Review
Chemistry, Analytical
Michal Trnka, Amr S. Abdelfattah, Aishwarya Shrestha, Michael Coffey, Tomas Cerny
Summary: This review analyzes the taxonomy and current practices of security solutions in the IoT, providing an overview and guidance for recent research efforts.
Review
Chemistry, Analytical
Kazi Istiaque Ahmed, Mohammad Tahir, Mohamed Hadi Habaebi, Sian Lun Lau, Abdul Ahad
Summary: With the ongoing efforts for widespread IoT adoption, security remains a key factor hindering its wide acceptance. Machine learning techniques are being used to assist in authentication and authorization processes, but current schemes are not sufficient to ensure IoT network security due to various constraints.
Article
Computer Science, Information Systems
Luca Ferretti, Francesco Longo, Giovanni Merlino, Michele Colajanni, Antonio Puliafito, Nachiket Tapas
Summary: Modern industrial systems are enriched with cyber-physical devices and interconnected with business processes for flexible production and remote monitoring, but they are also vulnerable to cyber attacks and misbehaving authorized parties. A proposed authorization delegation procedure regulates access to industrial resources, ensuring benefits such as auditing, detecting misconducts, and attributing improper behaviors, while also meeting security and performance requirements. Performance and latencies of the auditing mechanisms are evaluated through a prototype test.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
(2021)
Article
Chemistry, Analytical
Muhammad Asif, Zeeshan Aziz, Maaz Bin Ahmad, Adnan Khalid, Hammad Abdul Waris, Asfandyar Gilani
Summary: This paper presents a blockchain-based security mechanism to address the security concerns in IoT-based systems. The mechanism enables secure authorized access to smart city resources through an authorization blockchain and an object security model. Experimental results demonstrate that the proposed mechanism performs well and is feasible.
Article
Computer Science, Information Systems
Fatimah Hussain Al-Naji, Rachid Zagrouba
Summary: This research explores the use of Blockchain technology to provide real-time and non-intrusive continuous authentication for the IoT environment. It introduces the CAB-IoT solution, which utilizes a fog node layer to handle heavy authentication tasks and overcomes the limitations of IoT resources. The solution also incorporates a trust module based on face recognition machine learning and implements mutual authentication and secure communication between users and nodes.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Computer Science, Information Systems
Y. Jani, P. Raajan
Summary: Information technology plays a crucial role in securing patient data in the medical field. This study proposes a secure data transfer solution using cipher hashing and blockchain-based user verification, which outperforms existing methods based on performance analysis.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Roobaea Alroobaea, Rajakumar Arul, Saeed Rubaiee, Fahd S. Alharithi, Usman Tariq, Xincan Fan
Summary: The Internet of Things (IoT) is a network of intelligent devices that interact with each other. It has applications in various fields such as business, logistics, health monitoring, and smart ecosystem, involving information about individuals, social, and private environments. The increasing security challenges in this communication network require the development of authentication and authorization concepts. This paper presents an artificial intelligence (AI)-assisted Bio-inspired algorithm for secure IoT communication networks (AI-BIAS) to enhance communication in the future.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2022)
Review
Computer Science, Hardware & Architecture
Sabrina Sicari, Alessandra Rizzardi, Alberto Coen-Porisini
Summary: This paper discusses the importance of organizing information storage and database data retrieval in cloud and IoT applications, as well as the challenges in managing big data and security. The author analyzes the security and privacy solutions tailored to NoSQL databases and highlights current challenges and future research directions.
Article
Computer Science, Information Systems
Fei Tong, Xing Chen, Cheng Huang, Yujian Zhang, Xuemin Shen
Summary: This article presents a blockchain-assisted scheme for achieving intra- and inter-domain authorization and authentication in the multidomain Internet of Things (IoT). A contract-based mutual access control agreement is designed on a consortium blockchain, allowing domain managers to manage access permissions. A secure and privacy-preserving authentication protocol is proposed, enabling IoT devices to anonymously access authorized IoT domains. A voting-based protocol is also designed, enabling transparent resource access auditing with the assistance of the blockchain. Security analysis demonstrates the achievement of important security properties. Prototypes developed in physical and virtual environments validate the efficiency of the scheme.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Mathematics
Lili Jiang, Hui Cui
Summary: Based on attribute-based encryption (ABE), this paper proposes two private and mutual authentication protocols to protect the privacy of IoT devices. The first protocol is a three-message key exchange protocol, following the public-key encryption mode of the Internet Key Exchange (IKE). The second protocol is a one-round key exchange protocol, providing simplicity and efficiency in message communication between participants. Both protocols can be proven secure in the defined model. Finally, the two protocols are implemented in an open source framework.
Article
Computer Science, Information Systems
Alessandra Rizzardi, Sabrina Sicari, Alberto Coen-Porisini
Summary: This paper investigates the security features of IoT and the advantages and weaknesses of various protocols, aiming to identify open issues and best practices in designing efficient and robust IoT network infrastructure.
Article
Computer Science, Theory & Methods
Mohammed Al-Sadi, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini
Summary: Started as a hyped technology a few years ago, IoT is now a reality providing sensing and computing capabilities from SCADA systems to households. Access management and continuous authentication are stringent needs for ensuring the sensitivity, privacy, and security of shared data in the IoT environment.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2023)
Article
Computer Science, Hardware & Architecture
Yangchen Palmo, Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai
Summary: In the era of digital transformation, the Internet is rapidly evolving with the rise of IoT and AI. This has led to an increase in information security incidents, including internal fraud in telework and other scenarios. To address this, the software-defined perimeter (SDP) has gained attention as a zero-trust model that ensures users' security through authentication and authorization for each service provided. The integration of SDP and IoT is expected, but the security of IoT itself remains a challenge due to resource limitations. This article proposes a method to securely embed IoT into SDP by compensating for the lack of IoT resources. Qualitative evaluation shows that the identity provider is the most effective federation method for authentication and authorization in SDP.
IEEE CONSUMER ELECTRONICS MAGAZINE
(2023)
Article
Computer Science, Information Systems
Mahmud Hossain, Golam Kayas, Yasser Karim, Ragib Hasan, Jamie Payton, S. M. Riazul Islam
Summary: This article introduces a compression-aware authorization protocol called CATComp, which enables IoT devices to exchange small-sized certificates and capability tokens over the IEEE 802.15.4 medium. By reducing the size of security materials, CATComp decreases communication latency and energy consumption, thereby improving device response speed and battery life.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Hardware & Architecture
Mohamad Wazzeh, Hakima Ould-Slimane, Chamseddine Talhi, Azzam Mourad, Mohsen Guizani
Summary: Continuous authentication for mobile devices is a mechanism that confirms users' identities by studying their behavioral interactions with their devices. Existing approaches heavily rely on collecting users' personal data, which raises privacy concerns. To address this issue, a federated learning-based authentication mechanism is proposed, which protects users' privacy by allowing local model training and global aggregation. Experimental results show a significant improvement in user authentication.
Article
Computer Science, Information Systems
Timotheus Kampik, Adnane Mansour, Olivier Boissier, Sabrina Kirrane, Julian Padget, Terry R. Payne, Munindar P. Singh, Valentina Tamma, Antoine Zimmermann
Summary: This article discusses the history of autonomous agent research, highlights the importance of norms, policies, and preferences for autonomous agent behavior, and identifies the lack of attention to normative concepts in Web-based multiagent systems as a challenge.
ACM TRANSACTIONS ON INTERNET TECHNOLOGY
(2022)
Article
Automation & Control Systems
Samuel H. Christie, Amit K. Chopra, Munindar P. Singh
Summary: The article presents a programming model for decentralized applications that enables communication between autonomous agents through an information protocol. It addresses the challenges in decentralized applications without relying on infrastructure guarantees, and provides a straightforward approach for implementing protocol-compliant agents, transforming protocols into fault-tolerant ones, and implementing fault-tolerance in agents based on protocol capabilities.
AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS
(2022)
Article
Computer Science, Cybernetics
Veljko Dubljevic, Sean Douglas, Jovan Milojevich, Nirav Ajmeri, William A. Bauer, George List, Munindar P. Singh
Summary: Artificial intelligence has raised significant social and ethical concerns, particularly regarding accountability, autonomy, dignity, and justice. This study focuses on the impact of autonomous vehicle technology on professional drivers. The findings reveal drivers' concerns about safety, apprehension about reskilling, and the desire for transparency from employers regarding the introduction of AVs.
BEHAVIOUR & INFORMATION TECHNOLOGY
(2023)
Article
Computer Science, Artificial Intelligence
Mehdi Mashayekhi, Nirav Ajmeri, George F. List, Munindar P. Singh
Summary: Multi-agent systems are adaptable and social norms can influence their social structure and individual decision-making. This study proposes a framework called Cha that supports the emergence of prosocial norms in multi-agent systems, allowing for continual change and dynamicity. Simulation experiments show that Cha can improve the aggregate societal gains and fairness of outcomes.
ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS
(2022)
Editorial Material
Computer Science, Software Engineering
V. Samuel H. Christie, Lalana Kagal, Alessandro Ricci, Munindar P. Singh
Summary: This article focuses on decentralized systems, which are composed of autonomous entities. These entities have the ability to make decisions for themselves and can represent different individuals or organizations with diverse ownership or control. Heterogeneity in design and construction allows the entities to apply reasoning methods freely.
IEEE INTERNET COMPUTING
(2022)
Article
Computer Science, Artificial Intelligence
Amanul Haque, Nirav Ajmeri, Munindar P. Singh
Summary: It is well recognized that the Web has an impact on user polarization, which extends beyond politics and affects public health matters such as vaccination. Understanding polarization in social networks is a complex task as it depends not only on user attitudes but also their interactions and exposure to information. By adopting the Social Judgment Theory and empirical evidence from previous research, we created a social simulation to examine the effects of content sharing on user satisfaction and polarization within a social network. Our findings demonstrate that (1) higher user tolerance decelerates polarization but leads to lower user satisfaction; (2) increased selective exposure results in higher polarization and limited user reach; and (3) both higher tolerance and selective exposure contribute to a more homophilic social network.
Article
Computer Science, Hardware & Architecture
Amika M. Singh, Munindar P. Singh
Summary: The expansion of AI highlights the need for ethical and trustworthy development. We propose a novel model called Wasabi, which adapts the ability-benevolence-integrity model of trust to trustworthiness.
Article
Computer Science, Software Engineering
Munindar P. Singh, Pradeep K. Murukannaiah
Summary: As smart cities grow, an ethical framework becomes more necessary but is currently ignored in favor of focusing on data challenges. However, a smart city involves more than just data gathering; it involves the interactions of residents, businesses, and government with various resources and regulations. This article proposes a sociotechnical view and its mapping to moral foundation theory to provide a comprehensive ethical framework for smart cities.
IEEE INTERNET COMPUTING
(2023)
Article
Computer Science, Software Engineering
Munindar P. Singh, Min Chi, Veena Misra
Summary: We propose a new integrated suite of multimodal sensing and artificial intelligence techniques that incorporate advancements in health psychology to address long-term healthful living. We discuss the challenges and opportunities in realizing this vision.
IEEE INTERNET COMPUTING
(2023)
Editorial Material
Computer Science, Artificial Intelligence
Michael Pflanzer, Veljko Dubljevic, William A. A. Bauer, Darby Orcutt, George List, Munindar P. P. Singh
Article
Computer Science, Cybernetics
Ruijie Xi, Munindar P. P. Singh
Summary: Psychological studies suggest that language and semantics play a role in morality. However, current empirical studies lack the complexity of real-life situations. This article examines over 30,000 narratives from a social media forum to assess the generalizability of previous findings. Using natural language processing techniques, the authors investigate how language influences blame assignment. Their findings show that psychological theories can help understand real-life moral situations and reveal biases in blame assignment on social media, with males more likely to be blamed regardless of their role.
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS
(2023)
Article
Automation & Control Systems
Geeta Mahala, Ozgur Kafali, Hoa Dam, Aditya Ghose, Munindar P. Singh
Summary: This research models a multiagent system using socio-technical terms, emphasizing autonomy and explicitly stating assumptions about both social and technical layers. The researchers present a framework, ReNo, which computes probabilistic and temporal guarantees to evaluate system resilience and provide guidance to meet stakeholder requirements. An important contribution of this research is demonstrating how the social and technical layers can be jointly modeled to construct resilient systems of autonomous agents.
AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS
(2023)
Proceedings Paper
Computer Science, Information Systems
Ahmed H. Anwar, Mu Zhu, Zeilin Wan, Jin-Hee Cho, Charles A. Kamhoua, Munindar P. Singh
Summary: This paper proposes a hybrid honeypot system that uses both low-interaction honeypots and high-interaction honeypots to defend against malicious reconnaissance activities. A two-player hypergame model is presented to simulate the best strategies for defenders and attackers within the imperfect knowledge of each player.
2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022)
(2022)
Proceedings Paper
Automation & Control Systems
Sz-Ting Tzeng, Nirav Ajmeri, Munindar P. Singh
Summary: By regulating agent interactions and incorporating social preferences, the emergence of prosocial norms can be facilitated. The inclusion of Social Value Orientation (SVO) in agents enables better social experience and robust norm emergence.
COORDINATION, ORGANIZATIONS, INSTITUTIONS, NORMS, AND ETHICS FOR GOVERNANCE OF MULTI-AGENT SYSTEMS XV
(2022)
Proceedings Paper
Computer Science, Artificial Intelligence
Amit K. Chopra, Samuel H. Christie, Munindar P. Singh
Summary: Early researchers recognized the importance of capturing application meaning but didn't know how to handle it programmatically, leading to simplifications in protocols that violated the end-to-end principle. Modern applications require flexibility through modeling application meaning, and alternative meaning-based approaches from the multiagent systems community can provide a new foundation for distributed computing.
ENGINEERING MULTI-AGENT SYSTEMS
(2022)