to secure the identity of people as well as hiding their sensitive and personal data. Meanwhile, it does not affect the quality of data when applying their mining techniques. The protocol can be used for any kind of data with any application while keeping the user’s privacy and security properties. Moreover, it can be easily understood, implemented, and processed, in addition to any update might be needed.
Authored by Fatina Shukur, Ahmed Fatlawi
Vulnerability Detection 2022 - Cross-site scripting attacks, as a means of attack against Web applications, are widely used in phishing, information theft and other fields by unscrupulous people because of their wide targeting and hidden implementation methods. Nevertheless, cross-site scripting vulnerability detection is still in its infancy, with plenty of challenges not yet fully explored. In this paper, we propose Crawler-based Cross Site Scripting Detector, a tool based on crawler technology that can effectively detect stored Cross Site Scripting vulnerabilities and reflected Cross Site Scripting vulnerabilities. Subsequently, in order to verify the effectiveness of the tool, we experim ented this tool with existing tools such as XSSer and Burp Suite by selecting 100 vulnerable websites for the tool s efficiency, false alarm rate and underreporting rate. The results show that our tool can effectively detect Cross Site Scripting vulnerabilities.
Authored by Haocheng Guan, Dongcheng Li, Hui Li, Man Zhao
Vulnerability Detection 2022 - The power industrial control system is an important part of the national critical Information infrastructure. Its security is related to the national strategic security and has become an important target of cyber attacks. In order to solve the problem that the vulnerability detection technology of power industrial control system cannot meet the requirement of non-destructive, this paper proposes an industrial control vulnerability analysis technology combined with dynamic and static analysis technology. On this basis, an industrial control non-destructive vulnerability detection system is designed, and a simulation verification platform is built to verify the effectiveness of the industrial control non-destructive vulnerability detection system. These provide technical support for the safety protection research of the power industrial control system.
Authored by Zhenwan Zou, Jun Yin, Ling Yang, Cheng Luo, Jiaxuan Fei
Vulnerability Detection 2022 - Aiming at the fact that the existing source code vulnerability detection methods did not explicitly maintain the semantic information related to the vulnerability in the source code, which made it difficult for the vulnerability detection model to extract the vulnerability sentence features and had a high detection false positive rate, a source code vulnerability detection method based on the vulnerability dependency graph is proposed. Firstly, the candidate vulnerability sentences of the function were matched, and the vulnerability dependency representation graph corresponding to the function was generated by analyzing the multi-layer control dependencies and data dependencies of the candidate vulnerability sentences. Secondly, abstracted the function name and variable name of the code sentences node and generated the initial representation vector of the code sentence nodes in the vulnerability dependency representation graph. Finally, the source code vulnerability detection model based on the heterogeneous graph transformer was used to learn the context information of the code sentence nodes in the vulnerability dependency representation graph. In this paper, the proposed method was verified on three datasets. The experimental results show that the proposed method have better performance in source code vulnerability detection, and the recall rate is increased by 1.50\%\textasciitilde22.27\%, and the F1 score is increased by 1.86\%\textasciitilde16.69\%, which is better than the existing methods.
Authored by Hongyu Yang, Haiyun Yang, Liang Zhang, Xiang Cheng
Research on Robustness of Network Security Vulnerability Detection Algorithm based on Recurrent Bayesian Networks
Vulnerability Detection 2022 - Aiming at the problems of low detection accuracy and poor robustness of the existing zero-speed detection methods, an effective gait cycle segmentation method is adopted and a Bayesian network model based on inertial sensor measurements and kinematics knowledge is introduced to infer the zero-speed interval; The method can effectively reduce the ambiguity of the zero velocity (ZV) boundary. S upport vector machine has the advantages of versatility, simple calculation, high operation efficiency and perfect theory. It is a relatively mature and efficient algorithm in the current network security situation algorithm. And a looped Bayesian network model for probabilistic safety assessment of simple feedback control systems is established.
Authored by Jian He, Yan Hu
Vulnerability Detection 2022 - With the booming development of deep learning and machine learning, the use of neural networks for software source code security vulnerability detection has become a hot pot in the field of software security. As a data structure, graphs can adequately represent the complex syntactic information, semantic information, and dependencies in software source code. In this paper, we propose the MPGVD model based on the idea of text classification in natural language processing. The model uses BERT for source code pre-training, transforms graphs into corresponding feature vectors, uses MPNN (Message Passing Neural Networks) based on graph neural networks in the feature extraction phase, and finally outputs the detection results. Our proposed MPGVD, compared with other existing vulnerability detection models on the same dataset CodeXGLUE, obtain the highest detection accuracy of 64.34\%.
Authored by Yang Xue, Junjun Guo, Li Zhang, Huiyu Song
Vulnerability Detection 2022 - For the last few decades, the number of security vulnerabilities has been increasing with the development of web applications. The domain of Web Applications is evolving. As a result, many empirical studies have been carried out to address different security vulnerabilities. However, an analysis of existing studies is needed before developing new security vulnerability testing techniques. We perform a systematic mapping study documenting state-of-the-art empirical research in web application security vulnerability detection. The aim is to describe a roadmap for synthesizing the documented empirical research. Existing research and literature have been reviewed using a systematic mapping study. Our study reports on work dating from 2001 to 2021. The initial search retrieved 150 papers from the IEEE Xplore and ACM Digital Libraries, of which 76 were added to the study. A classification scheme is derived based on the primary studies. The study demonstrates that vulnerability detection in web applications is an ongoing field of research and that the number of publications is increasing. Our study helps illuminate research areas that need more consideration.
Authored by Karishma Rahman, Clemente Izurieta
Vulnerability Detection 2022 - Vulnerability detection has always been an essential part of maintaining information security, and the existing work can signiﬁcantly improve the performance of vulnerability detection. However, due to the differences in representation forms and deep learning models, various methods still have some limitations. In order to overcome this defect, We propose a vulnerability detection method VDBWGDL, based on weight graphs and deep learning. Firstly, it accurately locates vulnerability-sensitive keywords and generates variant codes that satisfy vulnerability trigger logic and programmer programming style through code variant methods. Then, the control ﬂow graph is sliced for vulnerable code keywords and program critical statements. The code block is converted into a vector containing rich semantic information and input into the weight map through the deep learning model. According to speciﬁc rules, different weights are set for each node. Finally, the similarity is obtained through the similarity comparison algorithm, and the suspected vulnerability is output according to different thresholds. VDBWGDL improves the accuracy and F1 value by 3.98\% and 4.85\% compared with four state-of-the-art models. The experimental results prove the effectiveness of VDBWGDL.
Authored by Xin Zhang, Hongyu Sun, Zhipeng He, MianXue Gu, Jingyu Feng, Yuqing Zhang
Vulnerability Detection 2022 - The increasing number of software vulnerabilities pose serious security attacks and lead to system compromise, information leakage or denial of service. It is a challenge to further improve the vulnerability detection technique. Nowadays most applications are implemented using C/C++. In this paper we focus on the detection of overflow vulnerabilities in C/C++ source code. A novel scheme named VulMiningBGS (Vulnerability Mining Based on Graph Similarity) is proposed. We convert the source code into Top N-Weighted Range Sum Feature Graph (TN-WRSFG), and graph similarity comparisons based on source code level can be effectively carried on to detect possible vulnerabilities. Three categories of vulnerabilities in the Juliet test suite are used, i.e., CWE121, CWE122 and CWE190, with four indicators for performance evaluation (precision, recall, accuracy and F1\_score). Experimental results show that our scheme outperforms the traditional methods, and is effective in the overflow vulnerability detection for C/C++ source code.
Authored by Zihan Yu, Jintao Xue, Xin Sun, Wen Wang, Yubo Song, Liquan Chen, Zhongyuan Qin
Vulnerability Detection 2022 - The increasing number of security vulnerabilities has become an important problem that needs to be solved urgently in the ﬁeld of software security, which means that the current vulnerability mining technology still has great potential for development. However, most of the existing AI-based vulnerability detection methods focus on designing different AI models to improve the accuracy of vulnerability detection, ignoring the fundamental problems of data-driven AI-based algorithms: ﬁrst, there is a lack of sufﬁcient high-quality vulnerability data; second, there is no uniﬁed standardized construction method to meet the standardized evaluation of different vulnerability detection models. This all greatly limits security personnel’s in-depth research on vulnerabilities. In this survey, we review the current literature on building high-quality vulnerability datasets, aiming to investigate how state-of-the-art research has leveraged data mining and data processing techniques to generate vulnerability datasets to facilitate vulnerability discovery. We also identify the challenges of this new ﬁeld and share our views on potential research directions.
Authored by Yuhao Lin, Ying Li, MianXue Gu, Hongyu Sun, Qiuling Yue, Jinglu Hu, Chunjie Cao, Yuqing Zhang
Visible Light Security 2022 - In the near future, the high data rate challenge would not be possible by using the radio frequency (RF) only. As the user will increase, the network traffic will increase proportionally. Visible light communication (VLC) is a good solution to support huge number of indoor users. VLC has high data rate over RF communication. The way internet users are increasing, we have to think over VLC technology. Not only the data rate is a concern but also its security, cost, and reliability have to be considered for a good communication network. Quantum technology makes a great impact on communication and computing in both areas. Quantum communication technology has the ability to support better channel capacity, higher security, and lower latency. This paper combines the quantum technology over the existing VLC and compares the performance between quantum visible light communication performance (QVLC) over the existing VLC system. Research findings clearly show that the performance of QVLC is better than the existing VLC system.
Authored by Syed Hasan, Mostafa Chowdhury, Md. Saiam
Enhancing Wide-Angle Physical Layer Security for Smartphone’s Low-Luminance WDM/SDM Screen to Camera Uplink Communication
Visible Light Security 2022 - To realize indoor long-distance uplink visible light communication from a smartphone screen to a telephoto camera, wide-angle physical layer security of low-luminance wavelength division multiplexing / space division multiplexing screen is investigated with a numerical model and experiments. Dual-wavelength space division multiplexing not only doubles the data rate of single wavelength one, but also helps enhance the wide-angle physical layer security.
Authored by Alisa Kawade, Wataru Chujo, Kentaro Kobayashi
Development of a Visible Light Communication (VLC) System with Noise Suppression and Differentiation between Combined Sequences
Visible Light Security 2022 - The world moves towards innovation; internet and mobile users are rising tremendously, and there is a desire for high-speed and uninterrupted internet access. Because of its high speed, improved bandwidth, and security, everyone is now interested in a new emergent wireless communication technology called Visible Light Communication (VLC). A VLC system with and without noise has been developed and modelled using an optical source of 450 nm LED wavelength and photodiode as a receiver. For noise, white light source is used that has an impact on the performance and quality of the VLC system. At the receiver side, Trapezoidal Optical Filter is employed before the photo detector to reduce ambient light noise, enhance the Q-factor, Bit Error Rate and provides a clear eye diagram. This paper also discusses the effect of Bit Rate with LED Bandwidth and Q-factor. Optisystem-7 software is used to simulate the circuits. In this work, the performance is assessed using Bit Error Rate and Q-factor values, as well as an eye diagram for improved communication and the use of a rectangular optical filter and polarizer to separate the sequences at the receiver side when they are sharing the same channel at the same time.
Authored by Hasnain Ali, Saleem Shahid
An Optimal Solution for a Human Wrist Rotation Recognition System by Utilizing Visible Light Communication
Visible Light Security 2022 - Wrist-worn devices enable access to essential information and they are suitable for a wide range of applications, such as gesture and activity recognition. Wristworn devices require appropriate technologies when used in sensitive areas, overcoming vulnerabilities in regard to security and privacy. In this work, we propose an approach to recognize wrist rotation by utilizing Visible Light Communication (VLC) that is enabled by low-cost LEDs in an indoor environment. In this regard, we address the channel model of a VLC communicating wristband (VLCcw) in terms of the following factors. The directionality and the spectral composition of the light and the corresponding spectral sensitivity and the directional characteristics of the utilized photodiode (PD). We verify our VLCcw from the simulation environment by a smallscale experimental setup. Then, we analyze the system when white and RGBW LEDs are used. In addition, we optimized the VLCcw system by adding more receivers for the purpose of reducing the number of LEDs on VLCcw. Our results show that the proposed approach generates a feasible real-world simulation environment.
Authored by Saman Zahiri-Rad, Ziad Salem, Andreas Weiss, Erich Leitgeb
AlexNet-based Visible light communication devices fingerprint extraction and authentication in broadcast systems
Visible Light Security 2022 - Visible Light Communication (VLC) is one of technology for the sixth generation (6G) wireless communication and also broadcast system. VLC systems are more resistant against Radio Frequency interference and unsusceptible to security like most RF wireless networks. Since VLC is one of suitable candidate for enforcing data security in future wireless networks. This paper considers improving the security of the next generation of wireless communications by using wireless device fingerprints in visible light communication, which could be used potentially for ATSC broadcasting applications. In particular, we aim to provide a detailed proposal for developing novel wireless security solutions using Visible light communication device fingerprinting techniques. The objectives are two-fold: (1) to provide a systematic review of AI-based wireless device fingerprint identification method and (2) to identify VLC transmitter, with respect to the ATSC physical layer modulation scheme, by analysing the differences in the modulated constellations signaled received by photo-diode, which will be proved by laboratory experimentation.
Authored by Ziqi Liu, Dayu Shi, Samia Oukemeni, Xun Zhang
Physical Layer Security Enhancement in VLC Using Zero-Forcing Beamforming and Optimized LED Placement
Visible Light Security 2022 - In this paper, we address the secure data transmission through visible light communication (VLC) using physical layer security (PLS) techniques and particularly, optical beamforming with the zero-forcing algorithm. More precisely, we consider the secrecy capacity of classical multiple-input singleoutput VLC so that the system can deal with eavesdroppers by minimizing the secrecy outage probability (SOP). The considered wireless channel is modeled by the Gaussian distribution, which is subject to amplitude constraints. We quantify the achievable secrecy capacity and SOP for the conventional lineof-sight VLC link and show that how the beamforming can determine the optimal placement of the transmitters. We also show that for a given SOP, the proposed optimal placement offers a signal-to-noise ratio gain of up to 6 dB compared to classical methods such as uniform placement of the transmitters. Our numerical results indicate that the proposed optimal LED arrangement can achieve an SOP of 10−10 while the SOP with uniform arrangement is equal to 10−4.
Authored by Mahmoud Mohammadi, Seyed Sadough, Zabih Ghassemlooy