ArticlePDF Available

Journal of Cybersecurity and Privacy: A New Open Access Journal



Journal of Cybersecurity and Privacy is critical to society at large, and its importance is growing daily. The rapid advancement in technology has caused a large-scale integration of computing, communication, and information technologies into virtually every aspect of our modern society[...]
Journal of
and Privacy
Journal of Cybersecurity and Privacy: A New Open
Access Journal
Wade Trappe 1, * and Jeremy Straub 2, *
1Department of Electrical and Computer Engineering, Rutgers, The State University of New Jersey,
Piscataway, NJ 08854, USA
2Department of Computer Science, North Dakota State University, Fargo, ND 58102, USA
*Correspondence: (W.T.); (J.S.)
Received: 13 June 2018; Accepted: 13 June 2018; Published: 14 June 2018
Journal of Cybersecurity and Privacy is critical to society at large, and its importance is
growing daily. The rapid advancement in technology has caused a large-scale integration of
computing, communication, and information technologies into virtually every aspect of our modern
society. Computing and communication technologies are at the heart of emerging advancements in
transportation, production and manufacturing, logistics, healthcare, utility, recreation, social and many
other domains. This incorporation of cyber technologies into a wide array of industries is tearing down
barriers between industries as information is gathered and shared in order to facilitate previously
unimaginable improvements in capabilities, efficiency, and cost.
Attacks against cyber systems, similarly, are not confined to one industry or area of focus.
An attack designed to impact one type of system may inadvertently infect, impair or disable—or be
deliberately modified to infect, impair or disable—other types of systems. Cyberattacks also blur
the lines between state versus state “warfare” activities, state sponsored intelligence activities and
criminal activities. National civilian and military agencies, law enforcement and the private sector
must, thus, work together to prevent and respond to a myriad of different types of cyberattacks with
varying targets.
The merging of information, computing and communication technology with many aspects of
our personal and social life offers profound benefits, it also poses new security and privacy challenges.
Our increasing reliance on sensors, software, and an anywhere-at-anytime communication
infrastructure has led to and will lead to new classes of attacks against our daily life. Attacks on
utility systems, such as illustrated by Stuxnet in 2010, are an illustration of the emergence of new and
more sophisticated security threats that can be launched against systems that intimately integrate
cyber technology with physical processes. Automotive systems, which are replete with many sensors
providing data to various automated processes, have also been the target of attacks, such as hacks
against a vehicle’s LIDAR [
], the tire pressure monitoring system (TPMS) [
], and different automotive
control systems [
]. Other examples of security exploits abound across industrial control, drones,
automotive systems, medical devices, and many other technologies.
Beyond security risks are issues of privacy. As these new technologies gather and share data,
the implication of such sharing of data between services can threaten many aspects of personal liberty
that we hold important. While the pervasiveness of the Internet means that it is easier for cyberattackers
to steal conventional forms of sensitive data, such as credit card numbers and government-issued
personal identifiers (e.g., social security numbers, drivers’ license numbers, and similar), the potential
for privacy breaches is much broader and more profound. Data analytics applied across different
modalities of data shared with cloud services can lead to personal information being inferred about
individuals that they thought were protected and private. For example, supposedly privacy-enhanced
GPS traces have been successfully reversed to infer the precise location of vehicles (and thereby
J. Cybersecur. Priv. 2018,1, 1–3; doi:10.3390/jcp1010001
J. Cybersecur. Priv. 2018,12
individuals) at a given time [
]. Similar risks are evident in the healthcare industry, where technologies
meant to assist doctors and support patient well-being monitoring, unfortunately have been shown
to leak unintended information [
]. Services that monitor our homes and offices, using data from
networked digital cameras, also provide the means to track individuals and their personal activities.
The capabilities provided by and use of systems that attack, detect attacks and defend against
them raise questions of ethics and policy that must be explored. Questions of where the line should be
drawn between protective surveillance and invasive monitoring, what constitutes an act of war in the
cyber domain and what types of actions are justified in both preventative and responsive capacities
are among those that will vex society-at-large over the years and decades to come.
New security risks and privacy threats are created by data being generated using sensors,
and shared across our communication infrastructure to various computing services. It is possible now
for adversaries to attack from virtually everywhere and at any time in the data life cycle. Adversaries
might attempt traditional attacks intended to subvert the confidentiality, integrity and availability of
these new cyber systems and, while such threats can lead to privacy, data, and economic damage, they
can also lead to physical damage to the world around us and directly affect our personal well-being.
With all this in mind, the goal behind Journal of Cybersecurity and Privacy is to provide a venue
for articles and community engagement that will advance the state of the art in security and privacy
research and practice for the increasingly cyber-enabled world. Towards this end, the journal’s goal is
to strategically attract articles on topics including:
Traditional research-focused articles that convey new security and privacy technologies;
Educational survey articles that instruct the broader community of security and privacy challenges
and solutions;
Articles that discuss the policy and legal implications of the development, adoption and utilization
of security and privacy technologies;
Editorials and position articles intended to pose new ideas and foster paradigm shifts;
Practitioner perspective and implementation articles which discuss the transformation of basic
and applied research into real-world applications.
The journal aims to strengthen the cybersecurity and cyberprivacy communities by sharing
knowledge and practice between different communities that are traditionally separate, such as
technology and public policy. The broader scope of this journal aims to engage the public policy, legal,
crime prevention and law enforcement, economics, and social/psychology to guide and inform the
technical community towards the development and adoption of high-impact security and privacy
solutions. Specifically, since this journal aims to span communities, it not only supports the need
of researchers to explore the state of the art in the science and engineering of security and privacy,
but also foster the growth of this young field of research to ensure that scientists and engineers
are examining technologies that are of societal importance. The technical scope of this journal is
interdisciplinary, involving contributions from different technical disciplines, such as cryptography,
computer security, network security, information theory, signal processing, communications theory,
game theory, and machine learning/data mining. Broadly, our goal is to advance knowledge of the
domain of cybersecurity and its applications and pose and answer key questions that may define our
society for generations to come.
Harris, M. Researcher Hacks Self-Driving Car Sensors. Available online:
that-think/transportation/self-driving/researcher-hacks-selfdriving-car-sensors (accessed on 11 June 2018).
Rouf, I.; Miller, R.; Mustafa, H.; Taylor, T.; Oh, S.; Xu, W.; Gruteser, M.; Trappe, W.; Seskar, I. Security
and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study.
In Proceedings of the 19th USENIX Security Symposium, Washington, DC, USA, 11–13 August 2010; USENIX
Association: Berkeley, CA, USA, 2010; p. 21.
J. Cybersecur. Priv. 2018,13
3. Hackers Remotely Kill a Jeep on the Highway—With Me in It. Available online:
2015/07/hackers-remotely-kill-jeep-highway/ (accessed on 11 June 2018).
Gao, X.; Firner, B.; Sugrim, S.; Kaiser-Pendergrast, V.; Yang, Y.; Lindqvist, J. Elastic pathing: Your speed
is enough to track you. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and
Ubiquitous Computing (UbiComp ‘14), Seattle, WA, USA, 13–17 September 2014; ACM: New York, NY, USA,
2014; pp. 975–986.
5. Kevin, F. Inside risks: Reducing risks of implantable medical devices. Commun. ACM 2009,52, 25–27.
2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (
ResearchGate has not been able to resolve any citations for this publication.
Conference Paper
Full-text available
Wireless networks are being integrated into the modern automobile. The security and privacy implications of such in-car networks, however, have are not well under-stood as their transmissions propagate beyond the con-fines of a car's body. To understand the risks associated with these wireless systems, this paper presents a privacy and security evaluation of wireless Tire Pressure Moni-toring Systems using both laboratory experiments with isolated tire pressure sensor modules and experiments with a complete vehicle system. We show that eaves-dropping is easily possible at a distance of roughly 40m from a passing vehicle. Further, reverse-engineering of the underlying protocols revealed static 32 bit identi-fiers and that messages can be easily triggered remotely, which raises privacy concerns as vehicles can be tracked through these identifiers. Further, current protocols do not employ authentication and vehicle implementations do not perform basic input validation, thereby allowing for remote spoofing of sensor messages. We validated this experimentally by triggering tire pressure warning messages in a moving vehicle from a customized soft-ware radio attack platform located in a nearby vehicle. Finally, the paper concludes with a set of recommenda-tions for improving the privacy and security of tire pres-sure monitoring systems and other forthcoming in-car wireless sensor networks.
$60 lidar spoofing device generates fake cars, pedestrians and walls
Millions of patients benefit from programmable, implantable medical devices (IMDs) that treat chronic ailments such as cardiac arrhythmia, diabetes, and Parkinson's disease with various combinations of electrical therapy and drug infusion. However, the convergence of medicine with radio communication and Internet connectivity exposes these devices not only to safety and effectiveness risks, but also to security and privacy risks. Improving IMD security and privacy requires a proper mix of technology and regulation. Technological approaches to improving IMD security and privacy include judicious use of cryptography and limiting unnecessary exposure to would-be hackers. Premarket approval for life-sustaining IMDs should explicitly evaluate security and privacy. Legislators should mandate stronger security during premarket approval of life-sustaining IMDs that rely on either radio communication or computer networking. Legislators should give regulators the authority to require adequate privacy controls before allowing an IMD to reach the market
Elastic pathing: Your speed is enough to track you
  • X Gao
  • B Firner
  • S Sugrim
  • V Kaiser-Pendergrast
  • Y Yang
  • J Lindqvist
Gao, X.; Firner, B.; Sugrim, S.; Kaiser-Pendergrast, V.; Yang, Y.; Lindqvist, J. Elastic pathing: Your speed is enough to track you. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '14), Seattle, WA, USA, 13-17 September 2014; ACM: New York, NY, USA, 2014; pp. 975-986.