- document
-
de Vos, Adriaan (author), Brighente, Alessandro (author), Conti, M. (author)IEEE 802.1CB provides a standard for reliable packet delivery within Time-Sensitive Networking (TSN). As this standard is envisioned to be used in mission-critical networks in the near future, it has to be protected against security threats. The integrity of the network communication should be the biggest focus as guaranteed delivery is...conference paper 2023
- document
-
Chen, E. (author), Zhu, Yan (author), Liang, K. (author), Yin, Hongjian (author)The increasing popularity of remote Cloud File Sharing (CFS) has become a major concern for privacy breach of sensitive data. Aiming at this concern, we present a new resource sharing framework by integrating enterprise-side Attribute-Based Access Control/eXtensible Access Control Markup Language (ABAC/XACML) model, client-side Ciphertext...journal article 2023
- document
-
Galvan Hernández, Jan Andres (author)The recent advances in the semiconductor industry have given rise to the development of highly scalable, wireless and battery-free neural-implant interfaces that enable brain monitoring and brain stimulation with high spatial and temporal resolution. Such implants are referred to as Free-Floating Neural Implants (FFNI), as the small size and...master thesis 2022
- document
-
Huisman, Rick (author)Research has shown that the Border Gateway Protocol (BGP) is vulnerable to a new attack that exploits the community attribute. These community attacks can influence BGP routing in unintended ways. Currently, there are no effective mitigations against these attacks which do not limit the normal usage of BGP communities or offer cryptographic...master thesis 2022
- document
-
Ivaşcu, Darius (author)The Software Defined Network (SDN) is a relatively new paradigm that aims to tackle the lack of centralization in the existing network by separating the control centre from the programming data plane. The controller keeps an overview of the structure of the whole network, which makes it vulnerable to possible topology poisoning attacks. Topology...bachelor thesis 2022
- document
-
Grishkov, Ilya (author)This paper offers a prototype of a smart-contract-based encryption scheme meant to improve the security of user data being uploaded to the ledger. A new extension to the self-encryption scheme was introduced by integrating identity into the encryption process. Such integration allows to permanently preserve ownership of the original file and...bachelor thesis 2022
- document
-
Park, Chaiwon (author)A rise in the use of blockchain systems implies an increase in smart contract usage. Blockchain systems can easily be found these days, most notably in cryptocurrencies and financial management. Furthermore, the Internet of Things (IoT) is being developed with blockchain, since blockchain ensures trust in IoT data and adds great flexibility....bachelor thesis 2022
- document
-
Comes, M. (author), Alexander, David (author), Boin, Arjen (author), Eckert, Claudia (author), Elmqvist, Thomas (author), Fochesato, Mattia (author), Helbing, Dirk (author), Latusek-Jurczak, Dominika (author), Lauta, Kristian (author), Meriläinen, Eija (author), Nikkari, Simo (author), Papadimitratos, Panos (author), Renn, Ortwin (author), Rios Insua, David (author), Rizza, Caroline (author), Zio, Enrico (author)The evidence review report from SAPEA presents the latest scientific evidence on the subject of crisis management, and evidence-based policy options for action.<br/><br/>The European Union is confronted with an increasing number of crises with growing complexity. Their effects can cascade and ripple to all parts of society, the economy, and the...book 2022
- document
-
Bellizio, Federica (author), Xu, Wangkun (author), Qiu, Dawei (author), Ye, Yujian (author), Papadaskalopoulos, Dimitrios (author), Cremer, Jochen (author), Teng, Fei (author), Strbac, Goran (author)Digitalization is one of the key drivers for energy system transformation. The advances in communication technologies and measurement devices render available a large amount of operational data and enable the centralization of such data storage and processing. The greater access to data opens up new opportunities for a more efficient and...journal article 2022
- document
-
He, Daojing (author), Du, Runmeng (author), Zhu, Shanshan (author), Zhang, Min (author), Liang, K. (author), Chan, Sammy (author)Data island effectively blocks the practical application of machine learning. To meet this challenge, a new framework known as federated learning was created. It allows model training on a large amount of scattered data owned by different data providers. This article presents a parallel solution for computing logistic regression based on...journal article 2022
- document
-
El-Zawawy, Mohamed A. (author), Brighente, Alessandro (author), Conti, M. (author)Internet of Drones (IoD) is a framework to set up drones networks that may serve multiple purposes, e.g., data collection. New IoD applications (such as drone assisted internet of vehicles) envision the simultaneous collection of multiple data types. Although authentication may prevent unauthorized users to access the collected data, existing...journal article 2022
- document
-
Pirani, Mohammad (author), Baldi, S. (author), Johansson, Karl Henrik (author)This paper presents a comprehensive study on the impact of information flow topologies on the resilience of distributed algorithms that are widely used for estimation and control in vehicle platoons. In the state of the art, the influence of information flow topology on both internal and string stability of vehicle platoons has been well...journal article 2022
- document
-
Yu, Xinghuo (author), Tang, Changbing (author), Palensky, P. (author), Colombo, Armando (author)Imagine you want to send money to a friend overseas. Wouldn't it be good if you didn't have to pay hefty fees to the intermediaries, and your friend received the funds very quickly? Now imagine ordering parts to make a product in your manufacturing plant. Wouldn't it be great if you were able to verify where each part comes from and have...journal article 2022
- document
-
Zheng, Yubo (author), Xu, Peng (author), Wang, Wei (author), Chen, Tianyang (author), Susilo, Willy (author), Liang, K. (author), Jin, Hai (author)Many practical secure systems have been designed to prevent real-world attacks via maximizing the attacking cost so as to reduce attack intentions. Inspired by this philosophy, we propose a new concept named delay encryption with keyword search (DEKS) to resist the notorious keyword guessing attack (KGA), in the context of secure cloud-based...conference paper 2022
- document
-
Li, Meng (author), Gao, Jianbo (author), Zhang, Zijian (author), Fu, Chaoping (author), Lal, C. (author), Conti, M. (author)Shortest distance queries over large-scale graphs bring great benefits to various applications, i.e., save planning time and travelling expenses. To protect the sensitive nodes and edges in the graph, a user outsources an encrypted graph to an untrusted server without losing the query ability. However, no prior work has considered the user...conference paper 2022
- document
-
Pletinckx, Stijn (author)Security misconfigurations and neglected updates commonly lead to systems being vulnerable. Ranging from default passwords to unpatched software, many systems, such as websites or databases, are being compromised due to these pitfalls. Often stemming from human error, it is difficult to avoid these misconfigurations, which is why they are...master thesis 2021
- document
-
Slager, Cheyenne (author)GoQuorum is an enterprise blockchain platform that supports smart contracts and allows for private transactions. Smart contracts enable automated payment while eliminating the need for third-party involvement. Previous attacks on smart contracts have already shown that existing vulnerabilities can lead to great financial losses. Yet, a study...bachelor thesis 2021
- document
-
Hahn, Georg (author)Medical Body Area Networks (MBANs) are a cluster of possibly heterogeneous devices, communicating with each other in, on or around the human body. Through these devices, medical data is collected, processed in some way and transferred outside of the network. The IEEE 802.15.6 standard aims to govern communications between such devices. It...master thesis 2021
- document
-
Arora, Shruti (author)Information-centric Networking (ICN) is the revolution of the internet due to its many benefit over the current internet infrastructure, namely caching, location-independent routing, and data-centric security. ICN ensures seamless data transfer due to its content-centric nature. Due to its content-centric nature, it is a must to ensure that...bachelor thesis 2021
- document
-
de Klerk, Leon (author)The domain name system (DNS) and public key infrastructure (PKI) provide the core services for the Internet. The use of these systems requires trust in institutions to provide proper services, which they can fail to provide. Centralized management allows these institutions to perform censorship. Additionally, these legacy systems have seen...bachelor thesis 2021