Difference between revisions of "UNIK4750/List of papers - 2019"

From its-wiki.no
Jump to: navigation, search
(Created page with "== Evaluation criteria == Your presentation is expected to last for 15 minutes, you will be stopped at 16:00. That means you need to identify the key messages of the selected...")
 
(List of papers for TEK5530)
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
== Evaluation criteria ==
 
== Evaluation criteria ==
Your presentation is expected to last for 15 minutes, you will be stopped at 16:00. That means you need to identify the key messages of the selected paper. There is penalty for both being too short and for being too long. You will get questions about your paper and your presentation. One block of presentation and questions will approximately take 20 min.
+
Your presentation is expected to last for 25 minutes, you will be stopped at 26:00. That means you need to identify the key messages of the selected paper. There is penalty for both being too short and for being too long. You will get questions about your paper and your presentation. One block of presentation and questions will approximately take 30 min.
  
 
Your presentation will be evaluated with respect to the following criteria:
 
Your presentation will be evaluated with respect to the following criteria:
Line 22: Line 22:
 
* ''Provide examples, and respect the time''
 
* ''Provide examples, and respect the time''
  
= List of papers for UNIK 4750 =
+
The quality of your presentation will weigh 20% of your final grade.
 +
 
 +
= List of papers for TEK5530 =
 
Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to start with Google Scholar or Microsoft Academics. Read more on:  [[Search_for_literature|Guide on how to search for Literature]]
 
Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to start with Google Scholar or Microsoft Academics. Read more on:  [[Search_for_literature|Guide on how to search for Literature]]
  
Line 31: Line 33:
 
:2) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6142258&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Zhu, B., Joseph, A, and Sastry, S., "A Taxonomy of Cyber Attacks on SCADA Systems"]
 
:2) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6142258&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Zhu, B., Joseph, A, and Sastry, S., "A Taxonomy of Cyber Attacks on SCADA Systems"]
  
Bikram :3) [http://link.springer.com/article/10.1007/s11227-015-1547-0 Jeong Yeon, Yanghoon Kim, "Benefits of cloud computing adoption for smart grid security from security perspective"]
+
:3) [http://link.springer.com/chapter/10.1007/978-3-319-49148-6_6 Wenlin Han, Yang Xiao, "Big Data Security Analytic for Smart Grid with Fog Nodes"]
 
+
:4) [http://link.springer.com/chapter/10.1007/978-3-319-49148-6_6 Wenlin Han, Yang Xiao, "Big Data Security Analytic for Smart Grid with Fog Nodes"]
+
 
+
:5) [http://www.sciencedirect.com/science/article/pii/S1877705816318811 Yuntao Ye, , Lili Liang, Hongli Zhao, Yunzhong Jiang, "The System Architecture of Smart Water Grid for Water Security"]
+
 
+
:6) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006441&filter%3DAND%28p_IS_Number%3A7006395%29 Barreto, C., Giraldo, J. ; Cardenas, A.A. ; Mojica-Nava, E., "Control Systems for the Power Grid and Their Resiliency to Attacks", Security & Privacy, IEEE  (Volume:12 ,  Issue: 6 )]
+
 
+
:7) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006406&filter%3DAND%28p_IS_Number%3A7006395%29 McParland, C.,  Peisert, S. ; Scaglione, A., "Monitoring Security of Networked Control Systems: It's the Physics"]
+
 
+
:8) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006438&filter%3DAND%28p_IS_Number%3A7006395%29 Peisert, S., Davis ; Margulies, J., Byres, E., Dorey, P., "Control Systems Security from the Front Lines"]
+
 
+
:9) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006412&filter%3DAND%28p_IS_Number%3A7006395%29 Kargl, F. ; Inst. of Distrib. Syst., Univ. of Ulm, Ulm, Germany ;  van der Heijden, R.W. ;  Konig, H. ;  Valdes, A., "Insights on the Security and Dependability of Industrial Control Systems"]
+
 
+
:10) [http://www.sciencedirect.com/science/article/pii/S1389128616301359 Mingkui Wei, Wenye Wang, "Data-centric threats and their impacts to real-time communications in smart grid"]
+
 
+
:11) [https://library.e.abb.com/public/dc58deb3e38a4f42b398576160621a04/glendale-smart-grid-network.pdf Glendale Smart Grid Case study, ABB]
+
 
+
:12) [http://www.sciencedirect.com/science/article/pii/S0167404816300876 Langer, Lucie et al., "From old to new: Assessing cybersecurity risks for an evolving smart grid"]
+
 
+
:13) [http://ieeexplore.ieee.org/document/7565732/?reload=true Debiao He et al., "Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography"]
+
 
+
:14) [http://aircconline.com/ijnsa/V8N2/8216ijnsa06.pdf Elkhodr, Mahmoud ; Shahrestani, Seyed ; Cheung, Hon, "The Internet of Things : New Interoperability, Management and Security Challenges"]
+
 
+
Andreas :15) [http://ieeexplore.ieee.org/document/7562568/ Mohsen Nia, A., Jha, N.K., "A Comprehensive Study of Security of Internet-of-Things"]
+
 
+
:16) [https://thesai.org/Downloads/Volume7No12/Paper_54-Software_Defined_Security_Service_Provisioning.pdf Idris, Faraz, Hameed, Sufian, "Software Defined Security Service Provisioning Framework for Internet of Things"]
+
 
+
Sondre :17)  [http://www.sciencedirect.com/science/article/pii/S0267364916301169 Weber, Rolf H., Studer, Evelyne, "Cybersecurity in the Internet of Things: Legal aspects"]
+
 
+
:18) [http://ieeexplore.ieee.org/document/7478513/ Ali, Mazhar et al., "Security and Dependability of Cloud-Assisted Internet of Things"]
+
 
+
:19) [http://www.sciencedirect.com/science/article/pii/S1389128616302663 Sicari, Sabrina et al., "Security policy enforcement for networked smart objects"]
+
 
+
:20) [http://ieeexplore.ieee.org/document/7917622/ Anna Kornfeld Simpson et al., "Securing Vulnerable Home IoT Devices With an In-hub Security Manager]
+
  
:21) [http://ieeexplore.ieee.org/document/7998185/ Fari Assaderaghi et al., "Privacy and Security: Key Requirements for Sustainable IoT Growth"]
+
:4) [http://www.sciencedirect.com/science/article/pii/S1877705816318811 Yuntao Ye, , Lili Liang, Hongli Zhao, Yunzhong Jiang, "The System Architecture of Smart Water Grid for Water Security"]
  
:22) [http://ieeexplore.ieee.org/document/7917637/ Anna Sojka-Piotrowska, Peter Langendörfer, Shortening the security parameters in lightweight WSN applications for IoT - lessons learned]
+
:5) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006441&filter%3DAND%28p_IS_Number%3A7006395%29 Barreto, C., Giraldo, J. ; Cardenas, A.A. ; Mojica-Nava, E., "Control Systems for the Power Grid and Their Resiliency to Attacks", Security & Privacy, IEEE  (Volume:12 ,  Issue: 6 )]
  
Simen :23) [http://ieeexplore.ieee.org/document/8114479/ Goran Pulkkis et al., "Secure and Reliable Internet of Things Systems for Healthcare"]
+
:6) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006406&filter%3DAND%28p_IS_Number%3A7006395%29 McParland, C.,  Peisert, S. ; Scaglione, A., "Monitoring Security of Networked Control Systems: It's the Physics"]
  
Christoffer, :24) [http://ieeexplore.ieee.org/document/8123562/ Manuel Barbosa et al., "SAFETHINGS: Data Security by Design in the IoT"]
+
:7) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006438&filter%3DAND%28p_IS_Number%3A7006395%29 Peisert, S., Davis ; Margulies, J., Byres, E., Dorey, P., "Control Systems Security from the Front Lines"]
  
:25) [http://ieeexplore.ieee.org/document/8188589/ Botir Usmonov et al., "The cybersecurity in development of IoT embedded technologies"]
+
:8) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006412&filter%3DAND%28p_IS_Number%3A7006395%29 Kargl, F. ; Inst. of Distrib. Syst., Univ. of Ulm, Ulm, Germany ;  van der Heijden, R.W. ;  Konig, H. ;  Valdes, A., "Insights on the Security and Dependability of Industrial Control Systems"]
  
:26) [http://ieeexplore.ieee.org/document/8070757/ Vishwesh Nagamalla, Aruna Varanasi, "A review of security frameworks for Internet of Things"]
+
:9) [http://www.sciencedirect.com/science/article/pii/S1389128616301359 Mingkui Wei, Wenye Wang, "Data-centric threats and their impacts to real-time communications in smart grid"]
  
Rambi :27) [http://ieeexplore.ieee.org/document/8058301/ P. Vagdevi et al., "Home: IOT based home automation using NFC"]
+
:10) [http://www.sciencedirect.com/science/article/pii/S0167404816300876 Langer, Lucie et al., "From old to new: Assessing cybersecurity risks for an evolving smart grid"]
  
:28) [http://ieeexplore.ieee.org/document/8038504/ Hammad Iqbal et al., "Augmenting Security of Internet-of-Things Using Programmable Network-Centric Approaches: A Position Paper"]
+
:11) [http://ieeexplore.ieee.org/document/7565732/?reload=true Debiao He et al., "Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography"]
  
:29) [http://ieeexplore.ieee.org/document/8252938/ Thales L. von Sperling et al., "Tracking intruders in IoT networks by means of DNS traffic analysis"]
+
:12) [http://aircconline.com/ijnsa/V8N2/8216ijnsa06.pdf Elkhodr, Mahmoud ; Shahrestani, Seyed ; Cheung, Hon, "The Internet of Things : New Interoperability, Management and Security Challenges"]
  
:30) [http://ieeexplore.ieee.org/document/8249286/ Radek Krejci et al., "Security survey of the IoT wireless protocols"]
+
:13) [https://thesai.org/Downloads/Volume7No12/Paper_54-Software_Defined_Security_Service_Provisioning.pdf Idris, Faraz, Hameed, Sufian, "Software Defined Security Service Provisioning Framework for Internet of Things"]
  
:31) [http://ieeexplore.ieee.org/document/8241993/ Markus Endler et al., "An approach for secure edge computing in the Internet of Things"]
+
:14) [http://ieeexplore.ieee.org/document/7478513/ Ali, Mazhar et al., "Security and Dependability of Cloud-Assisted Internet of Things"]
  
:32) [http://ieeexplore.ieee.org/document/8027263/ Mahdi Ben Alaya et al., "Semantic-Aware IoT Platforms"]
+
:15) [http://ieeexplore.ieee.org/document/7917622/ Anna Kornfeld Simpson et al., "Securing Vulnerable Home IoT Devices With an In-hub Security Manager]
  
:33) [http://ieeexplore.ieee.org/document/8259697/ Mohammed Rebbah et al., "Intrusion detection in Cloud Internet of Things environment"]
+
:16) [http://ieeexplore.ieee.org/document/7998185/ Fari Assaderaghi et al., "Privacy and Security: Key Requirements for Sustainable IoT Growth"]
  
Salman :34) [http://ieeexplore.ieee.org/document/7917634/ Ali Dorri et al., "Blockchain for IoT security and privacy: The case study of a smart home"]
+
:17) [http://ieeexplore.ieee.org/document/7917637/ Anna Sojka-Piotrowska, Peter Langendörfer, Shortening the security parameters in lightweight WSN applications for IoT - lessons learned]
  
:35) [https://www.sciencedirect.com/science/article/pii/S1877050917317246 Salaheddin Darwish et al., "Towards Composable Threat Assessment for Medical IoT (MIoT)"]
+
:18) [http://ieeexplore.ieee.org/document/8188589/ Botir Usmonov et al., "The cybersecurity in development of IoT embedded technologies"]
  
:36) [https://www.sciencedirect.com/science/article/pii/S2314728816300149 Partha Pratim Ray, "A Survey of IoT Cloud Platforms"]
+
:19) [http://ieeexplore.ieee.org/document/8070757/ Vishwesh Nagamalla, Aruna Varanasi, "A review of security frameworks for Internet of Things"]
  
Junaid  :37) [https://www.sciencedirect.com/science/article/pii/S2212827116307880 D. Mourtzis et al., "Industrial Big Data as a Result of IoT Adoption on Manufacturing"]
+
:20) [http://ieeexplore.ieee.org/document/8252938/ Thales L. von Sperling et al., "Tracking intruders in IoT networks by means of DNS traffic analysis"]
  
:38) [https://www.sciencedirect.com/science/article/pii/S1877050916302721 Nonhlanhla Ntuli, Adnan Abu-Mahfouz, "A Simple Security Architecture for Smart Water Management System"]
+
:21) [http://ieeexplore.ieee.org/document/8249286/ Radek Krejci et al., "Security survey of the IoT wireless protocols"]
  
:39) [https://www.sciencedirect.com/science/article/pii/S2352864817300214 Arbia Riahi Sfar et al., "A Roadmap for Security Challenges in the Internet of Things"]
+
:22) [http://ieeexplore.ieee.org/document/8241993/ Markus Endler et al., "An approach for secure edge computing in the Internet of Things"]
  
:40) [https://www.sciencedirect.com/science/article/pii/S2351978917306820 T. Pereira et al., "Network and Information Security Challenges Within Industry 4.0 Paradigm"]
+
:23) [http://ieeexplore.ieee.org/document/8259697/ Mohammed Rebbah et al., "Intrusion detection in Cloud Internet of Things environment"]
  
+1 Bendik: [https://link.springer.com/chapter/10.1007%2F978-3-319-28077-6_12 Jonida Milaj, Jeanne Pia Mifsud Bonnici, "Privacy Issues in the Use of Smart Meters—Law Enforcement Use of Smart Meter Data"]
+
:24) [https://www.sciencedirect.com/science/article/pii/S2314728816300149 Partha Pratim Ray, "A Survey of IoT Cloud Platforms"]
  
 +
:25) [https://www.sciencedirect.com/science/article/pii/S2352864817300214 Arbia Riahi Sfar et al., "A Roadmap for Security Challenges in the Internet of Things"]
  
 
</big>
 
</big>

Latest revision as of 22:08, 3 February 2019

Evaluation criteria

Your presentation is expected to last for 25 minutes, you will be stopped at 26:00. That means you need to identify the key messages of the selected paper. There is penalty for both being too short and for being too long. You will get questions about your paper and your presentation. One block of presentation and questions will approximately take 30 min.

Your presentation will be evaluated with respect to the following criteria:

Knowledge and Overview over topics in the paper

  • what is the paper about, which specific aspects are addressed?

Identification of key findings of the paper:

  • why are the findings key findings, to what extend are they different from the state-of-knowledge?
  • what are the strengths/weaknesses of the approaches being mentioned

Scientifically precise presentation

  • Be precise in your formulations, avoid story telling.
  • Use numbers where appropriate, e.g. 20% more instead of much more

Evaluation of the paper

  • what is your take on the paper? Criticism, own thoughts,...

Style:

  • clear structure, clear and concise slides
  • Provide examples, and respect the time

The quality of your presentation will weigh 20% of your final grade.

List of papers for TEK5530

Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to start with Google Scholar or Microsoft Academics. Read more on: Guide on how to search for Literature

1) Stankovic, J.A., "Research Directions for the Internet of Things"
2) Zhu, B., Joseph, A, and Sastry, S., "A Taxonomy of Cyber Attacks on SCADA Systems"
3) Wenlin Han, Yang Xiao, "Big Data Security Analytic for Smart Grid with Fog Nodes"
4) Yuntao Ye, , Lili Liang, Hongli Zhao, Yunzhong Jiang, "The System Architecture of Smart Water Grid for Water Security"
5) Barreto, C., Giraldo, J. ; Cardenas, A.A. ; Mojica-Nava, E., "Control Systems for the Power Grid and Their Resiliency to Attacks", Security & Privacy, IEEE (Volume:12 , Issue: 6 )
6) McParland, C., Peisert, S. ; Scaglione, A., "Monitoring Security of Networked Control Systems: It's the Physics"
7) Peisert, S., Davis ; Margulies, J., Byres, E., Dorey, P., "Control Systems Security from the Front Lines"
8) Kargl, F. ; Inst. of Distrib. Syst., Univ. of Ulm, Ulm, Germany ; van der Heijden, R.W. ; Konig, H. ; Valdes, A., "Insights on the Security and Dependability of Industrial Control Systems"
9) Mingkui Wei, Wenye Wang, "Data-centric threats and their impacts to real-time communications in smart grid"
10) Langer, Lucie et al., "From old to new: Assessing cybersecurity risks for an evolving smart grid"
11) Debiao He et al., "Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography"
12) Elkhodr, Mahmoud ; Shahrestani, Seyed ; Cheung, Hon, "The Internet of Things : New Interoperability, Management and Security Challenges"
13) Idris, Faraz, Hameed, Sufian, "Software Defined Security Service Provisioning Framework for Internet of Things"
14) Ali, Mazhar et al., "Security and Dependability of Cloud-Assisted Internet of Things"
15) Anna Kornfeld Simpson et al., "Securing Vulnerable Home IoT Devices With an In-hub Security Manager
16) Fari Assaderaghi et al., "Privacy and Security: Key Requirements for Sustainable IoT Growth"
17) Anna Sojka-Piotrowska, Peter Langendörfer, Shortening the security parameters in lightweight WSN applications for IoT - lessons learned
18) Botir Usmonov et al., "The cybersecurity in development of IoT embedded technologies"
19) Vishwesh Nagamalla, Aruna Varanasi, "A review of security frameworks for Internet of Things"
20) Thales L. von Sperling et al., "Tracking intruders in IoT networks by means of DNS traffic analysis"
21) Radek Krejci et al., "Security survey of the IoT wireless protocols"
22) Markus Endler et al., "An approach for secure edge computing in the Internet of Things"
23) Mohammed Rebbah et al., "Intrusion detection in Cloud Internet of Things environment"
24) Partha Pratim Ray, "A Survey of IoT Cloud Platforms"
25) Arbia Riahi Sfar et al., "A Roadmap for Security Challenges in the Internet of Things"