Está en la página 1de 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/316981947

Intrusion and Attacks over Mobile Networks and Cloud Health Systems

Conference Paper · May 2017


DOI: 10.1109/INFCOMW.2017.8116345

CITATIONS READS
0 180

4 authors:

Loai Tawalbeh Hala Tawalbeh


University of California, Santa Barbara Jordan University of Science and Technology
84 PUBLICATIONS   786 CITATIONS    10 PUBLICATIONS   64 CITATIONS   

SEE PROFILE SEE PROFILE

Houbing Song Yaser Jararweh


Embry-Riddle Aeronautical University Jordan University of Science and Technology
212 PUBLICATIONS   2,795 CITATIONS    239 PUBLICATIONS   1,959 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Cloud Computing View project

Energy Optimization Techniques in Cloud and Mobile Cloud Computing View project

All content following this page was uploaded by Loai Tawalbeh on 26 May 2017.

The user has requested enhancement of the downloaded file.


Intrusion and Attacks over Mobile Networks and Cloud Health Systems

Lo’ai A. Tawalbeh1,2 , Hala Tawalbeh2 Houbing Song 3 Yaser Jararweh2


3
Department of Computer Engineering, Dept. of Electrical and Computer Eng.
1
Umm Al-Qura University, Makkah, KSA West Virginia University
2
Jordan University of Science and Technology, Jordan West Virginia, USA
Email: Latawalbeh@uqu.edu.sa Email:h.song@ieee.org Email: yaser.amd@gmail.com

Abstract: In every existed technical tool and Among the new technologies and developing trends
specific-purpose application, security must be in is the Internet of Things is a hot topic in both
watch all the time. Each of these has its security business and technology circles. IoT defines a range
implications that need to be considered specifically of technologies that allow us to potentially connect
in order to protect all users’ data and information anything electronic with each other in a network of
and prevent putting them at risk. Moreover, the machines, appliance, devices and sensors [2]. It is
rapid development and spread of many technologies
becoming an integral part of the Internet. By enabling
such as mobile networks and smart phones, IoT,
smart cities, and cloud computing, resulted in easy access and interaction with a wide variety of
increasing the demand on more security. There is a devices such as, for instance, home appliances,
needs to secure the communication networks that surveillance cameras, monitoring sensors, displays,
transfer the users data, the application itself that and vehicles, the IoT achieves the goal of making the
manipulates this data, the mobile device that runs Internet even more immersive and pervasive [3].
that application, and the cloud environment that Many different domain use IoT application such as
process and store this information. There is a home and industrial automation and mobile
variety of the user’s information that need to be healthcare systems.
protected including financial transactions, personal
data, and medical records. In the last few years, However, no secure internet that guarantees the
there are many health care providers worldwide privacy of the user’s information [4]. A lack of IoT
integrated their systems with the mobile and cloud
security is a major concern holding back its rapid
environment solutions to compete in the IT-based
growth. Consumers are constantly exposed to cyber
services. This integration brought up the need to
secure healthcare applications and systems against attacks due to the use of a wide range of available
cyber attacks. In this paper, we discuss the security smart devices because these devices are insecure and
of associated technologies with mobile networks and users often do not know about security threats on
cloud-based health care systems. Also, we present a these appliances, applications and mobile
combination of meet in the middle attack and Side technologies they use [5]. The application of the IoT
Channel Attack. paradigm to an urban context is of particular interest,
as a smart city which a huge number of machines
Key Words: Security; Mobile Cloud, Health Care
devices interconnected with each other and with
Systems; Cyber Attacks
higher level control systems.

The spread of the IT technologies and useful


I. INTRODUCTION applications contributed to provide better services for
people around the globe at reasonable cost and effort,
The recent trends and advances in communication
and with maximum utilization of resources. The issue
and mobile technologies combined with the wide
of privacy is very important and among the most
spread of smart mobile devices allowed majority of
critical concerns in the mobile devices and
people all over the world to use different useful
technologies and cloud services [6]. The users of
applications in daily basis. The users can use their
mobile and wireless technologies can be anonymous
mobile devices to pay bills, determine locations and
and might keep their mobile devices on the always-
shop over the internet [1].
on mode. This will make their data and devices IoT and described some of devices interact with an
under possible cyber attack at any time [7]. urban IoT such as smart phone ,smart tablet and
laptops .
Among the useful applications of mobile devices
and cloud computing is the mobile cloud health care In paper [12] Authors discussed IoT platforms
industry that is developed rapidly and has high solution that can be efficiently to make cities smarter
competence to provide the best services to the but there is a gap between the different IoT platforms
patients and health care providers [8]. The patients to this purpose this paper proposes Cloud computing
can access their records and lab tests at any time and a valid bridge of the IoT, Internet of people through
from anywhere without the need to visit the clinic. the Internet of Services, and services can be
Also, the healthcare provider can take the appropriate implemented which arise by bridging Cloud of
medical decision by accessing the test results and x- Things (CoT) and IoT. The authors also survey the
rays directly stored on the cloud servers directly from smart city vision , providing information on the main
their mobile devices [9]. requirements and the benefits of merging different
IoT ecosystems within Cloud under this new CoT
In the next section we present related work. In vision.
Section III we discuss the technology security issues.
Section IV presents combination of meet in the In [13] the authors proposed a mobile cloud
middle attack and side channel attacks. Section V computing system based on cloudlet infrastructure
concludes this paper. for big data applications. The proposed model can be
used in many applications were big amounts of data
is collected and analyzed such as health care and GPS
II. RELATED WORK applications.

In paper [10] authors presented smart grid which is To protect the privacy of the users over mobile
power industry is integrating the electrical networks, the users are recommended to stop sharing
distribution system with communication networks to private information such as names and addresses with
form a two directional power and information flow strangers) [14]. One of the dangerous threats of
infrastructure , the background and requirements for Social Networks is to de-anonymize user’s identities
smart grid communication security. Authors and share their private information with third
summarized the cyber security requirements and the advertising party. Sybil attack is another dangerous
possible vulnerabilities in smart grid , found smart threat in which attackers claim several fake identities
grid faced several cyber related attacks even with in order to expose the network and break the honesty
that great performance benefit from it to power of it [15]. This attack is performed when the attackers
industry . Also surveying the current solutions on have goals like ruining a voting application and
cyber security for smart grid communications and changing its results and like breaking a specific
the major challenge of its security. network’s trust mechanism [15]. A threat is
introduced which is a new kind of a web robot that
In paper [11] authors proposed importance of an perform software scripts over the interne that is
urban IoT in everyday life and some Socialbots [16]. It is a computer algorithm that acts
implementations such as home appliances, brings out content and react to humans’ behavior
monitoring sensors, actuators, displays, vehicles, and over Social Media like a human.
so on and analyzed the solutions currently available
for the implementation of urban IoTs . Authors The authors in [17] proposed an efficient and secure
presented an urban IoT system that are designed to mobile cloud computing model based on software
support the Smart City vision , overview some of the defined approach. The model addresses the security
useful services in smart cities that might be enabled issue in mobile cloud applications from software
by an urban IoT paradigm because they can realize perspective. The authors provide secure model and at
the win–win situation of increasing the quality and the same time keeping high level of efficiency.
enhancing the services offered to the citizens such as
smart parking ,smart lighting , air quality monitoring
and so on also provided survey of the enabling
technologies, protocols, and architecture for an urban
Figure 1: MiTM-Side Channel combined attack

III. TECHNOLOGY SECURITY Technology companies follow obscurity for


technologies they provide for the sake of ensuring
Here, we highlight some vulnerabilities and threats more security. This means that such companies keep
that happen to the used technologies themselves. The everything regarding their provided technologies
effect of these threats increases as using of modern vague. They hide details about the development
technologies proliferates in smart cities because process, the designs, codes, etc.; and most of these
deploying advanced technologies imposes dealing companies prevent security researchers and
with massive amounts of data that are companies from testing their technologies even if
multidirectional and diverse, high level of they were buying their products [18]. Moreover,
connectivity and dependency and fast speeds. Thus, some of these companies consider security
security considerations are more critical when we talk researchers and research companies as threats; and
about technology [18]. Internet security researchers even when they hire researchers and hackers to detect
say that technologies adapted by smart cities are security vulnerabilities in their products, they usually
more vulnerable and susceptible to hacks and threats delay publishing the updates and upgrades needed to
than computers and handheld devices. This goes at overcome these vulnerabilities which mean that their
the first place to the governments and authorities who clients will stay open to attacks and threats until the
are responsible for buying and adapting new security fix becomes available.
technologies. The problem is that these authorities
only care about the functionality, modernity and Handling technology security concerns in the today’s
advance such technologies provide for smart cities digital world starts from the authorities [19]. They
and the do not pay much attention for security-wise need only to transact business and make deals with
testing. On the other side, modern technologies technology firms that are trustworthy, allow security
indicate to transfer data wirelessly to handle services, testing and have fixing plans for security issues. And
which need powerful encryption to ensure security. make sure that the manufacturers have fixing and
Nevertheless, technology firms fail to grant this must recovery plans for security threats and attacks.
security.
IV. A COMBINATION OF MITM the intercepting proxy, and the interceptor must
ATTACK AND SIDE CHANNEL accept the TCP connection sent by the client. Third,
ATTACK SSL connection has to be established and server’s
certificate has to be verified, then a new certificate
Attackers always search for attack combinations to must be created and signed by the new proxy CA.
build attacks that are more sophisticated for platforms Once the client trusts the interceptor’s proxy CA, the
and applications. Such attacks provide higher-level of upgrade to the new SSL will be accepted. Finally,
severity as they combine characteristics of both transferred data will be encrypted using the
attacks to cover vulnerabilities of each. In this interceptor’s SSL.
section, we present new combined attack, which
consists characteristics of both MiTM and Side- V. CONCLUSION
Channel combined attack.
In this paper, we presented the importance and wide
In the previous section, we defined MiTM attack as
spread of the mobile technologies. These
unauthorized secret interception of specific
technologies and applications are used in almost
communication between two parties, that happened
every aspect of our life including the health care
by a third unauthorized intruder. In MITM attack, the
sector that integrates advanced technologies such as
attacker has to impersonate successfully each
cloud computing and mobile systems. This
communication party using a technique called ARP
integration brought up the need to secure healthcare
spoofing. Thus, each of them believes that he is
applications and systems against cyber attacks. In this
communicating with whom he supposed to
paper, we discuss the security of associated
communicate with. Therefore, when data flow
technologies with mobile networks and cloud-based
through the malicious communication channel, they
health care systems. Also, we present a combination
actually flow to the attacker system. To defeat MITM
of meet in the middle attack and Side Channel
attack when attacks particular system in the smart
Attack.
city, strong encryption such as AES between sender
and receiver is necessary. Side-Channel Attack can ACKNOWLEDGMENT
be used to defeat the protection that AES assures for
the communication between two parties. Side- The authors would like to thank the Deanship of
Channel Attack uses information about physical Scientific Research at Umm Al-Qura University for
implantation of used cryptographic system (let’s say the continuous support. This work was supported
ACE) such as execution time and power financially by the Deanship of Scientific Research at
consumption. All cryptosystems implemented for Umm Al-Qura University to Dr. Lo’ai Tawalbeh
embedded systems are exposed to Side-Channel (Grant Code: 15-COM-3-1-0017).
Attack.
REFERENCES
Here we are proposing an idea of combining these
two attacks, MITM attack and Side-Channel Attack [1] Lo'ai, A. Tawalbeh, and Waseem Bakhader. "A Mobile
Cloud System for Different Useful Applications." In Future
for one powerful attack that targets embedded
Internet of Things and Cloud Workshops (FiCloudW),
systems of smart cities. By MITM attack, the attacker
IEEE International Conference on, pp. 295-298. IEEE,
aims to listen to the conversation between sender and 2016.
receiver; by Side-Channel Attack, the attacker aims
to break the cryptosystem of the same targeted [2] AlOtaibi, Majed, A. Lo’ai, and Yaser Jararweh.
system (Figure 1) [19]. "Integrated Sensors System Based on IoT and Mobile
Cloud Computing."
The basic idea of Man in the Middle attack is to
[3] Atzori, Luigi, Antonio Iera, and Giacomo Morabito.
intercept the Secure Socket Layer SSL connection by
"The internet of things: A survey." Computer networks 54,
cloning proxy certificates in a way that client won’t
no. 15 (2010): 2787-2805.
notice that he trusts the interceptor. First, the
interceptor must create a Certification Authority CA [4] Lo'ai, A. Tawalbeh, Turki F. Somani, and Hilal
Certificate to sign the cloned certificate. Thus, the Houssain. "Towards secure communications: Review of
client trusts this CA certificate, otherwise the attack side channel attacks and countermeasures on ECC."
will be detected and SSL connection won’t be In Internet Technology and Secured Transactions
intercepted. Second, client must be configured to use
(ICITST), 2016 11th International Conference for, pp. 87- http://www.socialmediatoday.com/content/rise-social-bots.
91. IEEE, 2016.
[17] Tawalbeh, Lo'ai, Yousef Haddad, Omar Khamis,
[5] Lo’ai, A. Tawalbeh, and Turki F. Somani. "More Elhadj Benkhelifa, Yaser Jararweh, and Fahd AlDosari.
Secure Internet of Things Using Robust Encryption "Efficient and secure software-defined mobile cloud
Algorithms Against Side Channel Attacks." computing infrastructure." International Journal of High
[6] Moh’d, Abidalrahman, Nauman Aslam, Hosein Marzi, Performance Computing and Networking 9, no. 4 (2016):
and L. A. Tawalbeh. "Hardware implementations of secure 328-341.
hashing functions on FPGAs for WSNs." In Proceedings of [18] ] U.S. Department of Homeland Security’s Office of
the 3rd International Conference on the Applications of Cyber and Infrastructure Analysis (DHS/OCIA) “The
Digital Information and Web Technologies (ICADIWT). Future Of Smart Cities: Cyber-Physical Infrastructure
2010. Risk.” U.S. (2015).
[7] Sklavos, Nicolas, and Xinmiao Zhang, eds. Wireless [19] Cerrudo, Cesar. "Hacking Smart Cities." In RSA
security and cryptography: specifications and Conference 2015, pp. 2-18. 2015.
implementations. CRC Press, 2007.

[8] Lo'ai, A. Tawalbeh, Rashid Mehmood, Elhadj


Benkhelifa, and Houbing Song. "Mobile Cloud Computing
Model and Big Data Analysis for Healthcare Applications."
IEEE Access Journal. Vol 4, pp 6171-6180. Sept 2016

[9] Lo’ai, A., Waseem Bakheder, Rashid Mehmood, and


Houbing Song. "Cloudlet-based Mobile Cloud Computing
for Healthcare Applications." IEEE GLOBECOM, 2016 in
Washington D.C, December 4-8, 2016

[10] Ye Yan, Yi Qian, Hamid Sharif and David Tipper


(2012) ,"A Survey on Cyber Security for Smart Grid
Communications ", IEEE COMMUNICATIONS
SURVEYS & TUTORIALS, VOL. 14, NO. 4, FOURTH
QUARTER 2012.

[11] Andrea Zanella, Senior Member,Nicola Bui, Angelo


Castellani,Lorenzo Vangelista, and Michele Zorzi, Fellow
(2014) ,"Internet of Things for Smart Cities”, IEEE
INTERNET OF THINGS JOURNAL, VOL. 1, NO. 1,
FEBRUARY 2014.

[12] Riccardo Petrolo, Valeria Loscrì and Nathalie Mitton


(2015) , "Towards a smart city based on cloud of things, a
survey on the smart city vision and paradigms

[13] Lo'ai, A. Tawalbeh, Waseem Bakheder, and Houbing


Song. "A mobile cloud computing model using the cloudlet
scheme for big data applications." In Connected Health:
Applications, Systems and Engineering Technologies
(CHASE), 2016 IEEE First International Conference on,
pp. 73-77. IEEE, 2016.

[14] N. A. V. Shmatikov, "De-anonymizing social


networks," in 30th IEEE symposium on security and
privacy, 2009.

[15] R. Gunturu, "Survey of Sybil attacks in social


networks," arXiv preprint arXiv:1504.05522, 2015.

[16] "SocialMedia Today," [Online]. Available:

View publication stats

También podría gustarte