scholarly journals Safe MQTT-SN: a lightweight secure encrypted communication in IoT

2021 ◽  
Vol 2020 (1) ◽  
pp. 012044
Author(s):  
T L Kao ◽  
H C Wang ◽  
J E Li
2020 ◽  
pp. 1-26
Author(s):  
Qinwen Hu ◽  
Muhammad Rizwan Asghar ◽  
Nevil Brownlee

HTTPS refers to an application-specific implementation that runs HyperText Transfer Protocol (HTTP) on top of Secure Socket Layer (SSL) or Transport Layer Security (TLS). HTTPS is used to provide encrypted communication and secure identification of web servers and clients, for different purposes such as online banking and e-commerce. However, many HTTPS vulnerabilities have been disclosed in recent years. Although many studies have pointed out that these vulnerabilities can lead to serious consequences, domain administrators seem to ignore them. In this study, we evaluate the HTTPS security level of Alexa’s top 1 million domains from two perspectives. First, we explore which popular sites are still affected by those well-known security issues. Our results show that less than 0.1% of HTTPS-enabled servers in the measured domains are still vulnerable to known attacks including Rivest Cipher 4 (RC4), Compression Ratio Info-Leak Mass Exploitation (CRIME), Padding Oracle On Downgraded Legacy Encryption (POODLE), Factoring RSA Export Keys (FREAK), Logjam, and Decrypting Rivest–Shamir–Adleman (RSA) using Obsolete and Weakened eNcryption (DROWN). Second, we assess the security level of the digital certificates used by each measured HTTPS domain. Our results highlight that less than 0.52% domains use the expired certificate, 0.42% HTTPS certificates contain different hostnames, and 2.59% HTTPS domains use a self-signed certificate. The domains we investigate in our study cover 5 regions (including ARIN, RIPE NCC, APNIC, LACNIC, and AFRINIC) and 61 different categories such as online shopping websites, banking websites, educational websites, and government websites. Although our results show that the problem still exists, we find that changes have been taking place when HTTPS vulnerabilities were discovered. Through this three-year study, we found that more attention has been paid to the use and configuration of HTTPS. For example, more and more domains begin to enable the HTTPS protocol to ensure a secure communication channel between users and websites. From the first measurement, we observed that many domains are still using TLS 1.0 and 1.1, SSL 2.0, and SSL 3.0 protocols to support user clients that use outdated systems. As the previous studies revealed security risks of using these protocols, in the subsequent studies, we found that the majority of domains updated their TLS protocol on time. Our 2020 results suggest that most HTTPS domains use the TLS 1.2 protocol and show that some HTTPS domains are still vulnerable to the existing known attacks. As academics and industry professionals continue to disclose attacks against HTTPS and recommend the secure configuration of HTTPS, we found that the number of vulnerable domain is gradually decreasing every year.


2021 ◽  
Vol 42 (Supplement_1) ◽  
pp. S142-S142
Author(s):  
Theresa L Chin ◽  
Rita Frerk ◽  
Victor C Joe ◽  
Sara Sabeti ◽  
Kimberly Burton ◽  
...  

Abstract Introduction The COVID19 pandemic has led to anxiety and fears for the general public. People were concerned about coming to a medical facility where the virus might be transmitted. Furthermore, stay-at-home orders that were implemented during the pandemic did not apply to clinic visits but contributed to people staying at home even for medical care. We hypothesized that there were delays in burn care due to the pandemic. Methods We queried our clinic data for number of clinic visits and new burn evaluations by month. Patients referred to our clinic from March 15, 2020 to Sept 15, 2020 were reviewed for time of presentation after injury. Days from injury date to clinic referral date and days from clinic referral date to appointment date were calculated. Patients who were referred but did not show and were not seen in our ED were not included because injury date could not be determined. Univariate analysis was performed. Results As seen in Figure 1, our in-person clinic volume decreased in April and May 2020 but rebounded in June 2020 as compared to the number of clinic visits for the same months last year. Similarly, in Figure 2, our new burn evaluations decreased in April and May 2020 compared to our new burn volume from 2019. However, our video telehealth visits increased in March and April then decreased in June-August. Conclusions Our burn clinic remained open to see patients with burn injury throughout the pandemic, however, clinic visits were delayed early in the pandemic. While we had an increase in video telehealth, it does not account for the decrease in clinic visits. This may be due to low enrollment in the electronic medical record encrypted communication platform and/or limited knowledge/access to the technology. Additional care may have been informally given via telephone but not well captured. Furthermore, burn care was delivered in the following months. Additional investigation is necessary to see if the incidence of burn injury decreased.


2020 ◽  
Vol 11 (11) ◽  
pp. 5399-5417
Author(s):  
ZhiWei Peng ◽  
WenXin Yu ◽  
JunNian Wang ◽  
Jing Wang ◽  
Yu Chen ◽  
...  

TEME ◽  
2021 ◽  
pp. 095
Author(s):  
Darko Trifunović

 Over time, terrorism has evolved into different forms. One of the most dangerous is certainly cyber terrorism. There are many different motivations for terrorists to deploy cyber terrorism as a tool in their fight. Internet and computer networks are powerful resources on which contemporary society relies heavily. Terrorist groups have developed new tools and methods of the fight and they have become more effective, efficient, and unpredictable. Virtual, or cyberspace, is perfect and very safe ground for terrorist groups’ various activities, such are secret encrypted communication, file sharing, indoctrination and recruitment of vulnerable individuals, fundraising and promotions of their future actions and accomplishments spreading fear among common people. Are we adequately aware of these facts and prepared for countermeasures? The fact is that terrorists use mostly open-source tools (software) for their purposes, widely available and free of charge, as well as video games, popular social networks (mostly Twitter), and software developed by their programmers. The purpose of this paper is to point out some of the methods radical Islamic terrorist groups have been using and underline the importance of responding to this new security challenge.


Sign in / Sign up

Export Citation Format

Share Document