Papers by Sabina Szymoniak
Advances in Sciences and Technology/Postępy Nauki i Techniki, Jun 1, 2024
AHFE international, 2021
In the future, autonomous cars will become commonplace. However, they require the development of ... more In the future, autonomous cars will become commonplace. However, they require the development of complex software. Therefore, our research focused on developing a multimedia container structure containing three types of images: RGB, Lidar and infrared, calibrated adequately against each other. An additional goal is to establish libraries of programs for creating, saving and saving these types of files. It will also be necessary to develop a method for synchronising data from Lidar, RGB and infrared cameras. This type of file could be used in autonomous vehicles, facilitating data processing by the intelligent autonomous vehicle management system and providing the driver with valuable information.
Studia Informatica, 2016
This article presents the formal model of security protocols executions including delays in the n... more This article presents the formal model of security protocols executions including delays in the network and implementation of tool for automatic verification of security protocols. Protocol specifications are written in the format ProToc, which allows allows full specification of the timed protocol. This tool allows specifying a particular protocol security vulnerability to attacks, taking into account the delays in the network. The first section provides an overview of the literature and the current state of knowledge in the field of modeling and verification security protocols. The second section contains an example of security protocol which is KaoChow protocol. This protocol consists of four steps, and his task is to distribute a new symmetric key shared between users A and B, and mutual authentication of users. In the third section is described formal model and computational structure for modeling real security protocol executions. The fourth section describes a tool for automatic verification of security protocols. In fifth section are shown experimental results. Some summary results are shown in Tab. 1. Based on these results could be read that spanned depending on the timing of executions. One of the influences was depending of time of generating and sending the message by Intruder during the session. This relationship is shown in Fig. 1.
The article discusses the problem of internet users protection against false URLs. During the cor... more The article discusses the problem of internet users protection against false URLs. During the coronavirus pandemic, we realized the value and benefits of remote work. Also, training began to be conducted remotely. Available webinars or training made it possible for us to broaden our knowledge. Organizers of such activities can send or share the proposals for participation via social networks or email messages. The development of remote activities contributed to an increase in cybercrimes. A specially crafted script may be hidden under a seemingly safe URL for an online meeting. We propose a new security protocol for users authentication and protection against false links. The protocol consists of two parts: initial and verification. In the initial part, the user must agree on his unique identifier with the trusted Distribution Center. The event organizer must perform a similar action. In the verification part, the meeting participant will verify the correctness of the connection URL. This protocol implements AAA-logic. We examined the security of our protocol using a verification tool. This tool enables verification of security protocols, including various time parameters. The results obtained are promising. Further, we plan to develop the proposed protocol and prepare a system that will use it.
Mathematical Biosciences and Engineering, 2021
Communication is a key element of everyone's life. Nowadays, we most often use internet connectio... more Communication is a key element of everyone's life. Nowadays, we most often use internet connections for communication. We use the network to communicate with our family, make purchases, we operate home appliances, and handle various matters related to public administration. Moreover, the Internet enables us to participate virtually in various official meetings or conferences. There is a risk of losing our sensitive data, as well as their use for malicious purposes. In this situation, each connection should be secured with an appropriate security protocol. These protocols also need to be regularly checked for vulnerability to attacks. In this article, we consider a tool that allows to analyze different executions of security protocols as well as simulate their operation. This research enables the gathering of knowledge about the behaviour of the security protocol, taking into account various time parameters (time of sending the message, time of generation confidential information, encryption and decryption times, delay in the network, lifetime) and various aspects of computer networks. The conducted research and analysis of the obtained results enable the evaluation of the protocol security and its vulnerability to attacks. Our approach also assumes the possibility of setting time limits that should be met during communication and operation of the security protocol. We show obtained results on Andrew and Needham Schroeder Public Key protocols examples.
Advances in intelligent systems and computing, Dec 12, 2018
This paper discusses the problem of timed security protocols’ analysis. Delay in the network and ... more This paper discusses the problem of timed security protocols’ analysis. Delay in the network and encryption and decryption times are very important from a security point of view. This operations’ times may have a significant influence on users’ security. The timed analysis is based on a special formal model and computational structure. For this theoretical assumptions, a special tool has been implemented. This tool allows to calculate the correct protocol’s execution time and carry out simulations. Thanks to this, it was possible to check the possibility of Intruder’s attack including various time parameters. Experimental results are presented on KaoChow protocol example. These results show how significant for security is time.
Studia Informatica, May 30, 2017
Streszczenie. W pracy zawarto opis problemu weryfikacji czasowych protokołów zabezpieczających pr... more Streszczenie. W pracy zawarto opis problemu weryfikacji czasowych protokołów zabezpieczających przy uwzględnieniu opóźnień w sieci. Za pomocą specjalnie skonstruowanego modelu formalnego, który stał się podstawą do implementacji narzędzia, możliwe jest obliczanie czasu poprawnego wykonania protokołu. Narzędzie umożliwia przeprowadzenie badań czasowych protokołów zabezpieczających, w tym przeprowadzenie symulacji. Słowa kluczowe: analiza czasów, protokoły zabezpieczające, symulacje ANALYSIS AND SIMULATIONS OF TIMED SECURITY PROTOCOLS Summary. This paper contains a description of the problem of timed security protocols verification, taking into account delays in the network. Using a specially constructed formal model, which became the basis for the implementation of the special tool, it is possible to calculate the correct time of execution protocol. The tool enables testing timed security protocols, including simulations.
The paper discusses the problem of influence of time parameters on protocols security. It is a si... more The paper discusses the problem of influence of time parameters on protocols security. It is a significant issue because some periods may affect us to be or not to be in the real and virtual world. Time can decide about the security of our private data, money and many others. It is necessary to check whether used protocols provide an appropriate security level of our data. Also, Intruder capabilities and knowledge may evolve with time. With wrongly selected time parameters, the Intruder may perform an attack on protocol and deceive honest users. The research has expanded the formal model and computational structure designed previously. Based on this, we implemented a tool. This tool can calculate the correct protocol execution and carry out simulations. Thanks to this checking the possibility of Intruder attack including various time parameters was possible. We presented experimental results on NSPK protocol and WooLamPi protocol examples.
Studia Informatica, 2017
Streszczenie. W pracy zawarto opis problemu weryfikacji czasowych protokołów zabezpieczających pr... more Streszczenie. W pracy zawarto opis problemu weryfikacji czasowych protokołów zabezpieczających przy uwzględnieniu opóźnień w sieci. Za pomocą specjalnie skonstruowanego modelu formalnego, który stał się podstawą do implementacji narzędzia, możliwe jest obliczanie czasu poprawnego wykonania protokołu. Narzędzie umożliwia przeprowadzenie badań czasowych protokołów zabezpieczających, w tym przeprowadzenie symulacji. Słowa kluczowe: analiza czasów, protokoły zabezpieczające, symulacje ANALYSIS AND SIMULATIONS OF TIMED SECURITY PROTOCOLS Summary. This paper contains a description of the problem of timed security protocols verification, taking into account delays in the network. Using a specially constructed formal model, which became the basis for the implementation of the special tool, it is possible to calculate the correct time of execution protocol. The tool enables testing timed security protocols, including simulations.
The paper discusses a very important problem which is the verification of security protocols. Sec... more The paper discusses a very important problem which is the verification of security protocols. Security protocols are used to secure users' communication living in the Smart Cities. Users in the cyber world could be exposed to dishonest users' actions. These users are called Intruders. Also, they could fall victim to cybercrime. Due to continuous technological development, the security of protocols should be regularly verified to confirm their correctness. Also, in the case of security protocols, time plays a significant role. It may turn out that a few seconds will allow an Intruder to acquire the appropriate knowledge to execute an attack and stole confidential data. Therefore, it is right to verify security protocols also in terms of the influence of time on their security. For this purpose, we propose a new method for security protocols verification including timed parameters and their influence on security. Our method includes analysis of encryption and decryption times, composing the message time, delays in the network and lifetime, using the specially implemented tool. Thanks to this, we can calculate the correct time protocol execution, indicate time dependencies and check the possibility of Intruder's attack. Our experimental results we present on well-known Needham Schroeder protocol example.
Communications in computer and information science, 2018
The security of computer network users is a very important aspect of the network administrators’ ... more The security of computer network users is a very important aspect of the network administrators’ work. The related analysis and verification of security protocols (SP) is a key tool in the fight against access to data by unauthorized users.
Computer Communications, Nov 1, 2021
Abstract In recent months, the demand for services provided on the Internet (scientific conferenc... more Abstract In recent months, the demand for services provided on the Internet (scientific conferences, training, webinars) has increased. As this activity grew, so did cybercrime. Social networks share invitations to various training and webinars. We also receive similar announcements via e-mail. It is not difficult to accidentally click on the attached link. The submitted URL may contain a script. The script may infect our device or steal our login details. We have developed a new security protocol — Amelia, to protect against responding to a false invitation to a web event. Our protocol makes it possible to check if the link sent is valid. Also, it enables the generation of unique user identifiers. Amelia protocol provides users’ verification and distribution of symmetric session keys. We conducted a study of our protocol. We checked its vulnerability to Intruder attacks. The obtained results are promising. We did not find an attack on this protocol.
Applied sciences, Dec 28, 2022
This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
Applied Sciences
Artificial Intelligence is an indispensable element of the modern world, constantly evolving and ... more Artificial Intelligence is an indispensable element of the modern world, constantly evolving and contributing to the emergence of new technologies. We meet it in everyday applications, primarily using intelligent systems that aim to improve our lives. Artificial Intelligence techniques must inspire users’ trust because they significantly impact virtually every industry and person. For this reason, systems using Artificial Intelligence are subject to many requirements to verify their trustworthiness in various aspects. This review focused on users’ physical and environmental security, considering the safety and robustness dimensions of Trustworthy Artificial Intelligence. We examined these Trustworthy Artificial Intelligence solutions and dimensions because security is one of the most-critical aspects of human life and can be considered in many different contexts. We examined the trustworthiness of Artificial Intelligence techniques in systems supporting road safety and securing comp...
Social Science Research Network, 2022
Lecture Notes in Computer Science, 2019
Internet communication is essential for everyone. Algorithms that decide about the correctness of... more Internet communication is essential for everyone. Algorithms that decide about the correctness of this communication are protocols, and the central part of it that keeps all in safety are security protocols. Because every such program must be implemented and applied, errors are probable. That is why we need verification methods based on mathematical models, and we also need tools checking the new protocols, looking for undiscovered gaps. Existing verification tools and languages describing the protocols are not free of errors or imperfections. Sometimes they neglect some dependencies, and sometimes they are utterly redundant. We present in the article a formal model that we have recently developed. It describes the different behaviours and properties of security protocols. On the base of it, we implemented the tool that verifies many types of protocol, first of all, if they work and then if they meet the security requirements. At the end of the article, we provided a summary of our results with the results obtained from popular tool.
Advances in intelligent systems and computing, Apr 28, 2019
In this paper, we present a novel method for the verification of security protocols time properti... more In this paper, we present a novel method for the verification of security protocols time properties using SMT-based bounded model checking (SMT-BMC). In our approach, we model protocol users’ behaviours using networks of synchronized timed automata. Suitably specified correctness properties are defined as reachability property of some, chosen states in automata network. We consider most important time properties of protocols’ executions using specially constructed time conditions. These are checked by a quantifier-free SMT encoding and SMT solver using BMC algorithms. In our work, we have also implemented the proposed method and evaluated it for four, well-known security protocols. We also compared our new SMT-based technique with the corresponding SAT-based approach.
Uploads
Papers by Sabina Szymoniak