• Home
  • Bogdan Ksiezopolski
Bogdan Ksiezopolski

Bogdan Ksiezopolski
Maria Curie-Sklodowska University in Lublin, Poland and Polish-Japanese Institute of Information Technology, Warswa, Poland · Computer Science

Ph.D, D.Sc

About

67
Publications
17,972
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
363
Citations
Additional affiliations
October 2012 - present
Polish-Japanese Academy of Information Technology
Position
  • Professor (Assistant)
January 2001 - December 2014
Maria Curie-Sklodowska University in Lublin
Position
  • Professor (Assistant)

Publications

Publications (67)
Conference Paper
Full-text available
Cybersecurity is frequently mentioned today as one of the necessary competences of the future in the field of information technology. Along with the global digitization of services, the demand for cybersecurity specialists continues to grow. At the same time, there are still very few specialists in this field, with 5 million jobs currently going un...
Conference Paper
Full-text available
Distributed Denial of Service (DDoS) is one of the most popular attacks on the Internet. One of the most popular classes of DDoS attacks is the flood-based, which sends huge amounts of packets to the victim host or infrastructure, causing an overload of the system. One of the attack mitigation systems is based on machine learning (ML) methods, whic...
Article
Full-text available
Today’s IT systems are characterized by a high complexity and the increasing number of sub-systems, as well as the physical equipment needed. That raises the problem of keeping the whole architecture secure, as it has been revealed in recent years by numerous scandals related to data leaks from inadequately secured systems. Several ontology-based a...
Conference Paper
Full-text available
Security of cryptographic keys is one of the mostimportant issues in a key management process. The questionarises whether modern technology really allows for a highlevel of physical protection and security of sensitive dataandcryptographic keys. The article considers various contemporarytypes of threats associated with the storage of secret keys.We...
Article
Full-text available
Security of cryptographic keys is one of the most important issues in a key management process. The question arises whether modern technology really allows for a high level of physical protection and security of sensitive data and cryptographic keys. The article considers various contemporary types of threats associated with the storage of secret k...
Article
Full-text available
The techniques of Dynamic Line Rating (DLR) for Overhead Transmission Line (OTL)’s are currently dynamically developed. DLR systems typically rely on weather, temperature, inclination, and current measurements to calculate tension and sag, where sensors need to be installed directly on wires. Such systems are very reliable and ensure high accuracy...
Article
Full-text available
Existing transmission power grids suffer from high maintenance costs and scalability issues along with a lack of effective and secure system monitoring. To address these problems, we propose to use Wireless Sensor Networks (WSNs) as a technology to achieve energy efficient, reliable, and low-cost remote monitoring of transmission grids. With WSNs,...
Conference Paper
The growing number of mobile devices and the popularity of Internet of Things (IoT) applications have caused an increase of local-area location-aware protocols and applications. Localization has become a popular topic in the literature and many localization algorithms in wireless sensor networks (WSN) have been proposed. However, the most of them a...
Conference Paper
One of the key issues concerning IT systems is Information Security Management. Among the security objectives in the ISO/IEC 27002:2013 standard refers to information security awareness, education and training. In this area there are many important aspects but in this paper authors focus on people, their knowledge and their security awareness. Auth...
Article
Full-text available
Information management is one of the most significant issues in nowadays data centers. Selection of appropriate software, security mechanisms and effective energy consumption management together with caring for the environment enforces a profound analysis of the considered system. Besides these factors, financial analysis of data center maintenance...
Article
Full-text available
Security management in wireless networks has to deal with the changing character of the environment, which can further lead to decision making problem for unexpected events. Among a huge list of devices, the mobile ones are especially vulnerable to this situation. The solution for adapting systems and applications to dynamic environments can be con...
Article
Full-text available
The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stabi...
Article
Full-text available
In the today's world in many organizations, the information security management is one of the most important tasks to be done. Among the tasks which must be considered during security management is that the processes need to be monitored and verified. In the article, we introduce a new security measurement model which extends the approach presented...
Article
Full-text available
Security management is one of the most significant issues in nowadays data centers. Selection of appropriate security mechanisms, effective energy consumption management together with caring for the environment enforces a profound analysis of the considered system. In this paper, we propose a specialized decision support system with a multi-level,...
Conference Paper
Analysis of security economics for the IT systems is one of the important issues to be solved. The quality of protection (QoP) of IT System can be achieved on different levels. One can choose factors which have a different impact on the overall system security. Traditionally, security engineers configure IT systems with the strongest possible secur...
Conference Paper
Full-text available
Analysis of security economics for the IT systems is one of the important issues to be solved. The quality of protection (QoP) of IT System can be achieved on different levels. One can choose factors which have a different impact on the overall system security. Traditionally, se- curity engineers configure IT systems with the strongest possible sec...
Conference Paper
Full-text available
Balancing security against performance for IT systems is one of the most important issues to be solved. The quality of protection of systems can be achieved on different levels. One can choose factors which have a different impact on the overall system security. Traditionally, security engineers configure IT systems with the strongest possible secu...
Book
In order to perform effective analysis of today’s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and accounts for all of the significant details. Enabling...
Book
In order to perform effective analysis of today's information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and accounts for all of the significant details. Enabling t...
Conference Paper
Full-text available
To facilitate the management of permissions in complex secure systems, the concept of reference models for role-based access control (RBAC) has been proposed. However, among many existing RBAC analyses and implementations, there still exists the lack of the evaluation of its impact on the overall system performance. In this paper, to reduce this de...
Article
Full-text available
With a rapid progress of numerous applications in wireless sensor networks (WSNs), performance evaluation and analysis techniques face new challenges in energy efficiency area in WSN applications. One of the key issues is to perform the security trade-off and energy efficiency analysis. In this paper, the energy analysis module for the QoP-ML (Qual...
Article
Full-text available
Pipelines, wellbores and ground installations are permanently controlled by sensors spread across the crucial points in the whole area. One of the most popular techniques to support proper oil drive in a wellbore is a Gas Lift. In this paper we present the concept of using wireless sensor network (WSN) in the oil and gas industry installations. Ass...
Conference Paper
Nowadays, security has become one of the most mandatory essences in the development and functioning of many software systems. For the reason of complexity of designing secure systems, distinct approaches that allow developers to focus on particular properties of the system of importance for their purpose are proposed. The majority of them are model...
Article
Full-text available
Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable...
Conference Paper
Full-text available
Designing secure authentication mechanisms in wireless sensor networks in order to associate a node to a secure network is not an easy task due to the limitations of this type of networks. In this paper, we propose different multihop node authentication protocols for wireless sensor networks. For each protocol, we provide a formal proof using Scyth...
Conference Paper
Reputation systems are an important factor for building trust in virtual communities. In the article we introduce reputation module for Quality of Protection Modelling Language which allows to represent the reputation system as a part of the protocol, where all operations and communication steps can be consistently modelled. Owing to the proposed a...
Conference Paper
Information security management is one of the most important issues to be resolved. The key element of this process is risk analysis. The standards are (ISO/IEC 27000, ISO/IEC 31000) based on the complex and time consuming process of defining vulnerabilities and threats for all organisation assets. In the article we present a new approach to analys...
Article
Full-text available
The ensuring reliability of wireless sensor networks (WSN) is one of most important problems to be solved. In this article, the influence of the security and communication factors in the reliability of wireless sensor networks was analyzed. Balancing security against performance in WSN is another issue to be solved. These factors should be consider...
Conference Paper
Full-text available
The development of the Internet is sustainable because of existing business models. Among them one of the most common is currently pay-per-click which is based on recording users' behaviors (in particular clicks but it may also be actions) and charging advertisers according to this information. On the other hand registering users clicks causes a se...
Conference Paper
The problem of efficiency in the IT systems is now widely discussed. One of the factors affecting the performance of IT systems is implementation and maintaining a high level of security. In many cases the guaranteed security level is too high in relation to the real threats. The implementation and maintenance of this protection level is expensive...
Article
Cryptographic protocols can be realized on different levels of security. One can choose factors which have different impact on the overall system security. Traditionally, protocols have been configured with the strongest possible security mechanisms. Unfortunately, the strongest protection (especially in low resource devices) can lead to the denial...
Article
Full-text available
In this paper we examine the inuence of dierent types of encryption and authentication on the quality of transmitted data in high-performance WSN based on Imote2. The performance has been tested in wireless sensor network using Collection Tree Protocol. The examined types and modes of encryption are provided by the hardware of used sensor platforms...
Article
Full-text available
The security modelling of IT systems is a very complicated task. One of the issues which must be analysed is the performance of IT systems. In many cases the guaranteed security level is too high in relation to the real threats. The overestimation of security measures can decrease system performance. The paper presents the analysis of Kerberos cryp...
Conference Paper
The security audit is the process of checking compliance of the IT systems with information security managements system policy. The IT audit process according to full ISO 27002 standard is very complex issue. In this article we introduce the guidelines that point out which parts of ISO 27002 are selected for creating role based questionnaires which...
Conference Paper
Wireless Sensor Networks (WSNs) found applications in different hostile environments. Addressing messages to a given node or a group of nodes in these situations is a very important and difficult task. Often one should address all nodes from a given area. In this paper we propose a new approach to the addressing problem. Our proposal is primarily...
Article
Full-text available
Cryptographic protocols are secure due to applica-tion of security services. The security services applied for their protection can be classified into the three groups: hard, soft and extended. Among the extended ones, we can point out to the availability of the goal of the security protocol, which guarantees that protocols aims are achieved. In th...
Conference Paper
Traffic in Wireless Sensor Network (WSN) consists of short packets sent by nodes that are usually identical in respect of software applied and their hardware architecture. In such a communication environment it is important to guarantee authentication of the nodes. The most popular way to achieve this basic security service is using Message Authent...
Conference Paper
Recently we have observed the growth of the intelligent application especially with its mobile character, called e-anything. The implementation of these applications provides guarantee of security requirements of the cryptographic protocols which are used in the application. Traditionally the protocols have been configured with the strongest possib...
Article
Symmetric block ciphers are usually used in WSN for security services. This paper puts forward the idea of using advanced modes of operation of symmetric block ciphers to achieve confidentiality and authentication in one cryptographic operation. The modes of operation approved by NIST that is CMAC, CCM, GCM/GMAC are applied here. The benchmarks of...
Article
Full-text available
Nowadays, storing the information is fundamental for the correct functioning of any organization. The critical factor is to guarantee the security of the stored data. In the traditional database systems the security requirements are limited to confidentiality, integrity, availability of the data and user authorization. The criticality of the databa...
Conference Paper
Full-text available
Recently, we have observed the growth of the E-voting cryptographic protocols. The researchers have presented many solutions and extended the list of requirements. With the expandig of the internet the protocols must improve it's safety. The aim of this paper is to deliver an analysis of a new e-voting protocol based on Cetinkaya's DynaVote solutio...
Conference Paper
The security of information exchange between the parts in the teleinformatic infrastructure is one of the crucial topics. During the protecting the infrastructure of the organization, one can use a lot of mechanisms which are often based on the cryptographic primitives. Traditionally, the security officers model the protection system to be as stron...
Article
Security protocols used in today's communication are complex and it is very difficult to analyze and optimize them. Literature reports some results which optimize security protocols. In the case of devices with limited resources (mobile phones, PDA, sensors) the speed and efficiency of the process is crucial for their stable work. Security methods...
Article
Electronic services in dynamic environment (e.g. e-government, e-banking, e-commerce, etc.), meet many different barriers reducing their efficient applicability. One of them is the requirement of information security when it is transmitted, transformed, and stored in an electronic service. It is possible to provide the appropriate level of security...
Article
Full-text available
In the article we show an attack on the cryptographic protocol of electronic auction with extended requirements [1]. The found attack consists of authentication breach and secret retrieval. It is a kind of “man in the middle attack”. The intruder impersonates an agent and learns some secret information. We have discovered this flaw using OFMC an au...
Conference Paper
Full-text available
Distributed sensor networks meet many different barriers that reduce their efficient applicabil- ity. One of them is requirement of assurance of the information security when it is transmitted, transformed, and stored in the electronic service. It is possible to provide an appropriate level of security applying the pre- sent-day information technol...
Conference Paper
Full-text available
Public services called "e-anything" (e-government, e-banking, e-commerce, etc.) meet many different barriers, which reduce their efficient applicability. One of them is requirement of assurance of the information security when it is transmitted, transformed, and stored in the electronic service. It is possible to provide an appropriate level of sec...
Conference Paper
Full-text available
Public services called "e-anything" (e-government, e-army, e-banking, e-commerce, e-logistic, etc.) meet many different barriers, which reduce their efficient applicability. One of them is requirement of assurance of the information security when it is transmitted, transformed, and stored in an electronic service. Creating proper information securi...
Article
Full-text available
In this paper we present a cryptographic protocol which is the realization of an electronic auction being the component of the e-government system. This cryptographic protocol fulfils all the functions of the classic auction and additionally, by use of cryptographic primitives, enhances the protection of information. The characteristic features of...
Article
Full-text available
In this work we present the multiple criteria optimal decision-making system (protocol) that guarantees the cryptographic safety of the whole process, and, in particular, the confidentiality and foreseeable realization. With solving multiple criteria questions, it is worth to pay attention on determination of several key parameters. First of them i...
Article
Full-text available
Public services called "e-everything" (e-government, e-banking, e-commerce, etc.) meet many different barriers that reduce their efficient applicability. One of them is requirement of assurance of the information security when it is transmitted, transformed, and stored in the electronic service. It is possible to provide an appropriate level of sec...
Article
One of the main components of public key infrastructure (PKI) is the center of certification. The function which it can fulfill, depends on the specific protocol. In the article the center of certification is the trustworthy third part, which includes the center of authorization (CA) and time stamping authority (TSA). The center of certification is...
Article
Full-text available
Public services called "e-anything" (e- government, e-army, e-banking, e-commerce, e- logistic, etc.) meet many different barriers, which reduce their efficient applicability. One of them is requirement of assurance of the information security when it is transmitted, transformed, and stored in an electronic service. Creating proper information secu...
Article
Full-text available
Od kilkunastu lat społeczeństwo w jakim się znajdujemy staje się "Społeczeństwem Informacyjnym". Pojęcie "Społeczeństwa Informacyjnego" jest szeroko opisywana w literaturze, trafnym wydaje się być określenie, że "społeczeństwo informacyjne jest etapem w rozwoju cywilizacji, w którym społeczeństwo i gospodarka skoncentrowane są na produkcji, dystryb...

Network

Cited By

Projects

Projects (2)
Project
The goal of the project is to develop 1024 - 4096 bit key management system based on DNA strands.