首页 > 最新文献

High-Confidence Computing最新文献

英文 中文
An attribute-based access control scheme using blockchain technology for IoT data protection 利用区块链技术保护物联网数据的基于属性的访问控制方案
IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-09 DOI: 10.1016/j.hcc.2024.100199

With the wide application of the Internet of Things (IoT), storing large amounts of IoT data and protecting data privacy has become a meaningful issue. In general, the access control mechanism is used to prevent illegal users from accessing private data. However, traditional data access control schemes face some non-ignorable problems, such as only supporting coarse-grained access control, the risk of centralization, and high trust issues. In this paper, an attribute-based data access control scheme using blockchain technology is proposed. To address these problems, attribute-based encryption (ABE) has become a promising solution for encrypted data access control. Firstly, we utilize blockchain technology to construct a decentralized access control scheme, which can grant data access with transparency and traceability. Furthermore, our scheme also guarantees the privacy of policies and attributes on the blockchain network. Secondly, we optimize an ABE scheme, which makes the size of system parameters smaller and improves the efficiency of algorithms. These optimizations enable our proposed scheme supports large attribute universe requirements in IoT environments. Thirdly, to prohibit attribute impersonation and attribute replay attacks, we design a challenge-response mechanism to verify the ownership of attributes. Finally, we evaluate the security and performance of the scheme. And comparisons with other related schemes show the advantages of our proposed scheme. Compared to existing schemes, our scheme has more comprehensive advantages, such as supporting a large universe, full security, expressive policy, and policy hiding.

随着物联网(IoT)的广泛应用,存储大量物联网数据和保护数据隐私已成为一个有意义的问题。一般来说,访问控制机制用于防止非法用户访问隐私数据。然而,传统的数据访问控制方案面临着一些不可忽视的问题,如仅支持粗粒度访问控制、集中化风险和高信任问题等。本文提出了一种利用区块链技术的基于属性的数据访问控制方案。为了解决这些问题,基于属性的加密(ABE)已成为加密数据访问控制的一种有前途的解决方案。首先,我们利用区块链技术构建了一种去中心化的访问控制方案,该方案可以透明、可追溯地授予数据访问权限。此外,我们的方案还能保证区块链网络中策略和属性的隐私性。其次,我们优化了 ABE 方案,使系统参数的大小更小,并提高了算法的效率。这些优化使我们提出的方案能够支持物联网环境中的大型属性宇宙需求。第三,为了禁止属性冒充和属性重放攻击,我们设计了一种挑战-响应机制来验证属性的所有权。最后,我们对方案的安全性和性能进行了评估。与其他相关方案的比较显示了我们提出的方案的优势。与现有方案相比,我们的方案具有更全面的优势,如支持大宇宙、全面安全、策略表现力强、策略隐藏等。
{"title":"An attribute-based access control scheme using blockchain technology for IoT data protection","authors":"","doi":"10.1016/j.hcc.2024.100199","DOIUrl":"10.1016/j.hcc.2024.100199","url":null,"abstract":"<div><p>With the wide application of the Internet of Things (IoT), storing large amounts of IoT data and protecting data privacy has become a meaningful issue. In general, the access control mechanism is used to prevent illegal users from accessing private data. However, traditional data access control schemes face some non-ignorable problems, such as only supporting coarse-grained access control, the risk of centralization, and high trust issues. In this paper, an attribute-based data access control scheme using blockchain technology is proposed. To address these problems, attribute-based encryption (ABE) has become a promising solution for encrypted data access control. Firstly, we utilize blockchain technology to construct a decentralized access control scheme, which can grant data access with transparency and traceability. Furthermore, our scheme also guarantees the privacy of policies and attributes on the blockchain network. Secondly, we optimize an ABE scheme, which makes the size of system parameters smaller and improves the efficiency of algorithms. These optimizations enable our proposed scheme supports large attribute universe requirements in IoT environments. Thirdly, to prohibit attribute impersonation and attribute replay attacks, we design a challenge-response mechanism to verify the ownership of attributes. Finally, we evaluate the security and performance of the scheme. And comparisons with other related schemes show the advantages of our proposed scheme. Compared to existing schemes, our scheme has more comprehensive advantages, such as supporting a large universe, full security, expressive policy, and policy hiding.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 3","pages":"Article 100199"},"PeriodicalIF":3.2,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000023/pdfft?md5=94aae462b2facd3898d43562d260127f&pid=1-s2.0-S2667295224000023-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140790567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent edge CDN with smart contract-aided local IoT sharing 利用智能合约辅助本地物联网共享的智能边缘 CDN
IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-04 DOI: 10.1016/j.hcc.2024.100225
A content delivery network (CDN) aims to reduce the content delivery latency to end-users by using distributed cache servers. Nevertheless, deploying and maintaining cache servers on a large scale is very expensive. To solve this problem, CDN providers have developed a new content delivery strategy: allowing end-users’s IoT edge devices to share their storage/bandwidth resources. This new edge CDN platform must address two core questions: (1) how can we incentivize end users to share IoT devices? (2) how can we facilitate a safe and transparent content transaction environment for end users? This paper introduces SmartSharing, a new content delivery network solution to address these questions. In smartSharing, the over-the-top (OTT) IoT devices belonging to end-users are used as mini-cache servers. To motivate end users to share the idle devices and storage/bandwidth resources, SmartSharing designs the content delivery schedule and the pricing scheme based on game theory and machine learning algorithms (specifically, a tailored expectation-maximization (EM) algorithm). To facilitate content trading among end users, SmartSharing creates a secure and transparent transaction platform based on smart contracts in Ethereum. In addition, SmartSharing’s performance evaluation is through trace-driven simulations in the real world and a prototype using content metadata and the achieved pricing schemes. The evaluation results show that CDN providers, end users and content providers can all benefit from our SmartSharing framework.
内容分发网络(CDN)旨在通过使用分布式缓存服务器,减少向终端用户分发内容的延迟。然而,大规模部署和维护缓存服务器非常昂贵。为了解决这个问题,CDN 提供商开发了一种新的内容交付策略:允许终端用户的物联网边缘设备共享其存储/带宽资源。这种新的边缘 CDN 平台必须解决两个核心问题:(1)如何激励终端用户共享物联网设备?(2) 如何为终端用户提供安全透明的内容交易环境?本文介绍了解决这些问题的新型内容交付网络解决方案 SmartSharing。在 SmartSharing 中,终端用户的 OTT 物联网设备被用作小型缓存服务器。为了激励终端用户共享闲置设备和存储/带宽资源,SmartSharing 基于博弈论和机器学习算法(特别是定制的期望最大化(EM)算法)设计了内容交付计划和定价方案。为促进终端用户之间的内容交易,SmartSharing 基于以太坊智能合约创建了一个安全透明的交易平台。此外,SmartSharing 的性能评估是通过现实世界中的跟踪驱动模拟以及使用内容元数据和已实现定价方案的原型进行的。评估结果表明,CDN 提供商、终端用户和内容提供商都能从我们的 SmartSharing 框架中受益。
{"title":"Intelligent edge CDN with smart contract-aided local IoT sharing","authors":"","doi":"10.1016/j.hcc.2024.100225","DOIUrl":"10.1016/j.hcc.2024.100225","url":null,"abstract":"<div><div>A content delivery network (CDN) aims to reduce the content delivery latency to end-users by using distributed cache servers. Nevertheless, deploying and maintaining cache servers on a large scale is very expensive. To solve this problem, CDN providers have developed a new content delivery strategy: allowing end-users’s IoT edge devices to share their storage/bandwidth resources. This new edge CDN platform must address two core questions: (1) how can we incentivize end users to share IoT devices? (2) how can we facilitate a safe and transparent content transaction environment for end users? This paper introduces SmartSharing, a new content delivery network solution to address these questions. In smartSharing, the over-the-top (OTT) IoT devices belonging to end-users are used as mini-cache servers. To motivate end users to share the idle devices and storage/bandwidth resources, SmartSharing designs the content delivery schedule and the pricing scheme based on game theory and machine learning algorithms (specifically, a tailored expectation-maximization (EM) algorithm). To facilitate content trading among end users, SmartSharing creates a secure and transparent transaction platform based on smart contracts in Ethereum. In addition, SmartSharing’s performance evaluation is through trace-driven simulations in the real world and a prototype using content metadata and the achieved pricing schemes. The evaluation results show that CDN providers, end users and content providers can all benefit from our SmartSharing framework.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 4","pages":"Article 100225"},"PeriodicalIF":3.2,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140771215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aquilo: Temperature-aware scheduler for millimeter-wave devices and networks Aquilo:毫米波设备和网络的温度感知调度器
IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-27 DOI: 10.1016/j.hcc.2024.100223
Millimeter-wave is the core technology to enable multi-Gbps throughput and ultra-low latency connectivity. But the devices need to operate at very high frequency and ultra-wide bandwidth: They consume more energy, dissipate more power, and subsequently heat up faster. Device overheating is a common concern of many users, and millimeter-wave would exacerbate the problem. In this work, we first thermally characterize millimeter-wave devices. Our measurements reveal that after only 10 s of data transfer at 1.9 Gbps bit-rate, the millimeter-wave antenna temperature reaches 68°C; it reduces the link throughput by 21%, increases the standard deviation of throughput by 6×, and takes 130 s to dissipate the heat completely. Besides degrading the user experience, exposure to high device temperature also creates discomfort. Based on the measurement insights, we propose Aquilo, a temperature-aware, multi-antenna network scheduler. It maintains relatively high throughput performance but cools down the devices substantially. Our testbed experiments under both static and mobile conditions demonstrate that Aquilo achieves a median peak temperature only 0.5°C to 2°C above the optimal while sacrificing less than 10% of throughput.
毫米波是实现多 Gbps 吞吐量和超低延迟连接的核心技术。但是,设备需要在非常高的频率和超宽的带宽下运行:它们消耗更多的能量,耗散更多的功率,并随之更快地发热。设备过热是许多用户普遍担心的问题,而毫米波会加剧这一问题。在这项工作中,我们首先对毫米波设备进行了热特性分析。我们的测量结果表明,在 1.9 Gbps 比特率下传输数据仅 10 秒钟后,毫米波天线温度就达到 68°C;这会使链路吞吐量降低 21%,吞吐量标准偏差增加 6 倍,并且需要 130 秒才能完全散热。除了降低用户体验外,暴露在高设备温度下还会造成不适。根据测量结果,我们提出了温度感知多天线网络调度器 Aquilo。它既能保持相对较高的吞吐量性能,又能大幅降低设备温度。我们在静态和移动条件下进行的测试平台实验表明,Aquilo 实现的中值峰值温度仅比最佳温度高 0.5°C 至 2°C,而牺牲的吞吐量却不到 10%。
{"title":"Aquilo: Temperature-aware scheduler for millimeter-wave devices and networks","authors":"","doi":"10.1016/j.hcc.2024.100223","DOIUrl":"10.1016/j.hcc.2024.100223","url":null,"abstract":"<div><div>Millimeter-wave is the core technology to enable multi-Gbps throughput and ultra-low latency connectivity. But the devices need to operate at very high frequency and ultra-wide bandwidth: They consume more energy, dissipate more power, and subsequently heat up faster. Device overheating is a common concern of many users, and millimeter-wave would exacerbate the problem. In this work, we first thermally characterize millimeter-wave devices. Our measurements reveal that after only 10 s of data transfer at 1.9 Gbps bit-rate, the millimeter-wave antenna temperature reaches 68°C; it reduces the link throughput by 21%, increases the standard deviation of throughput by 6<span><math><mo>×</mo></math></span>, and takes 130 s to dissipate the heat completely. Besides degrading the user experience, exposure to high device temperature also creates discomfort. Based on the measurement insights, we propose <em>Aquilo</em>, a temperature-aware, multi-antenna network scheduler. It maintains relatively high throughput performance but cools down the devices substantially. Our testbed experiments under both static and mobile conditions demonstrate that <em>Aquilo</em> achieves a median peak temperature only 0.5°C to 2°C above the optimal while sacrificing less than 10% of throughput.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 4","pages":"Article 100223"},"PeriodicalIF":3.2,"publicationDate":"2024-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140404908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Device authentication for 5G terminals via Radio Frequency fingerprints 通过射频指纹对 5G 终端进行设备验证
IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-26 DOI: 10.1016/j.hcc.2024.100222
The development of wireless communication network technology has provided people with diversified and convenient services. However, with the expansion of network scale and the increase in the number of devices, malicious attacks on wireless communication are becoming increasingly prevalent, causing significant losses. Currently, wireless communication systems authenticate identities through certain data identifiers. However, this software-based data information can be forged or replicated. This article proposes the authentication of device identity using the hardware fingerprint of the terminal’s Radio Frequency (RF) components, which possesses properties of being genuine, unique, and stable, holding significant implications for wireless communication security. Through the collection and processing of raw data, extraction of various features including time-domain and frequency-domain features, and utilizing machine learning algorithms for training and constructing a legal fingerprint database, it is possible to achieve close to a 97% recognition accuracy for Fifth Generation (5G) terminals of the same model. This provides an additional and robust hardware-based security layer for 5G communication security, enhancing monitoring capability and reliability.
无线通信网络技术的发展为人们提供了多样化的便捷服务。然而,随着网络规模的扩大和设备数量的增加,针对无线通信的恶意攻击日益猖獗,造成了重大损失。目前,无线通信系统通过某些数据标识符来验证身份。然而,这种基于软件的数据信息可以被伪造或复制。本文提出利用终端射频(RF)组件的硬件指纹来验证设备身份,该指纹具有真实、唯一和稳定的特性,对无线通信安全具有重要意义。通过收集和处理原始数据,提取包括时域和频域特征在内的各种特征,并利用机器学习算法进行训练和构建合法指纹数据库,可以使相同型号的第五代(5G)终端达到接近 97% 的识别准确率。这为 5G 通信安全提供了一个额外的、基于硬件的稳健安全层,提高了监控能力和可靠性。
{"title":"Device authentication for 5G terminals via Radio Frequency fingerprints","authors":"","doi":"10.1016/j.hcc.2024.100222","DOIUrl":"10.1016/j.hcc.2024.100222","url":null,"abstract":"<div><div>The development of wireless communication network technology has provided people with diversified and convenient services. However, with the expansion of network scale and the increase in the number of devices, malicious attacks on wireless communication are becoming increasingly prevalent, causing significant losses. Currently, wireless communication systems authenticate identities through certain data identifiers. However, this software-based data information can be forged or replicated. This article proposes the authentication of device identity using the hardware fingerprint of the terminal’s Radio Frequency (RF) components, which possesses properties of being genuine, unique, and stable, holding significant implications for wireless communication security. Through the collection and processing of raw data, extraction of various features including time-domain and frequency-domain features, and utilizing machine learning algorithms for training and constructing a legal fingerprint database, it is possible to achieve close to a 97% recognition accuracy for Fifth Generation (5G) terminals of the same model. This provides an additional and robust hardware-based security layer for 5G communication security, enhancing monitoring capability and reliability.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 4","pages":"Article 100222"},"PeriodicalIF":3.2,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140404945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph isomorphism—Characterization and efficient algorithms 图同构--特征和高效算法
IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-26 DOI: 10.1016/j.hcc.2024.100224
The Graph isomorphism problem involves determining whether two graphs are isomorphic and the computational complexity required for this determination. In general, the problem is not known to be solvable in polynomial time, nor to be NP-complete. In this paper, by analyzing the algebraic properties of the adjacency matrices of the undirected graph, we first established the connection between graph isomorphism and matrix row and column interchanging operations. Then, we prove that for undirected graphs, the complexity in determining whether two graphs are isomorphic is at most O(n3).
图同构问题涉及确定两个图是否同构以及确定所需的计算复杂度。一般来说,这个问题既不能在多项式时间内求解,也不是 NP-完全问题。本文通过分析无向图邻接矩阵的代数性质,首先建立了图同构与矩阵行列互换操作之间的联系。然后,我们证明了对于无向图,判断两个图是否同构的复杂度最多为 O(n3)。
{"title":"Graph isomorphism—Characterization and efficient algorithms","authors":"","doi":"10.1016/j.hcc.2024.100224","DOIUrl":"10.1016/j.hcc.2024.100224","url":null,"abstract":"<div><div>The Graph isomorphism problem involves determining whether two graphs are isomorphic and the computational complexity required for this determination. In general, the problem is not known to be solvable in polynomial time, nor to be NP-complete. In this paper, by analyzing the algebraic properties of the adjacency matrices of the undirected graph, we first established the connection between graph isomorphism and matrix row and column interchanging operations. Then, we prove that for undirected graphs, the complexity in determining whether two graphs are isomorphic is at most <span><math><mrow><mi>O</mi><mrow><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>3</mn></mrow></msup><mo>)</mo></mrow></mrow></math></span>.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 4","pages":"Article 100224"},"PeriodicalIF":3.2,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140402465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive study on IoT privacy and security challenges with focus on spectrum sharing in Next-Generation networks (5G/6G/beyond) 以下一代网络(5G/6G/beyond)频谱共享为重点的物联网隐私和安全挑战综合研究
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-12 DOI: 10.1016/j.hcc.2024.100220
Lakshmi Priya Rachakonda , Madhuri Siddula , Vanlin Sathya

The emergence of the Internet of Things (IoT) has triggered a massive digital transformation across numerous sectors. This transformation requires efficient wireless communication and connectivity, which depend on the optimal utilization of the available spectrum resource. Given the limited availability of spectrum resources, spectrum sharing has emerged as a favored solution to empower IoT deployment and connectivity, so adequate planning of the spectrum resource utilization is thus essential to pave the way for the next generation of IoT applications, including 5G and beyond. This article presents a comprehensive study of prevalent wireless technologies employed in the field of the spectrum, with a primary focus on spectrum-sharing solutions, including shared spectrum. It highlights the associated security and privacy concerns when the IoT devices access the shared spectrum. This survey examines the benefits and drawbacks of various spectrum-sharing technologies and their solutions for various IoT applications. Lastly, it identifies future IoT obstacles and suggests potential research directions to address them.

物联网(IoT)的出现引发了众多领域的大规模数字化转型。这种转型需要高效的无线通信和连接,而这取决于对可用频谱资源的优化利用。鉴于可用频谱资源有限,频谱共享已成为增强物联网部署和连接能力的首选解决方案,因此必须对频谱资源利用进行充分规划,以便为下一代物联网应用(包括 5G 及其他)铺平道路。本文全面研究了频谱领域采用的主流无线技术,主要关注频谱共享解决方案,包括共享频谱。文章强调了物联网设备访问共享频谱时的相关安全和隐私问题。本调查研究了各种频谱共享技术及其解决方案在各种物联网应用中的优缺点。最后,它指出了未来物联网的障碍,并提出了解决这些问题的潜在研究方向。
{"title":"A comprehensive study on IoT privacy and security challenges with focus on spectrum sharing in Next-Generation networks (5G/6G/beyond)","authors":"Lakshmi Priya Rachakonda ,&nbsp;Madhuri Siddula ,&nbsp;Vanlin Sathya","doi":"10.1016/j.hcc.2024.100220","DOIUrl":"10.1016/j.hcc.2024.100220","url":null,"abstract":"<div><p>The emergence of the Internet of Things (IoT) has triggered a massive digital transformation across numerous sectors. This transformation requires efficient wireless communication and connectivity, which depend on the optimal utilization of the available spectrum resource. Given the limited availability of spectrum resources, spectrum sharing has emerged as a favored solution to empower IoT deployment and connectivity, so adequate planning of the spectrum resource utilization is thus essential to pave the way for the next generation of IoT applications, including 5G and beyond. This article presents a comprehensive study of prevalent wireless technologies employed in the field of the spectrum, with a primary focus on spectrum-sharing solutions, including shared spectrum. It highlights the associated security and privacy concerns when the IoT devices access the shared spectrum. This survey examines the benefits and drawbacks of various spectrum-sharing technologies and their solutions for various IoT applications. Lastly, it identifies future IoT obstacles and suggests potential research directions to address them.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 2","pages":"Article 100220"},"PeriodicalIF":0.0,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000230/pdfft?md5=bdf9742a3a93b2c58a0a21f62393cc7c&pid=1-s2.0-S2667295224000230-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140276247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial robustness analysis of LiDAR-included models in autonomous driving 自动驾驶中包含激光雷达模型的对抗鲁棒性分析
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-01 DOI: 10.1016/j.hcc.2024.100203
Bo Yang , Zizhi Jin , Yushi Cheng , Xiaoyu Ji , Wenyuan Xu

In autonomous driving systems, perception is pivotal, relying chiefly on sensors like LiDAR and cameras for environmental awareness. LiDAR, celebrated for its detailed depth perception, is being increasingly integrated into autonomous vehicles. In this article, we analyze the robustness of four LiDAR-included models against adversarial points under physical constraints. We first introduce an attack technique that, by simply adding a limited number of physically constrained adversarial points above a vehicle, can make the vehicle undetectable by the LiDAR-included models. Experiments reveal that adversarial points adversely affect the detection capabilities of both LiDAR-only and LiDAR–camera fusion models, with a tendency for more adversarial points to escalate attack success rates. Notably, voxel-based models are more susceptible to deception by these adversarial points. We also investigated the impact of the distance and angle of the added adversarial points on the attack success rate. Typically, the farther the victim object to be hidden and the closer to the front of the LiDAR, the higher the attack success rate. Additionally, we have experimentally proven that our generated adversarial points possess good cross-model adversarial transferability and validated the effectiveness of our proposed optimization method through ablation studies. Furthermore, we propose a new plug-and-play, model-agnostic defense method based on the concept of point smoothness. The ROC curve of this defense method shows an AUC value of approximately 0.909, demonstrating its effectiveness.

在自动驾驶系统中,感知至关重要,主要依靠激光雷达和摄像头等传感器来感知环境。激光雷达因其细致的深度感知而闻名,正被越来越多地集成到自动驾驶汽车中。在本文中,我们分析了四种包含激光雷达的模型在物理约束条件下对抗对抗点的鲁棒性。我们首先介绍了一种攻击技术,只需在车辆上方添加数量有限的物理约束对抗点,就能使包含激光雷达的模型无法探测到车辆。实验表明,对抗点会对纯激光雷达模型和激光雷达与相机融合模型的探测能力产生不利影响,对抗点越多,攻击成功率越高。值得注意的是,基于体素的模型更容易受到这些对抗点的欺骗。我们还研究了新增对抗点的距离和角度对攻击成功率的影响。通常情况下,要隐藏的受害对象越远,离激光雷达的前端越近,攻击成功率就越高。此外,我们还通过实验证明了我们生成的对抗点具有良好的跨模型对抗转移性,并通过烧蚀研究验证了我们提出的优化方法的有效性。此外,我们还提出了一种基于点平滑度概念的即插即用、模型无关的新防御方法。该防御方法的 ROC 曲线显示 AUC 值约为 0.909,证明了其有效性。
{"title":"Adversarial robustness analysis of LiDAR-included models in autonomous driving","authors":"Bo Yang ,&nbsp;Zizhi Jin ,&nbsp;Yushi Cheng ,&nbsp;Xiaoyu Ji ,&nbsp;Wenyuan Xu","doi":"10.1016/j.hcc.2024.100203","DOIUrl":"10.1016/j.hcc.2024.100203","url":null,"abstract":"<div><p>In autonomous driving systems, perception is pivotal, relying chiefly on sensors like LiDAR and cameras for environmental awareness. LiDAR, celebrated for its detailed depth perception, is being increasingly integrated into autonomous vehicles. In this article, we analyze the robustness of four LiDAR-included models against adversarial points under physical constraints. We first introduce an attack technique that, by simply adding a limited number of physically constrained adversarial points above a vehicle, can make the vehicle undetectable by the LiDAR-included models. Experiments reveal that adversarial points adversely affect the detection capabilities of both LiDAR-only and LiDAR–camera fusion models, with a tendency for more adversarial points to escalate attack success rates. Notably, voxel-based models are more susceptible to deception by these adversarial points. We also investigated the impact of the distance and angle of the added adversarial points on the attack success rate. Typically, the farther the victim object to be hidden and the closer to the front of the LiDAR, the higher the attack success rate. Additionally, we have experimentally proven that our generated adversarial points possess good cross-model adversarial transferability and validated the effectiveness of our proposed optimization method through ablation studies. Furthermore, we propose a new plug-and-play, model-agnostic defense method based on the concept of point smoothness. The ROC curve of this defense method shows an AUC value of approximately 0.909, demonstrating its effectiveness.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 1","pages":"Article 100203"},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000060/pdfft?md5=7e68638f7a7e1d0186a514efa45060f4&pid=1-s2.0-S2667295224000060-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139539738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving human activity sensing: A survey 保护隐私的人类活动传感:调查
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-01 DOI: 10.1016/j.hcc.2024.100204
Yanni Yang , Pengfei Hu , Jiaxing Shen , Haiming Cheng , Zhenlin An , Xiulong Liu

With the prevalence of various sensors and smart devices in people’s daily lives, numerous types of information are being sensed. While using such information provides critical and convenient services, we are gradually exposing every piece of our behavior and activities. Researchers are aware of the privacy risks and have been working on preserving privacy while sensing human activities. This survey reviews existing studies on privacy-preserving human activity sensing. We first introduce the sensors and captured private information related to human activities. We then propose a taxonomy to structure the methods for preserving private information from two aspects: individual and collaborative activity sensing. For each of the two aspects, the methods are classified into three levels: signal, algorithm, and system. Finally, we discuss the open challenges and provide future directions.

随着各种传感器和智能设备在人们日常生活中的普及,无数类型的信息被感知。在利用这些信息提供关键和便捷服务的同时,我们的行为和活动也逐渐暴露无遗。研究人员意识到了隐私风险,并一直致力于在感知人类活动的同时保护隐私。本调查回顾了有关保护隐私的人类活动传感的现有研究。我们首先介绍与人类活动相关的传感器和捕获的隐私信息。然后,我们提出了一个分类法,从个体活动传感和协作活动传感两个方面来构建保护隐私信息的方法。针对这两个方面,我们将方法分为三个层次:信号、算法和系统。最后,我们讨论了面临的挑战,并提出了未来的发展方向。
{"title":"Privacy-preserving human activity sensing: A survey","authors":"Yanni Yang ,&nbsp;Pengfei Hu ,&nbsp;Jiaxing Shen ,&nbsp;Haiming Cheng ,&nbsp;Zhenlin An ,&nbsp;Xiulong Liu","doi":"10.1016/j.hcc.2024.100204","DOIUrl":"10.1016/j.hcc.2024.100204","url":null,"abstract":"<div><p>With the prevalence of various sensors and smart devices in people’s daily lives, numerous types of information are being sensed. While using such information provides critical and convenient services, we are gradually exposing every piece of our behavior and activities. Researchers are aware of the privacy risks and have been working on preserving privacy while sensing human activities. This survey reviews existing studies on privacy-preserving human activity sensing. We first introduce the sensors and captured private information related to human activities. We then propose a taxonomy to structure the methods for preserving private information from two aspects: individual and collaborative activity sensing. For each of the two aspects, the methods are classified into three levels: signal, algorithm, and system. Finally, we discuss the open challenges and provide future directions.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 1","pages":"Article 100204"},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000072/pdfft?md5=11d4ed6df16203f7528f36440b10fd65&pid=1-s2.0-S2667295224000072-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139632503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative multi-agent game based on reinforcement learning 基于强化学习的多代理合作游戏
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-01 DOI: 10.1016/j.hcc.2024.100205
Hongbo Liu

Multi-agent reinforcement learning holds tremendous potential for revolutionizing intelligent systems across diverse domains. However, it is also concomitant with a set of formidable challenges, which include the effective allocation of credit values to each agent, real-time collaboration among heterogeneous agents, and an appropriate reward function to guide agent behavior. To handle these issues, we propose an innovative solution named the Graph Attention Counterfactual Multiagent Actor–Critic algorithm (GACMAC). This algorithm encompasses several key components: First, it employs a multi-agent actor–critic framework along with counterfactual baselines to assess the individual actions of each agent. Second, it integrates a graph attention network to enhance real-time collaboration among agents, enabling heterogeneous agents to effectively share information during handling tasks. Third, it incorporates prior human knowledge through a potential-based reward shaping method, thereby elevating the convergence speed and stability of the algorithm. We tested our algorithm on the StarCraft Multi-Agent Challenge (SMAC) platform, which is a recognized platform for testing multi-agent algorithms, and our algorithm achieved a win rate of over 95% on the platform, comparable to the current state-of-the-art multi-agent controllers.

多代理强化学习(Multi-agent reinforcement learning)在革新不同领域的智能系统方面具有巨大潜力。然而,它也伴随着一系列艰巨的挑战,其中包括为每个代理有效分配信用值、异构代理之间的实时协作以及指导代理行为的适当奖励函数。为了解决这些问题,我们提出了一种创新的解决方案,即图形注意反事实多代理代理批评算法(GACMAC)。该算法包含几个关键部分:首先,它采用多代理代理批评框架和反事实基线来评估每个代理的单独行动。其次,它整合了图注意网络,以加强代理之间的实时协作,使异构代理在处理任务时有效地共享信息。第三,它通过基于潜能的奖励塑造方法纳入了人类的先验知识,从而提高了算法的收敛速度和稳定性。我们在星际争霸多代理挑战赛(SMAC)平台上测试了我们的算法,该平台是公认的多代理算法测试平台,我们的算法在该平台上的胜率超过 95%,与目前最先进的多代理控制器相当。
{"title":"Cooperative multi-agent game based on reinforcement learning","authors":"Hongbo Liu","doi":"10.1016/j.hcc.2024.100205","DOIUrl":"10.1016/j.hcc.2024.100205","url":null,"abstract":"<div><p>Multi-agent reinforcement learning holds tremendous potential for revolutionizing intelligent systems across diverse domains. However, it is also concomitant with a set of formidable challenges, which include the effective allocation of credit values to each agent, real-time collaboration among heterogeneous agents, and an appropriate reward function to guide agent behavior. To handle these issues, we propose an innovative solution named the Graph Attention Counterfactual Multiagent Actor–Critic algorithm (GACMAC). This algorithm encompasses several key components: First, it employs a multi-agent actor–critic framework along with counterfactual baselines to assess the individual actions of each agent. Second, it integrates a graph attention network to enhance real-time collaboration among agents, enabling heterogeneous agents to effectively share information during handling tasks. Third, it incorporates prior human knowledge through a potential-based reward shaping method, thereby elevating the convergence speed and stability of the algorithm. We tested our algorithm on the StarCraft Multi-Agent Challenge (SMAC) platform, which is a recognized platform for testing multi-agent algorithms, and our algorithm achieved a win rate of over 95% on the platform, comparable to the current state-of-the-art multi-agent controllers.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 1","pages":"Article 100205"},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000084/pdfft?md5=0bf06b4b71bd2935634b00877ef59fba&pid=1-s2.0-S2667295224000084-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139539639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Large Language Model (LLM) Security and Privacy: The Good, The Bad, and The Ugly 大型语言模型 (LLM) 安全与隐私调查:好、坏、丑
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-01 DOI: 10.1016/j.hcc.2024.100211
Yifan Yao, Jinhao Duan, Kaidi Xu, Yuanfang Cai, Zhibo Sun, Yue Zhang

Large Language Models (LLMs), such as ChatGPT and Bard, have revolutionized natural language understanding and generation. They possess deep language comprehension, human-like text generation capabilities, contextual awareness, and robust problem-solving skills, making them invaluable in various domains (e.g., search engines, customer support, translation). In the meantime, LLMs have also gained traction in the security community, revealing security vulnerabilities and showcasing their potential in security-related tasks. This paper explores the intersection of LLMs with security and privacy. Specifically, we investigate how LLMs positively impact security and privacy, potential risks and threats associated with their use, and inherent vulnerabilities within LLMs. Through a comprehensive literature review, the paper categorizes the papers into “The Good” (beneficial LLM applications), “The Bad” (offensive applications), and “The Ugly” (vulnerabilities of LLMs and their defenses). We have some interesting findings. For example, LLMs have proven to enhance code security (code vulnerability detection) and data privacy (data confidentiality protection), outperforming traditional methods. However, they can also be harnessed for various attacks (particularly user-level attacks) due to their human-like reasoning abilities. We have identified areas that require further research efforts. For example, Research on model and parameter extraction attacks is limited and often theoretical, hindered by LLM parameter scale and confidentiality. Safe instruction tuning, a recent development, requires more exploration. We hope that our work can shed light on the LLMs’ potential to both bolster and jeopardize cybersecurity.

大型语言模型(LLMs),如 ChatGPT 和 Bard,已经彻底改变了自然语言的理解和生成。它们具有深度语言理解能力、类人文本生成能力、上下文感知能力和强大的问题解决能力,这使它们在各个领域(如搜索引擎、客户支持、翻译)都具有无价之宝。与此同时,LLM 在安全领域也获得了广泛关注,揭示了安全漏洞,并展示了其在安全相关任务中的潜力。本文探讨了 LLM 与安全和隐私的交叉点。具体来说,我们将研究 LLM 如何对安全和隐私产生积极影响、与使用 LLM 相关的潜在风险和威胁,以及 LLM 固有的漏洞。通过全面的文献综述,本文将论文分为 "好"(有益的 LLM 应用)、"坏"(攻击性应用)和 "丑"(LLM 的漏洞及其防御)三类。我们有一些有趣的发现。例如,事实证明 LLM 可增强代码安全性(代码漏洞检测)和数据私密性(数据保密保护),优于传统方法。不过,由于 LLM 具备类似人类的推理能力,它们也可以被用于各种攻击(尤其是用户级攻击)。我们已经确定了需要进一步研究的领域。例如,对模型和参数提取攻击的研究十分有限,而且往往是理论性的,受到 LLM 参数规模和保密性的阻碍。安全指令调整是最近的一项发展,需要更多的探索。我们希望我们的工作能够揭示 LLM 在促进和危害网络安全方面的潜力。
{"title":"A Survey on Large Language Model (LLM) Security and Privacy: The Good, The Bad, and The Ugly","authors":"Yifan Yao,&nbsp;Jinhao Duan,&nbsp;Kaidi Xu,&nbsp;Yuanfang Cai,&nbsp;Zhibo Sun,&nbsp;Yue Zhang","doi":"10.1016/j.hcc.2024.100211","DOIUrl":"https://doi.org/10.1016/j.hcc.2024.100211","url":null,"abstract":"<div><p>Large Language Models (LLMs), such as ChatGPT and Bard, have revolutionized natural language understanding and generation. They possess deep language comprehension, human-like text generation capabilities, contextual awareness, and robust problem-solving skills, making them invaluable in various domains (e.g., search engines, customer support, translation). In the meantime, LLMs have also gained traction in the security community, revealing security vulnerabilities and showcasing their potential in security-related tasks. This paper explores the intersection of LLMs with security and privacy. Specifically, we investigate how LLMs positively impact security and privacy, potential risks and threats associated with their use, and inherent vulnerabilities within LLMs. Through a comprehensive literature review, the paper categorizes the papers into “The Good” (beneficial LLM applications), “The Bad” (offensive applications), and “The Ugly” (vulnerabilities of LLMs and their defenses). We have some interesting findings. For example, LLMs have proven to enhance code security (code vulnerability detection) and data privacy (data confidentiality protection), outperforming traditional methods. However, they can also be harnessed for various attacks (particularly user-level attacks) due to their human-like reasoning abilities. We have identified areas that require further research efforts. For example, Research on model and parameter extraction attacks is limited and often theoretical, hindered by LLM parameter scale and confidentiality. Safe instruction tuning, a recent development, requires more exploration. We hope that our work can shed light on the LLMs’ potential to both bolster and jeopardize cybersecurity.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 2","pages":"Article 100211"},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266729522400014X/pdfft?md5=1984f6886539e5ada13eeb8c49a9ef8b&pid=1-s2.0-S266729522400014X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140543306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
High-Confidence Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1