Change search
Link to record
Permanent link

Direct link
BETA
Carlsson, Anders
Publications (10 of 14) Show all publications
Kuzminykh, I. & Carlsson, A. (2018). Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture. In: Galinina O., Andreev S., Balandin S., Koucheryavy Y. (eds) (Ed.), Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2018, ruSMART 2018. Lecture Notes in Computer Science, vol 11118: . Paper presented at NEW2AN 2018/ruSMART 2018, St. Petersburg (pp. 52-63). Springer, 11118
Open this publication in new window or tab >>Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture
2018 (English)In: Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2018, ruSMART 2018. Lecture Notes in Computer Science, vol 11118 / [ed] Galinina O., Andreev S., Balandin S., Koucheryavy Y. (eds), Springer, 2018, Vol. 11118, p. 52-63Conference paper, Published paper (Refereed)
Abstract [en]

This paper represents new functional architecture for the Internet of Things systems that use an avatar concept in displaying interaction between components of the architecture. Object-oriented representation of “thing” in the avatar concept allows simplify building and deployment of IoT systems over the web network and bind “things” to such application protocols as HTTP, CoAP, and WebSockets mechanism. The assets and stakeholders for ensuring security in IoT were specified. These assets are needed to isolate the risks associated with each of assets of IoT system. Example of Thing Instance’s description and its functionality using JSON format is shown also in the paper.

Place, publisher, year, edition, pages
Springer, 2018
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 11118
Keywords
IoT, Avatar, Thing instance, Threat assessment, Security risk assessment
National Category
Engineering and Technology
Identifiers
urn:nbn:se:bth-17128 (URN)10.1007/978-3-030-01168-0_6 (DOI)978-3-030-01167-3 (ISBN)978-3-030-01168-0 (ISBN)
Conference
NEW2AN 2018/ruSMART 2018, St. Petersburg
Available from: 2018-10-15 Created: 2018-10-15 Last updated: 2018-10-31Bibliographically approved
Kuzminykh, I., Carlsson, A., Franksson, R. & Liljegren, A. (2018). Measuring a LoRa Network: Performance, Possibilities and Limitations. In: Galinina O., Andreev S., Balandin S., Koucheryavy Y. (Ed.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): . Paper presented at 18th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2018 and 11th Conference on Internet of Things and Smart Spaces, ruSMART 2018; St. Petersburg; Russian Federation; 27 August 2018 through 29 August 2018 (pp. 116-128). Springer, 11118
Open this publication in new window or tab >>Measuring a LoRa Network: Performance, Possibilities and Limitations
2018 (English)In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) / [ed] Galinina O., Andreev S., Balandin S., Koucheryavy Y., Springer, 2018, Vol. 11118, p. 116-128Conference paper, Published paper (Refereed)
Abstract [en]

Low power wide area (LPWA) technologies becomes popular for IoT use cases because LPWA is enable the broad range communications and allows to transmit small amounts of information in a long distance. Among LPWA technologies there are LTE-M, SigFox, LoRa, Symphony Link, Ingenu RPMA, Weightless, and NB-IoT. Currently all these technologies suffer from lack of documentation about deployment recommendation, have non-investigated limitations that can affect implementations and products using such technologies. This paper is focused on the testing of LPWAN LoRa technology to learn how a LoRa network gets affected by different environmental attributes such as distance, height and surrounding area by measuring the signal strength, signal to noise ratio and any resulting packet loss. The series of experiments for various use cases are conducted using a fully deployed LoRa network made up of a gateway and sensor available through the public network. The results will show the LoRa network limitation for such use cases as forest, city, open space. These results allow to give the recommendation for companies during early analysis and design stages of network life circle, and help to choose properly technology for deployment an IoT application.

Place, publisher, year, edition, pages
Springer, 2018
Keywords
IoT, LoRa, LPWAN, Transmission range, Arduino, Raspberry Pi
National Category
Engineering and Technology
Identifiers
urn:nbn:se:bth-17129 (URN)10.1007/978-3-030-01168-0_11 (DOI)978-3-030-01167-3 (ISBN)978-3-030-01168-0 (ISBN)
Conference
18th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2018 and 11th Conference on Internet of Things and Smart Spaces, ruSMART 2018; St. Petersburg; Russian Federation; 27 August 2018 through 29 August 2018
Available from: 2018-10-15 Created: 2018-10-15 Last updated: 2018-10-31Bibliographically approved
Carlsson, A. & Gustavsson, R. (2018). The art of war in the cyber world. In: 2017 4th International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S and T 2017 - Proceedings: . Paper presented at 4th International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S and T, Kharkiv, Ukraine (pp. 42-44). Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>The art of war in the cyber world
2018 (English)In: 2017 4th International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S and T 2017 - Proceedings, Institute of Electrical and Electronics Engineers Inc. , 2018, p. 42-44Conference paper, Published paper (Refereed)
Abstract [en]

The paper focus on cyber weapons used in Advanced Persistent Threat (ATP) attacks in present and future cyber warfare. The combined use of propaganda and cyber warfare supports military operations on the ground and is exemplified with the ongoing Russian hybrid warfare in Ukraine. New models and methods to develop future trustworthy critical infrastructures in our societies are presented. Some mitigation ideas to meet the challenges of future hybrid warfare are also discussed. © 2017 IEEE.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2018
Keywords
ATP attack vectors, critical infrastruct-ures, espionage, false information, Network Function Virtualization (NFV), Software Defined Networks (SDN), Computer crime, Military operations, Art of war, Attack vector, Cyber warfare, Cyber worlds, Ukraine, Network function virtualization
National Category
Computer Sciences
Identifiers
urn:nbn:se:bth-16169 (URN)10.1109/INFOCOMMST.2017.8246345 (DOI)2-s2.0-85046084448 (Scopus ID)9781538609835 (ISBN)
Conference
4th International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S and T, Kharkiv, Ukraine
Available from: 2018-05-11 Created: 2018-05-11 Last updated: 2018-05-14Bibliographically approved
Kuzminykh, I., Sokolov, V. & Carlsson, A. (2017). Scheme for dynamic channel allocation with interference reduction in wireless sensor network. In: IEEE (Ed.), 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T): . Paper presented at 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, Ukraine (pp. 564-568). IEEE
Open this publication in new window or tab >>Scheme for dynamic channel allocation with interference reduction in wireless sensor network
2017 (English)In: 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T) / [ed] IEEE, IEEE, 2017, p. 564-568Conference paper, Published paper (Refereed)
Abstract [en]

he paper introduces a new scheme of dynamic interference free channel allocation. The scheme is based on additional spectral analyzers in wireless networks IEEE 802.11. Design and implementation is presented.

Place, publisher, year, edition, pages
IEEE, 2017
Keywords
Transceivers, Channel allocation, Interference, Reflection, Antenna theory, Cognitive radio, Wireless fidelity
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-15950 (URN)10.1109/INFOCOMMST.2017.8246463 (DOI)000426514100127 ()978-1-5386-0983-5 (ISBN)
Conference
4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, Ukraine
Available from: 2018-03-14 Created: 2018-03-14 Last updated: 2018-05-11Bibliographically approved
Kuzminykh, I., Snihurov, A. & Carlsson, A. (2017). Testing of communication range in ZigBee technology. In: 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2017 - Proceedings: . Paper presented at 14th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2017; Lviv - Polyana; Ukraine (pp. 133-136). Institute of Electrical and Electronics Engineers (IEEE), Article ID 7916102.
Open this publication in new window or tab >>Testing of communication range in ZigBee technology
2017 (English)In: 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2017 - Proceedings, Institute of Electrical and Electronics Engineers (IEEE), 2017, p. 133-136, article id 7916102Conference paper, Published paper (Refereed)
Abstract [en]

- In the rapidly growing Internet of Things (loT) applications from personal electronics to industrial machines and sensors are getting wirelessly connected to the Internet. Many well-known communication technologies such as WiFi, ZigBee, Bluetooth and cellular are used for transfer data in IoT. The choice of corresponding technology or combination of technologies depends on application or other factors such as data requirements, communication range, security and power demands, battery life. In this paper we will focus on ZigBee wireless technology and testing ZigBee end devices in order to see how transmission range impacts on quality parameters. © 2017 IEEE.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2017
Keywords
Computer aided design, Microelectronics, Wireless telecommunication, systemsZigbee
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-14675 (URN)10.1109/CADSM.2017.7916102 (DOI)000403602400032 ()9781509050444 (ISBN)
Conference
14th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2017; Lviv - Polyana; Ukraine
Available from: 2017-06-22 Created: 2017-06-22 Last updated: 2017-09-21Bibliographically approved
Kuzminykh, I., Snihurov, A. & Carlsson, A. (2017). Testing of communication range in ZigBee technology. In: 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM): . Paper presented at 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), Lviv, Ukraine. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Testing of communication range in ZigBee technology
2017 (English)In: 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), Institute of Electrical and Electronics Engineers (IEEE), 2017Conference paper, Published paper (Refereed)
Abstract [en]

Abstract:In the rapidly growing Internet of Things (loT) applications from personal electronics to industrial machines and sensors are getting wirelessly connected to the Internet. Many well-known communication technologies such as WiFi, ZigBee, Bluetooth and cellular are used for transfer data in IoT. The choice of corresponding technology or combination of technologies depends on application or other factors such as data requirements, communication range, security and power demands, battery life. In this paper we will focus on ZigBee wireless technology and testing ZigBee end devices in order to see how transmission range impacts on quality parameters.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2017
Keywords
ZigBee, Wireless sensor networks, Wireless communication, Universal Serial Bus, IoT, X-CTU, Communication system security
National Category
Communication Systems
Identifiers
urn:nbn:se:bth-15951 (URN)10.1109/CADSM.2017.7916102 (DOI)978-1-5090-5045-1 (ISBN)978-1-5090-5046-8 (ISBN)
Conference
14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), Lviv, Ukraine
Available from: 2018-03-14 Created: 2018-03-14 Last updated: 2018-03-27Bibliographically approved
Adamov, A. & Carlsson, A. (2017). The state of ransomware: Trends and mitigation techniques. In: Proceedings of 2017 IEEE East-West Design and Test Symposium, EWDTS 2017: . Paper presented at 2017 IEEE East-West Design and Test Symposium, EWDTS, Novi Sad, Serbia. Institute of Electrical and Electronics Engineers Inc., Article ID 8110056.
Open this publication in new window or tab >>The state of ransomware: Trends and mitigation techniques
2017 (English)In: Proceedings of 2017 IEEE East-West Design and Test Symposium, EWDTS 2017, Institute of Electrical and Electronics Engineers Inc. , 2017, article id 8110056Conference paper, Published paper (Refereed)
Abstract [en]

This paper contains an analysis of the payload of the popular ransomware for Windows, Android, Linux, and MacOSX platforms. Namely, VaultCrypt (CrypVault), TeslaCrypt, NanoLocker, Trojan-Ransom.Linux.Cryptor, Android Simplelocker, OSX/KeRanger-A, WannaCry, Petya, NotPetya, Cerber, Spora, Serpent ransomware were put under the microscope. A set of characteristics was proposed to be used for the analysis. The purpose of the analysis is generalization of the collected data that describes behavior and design trends of modern ransomware. The objective is to suggest ransomware threat mitigation techniques based on the obtained information. The novelty of the paper is the analysis methodology based on the chosen set of 13 key characteristics that helps to determine similarities and differences thorough the list of ransomware put under analysis. Most of the ransomware samples presented were manually analyzed by the authors eliminating contradictions in descriptions of ransomware behavior published by different malware research laboratories through verification of the payload of the latest versions of ransomware. © 2017 IEEE.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2017
Series
East-West Design & Test Symposium, ISSN 2373-826X, E-ISSN 2472-761X
Keywords
Android (operating system), Computer operating systems, Research laboratories, Design trends, Key characteristics, Mitigation techniques, Threat mitigation, Trojans, Malware
National Category
Computer Systems
Identifiers
urn:nbn:se:bth-15854 (URN)10.1109/EWDTS.2017.8110056 (DOI)000426878200029 ()2-s2.0-85040515914 (Scopus ID)9781538632994 (ISBN)
Conference
2017 IEEE East-West Design and Test Symposium, EWDTS, Novi Sad, Serbia
Available from: 2018-02-02 Created: 2018-02-02 Last updated: 2018-04-04Bibliographically approved
Adamov, A. & Carlsson, A. (2016). Cloud incident response model. In: Proceedings of 2016 IEEE East-West Design and Test Symposium, EWDTS 2016: . Paper presented at 2016 IEEE East-West Design and Test Symposium, (EWDTS), Yerevan, Armenia. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Cloud incident response model
2016 (English)In: Proceedings of 2016 IEEE East-West Design and Test Symposium, EWDTS 2016, Institute of Electrical and Electronics Engineers (IEEE), 2016Conference paper, Published paper (Refereed)
Abstract [en]

This paper addresses the problem of incident response in clouds. A conventional incident response model is formulated to be used as a basement for the cloud incident response model. Minimization of incident handling time is considered as a key criterion of the proposed cloud incident response model that can be done at the expense of embedding infrastructure redundancy into the cloud infrastructure represented by Network and Security Controllers and introducing Security Domain for threat analysis and cloud forensics. These architectural changes are discussed and applied within the cloud incident response model. © 2016 IEEE.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2016
Keywords
Architectural changes, Cloud forensics, Cloud infrastructures, Handling time, Incident response, Security domains, Threat analysis
National Category
Computer Systems
Identifiers
urn:nbn:se:bth-14067 (URN)10.1109/EWDTS.2016.7807665 (DOI)000400700700044 ()2-s2.0-85015244995 (Scopus ID)9781509006939 (ISBN)
Conference
2016 IEEE East-West Design and Test Symposium, (EWDTS), Yerevan, Armenia
Available from: 2017-03-30 Created: 2017-03-30 Last updated: 2017-06-16Bibliographically approved
Tutschku, K., Ahmadi Mehri, V., Carlsson, A., Chivukula, K. V. & Johan, C. (2016). On Resource Description Capabilities of On-Board Tools for Resource Management in Cloud Networking and NFV Infrastructures. In: 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC): . Paper presented at IEEE International Conference on Communications (ICC), Kuala Lumpur (pp. 442-447).
Open this publication in new window or tab >>On Resource Description Capabilities of On-Board Tools for Resource Management in Cloud Networking and NFV Infrastructures
Show others...
2016 (English)In: 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2016, p. 442-447Conference paper, Published paper (Refereed)
Abstract [en]

The rapid adoption of networks that are based on "cloudification" and Network Function Virtualisation (NFV) comes from the anticipated high cost savings of up to 70% in their build and operation. The high savings are founded in the use of general standard servers, instead of single-purpose hardware, and by efficiency resource sharing through virtualisation concepts. In this paper, we discuss the capabilities of resource description of "on-board" tools, i.e. using standard Linux commands, to enable OPEX savings. We put a focus on monitoring resources on small time-scales and on the variation observed on such scales. We introduce a QoE-based comparative concept that relates guest and host views on "utilisation" and "load" for the analysis of the variations. We describe the order of variations in "utilisation" and "load" by measurement and by graphical analysis of the measurements. We do these evaluations for different host operating systems and monitoring tools.

Series
IEEE International Conference on Communications Workshops, ISSN 2164-7038
National Category
Communication Systems
Identifiers
urn:nbn:se:bth-11902 (URN)000386326800074 ()978-1-5090-0448-5 (ISBN)
Conference
IEEE International Conference on Communications (ICC), Kuala Lumpur
Note

Held in conjunction with the IEEE International Conference on Communications (ICC 2016)

Available from: 2016-05-21 Created: 2016-05-21 Last updated: 2017-06-16Bibliographically approved
Tutschku, K. T., Ahmadi Mehri, V. & Carlsson, A. (2016). Towards Multi-layer Resource Management in Cloud Networking and NFV Infrastructures. In: : . Paper presented at 12th Swedish National Computer Networking Workshop (SNCNW), Sundsvall, Sweden.
Open this publication in new window or tab >>Towards Multi-layer Resource Management in Cloud Networking and NFV Infrastructures
2016 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Cloud Networking (CN) and related conceptsoffer appealing novelties to Cloud Computing (CC) customers.They can do a one-stop-shopping for network-enhanced cloudservices. In addition, the costs of such services might below due to multiple customers sharing the infrastructures.Moreover, telecommunication network operators are adopt-ing the CN in theirNetwork Functions Virtualisation (NFV)framework for reducing costs and increasing the flexibility oftheir networks. The technical appeal of CN comes from thetight integration of CC and smart networks. The economicalattractiveness results from avoiding dedicated hardware, shar-ing of resources, and simplified resource management (RM) asseen by the users respectively by the applications. The visionof cheap and integrated CN services is obviously attractive,but it is also evident that it will require more complex RMprocedures for efficiently balancing the usage of all resources.In this contribution, we suggest an initial architecture forintegrated and practical RM in CN and NFV systems. TheRM concept aims at locating and analysing performancebottlenecks, efficiency problems, and eventually discover un-used resources. The suggested architecture is based on alayered view on the system. Moreover, we detail difficultiesin practical resources usage monitoring which, in turn, definerequirements for a RM architecture. The requirement analysisis based on measurements in a CN infrastructure.

National Category
Communication Systems
Identifiers
urn:nbn:se:bth-11903 (URN)
Conference
12th Swedish National Computer Networking Workshop (SNCNW), Sundsvall, Sweden
Available from: 2016-05-21 Created: 2016-05-21 Last updated: 2016-05-25Bibliographically approved
Organisations

Search in DiVA

Show all publications