Browsing by Author "Ayres, Nick"
Now showing 1 - 6 of 6
Results Per Page
Sort Options
Item Open Access The end of Eavesdropping Attacks through the Use of Advanced End to End Encryption Mechanisms(IEEE, 2022-05-02) Maglaras, Leandros; Ayres, Nick; Moschoyiannis, Sotiris; Tassiulas, LeandrosIn this article we present our novel Secure Node End-2-End Encryption (SNE2EE) mechanism that is under implementation. This mechanism offers both a software and hardware solution by extending encryption technologies and techniques to the end nodes to increase privacy. The SNE2EE mechanism can address the issues concerning spyware and stalkerware at both the individual and community level.Item Metadata only IoT: Communication protocols and security threats(Elsevier, 2023-01-23) Gerodimos, Apostolos; Maglaras, Leandros; Ferrag, Mohamed Amine; Ayres, Nick; Kantzavelou, IoannaIn this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. Moreover, we analyze security threats, and general implementation problems, presenting several sectors that can benefit the most from IoT development. Discussion over the findings of this review reveals open issues and challenges and specifies the next steps required to expand and support IoT systems in a secure framework.Item Open Access A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks(MDPI, 2021-09-29) Lambat, Yahya; Ayres, Nick; Maglaras, Leandros; Ferrag, Mohamed AmineIt is a well known fact that the weakest link in a cyber secure system is the people who configure, manage or use it. Security breaches are persistently being attributed to human error. Social engineered based attacks are becoming more sophisticated to such an extent where they are becoming increasingly more difficult to detect. Companies implement strong security policies as well as provide specific training for employees to minimise phishing attacks, however these practices rely on the individual adhering to them. This paper explores fuzzy logic and in particular a Mamdani type fuzzy inference system to determine an employees susceptibility to phishing attacks. To negate and identify the susceptibility levels of employees to social engineering attacks a Fuzzy Inference System FIS was created through the use of fuzzy logic. The utilisation of fuzzy logic is a novel way in determining susceptibility due to its ability to resemble human reasoning in order to solve complex inputs, or its Interpretability and simplicity to be able to compute with words. This proposed fuzzy inference system is based on a number of criteria which focuses on attributes relating to the individual employee as well as a companies practices and procedures and through this an extensive rule base was designed. The proposed scoring mechanism is a first attempt towards a holistic solution. To accurately predict an employees susceptibility to phishing attacks will in any future system require a more robust and relatable set of human characteristics in relation to the employee and the employer.Item Open Access Modern Authentication Methods: A comprehensive survey(IntechOpen, 2022-06) Papathanasaki, Maria; Maglaras, Leandros; Ayres, NickThis paper presents a comprehensive investigation of modern authentication schemes. We start with the importance of authentication methods and the different authentication processes. Then we present the authentication criteria used and we perform a comparison of them in terms of universality, uniqueness, collectability, performance, acceptability, and spoofing. Finally, we present MFA challenges and security issues and present future directions.Item Embargo Reliability, Security and Privacy in Power Grids(IEEE, 2022-08-29) Maglaras, Leandros; Ferrag, Mohamed Amine; Janicke, Helge; Ayres, Nick; Tassiulas, LeandrosAs we move from traditional power grids to smart grids, new threats both physical and digital arise. This article focuses on cyber security in power grids, highlighting the threats and vulnerabilities of those cyber-physical systems, as well as presenting future solutions.Item Open Access Uncuffed: A Blockchain-based Secure Messaging System(ACM, 2021) Dimitriadis, Vasileios; Maglaras, Leandros; Polemi, Nineta; Kantzavelou, Ioanna; Ayres, NickSecure messaging is very important especially in critical applications like communication of automated cars. In this article we present a simulation of a blockchain messaging platform based on the Bitcoin protocol. The mechanism can be used for exchanging privately and securely messages and images. Each member of the blockchain can become a miner and collect rewards or just a plebeian client and send messages without actively using the platform.