2024
Autores
Alves, S; Cockx, J;
Publicação
TyDe@ICFP
Abstract
2024
Autores
Cirne, A; Sousa, PR; Resende, JS; Antunes, L;
Publicação
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
Abstract
With the proliferation of Internet of Things (IoT) devices, there is an increasing need to prioritize their security, especially in the context of identity and authentication mechanisms. However, IoT devices have unique limitations in terms of computational capabilities and susceptibility to hardware attacks, which pose significant challenges to establishing strong identity and authentication systems. Paradoxically, the very hardware constraints responsible for these challenges can also offer potential solutions. By incorporating hardware-based identity implementations, it is possible to overcome computational and energy limitations, while bolstering resistance against both hardware and software attacks. This research addresses these challenges by investigating the vulnerabilities and obstacles faced by identity and authentication systems in the IoT context, while also exploring potential technologies to address these issues. Each identified technology underwent meticulous investigation, considering known security attacks, implemented countermeasures, and an assessment of their pros and cons. Furthermore, an extensive literature survey was conducted to identify instances where these technologies have effectively supported device identity. The research also includes a demonstration that evaluates the effectiveness of hardware trust anchors in mitigating various attacks on IoT identity. This empirical evaluation provides valuable insights into the challenges developers encounter when implementing hardware-based identity solutions. Moreover, it underscores the substantial value of these solutions in terms of mitigating attacks and developing robust identity frameworks. By thoroughly examining vulnerabilities, exploring technologies, and conducting empirical evaluations, this research contributes to understanding and promoting the adoption of hardware-based identity and authentication systems in secure IoT environments. The findings emphasize the challenges faced by developers and highlight the significance of hardware trust anchors in enhancing security and facilitating effective identity solutions.
2024
Autores
Vilalonga, A; Resende, JS; Domingos, H;
Publicação
2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023
Abstract
Anonymity networks like Tor significantly enhance online privacy but are vulnerable to correlation attacks by state-level adversaries. While covert channels encapsulated in media protocols, particularly WebRTC-based encapsulation, have demonstrated effectiveness against passive traffic correlation attacks, their resilience against active correlation attacks remains unexplored, and their compatibility with Tor has been limited. This paper introduces TorKameleon, a censorship evasion solution designed to protect Tor users from both passive and active correlation attacks. TorKameleon employs K-anonymization techniques to fragment and reroute traffic through multiple TorKameleon proxies, while also utilizing covert WebRTC-based channels or TLS tunnels to encapsulate user traffic.
2024
Autores
Rodrigues, ARF; Silva, ME; Silva, VF; Maia, MRG; Cabrita, ARJ; Trindade, H; Fonseca, AJM; Pereira, JLS;
Publicação
SCIENCE OF THE TOTAL ENVIRONMENT
Abstract
Seasonal and daily variations of gaseous emissions from naturally ventilated dairy cattle barns are important figures for the establishment of effective and specific mitigation plans. The present study aimed to measure methane (CH4) and ammonia (NH3) emissions in three naturally ventilated dairy cattle barns covering the four seasons for two consecutive years. In each barn, air samples from five indoor locations were drawn by a multipoint sampler to a photoacoustic infrared multigas monitor, along with temperature and relative humidity. Milk production data were also recorded. Results showed seasonal differences for CH4 and NH3 emissions in the three barns with no clear trends within years. Globally, diel CH4 emissions increased in the daytime with high intra-hour variability. The average hourly CH4 emissions (g h-1 livestock unit- 1 (LU)) varied from 8.1 to 11.2 and 6.2 to 20.3 in the dairy barn 1, from 10.1 to 31.4 and 10.9 to 22.8 in the dairy barn 2, and from 1.5 to 8.2 and 13.1 to 22.1 in the dairy barn 3, respectively, in years 1 and 2. Diel NH3 emissions highly varied within hours and increased in the daytime. The average hourly NH3 emissions (g h-1 LU-1) varied from 0.78 to 1.56 and 0.50 to 1.38 in the dairy barn 1, from 1.04 to 3.40 and 0.93 to 1.98 in the dairy barn 2, and from 0.66 to 1.32 and 1.67 to 1.73 in the dairy barn 3, respectively, in years 1 and 2. Moreover, the emission factors of CH4 and NH3 were 309.5 and 30.6 (g day- 1 LU-1), respectively, for naturally ventilated dairy cattle barns. Overall, this study provided a detailed characterization of seasonal and daily gaseous emissions variations highlighting the need for future longitudinal emission studies and identifying an opportunity to better adequate the existing mitigation strategies according to season and daytime.
2024
Autores
Lopes, J; Partida, A; Pinto, P; Pinto, A;
Publicação
OPTIMIZATION, LEARNING ALGORITHMS AND APPLICATIONS, PT I, OL2A 2023
Abstract
Information systems depend on security mechanisms to detect and respond to cyber-attacks. One of the most frequent attacks is the Distributed Denial of Service (DDoS): it impairs the performance of systems and, in the worst case, leads to prolonged periods of downtime that prevent business processes from running normally. To detect this attack, several supervised Machine Learning (ML) algorithms have been developed and companies use them to protect their servers. A key stage in these algorithms is feature pre-processing, in which, input data features are assessed and selected to obtain the best results in the subsequent stages that are required to implement supervised ML algorithms. In this article, an innovative approach for feature selection is proposed: the use of Visibility Graphs (VGs) to select features for supervised machine learning algorithms used to detect distributed DoS attacks. The results show that VG can be quickly implemented and can compete with other methods to select ML features, as they require low computational resources and they offer satisfactory results, at least in our example based on the early detection of distributed DoS. The size of the processed data appears as the main implementation constraint for this novel feature selection method.
2024
Autores
Ferreira, IA; Palazzo, G; Pinto, A; Pinto, P; Sousa, P; Godina, R; Carvalho, H;
Publicação
OPERATIONS MANAGEMENT RESEARCH
Abstract
Adopting innovative technologies such as blockchain and additive manufacturing can help organisations promote the development of additive symbiotic networks, thus pursuing higher sustainable goals and implementing circular economy strategies. These symbiotic networks correspond to industrial symbiosis networks in which wastes and by-products from other industries are incorporated into additive manufacturing processes. The adoption of blockchain technology in such a context is still in a nascent stage. Using the case study method, this research demonstrates the adoption of blockchain technology in an additive symbiotic network of a real-life context. The requirements to use a blockchain network are identified, and an architecture based on smart contracts is proposed as an enabler of the additive symbiotic network under study. The proposed solution uses the Hyperledger Fabric Attribute-Based Access Control as the distributed ledger technology. Even though this solution is still in the proof-of-concept stage, the results show that adopting it would allow the elimination of intermediary entities, keep available tracking records of the resources exchanged, and improve trust among the symbiotic stakeholders (that do not have any trust or cooperation mechanisms established before the symbiotic relationship). This study highlights that the complexity associated with introducing a novel technology and the technology's immaturity compared to other data storage technologies are some of the main challenges related to using blockchain technology in additive symbiotic networks.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.