Advertisement

European Cybersecurity Research and the SerIoT Project

  • Joanna Domańska
  • Mateusz Nowak
  • Sawomir Nowak
  • Tadeusz Czachórski
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 935)

Abstract

This paper briefly reviews some recent research in Cybersecurity in Europe funded by the European Commission in areas such as mobile telephony, networked health systems, the Internet of Things. We then outline the objectives of the SerIoT Project which started in 2018 to address the security needs of fields such as Smart Cities, Smart Transportation Systems, Supply Chains and Industrial Informatics.

Keywords

Cybersecurity European Commission E-Health Smart Cities IoT Network attacks Random Neural Network Cognitive packet routing 

References

  1. 1.
    Abdelrahman, O.H., Gelenbe, E.: Time and energy in team-based search. Phys. Rev. E 87(3), 032125 (2013)CrossRefGoogle Scholar
  2. 2.
    Abdelrahman, O.H., Gelenbe, E.: Signalling storms in 3G mobile networks. In: IEEE International Conference on Communications, ICC 2014, Sydney, Australia, 10–14 June 2014, pp. 1017–1022. IEEE (2014).  https://doi.org/10.1109/ICC.2014.6883453
  3. 3.
    Abdelrahman, O.H., Gelenbe, E., Görbil, G., Oklander, B.: Mobile network anomaly detection and mitigation: The nemesys approach. In: Gelenbe E., Lent R. (eds.) Information Sciences and Systems 2013, pp. 429–438. Springer International Publishing, Cham (2013)CrossRefGoogle Scholar
  4. 4.
    Akinwande, O.J., Bi, H., Gelenbe, E.: Managing crowds in hazards with dynamic grouping. IEEE Access 3, 1060–1070 (2015)CrossRefGoogle Scholar
  5. 5.
    Akriotou, M., Mesaritakis, C., Grivas, E., Chaintoutis, C., Fragkos, A., Syvridis, D.: Random number generation from a secure photonic physical unclonable hardware module. In: Gelenbe, E., et al. (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop. CCIS, vol. 821. Springer, Cham (2018)Google Scholar
  6. 6.
    Brun, O., Wang, L., Gelenbe, E.: Big data for autonomic intercontinental communications. IEEE Trans. Sel. Areas Commun. 34(3), 575–583 (2016)CrossRefGoogle Scholar
  7. 7.
    Brun, O., Yin, Y., Gelenbe, E., Kadioglu, Y.M., Augusto-Gonzalez, J., Ramos, M.: Deep learning with dense random neural networks for detecting attacks against IoT-connected home environments. In: Gelenbe, E. (ed.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop. CCIS, vol. 821. Springer, Cham (2018)Google Scholar
  8. 8.
    Castaldo, L., Cinque, V.: Blockchain based logging for the cross-border exchange of ehealth data in Europe. Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop. CCIS, vol. 821. Springer, Cham (2018)Google Scholar
  9. 9.
    Collen, A., et al.: Ghost - safe-guarding home IoT environments with personalised real-time risk control. In: Gelenbe, E., et al. (eds.) Recent Cyber security Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Communications in Computer and Information Science, vol. 821. Springer, Cham (2018)Google Scholar
  10. 10.
    Cramer, C.E., Gelenbe, E.: Video quality and traffic QoS in learning-based subsampled and receiver-interpolated video sequences. IEEE J. Sel. Areas Commun. 18(2), 150–167 (2000)CrossRefGoogle Scholar
  11. 11.
    Czachórski, T., Gelenbe, E., Lent, R.: Information Sciences and Systems. Springer International Publishing, Cham (2014)Google Scholar
  12. 12.
    Desmet, A., Gelenbe, E.: Graph and analytical models for emergency evacuation. In: 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM 2013 Workshops, San Diego, CA, USA, 18–22 March 2013, pp. 523–527 (2013).  https://doi.org/10.1109/PerComW.2013.6529552
  13. 13.
    Domanska, J., Czachòrski, T., Nowak, M., Nowak, S., Gelenbe, E.: Sercpn: smart software defined network for IoT (2018). (To appear)Google Scholar
  14. 14.
    Domanska, J., Gelenbe, E., Czachorski, T., Drosou, A., Tzovaras, D.: Research and innovation action for the security of the internet of things: the SerIoT project. In: Gelenbe, E. (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Communications in Computer and Information Science, vol. 821. Springer, Cham (2018)Google Scholar
  15. 15.
    Ermis, O., Bahtiyar, S., Anarim, E., Çaglayan, M.U.: A key agreement protocol with partial backward confidentiality. Comput. Netw. 129, 159–177 (2017).  https://doi.org/10.1016/j.comnet.2017.09.008CrossRefGoogle Scholar
  16. 16.
    Faiella, G., et al.: Building an ethical framework for cross-border applications: the konfido project. In: Gelenbe, E., et al. (eds.) Recent Cyber security Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Communications in Computer and Information Science, vol. 821. Springer, Cham (2018)Google Scholar
  17. 17.
    François, F., Abdelrahman, O.H., Gelenbe, E.: Impact of signaling storms on energy consumption and latency of LTE user equipment. In: 17th IEEE International Conference on High Performance Computing and Communications, HPCC 2015, 7th IEEE International Symposium on Cyberspace Safety and Security, CSS 2015, and 12th IEEE International Conference on Embedded Software and Systems, ICESS 2015, New York, NY, USA, 24–26 Aug 2015, pp. 1248–1255 (2015).  https://doi.org/10.1109/HPCC-CSS-ICESS.2015.84
  18. 18.
    François, F., Gelenbe, E.: Optimizing secure sdn-enabled inter-data centre overlay networks through cognitive routing. In: 24th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2016, London, United Kingdom, 19–21 Sept 2016, pp. 283–288 (2016).  https://doi.org/10.1109/MASCOTS.2016.26
  19. 19.
    François, F., Gelenbe, E.: Towards a cognitive routing engine for software defined networks. In: 2016 IEEE International Conference on Communications, ICC 2016, Kuala Lumpur, Malaysia, 22–27 May 2016, pp. 1–6 (2016).  https://doi.org/10.1109/ICC.2016.7511138
  20. 20.
    Gelenbe, E. et al. (eds.): Proceedings of the 2018 ISCIS Security Workshop: Recent Cybersecurity Research in Europe, vol. 821. Lecture Notes CCIS, Springer (2018)Google Scholar
  21. 21.
    Gelenbe, E.: Random neural networks with negative and positive signals and product form solution. Neural Comput. 1(4), 502–510 (1989)CrossRefGoogle Scholar
  22. 22.
    Gelenbe, E.: Réseaux neuronaux aléatoires stables. Comptes Rendus de l’Académie des sciences. Série 2 310(3), 177–180 (1990)Google Scholar
  23. 23.
    Gelenbe, E.: Learning in the recurrent random neural network. Neural Comput. 5(1), 154–164 (1993)CrossRefGoogle Scholar
  24. 24.
    Gelenbe, E.: Genetic algorithms with analytical solution. In: Proceedings of the 1st Annual Conference on Genetic Programming, pp. 437–443. MIT Press (1996)Google Scholar
  25. 25.
    Gelenbe, E.: Dealing with software viruses: a biological paradigm. Inf. Sec. Tech. Rep. 12(4), 242–250 (2007)CrossRefGoogle Scholar
  26. 26.
    Gelenbe, E.: Steady-state solution of probabilistic gene regulatory networks. Phys. Rev. E 76(1), 031903 (2007)CrossRefGoogle Scholar
  27. 27.
    Gelenbe, E.: Steps toward self-aware networks. Commun. ACM 52(7), 66–75 (2009)CrossRefGoogle Scholar
  28. 28.
    Gelenbe, E.: Search in unknown random environments. Phys. Rev. E 82, 061112 (2010)CrossRefGoogle Scholar
  29. 29.
    Gelenbe, E.: A software defined self-aware network: the cognitive packet network. In: IEEE 3rd Symposium on Network Cloud Computing and Applications, NCCA 2014, Rome, Italy, 5–7 Feb 2014, pp. 9–14 (2014).  https://doi.org/10.1109/NCCA.2014.9
  30. 30.
    Gelenbe, E., Bi, H.: Emergency navigation without an infrastructure. Sensors 14(8), 15142–15162 (2014)CrossRefGoogle Scholar
  31. 31.
    Gelenbe, E., Caseau, Y.: The impact of information technology on energy consumption and carbon emissions. Ubiquity 2015(June), 1 (2015)CrossRefGoogle Scholar
  32. 32.
    Gelenbe, E., Domanska, J., Czachorski, T., Drosou, A., Tzovaras, D.: Security for internet of things: the seriot project. In: Proceedings of the International Symposium on Networks, Computers and Communications. IEEE (2018)Google Scholar
  33. 33.
    Gelenbe, E. et al.: Nemesys: Enhanced network security for seamless service provisioning in the smart mobile ecosystem. In: Gelenbe E., Lent R. (eds.) Information Sciences and Systems 2013, pp. 369–378. Lecture Notes in Electrical Engineering, vol 264. Springer International Publishing, Cham (2013)CrossRefGoogle Scholar
  34. 34.
    Gelenbe, E. et al.: Security for smart mobile networks: the nemesys approach. In: 2013 International Conference on Privacy and Security in Mobile Systems (PRISMS), pp. 1–8. IEEE (2013)Google Scholar
  35. 35.
    Gelenbe, E., Kadioglu, Y.M.: Energy life-time of wireless nodes with network attacks and mitigation. In: Proceedings of ICC 2018, 20–24 May 2018, W04: IEEE Workshop on Energy Harvesting Wireless Communications. IEEEGoogle Scholar
  36. 36.
    Gelenbe, E., Lent, R.: Power-aware ad hoc cognitive packet networks. Ad Hoc Netw. 2(3), 205–216 (2004)CrossRefGoogle Scholar
  37. 37.
    Gelenbe, E., Lent, R., Montuori, A., Xu, Z.: Cognitive packet networks: Qos and performance. In: Proceedings of 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems, MASCOTS 2002, pp. 3–9. IEEE (2002)Google Scholar
  38. 38.
    Gelenbe, E., Lent, R., Nunez, A.: Self-aware networks and qos. Proc. IEEE 92(9), 1478–1489 (2004)CrossRefGoogle Scholar
  39. 39.
    Gelenbe, E., Lent, R., Xu, Z.: Design and performance of cognitive packet networks. Perform. Eval. 46(2), 155–176 (2001)CrossRefGoogle Scholar
  40. 40.
    Gelenbe, E., Lent, R., Xu, Z.: Measurement and performance of a cognitive packet network. Comput. Netw. 37(6), 691–701 (2001)CrossRefGoogle Scholar
  41. 41.
    Gelenbe, E., Lent, R., Xu, Z.: Towards networks with cognitive packets. In: Goto K., Hasegawa T., Takagi H., Takahashi Y. (eds.) Performance and QoS of Next Generation Networking, pp. 3–17. Springer, Cham (2001)Google Scholar
  42. 42.
    Gelenbe, E., Liu, P.: Qos and routing in the cognitive packet network. In: Sixth IEEE International Symposium on World of Wireless Mobile and Multimedia Networks, WoWMoM 2005, pp. 517–521. IEEE (2005)Google Scholar
  43. 43.
    Gelenbe, E., Liu, P., Laine, J.: Genetic algorithms for route discovery. IEEE Trans. Syst. Man Cybern. Part B (Cybernetics) 36(6), 1247–1254 (2006)CrossRefGoogle Scholar
  44. 44.
    Gelenbe, E., Loukas, G.: A self-aware approach to denial of service defence. Comput. Netw. 51(5), 1299–1314 (2007)CrossRefGoogle Scholar
  45. 45.
    Gelenbe, E., Mahmoodi, T.: Energy-aware routing in the cognitive packet network. Energy, pp. 7–12 (2011)Google Scholar
  46. 46.
    Gelenbe, E., Mahmoodi, T.: Distributed energy-aware routing protocol. In: Computer and Information Sciences II, pp. 149–154. Springer, London (2012)CrossRefGoogle Scholar
  47. 47.
    Gelenbe, E., Ngai, E.C.H.: Adaptive qos routing for significant events in wireless sensor networks. In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008. MASS 2008, pp. 410–415. IEEE (2008)Google Scholar
  48. 48.
    Gelenbe, E., Ngai, E.C., Yadav, P.: Routing of high-priority packets in wireless sensor networks. In: IEEE Second International Conference on Computer and Network Technology, IEEE (2010)Google Scholar
  49. 49.
    Gelenbe, E., Pujolle, G.: Introduction aux réseaux de files d’attente. Edition Hommes et Techniques et Techniques, Eyrolles (1982)zbMATHGoogle Scholar
  50. 50.
    Gelenbe, E., Sakellari, G., D’arienzo, M.: Admission of qos aware users in a smart network. ACM Trans. Auton. Adapt. Syst. (TAAS) 3(1), 4 (2008)CrossRefGoogle Scholar
  51. 51.
    Gelenbe, E., Sungur, M., Cramer, C., Gelenbe, P.: Traffic and video quality with adaptive neural compression. Multimed. Syst. 4(6), 357–369 (1996).  https://doi.org/10.1007/s005300050037CrossRefGoogle Scholar
  52. 52.
    Gelenbe, E., Wu, F.J.: Large scale simulation for human evacuation and rescue. Comput. Math. Appl. 64(12), 3869–3880 (2012)CrossRefGoogle Scholar
  53. 53.
    Gelenbe, E., Wu, F.J.: Future research on cyber-physical emergency management systems. Future Internet 5(3), 336–354 (2013)CrossRefGoogle Scholar
  54. 54.
    Gelenbe, E., Yin, Y.: Deep learning with random neural networks. In: 2016 International Joint Conference on Neural Networks (IJCNN). IEEE, July 2016Google Scholar
  55. 55.
    Geneiatakis, D., Baldini, G., Fovino, I.N., Vakalis, I.: Towards a mobile malware detection framework with the support of machine learning. In: Gelenbe, E., et al. (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Lecture Notes CCIS, vol. 821, Springer (2018)Google Scholar
  56. 56.
    Gorbil, G., Abdelrahman, A.H., Pavloski, M., Gelenbe, E.: Modeling and analysis of rrc-based signaling storms in 3g networks. IEEE Trans. Emerg. Topics Comput. 4(1), 113–127 (2016)CrossRefGoogle Scholar
  57. 57.
    Gorbil, G., Gelenbe, E.: Opportunistic communications for emergency support systems. Procedia Comput. Sci. 5, 39–47 (2011)CrossRefGoogle Scholar
  58. 58.
    Görbil, G., Abdelrahman, O.H., Gelenbe, E.: Storms in mobile networks. In: Mueller, P., Foschini, L., Yu, R. (eds.) Q2SWinet’14, Proceedings of the 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Montreal, QC, Canada, September 21–22, 2014. pp. 119–126. ACM (2014).  https://doi.org/10.1145/2642687.2642688
  59. 59.
    Horváth, M., Buttyán, L.: Problem domain analysis of iot-driven secure data markets. In: Gelenbe, E. et al., (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Lecture Notes CCIS, vol. 821, Springer (2018)Google Scholar
  60. 60.
    Jiang, H., Liu, F., Thulasiram, R.K., Gelenbe, E.: Guest editorial: Special issue on green pervasive and ubiquitous systems. IEEE Syst. J. 11(2), 806–812 (2017).  https://doi.org/10.1109/JSYST.2017.2673218CrossRefGoogle Scholar
  61. 61.
    Kouzinopoulos, C.S. et al.: Using blockchains to strengthen the security of internet of things. In: Gelenbe, E. et al., (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Lecture Notes CCIS. vol. 821, Springer (2018)Google Scholar
  62. 62.
    Levi, A., Çaglayan, M.U., Koç, Ç.K.: Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure. ACM Trans. Inf. Syst. Secur. 7(1), 21–59 (2004).  https://doi.org/10.1145/984334.984336CrossRefGoogle Scholar
  63. 63.
    Liu, P., Gelenbe, E.: Recursive routing in the cognitive packet network. In: 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities, 2007. TridentCom 2007, pp. 1–6. IEEE (2007)Google Scholar
  64. 64.
    Ngai, E.C., Gelenbe, E., Humber, G.: Information-aware traffic reduction for wireless sensor networks. In: IEEE 34th Conference on Local Computer Networks, 2009. LCN 2009, pp. 451–458. IEEE (2009)Google Scholar
  65. 65.
    Oke, G., Loukas, G., Gelenbe, E.: Detecting denial of service attacks with bayesian classifiers and the random neural network. In: IEEE International Fuzzy Systems Conference, 2007. FUZZ-IEEE 2007, pp. 1–6. IEEE (2007)Google Scholar
  66. 66.
    Pavloski, M.: Signalling attacks in mobile telephony. In: Gelenbe, E. et al., (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Lecture Notes CCIS No. 821, Springer (2018)Google Scholar
  67. 67.
    Pavloski, M., Gelenbe, E.: Mitigating for signalling attacks in umts networks. In: Information Sciences and Systems 2014, pp. 159–165. Springer International Publishing (2014)Google Scholar
  68. 68.
    Pavloski, M., Gelenbe, E.: Signaling attacks in mobile telephony. In: SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28–30 August, 2014. pp. 206–212 (2014).  https://doi.org/10.5220/0005019802060212
  69. 69.
    Sakellari, G., Gelenbe, E.: Adaptive resilience of the cognitive packet network in the presence of network worms. In: Proceedings of the NATO Symposium on C3I for Crisis, Emergency and Consequence Management, pp. 11–12 (2009)Google Scholar
  70. 70.
    Sakellari, G., Gelenbe, E.: Demonstrating cognitive packet network resilience to worm attacks. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 636–638. ACM (2010)Google Scholar
  71. 71.
    Sakellari, G., Hey, L., Gelenbe, E.: Adaptability and failure resilience of the cognitive packet network. In: Demo Session of the 27th IEEE Conference on Computer Communications (INFOCOM2008), Phoenix, Arizona, USA (2008)Google Scholar
  72. 72.
    Siavvas, M., Gelenbe, E., Kehagias, D., Tzovaras, D.: Static analysis-based approaches for secure software development. In: Gelenbe, E. et al., (eds.) Proceedings of the 2018 ISCIS Security Workshop: Recent Cybersecurity Research in Europe. vol. 821. Lecture Notes CCIS, Springer (2018)Google Scholar
  73. 73.
    Staffa, M. et al.: An openncp-based secure ehealth data exchange system. In: Gelenbe, E. et al., (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Lecture Notes CCIS No. 821, Springer (2018)Google Scholar
  74. 74.
    Wang, L., Brun, O., Gelenbe, E.: Adaptive workload distribution for local and remote clouds. In: 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 003984–003988. IEEE (2016)Google Scholar
  75. 75.
    Wang, L., Gelenbe, E.: Adaptive dispatching of tasks in the cloud. IEEE Trans. Cloud Comput. 6(1), 33–45 (2018)CrossRefGoogle Scholar
  76. 76.
    Yu, C., Ni, G., Chen, I., Gelenbe, E., Kuo, S.: Top-\(k\) query result completeness verification in tiered sensor networks. IEEE Trans. Inf. Forensics Secur. 9(1), 109–124 (2014).  https://doi.org/10.1109/TIFS.2013.2291326CrossRefGoogle Scholar
  77. 77.
    Yu, C.M., Ni, G.K., Chen, Y., Gelenbe, E., Kuo, S.Y.: Top-k query result completeness verification in sensor networks. In: 2013 IEEE International Conference on Communications Workshops (ICC), pp. 1026–1030. IEEE (2013)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Joanna Domańska
    • 1
  • Mateusz Nowak
    • 1
  • Sawomir Nowak
    • 1
  • Tadeusz Czachórski
    • 1
  1. 1.IITIS Polish Academy of ScienceGliwicePoland

Personalised recommendations