Article

QoP-ML: Quality of protection modelling language for cryptographic protocols

Authors:
  • Polish-Japanese Institute of Information Technology, Warswa, Poland
To read the full-text of this research, you can request a copy directly from the author.

Abstract

Cryptographic protocols can be realized on different levels of security. One can choose factors which have different impact on the overall system security. Traditionally, protocols have been configured with the strongest possible security mechanisms. Unfortunately, the strongest protection (especially in low resource devices) can lead to the denial of services. In such a situation the quality of protection models which scales the protection level depending on the specific requirements is used.In the article, we proposed the quality of protection modelling language (QoP-ML) which provides the modelling language for abstracting the cryptographic protocols. All of the security operations/mechanisms which are executed while running cryptographic protocols can be modelled with the QoP-ML. In the QoP-ML, the defined operations can be described by the security metrics which allow performing quality of protection evaluation. In the paper, the syntax and semantics of the Quality of Protection modelling language will be presented. Finally, the Needham–Schroeder public key protocol will be modelled by QoP-ML and their QoP evaluation will be discussed.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... The ease with which ASF may be used to handle improvements (Scalability) and boundary alterations inside the current version (Flexibility) is astounding. While geographic analysis identification [23] will outperform residual techniques, it won't fully address the strain that a true preparedness environment should demand. Limited scope, no energy analysis [23] Geographic Analysis Identification Geographic Analysis Improved geographic analysis Incomplete preparedness environment [24] Scalability and Flexibility in DDoS Models ...
... While geographic analysis identification [23] will outperform residual techniques, it won't fully address the strain that a true preparedness environment should demand. Limited scope, no energy analysis [23] Geographic Analysis Identification Geographic Analysis Improved geographic analysis Incomplete preparedness environment [24] Scalability and Flexibility in DDoS Models ...
... To offer a more complete explanation of how we handle DDoS attack investigation, we frequently want to describe it in a series of major topics, which we may gracefully elaborate on in the following parts. The gadget described in [23] is an example of a shaky device to an accomplice degree because it decodes packages that are transiting the device and does not guarantee any safety features. Because of defensive patterns on the machine's presentation, as well as time and power incentives in the backdrop of the test, we may, in this instance, look past judgment stylishly. ...
Article
Full-text available
Wireless Sensor Networks (WSNs) have gained widespread interest as a result of developments in IT technology and the electronics industry. This ground-breaking sensing technology consists of multiple sensor nodes or motes that are placed in an atmosphere to detect constantly changing physical phenomena. These compact sensor nodes gather and interpret data via radio waves. The tiny size of these sensors is advantageous since they may be readily incorporated into any system or system. This capability has prompted the adoption of WSNs, particularly for form monitoring and tracking; most notably, monitoring apps. However, this small scale of sensor nodes limits the capacity of resources. Usually, the WSNs are installed in environments of unsafe or difficult human interference. Critical decisions in emergency applications can require sensible knowledge. It is necessary to check the network security. To extend the network security using Homomorphic Encryption effectively, the available resources must be expanded to a full view. This refers to the development of energy-efficient routing protocol strategies to ensure low energy consumption of common routing protocols and improve the availability and security of WSNs. Homomorphic encryption is effective in improving the security of wireless sensor networks.
... In the article [17] the QoP-ML was introduced. Proposed solution provides the modeling language for making abstraction of cryptographic protocols that puts emphasis on the details concerning the quality of protection. ...
... The QoP metrics define the influence of functions and channels on the quality of protection. In [17] the syntax, semantics and algorithms of the QoP-ML are presented in greater detail. ...
... In QoP-ML, in order to perform a simulation, one needs to prepare and implement 3 basic elements, namely: the model itself, hardware security metrics and miscellaneous scenarios of the considered environment (which are also called versions). For more information about QoP-ML, its syntax, semantics, algorithms and example usages, please refer to [17,21]. ...
Article
Full-text available
Existing transmission power grids suffer from high maintenance costs and scalability issues along with a lack of effective and secure system monitoring. To address these problems, we propose to use Wireless Sensor Networks (WSNs)as a technology to achieve energy efficient, reliable, and low-cost remote monitoring of transmission grids. With WSNs, smart grid enables both utilities and customers to monitor, predict and manage energy usage effectively and react to possible power grid disturbances in a timely manner. However, the increased application of WSNs also introduces new security challenges, especially related to privacy, connectivity, and security management, repeatedly causing unpredicted expenditures. Monitoring the status of the power system, a large amount of sensors generates massive amount of sensitive data. In order to build an effective Wireless Sensor Networks (WSNs) for a smart grid, we focus on designing a methodology of efficient and secure delivery of the data measured on transmission lines. We perform a set of simulations, in which we examine different routing algorithms, security mechanisms and WSN deployments in order to select the parameters that will not affect the delivery time but fulfill their role and ensure security at the same time. Furthermore, we analyze the optimal placement of direct wireless links, aiming at minimizing time delays, balancing network performance and decreasing deployment costs.
... A multidimensional, profound analysis, which allows examining miscellaneous aspects of an attack using logical formulas, is the most reliable approach to deal with DDoS. To the best of the author's knowledge, Quality of Protection Modeling Language (QoP-ML), introduced in [20], is the only existing modeling language which satisfies all these requirements simultaneously. It allows for balancing security against the system efficiency, performing multicriteria analysis and extending the possibility of describing the state of the environment in detail (Analytical Representation). ...
... For additional information about QoP-ML itself, its syntax, semantics, algorithms, and capabilities, please refer to [20,21]. ...
... Sensor, which is subject to a DDoS attack, is modeled in Listing 3. Its function is to handle incoming requests (line (10)), preserve (lines (12)-(13)), and finally process them (line (20)). When the data coming to sink both from compromised motes is encrypted, before processing, sink decrypts data packets (lines (15)- (18)). ...
Article
Full-text available
The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack problem, assessing the performance and the lifetime of the network under the attack condition. To conduct our research, we utilized the Quality of Protection Modeling Language. With the proposed approach, it was possible to examine numerous network configurations, parameters, attack options, and scenarios. The results of the carefully performed multilevel analysis allowed us to identify a new kind of DDoS attack, the delayed distributed denial of service, by the authors, referred to as DDDoS attack. Multilevel approach to DDoS attack analysis confirmed that, examining endangered environments, it is significant to take into account many characteristics at once, just to not overlook any important aspect.
... According to the author's knowledge, Quality of Protection Modeling Language (QoP-ML), introduced in [28] is the only existing modeling language which satisfies all these requirements simultaneously. It allows for balancing security against the system efficiency, performing multi-level analysis and extending the possibility of describing the state of the environment in detail. ...
... In the article [28] the Quality of Protection Modeling Language was introduced. Proposed solution provides the modeling language for making abstraction of cryptographic protocols that puts emphasis on the details concerning the quality of protection. ...
... The QoP metrics define the influence of functions and channels on the quality of protection. In the article [28] the syntax, semantics and algorithms of the QoP-ML are presented in detail. ...
Article
Full-text available
Security management is one of the most significant issues in nowadays data centers. Selection of appropriate security mechanisms, effective energy consumption management together with caring for the environment enforces a profound analysis of the considered system. In this paper, we propose a specialized decision support system with a multi-level, comprehensive analysis scheme. As a result of the extensive use of mathematical methods and statistics, guidelines and indicators returned by the proposed approach facilitate the decision making process and conserve decision maker's time and attention. In the article we utilized proposed multi-level analysis scheme to manage security-based data flow in the example data center. Determining the most secure, energy-efficient, environmental-friendly security mechanisms, we implemented the role-based access control method in Quality of Protection Modeling Language (QoP-ML) and evaluated its performance in terms of mentioned factors.
... This UML model is annotated with the standard UML profile for schedulability, performance, and time and then analysed for performance. In the article [35], Ksiezopolski introduces the quality of protection modeling language which provides the modeling language for making abstraction of cryptographic protocols with emphasis on the details concerning the quality of protection. Table 1 demonstrates the approach presented in this paper as compared to the existing methodologies. ...
... In the paper [35], Ksiezopolski introduces the quality of protection modeling language, which provides the modeling language for making abstraction of cryptographic protocols with emphasis on the details concerning the quality of protection. The intended use of the QoP-ML is to represent a series of steps described as a cryptographic protocol. ...
... The QoP metrics define the influence of functions and channels on the quality of protection. In the paper [35], the syntax, semantics, and algorithms of the QoP-ML are presented. ...
Article
Full-text available
With a rapid progress of numerous applications in wireless sensor networks (WSNs), performance evaluation and analysis techniques face new challenges in energy efficiency area in WSN applications. One of the key issues is to perform the security trade-off and energy efficiency analysis. In this paper, the energy analysis module for the QoP-ML (Quality of Protection Modeling Language) is proposed by means of which one can analyze the influence of various security levels on the energy consumption of a protocol. Moreover, an advanced communication module is proposed as an extension of the QoPML language, which enhances the abilities to analyze complex wireless sensor networks. The case study of WSN deployed on the Jindo Bridge in South Korea was carried out and the lifetime of protocols with various security level was simulated. The results show that the introduction of various security levels can entail large differences in performance and energy consumption, and hence result in different lifetime. Therefore, the designers of WSN protocols should search for balance between the required lifetime and security level. The introduced QoP-ML extension, along with the AQoPA (Automated Quality of Protection Analysis) tool, has been developed to meet the above requirements.
... The solution may be determination of the required level of the protection and adjustment of some security measures [8] to these requirements. Such an approach can be achieved by means of the Quality of Protection systems [7,[9][10][11] where the security measures are evaluated according to their influence on the system security. ...
... The factors presented in the article can be the part of the QoP systems modeled by QoP-ML [11] modeling language. The QoP-ML introduces the multilevel protocol analysis that extends the possibility of describing the state of the cryptographic protocol. ...
... Owing to that the QoP analysis can take into consideration any presented factors which influence the overall system security. In this article the benchmark of cryptographic operations are presented which can be used as the security metrics structure [11] in the QoP-ML approach. ...
Article
Full-text available
The ensuring reliability of wireless sensor networks (WSN) is one of most important problems to be solved. In this article, the influence of the security and communication factors in the reliability of wireless sensor networks was analyzed. Balancing security against performance in WSN is another issue to be solved. These factors should be considered during security analysis of quality of protection of realized protocol. In the article, we analyze wireless sensor network where hierarchical topologies is implemented with high performance routing sensors that forward big amount of data. We present the experiment results which were performed by high-performance Imote2 sensor platform and TinyOS operating system.
... This UML model is annotated with the standard UML Profile for schedualability, performance and time and is then analysed for performance. In the article [4] B.Ksiezopolski introduced the Quality of Protection Modelling Language (QoP-ML) which provides the modelling language for making abstraction of cryptographic protocols that put emphasis on the details concerning quality of protection. The intended use of QoP-ML is to represent the series of steps which are described as a cryptographic protocol. ...
... For illustration of the QoP analysis process we choose one of the most popular cryptographic protocols -TLS [16]. In the article [4] the syntax, semantics and algorithms of the QoP-ML are presented. ...
... The QoP analysis can refer to different security attributes and each of them must be proceeded according to the dedicated algorithms. In case of efficiency analysis we are focused on protocol time analysis which can be performed by means of availability algorithm which is introduced in [4]. ...
Conference Paper
The problem of efficiency in the IT systems is now widely discussed. One of the factors affecting the performance of IT systems is implementation and maintaining a high level of security. In many cases the guaranteed security level is too high in relation to the real threats. The implementation and maintenance of this protection level is expensive in terms of both productivity and financial costs. The paper presents the analysis of TLS Handshake protocol in terms of quality of protection performed by the Quality of Protection Modelling Language (QoP-ML). The analysis concerns efficiency.
... This UML model is annotated with the standard UML Profile for schedualability, performance and time and then was analysed for performance. In the article [13] B. Księżopolski introduced the Quality of Protection Modelling Language (QoP-ML) which provides the modelling language for making abstraction of cryptographic protocols that put emphasis on the details concerning quality of protection. ...
... The QoP-ML [13] is the Quality of Protection Modelling Language by means of which one can abstract all operations executed during the flow of cryptographic protocol. The QoP-ML introduces the multilevel [14] protocol analysis that extends the possibility of describing all possible states of the cryptographic protocol. ...
... The analysis engine of the modelled protocol is the part of the core system. In the paper [13] the syntax, semantics and algorithms of the QoP-ML are presented. In the paper we would like to present the case study of the quality of protection modelling by means of the QoP-ML. ...
Article
Full-text available
The security modelling of IT systems is a very complicated task. One of the issues which must be analysed is the performance of IT systems. In many cases the guaranteed security level is too high in relation to the real threats. The overestimation of security measures can decrease system performance. The paper presents the analysis of Kerberos cryptographic protocol in terms of quality of protection performed by Quality of Protection Modelling Language (QoP-ML). The analysis concerns the availability attribute. In the article the Kerberos protocol was modelled and the QoP analysis of two selected versions was performed.
... For instance, which is significant with the following assignment, the genuine information? For instance, somebody, who suppose is our questioning Thomas, needs to know the reason for a specific movement that occurs in the evening around his home (Ksiezopolski, 2012). He puts reconnaissance cameras to specific purposes of his home and one of the vital highlights of the cameras is taking photographs and sparing them on the PC when they distinguish any movement with their sensors that as it may, the security arrangement of the house is extremely monotonous and exhausting, in light of the fact that the proprietor of the home needs to check all the photographs, of the previous evening, each day to be fulfilled about his home's security. ...
... A few specialists think about on ML process in two sections; the adapting part and the inducing part. As specified previously, the adapting part is bolstering the ML calculation with the preparation set and the gathering part is making expectations about the reason for action by the framework (Ksiezopolski, 2012). Managed learning and unsupervised learning are fundamental kinds of ML, first of them are exist by utilizing completely named dataset while other one are exist completely unlabelled dataset. ...
Chapter
Full-text available
This chapter will address challenges with IoT and machine learning including how a portion of the difficulties of deep learning executions while planning the arrangement and choice of right calculation. Existing research in deep learning and IoT was focused to find how garbage in will deliver waste out, which is exceptionally appropriate for the scope of the informational index for machine learning. The quality, sum, readiness, and choice of information are essential to the achievement of a machine learning arrangement. Consequently, this chapter aims to provide an overview of how the system can use technologies along with deep learning and challenges to realize the security challenges IoT can support. Even though calculations can work in any nonexclusive conditions, there are particular rules to determine which calculation would work best under which circumstances. How reinforcement learning deep learning is useful for IoT will also be covered in the chapter.
... For instance, which is significant with the following assignment, the genuine information? For instance, somebody, who supposedly is our questioning Thomas, needs to know the reason for a specific movement that occurs in the evening around his home (Ksiezopolski, 2012). He puts reconnaissance cameras to specific purposes of his home and one of the vital highlights of the cameras is taking photographs and sparing them on the PC when they distinguish any movement with their sensors that as it may, the security arrangement of the house is extremely monotonous and exhausting, in light of the fact that the proprietor of the home needs to check all the photographs, of the previous evening, each day to be fulfilled about his home's security. ...
... A few specialists think about on ML process in two sections; the adapting part and the inducing part. As specified previously, the adapting part is bolstering the ML calculation with the preparation set and the gathering part is making expectations about the reason for action by the framework (Ksiezopolski, 2012). Managed learning and unsupervised learning are fundamental kinds of ML, first of them are exist by utilizing completely named dataset while other one are exist completely unlabelled dataset. ...
Chapter
Full-text available
The vast majority of the examination on profound neural systems so far has been centered on acquiring higher exactness levels by building progressively vast and profound structures. Preparing and assessing these models is just practical when a lot of assets; for example, handling power and memory are easy run of the mill applications that could profit by these models. The system starts handling the compelled gadget and depends on the remote part when the neighborhood part does not give a sufficiently precise outcome. The falling system takes into account a new ceasing component amid the review period of the system. This chapter empowers an entire assortment of independent frameworks where sensors, actuators, and registering hubs can cooperate and demonstrate that the falling design takes into account a free change in assessment speed on obliged gadgets while the misfortune in precision is kept to a base.
... The major contribution of this study is introduction of Automated Quality of Protection Analysis framework which performs the automatic evaluation of QoP-ML models created in the Quality of Protection Modelling Language [9,10]. It allows to analyse complex systems which may consist of thousands of hosts representing a wide area network which are actors in the cryptographic protocol or a complex IT system. ...
... The AQoPA framework can be downloaded from the web page of the Quality of Protection Modelling Language Project [11]. These stages refer to the methodology of creating QoP-ML models defined in the article [9] where the details about syntax and semantics can be found. ...
Conference Paper
Full-text available
Analysis of security economics for the IT systems is one of the important issues to be solved. The quality of protection (QoP) of IT System can be achieved on different levels. One can choose factors which have a different impact on the overall system security. Traditionally, se- curity engineers configure IT systems with the strongest possible security mechanisms. Unfortunately, the strongest protection (especially in low resource devices) can lead to unreasoned increase of the system load and finally influence system availability. In such a situation the quality of pro- tection models which scales the protection level depending on the specific requirements can be used. One of the most challenging issues for quality of protection models is performing quality of protection evaluation for complex and distributed systems. The manual analysis of such systems is almost impossible to perform. In the article, we proposed the Auto- mated Quality of Protection Analysis framework (AQoPA). The AQoPA performs the automatic evaluation of complex system models which are created in the Quality of Protection Modelling Language (QoP-ML). In the article the case study of complex wireless sensor network analysis is presented. The network is deployed on a roller-coaster.
... This tendency is particularly noticeable in complex and distributed systems. The latest results show [16,17,[19][20][21] that in many cases the best way is to determine the required level of protection and adjust security measures to these security requirements. Such approach is achieved by the means of the Quality of Protection models where the security measures are evaluated according to their influence on the system security. ...
... CMTool is a benchmarking and results validation tool used for testing the performance of the cryptographic primitives. Benchmarking of cryptographic modules is important for Quality of Protection models which evaluate information security of the IT Systems [15,[19][20][21]. The implemented CMTool creates security metrics for cryptographic modules which are required for QoP-ML. ...
Article
Full-text available
In the today's world in many organizations, the information security management is one of the most important tasks to be done. Among the tasks which must be considered during security management is that the processes need to be monitored and verified. In the article, we introduce a new security measurement model which extends the approach presented in the ISO/IEC 27004 with measurements validation methods. The presented method generates the security metrics which are robust and reproductable. Our approach systematizes and organizes security metrics development process focusing on the performance and the security of systems, products, processes and services. We also present the Crypto-Metrics Tool (CMTool) which prepares the benchmarking and validates obtained results according to the proposed method. Finally, we present the case study of the proposed method for generating robust benchmarking of the cryptographic modules by means of the CMTool.
... The latest results show [2,[4][5][6] that in many cases the better way is determination of the required level of protection and adjustment of some security measures to these requirements. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on system security. ...
... The QoP modelling process is a complex task so we are not going to present it in this paper. The example of the QoP model of TLS cryptographic protocol is presented in [6], where the protocol is modelled in the QoP-ML modelling language [12]. ...
Article
Full-text available
Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol.
... Maintaining the internal and external consistency of objects, which describe the state of a system and are the correct and true reflection of the real world is crucial for many security systems [3]. One the most important ones, which are indicated by security specialists [4] are SIEM (Security Information and Event Management) systems. ...
Article
Full-text available
Today’s IT systems are characterized by a high complexity and the increasing number of sub-systems, as well as the physical equipment needed. That raises the problem of keeping the whole architecture secure, as it has been revealed in recent years by numerous scandals related to data leaks from inadequately secured systems. Several ontology-based approaches tied to the cybersecurity domain have been developed aiming at solving the problem of identifying vulnerabilities in real world systems. Unfortunately, these approaches do not address the essential problem: since real IT system architectures are dynamic and highly variable, it is necessary to enable real-time inventory and observation of all system components, as well as to retrieve up-to-date data about those systems and potential risks. The current paper has a threefold purpose. First, we examine the existing cybersecurity ontologies and identify the deficiencies that prevent us from using them in real, dynamic IT systems. Next, we introduce and propose a framework based on the Dynamic CyberSecurity Ontology, which fills the existing gaps in current solutions. Finally, we outline a monitoring system based on the developed ontology, which implements automatic data mining mechanisms that aggregate results from dynamic knowledge sources, such as Shodan or Censys. As a result, the ontological examination of systems over time becomes possible.
... Such a method of representation of value levels (for single values as well as for value sets) will facilitate their comparison, leading to easier and quicker (searching order sets O and OR will not be necessary) reasoning. Additionally, for systems in which values are connected with the physical parameters of a device or the environment (e.g., the battery level of a mobile device, transfer speed, temperature, etc.) we propose a basic mechanism for automatic translation of physical units into the levels of promotion of values, allowing the possibility of its development and adjustment to evaluate other values difficult to measure, e.g., the degree of resemblance to the pattern, security level evaluation (such as in [17][18][19][20]), etc. The completion of the goal requires: (1) definition of the representation method for the level of value promotion including each value's weight, (2) development of the mechanism of determining the cumulative evaluation of the promotion of various values in a given situation, thus making possible the comparison of various options, (3) proposition of relevant modifications of the inference rules discussed in [14], (4) discussion of possibility of integration of our mechanism with machine learning based approaches, (5) verification of whether the developed mechanisms are not contradictory with either intuition or the formal properties of the model presented in [14]. ...
Article
Full-text available
The issue of decision-making of autonomous agents constitutes the current work topic for many researchers. In this paper we propose to extend the existing model of value-based teleological reasoning by a new, numerical manner of representation of the level of value promotion. The authors of the paper present and discuss proofs of compatibility of both previous and current models, a formal mechanism of conversion of the parameters of the autonomous device into the levels of promotion of values, the mechanism of integration with machine learning approaches, and a comprehensive argumentation-based reasoning mechanism allowing for making decisions.
... Therefore, more meaningful and structured values (utilities) should be established to weigh individual metrics. In this regard, methods defined in [9], [10] and [11] can be potentially reviewed for developing and estimating metrics. ...
... Considering a transmission line, which consists of a significant number of poles and spans, simulation of possible monitoring solutions additionally helps save time and costs. For the purpose of determination, the vision system operation time consisting of image processing and LoRa communication, authors have used Quality of Protection Modeling Language (QoP-ML) [53,54] and AQoPA for modeling [55]. A model of the considered vision system for whole transmission line monitoring, developed in QoP-ML, is presented and described below. ...
Article
Full-text available
The techniques of Dynamic Line Rating (DLR) for Overhead Transmission Line (OTL)’s are currently dynamically developed. DLR systems typically rely on weather, temperature, inclination, and current measurements to calculate tension and sag, where sensors need to be installed directly on wires. Such systems are very reliable and ensure high accuracy in determining maximum allowable current. However, their installation may require switching off the transmission line from the operation. In order to receive precise values regarding the actual operating conditions of the whole transmission line, DLR sensors measuring wire temperature or tension should be installed at many points of OTL. The minimum number of installation points should cover at least each tension section and critical spans, thereby increasing installation costs. The alternative method that allows for the monitoring of OTL is the use of the vision system based on cameras. Installed on the OTLs’ poles, cameras can take photos which, appropriately processed, can provide data about the sag and temperature of wires, without the necessity of switching OTL from the operation for installation or further maintenance. Such a vision system facilitates also data transmission, because it does not require measurement data to be transmitted from the sensor station installed on the wire to the base station located on the pole (for instance, via radio). This article aims to present the concept of a vision system that monitors sag and temperature of Overhead Transmission Lines (OTLs)’ using Long Range (LoRa) wireless communication and data transmission. The developed system consists of a camera and a microcomputer equipped with LoRa communication module. The whole system monitors OTLs’ spans by taking photos, processing images for wire sag-temperature estimation, and sending results to the operator’s Supervisory Control And Data Acquisition (SCADA). The system communication architecture is also proposed and investigated for data transmission time when monitoring the whole OTL.
... Such a method of representation of value levels (for single values as well as for value sets) will facilitate their comparison, leading to easier and quicker (searching orders' sets O and OR will not be necessary) reasoning. Additionally, for systems in which values are connected with the physical parameters of a device or the environment we propose a basic mechanism for automatic translation of physical units into the levels of promotion of values, allowing the possibility of its development and adjustment to evaluate other values difficult to measure, e.g. the degree of resemblance to the pattern, security level evaluation (such as in [6], [7], [8], [9]), etc. Our model was built on the basis of the framework of teleological reasoning from [1] (further referred to as the GVR model). ...
... To demonstrate the use of the proposed analysis scheme, we used the role-based access control approach, prepared an example data center scenario and analyzed it with the help of the introduced method. We made use of QoP-ML [8], [9] and created by its means the role based access control model to examine the quality of chosen security mechanisms in terms of financial impact of data center maintenance. Before we perform the actual estimation of the data center maintenance cost, let us give some assumptions about the examined environment. ...
Article
Full-text available
Information management is one of the most significant issues in nowadays data centers. Selection of appropriate software, security mechanisms and effective energy consumption management together with caring for the environment enforces a profound analysis of the considered system. Besides these factors, financial analysis of data center maintenance is another important aspect that needs to be considered. Data centers are mission-critical components of all large enterprises and frequently cost hundreds of millions of dollars to build, yet few high-level executives understand the true cost of operating such facilities. Costs are typically spread across the IT, networking, and facilities, which makes management of these costs and assessment of alternatives difficult. This paper deals with a research on multilevel analysis of data center management and presents an approach to estimate the true total costs of operating data center physical facilities, taking into account the proper management of the information flow.
... They show through test done on Oracle and Microsoft that the overall effectiveness of their method outperforms data insertion and querying when encryption algorithm provided by these database management systems are used. Rusinek et al. present a method that uses Quality of Protection Modelling Language (Ksiezopolski, 2012), model that balances security and performance for database systems (Rusinek et al., 2015). Using this model, the authors prove through experimental validation that their approach offers flexibility when modeling complex systems and increase insert and query performance. ...
Conference Paper
Full-text available
To increase data security and information privacy, different algorithms are sometimes used to encrypt the data. However, as the algorithms are studied in detail, their effectiveness begins to decline. In this paper a new solution is proposed to strengthen the data security: New Scytale algorithm. This approach is based on an old technique improved by the advantages of modern mathematics and information technology. A software application has also been developed for testing this algorithm.
... Mobile devices currently have limited resources (such as energy supply, computational power, or memory) but are equipped mostly with a vast amount of sensors. This is what makes them an ideal environment for adaptable context-aware security mechanisms, which attempt to find the optimal level of quality of protection (QoP) and performance ratio [4,5]. ...
Article
Full-text available
Security management in wireless networks has to deal with the changing character of the environment, which can further lead to decision making problem for unexpected events. Among a huge list of devices, the mobile ones are especially vulnerable to this situation. The solution for adapting systems and applications to dynamic environments can be context-aware description of the user actions, which gives a possibility to take into account the factors that influence these actions. In the article, we propose a context-aware security adjusting model, which is based on proposition logic and incorporates mechanisms that assist in the reasoning process. The main benefits that differentiate our approach from similar ones are a formal representation of the model, the usage of the whole spectrum of context attributes, the detection and analysis of contextual data integrity, and conflicting rules' eradication capability. All these traits transcribe into a more effective way of adjusting security measures in accordance with existing circumstances. To illustrate the proposed approach, we present the case study of context-aware security management for mobile devices.
... Therefore, more meaningful and structured values (utilities) should be established to weigh individual metrics. In this regard, methods defined in [9], [10] and [11] can be potentially reviewed for developing and estimating metrics. ...
Conference Paper
Full-text available
Adaptive security can take dynamic trade-off decisions autonomously at runtime and is considered a key desirable attribute in the Internet of Things (IoT). However, there is no clear evidence that it can handle these trade-offs optimally to add value to such a complex and dynamic network. We present a scenario-based approach to recognize and evaluate typical security trade-off situations in the IoT. Using the Event-driven Adaptive Security (EDAS) model, we provide the assessment of dynamic trade-off decisions in the IoT. We have showed that an optimum trade-off mitigation response in the IoT can be automated by assessing various contextual requirements, such as the QoS and user preferences, thing capabilities, and the risk faced, at runtime. eHealth scenarios are examined to illustrate system application in IoT-based remote patient monitoring systems.
... The latest results show (Sklavos et al., 2006;Stubblefield et al., 2005;Mansour et al., 2014;Ksiezopolski et al., 2013) that in many cases the best way is to determine the required level of protection and adjust security measures to these security requirements. (Among the means to meet these challenges one can indicate the security metrics (Savola, 2013)). ...
Conference Paper
Full-text available
To facilitate the management of permissions in complex secure systems, the concept of reference models for role-based access control (RBAC) has been proposed. However, among many existing RBAC analyses and implementations, there still exists the lack of the evaluation of its impact on the overall system performance. In this paper, to reduce this deficiency, we introduce an initial approach towards estimation of the influence of the most common access control mechanism on the system efficiency. Modelling RBAC in Quality of Protection Modelling Language (QoP-ML), we analyse a real enterprise business scenario and report obtained results, focusing on time and resource consumption.
... These practical applications are vulnerable to manin-the-middle attacks, require specialized authentication and access control [27], and have strong requirements for fairness [26]. The latest results show [10,11] that in many cases the better way is to determine the required level of protection and adjust security measures to these security requirements [14]. Such approach is achieved by means of the Quality of Protection models where the security measures are evaluated according to their influence on the system security. ...
Conference Paper
Full-text available
Balancing security against performance for IT systems is one of the most important issues to be solved. The quality of protection of systems can be achieved on different levels. One can choose factors which have a different impact on the overall system security. Traditionally, security engineers configure IT systems with the strongest possible security mechanisms. Unfortunately, the strongest protection can lead to unreasoned increase of the system load and finally influence system availability. In such a situation the quality of protection models which scale the protection level depending on the specific requirements can be used. In the article, we present the approach which enables balancing security against performance for database systems. The analysis is performed by Automated Quality of Protection Analysis (AQoPA) tool which allow automatic evaluation of system models which are created in the Quality of Protection Modelling Language (QoP-ML).
... In the article we present a case study for our methodology where risks of simple processes were calculated. The proposed risk analysis method can be used as part of Quality of Protection models [6,7] which introduce adaptable security [5] for IT Systems. ...
Conference Paper
Information security management is one of the most important issues to be resolved. The key element of this process is risk analysis. The standards are (ISO/IEC 27000, ISO/IEC 31000) based on the complex and time consuming process of defining vulnerabilities and threats for all organisation assets. In the article we present a new approach to analysing the risk of an attack on information systems. We focus on human factor - motivation, and show its relation to hacker profiles, as well as impacts. At the beginning we introduce a new model of motivation-based risk analysis. Then we describe case study illustrating our approach for a simple set of organisation processes.
... Next, the performance analysis will be prepared in the terms of the used security mechanisms for the lifetime of the WSN. To achieve this the QoP model will be prepared in Quality of Protection Modelling Language (QoP-ML) [8] and simulated in the AQoPA tool [14]. ...
Article
Full-text available
Pipelines, wellbores and ground installations are permanently controlled by sensors spread across the crucial points in the whole area. One of the most popular techniques to support proper oil drive in a wellbore is a Gas Lift. In this paper we present the concept of using wireless sensor network (WSN) in the oil and gas industry installations. Assuming that Gas Lift Valves (GLVs) in a wellbore annulus are sensor controlled, the proper amount of injected gas should be provided. In a ground installation, the optimized amount of loaded gas is a key factor in the effcient oil production. This paper considers the basic foundations and security requirements of WSN dedicated to Gas Lift Installations. Possible attack scenarios and their influence on the production results are shown as well.
... It definitely help to identify existence of malicious software in the Internet and may also help to pinpoint users affected by it but will not solve problems with users who are aware of this kind of attack and do it purposeful. Another solution can be a modelling the business model in information security perspective [9] and preparing simulation of losses which will depend on the used quality of protection. ...
Conference Paper
Full-text available
The development of the Internet is sustainable because of existing business models. Among them one of the most common is currently pay-per-click which is based on recording users' behaviors (in particular clicks but it may also be actions) and charging advertisers according to this information. On the other hand registering users clicks causes a serious threat for privacy. Additionally part of this business process is conducted outside an environment that can be controlled by organization and, thus, increases uncertainty of the whole solution. In this paper we propose a simple privacy protection method which prevent advertising companies form recording users' click and, thus, as a side effect break the corresponding business process. This method can be use on a voluntarily basis but also as the XSS-based attack against particular companies (e.g. these considered by activists as bad behaving). We show a method to estimate potential losses for global advertising company as the cause of this attack. Although it is very difcult to counteract this type of attack we have proposed some actions which can be taken to monitor and, to some extend, limit possible losses. We also consider a use of external intermediary who may help convince user that they clicks are not traced.
... Security context, which is extensively studied for specific applications protecting information systems and which is often considered in general models describing security services, can be also effectively used in abstract formal languages applicable for security protocols modeling. The QoP-ML modeling language for cryptographic protocols [31], which is originally dedicated to reflect Quality of Protection constraints in security protocols operation, could be a formal languages level modeling tool context-aware security protocols. ...
Article
Full-text available
Last decades the contextual approach became an important methodology of analysing information processes in the dynamic environment. In this paper we propose a context management framework suitable for secure network services. The framework allows tracking the contextual information from its origin, through all stages of its processing up to application in security services protecting the secure network application. Besides the framework’s description, an example of its application in constructing secure voice call network service is given.
... Hopefully, all our theoretical hypotheses are going to be verified in electroencephalographic laboratory which is organised in our institution. There we are going to investigate not only the attention processes in patients with ASD, but also some processes connected with attention that accompany the IT-security procedures, also modelled in our division [1][2][3]25]. ...
Thesis
Full-text available
Achieving effective security in the Internet of Things (IoT) is a critical challenge because of its heterogeneous technology and evolving environment outlook that make the threat faced complex and dynamic. Conventional security controls and risk management models have a limited protection scope, and they implement fixed or static mitigation strategies. Therefore, they cannot address the dynamic threat, they do not address other runtime objectives, such as usability, and respond to threats manually that increases latency in risk mitigation. This thesis contributes an Event-driven Adaptive Security (EDAS) model for IoT that observes, analyzes and reacts to threats dynamically in real-time. It employs a novel runtime adaptation ontology that addresses all the contextual requirements, such as the user preferences, QoS requirements and device (or thing) capabilities, and therefore, provides a basis for an optimum trade-off adaptation decision. EDAS is a technology independent security platform that offers reusable, flexible and extendible components, which makes it usable in a multi-vendor space, like the IoT. The model feasibility is assessed using a developed prototype and a scenario-based evaluation method that provides clear evidence that EDAS is an efficient solution for IoT Security.
Article
Network security metrics (NSMs) based on models allow to quantitatively evaluate the overall resilience of networked systems against attacks. For that reason, such metrics are of great importance to the security-related decision-making process of organizations. Considering that over the past two decades several model-based quantitative NSMs have been proposed, this article presents a deep survey of the state-of-the-art of these proposals. First, to distinguish the security metrics described in this survey from other types of security metrics, an overview of security metrics, in general, and their classifications is presented. Then, a detailed review of the main existing model-based quantitative NSMs is provided, along with their advantages and disadvantages. Finally, this survey is concluded with an in-depth discussion on relevant characteristics of the surveyed proposals and open research issues of the topic.
Conference Paper
Analysis of security economics for the IT systems is one of the important issues to be solved. The quality of protection (QoP) of IT System can be achieved on different levels. One can choose factors which have a different impact on the overall system security. Traditionally, security engineers configure IT systems with the strongest possible security mechanisms. Unfortunately, the strongest protection (especially in low resource devices) can lead to unreasoned increase of the system load and finally influence system availability. In such a situation the quality of protection models which scales the protection level depending on the specific requirements can be used. One of the most challenging issues for quality of protection models is performing quality of protection evaluation for complex and distributed systems. The manual analysis of such systems is almost impossible to perform. In the article, we proposed the Automated Quality of Protection Analysis framework (AQoPA). The AQoPA performs the automatic evaluation of complex system models which are created in the Quality of Protection Modelling Language (QoP-ML). In the article the case study of complex wireless sensor network analysis is presented. The network is deployed on a roller-coaster.
Conference Paper
Instrumental inference is one of the most interesting ways of reasoning, commonly used in legal practice. One of its characteristic features is the causal necessity relation that must occur between the reference actions. The aim of this study is to present and discuss model of causal necessity specific to instrumental inference, in the context of its application in the legal advisory system.
Conference Paper
The rapid technological development in such areas as Internet-, mobile- or cloud-technologies, has caused a lack of Information Technology (IT) specialist labor in the labor market, particularly in IT firms. Currently, universities are not able to meet this demand because of two main problems: The process to increase the number of IT graduates is slower than the rate of growth of the demand for IT workers, since it requires to set up and fund new laboratories and hire additional, experienced lecturers; and the fact that introducing new technologies into the teaching process takes a lot of time. All in all, there is a requirement for re-engineering current higher education programs, training academic staff and preparing new laboratories. A solution to the above problem may be to retrain people coming from other labor fields, introducing them to IT and thus developing a second job competence. This IT competence, added to their previous competences and professional experience, makes them very attractive for employers. This model of training is being put into practice at the postgraduate program “Mobile Application Development”. Part of the enrolled students is people who want to gain additional competences and change their profession, while others simply expect to gain financial and professional benefits. The mentioned program lasts two semesters and it takes place during weekends due to the fact that many students have full time jobs. The work-load of students is 60 ECTS points. Until now, two editions of the course have been carried out. The objectives, target group and the course program are presented in this paper, as well as the research results concerning satisfaction with the studies. The research was performed just after the final
Conference Paper
Reputation systems are an important factor for building trust in virtual communities. In the article we introduce reputation module for Quality of Protection Modelling Language which allows to represent the reputation system as a part of the protocol, where all operations and communication steps can be consistently modelled. Owing to the proposed approach the reputation systems can be formally specified and computer security impact can be considered as a factor of the metrics in the reputation systems. Finally, we model and analyse the case study of the eBay reputation system with modification which will refer to the computer security impact.
Conference Paper
Nowadays, security has become one of the most mandatory essences in the development and functioning of many software systems. For the reason of complexity of designing secure systems, distinct approaches that allow developers to focus on particular properties of the system of importance for their purpose are proposed. The majority of them are model-oriented since modeling helps show relationships between processes and can be used to predict the effects of changes in the land use. In the article we present and discuss PL/SQL, SecureUML and UMLsec in terms of the Quality of Protection modeling language (QoP-ML). We focus on their capabilities to model relevant information during various phases of security analysis. To assess and compare miscellaneous modeling systems we use a systematic methodology to point out their promiscuous aspects in context of the QoP-ML.
Conference Paper
Full-text available
Designing secure authentication mechanisms in wireless sensor networks in order to associate a node to a secure network is not an easy task due to the limitations of this type of networks. In this paper, we propose different multihop node authentication protocols for wireless sensor networks. For each protocol, we provide a formal proof using Scyther to verify the security of our proposals. We also provide implementation results in terms of execution time consumption obtained by real measurements on TelosB motes. These protocols offer different levels of quality of protection depending on the design of the protocol itself. Finally, we evaluate the overhead of protection of each solution, using AQoPA tool, by varying the security parameters and studying the effect on execution time overhead of each protocol for several network sizes.
Article
Full-text available
Cryptographic protocols are secure due to applica-tion of security services. The security services applied for their protection can be classified into the three groups: hard, soft and extended. Among the extended ones, we can point out to the availability of the goal of the security protocol, which guarantees that protocols aims are achieved. In the real-time protocols as the video conference, the goal is both secure data transmission and good signal quality. When one of the goals is not ensured, the availability of the goal of the protocol is not guaranteed and the cryptographic protocol can not be realized. In this article we present the methodology of obtaining the balance between the quality of the signal in real-time systems and accomplishment of the required security services. Finally, the case study of video conference secured by VPN connections, is presented.
Article
Full-text available
A new approach to verification of timed security protocols is given. The idea consists in modelling a finite number of users (including an intruder) of the computer network and their knowledge about secrets by timed automata. The runs of the product automaton of the above automata correspond to all the behaviours of the protocol for a fixed number of sessions. Verification is performed using the module BMC of the tool VerICS.
Article
This paper suggests that input and output are basic primitives of programming and that parallel composition of communicating sequential processes is a fundamental program structuring method. When combined with a development of Dijkstra's guarded command, these concepts are surprisingly versatile. Their use is illustrated by sample solutions of a variety of a familiar programming exercises.
Conference Paper
The security audit is the process of checking compliance of the IT systems with information security managements system policy. The IT audit process according to full ISO 27002 standard is very complex issue. In this article we introduce the guidelines that point out which parts of ISO 27002 are selected for creating role based questionnaires which are used to check web application standard compliance. We present the process of formal questionnaire ordering method for web application security audit. The presented process scales security issues depending on the asset character.
Article
Symmetric block ciphers are usually used in WSN for security services. This paper puts forward the idea of using advanced modes of operation of symmetric block ciphers to achieve confidentiality and authentication in one cryptographic operation. The modes of operation approved by NIST that is CMAC, CCM, GCM/GMAC are applied here. The benchmarks of these approaches in the terms of efficiency of nodes in WSN are presented.
Conference Paper
The security of information exchange between the parts in the teleinformatic infrastructure is one of the crucial topics. During the protecting the infrastructure of the organization, one can use a lot of mechanisms which are often based on the cryptographic primitives. Traditionally, the security officers model the protection system to be as strong as it is possible. However, the level of protection of information is often much higher than it is necessary to meet potential threats. Since the level of security strongly affects the performance of the whole system, the excessive protection decreases its reliability and availability and, as a result, its global security. The appropriate security level can be estimated by means of different quality of protection models. In this paper we are going to present the approach how to introduce the adaptability to the network. We are basing on the adaptable security model for dynamic environment which calculates the protection level by means of the risk management processes. The analysis is assisted by the security management tool (SPOT) which visualizes and optimizes the adaptable model mentioned above. Finally, we present the case study introducing the network adaptability of the cryptographic protocol.
Conference Paper
Recently we have observed the growth of the intelligent application especially with its mobile character, called e-anything. The implementation of these applications provides guarantee of security requirements of the cryptographic protocols which are used in the application. Traditionally the protocols have been configured with the strongest possible security mechanisms. Unfortunately, when the application is used by means of the mobile devices, the strongest protection can lead to the denial of services for them. The solution of this problem is introducing the quality of protection models which will scale the protection level depending on the actual threat level. In this article we would like to introduce the application which manages the protection level of the processes in the mobile environment. The Security Protocol Optimizing Tool (SPOT) optimizes the cryptographic protocol and defines the protocol version appropriate to the actual threat level. In this article the architecture of the SPOT is presented with a detailed description of the included modules. Keywordssecurity tools-security metrics-quality of protection-adaptable security-security models-security architecture-cryptographic protocols
Article
For model-based development to be a success in practice, it needs to have a convincing added-value associated with its use. Our goal is to provide such added-value by developing tool-support for the analysis of UML models against difficult system requirements. Towards this goal, we describe a UML verification framework supporting the construction of automated requirements analysis tools for UML diagrams. The framework is connected to industrial CASE tools using XMI and allows convenient access to this data and to the human user. As a particular example, we present plugins for verifying models defined using the security extension UMLsec of UML. The verification framework allows advanced users of the UMLsec approach to themselves implement verification routines for the constraints of self-defined stereotypes. In particular, we focus on an analysis plug-in that utilizes the model-checker Spin to verify security properties of cryptography-based systems.
Conference Paper
Traffic in Wireless Sensor Network (WSN) consists of short packets sent by nodes that are usually identical in respect of software applied and their hardware architecture. In such a communication environment it is important to guarantee authentication of the nodes. The most popular way to achieve this basic security service is using Message Authentication Code (MAC). The sensor node’s harbware is very limited so the cryptography used must be very efficient. In the article we focus on the influence of the authentication method’s performance on delays in data sampling by the sensor nodes. We present efficiency results for MACs generation in the node. We compare the results for approved, standardized and commonly-used schemes: CMAC, GMAC and HMAC based on MD5 and SHA-1. Additionally, we compare the obtained results with the performance of PKC-based authentication method using the ECDSA. Keywordswireless sensor network-cryptographic protocols-block cipher modes-data sampling-sensor’s security-utilization efficiency
Article
The concept of one-stop on-line government is not science fiction any more. On the contrary, the high reliability and performance of communication links, combined with architectural models that facilitate transparent access to distributed computational and storage resources, propel the development of integrated e-government platforms that support increased citizen mobility. The price we have to pay is the complexity introduced in the design of the security mechanisms required for protecting several heterogeneous information systems—each one supporting some of the services offered through the e-government integrated environment—and ensuring user privacy.This paper demonstrates that the security services offered by Public Key Infrastructure (PKI) can be employed for fulfilling most of the identified security requirements for an integrated e-government platform. The list of security requirements has been compiled by adopting an organisational framework that facilitates the classification of e-government services according to the security requirements they exhibit.The proposed approach has been applied, as a case study, to the e-government system ‘Webocrat’, identifying its security requirements and then designing a PKI-based security architecture for fulfilling them.
Article
Increasingly, new regulations are governing organizations and their information systems. Individuals responsible for ensuring legal compliance and accountability currently lack sufficient guidance and support to manage their legal obligations within relevant information systems. While software controls provide assurances that business processes adhere to specific requirements, such as those derived from government regulations, there is little support to manage these requirements and their relationships to various policies and regulations. We propose a requirements management framework that enables executives, business managers, software developers and auditors to distribute legal obligations across business units and/or personnel with different roles and technical capabilities. This framework improves accountability by integrating traceability throughout the policy and requirements lifecycle. We illustrate the framework within the context of a concrete healthcare scenario in which obligations incurred from the Health Insurance Portability and Accountability Act (HIPAA) are delegated and refined into software requirements. Additionally, we show how auditing mechanisms can be integrated into the framework and how auditors can certify that specific chains of delegation and refinement decisions comply with government regulations.
Article
Electronic services in dynamic environment (e.g. e-government, e-banking, e-commerce, etc.), meet many different barriers reducing their efficient applicability. One of them is the requirement of information security when it is transmitted, transformed, and stored in an electronic service. It is possible to provide the appropriate level of security by applying the present-day information technology. However, the level of protection of information is often much higher than it is necessary to meet potential threats. Since the level of security strongly affects the performance of the whole system, the excessive protection decreases its reliability and availability and, as a result, its global security. In this paper we present a mechanism of adaptable security for, digital information transmission systems (being usually the crucial part of e-service). It makes it possible to guarantee the adequate level of protection for actual level of threats dynamically changing in the environment. In our model the basic element of the security is the Public Key Infrastructure (PKI) is enriched with specific cryptographic modules.
Article
IP Multimedia Subsystem (IMS) is widely considered as the main solution for the next generation multimedia rich communication. In order to provide multi-level security service in IMS to mobile users for multimedia applications, it is insufficient to take the security benefits into consideration, but adequately analyzing the impact of security policies in IMS on the performance cost quantitatively is also necessary and significant. In this paper, we first propose a novel study of IMS performance by a QPN model to much more precisely describe SIP signaling in IMS, and made performance evaluation. Then we defined totally seven levels of IMS security policies according to IMS specifications in 3GPP and proposed QoP partition model which quantitatively reflects strength of protection of SIP signaling and users’ security needs. Further more, we did our original contributions to use the QPN model to evaluate the impacts of security mechanism on system performance cost quantitatively. With the multi-view security partition introduced, different security policies could be adjusted according to the application and users’ security requirements, so that multi-level security service can be provided to diverse users and applications for a better tradeoff between security requirements and system performance in IMS.
Article
In this paper we propose a holistic Criticality Assessment methodology, suitable for the development of an infrastructure protection plan in a multi-sector or national level. The proposed methodology aims to integrate existing security plans and risk assessments performed in isolated infrastructures, in order to assess sector-wide or intra-sector security risks. In order to achieve this, we define three different layers of security assessments with different requirements and goals; the operator layer, the sector layer and the intra-sector or national layer. We determine the characteristics of each layer, as well as their interdependencies. In this way, existing security plans can be fully exploited in order to provide a “shortcut” for the development of security plans for complex inter-dependent infrastructures. A key element in the proposed methodology is the formal definition of interdependencies between different infrastructures and their respective sectors. Interdependencies between infrastructures belonging to the same or to a different sector, as well as interdependencies between different sectors, act as interfaces through which threats and their impacts occurring on different layers or different sectors, are conveyed to others. Current risk assessment methodologies fail to address effectively this issue, thus, the formalization of these interfaces and their interference is an important element for the definition of a holistic Criticality Assessment methodology.
Conference Paper
We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are the main motivating examples for our work; it also appears in other programming-language contexts. Specifically, we introduce a simple, general extension of the pi calculus with value passing, primitive functions, and equations among terms. We develop semantics and proof techniques for this extended language and apply them in reasoning about some security protocols.
Conference Paper
A tree based quality of protection (QoP) evaluation method for cyber system is presented. The elements of a security system structure are represented as normalized weighted tree. We show that our weighted tree representation of security system structure is informative and useful. Based on this unique representation QoP evaluation methodology is introduced and the foundations of QoP modeling and evaluation are established. The important steps in the evaluation process are the introduction of normalized weighted tree which establishes the hierarchy of the requirements of a secure system and the formulation of the normalized weighted tree. This is used to compute the QoP in a quantitative manner. We demonstrate through several examples, how the proposed methodology can assess QoP from a holistic view.
Article
We introduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols; the spi calculus enables us to consider cryptographic issues in more detail. We represent protocols as processes in the spi calculus and state their security properties in terms of coarsegrained notions of protocol equivalence.
Real-time computing. University of Massachusetts
  • Stankovic
  • Ja
Stankovic JA. Real-time computing. University of Massachusetts;