scholarly journals A mutation framework for evaluating security analysis tools in IoT applications

Author(s):  
Manar H. Alalfi ◽  
Sajeda Parveen ◽  
Bara' Nazzal
Author(s):  
Muthukumaran V. ◽  
Ezhilmaran D.

In recent years, the growth of IoT applications is rapid in nature and widespread across several domains. This tremendous growth of IoT applications leads to various security and privacy concerns. The existing security algorithms fail to provide improved security features across IoT devices due to its resource constrained nature (inability to handle a huge amount of data). In this context, the authors propose a cloud-assisted proxy re-encryption scheme for efficient data sharing across IoT systems. The proposed approach solves the root extraction problem using near-ring. This improves the security measures of the system. The security analysis of the proposed approach states that it provides improved security with lesser computational overheads.


2020 ◽  
Vol 10 (24) ◽  
pp. 9119
Author(s):  
Francesc Mateo Tudela ◽  
Juan-Ramón Bermejo Higuera ◽  
Javier Bermejo Higuera ◽  
Juan-Antonio Sicilia Montalvo ◽  
Michael I. Argyros

The design of the techniques and algorithms used by the static, dynamic and interactive security testing tools differ. Therefore, each tool detects to a greater or lesser extent each type of vulnerability for which they are designed for. In addition, their different designs mean that they have different percentages of false positives. In order to take advantage of the possible synergies that different analysis tools types may have, this paper combines several static, dynamic and interactive analysis security testing tools—static white box security analysis (SAST), dynamic black box security analysis (DAST) and interactive white box security analysis (IAST), respectively. The aim is to investigate how to improve the effectiveness of security vulnerability detection while reducing the number of false positives. Specifically, two static, two dynamic and two interactive security analysis tools will be combined to study their behavior using a specific benchmark for OWASP Top Ten security vulnerabilities and taking into account various scenarios of different criticality in terms of the applications analyzed. Finally, this study analyzes and discuss the values of the selected metrics applied to the results for each n-tools combination.


Author(s):  
F. Rougaii ◽  
T. Mazri

Abstract. Recent years have seen a new amalgamation between Remote virtual doctor systems and healthcare IoT applications which plays a crucial role in enhancing patient’s healthcare life. The Remote VDS connected with smart Healthcare devices through the wireless network to be accessible anytime and anywhere is anticipated to treat rapidly valuable and confidential data such as personal medical images. Therefore, quick medical image encryption is an essential task in healthcare topic. Some medical image encryption research like the Scan methodology proposed for Remote VDS suffers from a long computational time. Then, the patient will confront difficulty on treatment availability in real-time and especially for critical situations. To overcome this problem, in this work, three medical image encryption methods are compared, (1) A Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications, (2) A new chaotic map with dynamic analysis and encryption application on the Internet of Health Things, and (3) Robust medical image encryption based on DNA chaos method. The comparison results have proven that the new chaotic map with a dynamic analysis scheme has high-security analysis and performances with low computational time compared to other methods. That makes it a good candidate for the H-IOT-RVDS environment connecting over 5G technology like a cellular network to enable connectivity between nodes.


Sign in / Sign up

Export Citation Format

Share Document