attacks. Moreover, the SECURER recommends the
integration of encrypted signals and implementing a
dynamic code verification system that can invalidate
a code immediately once it is used, further enhancing
the system’s security. Even if very simple, the ex-
periment proves the proposal’s feasibility and lets us
highlight the peculiarity, potentiality, and criticalities
of the SECURER implementation.
The findings indicate that vehicles do not automat-
ically realign the rolling codes upon receiving sequen-
tial lock/unlock prompts from various sources. This
discovery, alongside the identified test scenarios and
the examination of real-time replay attacks, is antici-
pated to refine our approach to cybersecurity, focusing
on user safety and trust. This strategy of consistent
user feedback and achieving optimization is outlined
in our SECURER’s designed architecture and opera-
tional model. However, the integration of components
within our SECURER is crucial for the effectiveness
of our cybersecurity testing framework.
7 CONCLUSIONS AND FUTURE
WORK
The SECURER framework provides a plan to protect
against replay attacks on rolling code systems, crucial
for safeguarding vehicles and the broader IoT ecosys-
tem. The paper outlines the framework’s structure
and core functionality and a preliminary prototype to
demonstrate its feasibility. Future improvements in-
clude integrating with updated cybersecurity tools to
cater to a wider range of users and application do-
mains, enhancing the process of collecting user test
requirements, and exploring the possibility of inte-
grating GitHub Lab for user feedback and test reports.
ACKNOWLEDGEMENTS
This work was partially supported by the project
RESTART (PE00000001) and the project SER-
ICS (PE00000014) under the NRRP MUR program
funded by the EU - NextGenerationEU.
REFERENCES
Ali, M., Shahroz, M., Mushtaq, M. F., Alfarhood, S.,
Safran, M. S., and Ashraf, I. (2024). Hybrid machine
learning model for efficient botnet attack detection in
iot environment. IEEE Access, 12:40682–40699.
Barhamgi, M., Perera, C., Ghedira, C., and Benslimane, D.
(2018). User-centric privacy engineering for the inter-
net of things. IEEE Cloud Computing, 5(5):47–57.
Barsocchi, P., Calabr
`
o, A., Crivello, A., Daoudagh, S.,
Furfari, F., Girolami, M., and Marchetti, E. (2021).
COVID-19 & privacy: Enhancing of indoor localiza-
tion architectures towards effective social distancing.
Array, 9:100051.
Barsocchi, P., Calabr
`
o, A., Ferro, E., Gennaro, C.,
Marchetti, E., and Vairo, C. (2018). Boosting a low-
cost smart home environment with usage and access
control rules. Sensors, 18(6):1886.
Calabr
`
o, A., Cioroaica, E., Daoudagh, S., and Marchetti,
E. (2021). BIECO runtime auditing framework. In
14th (CISIS and ICEUTE), 2021, volume 1400 of Ad-
vances in Intel. Systems and Computing, pages 181–
191. Springer.
Gupta, S., Maple, C., and Passerone, R. (2023). An inves-
tigation of cyber-attacks and security mechanisms for
connected and autonomous vehicles. IEEE Access.
Heiding, F., S
¨
uren, E., Oleg
˚
ard, J., and Lagerstr
¨
om, R.
(2023). Penetration testing of connected households.
Computers & Security, 126:103067.
Hsu, C.-H., Alavi, A. H., and Dong, M. (2023). Introduction
to the special section on cyber security in iov.
Huang, H.-C., Liu, I.-H., Lee, M.-H., and Li, J.-S. (2023).
Anomaly detection on network traffic for the health-
care iot. Engineering Proceedings, 55(1).
Matheu-Garc
´
ıa, S. N., Hern
´
andez-Ramos, J. L., Skarmeta,
A. F., and Baldini, G. (2019). Risk-based automated
assessment and testing for the cybersecurity certifica-
tion and labelling of iot devices. Computer Standards
& Interfaces, 62:64–83.
Pietrantuono, R., Ficco, M., and Palmieri, F. (2023). Testing
the resilience of mec-based iot applications against re-
source exhaustion attacks. IEEE Transactions on De-
pendable and Secure Computing.
Puthal, D., Wilson, S., Nanda, A., Liu, M., Swain, S., Sa-
hoo, B. P., Yelamarthi, K., Pillai, P., El-Sayed, H., and
Prasad, M. (2022). Decision tree based user-centric
security solution for critical iot infrastructure. Com-
puters and Electrical Engineering, 99:107754.
Puthal, D., Yang, L. T., Dustdar, S., Wen, Z., Jun, S.,
Moorsel, A. v., and Ranjan, R. (2020). A user-centric
security solution for internet of things and edge con-
vergence. ACM Transactions on Cyber-Physical Sys-
tems, 4(3):1–19.
Rivadeneira, J. E., Silva, J. S., Colomo-Palacios, R., Ro-
drigues, A., and Boavida, F. (2023). User-centric pri-
vacy preserving models for a new era of the internet
of things. Journal of Network and Computer Applica-
tions, page 103695.
S
´
aez-de C
´
amara, X., Flores, J. L., Arellano, C., Urbieta,
A., and Zurutuza, U. (2023). Gotham testbed: a re-
producible iot testbed for security experiments and
dataset generation. IEEE Transactions on Dependable
and Secure Computing.
WEBIST 2024 - 20th International Conference on Web Information Systems and Technologies
400