Next Article in Journal
Development of a Business Assessment and Diagnosis Tool That Considers the Impact of the Human Factor during Industrial Revolutions
Next Article in Special Issue
ACM-SH: An Efficient Access Control and Key Establishment Mechanism for Sustainable Smart Healthcare
Previous Article in Journal
A Human-Centric Model for Sustainable Asset Management in Railway: A Case Study
Previous Article in Special Issue
Efficient Neighbour Feedback Based Trusted Multi Authenticated Node Routing Model for Secure Data Transmission
 
 
Article
Peer-Review Record

Juice Jacking: Security Issues and Improvements in USB Technology

Sustainability 2022, 14(2), 939; https://doi.org/10.3390/su14020939
by Debabrata Singh 1,†, Anil Kumar Biswal 2,†, Debabrata Samanta 3,†, Dilbag Singh 4,† and Heung-No Lee  4,*,†
Reviewer 1: Anonymous
Reviewer 2: Anonymous
Sustainability 2022, 14(2), 939; https://doi.org/10.3390/su14020939
Submission received: 30 November 2021 / Revised: 7 January 2022 / Accepted: 11 January 2022 / Published: 14 January 2022

Round 1

Reviewer 1 Report

The research is acceptable. The researcher tackled an important topic and a means of transferring data between devices with confidentiality and sensitivity, and this is one of the important topics in cyber security, and the results were satisfactory and convincing.

Author Response

Dear Editor-In-Chief,

We thank you for your time and effort in processing our paper. We have revised our paper,

addressing each of the comments from the reviewers. We also thank you for receiving our revised manuscript and considering it for review. We appreciate your time and look forward to your kind response. All of our changes are indicated in BLUE in the revised manuscript. We trust these corrections will meet the reviewer’s necessities.

 Manuscript Submission Number: sustainability-1511615

 Title: Juice Jacking: Security Issues & Improvement of USB Technology

 Reviewer 1

Comment 1. The researcher tackled an important topic and a means of transferring data between devices with confidentiality and sensitivity, and this is one of the important topics in cyber security, and the results were satisfactory and convincing.

Answer: Thank you for your appreciation.

A large amount of data is being transferred from one person to another. Data transfer is used for several different fields and development on the way to further protect sensitive data. However, sensitive data still get leaked on mobile devices. The sensitive data can get leaked through the bus line, and should maintain confidentiality and integrity. Juice jacking is a popular and spreading cyber-attack that allows intruders to get inside our system through the web and theft our personal data inside through the peripheral communications Universal Serial Bus (USB). So we tried to analyze these attacks and their solutions with possible ways through which a system can affect by a USB attack.

Reviewer 2 Report

The topic Juice Jacking: Security Issues Improvement of USB Technology is potentially interesting, however, there are some issues that should be addressed by the authors: The Introduction" sections can be made much more impressive by highlighting your contributions. The contribution of the study should be explained simply and clearly. The authors should further enlarge the Introduction with current works based on artificial intelligence to improve the research background, for example: Application of Data Encryption Technology in Computer Network Security; Experimental Setup for Online Fault Diagnosis of Induction Machines via Promising IoT and Machine Learning: Towards Industry 4.0 Empowerment; Towards Secured Online Monitoring for Digitalized GIS Against Cyber-Attacks Based on IoT and Machine Learning, Effective multi-sensor data fusion for chatter detection in milling process‏; Effective feature selection with fuzzy entropy and similarity classifier for chatter vibration diagnosis; Effective multi-sensor data fusion for chatter detection in milling process‏.

Clarify how you adjust the parameters of KNN

If possible can you present the confusing matrix

Try to compare your method KNN with others in the literature

Increase the quality of all Figures

Conclusion section should be rearranged. According to the topic of the paper, the authors may propose some interesting problems as future work in the conclusion.

Author Response

Dear Editor-In-Chief,

 

We thank you for your time and effort for processing our paper. We have revised our paper,

addressing each of the comments from the reviewers. We also thank you for receiving our revised manuscript and considering it for review. We appreciate your time and look forward to your kind response. All of our changes are indicated in BLUE in the revised manuscript. We trust these corrections will meet the reviewer’s necessities.

 

Manuscript Submission Number: sustainability-1511615

 

Title: Juice Jacking: Security Issues & Improvement of USB Technology

 

Reviewer 2

Comment1.The Introduction" sections can be made much more impressive by highlighting your contributions.

Answer:Thank you for positive comment. Now, you can find our Contribution is at 1.4 Section.You can see the revisions for this comment on page no: 03.

Comment2. The contribution of the study should be explained simply and clearly.

Answer: Thank you for positive comment. Contribution is now updated explained simply and clearly at section 1.You can see the revisions for this comment on page no: 03.

Comment3.The authors should further enlarge the Introduction with current works based on artificial intelligence to improve the research background, for example: Application of DataEncryption Technology in Computer Network Security.

Answer:Thank you for positive comment. Now the Introduction is enlarged in the final updated document at section 1.You can see the revisions for this comment on page no: 02.

Comment4.Experimental Setup for Online Fault Diagnosis of Induction Machines via Promising IoT and Machine Learning: Towards Industry 4.0 Empowerment; Towards Secured Online monitoringfor Digitalized GIS Against Cyber-Attacks Based on IoT and Machine Learning, Effective multi-sensor data fusion for chatter detection in milling process‏; Effective feature selection with fuzzy entropy and similarity classifier for chatter vibration diagnosis; Effective multi-sensor data fusion for chatter detection in milling process‏.

Answer: Thank you for positive comment. Now the Cyber-Attacks Based on IoT is also updated in the final updated document.There are a large variety of cyberattacks that attackers can leverage against IoTs, depending on what aspect of the system they are targeting and what they hope to gain from the attack. As such, there is a large volume of research into cybersecurity surrounding IoT. This includes Artifcial Intelligence (AI) approaches to protecting IoT systems from attackers, usually in terms of detecting unusual behavior that may indicate an attack is occurring [6]. However, in the case of IoT, cyber-attackers always have the upper hand as they only need to find one vulnerability while cybersecurity experts must protect multiple targets. This has led to increased use of AI by cyber-attackers as well, in order to thwart the complicated algorithms that detect anomalous activity and pass by unnoticed. AI has received much attention with the growth of IoT technologies.

Comment5.If possible can you present, the confusing matrix

Answer:Thank you for positive comment. This system experimented on ten number of malwares. The overall analysis was performed on 10 frames with TPM (Truly Positive Malware), FNM (Falsely Positive Malware), FNM (Falsely Negative Malware), TNM (Truly Negative Malware).You can see the revisions for this comment on page no: 11 and section 5.1.

Predicted Values

Actual Values

TPM

4

FNM

1

FPM

2

TNM

3

 

Comment6.  Clarify how you adjust the parameters of KNN.

Answer: Thank you for positive comment.When the phone is connected to the charger, then the KNN classifier adjusts the parameters by using a distance metric like Euclidean distance. For detection of threshold, we calculate the Euclidean distance, which represents the comparison between current usage change and the pre-computed array as in equation (1)   

Where, D=Distance,=value of the ith attribute of points  .

Comment7. Try to compare your method KNN with others in the literature.

Answer: Thank you for positive comment. Now, the comparison is updated in the final manuscript at the literature section 2. You can see the revisions for this comment on page no: 04.

Comment8. Increase the quality of all Figures.

Answer: Thank you for positive comment. Yes, now the quality of all figures are improved in the manuscript.You can see the revisions for this comment on page no: 05 to 10.

Comment9. Conclusion section should be rearranged. According to the topic of the paper, the authors may propose some interesting problems as future work in the conclusion.

Answer: Thank you for positive comment. Now the conclusion section rearranged in this manuscript at section 7 and page no: 11.

Round 2

Reviewer 2 Report

The authors should further enlarge the Introduction with current works based on artificial intelligence and cybersecurity on different applications

Author Response

Dear Editor,

                      First, we would like to express our gratitude to the editorial team, and the learned reviewers whose valuable comments on this paper have significantly improved the quality of the manuscript. All the comments have been addressed in the revised manuscript and the item-by-item response to the mentioned comments is given below. A number of major alterations have been made to correct grammatical mistakes and improve the expression.

Author Response File: Author Response.pdf

Round 3

Reviewer 2 Report

The authors handled all comments. Thank you

Back to TopTop