Loading [MathJax]/extensions/MathMenu.js
Baojun Chen - IEEE Xplore Author Profile

Showing 1-25 of 56 results

Filter Results

Show

Results

The frequency of cyber attacks targeting individuals, businesses, and organizations globally has escalated in recent years. The evolution of obfuscated malware, designed to evade detection, has been unprecedented, employing new and sophisticated mechanisms to breach systems, steal sensitive data, and disrupt operations. This work advances research on obfuscated malware detection by offering a comp...Show More
The widespread adoption of Internet of Things (IoT) devices presents numerous challenges, including security vulnerabilities, scalability, data management, and reliability concerns. Device identification is of paramount importance for addressing these challenges as it serves as a foundation for implementing security measures, a monitoring system to set up access control and regulate device usage w...Show More
In the realm of modern transportation, Electric Vehicles (EVs) have emerged as a promising solution to address environmental concerns and reduce dependence on fossil fuels. However, the integration of advanced technologies and connectivity features in EVs makes their charging networks vulnerable to various cyber threats and vulnerabilities, potentially compromising their functionality, reliability...Show More
The Internet of Things (IoT) is a network of interconnected devices and systems that collect and exchange data. Resource-constrained IoT devices are particularly susceptible to attacks due to their widespread use and often inadequate security setups, leading to potential vulnerabilities in individual devices. Traditional Signature-based Intrusion Detection Systems (SIDS) are insufficient for the d...Show More
Resource Depletion Attacks pose significant challenges to the stability and efficiency of 5G networks, with potential repercussions on service availability, network performance, and user experience. This problem is motivated by the need to understand the complexities of RDAs and their specific impact on the 5G Core networks, to develop effective countermeasures. First, we investigate the vulnerabi...Show More
Homomorphic secret sharing (HSS) is a cryptographic technique that combines the principles of secret sharing and homomorphic encryption (HE). It offers a powerful way to securely distribute sensitive data among multiple parties while enabling computations to be performed on the shared data without revealing the individual inputs. The process of HSS entails significant computational load. Due to th...Show More
In the digital age, this pioneering investigation is the initial endeavor to confront a crucial challenge in image forensics, marking a notable advancement. The implementation of photoresponse non-uniformity (PRNU) and convolutional neural networks (CNNs) has demonstrated remarkable effectiveness in their respective applications, leading to a noteworthy enhancement in forensic techniques for image...Show More
The rapid proliferation of embedded devices has driven the expansion of the Internet of Things (IoT) across various sectors. However, this growth has exposed a vulnerability, especially in smart homes, where attackers attempt to exploit security weaknesses. Furthermore, many existing user authentication methods in the literature come with added computational complexity and require enhancements to ...Show More
Online Social Network (OSN) platforms provide a valuable source of information, which includes user profiles and social connections that can be used to develop behavioural models of individuals. Tweets of four Twitter users are analysed and a method is proposed to identify users. The Twitter text data is pre-processed to get meaningful words to extract features of every user. Term Frequency-Invers...Show More
Drones are now widely used and have grown in popularity in recent years. However, as a result of their greater use, there have been more crimes involving drones. In this explanatory case study, digital forensics methods are used to analyze a DJI Spark drone discovered at a crime scene. The purpose of this inquiry is to obtain vital data that might help with the investigation of drone-related crime...Show More
Network layer protocols that provide privacy, such as IPSec, are widely used in Virtual Private Network(VPN) services to provide security between two networks or hosts. This work analyzes the security of Internet Protocol Security (IPSec) based open-source VPNs and the vulnerabilities that may compromise their security. VPNs were configured with user IDs and RSA Certificates for authentication and...Show More
Homomorphic encryption (HE) facilitates computing over encrypted data without using the secret keys. It is currently inefficient for practical implementation on the Internet of Things (IoT). However, the performance of these HE schemes may increase with optimized libraries and hardware capabilities. Thus, implementing and analyzing HE schemes and protocols on resource-constrained devices is essent...Show More
The emergence of edge computing and the Internet of Things (IoT) is primarily concerned with security, IoT applications are migrating to edge devices. As a result, potential risks are rising and IoT edge device data access is turning into a serious issue. The IoT devices security is intrinsically reliant on the internal hardware and software building block that the application has access to. If an...Show More
Mobile Edge Computing (MEC) is a 5G tech-nology, proposed by European Telecommunications Standards Institute (ETSI) Industry Specification Group as an IT service platform with cloud computing capabilities. MEC is used for performance-aware real-time applications to manage and analyze data in public and private cloud storage. However, energy and computing capabilities of mobile devices and PDAs (Pe...Show More
Multi-access Edge Computing (MEC) also known as Mobile Edge Computing is a type of edge computing that extends the capabilities of cloud computing by bringing resources to the edge of the network. Traditional cloud computing occurs on remote servers far away from users and IoT devices, whereas MEC allows computing processes to take place at base stations, central offices or other aggregation point...Show More
The Industrial Internet of Things (IIoT) enhances the benefit of the Internet of Things (IoT) to a higher level, especially in industries where human error can lead to catastrophic effects. However, security is a major concern in IIoT as hackers can gain access to connected systems, thus potentially subjecting operations to a shutdown. Besides, the outbreak of the COVID-19 pandemic changed the ope...Show More
The rapid proliferation of embedded devices has led to the growth of the Internet of Things (IoT) with applications in numerous domains such as home automation, healthcare, education and agriculture. However, many of the connected devices particularly in smart homes are the target of attacks that try to exploit security vulnerabilities such as hard-coded passwords and insecure data transfer. Recen...Show More
Access Points (AP) are traditionally used to provide cost-effective, high speed Wi-Fi connectivity to homes, organizations and communities. Despite Wi-Fi providing numerous benefits such as flexibility, scalability and ease of deployment, it is susceptible to numerous vulnerabilities due to the presence of rogue access points (Rogue AP). In particular, intruders can eavesdrop, exploit, launch remo...Show More
Hardware Trojans are modifications made by malicious insiders or third party providers during the design or fabrication phase of the IC (Integrated Circuits) design cycle in a covert manner. These cause catastrophic consequences ranging from manipulating the functionality of individual blocks to disabling the entire chip. Thus, a need for detecting trojans becomes necessary. In this work, we propo...Show More
Security in 5G Networks is of paramount importance due to the safety critical nature of the mobile data coupled with the insecurity of cellular infrastructure. Attackers can compromise mobile devices using various methods such as malware, mobile bots, viruses, etc. Further, malicious connections generated by the compromised devices could potentially deplete the resources of the cellular infrastruc...Show More
The advent of 5G, one of the most recent and promising technologies currently under deployment, fulfills the emerging needs of mobile subscribers by introducing several new technological advancements. However, this may lead to numerous attacks in the emerging 5G networks. Thus, to guarantee the secure transmission of user data, 5G Authentication protocols such as Extensible Authentication Protocol...Show More
IoT security is of paramount concern due to poorly configured devices that can often serve as entry points for cyber attacks. Developing Physically Unclonable Functions (PUFs) and making them resilient can enhance hardware security. In this work, we propose a XOR-mesh based PUF composed of network of XOR-gates and multiplexers. The proposed PUF was implemented on an Artix-7 FPGA and evaluated in t...Show More
Lightweight ciphers such as ASCON facilitate ease of implementation as well as provide better performance over conventional ciphers, thus making it suitable for resource-constrained devices. However, hardware implementations of these ciphers are vulnerable to a multitude of physical attacks (such as fault injections) requiring dedicated countermeasures thus causing a negative impact on security, p...Show More
Critical Infrastructures are one of the vital systems that support modern societies. The adoption of technologies like Industry 4.0, Industrial Internet of Things (IIoT) in critical infrastructures have made it a lucrative target for cyberattackers. Protecting critical infrastructure is of paramount importance due to the sensitive nature of the data coupled with the resource-constrained nature of ...Show More
Recent advancements in the field of in-vehicle network and wireless communication, has been steadily progressing. Also, the advent of technologies such as Vehicular Adhoc Networks (VANET) and Intelligent Transportation System (ITS), has transformed modern automobiles into a sophisticated cyber-physical system rather than just a isolated mechanical device. Modern automobiles rely on many electronic...Show More