Publications

Artorias: IoT Security Testing Framework

Published in The 26th International Conference on Telecommunications (ICT 2019), April 8-10 2019, Hanoi, Vietnam, 2019

Abstract: Products that are connected and controlled remotely via the Internet are becoming more prevalent, and as a result, homes and businesses have ever increasing attack surfaces on their networks. To raise the standard of security, companies need more ways to automate testing of the most commonly found issues with IoT devices against their products. The creation of an automated security testing framework, such as Artorias, allows companies to automate the process of finding easy to identify problems, saving time for more advanced and manual processes of security and functional testing on a product. To show the framework’s stability and reliability, things such as proper coding standards should be adhered to, proper management of the project should be present, and unit-tests or code coverage of the framework should be created and maintained. This ongoing project bridges together the principles of security and proper planning and development of a larger programming effort. In this paper, we introduce the IoT Security Testing Framework Artorias, and present an extensible framework that interested research community members can extend for more coverage on privacy and security issues of IoT devices.

Recommended citation: Bryer Jeannotte, Ali Tekeoglu, "Artorias: IoT Security Testing Framework", The 26th International Conference on Telecommunications (ICT 2019), Apr 8-10 2019, Hanoi, Vietnam.

Analyzing the Security of Bluetooth Low Energy

Published in The 18th International Conference on Electronics, Information, and Communication (ICEIC 2019), Jan 22-25 2019, Auckland, New Zealand, 2019

Abstract: Internet of Things devices have spread to near ubiquity this decade. All around us now lies an invisible mesh of communication from devices embedded in seemingly everything. Inevitably some of that communication flying around our heads will contain data that must be protected or otherwise shielded from tampering. The responsibility to protect this sensitive information from malicious actors as it travels through the air then falls upon the standards used to communicate this data. Bluetooth Low Energy (BLE) is one of these standards, the aim of this paper is to put its security standards to test. By attempting to exploit its vulnerabilities we can see how secure this standard really is. In this paper, we present steps for analyzing the security of BLE devices using open-source hardware and software.

Recommended citation: Seth Sevier, Ali Tekeoglu, "Analyzing the Security of Bluetooth Low Energy", The 18th International Conference on Electronics, Information, and Communication (ICEIC 2019), Jan 22-25 2019, Auckland, New Zealand.

Semi-Synchronocity Enabling Protocol and Pulsed Injection Protocol for a Distributed Ledger System

Published in 13th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Taichung, Taiwan, 2018

Abstract: Distributed ledger technologies have a central problem that involves the latency. When transactions are to be accepted in the ledger, latency is incurred due to transaction processing and verification. For efficient systems, high latency should be avoided for the governance of the ledger. To help reduce latency, we offer a distributed ledger architecture, Tango, that mimics the Iota-tangle design as articulated by Popov in his seminal paper. We introduce a semi-synchronous transaction entry protocol layer to avoid asynchronicity in the system since an asynchronous system has a high latency. We further model periodic pulsed injections into the evaluation layer from the entry layer to regulate the performance of the system.

Recommended citation: Bruno Andriamanalimanana, Chen-Fu Chiang, Jorge Novillo, Sam Sengupta, Ali Tekeoglu, "Semi-Synchronocity Enabling Protocol and Pulsed Injection Protocol for a Distributed Ledger System", The 13th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC'18), October 27, 2018, Taichung, Taiwan.

Parameterized Pulsed Transaction Injection Computation Model and Performance Optimizer for IOTA-Tango

Published in 13th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Taichung, Taiwan, 2018

Abstract: To keep a cryptocurrency system at its optimal performance, it is necessary to utilize the resources and avoid latency in its network. To achieve this goal, dynamically and efficiently injecting the unverified transactions to enable synchronicity based on the current system configuration and the traffic of the network is crucial. To meet this need, we design the pulsed transaction injection parameterization (PTIP) protocol to provide a preliminary dynamic injection mechanism. To further assist the network to achieve its subgoals based on various house policies (such as maximal revenue to the network or maximum throughput of the system), we turn the house policy based optimization as a 0/1 knapsack problem. To efficiently solve these NP-hard problems, we adapt and improve a fully polynomial time approximation scheme (FPTAS) and dynamic programming as components in our approximate optimization algorithm.

Recommended citation: Bruno Andriamanalimanana, Chen-Fu Chiang, Jorge Novillo, Sam Sengupta, Ali Tekeoglu, "Parameterized Pulsed Transaction Injection Computation Model And Performance Optimizer For IOTA-Tango", The 13th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC'18), October 27, 2018, Taichung, Taiwan.

A Probabilistic Model of Periodic Pulsed Transaction Injection

Published in 2nd Cyber Security In Networking Conference (CSNet'18), Paris, France, 2018

Abstract: A central problem with distributed ledger technologies involves the latency that must be incurred in processing and verifying transactions to be accepted as permanent records in the ledger. In many applications, high latency is simply not a tolerable aspect of the governance of the ledger. To help reduce latency, we first propose a theoretical pulsed injection protocol then apply innovative inventory theory onto the unverified transactions in the system. To utilize a probabilistic model for the pulsed injection of transactions, we calibrate the optimum pulsed transaction injection batch size to ensure equilibrium and optimal performance of the system.

Recommended citation: Bruno Andriamanalimanana, Chen-Fu Chiang, Jorge Novillo, Sam Sengupta, Ali Tekeoglu, "A Probabilistic Model of Periodic Pulsed Transaction Injection" CSNet2018, October 24-26, Paris. France.

Tango: The Beginning - A Semi-Synchronous Iota-Tangle Type Distributed Ledger with Periodic Pulsed Entries

Published in 2nd Cyber Security In Networking Conference (CSNet'18), Paris, France., 2018

Abstract: A central problem with distributed ledger technologies involves the latency that must be incurred in processing and verifying transactions to be accepted as permanent records in the ledger. In many applications, high latency is simply not a tolerable aspect of the governance of the ledger. To help reduce latency, we offer a distributed ledger architecture, Tango, that mimics the Iota-tangle design as articulated by Popov in his seminal paper. A main idea is the introduction of a semi-synchronous transaction entry protocol layer. We model periodic pulsed injections into the evaluation layer from the entry layer.

Recommended citation: Bruno Andriamanalimanana, Chen-Fu Chiang, Jorge Novillo, Sam Sengupta, Ali Tekeoglu, "Tango: The Beginning - A Semi-Synchronous Iota-Tangle Type Distributed Ledger with Periodic Pulsed Entries." CSNet2018, October 24-26, Paris, France.