2022
Authors
Martins, I; Resende, JS; Sousa, PR; Silva, S; Antunes, L; Gama, J;
Publication
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
Abstract
The Internet of Things (IoT) envisions a smart environment powered by connectivity and heterogeneity where ensuring reliable services and communications across multiple industries, from financial fields to healthcare and fault detection systems, is a top priority. In such fields, data is being collected and broadcast at high speed on a continuous and real-time scale, including IoT in the streaming processing paradigm. Intrusion Detection Systems (IDS) rely on manually defined security policies and signatures that fail to design a real-time solution or prevent zero-day attacks. Therefore, anomaly detection appears as a prominent solution capable of recognizing patterns, learning from experience, and detecting abnormal behavior. However, most approaches do not fit the urged requirements, often evaluated on deprecated datasets not representative of the working environment. As a result, our contributions address an overview of cybersecurity threats in IoT, important recommendations for a real-time IDS, and a real-time dataset setting to evaluate a security system covering multiple cyber threats. The dataset used to evaluate current host-based IDS approaches is publicly available and can be used as a benchmark by the community.
2022
Authors
Silva, S; Sousa, PR; Resende, JS; Coelho Antunes, LF;
Publication
Trust, Privacy and Security in Digital Business - 19th International Conference, TrustBus 2022, Vienna, Austria, August 24, 2022, Proceedings
Abstract
A honeypot is a controlled and secure environment to examine different threats and understand attack patterns. Due to the highly dynamic environments, the growing adoption and use of Internet of Things (IoT) devices make configuring honeypots complex. One of the current literature challenges is the need for a honeypot not to be detected by attackers, namely due to the delays that are required to make requests to external and remote servers. This work focuses on deploying honeypots virtually on IOT devices. With this technology, we can use endpoints to send specific honeypots on recent known vulnerabilities on IOT devices to find and notify attacks within the network, as much of this information is verified and made freely available by government entities. Unlike other approaches, the idea is not to have a fixed honeypot but a set of devices that can be used at any time as a honeypot (adapted to the latest threat) to test the network for a possible problem and then report to Threat Sharing Platform (TSP). © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
2022
Authors
Sousa, PR; Resende, JS; Martins, R; Antunes, L;
Publication
JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT
Abstract
Purpose The aim of this paper is to evaluate the use of blockchain for identity management (IdM) in the context of the Internet of things (IoT) while focusing on privacy-preserving approaches and its applications to healthcare scenarios. Design/methodology/approach The paper describes the most relevant IdM systems focusing on privacy preserving with or without blockchain and evaluates them against ten selected features grouped into three categories: privacy, usability and IoT. Then, it is important to analyze whether blockchain should be used in all scenarios, according to the importance of each feature for different use cases. Findings Based on analysis of existing systems, Sovrin is the IdM system that covers more features and is based on blockchain. For each of the evaluated use cases, Sovrin and UniquID were the chosen systems. Research limitations/implications This paper opens new lines of research for IdM systems in IoT, including challenges related to device identity definition, privacy preserving and new security mechanisms. Originality/value This paper contributes to the ongoing research in IdM systems for IoT. The adequacy of blockchain is not only analyzed considering the technology; instead the authors analyze its application to real environments considering the required features for each use case.
2022
Authors
Goncalves, R; Ferreira, I; Godina, R; Pinto, P; Pinto, A;
Publication
BLOCKCHAIN AND APPLICATIONS
Abstract
Pulp and Paper Companies collaborate to monitor and monetize waste and create value from their by-products. This process of Industrial Symbiosis requires the creation and maintenance of trusted and transparent relationships between all entities participating in these networks, which is a constant challenge. In this context, a blockchain-based system can help in establishing and maintaining these networks, serving as a ground truth between companies operating at a national or a global scale. This paper proposes a scalable and modular blockchain architecture design using smart contracts to enhance the industrial symbiosis process of the Pulp, Paper, and Cardboard Production Sector companies in Portugal. This design comprehends all entities participating in the network. The implementation of this design assumes the use of a permissioned ledger built using Hyperledger Fabric to provide the required trust and transparency between all entities.
2022
Authors
Prieto, J; Partida, A; Leitão, P; Pinto, A;
Publication
BLOCKCHAIN
Abstract
The 3rd International Congress on Blockchain and Applications 2021 will be held
in Salamanca from 6 to 8 of October. This annual congress will reunite blockchain
and artificial intelligence (AI) researchers, who will share ideas, projects, lectures,
and advances associated with those technologies and their application domains.
Among the scientific community, blockchain and AI are seen as a promising
combination that will transform the production and manufacturing industry, media,
finance, insurance, e-government, etc. Nevertheless, there is no consensus with
schemes or best practices that would specify how blockchain and AI should be used
together. Combining blockchain mechanisms and artificial intelligence is still a
particularly challenging task.
The BLOCKCHAIN’21 congress is devoted to promoting the investigation of
cutting-edge blockchain technology, to exploring the latest ideas, innovations,
guidelines, theories, models, technologies, applications and tools of blockchain and
AI for the industry, and to identifying critical issues and challenges those
researchers and practitioner must deal with in the future research. We want to offer
researchers and practitioners the opportunity to work on promising lines of research
and to publish their developments in this area.
The technical program has been diverse and of high quality, and it focused on
contributions to both, well-established and evolving areas of research. More than 44
papers have been submitted to 38 from over 20 different countries (Canada, France,
Germany, India, Ireland, Italy, Jordan, Luxembourg, Malaysia, Malta, Morocco,
Netherlands, Oman, Portugal, Slovenia, Spain, Sweden, United Arab Emirates, and
USA).
We would like to thank all the contributing authors, the members of the Program
Committee, the sponsors (IBM, Indra, EurAI, AEPIA, AFIA, APPIA, and AIR
Institute), and the Organizing Committee for their hard and highly valuable work.
We are especially grateful for the funding supporting by project “XAI - XAI -
Sistemas Inteligentes Auto Explicativos creados con Módulos de Mezcla de
Expertos,” ID SA082P20, financed by Junta Castilla y León, Consejería de
Educación, and FEDER funds. Their work contributed to the success of the
BLOCKCHAIN’21 event and, finally, the Local Organization Members and the Program Committee Members for their hard work, which was essential for the
success of BLOCKCHAIN’21.
2022
Authors
Sousa, P; Pinto, A; Pinto, P;
Publication
J. Cybersecur. Priv.
Abstract
Messaging services are usually provided within social network platforms and allow these platforms to collect additional information about users, such as what time, for how long, with whom, and where a user communicates. This information allows the identification of users and is available to the messaging service provider even when communication is encrypted end-to-end. Thus, a gap still exists for alternative messaging services that enable anonymous and confidential communication and that are independent of a specific online service. Online services can still be used to support this messaging service, but in a way that enables users to communicate anonymously and without the knowledge and scrutiny of the online services. In this paper, we propose messaging using steganography and online services to support anonymous and confidential communication. In the proposed messaging service, only the sender and the receiver are aware of the existence of the exchanged data, even if the online services used or other third parties have access to the exchanged secret data containers. This work reviews the viability of using existing online services to support the proposed messaging service. Moreover, a proof-of-concept of the proposed message service is implemented and tested using two online services acting as proxies in the exchange of encrypted information disguised within images and links to those images. The obtained results confirm the viability of such a messaging service. © 2022 by the authors.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.