Browsing by Author "Zeitz, Kimberly Ann"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
- Cybersecurity for the Internet of Things: A Micro Moving Target IPv6 DefenseZeitz, Kimberly Ann (Virginia Tech, 2019-09-04)As the use of low-power and low-resource embedded devices continues to increase dramatically with the introduction of new Internet of Things (IoT) devices, security techniques are necessary which are compatible with these devices. This research advances the knowledge in the area of cybersecurity for the IoT through the exploration of a moving target defense to apply for limiting the time attackers may conduct reconnaissance on embedded systems while considering the challenges presented from IoT devices such as resource and performance constraints. We introduce the design and optimizations for µMT6D, a Micro-Moving Target IPv6 Defense, including a description of the modes of operation and use of lightweight hash algorithms. Through simulations and experiments µMT6D is shown to be viable for use on low power and low resource embedded devices in terms of footprint, power consumption, and energy consumption increases in comparison to the given security benefits. Finally, this provides information on other future considerations and possible avenues of further experimentation and research.
- An Optimized Alert System Based on Geospatial Location DataZeitz, Kimberly Ann (Virginia Tech, 2014-07-01)Crises are spontaneous and highly variable events that lead to life threatening and urgent situations. As such, crisis and emergency notification systems need to be both flexible and highly optimized to quickly communicate to users. Implementing the fastest methods, however, is only half of the battle. The use of geospatial location is missing from alert systems utilized at university campuses across the United States. Our research included the design and implementation of a mobile application addition to our campus notification system. This addition is complete with optimizations including an increase in the speed of delivery, message differentiation to enhance message relevance to the user, and usability studies to enhance user trust and understanding. Another advantage is that our application performs all location data computations on the user device with no external storage to protect user location privacy. However, ensuring the adoption of a mobile application that requests location data permissions and relating privacy measures to users is not a trivial matter. We conducted a campus-wide survey and interviews to understand mobile device usage patterns and obtain opinions of a representative portion of the campus population. These findings guided the development of this mobile application and can provide valuable insights which may be helpful for future application releases. Our addition of a mobile application with geospatial location awareness will send users relevant alerts at speeds faster than those of the current campus notification system while still guarding user location privacy, increasing message relevance, and enhancing the probability of adoption and use.