Juice Jacking: Security Issues and Improvements in USB Technology
Round 1
Reviewer 1 Report
The research is acceptable. The researcher tackled an important topic and a means of transferring data between devices with confidentiality and sensitivity, and this is one of the important topics in cyber security, and the results were satisfactory and convincing.
Author Response
Dear Editor-In-Chief,
We thank you for your time and effort in processing our paper. We have revised our paper,
addressing each of the comments from the reviewers. We also thank you for receiving our revised manuscript and considering it for review. We appreciate your time and look forward to your kind response. All of our changes are indicated in BLUE in the revised manuscript. We trust these corrections will meet the reviewer’s necessities.
Manuscript Submission Number: sustainability-1511615
Title: Juice Jacking: Security Issues & Improvement of USB Technology
Reviewer 1
Comment 1. The researcher tackled an important topic and a means of transferring data between devices with confidentiality and sensitivity, and this is one of the important topics in cyber security, and the results were satisfactory and convincing.
Answer: Thank you for your appreciation.
A large amount of data is being transferred from one person to another. Data transfer is used for several different fields and development on the way to further protect sensitive data. However, sensitive data still get leaked on mobile devices. The sensitive data can get leaked through the bus line, and should maintain confidentiality and integrity. Juice jacking is a popular and spreading cyber-attack that allows intruders to get inside our system through the web and theft our personal data inside through the peripheral communications Universal Serial Bus (USB). So we tried to analyze these attacks and their solutions with possible ways through which a system can affect by a USB attack.
Reviewer 2 Report
The topic Juice Jacking: Security Issues Improvement of USB Technology is potentially interesting, however, there are some issues that should be addressed by the authors: The Introduction" sections can be made much more impressive by highlighting your contributions. The contribution of the study should be explained simply and clearly. The authors should further enlarge the Introduction with current works based on artificial intelligence to improve the research background, for example: Application of Data Encryption Technology in Computer Network Security; Experimental Setup for Online Fault Diagnosis of Induction Machines via Promising IoT and Machine Learning: Towards Industry 4.0 Empowerment; Towards Secured Online Monitoring for Digitalized GIS Against Cyber-Attacks Based on IoT and Machine Learning, Effective multi-sensor data fusion for chatter detection in milling process; Effective feature selection with fuzzy entropy and similarity classifier for chatter vibration diagnosis; Effective multi-sensor data fusion for chatter detection in milling process.
Clarify how you adjust the parameters of KNN
If possible can you present the confusing matrix
Try to compare your method KNN with others in the literature
Increase the quality of all Figures
Conclusion section should be rearranged. According to the topic of the paper, the authors may propose some interesting problems as future work in the conclusion.
Author Response
Dear Editor-In-Chief,
We thank you for your time and effort for processing our paper. We have revised our paper,
addressing each of the comments from the reviewers. We also thank you for receiving our revised manuscript and considering it for review. We appreciate your time and look forward to your kind response. All of our changes are indicated in BLUE in the revised manuscript. We trust these corrections will meet the reviewer’s necessities.
Manuscript Submission Number: sustainability-1511615
Title: Juice Jacking: Security Issues & Improvement of USB Technology
Reviewer 2
Comment1.The Introduction" sections can be made much more impressive by highlighting your contributions.
Answer:Thank you for positive comment. Now, you can find our Contribution is at 1.4 Section.You can see the revisions for this comment on page no: 03.
Comment2. The contribution of the study should be explained simply and clearly.
Answer: Thank you for positive comment. Contribution is now updated explained simply and clearly at section 1.You can see the revisions for this comment on page no: 03.
Comment3.The authors should further enlarge the Introduction with current works based on artificial intelligence to improve the research background, for example: Application of DataEncryption Technology in Computer Network Security.
Answer:Thank you for positive comment. Now the Introduction is enlarged in the final updated document at section 1.You can see the revisions for this comment on page no: 02.
Comment4.Experimental Setup for Online Fault Diagnosis of Induction Machines via Promising IoT and Machine Learning: Towards Industry 4.0 Empowerment; Towards Secured Online monitoringfor Digitalized GIS Against Cyber-Attacks Based on IoT and Machine Learning, Effective multi-sensor data fusion for chatter detection in milling process; Effective feature selection with fuzzy entropy and similarity classifier for chatter vibration diagnosis; Effective multi-sensor data fusion for chatter detection in milling process.
Answer: Thank you for positive comment. Now the Cyber-Attacks Based on IoT is also updated in the final updated document.There are a large variety of cyberattacks that attackers can leverage against IoTs, depending on what aspect of the system they are targeting and what they hope to gain from the attack. As such, there is a large volume of research into cybersecurity surrounding IoT. This includes Artifcial Intelligence (AI) approaches to protecting IoT systems from attackers, usually in terms of detecting unusual behavior that may indicate an attack is occurring [6]. However, in the case of IoT, cyber-attackers always have the upper hand as they only need to find one vulnerability while cybersecurity experts must protect multiple targets. This has led to increased use of AI by cyber-attackers as well, in order to thwart the complicated algorithms that detect anomalous activity and pass by unnoticed. AI has received much attention with the growth of IoT technologies.
Comment5.If possible can you present, the confusing matrix
Answer:Thank you for positive comment. This system experimented on ten number of malwares. The overall analysis was performed on 10 frames with TPM (Truly Positive Malware), FNM (Falsely Positive Malware), FNM (Falsely Negative Malware), TNM (Truly Negative Malware).You can see the revisions for this comment on page no: 11 and section 5.1.
Predicted Values |
||
Actual Values |
TPM 4 |
FNM 1 |
FPM 2 |
TNM 3 |
Comment6. Clarify how you adjust the parameters of KNN.
Answer: Thank you for positive comment.When the phone is connected to the charger, then the KNN classifier adjusts the parameters by using a distance metric like Euclidean distance. For detection of threshold, we calculate the Euclidean distance, which represents the comparison between current usage change and the pre-computed array as in equation (1)
Where, D=Distance,=value of the ith attribute of points .
Comment7. Try to compare your method KNN with others in the literature.
Answer: Thank you for positive comment. Now, the comparison is updated in the final manuscript at the literature section 2. You can see the revisions for this comment on page no: 04.
Comment8. Increase the quality of all Figures.
Answer: Thank you for positive comment. Yes, now the quality of all figures are improved in the manuscript.You can see the revisions for this comment on page no: 05 to 10.
Comment9. Conclusion section should be rearranged. According to the topic of the paper, the authors may propose some interesting problems as future work in the conclusion.
Answer: Thank you for positive comment. Now the conclusion section rearranged in this manuscript at section 7 and page no: 11.
Round 2
Reviewer 2 Report
The authors should further enlarge the Introduction with current works based on artificial intelligence and cybersecurity on different applications
Author Response
Dear Editor,
First, we would like to express our gratitude to the editorial team, and the learned reviewers whose valuable comments on this paper have significantly improved the quality of the manuscript. All the comments have been addressed in the revised manuscript and the item-by-item response to the mentioned comments is given below. A number of major alterations have been made to correct grammatical mistakes and improve the expression.
Author Response File: Author Response.pdf
Round 3
Reviewer 2 Report
The authors handled all comments. Thank you