Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Laura Vegh is active.

Publication


Featured researches published by Laura Vegh.


ieee international conference on automation, quality and testing, robotics | 2014

Enhancing security in cyber-physical systems through cryptographic and steganographic techniques

Laura Vegh; Liviu Miclea

Information technology is continually changing, discoveries are made every other day. Cyber-physical systems consist of both physical and computational elements and are becoming more and more popular in todays society. They are complex systems, used in complex applications. Therefore, security is a critical and challenging aspect when developing cyber-physical systems. In this paper, we present a solution for ensuring data confidentiality and security by combining some of the most common methods in the area of security - cryptography and steganography. Furthermore, we use hierarchical access to information to ensure confidentiality and also increase the overall security of the cyber-physical system.


international conference on system theory, control and computing | 2014

A framework for verifying the integrity of the components of a secure cyber-physical system

Laura Vegh; Liviu Miclea

Nowadays, a better part of our lives relies on technology. Every day brings new and improved ideas, applications and systems. For this reason, information security has become essential. Integrating both computational and physical components, cyber-physical systems used in more and more situations. Their complexity and the critical nature of the applications in which they are used increases the need for a solid security architecture, built not only to hide information, but to withstand cyber attacks. Our aim has been to find new and improved security architecture for cyber-physical systems. We use hierarchical access to information through the aid of an encryption algorithm with divided private key, combined with steganography. We also add a framework with the goal of verifying the integrity of each component of the system.


ieee international conference on automation quality and testing robotics | 2016

Complex event processing for attack detection in a cyber-physical system

Laura Vegh; Liviu Miclea

With technology advancing faster than ever and complex systems present in most of the areas of our lives ensuring security has become a critical issue. Protecting data from unwanted access by modifying it through cryptography, hiding data or digitally signing it are some of the solutions available. Just as important however is to detect and prevent attacks. We propose a system with hierarchical access to data which is gained through a digital signature algorithm. We focus our attention on detecting and preventing attacks through a less conventional method - complex event processing. Any action within the cyber-physical system can be viewed as an event, such as digitally signing a message. With this idea in mind we propose a solution that allows designing a secure cyber-physical system with an efficient attack detection architecture.


international conference on control systems and computer science | 2015

A Simple Scheme for Security and Access Control in Cyber-Physical Systems

Laura Vegh; Liviu Miclea

In a time when technology changes continuously, where things you need today to run a certain system, might not be needed tomorrow anymore, security is a constant requirement. No matter what systems we have, or how we structure them, no matter what means of digital communication we use, we are always interested in aspects like security, safety, privacy. An example of the ever-advancing technology are cyber-physical systems. We propose a complex security architecture that integrates several consecrated methods such as cryptography, steganography and digital signatures. This architecture is designed to not only ensure security of communication by transforming data into secret code, it is also designed to control access to the system and detect and prevent cyber attacks.


international conference on system theory, control and computing | 2016

A different perspective on cyber-physical systems security

Laura Vegh

The advances in technology within the past decade have been huge and now we use it in almost every aspect of our lives. As a result, security has become a pressing issue, wether we are talking about the security of communications, of stored data, privacy and more. A compromised system will be an unreliable system, therefore detecting attacks as soon as possible is of crucial importance. With complex systems, such as cyber-physical systems, the efficient use of resources is also important, especially when using security methods like encryption, which require a fair amount of resources. The present paper aims to bring a solution to all of these issues. Cryptography will be used to ensure data and communications security, but also access control, while a platform called WSO2 Data Analytics Server will be used for attack detection and for increasing the efficiency of communications within the system.


ieee international conference on automation quality and testing robotics | 2014

Multi-agent system with hierarchical private key

Stelian Flonta; Laura Vegh; Liviu Miclea; Iulia Stefan; Szilard Enyedi

A multi-agent system organized hierarchically based on a set of hierarchical keys can analyze, decide and decrypt a message. The message is encrypted using a public key chosen randomly from a set of public keys. The system analyzes and determines the set of keys used for encryption and decrypts the message.


international conference on autonomic and autonomous systems | 2011

Multi-agent Hierarchical System Based on ElGamal Decryption Algorithm With K+1 Access Levels

Iulia Ştefan; Laura Vegh; George Dan Mois; Stelian Flonta; Szilard Enyedi; Liviu Miclea


international conference on communications | 2016

Secure and efficient communication in cyber-physical systems through cryptography and complex event processing

Laura Vegh; Liviu Miclea


international conference on industrial technology | 2015

Access control in cyber-physical systems using steganography and digital signatures

Laura Vegh; Liviu Miclea


international conference on systems, signals and image processing | 2014

A new approach towards increased security in cyber-physical systems

Laura Vegh; Liviu Miclea

Collaboration


Dive into the Laura Vegh's collaboration.

Top Co-Authors

Avatar

Liviu Miclea

Technical University of Cluj-Napoca

View shared research outputs
Top Co-Authors

Avatar

Stelian Flonta

Technical University of Cluj-Napoca

View shared research outputs
Top Co-Authors

Avatar

Szilard Enyedi

Technical University of Cluj-Napoca

View shared research outputs
Top Co-Authors

Avatar

George Dan Mois

Technical University of Cluj-Napoca

View shared research outputs
Top Co-Authors

Avatar

Iulia Stefan

Technical University of Cluj-Napoca

View shared research outputs
Top Co-Authors

Avatar

Iulia Ştefan

Technical University of Cluj-Napoca

View shared research outputs
Researchain Logo
Decentralizing Knowledge