Mobile Internet Security
Mobile Internet Security
Mobile Internet Security
You
Hsing-Chung Chen
Fang-Yie Leu
Igor Kotenko (Eds.)
123
Editors
Ilsun You Hsing-Chung Chen
Department of Information Security Asia University
Engineering Taichung, Taiwan
Soonchunhyang University Igor Kotenko
Asan, Korea (Republic of)
SPIIRAS
Fang-Yie Leu St. Petersburg, Russia
Tunghai University
Taichung, Taiwan
This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface
In the 5G/beyond era, people will soon enjoy high-speed data transmission and ver-
satile network services from the Internet to enrich and color their lives with various
facilities, like Artificial Internet of Things (AIoT), Distributed Mobility Management
(DMM), and network slicing, requesting more secure and low-latency techniques. To
achieve this, emerging communication technologies need to be further developed to
leverage various solutions which emphasize communication efficiency, mobility, and
low latency, aiming to facilitate network services with a better connectivity and high
Quality of Experience (QoE). Despite the revolutionary mobile technologies, the
adoption of such technologies will leave several challenges, like security, privacy, and
trust, and other issues, like user identity management based on Subscriber Identification
Module, mutual authentication between networks and users, securing the paths
established between communicating parties, etc.
This volume contains revised and selected papers, which were submitted to and
presented at the 4th International Symposium on Mobile Internet Security (MobiSec),
held at Hotel National, Taichung, Taiwan, during October 17–19, 2019, and from
general submissions. Actually, MobiSec 2019 brought the academia and industry
together to exchange ideas and explore new research directions, for solving the chal-
lenges in mobility internet security. MobiSec has so far provided an international forum
for sharing original research results among specialists in fundamental and applied
problems of mobile Internet security. It publishes high-quality papers, which are clo-
sely related to various theories and practical applications in mobility management,
mobile applications, and vehicular network security. A part of them utilizes deep
learning techniques so as to highlight their state-of-the-art research.
The symposium was organized by the Korea Institute of Information Security and
Cryptology (KIISC) Research Group on 5G Security, technically sponsored by KIISC,
and held in cooperation with Tunghai University and Asia University, Taiwan.
A total of 40 papers related to significant aspects of theory and applications of
mobile security were accepted for presentation at MobiSec 2019. Moreover, this
symposium is further powered by the keynotes entitled “Authentication and Autho-
rization mechanism and security bootstrapping in the IoTenabled 5G Era” by Prof.
Antonio Skarmeta from the University of Murcia, Spain, “RECO, SLV and free5GC–a
path toward softwarization and virtualization of 5G core networks” by Prof. Jyh-Cheng
Chen from National Chiao Tung University, Taiwan, and “From Rail to Railless:
Retrofitting Servicing Buses for Safe Autonomous Public Transportation” by Prof.
Chi-Sheng Shih from National Taiwan University, Taiwan.
Among all these papers as well as open submissions, only 13 papers were selected
for publication in CCIS. The success of this symposium was assured by team efforts of
sponsors, organizers, reviewers, and participants. We would like to acknowledge the
contributions of the individual Program Committee members and thank the paper
vi Preface
reviewers. Our sincere gratitude goes to the participants of this symposium and all
authors of those submitted papers.
We would also like to express our gratitude to the Springer team managed, led by
Alfred Hofmann, for their help and cooperation.
Honorary Chairs
Kyung-Hyune Rhee Pukyong National University, South Korea
Jeffrey J. P. Tsai Asia University, Taiwan
Mao-Jiun Wang Tunghai University, Taiwan
General Co-chairs
Fang-Yie Leu Thunghai University, Taiwan
Ilsun You Soonchunhyang University, South Korea
Program Co-chairs
Tianhan Gao Northeastern University, China
Chao-Tung Yang Tunghai University, Taiwan
Publication Chairs
Yun-Shyan Chen National Taipei University, Taiwan
Igor Kotenko SPIIRAS and ITMO University, Russia
viii Organization
Publicity Chair
Han-Chieh Chao National Dong Hwa University, Taiwan
Program Committee
Ramón Alcarria Universidad Politécnica de Madrid, Spain
Hiroaki Anada University of Nagasaki, Japan
Alessandro Armando University of Genoa, Italy
Jinyong Chang Xi’an University of Architecture and Technology,
China
Andrey Chechulin The Bonch-Bruevich Saint-Petersburg State University
of Telecommuncations, Russia
Chin-Ling Chen Chaoyang University of Technology, Taiwan
Luigi Coppolino Epsilon Srl., Italy
Salvatore D’Antonio Parthenope University of Naples, Italy
Novikova Evgenia Saint Petersburg Electrotechnical University, Russia
Ugo Fiore Parthenope University of Naples, Italy
Jianfeng Guan Beijing University of Posts and Telecommunications,
China
Nan Guo Northeastern University, China
Zheli Liu Nankai University, China
C. Mala NIT Tiruchirappalli, India
Alessio Merlo University of Genoa, Italy
Narendran Rajagopalan NIT Puducherry, India
Igor Saenko Signal Academy, Russia
Kunwar Singh NIT Tiruchirappalli, India
Fei Song Beijing Jiaotong University, China
Amril Syalim Universitas Indonesia, Indonesia
Zhenhua Tan Northeastern University, China
Kun-Lin Tsai Tunghai University, Taiwan
Noriki Uchida Fukuoka Institute of Technology, Japan
Fulvio Valenza Politecnico di Torino, Italy
Salvatore Vitabile University of Palermo, Italy
Isaac Woungang Ryerson University, Canada
Jian Xu Northeastern University, China
Zhiwei Yan CNNIC, China
Kuo-Hui Yeh National Dong Hwa University, Taiwan
Baokang Zhao National University of Defense Technology, China
Contents
1 Introduction
IoT is the key enabler in empowering industries as well as individuals to unleash
their potential by allowing multiple devices to be connected, collaborated and
delivering services through internet. The impact created by IoT to the society
is quite significant, including the economic impact which has a total potential
to reach up to $11 trillion by 2025 according to McKinsey [11]. The economic
c Springer Nature Singapore Pte Ltd. 2020
I. You et al. (Eds.): MobiSec 2019, CCIS 1121, pp. 3–12, 2020.
https://doi.org/10.1007/978-981-15-9609-4_1
4 A. Syalim et al.
values received by vertical sectors are also shared by telco operators, service
providers and device vendors [4,13]. Furthermore, Ericsson predicted that there
will be more IoT devices connected to the Internet than mobile phones by 2021
[6]. Thus, IoT becomes a very interesting market for telco industry (including
vendors and operators), in which they are trying to provide IoT connectivity
through legacy Long Term Evolution (LTE) networks and future 5G technology
– also known as cellular Low Power Wide Area (LPWA) [6,13].
In general, various IoT use cases that can be enabled by 5G technologies
are categorized into massive IoT and critical IoT [6]. Massive IoT applications
are typically (massive) sensors that regularly report to the cloud with low end-
to-end cost. The basic requirements for such applications are low cost devices,
low energy consumption and good coverage [6]. In addition, security is another
major requirement for some massive IoT applications with respect to devices
and connectivity [6,8]. Moreover, IoT data can be benefited from cloud database
services with a trusted computing and analysis [5].
One of the most important and challenging security aspects in 5G enabled
massive IoT applications is in establishing secure and efficient authentication
between IoT devices and 5G network [12]. When massive amount of IoT devices
request access to 5G networks simultaneously, there will be signaling storm to
the operator’s networks. Furthermore, the attackers may compromise a lot of IoT
devices and make authentication attempts repeatedly, which may lead to DoS
attacks. Thus, the authentication scheme needs to reduce the number of signaling
to the 5G network. In addition, low cost device – which correlate to small memory
size and computing power – and low power consumption requirements signify
that the authentication scheme needs to employ low complexity computation and
small footprint. To address such challenges, efficient authentication for a group of
IoT devices based on aggregation signature and Identity-based Signature (IBS)
have been proposed in 3GPP TR 33.899 V1.3.0 [1] (through sections 5.2.4.15 and
5.2.4.16). The solution utilizes an aggregation node (AN), e.g. base station, relay
User Equipment (UE), or gateway, to aggregate the authentication message and
then send it to the authentication unit of the network for group authentication.
We envision that the combination of IBS [15] and aggregation signature –
called Identity-based Aggregate Signature (IBAS) – is suitable for IoT environ-
ment since there is no need to use certificate. Some IBAS schemes have been
previously proposed by researchers, e.g. [3,7,9,10,14,16], but there have been no
discussion about implementing IBAS for aggregate authentication in 5G enabled
massive IoT. This article compares and analyzes the performance of the existing
IBAS schemes in terms of computation time and aggregation signature size. Fur-
thermore, research challenges of the IBAS schemes to be implemented in massive
IoT environment are highlighted.
In the first part, all IoT UE are authenticated at once by the authenticator
through successful verification of the aggregate signature generated by AN, which
is a function of authentication message’s signature sent by each IoT UE. Here, the
6 A. Syalim et al.
authenticator does not need to authenticate each IoT UE one by one thanks to
the aggregate signature. In the second part, the authenticator is authenticated by
each IoT UE through successful verification of authentication response message’s
signature sent by authenticator. In the third part, each IoT UE generates session
key and then send another response message to AN. The latter then creates
aggregate signature of the response message’s signature sent by each IoT UE to
authenticator. Upon received, the authenticator verifies the aggregate signature
and then generates a set of corresponding session keys for each IoT UE. It
should be noted that whenever the authentication process is failed, because the
authenticator cannot identify which message is not trustworthy, the protocol
has no choice other than repeating the authentication procedure. A possibility
to reduce the request to repeat the procedure is by reducing the number of
member in the authentication group as also suggested in the protocol. All in all,
the number of authentication message, e.g. signaling, to the authenticator in 5G
network can be greatly reduced thanks to aggregate signature created by AN.
Hence, 5G becomes more resilient to the issue of signaling storm and even DoS
attacks. Moreover, the performance of the aggregate authentication protocol that
relies on IBAS scheme is very important to fulfil other requirements of massive
IoT, i.e. low cost device and low power consumption. The performance analysis
of existing IBAS schemes will be carried out in the next section.
Aggregate Authentication for Massive Internet of Things in 5G Networks 7
The scheme of Cheon et al. needs three scalar multiplications in the ellip-
tic curve and one addition operation. The size of the aggregate signature is
(N S + 1)|G| and the aggregation verification time is (N + 1)pair +N mul. The
comparisons of six IBAS schemes are shown in Table 1.
To calculate more concrete values of the IBAS operations, we use the bench-
mark provided by the famous cryptographic operation library MIRACL. First,
we summarize the MIRACL benchmark for a super-singular curve on Galois field
GF (2379) that provides 80-bit safety and a Baretto-Naehrig Curve (128/BN)
on a Galois field GF (p, where p is a prime number with a size of 256 bits) that
provides 128 bit safety in Table 2 below.
By assuming that the time to convert to elliptic curve point (m2p) is linear
to two scalar multiplications (mul), and if the number of messages N = 1000,
number of signatures N S = 1000, the size of |m| = 1000 (bits), the size of |w|
= 128 (bits), and the size of identity |ID| = 300, we compute the cost of IBAS
in Table 3 below.
According to Table 3, the IBAS scheme that provides the smallest size of
the aggregate signature is the scheme proposed by Hohenberger et al., followed
by Gentry et al., Yuan et al. However, the scheme of Hohenberger et al., needs
Aggregate Authentication for Massive Internet of Things in 5G Networks 9
longer signature time. In case of Cheon et al., Herranz et al., and S. Deva Selvi
et al., signature time is faster, but the size of the aggregate signature is very
large.
Table 1. Theoretical computational time and signature size of several IBAS schemes
Table 2. Miracl benchmark for curves that provide 80- and 128-Bits safety
Since the prevention of signaling storms in Massive IoT is the most important
requirement, the IBAS schemes of Cheon et al., Herranz et al., S. Deva Selvi
et al. are not suitable for the authentication protocol for massive IoT as the size of
aggregate signature grows linearly with the number of messages and (individual)
signatures. In addition, Hohenberger et al.’s IBAS is also not suitable for massive
IoT environments due to the significantly longer signature time and aggregate
signature verification time.
Therefore, we conclude that Gentry et al.’s IBAS and Yuan et al.’s IBAS are
the most suitable schemes for Massive IoT environment. We, however, remark
that there are certain differences between the two schemes to consider when
they are used in practice. Gentry et al.’s IBAS provides a shorter aggregate
signature, which is very useful in preventing signal overload in AA-mIoT, which
is considered as of prime importance [4]. Furthermore, the aggregate signature
verification time is slightly more efficient in Gentry et al.’s scheme. However, in
Gentry et al.’s IBAS scheme, signature generation takes more time than Yuan et
al.’s. Since signature generation is required in each IoT device, which is usually
low-powered, those devices will be greatly benefited from more efficient signature
generation offered on Yuan et al.’s scheme.
10 A. Syalim et al.
Table 3. Computational time and signature size computed with miracl benchmark
library
4 Research Challenges
5 Conclusions
In this article, we have analyzed the performance of the existing ID-Based Aggre-
gate Signature (IBAS) schemes assuming that they are used as authentication
Aggregate Authentication for Massive Internet of Things in 5G Networks 11
protocols for massive IoT devices. In particular, we compared the signature time,
the aggregate signature size, and the aggregate signature verification time of
those schemes. Following the analysis, we concluded that Gentry et al.’s [7] and
Yuan et al.’s [16] IBAS schemes are the most suitable ones to use in the authenti-
cation protocol for massive IoT. We also identified the main research challenges.
The first one is to do more specific and feasibility analysis on the performance of
the authentication schemes by actually implementing the existing IBAS schemes
in the massive IoT platform. The second one is to elaborate whether it is pos-
sible to further reduce the computational cost needed to implement public-key
signature based system. The last one is how to better handle the authentication
failure during the verification of the signature aggregate to reduce the redundant
overhead of communication and computation.
References
1. 3GPP: Study on the security aspects of the next generation system (release 14).
Technical report, August 2017
2. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In:
Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Hei-
delberg (2001). https://doi.org/10.1007/3-540-45682-1 30
3. Cheon, J.H., Kim, Y., Yoon, H., et al.: A new ID-based signature with batch
verification. IACR Cryptol. ePrint Arch. 2004, 131 (2004)
4. Choudhary, G., Kim, J., Sharma, V.: Security of 5G-mobile backhaul networks:
a survey. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA)
9(4), 41–70 (2018)
5. Drucker, N., Gueron, S.: Achieving trustworthy homomorphic encryption by com-
bining it with a trusted execution environment. J. Wirel. Mob. Netw. Ubiquitous
Comput. Dependable Appl. (JoWUA) 9(1), 86–99 (2018)
6. Ericsson: Cellular networks for massive IoT. Technical report, January 2016
7. Gentry, C., Ramzan, Z.: Identity-based aggregate signatures. In: Yung, M., Dodis,
Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 257–273.
Springer, Heidelberg (2006). https://doi.org/10.1007/11745853 17
8. Gupta, T., Choudhary, G., Sharma, V.: A survey on the security of pervasive online
social networks (POSNs). J. Int. Serv. Inf. Secur. (JISIS) 8(2), 48–86 (2018)
9. Herranz, J.: Deterministic identity-based signatures for partial aggregation. Com-
put. J. 49(3), 322–330 (2005)
10. Hohenberger, S., Sahai, A., Waters, B.: Full domain hash from (leveled) multilinear
maps and identity-based aggregate signatures. In: Canetti, R., Garay, J.A. (eds.)
CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 494–512. Springer, Heidelberg (2013).
https://doi.org/10.1007/978-3-642-40041-4 27
11. James, M., et al.: The internet of things: Mapping the value beyond the hype.
McKinsey Global Institute 3 (2015)
12. Kotenko, I., Saenko, I., Branitskiy, A.: Applying big data processing and machine
learning methods for mobile internet of things security monitoring. J. Int. Serv.
Inf. Secur. (JISIS) 8(3), 54–63 (2018)
13. Madueño, G.C., Pratas, N., Stefanovic, C., Popovski, P.: Cellular 5G access for
massive internet of things. In: Key Technologies for 5G Wireless Systems, pp. 380–
391. Cambridge University Press (2017)
12 A. Syalim et al.
14. Selvi, S.S.D., Vivek, S.S., Shriram, J., Rangan, C.P.: Identity based partial aggre-
gate signature scheme without pairing. In: 2012 35th IEEE Sarnoff Symposium,
pp. 1–6. IEEE (2012)
15. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R.,
Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg
(1985). https://doi.org/10.1007/3-540-39568-7 5
16. Yuan, Y., Zhan, Q., Huang, H.: Efficient unrestricted identity-based aggregate
signature scheme. PLoS One 9(10), e110100 (2014)
EAP-Based Bootstrapping for Secondary
Service Authentication to Integrate IoT
into 5G Networks
1 Introduction
5G is the next generation of cellular communications, specified by the 3rd Gen-
eration Partnership Project (3GPP) [2,3]. The 3GPP identifies three major
This work has been partially funded by the H2020 EU IoTrust project under Grant
Agreement 825618, the H2020 PHOENIX project under Grant Agreement 893079, the
H2020 Fed4IoT project under Grant Agreement 814918, the H2020 PRECEPT project
under Grant Agreement 958284, the National GUARDIAN project under Grant Agree-
ment TSI-100110-2019-20, the H2020 Plug-n-Harvest project under Grant Agreement
768735, and also Fundación Séneca de la Región de Murcia FPI Grant 20751/FPI/18.
c Springer Nature Singapore Pte Ltd. 2020
I. You et al. (Eds.): MobiSec 2019, CCIS 1121, pp. 13–22, 2020.
https://doi.org/10.1007/978-981-15-9609-4_2
14 D. Garcia-Carrillo et al.
as the involved entities, and Sect. 4 explains the interactions among the entities
of the architecture. Section 5 shows the use cases of the proposed architecture.
Finally, Sect. 6 concludes the paper with an outlook of our future work in this
area and presents the acknowledgements.
2 Related Work
3 Proposed Architecture
In this section we describe the proposed architecture mapping the entities in the
current 5G specifications of the 3GPP documentation [3] for the use case of the
secondary authentication. Below, we define the main entities of the architecture:
EAP-Based Boot. to Integrate IoT into 5G Networks 17
– Smart Object: The IoT device intends to communicate with the AAA infras-
tructure located in External Data Network through the 5G core network. It
is the entity called User Equipment (EU) in 3GPP terminology.
– gNodeB: This is the base station, which is based on the design of Navarro
et al. [13] to support a IoT technology to communicate with Smart Object
and the integration with 5G networks.
– 5G Core Network: This is the 5G core network that allows the connectivity
between the Smart Object and the External Data Network.
– External Data Network: This network could be public Internet or a private
network. The AAA infrastructure is located in the external network. The
Smart Object must authenticate and bootstrap key material with AAA Server
to enable secure network access and further end-to-end communication.
As shown in Fig. 1, we can see that the Smart Object, which can be a non-
3GPP technology, is communicating with the 5G base station —gNodeB (gNB)
in 5G terminology. This communication is done using an IoT technology, for
instance LoRaWAN, and is performed through the constrained link in terms of
bandwidth and low power. After this, the communication is done through the
non-constrained 5G network. At this point, in case of non-3GPP technologies, the
communications go through the Non-3GPP Inter-Working Function (N3IWF)
that implements the functionality of bridging non-3GPP technologies with the
5G core. Then, the Access Management Function (AMF) receives all connection
and session related information from the User Equipment (EU) —Smart Object
in our instance —such as verifying the UE’s subscription. All related traffic is
then forwarded to the Session management Function (SMF) which implements
the EAP authenticator for the specific case of the secondary authentication,
steering the authentication process with the DN-AAA. Finally, the EAP traffic
is forwarded to the Data Network AAA (DN-AAA), the entity that authenticates
the Smart Object.
Server, altering a bit the original design of [9] as we will explain in more detail in
Sect. 3. The Session Management Function (SMF) will implement the LO-CoAP-
EAP Controller. This entity is the EAP authenticator, which implements the
AAA client that communicates the DN-AAA. The LO-CoAP-EAP Controller,
implements a CoAP client that queries the LO-CoAP-EAP service implemented
in the LO-CoAP-EAP Smart Object.
4 Interactions Description
Before explaining the interaction between the different entities here (Fig. 3), we
have to state some assumptions regarding the scenario. First, the Smart Object
is assumed to have already performed the primary authentication which gives
it access to the 5G core services and to protect the communications between
the 5G core entities and the Smart Object. Since the focus of this article is
to provide access through the secondary authentication mechanism of 5G to
access external data network services or applications, we work on that context
to provide services access.
In this sense, being the SMF the EAP authenticator, and having already
established a trust (even if its transitive) with that entity, there is no inherent
need to perform a handshake to assure that the is going to be message sent
blindly to perform some kind of attack. These assumptions are not valid when
there is no previous trust relation, hence falling back on the specific flow of the
original work. Figure 2 shows a detail protocol exchange of the proposal. For
the sake of simplicity we omit the AMF entity in this flow. For the proposal we
have to make some modifications to LO-CoAP-EAP in order to comply with the
process of the secondary authentication in 5G networks specified by 3GPP.
EAP EAP
LO-CoAP- LO-CoAP-
EAP EAP AAA AAA
Protocol Protocol
CoAP CoAP
LPWAN LPWAN
Y2 Y2 N11 N11 Internet Internet
Stack Stack Stack Stack Stack Stack
PHY PHY
Y2 N11
The trigger message sent originally from the Smart Object is omitted, and
is left to the SMF to start the secondary authentication. Furthermore, along
with this initial change, it comes the addition of the EAP Request Identity
and Response Identity. Our proposal would be to omit these messages in the
particular case of very constrained technologies, following our previous approach
in Garcia-Carrillo et al. [9], but we maintain this design to comply with the
secondary authentication flow showed in the 3GPP document called TS 33.501
[3]. Once the SMF (EAP Authenticator) receives the EAP Response Identity,
SMF sends the first AAA message (we use a generic term as we do not want to
associate a specific AAA technology), which starts the EAP authentication.
The first message (1) is sent from the SMF to the Smart Object containing
the EAP request identity message. This message clearly states that the SMF is
accessing the bootstrapping service of the Smart Object that is represented by
the URI /b. Since the EAP protocol is lock-step, and by design the responses and
sent piggybacked, there is no need to correlate CoAP Requests and responses,
beyond the use of a simple identifier that is represented by a single CoAP Token
value —EMPTY in this case. After this, the Smart Object responds (2) with the
EAP Response Identity and the CoAP resource created that is associated with
this bootstrapping procedure. Then, the SMF forwards the EAP Response in a
AAA message —we leave to the specific implementation to decide which AAA
protocol to use. At this point the AAA decides which EAP method to use to
authenticate the Smart Object and the EAP exchange begins between the AAA
Server and the Smart Object, while the SMF is acting as a mere forwarder. Fol-
lowing the LO-CoAP-EAP proposal, the next messages (5–11) belonging to the
EAP method will refer to the bootstrapping service URI with the resource ID
returned by the Smart Object in message (2). When the EAP method is finished
and the device is authenticated successfully, the SMF receives (12) the EAP Suc-
cess message along with the Master Session Key (MSK) and some authorization
information. Then, the last exchange between the SMF and the Smart Object
is used to confirm the MSK by establishing an AUTH Security Association, by
using a key derived from the MSK, following the schema explained in [9]. At
this point the Smart Object is authenticated and can access the services from
the external data network that it is authorized to use.
ticular, our proposal is focused on use cases where LPWAN devices are integrated
in a 5G network to communicate with data service network. The LPWAN device
requires a second authentication to establish a secure end-to-end communication
with the data service network. Thus, the LPWAN integration into 5G through
Lo-CoAP-EAP serves as a consolidating adaptation to be compliant with the
5G security specifications.
6 Conclusion
Bootstrapping and key establishment are crucial aspects to build more secure
IoT and 5G scenarios. This paper has presented novel EAP-based bootstrapping
architecture to enable secondary authentication and key establishment specially
designed to work on constrained devices in 5G. In particular, we proposed the
use of the bootstrapping protocol LO-COAP-EAP and AAA infrastructure for
the integration of Low-Power Wide Area Networks (LPWAN) into a 5G Core
Network to enable the secondary authentication feature of 5G for constrained
devices. Besides, the paper has described how the constrained devices based on
LPWAN technologies can bootstrap and establish the key material with AAA
server through the 5G core network. The proposal is adapted to be compliant
with 3GPP specifications in order to perform secondary service authentication
and derive cryptography material that can be employed to enable security asso-
ciations to secure end-to-end communications (e.g. DTLS) between constrained
devices and external data network. Moreover, the proposal extends a standard-
ization effort of IETF called COAP-EAP in order to provide high flexibility,
scalability and networks independence. As future work, the development of the
proposed approach is being carried out in a pilot testbed with real constrained
devices, a 5G core network and AAA infrastructure in order to evaluate the
solution as a whole.
References
1. 3GPP: Security architecture and procedures for 5G System. Technical Specification
(TS) 33.501, 3rd Generation Partnership Project (3GPP) (2018). http://www.
3gpp.org/DynaReport/33501.htm. version 15.5.0
2. 3GPP: Procedures for the 5G System (5GS). Technical Specification (TS)
23.502, 3rd Generation Partnership Project (3GPP) (2019). http://www.3gpp.org/
DynaReport/23502.htm. version 16.1.1
3. 3GPP: System architecture for the 5G System (5GS). Technical Specification (TS)
23.501, 3rd Generation Partnership Project (3GPP) (2019). http://www.3gpp.org/
DynaReport/23501.htm. version 16.1.0
4. Bormann, C., Ersue, M., Keränen, A.: Terminology for Constrained-Node Net-
works. RFC 7228, May 2014. https://doi.org/10.17487/RFC7228, https://rfc-
editor.org/rfc/rfc7228.txt
5. Chandramouli, D., Liebhart, R., Pirskanen, J.: 5G for the Connected World. Wiley,
Hoboken (2019)
22 D. Garcia-Carrillo et al.
6. Condoluci, M., Dohler, M., Araniti, G., Molinaro, A., Sachs, J.: Enhanced radio
access and data transmission procedures facilitating industry-compliant machine-
type communications over LTE-based 5G networks. IEEE Wirel. Commun. 23(1),
56–63 (2016). https://doi.org/10.1109/MWC.2016.7422406
7. Fabio Arena, G.P., Collotta, M.: A survey on driverless vehicles: from their diffusion
to security features. J. Internet Serv. Inf. Secur. (JISIS) 8(3), 1–19 (2018). https://
doi.org/10.22667/JISIS.2018.08.31.001
8. Galinina, O., Andreev, S., Komarov, M., Maltseva, S.: Leveraging heterogeneous
device connectivity in a converged 5G-IoT ecosystem. Comput. Netw. 128, 123–132
(2017). https://doi.org/10.1016/j.comnet.2017.04.051, http://www.sciencedirect.
com/science/article/pii/S1389128617301822. survivability Strategies for Emerging
Wireless Networks
9. Garcia-Carrillo, D., Marin-Lopez, R., Kandasamy, A., Pelov, A.: A CoAP-based
network access authentication service for low-power wide area networks: LO-CoAP-
EAP. Sensors 17(11), 2646 (2017). https://doi.org/10.3390/s17112646, https://
www.mdpi.com/1424-8220/17/11/2646
10. Gaurav Choudhary, J.K., Sharma, V.: Security of 5G-mobile backhaul networks:
a survey. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA)
9(4), 41–70 (2018)
11. Hošek, J.: Enabling Technologies and User Perception Within Integrated 5G-IoT
Ecosystem. Vysoké učenı́ technické v Brně, nakladatelstvı́ VUTIUM (2016)
12. Kapassa, E., Touloupou, M., Stavrianos, P., Kyriazis, D.: Dynamic 5G slices for
IoT applications with diverse requirements. In: 2018 Fifth International Conference
on Internet of Things: Systems, Management and Security, pp. 195–199, October
2018. https://doi.org/10.1109/IoTSMS.2018.8554386
13. Navarro-Ortiz, J., Sendra, S., Ameigeiras, P., Lopez-Soler, J.M.: Integration of
LoRaWAN and 4G/5G for the industrial internet of things. IEEE Commun. Mag.
56(2), 60–67 (2018). https://doi.org/10.1109/MCOM.2018.1700625
14. Palattella, M.R., et al.: Internet of things in the 5G era: enablers, architecture, and
business models. IEEE J. Sel. Areas Commun. 34(3), 510–527 (2016)
15. Storck, C.R., Duarte-Figueiredo, F.: A 5G V2X ecosystem providing internet of
vehicles. Sensors 19(3), 550 (2019). https://doi.org/10.3390/s19030550, https://
www.mdpi.com/1424-8220/19/3/550
16. Wang, D., Chen, D., Song, B., Guizani, N., Yu, X., Du, X.: From IoT to 5G I-
IoT: the next generation IoT-based intelligent algorithms and 5G technologies.
IEEE Commun. Mag. 56(10), 114–120 (2018). https://doi.org/10.1109/MCOM.
2018.1701310
17. Yasmin, R., Petäjäjärvi, J., Mikhaylov, K., Pouttu, A.: On the integration of
LoRaWAN with the 5G test network. In: 2017 IEEE 28th Annual International
Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC),
pp. 1–6, October 2017. https://doi.org/10.1109/PIMRC.2017.8292557
LoRaWAN Network Server Session Keys
Establish Method with the Assistance of Join
Server
Kun-Lin Tsai1(B) , Fang-Yie Leu2 , Li-Chun Yang1 , Chi Li1 , and Jhih-Yan Liu1
1 Department of Electrical Engineering, Tunghai University, Taichung, Taiwan
kltsai@thu.edu.tw
2 Department of Computer Science, Tunghai University, Taichung, Taiwan
1 Introduction
Nowadays, various Internet of Things (IoT) applications enhance human beings’ quality
of lives gradually. For example, IoT based smart city [1, 2] provides an intelligent scheme
to manage transportation, citizens’ healthcare, energy consumption, living environment,
etc.; IoT factory [3] permits the products with improved quality and lower cost by lever-
aging the data collected by IoT. The development of IoT comes from the advancement
of various technologies, including sensors, wireless communication technologies, secu-
rity policies, innovative applications, and so on. Among them, wireless communication
technologies play a very important role.
2 Preliminary
In this section, we first introduce the LoRaWAN architecture and its security scheme,
and then discuss some related studies of this work.
generates two session keys, NwkSKey and AppSKey, for network server and application
server, respectively.
The LoRaWAN security policy uses standardized AES cryptographic algorithm
and end-to-end secure communication protocols to achieve the requirements of mutual
authentication, confidentiality and integrity protection. Two operations, i.e., Cipher-
based Message Authentication Code (CMAC) and Counter Mode (CTR), are combined
with original AES encryption/decryption algorithm so as to perform message integrity
protection and data encryption. During new end-device joining process, two unique 128-
bit root keys, AppKey and NwkKey (both equipped with new end-device and recorded
in join server), and a globally unique identifier EUI-64-based DevEUI (also equipped
with new end-device) are utilized to generate several session keys. They are
• Network Session Key(s) (NwkSKey for LoRaWAN 1.0 and SNwkSIntKey, FNwkSIn-
tKey, NwkSEncKey for LoRaWAN 1.1) which is(are) a(three) unique 128-bit key(s)
shared by the end-devices and network server(s), and
• Application Session Key (AppSKey) which is a unique 128-bit key shared by end-
device and the corresponding application server.
Figure 1 shows the traffic between end-device and application server is protected using
these session keys. Each payload is encrypted by AES-CTR and carries a frame counter
(to avoid packet replay) and a Message Integrity Code (MIC) computed with AES-
CMAC (to avoid packet tampering). While the payload or MAC Header/Frame Header
is tampered, the receiver cannot compute the correct MIC so as to guarantee com-
munication data integrity. As mentioned above, AES algorithms are used to provide
authentication and integrity of packets to the network server and end-to-end encryption
to the application server. Although the LoRaWAN specifies the communication secu-
rity between end-devices and application servers and between end-devices and network
servers, the security between application server and join server is not defined in its
specifications [9, 10].
rook keys
(AppKey NwkKey)
hNS-JS
Gateway
AppSKey AppSKey
NwkSKey NwkSKey
Fig. 1. Two session keys are used for end-to-end data security.
policy as well as its session key generation process should be improved. You et al.
[18] examined the standard LoRaWAN protocol, and observed that it fails to support
the perfect forward secrecy, the end-to-end security and the defense against the replay
attack.
In order to enhance the security of LoRaWAN, many studies [18–20] pro-
posed new methods for data encryption, session key management, and session key
update/generation. [18] utilized default option and security-enhanced option to prevent
a malicious network server from breaking the end-to-end security. Sanchez-Iborra et al.
[19] evaluated the security vulnerabilities of LoRaWAN in the area of key management
and proposed a lightweight key management method on Ephemeral Diffie-Hellman Over
COSE transaction. To enhance the security of AES key generation process, Hayati et al.
[20] investigated several parameters, e.g., key generation time, randomness level, and
key length, and claimed that these parameters should be considered in the key generation
process.
In spite of previous studies provided higher security level for LoRaWAN environ-
ment, most of them considered end-to-end security, i.e., end-devices and application
servers. Only little attention had been given to the point of server to server security. As a
result, we propose the SeCo to provide secure communication method for LoRaWAN’s
servers.
In order to create a secure communication channel for LoRaWAN’s join server and
network server, a special data encryption/decryption key, i.e., NJKey, is generated at first
time and then renewed periodically. Once, the key is generated, the important information
and commands between join server and network server can be protected by using this key.
The key generation procedure and key renew procedure are introduced in this section.
LoRaWAN Network Server Session Keys 27
GENKEY
Round 1
Key_Generation_Request
GENKEY
Round 2
Key_Generation_Answer
GENKEY
Round 3
Key_Generation_Ack
GENKEY
Round 4
– GENKEY Round 1:
1. fetches the system time tnonce,NS and generates the time key KT ;
2. generates a random number rA ∈ Zn∗ ;
3. generates a key renew counter NSJSCounter and initializes its value to be 1;
4. calculates Address_checking =
aes128_encrypt(KT , NSAddr||JSAddr||NSJSCounter), where NSAddr, JSAddr are
the addresses of network server and join server, and aes128_encrypt represents mes-
sage encryption by using 128-bit AES cryptography algorithm with encryption key
KT ;
5. calculates GenKeyMsg =
(NSAddr||JSAddr||(rA +2 (NSJSKey ⊕ NSJSCounter))) ⊕ KT , where NSJSKey is
a pre-installed key for both network server and join server, +2 and ⊕ indicate binary
addition and binary exclusive-or operation, respectively;
6. calculates GenKey_req = aes128_encrypt(NSJSKey
⊕ KT , GenKeyMsg);
7. sends Key_Generation_Request = tnonce,NS , Address_checking, GenKey_req to
the join server JS.
28 K.-L. Tsai et al.
– GENKEY Round 2:
1. fetches the system time tnonce,JS and undergoes a time condition by checking to see
whether or not tnonce,JS satisfies tnonce,JS − tnonce,NS ≤ δt , where δt is a predefined
time threshold for the allowable maximum transmission delay from NS to JS; If
checking failed, it discards this message and sends an GenKeyFail message to NS.
Otherwise, goes to next step;
2. derives KT from tnonce,NS ;
3. obtains NSAddr, JSAddr, and NSJSCounter by calculating
NSAddr||JSAddr||NSJSCounter = aes128_decrypt(KT , Address_checking), where
aes128_decrypt represents message decryption by using 128-bit AES cryptography
algorithm with decryption key KT , and then checks to see whether NSAddr and
JSAddr are recorded in its database or not; If not, it discards this message and sends
an GenKeyFail message to NS. Otherwise, goes to next step;
4. fetches NSJSKey from its database and calculates
GenKeyMsg = aes128_decrypt(NSJSKey ⊕ KT , GenKey_req);
5. obtains NSAddr, JSAddr, from GenKeyMsg (step (4)) and check to see whether or
not these two addresses are the same with step (3); If not, it discards this message
and sends a GenKeyFail message to NS. Otherwise, goes to next step;
6. calculates
rA = ((GenKeyMsg ⊕ KT ) − NSAddr||JSAddr) −2 (NSJSKey ⊕ NSJSCounter);
7. fetches another system time tnonce,JS ;
8. calculates GenKey_Ans = aes128_encrypt(NSJSKey ⊕ rA , NSJSCounter||tnonce,JS );
9. sends Key_Generation_Answer = tnonce,JS , GenKey_Ans to NS.
– GENKEY Round 3:
When receiving the messages sent from JS, the Network Server NS
1. fetches the system time tnonce,NS and undergoes a time condition by checking to see
whether or not tnonce,JS satisfies tnonce,NS − tnonce,JS ≤ δt , where δt is a predefined time
threshold for the allowable maximum transmission delay from JS to NS; If checking
failed, it discards this message and sends an GenKeyFail message to JS. Otherwise,
goes to next step;
2. calculates NSJSCounter_receive||tnonce,JS _receive =
aes128_decrypt(NSJSKey ⊕ rA , GenKey_Ans), where NSJSCounter_receive and
tnonce,JS _receive mean NSJSCounter and tnonce,JS receiving from the message sent by
JS;
3. checks to see whether NSJSCounter_receive = NSJSCounter and tnonce,JS _receive =
tnonce,JS or not; If not, it discards this message and sends an GenKeyFail message to
JS. Otherwise, goes to next step;
4. generates the AES data encryption/decryption key NJKey = (NSJSKey +2 rA ) ⊕ rA ;
LoRaWAN Network Server Session Keys 29
5. calculates GenKey_Ack = aes128_encrypt NJKey, tnonce,JS ;
6. sends Key_Generation_Ack = {GenKey_Ack} to JS.
– GENKEY Round 4:
REKEY
Round 1
Key_Renew_Request
REKEY
Round 2
Key_Renew_Ack
REKEY
Round 3
– REKEY Round 1:
When key renew time is up or JS sends a key renew message, the network server NS
1. fetches the system time tnonce,NS and generates the time key KT ;
2. generates a random number rB ∈ Zn∗ ;
3. fetches NSJSCounter and rA from its database and calculates NSJSCounter_new =
NSJSCounter +2 1 +2 rA ;
4. calculates ReKey_req = aes128_encrypt(NJKey, NSJSCounter_new||rB );
30 K.-L. Tsai et al.
5. sends Key_Renew_Request = tnonce,NS , ReKey_req to the join server JS.
– REKEY Round 2:
When receive the messages send from NS, the Join Server JS
1. fetches the system time tnonce,JS and undergoes a time condition by checking to see
whether or not tnonce,JS satisfies tnonce,JS − tnonce,NS ≤ δt ; If checking failed, it discards
this message and sends an ReKeyFail message to NS. Otherwise, goes to next step;
2. calculates NSJSCounter_new_receive||rB = aes128_decrypt(NJKey, ReKey_req);
3. fetches NSJSCounter and rA from its database
and calculates NSJSCounter_new = NSJSCounter +2 1 +2 rA ; and then checks
to see whether NSJSCounter_new_receive = NSJSCounter_new or not; If not, it
discards this message and sends an ReKeyFail message to NS. Otherwise, it updates
NSJSCounter as NSJSCounter +2 1 and goes to next step;
4. generates new encryption/decryption key NJKey_new = (NJKey +2 rB ) ⊕ rA ;
5. calculates ReKey_ack = aes128_encrypt(NJKey_new, NSAddr ⊕ rB );
6. stores NJKey_new as new NJKey, replaces rA with rB , updates NSJSCounter as
NSJSCounter +2 1 in its database and sends Key_Renew_Ack = {ReKey_ack} to
NS.
– REKEY Round 3:
Once receiving the messages send from JS, the network server NS
4 Security Analysis
This section analyzes the security features of the SeCo, including mutual authentication,
confidentiality and integrity protection, replay attack resistance and eavesdropping attack
resistance.
• Mutual authentication
Mutual authentication which established between network server and join server ensures
that only genuine and authorized servers can perform the key generation procedure and
key renew procedure. Firstly, a network server and join server pair equip with a pre-
installed key, i.e. NSJSKey, which is utilized to encrypt messages in the key generation
LoRaWAN Network Server Session Keys 31
procedure. Only an authenticated server can decrypt the messages with correct NSJSKey
and pass the checking in step 5 of GENKEY Round 2, step 3 of GENKEY Round 3,
and step 3 of GENKEY Round 4. Secondly, after key generation procedure, a data
encryption key NJKey is generated by using NSJSKey and the random number rA . When
this data encryption key needs to be renewed, in step 3 of REKEY Round 2, the join
server verifies NSJSCounter and previous rA , which are both stored in join server’s
database, to authorize network server. In step 3 of REKEY Round 3, the network server
authorizes join server by checking NSAddr which is encrypted with NJKey_new, and the
NJKey_new is generated by previous NJKey, rB and rA . Only the authorized network
server and join server have these parameters and can decrypt the correct NSAddr. In
summary, the network server and join server authenticate with each other by using
NSJSKey, NSJSCounter, rA , rB , and NSAddr.
• Confidentiality
In the SeCo, all of the important messages are encrypted by using 128-bit AES cryptog-
raphy algorithm except system time tnonce which is utilized for resisting replay attack.
Moreover, the AES encryption key in each round is different; KT is used in step 4
of GENKEY Round 1; NSJSKey ⊕ KT is utilized in step 6 of GENKEY Round 1;
NSJSKey ⊕ rA is employed in step 8 of GENKEY Round 2; NJKey is applied in step
5 of GENKEY Round 3 and step 4 of REKEY Round 1; and NJKey_new is oper-
ated in step 5 of REKEY Round 2. Since 128-bit AES is a well-know and high secure
level cryptography algorithm, the parameters and information can be encrypted during
key generation procedure and key renew procedure. Besides, in the SeCo, the encryp-
tion/decryption key is renewed periodically by using key renew procedure so as to
enhance the communication security and provide high confidentiality for LoRaWAN.
• Integrity protection
Message integrity protection indicates that a message has not been tampered with or
altered during transmission. The most common approach is to use a hash function that
combines all the bytes in the message with a secret key and produces a message digest
that is difficult to reverse. In order to simplify the key generation procedure and key
renew procedure, in the SeCo, the NSAddr and JSAddr are used to guarantee the message
integrity in step 3 and 5 of GENKEY Round 2, and the tnonce,JS is also utilized for message
integrity protection in step 3 of GENKEY Round 3 and step 4 of GENKEY Round 4. The
key renew procedure also employs NSJSCounter and rA in step 3 of REKEY Round 2,
and adopts NSAddr in step 3 of REKEY Round 3 to protect message integrity. It follows
from what has been said that all of the message receivers in the SeCo verify messages’
integrity when they receiving the message.
32 K.-L. Tsai et al.
In the key generation procedure, the time key KT is derived from the network server’s sys-
tem time tnonce,NS . A replay attack is that a hacker duplicates a valid message transmitted
by the network server, and pretends the legal network server to send the message to join
server so as to obtain related information. Two situations may occur. The first on is the
hacker transmits the original message to the join server without modifying it. However,
the checking in step 1 of GENKEY Round 2 tnonce,JS −tnonce,NS ≤ δt cannot be held since
the retransmission delay will make tnonce,JS − tnonce,NS > δt . The second situation is
the hacker modifies the time tnonce,NS to make the condition of tnonce,JS − tnonce,NS ≤ δt
hold. Nevertheless, in step 2 of GENKEY Round 2, the join server uses tnonce,NS to
derive KT which is then utilized to decrypt three parameters, i.e., NSAddr, JSAddr, and
NSJSCounter. The decrypted network server address NSAddr and join server address
JSAddr are compared with those parameters in join server’s database. Once the KT is a
incorrect decryption key, the verification is failed. In step 1, 2 and 3 of GENKEY Round
3, the network server also resists replay attacks by using tnonce,JS . Similarly, in REKEY
Round 1 and Round 2, the network server and join server adopt tnonce,NS to prevent replay
attacks.
Furthermore, in the SeCo, a lifetime counter, NSJSCounter, used for recording a
unique number of key generation/renew procedure is utilized both in key generation
procedure and key renew procedure. NSJSCounter is initially set to 1, and then increased
by previous procedure’s ransom number rA in step 3 of REKEY Round 1. Since this
counter is managed by network server and join server, and is encrypted within transmitted
messages, when a hacker catches and duplicates a valid message, and then he re-transmits
this message to join server or network server, the value of NSJSCounter is equal or less
then the value in the message. It indicates the received message is not from a genuine
and authentic server, thus this counter can also be used to resist replay attack.
A hacker may extract important information when he/she captures a large amount of
messages from the underlying network. The most important information we need to
protect is the message encryption/decryption key NJKey. In the SeCo, new NJKey is
generated by using previous NJKey and two random numbers rA and rB . While rA is
generated in key generation procedure (or last key renew procedure), and rB is generated
in current key renew procedure, and both rA and rB are protected by using AES algorithm,
the hacker is unable to extract one of these three parameters from the captured messages.
Thus, the SeCo is invulnerable to the eavesdropping attack.
the signal integrity during the key generation procedure and key renew procedure. The
security analysis shows that the SeCo can provide mutual authentication, confidentiality
and message integrity, and also can resist replay attack and eavesdropping attack.
In the future, we would like to simplify the key generation procedure so that the
secure communication channel between network server and join server can be created
quickly. Besides, the security issues among application server, join server, and network
servers will also be investigated. These constitute our future studies.
References
1. Gaur, A., Scotney, B., Parr, G., McClean, S.: Smart city architecture and its applications based
on IoT. Proc. Comput. Sci. 52, 1089–1094 (2015)
2. Shih, C.-S., Chou, J.-J., Lin, K.-J.: WuKong: Secure Run-Time environment and data-driven
IoT applications for Smart Cities and Smart Buildings. J. Internet Serv. Inf. Secur. 8(2), 1–17
(2018)
3. Chekired, D.A., Khoukhi, L., Mouftah, H.T.: Industrial IoT data scheduling based on hier-
archical fog computing: a key for enabling smart factory. IEEE Trans. Industr. Inf. 14(10),
4590–4602 (2018)
4. Flore, D.: 3GPP Standards for the Internet-of-Things, Recuperado el 25 (2016)
5. Lora-alliance. https://www.lora-alliance.org. Accessed 15 Aug 2019
6. Sigfox. https://www.sigfox.com. Accessed 15 Aug 2019
7. Telensa. http://www.telensa.com. Accessed 15 Aug 2019
8. Weightless. http://www.weightless.org. Accessed 15 Aug 2019
9. LoRa Alliance Technical Committee: LoRaWAN Backend Interfaces 1.0 Specification. LoRa
Alliance (2017)
10. LoRa Alliance Technical Committee: LoRaWAN 1.1 Specification. LoRa Alliance (2017)
11. Announcing the Advanced Encryption Standard (AES). Federal Information Processing
Standards Publication 197. United States National Institute of Standards and Technology
(2001)
12. Korzhuk, V., Groznykh, A., Menshikov, A., Strecker, M.: Identification of attacks against
wireless sensor networks based on behaviour analysis graphics processing units. J. Wirel.
Mob. Netw. Ubiquit. Comput. Depend. Appl. 10(2), 1–21 (2019)
13. Gritti, C., Önen, M., Molva, R., Susilo, W., Plantard, T.: Device identification and personal
data attestation in networks. J. Wirel. Mob. Netw. Ubiquit. Comput. Depend. Appl. 9(4), 1–25
(2018)
14. Kotenko, I., Saenko, I., Branitskiy, A.: Applying big data processing and machine learning
methods for mobile Internet of Things security monitoring. J. Internet Serv. Inf. Secur. 8(3),
54–63 (2018)
15. Hui, H., et al.: Survey on blockchain for Internet of Things. J. Internet Serv. Inf. Secur. 9(2),
1–30 (2019)
16. Butun, I., Pereira, N., Gidlund, M.: Security risk analysis of LoRaWAN and future directions.
Fut. Internet 11(1), 1–22 (2019). Article ID 3
17. Miller R.: LoRa Security – Building a Secure LoRa Solution. MWR Labs, Whitepaper (2016)
18. You, I., Kwon, S., Choudhary, G., Sharma, V., Seo, J.: An enhanced LoRaWAN security
protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking
system. Sensors 18(6), 1–32 (2018). Article ID 1888
19. Sanchez-Iborra, R., et al.: Enhancing LoRaWAN security through a lightweight and
authenticated key management approach. Sensors 18(6), 1–18 (2018). Article ID 1833
20. Hayati, N., Suryanegara, M., Ramli, K., Suryanto, Y.: Potential development of AES-128-
bit key generation for LoRaWAN security. In: International Conference on Communication
Engineering and Technology Proceedings, Nagoya, Japan, pp. 57–61 (2019)
Role Mining: Survey and Suggestion
on Role Mining in Access Control
1 Introduction
With the rapid development of the information technologies, the usage of Inter-
net has increased dramatically in every aspect of life. In the past three decades,
Internet security issues such as the CIH virus in 1998, the Melissa virus in 1999,
I love you virus ins 2000, the shockwave virus in 2003, Panda burning incense in
Supported in part by the National Basic Research Program of China (973) under Grant
No. 2013CB329102, and in part by the Natural Science Foundation of China (NSFC)
under Grant No. 61003283.
c Springer Nature Singapore Pte Ltd. 2020
I. You et al. (Eds.): MobiSec 2019, CCIS 1121, pp. 34–50, 2020.
https://doi.org/10.1007/978-981-15-9609-4_4
Role Mining: Survey and Suggestion on Role Mining in Access Control 35
2006, the conficker worm in 2008, the flashback virus in 2011, WannaCry bitcoin
ransomware in 2017, and so on [1,2] have led to continuous exploration of cyber-
security protection mechanisms. Cybersecurity has seriously threatened people’s
daily production and life, and brought huge losses [3]. Currently, network security
protection for intranets mainly includes: firewall, intrusion detection system and
access control, in which access control is the first gate to protect the network [4].
In access control system, the most classic access control models are Dis-
cretionary Access Control (DAC), Mandatory Access Control (MAC) and Role-
based Access Control (RBAC) [5]. The DAC model allows the owner of the object
to determine the access rights of the subject to the object, which is mainly used
in commercial systems and some civil organizations, such as common operat-
ing systems (Windows, UNIX systems), firewalls such as Access Control List
(ACL). DAC may lead to illegal access and causing security risks. The MAC
model identifies subject and object in the system according to the security level.
The corresponding resources cannot be accessed without the corresponding secu-
rity level. MAC is mainly applied to multi-level military security systems, such
as the ministry of defense system, wartime command system and so on. However,
this model will lead to the inflexibility of user access.
In order to solve the problem that DAC is too loose and the MAC is too
strict, the RBAC model is proposed by David F. Ferraiolo and D. Richard Kuhn
in 1992, they introduced the concepts and definitions of RBAC and described a
non-autonomous access control method. In 1996, Sandhu et al. described a new
RBAC reference model framework which systematically addresses the various
components of RBAC and their interactions [6]. In 2000, NIST published an uni-
fied RBAC standard. Richard Kuhn et al. submitted a proposal to the 5th Role-
Based Access Control ACM Symposium, evaluated and revised by NIST. In 2004,
NIST RBAC model of American National Standards Institute and International
Information Technology Standards Committee (ANSI/INCITS) was adopted as
the US National Standard 359-2004 [7]. So far, RBAC model has been formed
and entered the field of security application. In 2012, NIST RBAC was revised
to INCITS 359-2012. Users in RBAC obtain the permissions corresponding to
the role by obtaining the role. Therefore, RBAC is highly flexible and suitable
for large-scale systems. The recently researches are focusing on Attribute-based
access control (ABAC) [8] which is more complex and requires more processing
power and time.
The development of RBAC has developed more than two decades, and it
has derived many versions. The development of RBAC has also extended to
various industries including medical system security, digital energy grid [9], soft-
ware engineering, IoT [10,11], blockchain [12], and cloud computing [13], even
Space and Terrestrial Integrated Network (STIN) [14], and has yielded fruitful
achievements [15–17]. The most critical issue in RBAC is to mine accurate and
appropriate roles to cope with the explosive application requirements. However,
the generation of roles set is inefficient. For this reason, many researchers are
committed to the study of role mining.
36 J. Jia et al.
Role mining is one of the most important mechanisms and methods in the
RBAC model. Without considering other aspects, the higher the efficiency of
the role mining algorithm is, the better the performance of the RBAC mecha-
nism will achieve. Therefore, this paper reviews and summarizes the literature
of existing role mining in detail, and combines the above-mentioned application
fields to discuss and supplement the cutting-edge research results, applications
and suggestions of role mining.
The main contributions of this paper are as follows:
– We investigate and classify the current mainstream role mining technologies
and find that the research of role mining mainly focuses on two major aspects.
One is to introduce new elements into role mining mechanism to construct
a new role mining model to improve mining efficiency and accuracy of role
sets, and the other is to improve the performance of the existing role mining
methods to make them perform better in more complex environments.
– We compare typical role mining models and their application scenarios, and
analyze their advantages and disadvantages.
– We summarize the problems existing in the current role mining field and the
challenges faced by the future development, and predict the future develop-
ment direction of role mining, and provide reasonable suggestions.
The rests of this paper are organized as follows. Section 2 investigates the
current status of role mining. Section 3 compares the performance of each role
mining mechanism and summarizes the evaluation metrics. Section 4 summarizes
the problems and challenges in the current role mining technology development.
Section 5 predicts future development directions and gives suggestions.
results show that this method can generate roles corresponding to business infor-
mation well. However, the computational process is complex, and it is difficult to
deal with large-scale complex systems. Zhai et al. proposed a hybrid method of
role mining algorithm [32], which requires a top-down approach to defining the
set of roles and then mining the candidate roles through a bottom-up approach.
The weighted structure complexity is used as an indicator of system optimization
and performance evaluation. This approach requires a predefined set of roles to
increase the amount of work and time spent compared to other methods. Both
mixing methods have certain advantages under their specific conditions, but they
are poor in portability and universality.
Role Mining Mechanism with Noisy Data. Role mining mechanism with
noisy data, which is abbreviated as NdRMM, removes redundant data through
noise processing to determine the optimal role set more accurately. Noise data
processing belongs to the pre-processing stage of role mining, which removes
erroneous data and transforms them into executable data sets. Molloy et al.
cleaned the data before inputting data [34], and introduced a method of noise
identification using (non-binary) rank reduction matrix decomposition. Experi-
mental results show that it is effective in noise reduction. The process of mining
roles is divided into two steps: eliminating noise and generating candidate roles.
The evaluation results have also shown that this method can find a set of roles
that are very close to the noise-free data. Therefore, this method is superior to
the method of directly mining noise data.
overlapping sets. The roles are those with overlapping permissions, which are
implemented by counting the intersections between the initially discovered clus-
ters through subset enumeration. This process is mainly for the role detection
phase and is used for the determination of role set.
Role Mining Mechanism for Optimal Role Set. Role mining mechanism
for optimal role set, which is abbreviated as OrsRMM, can be used to imple-
ment approximate solutions to NP problems through heuristic algorithms. Guo
et al. considered that the role hierarchy should assume the authority to mitigate
security management, but no concept of optimal hierarchy has been proposed.
Role Mining: Survey and Suggestion on Role Mining in Access Control 41
Therefore, They defined a formal indicator of the optimal role level mining struc-
ture [39]. The optimal concept is based on the role hierarchy as a graph and find
the best role hierarchy, with the minimum number of edges to calculate the tran-
sitive closure. A heuristic method based on RoleMiner is proposed to achieve this
goal. Vaidya et al. also introduced two different variants of Role Mining Problem
(RMP) on how to find the correct role. One is delta-Approx RMP and the other
is minimum noise RMP. Besides, they also showed that RMP is a NP-complete
problem [21] and revealed the connection between several recognized problems in
data mining and analysis role mining. After that, Igor Saenko and Igor Kotenko
proposed a heuristic optimization method based on genetic algorithm (GA) [40]
to solve RMP which develops a heuristic solution with the ability to find an
accurate set of roles. By using chromosomes and genes in genetic algorithm to
complete the crossover, mutation and selection process, a more appropriate set
of minimal roles can be determined. As an algorithm for solving RMP problems,
this method has high performance and efficiency, however, it is difficult to deter-
mine the number of population and active role set under special circumstances.
key technology for the efficiency of the RBAC model and the core project of
the RBAC system. This paper explores and discusses the open issues related to
current role mining techniques.
In all the literature reviewed in previous section, the exploration of the best roles
set is undoubtedly the largest problem which has been proven to be NP-hard.
In order to optimize the number of roles that cover all current user privilege
assignments, the known minimum number of roles [43] can also be modeled as
the Graph Coloring Problem (GCP). The current research result shows that
the optimal number of role is roughly concentrated around its expected value
[44–46].
[49]. Therefore, Pan et al. proposed a model of high flexibility and applicabil-
ity from the perspective of reducing the structure of the RBAC system, which
can reconfigure the RBAC system with minimal structural complexity and per-
turbations [50]. However, the actual application effect needs to be continuously
explored by researchers in the future.
cons of role mining results. The evaluation metrics of role mining results
summarized in this paper provide references and suggestions for current
researchers, and need further improvement and expansion.
– Reduce the complexity of role mining algorithm.
The combination of multi-dimensional technology will lead to an exponential
boom in system complexity, which needs to be reduced in the deployment of
live scene systems (constrained environments). It is a difficult task to reduce
the complexity of role mining while ensuring the maximum efficiency of RBAC
system.
– Dynamic update of the roles.
Since the efficient RBAC systems require more accurate and broader set of
roles, the role mining algorithms need to be updated constantly. With the
updating of RBAC system, the number of roles will explode. So, it is a great
challenge to update the roles in time.
– Role semantic information mining.
In many current algorithms and technologies, many roles become unrecog-
nized after many iterations, which poses great difficulties in identifying and
understanding character sets. It is important to ensure that role semantic
information is highly identifiable during role mining. How to generate a role
with accurate semantic information is yet to be further studied.
5 Conclusion
This paper summarizes the literature on role mining in RBAC system in the
past few years, and compares the performance of role mining mechanism, and
summarizes the commonly used metrics to evaluate the quality of role mining
results. Through the in-depth study of various role mining mechanisms, we pro-
pose the following suggestions and predict the future development direction of
role mining.
– The development of future role mining is bound to develop towards the direc-
tion of big data [57]. By combining role mining with big data, more accurate
role sets can be obtained.
– The role mining will develop from a single system to a comprehensive multi-
dimensional system especially the heterogeneous network [58]. The combina-
tion of role mining technology with other access control mechanisms or other
security technologies will enhance its own security [59,60], reduce system
complexity, and enhance the ability to resist attacks.
– Although role mining technology has a lot of research in some areas, it is still
blank in many application areas. Taking the Internet of Things as an exam-
ple, the IoT environment needs to implement access control in a low-power
scenario. The identity information of sensor nodes [61] is equivalent to user
groups, and some scenes can derive corresponding roles. Mining the identity
information of these sensor nodes to establish the mapping relationship with
the role can also implement access control in the context of the Internet of
Things.
Role Mining: Survey and Suggestion on Role Mining in Access Control 47
Acknowledgments. The authors would like to thank the anonymous reviewers for
their valuable comments which helped them to improve the content, organization, and
presentation of this paper.
References
1. Yan, W., Mestha, L.K., Abbaszadeh, M.: Attack detection for securing cyber phys-
ical systems. IEEE Internet Things J. 6(5), 8471–8481 (2019)
2. Weinberger, S.: Top ten most-destructive computer viruses, 19 2012 (2012).
Smithsonian.com
3. Cybersecurity Unit, Computer Crime & Intellectual Property Section Criminal
Division U.S. Department of Justice. A framework for a vulnerability disclo-
sure program for online systems. https://www.justice.gov/criminal-ccips/page/
file/983996/download. Accessed 21 May 2019
4. Guan, J., Zhang, Y., Yao, S., Wang, L.: AID shuffling mechanism based on group-
buying auction for identifier network security. IEEE Access 7, 123746–123756
(2019)
5. Lipner, S.B.: The birth and death of the orange book. IEEE Ann. Hist. Comput.
37(2), 19–31 (2015)
6. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access con-
trol: a multi-dimensional view. In: Tenth Annual Computer Security Applications
Conference, pp. 54–62, December 1994 (1994)
7. Sandhu, R.S., Ferraiolo, D.F., Kuhn, D.R.: The NIST model for role-based access
control: towards a unified standard. In: Fifth ACM Workshop on Role-Based Access
Control, RBAC 2000, Berlin, Germany, 26–27 July 2000, pp. 47–63 (2000)
8. Servos, D., Osborn, S.L.: Current research and open problems in attribute-based
access control. ACM Comput. Surv. 49(4), 65:1–65:45 (2017)
9. Gritti, C., Önen, M., Molva, R., Susilo, W., Plantard, T.: Device identification
and personal data attestation in networks. J. Wirel. Mob. Netw. Ubiquit. Comput.
Dependable Appl. (JoWUA) 9(4), 1–25 (2018)
10. Liu, Y., Quan, W., Wang, T., Wang, Y.: Delay-constrained utility maximization
for video ads push in mobile opportunistic D2D networks. IEEE Internet Things
J. 5(5), 4088–4099 (2018)
11. Kotenko, I., Saenko, I., Branitskiy, A.: Applying big data processing and machine
learning methods for mobile Internet of Things security monitoring. J. Internet
Serv. Inf. Secur. (JISIS) 8(3), 54–63 (2018)
12. Di Pietro, R., Salleras, X., Signorini, M., Waisbard, E.: A blockchain-based trust
system for the Internet of Things. In: Proceedings of the 23rd ACM on Symposium
on Access Control Models and Technologies, pp. 77–83. ACM (2018)
13. Liu, Y., Xu, C., Zhan, Y., Liu, Z., Guan, J., Zhang, H.: Incentive mechanism
for computation offloading using edge computing: a Stackelberg game approach.
Comput. Netw. 129, 399–409 (2017)
48 J. Jia et al.
14. Yao, S., Guan, J., Yan, Z., Xu, K.: SI-STIN: a smart identifier framework for space
and terrestrial integrated network. IEEE Netw. 33(1), 8–14 (2018)
15. Moriano, P., Pendleton, J., Rich, S., Camp, L.J.: Stopping the insider at the gates:
protecting organizational assets through graph mining. J. Wirel. Mob. Netw. Ubiq-
uit. Comput. Dependable Appl. (JoWUA) 9(1), 4–29 (2018)
16. Perera, M.N.S., Koshiba, T.: Achieving strong security and member registration
for lattice-based group signature scheme with verifier-local revocation. J. Internet
Serv. Inf. Secur. (JISIS) 8(4), 1–15 (2018)
17. Valenza, F., Lioy, A.: User-oriented network security policy specification. J. Inter-
net Serv. Inf. Secur. (JISIS) 8(2), 33–47 (2018)
18. Aldo, M.S.: Strategic role engineering approach to visual role based access control
(V-RBAC). Int. J. Comput. Appl. Eng. Sci. 3(2), 84 (2013)
19. Narouei, M., Takabi, H.: Towards an automatic top-down role engineering approach
using natural language processing techniques. In: Proceedings of the 20th ACM
Symposium on Access Control Models and Technologies, pp. 157–160. ACM (2015)
20. Roeckle, H., Schimpf, G., Weidinger, R.: Process-oriented approach for role-finding
to implement role-based security administration in a large industrial organization.
In: Proceedings of the Fifth ACM Workshop on Role-Based Access Control, pp.
103–110. ACM (2000)
21. Vaidya, J., Atluri, V., Guo, Q.: The role mining problem: finding a minimal descrip-
tive set of roles. In: Proceedings of the 12th ACM symposium on Access Control
Models and Technologies, pp. 175–184. ACM (2007)
22. Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: a temporal role-based access con-
trol model. ACM Trans. Inf. Syst. Secur. 4(3), 191–233 (2001)
23. Mitra, B., Sural, S., Vaidya, J., Atluri, V.: Migrating from RBAC to temporal
RBAC. IET Inf. Secur. 11(5), 294–300 (2017)
24. Mitra, B., Sural, S., Atluri, V., Vaidya, J.: Toward mining of temporal roles. In:
Wang, L., Shafiq, B. (eds.) DBSec 2013. LNCS, vol. 7964, pp. 65–80. Springer,
Heidelberg (2013). https://doi.org/10.1007/978-3-642-39256-6 5
25. Pan, N., Sun, L., Zhu, Z., He, L.: A temporal approximation-based role mining
approach for TRBAC. In: 2017 3rd IEEE International Conference on Computer
and Communications (ICCC), pp. 2366–2370. IEEE (2017)
26. Frank, M., Buhman, J.M., Basin, D.: Role mining with probabilistic models. ACM
Trans. Inf. Syst. Secur. (TISSEC) 15(4), 15 (2013)
27. Colantonio, A., Di Pietro, R., Ocello, A., Verde, N.V.: A new role mining framework
to elicit business roles and to mitigate enterprise risk. Decis. Support Syst. 50(4),
715–731 (2011)
28. Colantonio, A., Di Pietro, R., Ocello, A., Verde, N.V.: Visual role mining: a picture
is worth a thousand roles. IEEE Trans. Knowl. Data Eng. 24(6), 1120–1133 (2011)
29. Liu, Y., Wu, H., Xia, Y., Wang, Y., Li, F., Yang, P.: Optimal online data dissem-
ination for resource constrained mobile opportunistic networks. IEEE Trans. Veh.
Technol. 66(6), 5301–5315 (2016)
30. Ma, X., Li, R., Lu, Z.: Role mining based on weights. In: Proceedings of the 15th
ACM Symposium on Access Control Models and Technologies, pp. 65–74. ACM
(2010)
31. Frank, M., Streich, A.P., Basin, D., Buhmann, J.M.: A probabilistic approach to
hybrid role mining. In: Proceedings of the 16th ACM Conference on Computer and
Communications Security, pp. 101–111. ACM (2009)
32. Zhai, Z., Wang, J., Cao, Z., Mao, Y.: Hybrid role mining methods with minimal
perturbation (in Chinese). J. Comput. Res. Dev. 50(5), 951–960 (2013)
Role Mining: Survey and Suggestion on Role Mining in Access Control 49
33. Fuchs, L., Meier, S.: The role mining process model-underlining the need for a
comprehensive research perspective. In: 2011 Sixth International Conference on
Availability, Reliability and Security, pp. 35–42. IEEE (2011)
34. Molloy, I., Li, N., Qi, Y.A., Lobo, J., Dickens, L.: Mining roles with noisy data.
In: Proceedings of the 15th ACM Symposium on Access Control Models and Tech-
nologies, pp. 45–54. ACM (2010)
35. Vaidya, J., Atluri, V., Warner, J., Guo, Q.: Role engineering via prioritized subset
enumeration. IEEE Trans. Dependable Secure Comput. 7(3), 300–314 (2008)
36. Takabi, H., Joshi, J.B.D.: StateMiner: an efficient similarity-based approach for
optimal mining of role hierarchy. In: Proceedings of the 15th ACM Symposium on
Access Control Models and Technologies, pp. 55–64. ACM (2010)
37. Colantonio, A., Di Pietro, R., Ocello, A., Verde, N.V.: Taming role mining com-
plexity in RBAC. Comput. Secur. 29(5), 548–564 (2010)
38. Molloy, I., et al.: Mining roles with multiple objectives. ACM Trans. Inf. Syst.
Secur. (TISSEC) 13(4), 36 (2010)
39. Guo, Q., Vaidya, J., Atluri, V.: The role hierarchy mining problem: discovery of
optimal role hierarchies. In: 2008 Annual Computer Security Applications Confer-
ence (ACSAC), pp. 237–246. IEEE (2008)
40. Saenko, I., Kotenko, I.: Genetic algorithms for role mining problem. In: 2011 19th
International Euromicro Conference on Parallel, Distributed and Network-Based
Processing, pp. 646–650. IEEE (2011)
41. Dong, L., Wu, K., Tang, G.: A data-centric approach to quality estimation of role
mining results. IEEE Trans. Inf. Forensics Secur. 11(12), 2678–2692 (2016)
42. Molloy, I., Li, N., Li, T., Mao, Z., Wang, Q., Lobo, J.: Evaluating role mining
algorithms. In: Proceedings of the 14th ACM Symposium on Access Control Models
and Technologies, pp. 95–104. ACM (2009)
43. Wu, L., et al.: Uniform-scale assessment of role minimization in bipartite networks
and its application to access control. Phys. A: Stat. Mech. Applications. 507, 381–
397 (2018)
44. Colantonio, A., Di Pietro, R., Ocello, A., Verde, N.V.: A probabilistic bound on the
basic role mining problem and its applications. In: Gritzalis, D., Lopez, J. (eds.)
SEC 2009. IFIPAICT, vol. 297, pp. 376–386. Springer, Heidelberg (2009). https://
doi.org/10.1007/978-3-642-01244-0 33
45. Blundo, C., Cimato, S.: A simple role mining algorithm. In: Proceedings of the
2010 ACM Symposium on Applied Computing, pp. 1958–1962. ACM (2010)
46. Huang, H., Shang, F., Zhang, J.: Approximation algorithms for minimizing the
number of roles and administrative assignments in RBAC. In: 2012 IEEE 36th
Annual Computer Software and Applications Conference Workshops, pp. 427–432.
IEEE (2012)
47. Xu, Z., Stoller, S.D.: Mining parameterized role-based policies. In: Proceedings of
the Third ACM Conference on Data and Application Security and Privacy, pp.
255–266. ACM (2013)
48. Molloy, I., et al.: Mining roles with semantic meanings. In: Proceedings of the 13th
ACM Symposium on Access Control Models and Technologies, pp. 21–30. ACM
(2008)
49. Ye, W., Li, R., Gu, X., Li, Y., Wen, K.: Role mining using answer set programming.
Future Gener. Comput. Syst. 55, 336–343 (2016)
50. Pan, N., Sun, L., He, L.-S., Zhu, Z.-Q.: An approach for hierarchical RBAC recon-
figuration with minimal perturbation. IEEE Access 6, 40389–40399 (2017)
51. Mitra, B., Sural, S., Vaidya, J., Atluri, V.: A survey of role mining. ACM Comput.
Surv. 48, 1–37 (2016)
50 J. Jia et al.
52. Rosen-Zvi, M., Chemudugunta, C., Griffiths, T., Smyth, P., Steyvers, M.: Learning
author-topic models from text corpora. ACM Trans. Inf. Syst. (TOIS) 28(1), 4
(2010)
53. Molloy, I., Park, Y., Chari, S.: Generative models for access control policies: appli-
cations to role mining over logs with attribution. In: Proceedings of the 17th ACM
Symposium on Access Control Models and Technologies, pp. 45–56. ACM (2012)
54. Zhang, X., Han, W., Fang, Z., Yin, Y., Mustafa, H.: Role mining algorithm evalua-
tion and improvement in large volume android applications. In: Proceedings of the
First International Workshop on Security in Embedded Systems and Smartphones,
pp. 19–26. ACM (2013)
55. Alohaly, M., Takabi, H., Blanco, E.: A deep learning approach for extracting
attributes of ABAC policies. In: Proceedings of the 23rd ACM on Symposium
on Access Control Models and Technologies, pp. 137–148. ACM (2018)
56. Morisset, C., Willemse, T.A.C., Zannone, N.: Efficient extended ABAC evaluation.
In: Proceedings of the 23rd ACM on Symposium on Access Control Models and
Technologies, pp. 149–160. ACM (2018)
57. Colombo, P., Ferrari, E.: Access control in the era of big data: state of the art and
research directions. In: Proceedings of the 23rd ACM on Symposium on Access
Control Models and Technologies, SACMAT 2018, Indianapolis, IN, USA, 13–15
June 2018, pp. 185–192 (2018)
58. Guan, J., Sharma, V., You, I., Atiquzzaman, M., Imran, M.: Extension of MIH
for FPMIPv6 (EMIH-FPMIPv6) to support optimized heterogeneous handover.
Future Gener. Comp. Syst. 97, 775–791 (2019)
59. Squicciarini, A.C., Rajtmajer, S.M., Zannone, N.: Multi-party access control:
requirements, state of the art and open challenges. In: Proceedings of the 23rd
ACM on Symposium on Access Control Models and Technologies, SACMAT 2018,
Indianapolis, IN, USA, 13–15 June 2018, p. 49 (2018)
60. Liu, B., Guan, J., Jiang, Z.: A policy management system based on multi-
dimensional attribution label. In: You, I., Leu, F.-Y., Chen, H.-C., Kotenko, I.
(eds.) MobiSec 2016. CCIS, vol. 797, pp. 128–142. Springer, Singapore (2018).
https://doi.org/10.1007/978-981-10-7850-7 12
61. Lee, A.J., Biehl, J.T., Curry, C.: Sensing or watching?: balancing utility and privacy
in sensing systems via collection and enforcement mechanisms. In: Proceedings
of the 23rd ACM on Symposium on Access Control Models and Technologies,
SACMAT 2018, Indianapolis, IN, USA, 13–15 June 2018, pp. 105–116 (2018)
Mobile Application and Security
Adaptive Touch Interface: Application
for Mobile Internet Security
1 Introduction
One way to analyze security is through visual analytics. Visual analytics uses
data visualization to detect events, interpret incidents and select countermea-
sures. In mobile internet security, data visualization has many uses: access con-
trol in various security models; analysis of the state of the networks formed by
Internet of Things (IoT) devices; analysis of mobile security metrics and others.
To solve the problems of this kind, specialists use various visualization models
that contain traditional interaction interfaces. Nevertheless, the complication
of visualization models requires new forms of interaction that would be more
convenient for the operator and thereby increase the speed and quality of decision
making. One such solution is touch screen interfaces. However, they are usually
not considered as a tool for the interaction of the analyst and data visualization
mechanisms.
Another problem is the contradiction between the functionality implemented
in the interface and the functionality necessary for the user to solve specific
tasks. To solve this problem, adaptive and predictive interfaces are used. They
adapt to a specific user and the task that he/she is solving.
In this paper, we propose the approach to the formation of user interfaces
based on touch screens and recognition of operator gestures. The advantage of
this approach (in comparison with the traditional interface) is that it will increase
the speed of mobile internet security events management, simplify interaction
with visualization models, and improve the quality of decision making. To do
this, we provide models of user-interface interaction and interface adaptation
algorithms for the following tasks of mobile internet security: managing a hier-
archical centralized network of embedded devices and visualizing a decentralized
sensor network.
The scientific novelty of this paper is the proposed combined approach for
implementing a touch interface based on: (1) adaptive adjustment algorithm
for a specific user and the mobile internet security task, (2) the use of “best
practices” to form a predictive gesture interface. The contribution of this paper
is the approach that includes models and algorithms for adapting the touch
interface to the tasks of mobile internet security.
This paper has the following structure. The second section provides the
overview of related works on the field of visual analytics of mobile internet secu-
rity and interaction interfaces. The third section presents the approach to the
development of the adaptive interface for mobile internet security. In this section
the business model and the practical model of user interaction and visualization,
the adaptation algorithm and the algorithm of “best practices” gesture design are
proposed. The fourth section describes experiments on the perception of gestures
by users using examples of visual analytics for the tasks of managing a hierar-
chical centralized network of embedded devices and visualizing a decentralized
sensor network. The fifth section considers the advantages and disadvantages of
the proposed approach and describes the further direction of work.
models [8], graphs are used. For hierarchical RBAC models, TreeMaps are used
[14]. In addition, there are complex visualization models that are designed for
analysis in combined security models. For example, triangular matrices [18] use
visualization of both – matrices and trees.
Each of the existing models is used in a specific case of analysis and manage-
ment of access rights. The more complex the visualization model and the more
complex the analysis of the security model, the more complex the interaction
methods the operator needs. For example, in [11] the access matrix is presented,
it uses the mechanisms of filtering and grouping of subjects and objects. To do
that matrix uses classic tools, for example, drop-down lists. In TreeMaps, one
can filter data by showing only a specific part of the tree [14]. To do this one
need to click on the root of the specific subtree.
When analyzing the state of networks the analysts use graphs, TreeMaps,
matrices, and other visualization models [15]. Graphs are the most universal,
and with their help one can visualize any network structure [18]. TreeMaps are
suitable for visualizing hierarchical networks [9]. Matrices are used for almost
fully connected networks [22]. Also for networks that can form planar structures,
Voronoi maps are applied [19]. An example of such a network can be a self-
organizing sensor network, the topology of which was reduced to planar in order
to save energy and reduce interference [19]. Each method has its own advantages
and disadvantages; therefore, they can be used together [23].
The presented visualization models are realized in many fields. As already
mentioned, the more complex the task and the more metrics are needed to visu-
alize, the more complex the visualization model becomes. For example, [17] and
[16] presented approaches to combining visualization models in order to display
more metrics. On the other hand, the more complex the model, the more inter-
action tools an operator needs. For example, when implementing 3D models, one
should include tools that implement rotation and scaling. In overloaded graphs,
it is also suitable to implement scaling tools [17]. Moreover, often standard tools
may not be enough, and instead of standard scaling, fisheye [24] and Cartesian
distortion can be used. All this leads to an overloaded interface and complicates
the work of the operator-analyst.
When designing visual models, only traditional control methods based on
the use of a monitor, a mouse, and a keyboard are considered. However, visual
analytics can also be carried out using tablets, smartphones and other devices
with touch screens, as they are becoming more widespread and provide greater
operator mobility, for example, in production. The papers devoted to visual
analysis of information security do not discuss approaches based on touch screens
and how they can affect the process of visual analysis and decision-making of
information security.
Security analysis applications that have a touch interface implementation are
not common. We examined those few of them (for example, “Network Scanner”,
“Net Analyzer” and “IP Tools”) and found that gestures are most often limited to
touching one finger (rarely two), while the interaction with visualization models is
also limited to clicking and dragging. Thus, the interfaces of many modern appli-
cations serve only for a simple imitation of interaction with a computer mouse.
56 K. Zhernova et al.
3 Adaptation Technique
In order to understand how the interface of mobile internet security applications
can work, one should pay attention to the specifics of information security inter-
faces, how they differ from others. In mobile internet security applications, and
in general information security, the following elements are common:
– using the color of current events in three colors to distinguish between the
degree of danger – green (safe, for example, the embedded device is charged),
yellow (medium danger, for example, the charge level of the embedded device
is coming to an end), red (the highest degree of danger, for example, the
embedded device is turned off);
– nesting (request of additional parts on demand, for example – showing device
parameters on a graph);
– a large amount of data that needs to be processed (for example, traffic routes);
– situational awareness (providing the user with relevant data with reference
to time and place, for example, when monitoring the network online);
– visualization of the processed data (for example, the presentation of various
network topologies).
The listed elements must be present in the applications of mobile internet secu-
rity. However, their visual presentation and interaction methods may vary. The
example is as follows: with frequent reports of security risks marked in red, the
user may get tired and begin to ignore them. This problem can be solved using
the adaptability of the interface – at certain intervals to change the tone of the
alarm message within the red color, for example, use the shade of the red color
“magenta”. The user will notice the changes and will begin to pay attention to
the messages again. Thus, adapting an interface is also a necessary part of its
design.
Adaptive interface is an interface that adapts to the needs of the user based
on his/her behavior when working with the application. The adaptive interface
often refers to an adaptive design that is modified according to the resolution of
the user’s device, for which the flexible grid-based templates are used (a set of
open Bootstrap libraries can be an example of this).
In addition, there are so called predictive interfaces. A predictive interface
is able to predict what action the user is about to take at the next moment,
as well as which interface design will be most convenient for the user based on
Adaptive Touch Interface: Application for Mobile Internet Security 57
This model assumes that the user will interact with the visualization module
through gestures, the system will process user commands that are implemented
through gestures. Moreover, each specific user has its own characteristics, which
the system will also process, therefore, as a result, not only a visual representa-
tion will be formed, but the result of adaptation for a specific user.
At the implementation level, the model looks as shown in Fig. 2.
Data comes from a computer system and is downloaded to the application,
processed, displayed and drawn to get the final visualization. At the same time,
the user can interact with the image by gestures. And while user interacts with
images, the system processes, performs adaptation to the particular user’s fea-
tures. So, the image can be rendered again and then it will be modified to adapt
it for the specific user.
As one can see, the key elements of interaction are the processes of informa-
tion output and input, which are carried out using visualization and gestures,
respectively. To adapt them, interaction processes should be considered at two
levels: (1) at the level of interaction between a machine and a person; (2) at the
level of interaction between a person and a machine;
58 K. Zhernova et al.
For this, we propose the adaptation algorithm, the idea of which is that the
visualization model should independently recognize the combination of gestures
and functions that are most convenient for the user. The interface adaptation
algorithm can be divided into two following stages.
The first stage consists of the following steps.
Fig. 3. Examples of diagrams created using D3.js that can be used for applications of
mobile internet security.
Fig. 4. Examples of simple and complex gestures for touch interfaces presented in [1].
Also, to improve gestures, we provide the algorithm that allows one to create
gestures in accordance with their “best practices”:
(1) adaptation to a mobile device (changing the page width, text and picture
size when changing the screen resolution, the possibility of scrolling to the
side or scrolling down) [3];
(2) creating graphic elements in such a way that it is convenient to interact with
gestures (large enough buttons, paging elements, high-resolution images so
that they can be enlarged, the absence of a large number of small elements
in a row that one needs to press) [3];
(3) using standard gestures, such as tapping, double tapping, dragging, scrolling,
swiping in any direction, pinching in and out by two fingers, pressing, twist,
rotating or shaking the device [2];
(4) using gestures that are intuitively appropriate for each function [2];
(5) rejection of the traditional computer mouse hover and gestures associated
with the mouse when developing a gesture version of the interface [5];
(6) creating interface elements that will not be overlapped with the hands of
the user, the user should be able to see these elements [5].
62 K. Zhernova et al.
4 Implementation
The proposed models of human-computer interaction were implemented as a soft-
ware prototype of a web application. The prototype was executed in JavaScript
using the HTML5 markup language and the D3.js, hammer.js libraries and the
free Bootstrap package. The project consists of two components: a visualization
component and a component of human-computer interaction.
Four tests of two types were carried out. Two tests of the first type (Test A)
were based on user interaction with the touch screen. Two tests of the second
type (Test B) were based on interaction with the traditional hardware interface
(keyboard and mouse). Test 1 and Test 2 were formed on the basis of two different
datasets (Data Set 1 and Data Set 2, respectively) and differ in graphs.
The first test contained an image of a decentralized sensor network graph,
the second test contained a hierarchical centralized network graph. Thus, the
following tests were carried out:
1) Test 1 A - decentralized graph and touch screen; 2) Test 2 A - centralized
graph and touch screen; 3) Test 1 B - decentralized graph and keyboard and
mouse; 4) Test 2 B is a centralized graph and keyboard and mouse.
Data Set 1 (Test 1) – Visualization to simulate a decentralized sensor network
without reducing to planarity. The experiment used the data on the simulation of
a decentralized sensor network, which consists of autonomous devices. As part of
the simulation, the following device parameters were taken into account: battery
charge, light and sound levels. Some of them were outdoors. Each device has a
critical level, which was calculated based on the criticality of the assets [17] that
were located in this area. Thus, a loss of a sensor would mean a loss of control
over this asset. Since the devices are autonomous, they are discharged, but they
can be charged using solar panels.
Data Set 2 (Test 2) – Visualization to simulate an integrated security system
hierarchical centralized network containing embedded devices [10]. Embedded
devices are equipped with a set of sensors: motion sensors, RFID reader, com-
bustible gas sensor, window breaking sensor, temperature, humidity and light
sensor. Embedded devices were connected to a hub, which collected, normalized,
and pre-processed the received data. Hubs connected to a server whose task is
to store, process, analyze security messages from devices and the status of these
devices.
When using visualization in the analysis process, it is possible to interact
with visualized information through gestures on the touch screen. The following
gestures were implemented in the prototype:
– attracting the nearest vertex of the graph (device) and calling the context
menu for this vertex when touching with a finger, selecting the context menu
option by repeated touch. Selecting individual vertices and vertex groups is
implemented through the context menu;
– moving three fingers left/right – calling/hiding additional information
(show/hide MAC addresses, charge level, number of transmitted messages,
etc.);
Adaptive Touch Interface: Application for Mobile Internet Security 63
– four-finger touch – filtering change (display the vertex color as the type
of device, device charge level, number of transmitted messages, number of
received messages, etc.);
– pinching in and out of five fingers – changing graph connections (show how
devices are physically connected, as well as show their traffic routes).
Gestures were originally assigned to certain functions that the application per-
forms. On the application page on the right side is the explanation of the corre-
spondence of gestures to functions.
As a test of this prototype, a number of tasks were proposed based on the
available methods of human-computer interaction.
For data set 1:
1. Attach devices with specific MAC addresses (MAC addresses are hidden and
shown by a specific gesture).
2. Highlight discharged devices (high charge, device almost discharged, device
discharged and turned off – are set by color).
3. Highlight a specific type of device (the type of device is set by color).
4. Highlight devices that are not connected to a self-organizing network (a vertex
without edges).
5. Highlight almost discharged devices with high criticality (the device is almost
discharged is set by color, the criticality of the asset is determined by the
vertex size).
Fig. 6. Appearance of the implemented web application, Data Set 2. The colors of
vertices are detectors (yellow and white), embedded devices (purple), hubs (green),
server (blue). (Color figure online)
At the same time, control was carried out through this display through ges-
tures. The verification was carried out as follows:
both types of tests. The test observer was responsible for the equipment and
fixed the problems associated with it. At the same time, the observer was
forbidden to answer questions regarding the specifics of the test (interaction
with the visualization model itself).
5. During the execution of the next task it was required to interact with the
visualization.
6. After completing the last task, the “Finish” button should be touched; this
action initiated the download of a text file with the task execution logs to the
computer.
7. Then the collected logs were analyzed for the time spent on each task, as well
as the quality of the tasks (correct execution).
The tasks are divided into three groups (selection, interaction with the menu
and action) and their combinations (selection + menu, selection + action). Issues
related to the selection suggested the possibility of selecting one or more visual-
ization elements, interaction with the menu implied interaction with the drop-
down list options, the action was carried out using more complex gestures.
As a result of the experiment, the distributions of speed of the tasks were
obtained (Fig. 7 and Fig. 8). The results were evaluated according to three
parameters: the maximum of distribution, the upper quantile (75% of the best
indicators), and the average value. For this, the distribution graphs were visual-
ized in the form of box-plot.
Fig. 7. Test 1: task execution speed in seconds for a decentralized graph, where a –
touch screens, b – traditional interface.
66 K. Zhernova et al.
Fig. 8. Test 2: task execution speed in seconds for a centralized graph, where a – touch
screens, b – traditional interface.
Test 1 A Test 1 B
Task
Parameter Value Parameter Value
Upper fence 54 Upper fence 147
1 Q3 25 Q3 73
Mean 22.68 Mean 58.5
Upper fence 36 Upper fence 74
2 Q3 22 Q3 59
Mean 21.68 Mean 33.83
Upper fence 34 Upper fence 44
3 Q3 19 Q3 22
Mean 15.07 Mean 16.44
Upper fence 22 Upper fence 44
4 Q3 14.5 Q3 30
Mean 18.82 Mean 21
Upper fence 30 Upper fence 50
5 Q3 22 Q3 39
Mean 15.5 Mean 35.5
Upper fence 35 Upper fence 30
6 Q3 23 Q3 28
Mean 20 Mean 24.17
Upper fence 47 Upper fence 28
7 Q3 28.5 Q3 22
Mean 24.29 Mean 19.56
Upper fence 90 Upper fence 139
8 Q3 48 Q3 75
Mean 46.29 Mean 63.33
Upper fence 41 Upper fence 72
9 Q3 29.5 Q3 53
Mean 23.11 Mean 41.78
Upper fence 45 Upper fence 141
10 Q3 23 Q3 78
Mean 15.21 Mean 57.5
Upper fence 25 Upper fence 33
11 Q3 14 Q3 22
Mean 16 Mean 16.39
Upper fence 18 Upper fence 29
12 Q3 12.5 Q3 18
Mean 9.75 Mean 15.78
Upper fence 21 Upper fence 14
13 Q3 11 Q3 12
Mean 10.48 Mean 12.22
68 K. Zhernova et al.
Test 2 A Test 2 B
Task
Parameter Value Parameter Value
Upper fence 34 Upper fence 24
1 Q3 26 Q3 18
Mean 21.68 Mean 16.39
Upper fence 42 Upper fence 15
2 Q3 21.5 Q3 11
Mean 17.07 Mean 9.56
Upper fence 19 Upper fence 23
3 Q3 11 Q3 15
Mean 13.42 Mean 10.78
Upper fence 23 Upper fence 14
4 Q3 12.5 Q3 12
Mean 9.93 Mean 9.89
Upper fence 13 Upper fence 11
5 Q3 9 Q3 8
Mean 7.75 Mean 7.06
Upper fence 26 Upper fence 14
6 Q3 15.5 Q3 10
Mean 12.25 Mean 9.67
Upper fence 19 Upper fence 18
7 Q3 13 Q3 13
Mean 15.14 Mean 10.83
Upper fence 31 Upper fence 29
8 Q3 20 Q3 19
Mean 20.43 Mean 17.06
Upper fence 22 Upper fence 21
9 Q3 17 Q3 16
Mean 14.29 Mean 15.44
Upper fence 19 Upper fence 11
10 Q3 12 Q3 10
Mean 9.04 Mean 8.5
Upper fence 13 Upper fence 20
11 Q3 10 Q3 13
Mean 9.11 Mean 11.11
Upper fence 23 Upper fence 17
12 Q3 14 Q3 13
Mean 13 Mean 12.11
Upper fence 13 Upper fence 9
13 Q3 8 Q3 7
Mean 6.11 Mean 6.89
Adaptive Touch Interface: Application for Mobile Internet Security 69
1. If the time difference is more than 3 s in favor of touch screens (the task exe-
cution time on the touch screen is shorter than on the traditional interface),
the results are considered good and cells are highlighted in blue.
2. If the time difference is less than 3 s in favor of either of the two tests, the
results are considered the same and cells are highlighted in yellow.
3. If the time difference is the traditional interface (the task execution time on
the touch screen is longer than on the traditional interface), the results are
considered unsatisfactory and cells are highlighted in red.
The final result is marked in a predetermined color in the cell with the task
number according to the principle of the majority element:
1. If most of the parameters are the same, the overall result is considered accept-
able and is marked in yellow.
2. If most of the parameters are “good”, the overall result is considered good
and marked in blue.
3. If there is at least one “unsatisfactory” parameter, the results cannot be
considered good and are considered: (1) acceptable if the “unsatisfactory”
parameter is one, (2) “unsatisfactory” if there are two or three “unsatisfac-
tory” parameters.
For a decentralized network graph, the touch interface showed the best result
in almost all test categories. The exception was task number 7, “Change com-
munications with the graph,” which was carried out by mixing/raising several
fingers across the screen. Otherwise, the results are better, or comparable to the
traditional interface. The experiment showed that the presented approach will
allow faster analytics of the self-organizing sensor network. Gestures allow one
to quickly and intuitively switch between metrics, capture the interested vertices
or groups of vertices, and switch between graph representations. Thus, the qual-
ity is improved, and the speed of decision-making in the management of mobile
networks is increased. The intuitive nature of gestures allows one to remember
more commands. It gives the possibility to analyze a larger number of metrics,
as it becomes easier to switch between them. Thus, in the process of managing
the mobile network, more useful information for decision making can be used.
For a centralized network graph, the touch interface showed a predominantly
equal result. The exception was task No. 1, “Pull and fix any point,” No. 2,
“Increase the selected point,” and No. 6, “Select all green points.” Otherwise,
the results are considered the same.
It is supposed to further implement an adaptive interface based on the collec-
tion of statistics on user actions, for example, what gestures for which functions
he/she uses most often.
5 Discussion
This research focuses on touch screen gestures as a way to improve the interaction
between the user and information security systems. Further work involves the
70 K. Zhernova et al.
1. It will be difficult for another user to start work on the same device. In the
case of several people working in turn for one device, this approach will be
more likely a disadvantage. However, most often each employee has his/her
own individual workplace.
2. It will take some time until the application collects the necessary statistics to
adapt to a specific user.
Given the shortcomings described above, the subsequent work will include a
study of which gestures should be assigned in advance, which of them require
adjustment, with which gestures to perform functions attached to them at the
end of the gesture, with which – at the beginning, and which gestures should be
used for visual display of the function execution process.
The proposed adaptation model can be used for access control, where the
system will select the most appropriate visualization model for the situation,
allow columns and rows of matrices to be sorted by user-friendly gestures, and
scale trees. The model is also applicable for controlling self-organizing sensor
networks, where, in accordance with the situation, a decision will be made to
display the network using a graph, TreeMaps, Voronoi maps, or some combina-
tion of them. Also, gestures will be selected that are most appropriate for the
selected visualization models.
In general, the approach allows one to speed up decision-making processes
and improve their quality when setting up mobile device networks. For example,
when analyzing networks, the use of gestures allows one to quickly and more
intuitively switch between metrics, capture the interested vertices or groups of
vertices, and switch between graph representations. Gestures can also be used
to manage access control (for example, when managing permissions between
mobile devices) and to assess risks (for example, when assessing the risk and
cost of losing a device). Separately, it is worth noting the value of gestures when
used on tablets and mobile devices which is in demand in production – when
Adaptive Touch Interface: Application for Mobile Internet Security 71
a specialist needs to configure mobile device networks in the field. Thus, the
approach also expands the possibilities of using visual analytics for situations
when using a PC is difficult.
6 Conclusion
The paper proposes the approach to human-computer interaction with the inter-
faces of mobile internet security applications based on touch screens.
The paper proposes the models of user interaction and visualization, the
adaptation algorithm and the “best practices” gesture design algorithm. Exper-
iments on the perception of gestures by users on the examples of visual analytics
for the hierarchical centralized network of embedded devices and the decentral-
ized sensor network were carried out. The methodology proposed in this paper
can be used to create new models of interaction with the touch interface in the
risk assessment process.
Further research will be aimed at studying the naturalness of gestures on
touch screens in the perception of users, as well as studying the best fit of
gestures to the visual display of information security metrics.
References
1. Apple — use multi-touch gestures on your Mac - Apple support. https://support.
apple.com/en-us/HT204895. Accessed June 2019
2. Apple developer — gestures - user interaction - IOS - human inter-
face guidelines. https://developer.apple.com/design/human-interface-guidelines/
ios/user-interaction/gestures/. Accessed June 2019
3. Apple developer — UI design dos and donts. https://developer.apple.com/design/
tips/. Accessed June 2019
4. kolenda, N.: Psychology and business. https://www.nickkolenda.com/user-
experience/#. Accessed June 2019
5. World Usability Congress: Touch screen usability best practices when designing
automation user interfaces (UI). https://worldusabilitycongress.com/touch-screen-
usability-best-practices-when-designing-automation-user-interfaces-ui/. Accessed
June 2019
6. Ananto, B.S., Sari, R.F., Harwahyu, R.: Color transformation for color blind com-
pensation on augmented reality system. In: 2011 International Conference on User
Science and Engineering (i-USEr), pp. 129–134. IEEE (2011)
7. Best, D.M., Bohn, S., Love, D., Wynne, A., Pike, W.A.: Real-time visualization
of network behaviors for situational awareness. In: Proceedings of the 7th Interna-
tional Symposium on Visualization for Cyber Security, pp. 79–90. ACM (2010)
8. Bishop, M.: Conspiracy and information flow in the take-grant protection model.
J. Comput. Secur. 4(4), 331–359 (1996)
9. Choi, H., Lee, H., Kim, H.: Fast detection and visualization of network attacks on
parallel coordinates. Comput. Secur. 28(5), 276–288 (2009)
10. Desnitsky, V., Levshun, D., Chechulin, A., Kotenko, I.V.: Design technique for
secure embedded devices: application for creation of integrated cyber-physical secu-
rity system. JoWUA 7(2), 60–80 (2016)
72 K. Zhernova et al.
11. Heitzmann, A., Palazzi, B., Papamanthou, C., Tamassia, R.: Effective visualization
of file system access-control. In: Goodall, J.R., Conti, G., Ma, K.-L. (eds.) VizSec
2008. LNCS, vol. 5210, pp. 18–25. Springer, Heidelberg (2008). https://doi.org/10.
1007/978-3-540-85933-8 2
12. Hutchins, E.L., Hollan, J.D., Norman, D.A.: Direct manipulation interfaces. Hum.
Comput. Interact. 1(4), 311–338 (1985)
13. Ingols, K., Lippmann, R., Piwowarski, K.: Practical attack graph generation for
network defense. In: 2006 22nd Annual Computer Security Applications Confer-
ence, ACSAC 2006, pp. 121–130. IEEE (2006)
14. Kim, D.-K., Ray, I., France, R., Li, N.: Modeling role-based access control
using parameterized UML models. In: Wermelinger, M., Margaria-Steffen, T. (eds.)
FASE 2004. LNCS, vol. 2984, pp. 180–193. Springer, Heidelberg (2004). https://
doi.org/10.1007/978-3-540-24721-0 13
15. Kolomeec, M., Chechulin, A., Kotenko, I.V.: Methodological primitives for phased
construction of data visualization models. J. Internet Serv. Inf. Secur. 5(4), 60–84
(2015)
16. Kolomeec, M., Chechulin, A., Pronoza, A., Kotenko, I.V.: Technique of data visu-
alization: example of network topology display for security monitoring. JoWUA
7(1), 58–78 (2016)
17. Kolomeec, M., et al.: Choosing models for security metrics visualization. In: Rak,
J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds.) MMM-
ACNS 2017. LNCS, vol. 10446, pp. 75–87. Springer, Cham (2017). https://doi.org/
10.1007/978-3-319-65127-9 7
18. Kolomeets, M., Chechulin, A., Kotenko, I., Saenko, I.: Access control visualization
using triangular matrices. In: 2019 27th Euromicro International Conference on
Parallel, Distributed and Network-Based Processing (PDP), pp. 348–355. IEEE
(2019)
19. Kolomeets, M., Chechulin, A., Kotenko, I., Strecker, M.: Voronoi maps for pla-
nar sensor networks visualization. In: You, I., Chen, H.-C., Sharma, V., Kotenko,
I. (eds.) MobiSec 2017. CCIS, vol. 971, pp. 96–109. Springer, Singapore (2019).
https://doi.org/10.1007/978-981-13-3732-1 7
20. Kotenko, I., Doynikova, E.: Security assessment of computer networks based on
attack graphs and security events. In: Linawati, M.M.S., Neuhold, E.J., Tjoa, A.M.,
You, I. (eds.) ICT-EurAsia 2014. LNCS, vol. 8407. Springer, Heidelberg (2014).
https://doi.org/10.1007/978-3-642-55032-4 47
21. Kotenko, I., Stepashkin, M., Doynikova, E.: Security analysis of information sys-
tems taking into account social engineering attacks. In: 2011 19th International
Euromicro Conference on Parallel, Distributed and Network-Based Processing, pp.
611–618. IEEE (2011)
22. Kotenko, I., Ulanov, A.: Simulation of internet DDoS attacks and defense. In:
Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006.
LNCS, vol. 4176, pp. 327–342. Springer, Heidelberg (2006). https://doi.org/10.
1007/11836810 24
23. Roberts, J.C.: Guest editor’s introduction: special issue on coordinated and mul-
tiple views in exploratory visualization. Inf. Vis. 2(4), 199–200 (2003)
24. Sarkar, M., Brown, M.H.: Graphical fisheye views. Commun. ACM 37(12), 73–83
(1994)
Power-Efficient Big.LITTLE Core
Assignment Scheme for Task Graph
Based Real-Time Smartphone
Applications
1 Introduction
for each task, ensuring that it is processed within each deadline. To meet this time
constraint (i.e., deadline), the system may require higher performance, which
consumes more power. However, advances in battery technology tend to lag
behind the development levels of such high power hardware and applications [15].
To address this problem, the asymmetric multi-core architecture is being
introduced into the mobile environment, which consists of multiple processors
having different processing power and different power efficiency. A widely used
asymmetric multi-core architecture is the big.LITTLE architecture developed
by ARM [8]. The ARM big.LITTLE architecture combines big cores with high
processing power and high power consumption, and LITTLE cores with low
power consumption and relatively low performance. We can increase the energy
efficiency by allocating the application tasks that are not urgent and do not
require high throughput to LITTLE cores. However, the desired energy savings
by the big.LITTLE architecture will not be sufficiently achieved unless the LIT-
TLE cores are fully utilized. In practice, many application tasks have performed
on the big cores instead of the LITTLE cores [17]. This is because the crite-
ria for assigning an application’s tasks to cores are based on the task’s priority
and the load. Unfortunately, most applications have high priorities to meet user
requirements.
Tasks with deadlines in real-time applications are considered urgent so that
they tend to run on big cores. However, real-time tasks do not affect perfor-
mance or satisfaction even though the processing time increases as long as the
deadline is guaranteed. Therefore, in order to increase the energy saving effect
of the big.LITTLE core structure, a novel energy efficient multi-core assignment
technique is required to increase the utilization of LITTLE core in application
environment with real-time characteristics. A running application consists of a
group of task, which has an acyclic graph structure. We propose a power-efficient
big.LITTLE core assignment technique that estimates the deadline compliance
status of task graph based real-time application, and assigns the guaranteed
tasks to LITTLE core first. We also consider guarantee of the deadline of a task
graph for an application. By applying the proposed scheduling technique on the
real test-bed, we show that the proposed technique improves energy saving effect
while guaranteeing real-time performance as compared to the performance of the
legacy scheduler.
Since the battery power is one of the crucial resources of smartphones, to
make a smartphone’s battery power quickly discharged may be one of the effec-
tive way for malicious attackers [12]. Our work can provide a thread-level energy
consumption effect on an application task. Therefore, it may be utilized to detect
or diagnose these kinds of battery power attacks. We also discuss energy-aware
security issues on big.LITTLE core assignments of real-time application threads.
The paper is organized as follows. In Sect. 2, we discusses related studies
that have been used to reduce energy consumption in asymmetric multi-core
architectures. Section 3 and 4 describe the system model and the multi-core
assignment algorithm proposed in this paper, respectively. Section 5 shows the
Power-Efficient big.LITTLE core Assignment Scheme 75
2 Related Work
Since ARM Holdings introduced ARM big.LITTLE structure, many studies have
been continued on ARM big.LITTLE structure. In [8], the big.LITTLE architec-
ture’s power efficiency is introduced by comparing the legacy symmetric multi-
core architecture. The software structure for task scheduling with these asym-
metric multi-core equipped device can be divided into three main categories
[7,8]. Figure 1 depicts each technique.
– Cluster Migration Technique: Multiple big cores make up a cluster, and sev-
eral LITTLE cores make up another cluster. When the scheduler runs the
task, the scheduler selects either the big core cluster or the LITTLE core
cluster. The deselected cluster becomes inactive. The disadvantage is that
not all cores are available at the same time.
– CPU Migration Technique: In an environment where there are multiple big
and LITTLE cores, one big core and one LITTLE core are paired together to
form a cluster. In situations where there are many tasks to run, all clusters
can be used simultaneously, but within one cluster only one of the big and
LITTLE cores is active, and the other cores are inactive.
– Global Task Scheduling Technique: Each core is independent, and the sched-
uler assigns tasks to the appropriate core (big core or LITTLE core) according
to the schedule policy setting. If the scheduler has a lot of tasks to run, the
scheduler can activate all cores. Since the scheduling complexity is higher
than that of existing techniques, careful scheduling techniques are required.
3 System Model
In our scheduling model, each application m has multiple tasks, and we use a
directed acyclic graph to represent an application with its tasks. In the graph,
each node is represented Xm,i for application m, and task i. In addition, the
connection between each node represents dependency between the nodes. For
example, if there is a dependency between Xm,i and Xm,j (Xm,j follow Xm,i ),
Xm,j can only be executed after the completion of Xm,i . Figure 2 shows the task
graph for two applications. The two applications are independent of each other,
and each node, or task, has dependency in each application. Also it presents the
job size and the deadline for each task. For example, task D of Application 1 in
Fig. 2 can start its execution only after all precedent tasks of task D (i.e., task
A, B, and C) are completed. The execution of an application is presented as the
time spend in completing the first node through the last node. For example, the
execution time of Application 2 in Fig. 2 is the time spend in completing task A
through task L.
Power-Efficient big.LITTLE core Assignment Scheme 77
(a) Application 1
(b) Application 2
The basic idea is that if a task can finish its execution running on a little core
before its deadline, the task is assigned on the little core. The algorithm pro-
gresses as shown in Algorithm 1. A task graph for an application to be scheduled
is required as input data. The main procedure and the essential functions are
described as follows:
– Main procedure: A task is taken from the input task graph in descending
order. It checks if the task is ready, i.e., all of precedent tasks of the task
should be completed. If the task is ready, the task is assigned to a LITTLE
core only if the task can be completed within the deadline. Otherwise, the
task is assigned to a big core.
– ExpectedExecT ime(task, coreT ype): This function computes the expected
execution time to complete the given task while running on the coreT ype.
coreT ype can be either big or LITTLE.
– getAvailableCoreList (coreT ype): This function returns the list of available
cores among coreT ype (i.e., big or LIT T LE).
Algorithm 1 presented in the previous section guarantees that each task com-
pletes its execution within its deadline as shown. For example, it is guaranteed
that Execution time of a task shown in Fig. 3 should always be smaller than the
Power-Efficient big.LITTLE core Assignment Scheme 79
required deadline of the task. However, it is more usual that an application (i.e.,
its task graph) has to be finished within its deadline. For example, Execution
time of an Application in Fig. 3 should always be smaller than the required
deadline of the task graph (i.e., the application).
The main procedure and the essential function in Algorithm 2 are described
as follows:
– Main procedure: At first, it finds out the critical path, which is explained in
the next paragraph, from the given graph. In the loop, a task is taken from
the input task graph in descending order. It checks if the task is in the critical
path, the task is assigned to a big core. Otherwise, the task is assigned to a
LITTLE core only if the task can be completed within the deadline. If it can
not be, the task is assigned to a big core.
– F indCriticalP ath(Graph G): This function finds the critical path of the given
graph G. A critical path of a graph includes a path from the first node (i.e.,
root node) to the last node (i.e., terminal node), of which the sum of execution
time of the member nodes is greater than any other path of the graph.
5 Performance Evaluation
In this chapter, we evaluate the performance of our proposed scheme by imple-
menting a test program on a real smartphone. In the evaluation, we randomly
generate task graphs, then proceed with scheduling according to the proposed
algorithm. Using this randomly generated task graph, we compared our sched-
uler with the Android’s default scheduler. Before showing the main results, we
first present the experiment setting.
Figure 5 illustrates the result when the amount of tasks to be run is small
(i.e., average CPU Utilization is 25%). Because Utilization is 25%, most of the
tasks are assigned at the LITTLE core in Power-Efficient, whereas in legacy,
82 S. W. Lee et al.
most of the tasks are assigned at the big core. The more number of tasks, the
more power saving effect will be in Power-Efficient than legacy. It is found that
Power-Efficient reduces energy consumption by 50% compared to legacy when
the number of tasks is 24.
Fig. 6. Energy consumption for varying number of tasks when average ρ = 50%
Fig. 7. Energy consumption for varying number of tasks when average ρ = 75%
Figure 6 shows the result when the amount of tasks to be run is medium
(i.e., average CPU Utilization is 50%). Because more tasks can be handled at
the same time than the case of Fig. 5, energy consumption in both legacy and
Power-Efficient big.LITTLE core Assignment Scheme 83
References
1. Bui, D.H., Liu, Y., Kim, H., Shin, I., Zhao, F.: Rethinking energy-performance
trade-off in mobile web page loading. In: Proceedings of the 21st Annual Interna-
tional Conference on Mobile Computing and Networking, pp. 14–26 (2015)
2. Chow, Y.W., Susilo, W., Phillips, J.G., Baek, J., Vlahu-Gjorgievska, E.: Video
games and virtual reality as persuasive technologies for health care: an overview.
JoWUA 8(3), 18–35 (2017)
3. Dick, R.P., Rhodes, D.L., Wolf, W.: TGFF: task graphs for free. In: Proceedings of
the 6th International Workshop on Hardware/Software Codesign, CODES/CASHE
1998, pp. 97–101. IEEE (1998)
4. Dongarra, J.J., Luszczek, P., Petitet, A.: The LINPACK benchmark: past, present
and future. Concurr. Comput. Pract. Exp. 15(9), 803–820 (2003)
5. Fiorino, D., Collotta, M., Ferrero, R.: Usability evaluation of touch gestures for
mobile augmented reality applications. J. Wirel. Mob. Netw. Ubiqui. Comput.
Dependable Appl. (JoWUA) 10(2), 22–36 (2019)
6. Geng, Y., Yang, Y., Cao, G.: Energy-efficient computation offloading for multicore-
based mobile devices. In: IEEE INFOCOM 2018-IEEE Conference on Computer
Communications, pp. 46–54. IEEE (2018)
7. Ghasemi, H.R., Karpuzcu, U.R., Kim, N.S.: Comparison of single-ISA heteroge-
neous versus wide dynamic range processors for mobile applications. In: 2015 33rd
IEEE International Conference on Computer Design (ICCD), pp. 304–310. IEEE
(2015)
8. Greenhalgh, P.: big.LITTLE technology: The future of mobile. ARM Limited,
White Paper, p. 12 (2013)
9. Hsu, C.W., Chang, C.C., Lin, C.J., et al.: A practical guide to support vector
classification (2003)
10. Kim, D.H., Ko, Y.B., Lim, S.H.: Energy-efficient real-time multi-core assignment
scheme for asymmetric multi-core mobile devices. IEEE Access 8(1), 117324–
117334 (2020)
11. Kotenko, I.V., Saenko, I., Branitskiy, A.: Applying big data processing and machine
learning methods for mobile internet of things security monitoring. J. Internet Serv.
Inf. Secur. 8(3), 54–63 (2018)
12. Merlo, A., Migliardi, M., Caviglione, L.: A survey on energy-aware security mech-
anisms. Pervasive Mob. Comput. 24, 77–90 (2015)
13. Monsoon Solutions Inc.: High voltage power monitor (March 2019). https://www.
msoon.com
14. Padoin, E.L., Pilla, L.L., Castro, M., Boito, F.Z., Navaux, P.O.A., Méhaut, J.F.:
Performance/energy trade-off in scientific computing: the case of arm big.LITTLE
and Intel Sandy Bridge. IET Comput. Digit. Tech. 9(1), 27–35 (2014)
15. Paradiso, J.A., Starner, T.: Energy scavenging for mobile and wireless electronics.
IEEE Pervasive Comput. 4(1), 18–27 (2005)
16. Park, J., et al.: Mobile phone, US Patent App. 29/577,834, 11 April 2017
17. Seo, W., Im, D., Choi, J., Huh, J.: Big or little: a study of mobile interactive
applications on an asymmetric multi-core platform. In: 2015 IEEE International
Symposium on Workload Characterization, pp. 1–11. IEEE (2015)
18. Zhu, Y., Reddi, V.J.: High-performance and energy-efficient mobile web brows-
ing on big/little systems. In: 2013 IEEE 19th International Symposium on High
Performance Computer Architecture (HPCA), pp. 13–24. IEEE (2013)
A Hidden File Extraction Scheme
Defeating Malware Using Android
Dynamic Loading
1 Introduction
When comparing the market share of the portable device OS in 2018 based on
data provided by Statista, Android accounts for more than 85% of the market
This work was supported by Institute of Information & communications Technology
Planning & Evaluation (IITP) grant funded by the Korea government (MSIT) (No.
2019-0-00477, Development of android security framework technology using virtualized
trusted execution environment) and this work was supported by Institute of Informa-
tion & communications Technology Planning & Evaluation (IITP) grant funded by
the Korea government (MSIT) (No. 2020-0-00952, Development of 5G Edge Security
Technology for Ensuring 5G+ Service Stability and Availability).
c Springer Nature Singapore Pte Ltd. 2020
I. You et al. (Eds.): MobiSec 2019, CCIS 1121, pp. 85–98, 2020.
https://doi.org/10.1007/978-981-15-9609-4_7
86 H. Yoon et al.
2 Background
2.3 Xposed
Xposed [19] is an Android application hooking tool that enables dynamic code
modification while running. For example, you can hook a result of API call inside
value. In case of getting phone number from calling getline1number method,
originally the result value is your phone number. However, it can be empty
using Xposed. Not only modifying return value, But can see the parameters or
making exception while each app running.
In addition, for hooking the sdk information using Xposed, all the parameters
and return must be same as target API signature as shown in Fig. 3. Or they
might cause exception while hooking, however due to many SDK versions, it is
quite difficult to match those APIs for every versions. So we manually investi-
gated for every version of targets and separate the API according to each version,
in order to match for every cases.
Figure 2 shows the difference of booting process. When Android OS system
booting, zygote process is created in the init process. Zygote [11] is a key element
of the Android system and contains core libraries. And using app process required
class can be load in zygote. Also all applications are forked by zygote, so the
applications have core libraries which zygote contains. Same with this step, the
Xposed extends app process to add a jar file which named as XposedBridge to
the class path, which invokes the method at a specific point during execution to
enable modification of the application behavior.
88 H. Yoon et al.
3 Related Works
Figure 4 represents the file structure of the Android Package Kit (APK). APK
can be extracted easily through the Android Debug Bridge (ADB) [6]. In addi-
tion, APK has following the Zip format, which makes it easy to decompress
with apktool [20]. And after extraction using the apktool, there are classes.dex,
resource, libraries, assets, META-INF.
Hidden File Extraction Scheme 89
APK Structure. Classes.dex is a file that aggregates all class files and converts
them into byte codes for Android Dalvik virtual machines to recognize. Res is a
folder in which all non-compiled resources exist. Resources include image files,
xml files, and so on. Lib is the folder where the library is collected. This folder
contains so-files compiled for each process created with Native Development Kit
(NDK) [9]. Assets is a folder that contains information about applications that
can be managed by Assets Manager. META-INF is a folder related to signatures.
Inside of MANIFEST.MF, there are CERT files. These files store signed values
using SHA1 and base64 [14]. Also, signature files can be decoded using the key-
tool. Resources.arsc is a file that records information about resource files. The
type and id information of various resource files of resfolder is stored. Android-
Menifest.xml [8] is a xml file for managing applications. The file specifies the
application’s permission settings, Android component information (e.g., Service,
Int, Activity, Receiver, Provider), and Android version. Table 1 shows the overall
structure of APK.
Among those of files, the classes.dex is actually executed file in Android
system. It contains compiled source code inside, and we can decompile this file
using dex2jar [18] and Jd-Gui [1]. With this static analysis tool, It is possible to
get readable source code of APK. Attackers use these methods to extract code
and then put malicious code inside to attack. Apktool also has the ability to
repackage modulated code easily again. Once repackaged APK file is distributed
via the Third-party, then it will be the malware.
Name Description
classes.dex Files converted class files into byte codes for recognition
within the Android Dalvik virtual machine
res A directory aggregates non-compile images and xml
resources
lib Directory contains library files, which are compiled with
NDK
Meta-INF A directory related to signature. It contains
MANIFEST.MF, CERT.SF, and store signature encrypted
with SHA1 and base64
resources.arsc File that record information about resource files. Store
types and ids of resource files located in res directory
assets A directory aggregates application’s information that can
be managed by AssetsManager
AndroidManifest.xml An xml file for managing applications, specifying the
application’s permissions, component information such as
content, services, and activity, and information about the
SDK version
Those files can be installed when APK downloading time or comes from remote
locations while runtime. Also, they can use reflection to execute sub loadable
files. However, intelligent malwares dynamically loads the files and then delete
it to avoid being analyzed. So in this paper, we propose extraction algorithms
to solve the problems of dynamic loading behavior which contains prevention of
delete files case.
Originally, DEX dynamic loading technique is used to cover up DEX file’s lim-
itation. In one DEX file, it cannot contain method over 65536 [28]. It means
when we develop a application, we cannot use the number of method more than
that. So Android allow developers to use multiple DEX files in on application.
And it can be loaded dynamically in run-time. However, malicious applications
using dynamic loading techniques for hiding source code with same as normal
application.
Class.forName is the most important method for Java reflections. The method
is used to extract the DEX with a dynamic loading technique and then place the
class in the Class object. This feature allows you to detect which class the applica-
tion actually runs. Through the class extracted from the Class.forName method,
you can find out the class that actually was loaded, and hook the getDeclared-
Methods method to get a list of the methods that were called directly by dynamic
Hidden File Extraction Scheme 91
loading. This allows you to identify the method names in the class using the Java
reflection technique, which can not be confirmed by static analysis, and extract
information about the constructor and field.
Table 2 shows the method for dynamic loading. DEX Path is a parameter used
for loadable DEX file path. Optimized Directory is location of created an ODEX
file [25]. The Optimized Dalvik Enable (ODEX) is an executable optimized DEX
for each system that runs. It generated when application is built. Library Search
Path is a parameter used to set the library which related to loaded DEX. Parent
is parent classloader.
In previous Sect. 2, the Xposed tool can hook Android API method in runtime.
With this tool, you can easily hook classloader’s class or method. If you hook
the classloader then we can check the path of loadable DEX file and get it with
dynamic analysis. Using Xposed in device give us a lot of benefits. But, there
is prelimitation to use the Tool. Each android app is separated by sendbox-
ing technique, cannot access or execute the other app’s private data, storage
and components. So, the Xposed require root privilege to hooking application
method. And another Key point of Xposed hooking is developers should have to
use exact method name and parameter types for hooking API.
Magisk [24] is a tool developed by topjhonwu and is used for Android device
rooting. Unlike conventional rooting, it is possible to provide root access without
changing or replacing the image of the existing system. It can also be linked
to external programs to provide various functions together. The main point of
the Magisk is mirroring original system. First, mirroring system directories to
specific directories and change root mount points. Then, reboot android device.
After that, automatically changed the root directory to the new mount point
and create the /system, /data, and /cache directories as subdirectories based
on the mirrored directory. The directory is mirrored to the existing system,
where changes and manipulations are carried out and applied together. The
biggest advantage of using Magisk is that it can bypass the SafetyNet provided
by Google [5]. Google’s SafetyNet is a fairly powerful environmental detection
API that collects information about the environment in which the app runs
and authenticates itself. This allows the integrity of the system to be verified,
and all the rooting and emulator detection [7] are possible. Therefore, using the
attest function among the SafetyNet APIs, you can accurately detect the device
environment and obtain confirmation from Google for the integrity of the device.
In addition, in cases other than the previously used stock boot image, Android
Open Source Project (AOSP) [3] build and use cannot pass through SafetyNet.
Among the existing studies, dynamically loaded files were being extracted
in various ways. In particular, the approach of building a new OS by changing
AOSP [27] or using various tools for memory analysis [29] has become more likely
to not work correctly if the app is using SafetyNet, and in future papers, it may
be necessary to consider how to analyze apps using SafetyNet. Therefore, using
the Magisk created to bypass SafetyNet can proceed with the correct detection
92 H. Yoon et al.
when using other supported tools. Xposed can also bypass SatetyNet and hook
APIs by using Edxposed, an open source that is changed for use by Magisk.
Method Parameter
DexClassLoader (dexPath, optimizedDirectory, librarySerchPath, parent)
BaseDexClassLoader (dexPath, optimizedDirectory, librarySerchPath, parent)
PathClassLoader (dexPath, librarySerchPath, parent)
OpenDEXFile (sourceName, outputName, flag)
On the other hand, the SafetyNet API is also a kind of API. You can change
the failed result to Success by hooking the result value of API used for Test.
Simple implementation is possible using existing Hooking tools. However, Google
also has an algorithm to verify the results received from SafetyNet using backend
server to ensure that the values are not forged. If the app is implemented to
validate and operate the result values of the attest API on the designated server,
the Magisk is the only way to bypass SafetyNet as a result of the investigation
so far. Therefore, the Magisk tool was installed at the actual terminal to hook
up the dynamic loading API, and Edxposed [2] was installed to configure the
environment.
5 Evaluation
In this section, the performance of the implemented algorithms is evaluated in
several ways. The devices used in the evaluation process were analyzed through
Android Nexus 5 (Android version 5.1). AMAaaS-supplied application was used
to collect the apps that would be tested first. AMAaaS [21] is a web-based
Android analysis platform that provides basic static analysis information and
providing APIs that run and analyze apps using Android container environments
as a result of dynamic analysis. API information and sequence executed can be
checked using this method.
Application that was provided by AMAaaS is an application set that was
collected for one year from January 2018 to January 2019. Users uploaded the
app to analyze the app and check the malicious code. The total number of apps
collected is 1,323. The application was classified as Benign and Malware for
later analysis, and uploaded to Virustotal [16] for verification. And the app was
executed for 3 min and the results were analyzed using logs generated in the
process. Monkey tool was applied to collect as many logs as possible, and the
analysis results are as follows.
Subsequently, the collected apps were actually activated and dynamic files
could be extracted. The analysis found that approximately 80% of apps were
able to perform static analysis but could actually be powered up and subject
to extraction. Among the apps collected, many apps were unable to run due to
contamination or tampering with the DEX file if the AndroidManifest.xml
Hidden File Extraction Scheme 95
file did not exist. In addition, we identified apps that do not run because the
value of the Minimum SDK set in the app is higher than the actual device.
With the exception of these, 259 applications were used for actual testing.
We used 259 selected apps to see if dynamic loading actually takes place and
then summarize the statistical results on how many actual deletion of loaded
files takes place. According to the Table 4 approximately 10% of apps or less
were performing commands to delete dynamically loaded files. If you check the
results, you can see that about 1% app actually deletes it to protect the source
code or to hide malicious behavior based on the entire app that is not a very
high number.
To check the distribution of apps that were last deleted, we divided the
Benign app and the Malicious app into tables. Table 5 shows that among apps
classified as real benign, dynamic loading is performed and the results are not
deleted. It was finally possible to confirm that all 24 apps that were deleted were
only done in applications that were separated by malicious.
6 Limitation
The original goal of the this paper was to identify malicious behavior using
dynamic loading techniques among apps classified as benign. Benign apps ana-
lyzed using the proposed method are using dynamic loading techniques but have
not been deleted. The previous analysis confirmed that the apps that proceed
with deletion were malicious applications with high probability. On the other
hand, the extracted files were verified using the virus total using the extracted
96 H. Yoon et al.
results for files loaded by the benign app, and the malicious behavior was not
found.
The first problem is if the code are not executed which call dynamic load then
it cannot extract the loaded file. Monkey tools used to increase code coverage
cannot currently bring higher code cover compared to other tools such as UI-
automation [10] and DroidBot [12]. However, the data set what we use could be
extracted and stored because dynamic loading techniques were used immediately
when apps were executed.
Second problem is that if the application has not yet been found, but the
code to find the Magisk app and stop the operation is inserted, the extraction is
not possible for the app. Magisk app basically offers a technique called magisk-
hide and root-hide. But if you look at the source code of github, you can see
which files exist in which path. This information is fully detectable, especially
su-file and services are installed and used inside the data directory.
7 Conclusion
In this paper, for applications using dynamic loading techniques, the DEX file
extraction method is designed and implemented using Magisk and Xposed. Pre-
viously, it is impossible to analyze if changing Android OS or extract dynamic
files using emulator when using SafetyNet. Therefore, direction was provided to
solve this problem, and the application of deleting loaded DEX files was also
implemented to limit deletion behavior and extract target files. Subsequently, it
was finally confirmed that most of the apps that perform the acts were imple-
mented in applications that include malicious behavior.
On the other hand, the app did not solve the shortcomings of dynamic anal-
ysis that must be executed to extract the application’s dynamic loading file, and
there are disadvantages that cannot be analyzed if the app implements code
that detects the Magisk app itself and determines its operation. Nevertheless, if
the code was executed, the entire loaded file could be extracted and the source
code obtained without any problems. It is also expected that the detection and
extraction of the actual device will enable the execution and analysis of as many
applications as possible, thus contributing to detecting malicious behavior that
could not be analyzed in static analysis.
References
1. Dupuy, E.: JD-GUI (2019). https://github.com/java-decompiler/jd-gui. Accessed
May 2019
2. ElderDrivers: EdXposed (2019). https://github.com/ElderDrivers/EdXposed.
Accessed May 2019
3. Google: Android open source project (2004–2019). https://source.android.com/n.
Accessed May 2019
4. Google: Monkey (2016–2019). https://developer.android.com/studio/test/
monkey. Accessed May 2019
Hidden File Extraction Scheme 97
28. Yang, W., et al.: AppSpear: bytecode decrypting and DEX reassembling for packed
Android malware. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS,
vol. 9404, pp. 359–381. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-
26362-5 17
29. Zhang, Y., Luo, X., Yin, H.: DexHunter: toward extracting hidden code from
packed Android applications. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.)
ESORICS 2015. LNCS, vol. 9327, pp. 293–311. Springer, Cham (2015). https://
doi.org/10.1007/978-3-319-24177-7 15
Reduction of Data Leakage Using
Software Streaming
2
Hankuk University of Foreign Studies, Yongin, South Korea
lim.seungho@gmail.com
1 Introduction
Mobile devices used for various purposes have increased with the development of
IoT technology. The military industry is one of the leading areas that has been
affected by the development of IoT technology. Many advanced military equip-
ment, including reconnaissance drones and information gathering equipment,
This work was supported by the National Research Foundation of Korea (NRF) (NRF-
2020R1A2C4002737) and the Institute for Information and Communications Technol-
ogy Promotion (IITP) grant funded by the Korea government (MSIT) (No. 2018-0-
00420).
c Springer Nature Singapore Pte Ltd. 2020
I. You et al. (Eds.): MobiSec 2019, CCIS 1121, pp. 99–111, 2020.
https://doi.org/10.1007/978-981-15-9609-4_8
100 S.-K. Kim et al.
use computing systems. However, these military devices may contain confiden-
tial data, and the leakage of such data can cause significant losses. For example,
in 2008, Iraqi militants bought a hacking program from a Russian hacking site
and hacked the US recon drone RQ-170 modeled predator [1]. They hacked and
leaked video footage that showed the predator shooting. In December 2011, a
UAV stealth RQ-170, co-produced by US Lockheed Martin (USA) and Israel,
was captured by Iran’s GPS-managed attacks while scouting Iranian territory
[2]. The Iranian government reverse-engineered the captured drones, and after
two years they replicated and tested a similar drone. The above examples show
that defensive techniques are required to minimize the risk of information leak-
age, when operating a device that can store sensitive data. Therefore, there is a
need for secure disposable computing, which can guarantee complete erasure of
data from state-of-the-art devices where data leaks can lead to significant losses.
In this study, we propose a secure system framework that prevents data leaks
through the concept of Disposable Computing to protect sensitive data in mili-
tary mobile devices. In order to effectively and safely apply disposable comput-
ing to devices that require real-time computing, such as military equipment, it is
necessary to minimize non-volatile and volatile memory, which contain sensitive
information. We utilized software streaming technology, which is a method to
use software in real-time by sending segmented software over a network. Figure 1
shows an overview of the software streaming technology to prevent exposure of
sensitive information on embedded devices by minimizing the non-volatile and
volatile memory.
Fig. 1. Overview of software streaming that can prevent the leaking or disclosure of
sensitive information in a device
Reduction of Data Leakage Using Software Streaming 101
2 Related Work
Researchers have developed various methods to prevent the leakage of sensitive
data from desktop and mobile environments, include anti-analysis techniques
and encryption methods. Analysis prevention techniques include obfuscation [3],
102 S.-K. Kim et al.
instruction virtualization [4,5], anti-debugging [6,7], and binary code packing [8].
All these features make software difficult to analyze, but it can be analyzed by a
skilled analysts [9,10]. The file system encryption method [11] is a representative
example of the encryption method, a method of protecting important data by
encrypting the file system itself in which data is stored. However, decryption
results in a system overhead making it challenging for it to be used in real-
time embedded devices. In this study, we overcame this challenge by utilizing
software streaming technology which partially receives and executes software in
the network.
Kuacharoen et al. used Block Streaming for software Streaming [12]. Their
work uses binary rewriting technology to ensure that the transmitted software
could be executed continuously. The method inserts a code that requests the
server for the next code to be executed as it not present in the memory of the
partitioned block following partitioning by executable file in the server. If the
system executes all the code within the block or enters the off-the-block position
by the jmp/ret command, the code for that part is transmitted on the network.
We also investigate the PoC of real-time code execution by applying software
streaming to embedded devices. However, its primary limitation is that it causes
high execution time overhead that results in continuous application suspension
until the code is sent remotely when it is not located in memory. This approach
is therefore difficult to apply in embedded system environments that require
real-time response, such as real-time systems.
Kuacharoen et al. developed a previous study to devise a way to increase effi-
ciency by sending blocks from single block unit transmission to function units
[13]. They increased the transmission efficiency by repositioning functions within
the blocks so that associated functions could be in a single block, and by remov-
ing unused blocks from memory, they were more efficient than reported in previ-
ous studies on memory management. However, in our study, bottlenecks occurred
depending on the complexity of the function call and resulted in the suspension
of applications.
Reduction of Data Leakage Using Software Streaming 103
3 System Architecture
Most execution delays in streaming software execution are caused by applica-
tion suspension, which results in a waiting period while receiving code to be
executed remotely [12]. In systems that require immediate response, such as real-
time embedded systems, this waiting period/suspension can have a devastating
effect on the stability of the entire system. Therefore, to minimize application
suspension, research on background streaming, software profile [12], block relo-
cation [13], and pre-fetched map [14] have been conducted. In general, in these
studies code was divided into functions and classes. However, the partitioning
method takes a long time when receiving and executing a complex function, and
a network delay occurs that delays the reception of a function to be executed
next, resulting in application suspension. Figure 3 shows the bottleneck that can
occur when the function call complexity is high in an existing software streaming
method. If the function F unc() is executed, the actual software execution is exe-
cuted sequentially by the Sub1(), Sub2(), and Sub3() functions inside the F unc()
function according to the function call relationship. However, when streaming
it uses a single network channel, F unc() does not end until Sub3() is received
and execution is completed; hence, a delay occurs in the execution of the next
function.
It can be expressed by the following formula. The size of the nth sending
block (sizen ) can be expressed as a code before the call-routine (an ), a call
routine code (bn ), and a code to be executed after the function call returns (cn ).
104 S.-K. Kim et al.
The cost of executing the nth block in the nested call routine is the accumulated
value of the n − 1th block size from the beginning of the block plus the size of
the code from the beginning of the nth block to the call-routine.
n−1
costn = sizek + an + bn
k=1
When using only one channel for software streaming, as shown in Fig. 4, when
a large size function is received from the server, there is a network delay and it
does not receive the next function to be executed until the current function is
completed. For systems that require real-time response, such as real-time sys-
tems used in the military, execution delays can be fatal in that they can cause
an overall system failure. One of our objectives was to minimize execution delay.
As shown in Fig. 4, we propose a multi-channel configuration consisting of main
Main Logic Streaming Channel. The server separates the software requested
from the client into functions and sends them in blocks. A network channel
between the server and the client is used when sending a block and this referred
to as the Main Channel. In case of a delay, a standby on the Main Channel, it
transmits it using another channel (Sub Channel).
Fig. 5. The process of finding the f unction N requested by the client using symbolic
execution
Reservation stations
Function Busy Size Fall-Back Stage
B Yes N-kb D 2
D No M-kb G (Request) 3
G or F - - - -
When divided software is transmitted to the client through the network channel
according to the client’s request, multi-channel can be used instead of the single
channel to reduce network overhead and delay. In this case, efficient scheduling is
applied to the network channel to facilitate interactions between the main chan-
nel and the sub-channel, thereby enabling real-time software streaming between
the server and client. Our network scheduling scheme for software streaming was
based on the round-robin process scheduling scheme. The round-robin scheduling
method executes all processes running at regular time intervals regardless of the
termination of the process. However, its disadvantage is that context exchange
occur frequently and overhead also occur frequently if the time interval is short.
This because the Round Robin method uses a single queue. We proposed a multi-
channel implementation for real-time software streaming between a server and
4 Implementation
In this paper, we propose a multi-channel scheme to minimize application sus-
pension that can occur in software streaming. As mentioned above, existing
works that transmit software in a streaming manner generally perform software
streaming in units of functions and classes. In this case, application suspension
increases when a software block containing a function with a high call depth is
transmitted. In order to minimize this application suspension, we present a proof
of concept of network scheduling for effective software streaming in the manner
specified in Algorithm 1.
When a client requests software blocks, the server transmits the requested
block through a main channel that uses a relatively high network bandwidth at
a set time interval. When the transmission time specified in the main channel
expires, the server transmits the software block through a sub channel that uses
a relatively low network bandwidth. If there is a new block request from the
Reduction of Data Leakage Using Software Streaming 109
client, the block is assigned to the main channel. This is because the scheme
we propose gives the highest possible transmission priority for the latest request
from the client. If there is no new request from the client, the server transmits the
block allocated to the sub channel for transmission through the main channel.
5 Future Works
Type Self-destruction
Electronic Power supply interruption (Switch Off)
destruction
Method and apparatus for fast self-destruction of a
CMOS integrated circuit [16]
Device Directed fragmentation for unmanned airborne
fragmentation vehicles [17]
Integrating chemical From chips to dust: The MEMS shatter secure chip
substances [18]
Simulation research on a novel micro-fluidic
self-destruct device for microchips [19]
6 Conclusion
The military is one of the areas that has been impacted by technological develop-
ment of IoT’s. Military-purpose reconnaissance drones or intelligence-gathering
devices mostly operate using built-in computing systems to conduct their mis-
sions. However, there have been various cases in which the sensitive data built
110 S.-K. Kim et al.
into these devices has been leaked and used. Therefore, we proposed a frame-
work that can be applied even for the real-time systems, that which requires
real-time execution among IoT devices, in order to prevent the leaking or loss
of sensitive data through the use of on-demand computing technology. However,
due to the high network overhead of the existing software, real-time execution
techniques were appropriate for systems that were less impacted by the delay
in running the software and there are challenges in applying them to systems
that need to be ensured in real-time. We proposed efficient software streaming
in multi-channel using three methods, i.e., symbolic execution, Tomasulo algo-
rithm, and Round Robin. We created a call tree table for a function that was
streamed by symbolic execution. Reservation stations and register renaming in
Tomasulo algorithm, were used to refer to the Call Tree, and the function blocks
were efficiently sent to the client through the Main Channel. The method used a
scheduling technique that transferred a function block to a network channel and
moved it from the main channel to the sub-channel over time by Round Robin.
In our future work, we intend to introduce the concept of Disposable Computing
for self-destruction capability.
References
1. Iraq-RQ-170 Homepage. https://www.wired.com/2011/12/iran-drone-hack-gps/.
Accessed 22 Jan 2020
2. Iran-RQ-170 Homepage. https://www.csmonitor.com/World/Middle-East/2011/
1215/Exclusive-Iran-hijacked-US-drone-says-Iranian-engineer. Accessed 22 Jan
2020
3. Banescu, S., Collberg, C., Ganesh, V., Newsham, Z., Pretschner, A.: Code obfus-
cation against symbolic execution attacks. In: Proceedings of the 32nd Annual
Conference on Computer Security Applications, pp. 189–200 (2016)
4. Fang, H., Wu, Y., Wang, S., Huang, Y.: Multi-stage binary code obfuscation using
improved virtual machine. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS,
vol. 7001, pp. 168–181. Springer, Heidelberg (2011). https://doi.org/10.1007/978-
3-642-24861-0 12
5. Xue, C., et al.: Exploiting code diversity to enhance code virtualization protection.
In: 2018 IEEE 24th International Conference on Parallel and Distributed Systems
(ICPADS), pp. 620–627. IEEE (2018)
6. VMProtect Homepage. https://vmpsoft.com/. Accessed 22 Jan 2020
7. Themida Homepage. https://www.oreans.com/themida.php. Accessed 22 Jan 2020
8. Kim, M.-J., et al.: Design and performance evaluation of binary code packing
for protecting embedded software against reverse engineering. In: 2010 13th IEEE
International Symposium on Object/Component/Service-Oriented Real-Time Dis-
tributed Computing, pp. 80–86. IEEE (2010)
9. Suk, J.H., Lee, J.Y., Jin, H., Kim, I.S., Lee, D.H.: UnThemida: commercial obfusca-
tion technique analysis with a fully obfuscated program. Softw. Pract. Exp. 48(12),
2331–2349 (2018)
10. Yadegari, B., Johannesmeyer, B., Whitely, B., Debray, S.: A generic approach to
automatic deobfuscation of executable code. In: 2015 IEEE Symposium on Security
and Privacy, pp. 674–691. IEEE (2015)
Reduction of Data Leakage Using Software Streaming 111
11. Hasan, S., Awais, M., Shah, M.A.: Full disk encryption: a comparison on data
management attributes. In: Proceedings of the 2nd International Conference on
Information System and Data Mining, pp. 39–43 (2018)
12. Kuacharoen, P., Mooney, V.J., Madisetti, V.K.: Software streaming via block
streaming. In: Jerraya, A.A., Yoo, S., Verkest, D., Wehn, N. (eds.) Embedded
Software for SoC, pp. 435–448. Springer, Boston (2003). https://doi.org/10.1007/
0-306-48709-8 32
13. Kuacharoen, P., Mooney III, V.J., Madisetti, V.K.: Efficient execution of large
applications on portable and wireless clients. In: Proceedings of the Mobility Con-
ference & Exhibition (2004)
14. Choi, J., Kim, J., Jang, B.: A software wireless streaming architecture supporting
telematics device. In: 2007 Digest of Technical Papers International Conference on
Consumer Electronics, pp. 1–2. IEEE (2007)
15. Tomasulo, R.M.: An efficient algorithm for exploiting multiple arithmetic units.
IBM J. Res. Develop. 11(1), 25–33 (1967)
16. Shield, D.J., Davis, D.L.: Method and apparatus for fast self-destruction of a
CMOS integrated circuit. U.S. Patent 5,736,777, issued 7 April 1998
17. Mishra, P.K., Goyal, D.: Directed fragmentation for unmanned airborne vehicles.
U.S. Patent 9,828,097, issued 28 November 2017
18. Banerjee, N., Xie, Y., Rahman, M.M., Kim, H., Mastrangelo, C.H.: From chips to
dust: the MEMS shatter secure chip. In: 2014 IEEE 27th International Conference
on Micro Electro Mechanical Systems (MEMS), pp. 1123–1126. IEEE (2014)
19. Gu, X., Lou, W., Song, R., Zhao, Y., Zhang, L.: Simulation research on a novel
micro-fluidic self-destruct device for microchips. In: 2010 IEEE 5th International
Conference on Nano/Micro Engineered and Molecular Systems, pp. 375–378. IEEE
(2010)
20. Kim, S., Youn, T.-Y., Choi, D., Park, K.-W.: UAV-undertaker: securely verifiable
remote erasure scheme with a countdown-concept for UAV via randomized data
synchronization. Wirel. Commun. Mob. Comput. 2019, 1–11 (2019)
Digital Watermarking for Enriched Video
Streams in Edge Computing
Architectures Using Chaotic Mixtures
and Physical Unclonable Functions
1 Introduction
Augmented reality is one of the most promising technologies nowadays [4].
Although most popular applications involve users immersed in enriched envi-
ronments, relating with devices through smart phones and other similar devices;
c Springer Nature Singapore Pte Ltd. 2020
I. You et al. (Eds.): MobiSec 2019, CCIS 1121, pp. 112–125, 2020.
https://doi.org/10.1007/978-981-15-9609-4_9
Digital Watermarking for Enriched Video Streams 113
other solutions may be created using this new approach. In particular, surveil-
lance systems composed of video infrastructures can be improved by integrat-
ing additional information into video streams [1]. These advanced mechanisms
produce enriched video streams where visible information is augmented with
addition data such as temperature, positioning, etc. [6].
These advanced applications, any case, must meet two essential requirements.
First, enriched video streams must be generated, sent and consumed at real-time.
That is especially relevant where critical infrastructures (such as borders) are
protected by these solutions. And, second, in order to guarantee the availability
and reliability of the hardware infrastructure and the surveillance service, the
hardware platform and software components must be able to dynamically adapt
to the environmental conditions and the devices’ and software modules’ lifecycle.
These requirements are, currently, fulfilled by most video solutions, such as
cameras, real-time video processing algorithms, etc. including those developed
for systems with sparse resources. However, security mechanisms are still com-
plicated to integrate in that kind of technologies. As a consequence, most video
systems are still manually configured, so although they can dynamically adapt
to the environmental conditions [7], they cannot remove or add elements in the
infrastructure in a fast, secure and automatic manner. In fact, authentication
mechanisms are still far to be lightweight, dynamic or real-time.
On the one hand, most typical authentication mechanisms are too slow. To
avoid the use of onerous certificates Identity-Based Signatures (IBS) [16] appear
as a way to permit secure bootstrap in a local spaces. However, secure sessions
require complex initiation procedures and digital signatures are designed to work
with information blocks, not with video streams [23]. Streams could be split
into different packets, but this process would be very computationally heavy.
Besides, mathematical operations required by these mechanisms are very costly,
and resource constrained devices may not be able to support those operation.
As a possible solution, camera and other similar devices may send their outputs
(video and augmented data) to a central aggregation point or gateway, powerful
enough to perform those authentication operations at real-time. However, these
elements tend to act as bottlenecks and prevent the system to adapt dynamically
to the environment, as they are essential elements whose failure causes the entire
system fails.
On the other hand, all authentication mechanisms require the device to store
a private key (symmetric or asymmetric) or other information used as key, such
as the MAC address [19]. These approaches are very unsecure as the key is
accessible for everybody with physical access to the devices [5]. That is especially
problematic if devices are geographically sparse and unattended.
Therefore, in this paper we investigate a new authentication method based
on digital watermarking. Devices will include a watermark in enriched video
streams, proving their identity. In order to generate a secure watermark, chaotic
mixtures are employed. The key feeding these mechanisms is also generated using
Physical Unclonable Functions, so the resulting key is totally secure as it would
get destroyed if anyone attempt to access to it.
114 B. Bordel and R. Alcarria
The rest of the paper is organized as follows: Sect. 2 describes the state of
the art on authentication solution for video infrastructures; Sect. 3 contains the
main contribution; Sect. 4 presents a first experimental validation based on the
proposed simulation scenario; and Sect. 5 concludes the paper.
– Private watermarking: In this case, using the original object, the key, the
watermarked and the marked object, it is determined if the marked object
was marked by an honest sender.
– Half-private watermarking: In these algorithms, the objective and approach
is similar to private watermarking; however, in this case, the original object is
Digital Watermarking for Enriched Video Streams 117
If this condition is met, then, the value of the central pixel is modified according
to the insertion function (5). In this expression, W represents the watermark
and i and j are spatial indexes which are scrolled from left to right and from top
to bottom.
10
pnew
center = pcenter + W (i, j) · |E[B] − pcenter | (5)
9
After watermark insertion, the four independent color channels are aggregated
another time, and enriched video stream reconstructed.
The watermark W is a binary image, where pixels can take two values: 1 or
−1 (instead of zero). Moreover, the matrix A(k) represents a chaotic function.
Digital Watermarking for Enriched Video Streams 119
Typically, this matrix represents the logistic map or other similar and well-
known functions. In this case, however, in order to increase entropy as much
as possible, we are selecting more complex chaotic dynamics. In particular, we
are employing the linearized Lorenz system [21] (7–8). As the Lorenz system is
a three-dimensional system, marks are only bidimensional, we must extend the
matrix T r to be three-dimensional (9). Besides, in order to guarantee the image
keeps its dimensions, operations are defined on cycle groups (9).
ẋ = σ(y − x)
ẏ = ρx − y − xz (7)
ż = xy − βz
server in the cloud layer. Although the performance of the proposed solution
in a real environment may be different from the performance in a simulated
scenario, the described simulation is enough close to a real deployment to be
an acceptable first experimental validation. In particular, the most important
and characteristic aspects of video streams and devices are represented in the
proposed simulation.
Each simulation represented thirty hours of operation in the system.
The experimental validation was focused on evaluating the percentage of
successful authentications and the overhead the proposed authentication scheme
introduces. The first experiment was repeated for different level of coefficients in
the DWT and number of iterations in the chaotic mixture. Figure 5 shows the
obtained results in the first experiment. The second experiment was repeated
for different types of video streams, with various entropy levels, and different
numbers of iterations in the chaotic mixture. Figure 6 shows the obtained results
in the second experiment
As can be seen in Fig. 5, successful probability is always above 75%. Errors
in authentication are more common in low and high values for the number of
iterations; and when level one coefficients in the DWT are considered. In that
way, if a low number of iterations is going to be considered, level three coefficients
should be considered. On the contrary, if medium or large values for the number
of iterations are going to be considered, then level two coefficients are preferable.
References
1. Alcarria, R., Bordel, B., Manso, M.Á., Iturrioz, T., Pérez, M.: Analyzing UAV-
based remote sensing and WSN support for data fusion. In: Rocha, Á., Guarda, T.
(eds.) ICITS 2018. AISC, vol. 721, pp. 756–766. Springer, Cham (2018). https://
doi.org/10.1007/978-3-319-73450-7 71
2. Atrey, P.K., Yan, W.Q., Kankanhalli, M.S.: A scalable signature scheme for video
authentication. Multimed. Tools Appl. 34(1), 107–135 (2007). https://doi.org/10.
1007/s11042-006-0074-7
3. Bartolini, F., Tefas, A., Barni, M., Pitas, I.: Image authentication techniques for
surveillance applications. Proc. IEEE 89(10), 1403–1418 (2001). https://doi.org/
10.1109/5.959338
4. Billinghurst, M., Clark, A., Lee, G.: A survey of augmented reality. Found.
Trends R Hum. Comput. Interact. 8(2–3), 73–272 (2015). https://doi.org/10.1561/
1100000049
5. Bordel, B., Alcarria, R.: Physical unclonable functions based on silicon micro-ring
resonators for secure signature delegation in wireless sensor networks. J. Internet
Serv. Inf. Secur. (JISIS) 8(3), 40–53 (2018)
6. Bordel, B., Alcarria, R., Ángel Manso, M., Jara, A.: Building enhanced environ-
mental traceability solutions: from thing-to-thing communications to generalized
cyber-physical systems. J. Internet Serv. Inf. Secur. (JISIS)(JISIS) 7(3), 17–33
(2017)
7. Bordel, B., Alcarria, R., de Rivera, D.S., Martı́n, D., Robles, T.: Fast self-
configuration in service-oriented smart environments for real-time applications.
JAISE 10(2), 143–167 (2018). https://doi.org/10.3233/AIS-180479
8. Chen, S., Leung, H.: Chaotic watermarking for video authentication in surveillance
applications. IEEE Trans. Circuits Syst. Video Technol. 18(5), 704–709 (2008).
https://doi.org/10.1109/TCSVT.2008.918801
9. Chetty, G., Wagner, M.: Liveness verification in audio-video speaker authentica-
tion. In: Cassidy, S., Cox, F., Mannwell, R., Palethorpe, S. (eds.) Proceedings of
the 10th Australian Conference on Speech, Science and Technology, pp. 358–363.
Australian Speech Science and Technology Association (ASSTA) (2004)
10. Cross, D., Mobasseri, B.G.: Watermarking for self-authentication of compressed
video. In: Proceedings of International Conference on Image Processing, vol. 2, pp.
II-II, September 2002. https://doi.org/10.1109/ICIP.2002.1040100
11. Dittmann, J., Mukherjee, A., Steinebach, M.: Media-independent watermarking
classification and the need for combining digital video and audio watermarking for
media authentication. In: Proceedings International Conference on Information
Technology: Coding and Computing (Cat. No.PR00540), pp. 62–67, March 2000.
https://doi.org/10.1109/ITCC.2000.844184
12. Dittmann, J., Steinmetz, A., Steinmetz, R.: Content-based digital signature for
motion pictures authentication and content-fragile watermarking. In: Proceedings
IEEE International Conference on Multimedia Computing and Systems, vol. 2, pp.
209–213, June 1999. https://doi.org/10.1109/MMCS.1999.778274
13. Duc, B., Bigün, E.S., Bigün, J., Maı̂tre, G., Fischer, S.: Fusion of audio and video
information for multi modal person authentication. Pattern Recogn. Lett. 18(9),
835–843 (1997). https://doi.org/10.1016/S0167-8655(97)00071-8
14. Fadl, S.M., Han, Q., Li, Q.: Authentication of surveillance videos: detectingframe
duplication based on residual frame. J. Forensic Sci. 63(4), 1099–1109 (2018).
https://doi.org/10.1111/1556-4029.13658
124 B. Bordel and R. Alcarria
30. Vidhya, R., Brindha, M.: A novel dynamic key based chaotic image encryption. J.
Internet Serv. Inf. Secur. 8(1), 46–55 (2018). https://doi.org/10.22667/JISIS.2018.
02.28.046
31. Xu, D., Wang, R., Wang, J.: A novel watermarking scheme for H.264/AVC video
authentication. Image Commun. 26(6), 267–279 (2011). https://doi.org/10.1016/
j.image.2011.04.008
32. Yin, P., Yu, H.H.: A semi-fragile watermarking system for mpeg video authen-
tication. In: 2002 IEEE International Conference on Acoustics, Speech, and Sig-
nal Processing, vol. 4, pp. IV-3461–IV-3464, May 2002. https://doi.org/10.1109/
ICASSP.2002.5745399
Vehicular Network Security
Improved Security Schemes for Efficient
Traffic Management in Vehicular Ad-Hoc
Network
1 Introduction
With rapid urbanization and growing economy, the number of private vehicles
are increasing exponentially. However, the innovation in road infrastructure has
not picked up with such huge raise in the number of vehicles. One of the solu-
tions is to keep the road travellers informed about the traffic in their routes.
The existing GPS based applications help travellers know their rough travel time
and best route with less traffic. However, the safety, updates on current travel
c Springer Nature Singapore Pte Ltd. 2020
I. You et al. (Eds.): MobiSec 2019, CCIS 1121, pp. 129–144, 2020.
https://doi.org/10.1007/978-981-15-9609-4_10
130 M. Sankaranarayanan et al.
conditions of the road are not intimated to the user at real time with these
GPS applications [2]. This problem is addressed using the Vehicular Adhoc Net-
work (VANET) infrastructure which is the most recent, trending development in
Intelligent Transportation Systems (ITS). It is a promising application-oriented
network which aids in managing traffic, distributing traffic related information,
safety warnings and entertainment content to passengers. This infrastructure is
similar to wireless communication technology but in contrast the wireless sensor
networks are dynamic, high in processing capacity, efficiency and storage [1–3].
There is no fully functional system using VANET, only few car manufacturers
like ford, Nissan, Tesla, Mercedes have introduced the ideas and implemented.
The real time implementation of VANET technique is carried out as a part of
research project in countries such as Germany, Japan and Europe. The major
contribution of this paper is establishing a solution that combines traditional
ITS and recent cutting edge technologies for traffic management ensuring avail-
ability and scalability of traffic information. Video Image Processing Systems for
VANET (VIMPROS-V) is the proposed infrastructure to manage the vehicles in
a road segment during no or less availability of high end vehicles that have the
potential to share information. The information that is shared across vehicles
support several applications. This paper highlights and emphasis the significance
of VIMPROS-V. The remainder of the paper is organized as follows: The liter-
ature survey on the existing VANET technology is discussed in Sect. 2.VANET
Infrastructure and its characteristics, application, implementation and security
issues are discussed in Sect. 3. The proposed model for estimating Traffic Conges-
tion (TraCo) using VIMPROS-V and its need are briefed in Sect. 4. Section 4.5
explains the several security aspects fullfilled by VIMPROS-V. The simulation
results are conversed in Sect. 5 followed by conclusion in Sect. 6 and References.
2 Literature Survey
VANET is a subgroup of Mobile Ad-Hoc Network (MANET) with dynamic
infrastructure which provides promising approach to support several Intelligent
Transportation Systems (ITS) applications such as traffic management, route
guidance, safety applications, internet services and many more. VANET is always
looked upon as a system that provides innovative and path breaking applica-
tions. Also, before the real technology is implemented, a series of research are
carried out in this technology to ensure a reliable and robust system [3,5]. Several
researches have been conducted in this area especially in optimal communication
of information through routing protocols. These can be classified based on topol-
ogy, cluster, location, broadcast and geocast. Exclusive surveys and overviews
are analysed for accurate, distance and immediate neighbourhood information
sharing [3,9].
The wireless communication of traffic information by travellers raises signif-
icant security and privacy issues that cannot be neglected. Considering VANET
security, large number of threats can be assumed in confidentiality, integrity,
authentication, identification and availability of information. There are several
Improved Security Schemes for VANET 131
attacks and attacker that affect the performance of the system in each of the
above category. The attacks such as eavesdropping, denial of service, routing
attack, revealing identity, GPS Spoofing, Fabrication, Black hole attack, Mes-
sage tampering etc. are extensively discussed. The attacks on communication
layers such as application, transport and physical layers are extensively dis-
cussed in [4,6–8]. The few solution to such attacks are also proposed using cryp-
tography, Trust Group Framework, ARAN (Authenticated Routing for Ad hoc
network), SEAD (Secure and Efficient Ad hoc Distance Vector), SMT (Secure
Message Transmission), NDM (Non-Disclosure Method), ARIADNE, blockchain
technology [6,7,15,17]. Also, privacy concerns in vehicular communications are
necessary to provide protection for the user data. Extensive literature are avail-
able to address VANET security and privacy as in [1]. Inorder to improve and
provide reliable services, many researchers have identified various different tech-
niques and approaches to maintain the user’s privacy, some include the use of
Group Signature, pseudonyms, identity based, mixed zone based, traceability,
Misbehaviour detection, Revocation etc. [6]. Security and privacy requirements
in VANET should be taken into consideration when designing a robust system
else malicious attacks may ruin the service application of VANET. In this con-
text, before putting VANET into practice, it is important to have an efficient
secure mechanism which provides the required security and privacy services that
overrides attacks in VANET. Several VANET based application require secure
attack free traffic information for operation. The security level of such informa-
tion can be improved by introducing an concurrent or alternate soruce of infor-
mation that have reduced chance of attacks. The most common existing traffic
information source is from traffic videos from surviellance cameras that can be
used either as an alternate or backup source of traffic information when VANET
based source is not available. As the attacks to images of traffic videos are not
common and there are techniques to encrypt images to ensure secure commu-
nication of images to the processing centres [16,18]. There are limited number
of research works that have incorporated this concept. In [11] the author pro-
poses image querying language for object recognition using image processing for
vehicles equipped with camera for emergency application of VANET. Similarly,
in [10] VANET based accident detection using image processing technique to
improve security. Both the works are specific to a particular application and are
not robust in nature. This paper emphasis the usage of traditional and classic
method of vehicle detection using image processing technique for the existing
surveillance cameras of the target location as an infrastructure that combines
with VANET to improve the security and reliability of traffic information used
for any ITS application. The details of the proposed infrastructure are discussed
in detail in this paper.
3 VANET Infrastructure
Figure 1 depicts VANET infrastructure comprising of smart vehicles that act as
mobile nodes equipped with On Board Unit (OBU) and several Roadside Units
132 M. Sankaranarayanan et al.
deliver the requirement within the critical time (vi) The energy consumption is
very meagre which enable implementation of other efficient techniques to secure
the system [6,9].
Implementing a VANET infrastructure aid in communicating and sharing
traffic related information to applications that generate preventive measures to
reduce accidents and any mishaps. There are several applications in ITS using
VANET and are broadly categorised into two types as in [6]. One includes appli-
cations that increases the safety aspects of travellers (safety applications) and the
other includes applications that provide value added services like entertainment
(user applications). In [13] the applications are classified into four categories and
the respective applications are shown in Table 1. Due to the vastness and broad
field of applications in VANET this paper has considered the most desired traf-
fic information generation application ie Traffic Congestion (TraCo) estimation
that falls under Improved Driving category of application. The main objective
134 M. Sankaranarayanan et al.
is to provide any user, the access to estimated information for their travel and
get a better insight in advance to avoid congestion and to minimize the transit
delay in the target area.
to the limited capacity of the road network being used and the other is the
consequences arising due to the lack of traffic assistance information to travellers.
The estimation of congestion is one of the most complex tasks, because there
is no standard way of measuring the traffic congestion level on the roads. It
is very important to detect where the congestion has occurred and has to be
indicated in a range from 1 to 10 [14]. It is essential to note that the defining
the range of congestion may vary according to individual. This paper proposes
an effective system for calculating the congestion rate in a dynamic way using
mobile communicating nodes of an improved VANET Infrastructure. The overall
proposed infrastructure for TraCo estimation is shown in Fig. 2. The TraCo rates
are evaluated using parameter or indexes enumerated by the CAM information.
While implementing VANET infrastructure in developing countries, there are
several conditions that arises to ensure appropriate enumeration of TraCo there
is an additional requirement of infrastructure and technology. The most common
and usable technology in ITS are Video Image processing of images obtained
from traffic cameras. In Traffic Congestion (TraCo) estimation application, it
is not necessary to depend entirely on the CAM communicated across vehicles
and infrastructure. Instead, it is advantageous to use the existing surveillance
cameras in the respective locations during adverse traffic conditions. The purpose
of surveillance cameras can also be utilized for solving security breach of VANET
communications.
1. Periodic Communication
The service applications of VANET require continuous raw data from a reli-
able source. One of the consistent sources of raw data is the vehicles that
communicate with each other and RSU. But due to external reasons such as
temperature, tampering or unavailability of vehicles, the raw data may not
be communicated to the server. At those critical times, the VANET service
application programmes to get the data from VIMPROS. Moreover the raw
data obtained through processing the real time image from the traffic scene
aid in authenticating, revising and modifying the processed raw data exist-
ing in the server for communication respective to the service application of
VANET.
2. On Demand/Querying Communication
(a) Real time applications
At times it is required to get information for certain application in real
time. To search for a specified vehicle we must define a complex query
consisting of a searched vehicle description, possible location of the vehi-
cle and spatiotemporal relations between the vehicle and other vehicle.
Using this kind of description, system can detect and recognize wanted
vehicle from images of traffic scene captured by VANET participants [11].
In estimation of TraCo, the two major parameters that are required are Queue
length and Speed of the vehicles. It is not possible to receive CAM consistently
from all locations at all times. This affects the accuracy and real time constrains
of the application. The proposed decision scheme helps in deciding which type of
infrastructure is apt for estimating the parameters. The following are the decid-
ing factors.
1. Type of Road: Based on the traffic volume, location, width, materials used
for construction, the roads are classified into national highways, state high-
ways, district roads, urban and rural roads. While using VANET infrastruc-
ture solely the availability of CAM are not consistent. The vehicle volume in
highways are dynamic and manageable with movement of vehicles all through-
out the day. But in case of urban and rural roads the volume varies during
138 M. Sankaranarayanan et al.
where n is the total number of vehicles captured in the video for which the
speed is calculated and si is the speed of the ith vehicle covering the distance
D.
2. Queue Length (QL)
Traffic will depend on the number of vehicles that are already in the area
waiting (QL) to move from the current location to their respective desti-
nations. The Queue Length Distance (QLD) on a straight road segment
Ax + Bx + C = 0 (with A, B and C are coefficients) is calculated using
Eq. 2
|Axo + Byo + C|
QLD = √ (2)
A2 + B 2
where (x0 , y0 ) is the location of the last existing vehicle in the queue.
(a) TraCo with Average Speed (b) TraCo with Queue Length
1. Scalability
When traffic density increases in a location (area/road segment,) the number
of vehicles communicating to a RSU increases. The RSU gets jammed or
runs out of bandwidth for further communications. It is also possible to have
any service application unreachable due to this jam. On such occasions the
VIMPROS-V acts as a best solution to ensure the reachability of service
applications if not for all but at least a few request especially traffic related
applications. This can avoid the installation of another RSU in the locations
prone to jams.
2. Availability
Due to the real-time interaction between vehicular networks and the phys-
ical world, availability is an important factor in system design. This may
have a major impact on the safety and efficiency of future highway systems.
Irrespective of external or environmental factors such as time of the day,
adverse climatic conditions, temperature, tampering or connection issues, the
VIMPROS-V acts as a backup to the RSU and other enumeration services.
The architecture is robust enough to withstand unexpected system failures
or deliberate attacks.
3. Context Awareness
The image processing software algorithms are dynamic in nature. On the one
hand, algorithm should be adaptable to real-time environmental changes,
including vehicle density and movement, traffic flow, and road topology
changes. On the other hand, protocol designers should also consider the pos-
sible consequences the protocol may have on the physical world.
4. Quality of Service
The heterogeneity of vehicles in applications used for traffic monitoring has
challenged network designers to provide best-effort service only. QoS has to
be guaranteed by the network to provide certain performance for any given
Improved Security Schemes for VANET 141
Security issues and attacks on VANET [6,7] such as Real time Constraint, Data
Consistency Liability, Low tolerance for error, Key Distribution, Incentives High
Mobility, impersonating, hijacking, revealing identity, location tracking, eaves-
dropping do not have any impact on the image processing infrastructure.
6 Conclusion
VANET infrastructure is a broad area of research establishing several service
applications for traffic management in Intelligent Transportation Systems (ITS)
to regulate and provide maximum traffic related information to travellers. The
other current and commonly existing ITS technology for efficient traffic man-
agement is Video based image processing infrastructure. This paper proposes
a new infrastructure known as Video Image Processing System for VANET
(VIMPROS-V) that combines both infrastructure. This paper also discusses in
detail the necessity of VIMPROS-V, types of communications, component that
are required to complement the most recently developed VANET infrastruc-
ture based traffic management application. In this paper, Traffic management
application such as Traffic Congestion (TraCo) Estimation is proposed using
VIMPROS-V infrastructure and its improvement on security aspects are dis-
cussed.
References
1. Cavalcanti, E.R., et al.: Vanets’ research over the past decade: overview, credibility,
and trends. ACM SIGCOMM Comput. Commun. Rev. 48(2), 31–39 (2018)
2. Singh, P.K., Nandi, S.K., Nandi, S.: A tutorial survey on vehicular communication
state of the art, and future research directions. Veh. Commun. 18, 100—164 (2019)
3. Durga, C.V., Chakravarthy, G., Alekya, B.: Efficient data dissemination in
VANETs: urban scenario. In: International Conference on Inventive Research in
Computing Applications (ICIRCA), pp 89–896. IEEE (2018)
4. Ali, I., Hassan, A., Li, F.: Authentication and privacy schemes for vehicular ad hoc
networks (VANETs): a survey. Veh. Commun. 16, 45–61 (2019)
5. Akhtar, N., Ozkasap, O., Ergen, S.C.: VANET topology characteristics under real-
istic mobility and channel models. In: IEEE Wireless Communications and Net-
working Conference (WCNC), pp. 1774–1779. IEEE (2013)
6. Raw, R.S., Kumar, M., Singh, N.: Security challenges. issues and their solutions
for VANET. Int. J. Netw. Secur. Appl. 5(5), 95 (2013)
7. Mansour, M.B., Salama, C., Mohamed, H.K., Hammad, S.A.: VANET security and
privacy-an overview. Int. J. Netw. Secur. Appl. (IJNSA) 10 (2018)
8. Li, M.: Security in VANETs, student survey paper (2014). https://www.cse.wustl.
edu/∼jain/cse571-14/ftp/vanet security.pdf
9. Saini, M., Singh, H.: VANET its characteristics attacks and routing techniques: a
survey. Int. J. Sci. Res. 5(5), 1595–1599 (2016)
10. Taie, S.A., Taha, S.: A novel secured traffic monitoring system for VANET. In:
IEEE International Conference on Pervasive Computing and Communications
Workshops (PerCom Workshops), pp. 176–182. IEEE (2017)
11. Kavitha Rani, M.,Pradeep Kumar, N.S., Swamy, R.S.: VANET used for efficient
detection and recognition of objects in image processing. IJERT (2014)
12. Saha, S., Roy, U., Sinha, D.D.: VANET simulation in different Indian City scenario.
Adv. Electron. Electr. Eng. 3(9), 2231–1297 (2013)
13. PratitiMankodi, H.R., Kothari, R.: A study on the necessity and chalenges of
vehicular network in context of India. J. Sci. Eng. Res. 08(05), 698–703 (2017)
144 M. Sankaranarayanan et al.
14. Sankaranarayanan, M., Mala, C., Mathew, S.: Congestion rate estimation for
VANET infrastructure using fuzzy logic. In: Proceedings of the 2017 Interna-
tional Conference on Intelligent Systems, Metaheuristics and Swarm Intelligence,
ACM98–102 (2017)
15. Korzhuk, V., Groznykh, A., Menshikov, A., Strecker, M.: Identification of attacks
against wireless sensor networks based on behaviour analysis. J. Wirel. Mob. Netw.
Ubiquit. Comput. Dependable Appl. (JoWUA) 10(2), 1–21 (2019)
16. Tsuchida, H., Nishide, T., Okamoto, E.: Expressive ciphertext-policy attribute-
based encryption with fast decryption. J. Internet Serv. Inf. Secur. (JISIS) 8(4),
37–56 (2018)
17. Shih, C.-S., Hsieh, W.-Y., Kao, C.-L.: Traceability for vehicular network real-time
messaging based on blockchain technology. J. Wirel. Mob. Netw. Ubiquit. Comput.
Dependable Appl. (JoWUA) 10(4), 1–21 (2019)
18. Vivekanandan, P.: A type-based formal specification for cryptographic protocols.
J. Internet Serv. Inf. Secur. (JISIS) 8(4), 16–36 (2018)
Analysis of Attack Actions on the
Railway Infrastructure Based on the
Integrated Model
1 Introduction
Modern mobile devices are an integral part of any sphere of our life. And railway
infrastructure, which is critical, is not an exception. Modern railway infrastruc-
The reported study was funded by RFBR, project number 19-37-90082 and 19-29-
06099, and by the budget, the project No. 0073-2019-0002.
c Springer Nature Singapore Pte Ltd. 2020
I. You et al. (Eds.): MobiSec 2019, CCIS 1121, pp. 145–162, 2020.
https://doi.org/10.1007/978-981-15-9609-4_11
146 D. Levshun et al.
2 Related Work
To display various aspects of complex systems and detect the potential feasibil-
ity of various attack actions semi-natural, simulation, analytical and analytical-
simulation modeling are used.
The semi-natural modeling allows one to unite mathematical methods and phys-
ical objects in conditions when the mathematical description of separate subsys-
tems of the complex system is not possible. Generally it is bound to situations
when the system is at a design stage, and therefore different accidental processes
which were not considered during model development are possible. Advantage
of the semi-natural approach is in the possibility to use a real railway equip-
ment during experiments. Availability of the real equipment opens a possibility
to exploit their vulnerabilities, assess the potential damage and validate security
measures with no risk to people.
Analysis of Attack Actions on the Railway Infrastructure 147
In work [3] one of the possible solutions of the problem of quality of a current
collection from an air-line with the pantograph is presented. This problem is
bound to the fluctuations arising during the interaction of the pantograph with
a contact wire. The decision submitted by authors is based on the optimization
of a dynamic response of a suspension system of the pantograph by means of
the fissile or semi-fissile suspension system.
In work [4] the procedure of optimization for improvement of quality of con-
tact between the pantograph and supply network on the basis of change of
characteristics of a suspension system of a head of the pantograph is offered.
Definition and validation of model of the pantograph is carried out on the basis
of dynamic characteristics of the existing pantographs. For optimization of the
pantograph next parameters were used: rigidity of a spring, characteristic of
damping and mass of an arch.
3 Domain Description
The railway infrastructure is a technological range of services for ensuring the
transportation process. Public railway tracks, stations, structures of power sup-
ply, the alarm system, systems of centralization, blocking, communication, trans-
fer and information processing, train dispatching and also different buildings and
constructions as well as the inventory of auxiliary appointment belong to objects
of the railway infrastructure.
Automatic and telemechanical process control tools have become widespread
in the railway transport. Among these tools, signaling, centralization and block-
ing systems are playing a crucial role. Signaling devices provide transmission
of orders and notifications on traffic prohibition/permission, speed restrictions,
etc. Centralization devices provide control of remote scattered equipment, pre-
venting discrepancies between the state of turnouts and signals. Locking devices
allow the safe interval of trains to be observed and do not allow the use of a
busy section of the track.
Auto-lock or track auto-lock (automatic train protection) is the primary sys-
tem for regulating train traffic on two-track and single-track lines. It provides
higher capacity and train safety. Auto lock can be two-, three-, and four-valued.
Multi-value lock reduces the intervals between trains with different characteris-
tics in loaded areas.
Sections with autonomous traction can use DC rail circuits for auto-locking,
while electrified sections can only use AC rail circuits. The most modern systems
are using numerical and frequency coding of signals. Frequency coding of signals
is more reliable and has more capacity, which ensures its applicability in high-
speed communication.
Automatic locomotive signaling allows to receive readings of traffic lights
directly in the driver’s cabin. Vigilance control, automatic braking/automatic
speed control systems are used in conjunction with this system. This makes it
possible to control trains in conditions of reduced visibility and to maintain high
capacity of a way.
The development of automatic locomotive signaling systems is a system of
complex locomotive safety devices. There are modular on-board systems that can
be installed on any rolling stock and perform forced braking/stopping in case of
non-compliance with speed mode, occupation of the forthcoming block-section.
Electric centralization is used to centrally control and monitor the status of
turnouts and signals, it is the main type of turnout and signal control. Thus,
traffic safety is ensured, distant placement of track equipment is possible, high
speed of route preparation and capacity are achieved.
Block route-relay electric centralization has become most common, where it
is enough to set the start and end points to build the route. The main idea of the
approach is to build a system of standard blocks, which simplifies its deployment,
support and maintenance. However, relay centralization is gradually replaced by
microprocessor centralization systems that optimize solutions and raise the level
of traffic safety.
150 D. Levshun et al.
4 Integrated Approach
The proposed integrated approach to modeling the railway infrastructure con-
sists in combining of the component based approach, the semi-natural, simulation
and analytical modeling with the model of attacker in a integrated approach.
The proposed solution has a strong focus on security and provides the ability
for attack actions effective analysis. Each model has its own abstraction level in
the representation of the railway infrastructure (see Fig. 1).
by the authors at the IDC 2019 conference [18]. The structure of this model
is shown on Fig. 2. Black rounded rectangles reflect the system model along
with its elements, while black arrows reflect their hierarchy and nesting. White
rounded rectangles reflect external models that are associated with the model
and integrated into it.
Software Elements
Cyber-Physical System
Cyber-Physical System P
Building Blocks P
Provided Resources Provided Resources
In the presented model, when the properties of the system cps are calculat-
ing, the emergent properties arising as a result of the interaction of the system
elements are also taken into account. Within the framework of the proposed
model, the influence of emergent properties is expressed through special modi-
fiers that affect the values of cps properties and its elements during their inter-
action (for example, the interaction of various system elements to solve a general
task requires the allocation of additional resources for work coordination).
infrastructure controller. The analytics unit solves the task of processing the
incoming information: calculating the speed of the trains movement, and entering
the obtained results into the database, on which the control system relies when
monitoring the model operation.
DCC SPI
I2C I2C
2 1
5 7 3
6 4
attack tree is formed. In total, these trees represent an attack graph for the
analyzed infrastructure and for all modeled attackers. The specifics of the railway
infrastructure are taken into account by specific models, including hardware
and software, possible vulnerabilities and attack actions. The discreteness of the
modeled actions is due to the sequence of attacks, each of which can create the
necessary conditions that make it possible to perform the next attack.
At the stage of preparation for building attack trees, for each object of the
modeled infrastructure, a three-dimensional matrix is constructed according to
the following data: attack class – namely, data collection, preparatory actions,
privilege escalation, fulfillment of the attack target; access type – namely, remote
source without access rights, remote user, local user, administrator; level of
attacker skills – types of vulnerabilities that the attacker can implement.
Figure 5 shows a generalized scheme of the proposed algorithm for construct-
ing and analyzing an attack graph. The figure shows the following main steps of
the algorithm: (1) attack actions selection based on hosts’ configuration, the
database of vulnerabilities, as well as the network configuration; (2) attack
actions selection based on the attacker’s possibilities; (3) attack graph construc-
tion based on the available attack actions and network topology; (4) attack
graphs analysis, calculation of security metrics [17].
(1)
The initial data for attack graph construction is the information about the
analyzed infrastructure and list of vulnerabilities inherent in the software and
hardware of this infrastructure. Vulnerabilities for widespread firmware can be
downloaded from open databases, for example, National Vulnerability Database,
156 D. Levshun et al.
and data for railway-specific firmware and hardware should be generated by the
system operator.
Type Description
0 No access to the railway infrastructure elements and network, only
indirect action (e.g., social engineering methods)
1 Indirect access to the railway infrastructure elements and network
(e.g., vulnerability exploitation)
2 Indirect access to the railway infrastructure elements and network, while
being within a certain proximity of it (e.g., jamming information
transmitted)
3 Direct physical access to the railway infrastructure elements and network
(e.g., substitution of original devices)
4 Full access to the railway infrastructure elements and network
(e.g., firmware change)
The level in the range between 1 and 3 describes the capabilities and resources
an attacker has, see Table 2.
Level Description
1 Attacker has insufficient knowledge about railway infrastructure elements
and network and can use only wide-spread software tools and exploits
only well-known vulnerabilities (e.g., attacks on web-servers)
2 Attacker has detailed information about railway infrastructure elements
and network and can use specialized attacking tools and exploit unknown
vulnerabilities (e.g., attacks on base stations)
3 Group of attackers of level 2 with almost unlimited resources (e.g.,
attacks on on-board systems)
In our model, the structure of types and levels is hierarchical. It means that
an attacker with a certain type is able to perform any attack action which is
Analysis of Attack Actions on the Railway Infrastructure 157
possible for an attacker of the same type but lower level. It also means that an
attacker of higher type is able to perform any attack action which is possible for
an attacker of lower type but the same or lower level.
5 Attack Surface
In Table 3 the examples of attack actions on railway infrastructure based on an
attacker type and level as well as a target type are listed. There are only two
target types in our model: (1) railway infrastructure and (2) trains. We consider
trains as main objects of attack actions in our model. For the each example of the
attack action it is noted which part of the integrated model is more efficient for
attack actions analysis: (1) component-based, (2) semi-natural, (3) simulation
or (4) analytical.
Attackers of type 0 are not considered, since basically the only relevant types
of attacks are social engineering attacks (e.g., bribery and blackmail of employ-
ees, sabotage). In addition, we show only attacks for the highest attacker level
and type and do not consider the hierarchical structure by including all other
inherited attacks.
This systematization of the attacks can be useful for hardware and software
developers as well as architects that work with railways systems. It helps one
to find the most relevant threats and to take it into account during the system
development or security evaluation.
In the next section some examples of the attacks that can be analysed using
the hierarchy of the models proposed in the paper are shown.
6 Experiments
The constructed integrated model gives us the possibility for visual demonstra-
tion and conducting experiments that includes all the necessary elements of the
railway infrastructure and allows us to control the movement of locomotives
according to a given schedule. This model assumes the possibility of an attack
to be aimed at various segments of the system. In this case, the attacker can both
conduct an attack directly (for example, an attack on the on-board computer
of a locomotive via a wireless connection directly from the train interior) and
remotely (for example, through a remote monitoring channel).
To identify security incidents, attack scenarios and abnormal activity the data
collected by the model goes to a correlation process. For example, the following
rules are applied to detect false alarms of sensors or their substitution: (1) rules
for matching readings of identical sensors; (2) rules for comparing changes in the
readings of some sensors with data from sensors, the readings of which should
also have changed. Let us consider few examples.
Example 1: Component-Based Approach. An attacker performed an attack
at the physical level against one of the objects of the railway automation -
the railroad switch. Thus, the actual state of the turnout is not as expected.
In this case, the system creates a security incident, generates and transmits a
message to the operator’s workplaces, to the post of an electrician, and also
forms recommendations for taking countermeasures.
Example 2: Semi-natural Model. An attacker performed an attack on a data
acquisition controller. As a result, the alarm system as well as the centralization
and blocking systems cannot get feedback from railway automation facilities.
Since the state of the equipment in this situation is unknown, the system creates a
security incident and blocks a section of the railway line on which communication
is lost, and also issues an alarm message to all dispatch control and monitoring
posts.
Example 3: Simulation Model. At a certain section of the railway commu-
nication, a significant discrepancy of the actual locomotives location with the
schedule was detected. The system generates a security incident, and, in order
Analysis of Attack Actions on the Railway Infrastructure 159
3 4
operator database server
attacker
locomotive
control device
roadside device
roadside device
7 Conclusion
As part of the further research, it is planned to refine and expand the capabil-
ities of the developed models. So, within the framework of the component-based
approach it is planned to adapt and refine the presented model of the cyber-
physical system (developed for design and verification) to take into account the
specifics of the railway infrastructure and the attack actions on it. Within the
framework of the semi-natural model, it is planned to expand it with additional
elements of the railway infrastructure. Within the framework of simulation model
it is planned to develop active models for different kinds of trains and to con-
nect the simulation model with semi-natural one. Within the framework of the
analytical model, it is planned to expand the list of used security metrics, as
well as to enhance the model of attacker for the railway infrastructure. Also it is
planned to continue the implementation of the models stack as the hardware and
software modules. This implementation will be used for the real-world scenarios
experiments devoted to the security evaluation of the software (railway manage-
ment systems) and/or hardware (elements of trains or railroad infrastructure)
parts of the railroads and for models performance evaluation.
References
1. BruCON 2009: Rage Against the Kiosk. https://captf.com/conferences/BruCon
%202009/Paul%20James%20Craig%20-%20Rage%20Against%20The%20Kiosk.
pdf. Accessed 31 Jan 2020
2. IT Security News. The Russian Railways information system got hacked
in 20 minutes. https://www.itsecuritynews.info/the-russian-railways-information-
system-got-hacked-in-20-minutes/. Accessed 31 Jan 2020
3. Allotta, B., Pugi, L., Bartolini, F.: An active suspension system for railway pan-
tographs: the T2006 prototype. Proc. Inst. Mech. Eng. Part F J. Rail Rapid Tran-
sit. 223(1), 15–29 (2009)
4. Ambrósio, J., Pombo, J., Pereira, M.: Optimization of high-speed railway pan-
tographs for improving pantograph-catenary contact. Theor. Appl. Mech. Lett.
3(1), 013006 (2013)
5. Baldini, G., et al.: An early warning system for detecting GSM-R wireless interfer-
ence in the high-speed railway infrastructure. Int. J. Crit. Infrastruct. Prot. 3(3–4),
140–156 (2010)
6. Bloomfield, R., Bendele, M., Bishop, P., Stroud, R., Tonks, S.: The risk assessment
of ERTMS-based railway systems from a cyber security perspective: methodology
and lessons learned. In: Lecomte, T., Pinger, R., Romanovsky, A. (eds.) RSSRail
2016. LNCS, vol. 9707, pp. 3–19. Springer, Cham (2016). https://doi.org/10.1007/
978-3-319-33951-1 1
7. Chen, B., et al.: Security analysis of urban railway systems: the need for a cyber-
physical perspective. In: Koornneef, F., van Gulijk, C. (eds.) SAFECOMP 2015.
LNCS, vol. 9338, pp. 277–290. Springer, Cham (2015). https://doi.org/10.1007/
978-3-319-24249-1 24
8. Cheng, Y.C., Lee, S.Y., Chen, H.H.: Modeling and nonlinear hunting stability
analysis of high-speed railway vehicle moving on curved tracks. J. Sound Vib.
324(1–2), 139–160 (2009)
9. Desnitsky, V., Levshun, D., Chechulin, A., Kotenko, I.V.: Design technique for
secure embedded devices: application for creation of integrated cyber-physical secu-
rity system. JoWUA 7(2), 60–80 (2016)
162 D. Levshun et al.
10. Flammini, F., Gaglione, A., Mazzocca, N., Pragliola, C.: Quantitative security risk
assessment and management for railway transportation infrastructures. In: Setola,
R., Geretshuber, S. (eds.) CRITIS 2008. LNCS, vol. 5508, pp. 180–189. Springer,
Heidelberg (2009). https://doi.org/10.1007/978-3-642-03552-4 16
11. Gorodetski, V., Karsayev, O., Kotenko, I., Khabalov, A.: Software development
kit for multi-agent systems design and implementation. In: Dunin-Keplicz, B.,
Nawarecki, E. (eds.) CEEMAS 2001. LNCS (LNAI), vol. 2296, pp. 121–130.
Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45941-3 13
12. Han, Z., Zhang, Y., Liu, S., Gao, S.: Modeling and simulation for traction power
supply system of high-speed railway. In: 2011 Asia-Pacific Power and Energy Engi-
neering Conference, pp. 1–4. IEEE (2011)
13. Heddebaut, M., et al.: Towards a resilient railway communication network against
electromagnetic attacks (2014)
14. Ho, T., Mao, B., Yuan, Z., Liu, H., Fung, Y.: Computer simulation and modeling
in railway applications. Comput. Phys. Commun. 143(1), 1–10 (2002)
15. Kotenko, I.: Active vulnerability assessment of computer networks by simulation of
complex remote attacks. In: 2003 International Conference on Computer Networks
and Mobile Computing, ICCNMC 2003. pp. 40–47. IEEE (2003)
16. Kotenko, I., Chechulin, A., Bulgakov, M.: Intelligent security analysis of railway
transport infrastructure components on the base of analytical modeling. In: Abra-
ham, A., Kovalev, S., Tarassov, V., Snasel, V., Vasileva, M., Sukhanov, A. (eds.)
IITI 2017. AISC, vol. 680, pp. 178–188. Springer, Cham (2018). https://doi.org/
10.1007/978-3-319-68324-9 20
17. Kotenko, I., Doynikova, E., Chechulin, A.: Security metrics based on attack graphs
for the Olympic Games scenario. In: 2014 22nd Euromicro International Conference
on Parallel, Distributed, and Network-Based Processing, pp. 561–568. IEEE (2014)
18. Levshun, D., Kotenko, I., Chechulin, A.: The integrated model of secure cyber-
physical systems for their design and verification. In: Kotenko, I., Badica, C.,
Desnitsky, V., El Baz, D., Ivanovic, M. (eds.) IDC 2019. SCI, vol. 868, pp. 333–343.
Springer, Cham (2020). https://doi.org/10.1007/978-3-030-32258-8 39
19. Milošević, M.S., Stamenković, D.S., Milojević, A.P., Tomić, M.: Modeling thermal
effects in braking systems of railway vehicles. Therm. Sci. 16(2), 515–526 (2012)
20. Petersen, E., Taylor, A.: A structured model for rail line simulation and optimiza-
tion. Transp. Sci. 16(2), 192–206 (1982)
21. Salido, M.A., Barber, F., Ingolotti, L.: Robustness for a single railway line: ana-
lytical and simulation methods. Exp. Syst. Appl. 39(18), 13305–13327 (2012)
22. Schlehuber, C., Heinrich, M., Vateva-Gurova, T., Katzenbeisser, S., Suri, N.: A
security architecture for railway signalling. In: Tonetta, S., Schoitsch, E., Bitsch, F.
(eds.) SAFECOMP 2017. LNCS, vol. 10488, pp. 320–328. Springer, Cham (2017).
https://doi.org/10.1007/978-3-319-66266-4 21
23. Soderi, S., Hämäläinen, M., Iinatti, J.: Cybersecurity Considerations for Commu-
nication Based Train Control. Alstom Signalling Solutions, Florence (2016)
24. Ticali, D., Acampa, G., Denaro, M.: Renewable energy efficiency by railway transit.
Case study on Rebaudengo railway tunnel in Turin. In: AIP Conference Proceed-
ings, vol. 2040, p. 140009. AIP Publishing (2018)
Deep Learning Applications
Improved Collaborative Filtering
Algorithm Based on Stacked Denoising
AutoEncoders
1 Introduction
In recent years, the mobile Internet and e-commerce industries have developed
rapidly, and the amount of information and data traffic has exploded. People
are facing serious information overload problems. In the context of this year-
on-year development of Internet technology and communication technology, a
good recommendation system is particularly important [1–4]. The recommenda-
tion system with the help of the mobile Internet platform uses the interactive
information between users and items to help users find information of interest
c Springer Nature Singapore Pte Ltd. 2020
I. You et al. (Eds.): MobiSec 2019, CCIS 1121, pp. 165–176, 2020.
https://doi.org/10.1007/978-981-15-9609-4_12
166 L. Jiang et al.
and solve the problem of information overload [5]. At the same time, the devel-
opment of mobile Internet has also greatly promoted the rapid development of
recommendation systems.
Collaborative filtering is one of the most widely used methods in recom-
mendation systems [6],which predicts user preferences simply and effectively by
discovering and exploiting the similarities between users and items through the
rating matrix. The most widely employed models are user-based and item-based
collaborative filtering. However, these shallow models cannot learn the deep fea-
tures of users and items, limiting their scalability for recommendation. In recent
years, deep learning techniques represented by neural networks have made con-
siderable progress in the fields of image and speech [6]. Consequently, more and
more research has been put forward to apply neural networks into collaborative
filtering, where the autoencoder model, such as AutoRec [7–10] is the most ideal
one. Compared with the traditional collaborative filtering algorithm, the recom-
mendation accuracy of AutoRec is greatly improved. Unfortunately, AutoRec
can’t deal with the large-scale historical behavior data of users. Besides, the
shallow model structure is hard to extract the deep hidden features of users and
items.
This paper proposes a collaborative filtering recommendation algorithm
based on improved Stacked Denoising AutoEncoder [11–14]. The hidden repre-
sentation of users and items is learned from the ratings and auxiliary information
through the Stacked Denoising AutoEncoder framework. The deep feature rep-
resentation ability is extracted to address the inefficiency and sparsity issues of
matrix decomposition in traditional collaborative filtering algorithms. In addi-
tion, the user and item dimensions are also taken into account, which is able
to effectively alleviate the sparse data and cold start of new items, so as to
improve the efficiency of the recommendation algorithm. Experiments are done
on the movielens dataset and compared with several mainstream algorithms.
The results show that the recommendation precision and recall rate of the pro-
posed algorithm are significantly improved, and the cold start problem has been
alleviated.
2 Preliminaries
2.1 Autoencoder
The autoencoder [15] is a type of neural network that is commonly used to learn
the deep features of input data as shown in Fig. 1. The basic autoencoder consists
of an input layer, a hidden layer, and an output layer. The input layer and the
output layer have the same number of neurons, while the number of neurons in
the hidden layer is typically smaller than the input layer and the output layer.
The autoencoder tries to learn an identity function that makes the input and
output as equal as possible. The automatic encoder is an unsupervised learning
approach, which does not need to mark the training data.
Improved Collaborative Filtering Algorithm 167
hi = σ(W xi + b) (1)
Where W ∈ RL∗N is the weight matrix of the encoding part,b is the bias vectors,
σ(x) = 1/(1 + e−x ) is Sigmoid function indicating that the Sigmoid operation is
performed on each dimension of the input x after the encoding. The decoding
operation is executed to restore x̂ ∈ RN from the hidden feature hi of the L
dimension as (2).
x̂ = σ(W hi + b ) (2)
Where W ∈ RN ∗L is the weight matrix of the encoding part, b is the bias
vectors.The training process of the AutoEncoder is to constantly adjust the
weight matrix W and W , the offset vector b and b in order to minimize the
objective function as (3).
m
1 λ λ
E= ||xi − x̂i || + ||W ||2 + ||W ||2 (3)
2m i=1 2 2
Where ||xi − x̂i || is the error term of the input data x and the output data x̂
which is used to minimize the error between the output data and the original
data. λ2 ||W ||2 and λ2 ||W ||2 are regular terms, in order to avoid over-fitting the
training data. Finally, the hidden layer features hi are gained through the trained
parameters, so that the hidden layer feature codes of the original data can be
obtained.
data volume, and data noise. In order to solve this problem, Vincent proposed
Denoising AutoEncoder(DAE) in terms of robustness [16] based on AutoEn-
coder. In order to prevent the over-fitting problem, random noise is added to the
input data, and the process of encoding and decoding by adding noise data is
reproduced input.In order to minimize the error between the reconstructed input
and the original input, the purpose of DAE is to minimize the loss function.
without label to get the parameters of each layer, which are used to extract the
deep features of users. The user based network structure of SDAE is defined as
U-SDAE, and the item based network structure of SDAE is defined as I-SDAE.
layer and the output of the first hidden layer are obtained, which forms the input
of the next layer. The above training process is continuously repeated to record
the parameters of each layer {W1 , W1 , W1 , b1 , b1 , b1 } The trained parameters
are then used to calculate hu through formula (4) and formula (5) in order to
2
h2uu • h2uv
sim(u, v) = (8)
|h2uu | × |h2uv |
Where h2uu and h2uv represent the j dimensional feature vectors compressed by
user u and user v through the SDAE.
h2Ii • h2Ij
sim1 (i, j) = , (9)
|h2Ii | × |h2Ij |
where h2Ii and h2Ij represent t dimensional feature vectors that the item i and
item j are compressed by the SDAE.
Improved Collaborative Filtering Algorithm 171
a1 ai ar
Item1 0 ··· 1 ··· 1
···
Itemi 1 ··· 0 ··· 0
···
Itemn 1 ··· 1 ··· 0
This paper uses a domain-based scoring prediction algorithm, which first calcu-
lates the user-based score prediction. First, formula (8) to calculate the similarity
of the user sim(u, v), sort the similarity between the items, and get the set of
nearest neighbors of the target user Uu = {Uu1 , Uu2 , · · · , Uuk }, Then user u’s
score prediction Qu to item i is:
v∈S(u,K)∩N (i) sim(u, v)(rvi − r¯v )
Qu = + r¯u (10)
v∈S(u,K)∩N (i) |sim(u, v)|
Where S(u, K) is a collection of K users most similar to the user u’s interest,
N (i) is a set of users who have scored the item i, sim(u, v) is the similarity
between users, r¯u is the average value of user u’s score on all items, rvi is user
v’s score on item i , r¯v is the average value of user v ratings on all items he
scored.
This paper considers the similarity of the items to predict the score. The
Item-based scoring prediction algorithm refers to user u scoring for other items
similar to item i. User u’s scoring prediction QI for item i is:
j∈S(i,K)∩N (u) sim(i, j)(ruj − r¯j )
QI = + r¯i (11)
j∈S(i,K)∩N (u) |sim(i, j)|
Where S(i, K) is the most similar set of item i, N (u) is a collection of items that
users have scored, sim(i, j) is the similarity between items, r¯i is the average score
of item i. After getting the predicted scores for the two dimensions of user and
item, the predicted score for the fusion can be calculated as follows:
Where: β ∈ [0, 1] is the weight that controls the prediction scores, which should
be adjusted in the experiment.
172 L. Jiang et al.
We take the precision rate and recall rate of the recommendation system as the
evaluation goal [20]. The precision rate and recall rate is described 13 and 14
respectively:
u|R(U ) T (U )|
P recision = (13)
u |R(U )|
u |R(U
) T (U )|
Recall = (14)
u |T (U )|
Where: R(U ) is a list of recommendations for the user based on the behavior of
the user on the training set, which is a list of behaviors of the user on the test
set.
As shown in Table 2 ,the traditional user-based, item-based, AE, and SDAE
schemes are choosen to make the comparative analysis with our proposed algo-
rithm (SDAE-U-I).
Figure 3 shows the recall rate as a function of weight. It can be seen from the
figure that the β value is around 0.4 to 0.6, and the recall rate is better. In this
paper we set the weight β to 0.5. When β = 0, the algorithm makes a score
prediction based on the hidden features of the item learned by SDAE. When β
= 1, the algorithm makes a score prediction based on the hidden features of the
user learned by SDAE.
Figure 4 and Fig. 5 show the recall rate comparison between SDAE-U-I algo-
rithm and other five algorithms under different number of neighbors. It can
be seen from the figures that there is no linear relationship between the nearest
neighbors and the recall rate of the recommended results, where the best number
of nearest neighbors is between 80–100. Compared with user-based, item-based,
and AE, the recall rate and precision rate of SDAE, SDAE-U, SDAE-I are sig-
nificantly improved, indicating that the feature extraction effect of deep network
1
https://grouplens.org/datasets/movielens/1m.
Improved Collaborative Filtering Algorithm 173
is better than that of shallow model and improves the quality of the recommen-
dation system. In addition, compared with AE, SDAE-U, and SDAE-I models,
SDAE-U-I has improved the precision and recall rate. When we recommend
the same length item list, SDAE-U-I has higher precision and more accurate
results, which shows that the recommended cold start problem has been alle-
viated. Moreover, it can be seen from the results that the user characteristics
and item characteristics learned from deep network can better replace users and
items. Compared with the recommendation algorithm which only considers one
dimension of users or items, the recall rate and precision rate are improved, and
the recommendation effect is improved.
References
1. Gupta, T., Choudhary, G., Sharma, V.: A survey on the security of pervasive online
social networks (POSNs). J. Internet Serv. Inf. Secur. (JISIS) 8(2), 48–86 (2018)
2. Applying big data processing and machine learning methods for mobile internet of
things security monitoring. J. Internet Serv. Inf. Secur. 54–63 (2018)
3. Choudhary, G., Kim, J., Sharma, V.: Security of 5G-mobile backhaul networks:
a survey. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 9(4), 41–70
(2019)
4. Lim, J., Shin, Y., Lee, S., Kim, K., Yi, J.H.: Survey of dynamic anti-analysis
schemes for mobile malware. J. Wirel. Mob. Netw. Ubiquitous Comput. Depend-
able Appl. (2019)
5. Adomavicius, G., Tuzhilin, A.: Toward the next generation of recommender sys-
tems: a survey of the state-of-the-art and possible extensions. IEEE Trans. Knowl.
Data Eng. 17(6), 734–749 (2015)
6. Zhang, S., Yao, L.: Sun, A: Deep learning based recommender system: a survey
and new perspectives. ACM Comput. Surv. (CSUR) 52(1), 1–38 (2017)
7. He, X., Liao, L., Zhang, H., Nie, L., Hu, X., Chua, T.-S.: Neural collaborative
filtering. In: Proceedings of the 26th International Conference on World Wide
Web, pp. 173–182 (2017)
8. Sedhain, S., Menon, A.K., Sanner, S., Xie, L: AutoRec: autoencoders meet collab-
orative filtering. In: Proceedings of the 24th International Conference on World
Wide Web, pp. 111–112 (2015)
9. Wu, Y., DuBois, C., Zheng, A.X., Ester, M: Collaborative denoising auto-encoders
for top-N recommender systems. In: Proceedings of the Ninth ACM International
Conference on Web Search and Data Mining, pp. 153–162 (2016)
10. Zheng, Y., Tang, B., Ding, W., Zhou, H.: A neural autoregressive approach to
collaborative filtering. In: Proceedings of The 33rd International Conference on
Machine Learning, pp. 764–773 (2016)
11. Vincent, P., Larochelle, H., Lajoie, I., et al.: Stacked denoising autoencoders: learn-
ing useful representations in a deep network with a local denoising criterion. J.
Mach. Learn. Res. 11(6), 3371–3408 (2010)
176 L. Jiang et al.
12. Strub, F., Mary, J.: Collaborative filtering with stacked denoising AutoEncoders
and sparse inputs. In: NIPS Workshop on Machine Learning for eCommerce, Mon-
treal, Canada. (2015). ffhal-01256422v1f
13. Dong, X., Yu, L., Wu, Z., et al.: A hybrid collaborative filtering model with deep
structure for recommender systems. In: Thirty-First AAAI Conference on Artificial
Intelligence (2017)
14. Wei, J., He, J., Chen, K., et al.: Collaborative filtering and deep learning based
recommendation system for cold start items. Expert Syst. Appl. 69, 29–39 (2017)
15. Bengio, Yoshua: Learning deep architectures for AI. Found. Trends Mach. Learn.
2(1), 1–127 (2009)
16. Vincent, P., et al.: Extracting and composing robust features with denoising
autoencoders. In: Machine Learning, Proceedings of the Twenty-Fifth International
Conference, 5–9 Jun 2008
17. Wang, H., Shi, X., Yeung, D.Y.: Relational stacked denoising autoencoder for tag
recommendation. In: Proceedingsof the 29th Conference on Artificial Intelligence,
Austin, USA, pp. 3052–3058 (2015)
18. Hinton, G.E., Osindero, S., Teh, Y.W.: A fast learning algorithm for deep belief
nets. Neural Comput. 18(7), 1527–1554 (2006)
19. Zhuang, F., Zhang, Z., Qian, M., et al.: Representation learning via Dual-
Autoencoder for recommendation. Neural Netw. 90, 83–89 (2017)
20. Yuxiao, Z., Linyuan, L.: Summary of evaluation index of recommendation system.
J. Univ. Electron. Sci. Technol. 41(2), 163–175 (2012)
End-to-End 3D Face Model
Reconstruction Method Based
on Fusion-CNN
1 Introduction
As a fundamental technique in the field of computer vision, 3D face reconstruc-
tion is widely used in wireless mobile web apps, such as one-click test make-up,
cosmetic effect preview, etc. At the same time, 3D face reconstruction also pro-
motes the related research of face alignment, face recognition, as well as face
animation.
3D information is a strong invariant, which has been widely used in face
recognition to solve the problem of face image posture, expression, and light-
ing changes. The personalized 3D face models can be captured by 3D camera
system ideally. However, the high cost and limited sensing range of 3D cameras
impedes their applicability in practice. According to a statistical data from the
American Imaging Industry Association, almost 60% [1,8,17,18] of the pictures
on the Internet contain faces, thus using 2D face images to reconstruct 3D face
models is more universal. When dealing with shape reconstruction, the priori
c Springer Nature Singapore Pte Ltd. 2020
I. You et al. (Eds.): MobiSec 2019, CCIS 1121, pp. 177–186, 2020.
https://doi.org/10.1007/978-981-15-9609-4_13
178 H. An and T. Gao
knowledge is usually taken into account. For example, on the premise of know-
ing the inherent parameters of the camera or multi-view images of the same
person, multi-view stereo [12], shape from shading [23], time of flight [12] can be
employed to reconstruct the 3D face. However, in most cases, the intrinsic param-
eters of the camera are unknown and usually only single 2D image is available,
which makes monocular 3D face shape reconstruction (MFSR) more difficult.
Traditional 3D face reconstruction methods are mainly based on optimization
algorithm, such as taking the method of Iterative Closest Point to obtain the
coefficients of 3D Morphable Model(3DMM) [2]. Due to the high optimization
complexity and the problems of local optimal solution and poor initialization,
the efficiency of the method is poor and only simple regression functions can
be learned. Recent approaches consider to utilize a set of 2D sparse landmarks
to predict face geometry directly. However, these approaches rely heavily on
the landmarks detection accuracy, that cannot accurately reconstruct 3D face
without the details of the landmarks.
A lot of research has been proposed on the inherent ill-conditioned problem
of reconstructing face geometry from a single image. In [2], Vetter and Blanz
observe that the geometry and texture of the face can be approximated by the
linear combination of the vectors obtained by the PCA method. A comprehen-
sive analysis method 3DMM model, is then proposed. Similar methods further
establish a special point correspondence between the input image and the 3D
template (including landmarks and local features) [4,6,10,19,25] to regress the
3DMM coefficient. However, these methods rely on the accuracy of landmarks
or other landmarks detectors heavily, once the detector error is large, the recon-
struction accuracy will be poor. Compared with landmark information, facial
images provide more useful information for reconstruction. Thus many methods
adopt CNNs to learn the dense correspondence between input 2D images and
3D templates [7,22], and then predict 3DMM parameters with dense constraints
[5,11,15,16,24] explores to employ cascaded CNN to regress 3DMM parameters,
while a lot of time is needed due to iteration. There is also an end-to-end CNN
architecture that directly estimates the shape parameters of 3DMM to avoid
complex 3D rendering, which is able to reconstruct a 3D face model from a sin-
gle image [13,20,24]. However, these methods only focus on face alignment, and
do not provide evaluation data with other reconstruction methods. Recently,
model-free methods have also appeared [9,21]. Jackson et al. suggests to map
the image pixels to a volumetric representation of 3D facial geometry through
CNN-based regression, called VRN. Although it bypasses the construction and
fitting of 3DMM, while it needs plenty of time to predict voxel information. Feng
et al. proposes a Position Map Regression Network (PRN) [9], which can directly
predict complete 3D face shape and semantic information from a single image
efficiently. Unfortunately, building UV position maps in [9] is very complicated.
This paper proposes an end-to-end 3D face model reconstruction method,
which takes a single face image as input to predict the optimal deformation
model parameters through forward operation. Only the region of interest (ROI)
id is taken into account, that simplifies the training process of deep neural net-
End-to-End 3D Face Model Reconstruction Method 179
works. In addition, a number of key points with explicit semantic definitions are
introduced, and the regression process of camera parameters is adopted, so that
the neural network can predict the optimal deformation model parameters accu-
rately. The experiment results show that the proposed method has a significant
improvement compared with the 3DDFA [24] in both 3D face reconstruction and
3D face alignment.
2 Preliminaries
2.1 3D Morphable Model
In [2], Vetter and Blanz proposed a comprehensive analysis method that uses 3D
Morphable Model(3DMM) to represent the shape and texture of 3D face. The
3D face shape is rendered by 3DMM (S ∈ R3N ), which is a set of 3D coordinates
of N mesh vertices stored in a linear combination on a PCA basis. Therefore,
the 3D face shape can be expressed as:
Where S represents the 3D face, S represents the mean shape, Aid is the shape
principal components of the 3D face, αid is the shape parameter, Aexp is the
expression principal components, αexp is the expression parameter. In this paper,
Aid and Aexp are from BFM [14] and Face-Warehouse [3] respectively.
After obtaining the 3D face shape S, it is then projected onto image plane
with Weak Perspective Projection to generate a 2D face from the specified view-
point:
V (p) = f × P r × S + t2d (2)
Where V stores the 2D coordinates of the 3D vertices projected ontothe 2D
100
plane, f is the scale factor, P r is the orthographic projection matrix ,
010
R is the rotation matrix consisting of pitch, yaw, roll three angles, t2d is a
2D translation vector. The total parameters need to be regressed through
T
p = [f, pitch, yaw, row, t2d , αid , αexp ] .
2.2 E2FAR
the base vector through Eq. (1). The details of all layers (except for those in
backbone) are shown in Table 1.
E = (p − p) Q (p − p)
Q = diag (q1 , q2 , ..., q234 ) (3)
qi = V (p) − V (pi ) / qi
Where Q is an importance matrix whose diagonal elements represent the impor-
tance of each parameter, pi is the coefficient vector, the ith element is the pre-
dicted parameter, and the rest of elements are from the ground-truth p, V (·) is
the sparse landmark projection from rendered 3D shape.
In the training process, CNN first focuses on learning the coefficients with
large weights such as zoom, rotation, and translation. When the error is reduced,
the CNN model shifts to optimize less important parameters (such as shape and
expression parameters) while also ensures that high-priority coefficients meet the
requirements.
Vertex Distance Cost (VDC). The ultimate goal of the loss function is to
morph the 3DMM model to a real 3D face. Thus the vertex distance between
the fitted and real 3D faces is optimized
2
E = V (p) − V (pg ) (4)
Where V (·) is the sparse landmark projection from rendered 3D shape. Com-
pared with Parameter Distance Cost which minimize the distance between the
ground-truth and the current parameter, VDC better models the fitting error
by explicitly considering the semantics of each parameter.
182 H. An and T. Gao
Hardware/Software Configuration
CPU i7-8700K
GPU GTX2070
Operating System Windows10
Pytorch v1.2.0
the ground-truth using the standard rigid iterative closest point (ICP) approach.
Then, the standard NME is calculated by the size of the face bounding box. As
the results shown in Fig. 3, the NME of S3DFR is 2.23% and the NME of 3DDFA
is 2.43%. It shows that the proposed method is superior to the original method
in 3D face reconstruction accuracy.
The results of neutral 3D faces reconstruction and expressive 3D faces recon-
struction are shown in Fig. 4 and Fig. 5. It can be seen that S3DFR method is
more stable and reliable.
Table 3. The performance of NME (%) with different yaw angles on AFLW2000-3D
the reconstruction point cloud and the ground-truth point cloud projected on
the 2D plane. We use the standard NME as index to evaluate face alignment
accuracy. We report the NME with small, medium and large yaw angles on
AFLW2000-3D dataset. The results are shown in Table 3. Note that all images
from the dataset are used for evaluation to be consistent with the previous
work. It can be observed that our method yields the smallest average NME and
End-to-End 3D Face Model Reconstruction Method 185
standard deviation NME on the dataset. S3DFR performes even better than
3DDFA, reducing the NME by 0.98 on the AFLW2000-3D, especially in large
◦ ◦
poses (60 to 90 ). The standard deviation of S3DFR is 4.92.
References
1. Harilal, A., et al.: The wolf of SUTD (TWOS): a dataset of malicious insider threat
behavior based on a gamified competition. JoWUA 9(1), 54–85 (2018)
2. Blanz, V., Vetter, T., Rockwood, A.: A morphable model for the synthesis of 3D
faces, pp. 187–194 (2002)
3. Cao, C., Weng, Y., Zhou, S., Tong, Y., Zhou, K.: Facewarehouse: a 3D facial
expression database for visual computing. IEEE Trans. Vis. Comput. Graph. 20(3),
413–425 (1999)
186 H. An and T. Gao
4. Chen, C., Hou, Q., Zhou, K.: Displaced dynamic expression regression for real-time
facial tracking and animation (2014)
5. Feng, L., Dan, Z., Zhao, Q., Liu, X.: Joint face alignment and 3D face reconstruc-
tion (2016)
6. Grewe, C.M., Zachow, S.: Fully Automated and Highly Accurate Dense Correspon-
dence for Facial Surfaces (2016)
7. Güler, R.A., et al.: DenseReg: fully convolutional dense shape regression in-the-
wild
8. Kotenko, I.V., Kolomeets, M., Chechulin, A., Chevalier, C.: A visual analytics
approach for the cyber forensics based on different views of the network traffic.
JoWUA 9(2), 57–73 (2018)
9. Jackson, A.S., Bulat, A., Argyriou, V., Tzimiropoulos, G.: Large pose 3D face
reconstruction from a single image via direct volumetric CNN regression
10. Jeni, L.A., Cohn, J.F., Kanade, T.: Dense 3D face alignment from 2D videos in
real-time. In: 11th IEEE International Conference on Automatic Face and Gesture
Recognition (2015)
11. Jourabloo, A., Liu, X.: Pose-invariant face alignment via CNN-based dense 3D
model fitting
12. May, S., Droeschel, D., Fuchs, S., Holz, D., Nuchter, A.: Robust 3D-mapping with
time-of-flight cameras (2009)
13. Dou, P., Shah, S.K., Kakadiaris, I.A.: End-to-end 3D face reconstruction with deep
neural networks. In: CVPR, pp. 5908–5917 (2017)
14. Paysan, P., Knothe, R., Amberg, B., Romdhani, S., Vetter, T.: A 3D face model
for pose and illumination invariant face recognition, pp. 296–301 (2009)
15. Richardson, E., Sela, M., Kimmel, R.: 3D face reconstruction by learning from
synthetic data
16. Richardson, E., Sela, M., Or-El, R., Kimmel, R.: Learning detailed face reconstruc-
tion from a single image
17. Gupta, T., Choudhary, G., Sharma, V.: A survey on the security of pervasive online
social networks (POSNs). JISIS 8(2), 48–86 (2018)
18. Tatsuya Ohyanagi, T.I.: Implementation of an integrated common platform for zoo
operations. JISIS 8(3), 20–39 (2018)
19. Thies, J., Zollhöfer, M., Stamminger, M., Theobalt, C., Nießner, M.: Demo of
face2face: real-time face capture and reenactment of RGB videos. In: ACM SIG-
GRAPH 2016 Emerging Technologies (2016)
20. Tran, A.T., Hassner, T., Masi, I., Medioni, G.: Regressing robust and discriminative
3D morphable models with a very deep neural network (2016)
21. Yao, F., Fan, W., Shao, X., Wang, Y., Xi, Z.: Joint 3D face reconstruction and
dense alignment with position map regression network (2018)
22. Yu, R., Saito, S., Li, H., Ceylan, D., Li, H.: Learning dense facial corresponden-CES
in unconstrained images (2017)
23. Zhang, R., Tsai, P.S., Cryer, J.E., Shah, M.: Shape-from-shading: a survey. IEEE
Trans. Pattern Anal. Mach. Intell. 21(8), 690–706 (2002)
24. Zhu, X., Zhen, L., Liu, X., Shi, H., Li, S.Z.: Face alignment across large poses: a 3D
solution. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition
(CVPR) (2016)
25. Zhu, X., Zhen, L., Yan, J., Dong, Y., Li, S.Z.: High-fidelity pose and expression nor-
malization for face recognition in the wild. In: 2015 IEEE Conference on Computer
Vision and Pattern Recognition (CVPR) (2015)
Author Index