首页 > 最新文献

Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems最新文献

英文 中文
Capturing Autonomy in its Multiple Facets: A Digital Twin Approach 从多个方面捕捉自主性:数字孪生方法
Richard Heininger, C. Stary
Autonomy has been touted to be a major asset of Cyber-Physical Systems (CPS) and its components. By intertwining non-physical and physical processes they seamlessly integrate interdependent computational and physical components. In this contribution we take a closer look on structural constellations of CPS and their components that refer to autonomy. We also take into account development aspects and demonstrate encoding autonomy aspects into a behavior-centered representation scheme for digital twins. It features encapsulation on various layers of abstraction in the course of design and choreography for self-contained while networked operation of CPS as System-of-Systems. As digital twin models created in the course of CPS design activities can be executed automatically, the implementation and adaptation of CPS (components) is intertwined with design activities. Consequently, users can act as designers and experience CPS behavior through digital twin execution interactively. Critical elements, such as managing private data in healthcare, can be monitored and adapted to individual needs.
自主性一直被吹捧为网络物理系统(CPS)及其组件的主要资产。通过将非物理和物理过程交织在一起,它们无缝地集成了相互依赖的计算和物理组件。在这篇文章中,我们仔细研究了CPS的结构星座及其涉及自治的组件。我们还考虑了开发方面,并演示了将自治方面编码为数字孪生的以行为为中心的表示方案。它的特点是在设计和编排过程中对各个抽象层进行封装,以实现CPS作为系统的系统的自包含和网络化操作。由于在CPS设计活动过程中创建的数字孪生模型可以自动执行,因此CPS(组件)的实施和适配与设计活动是交织在一起的。因此,用户可以作为设计者,通过数字孪生执行交互体验CPS行为。可以监控关键元素,例如管理医疗保健中的私有数据,并根据个人需求进行调整。
{"title":"Capturing Autonomy in its Multiple Facets: A Digital Twin Approach","authors":"Richard Heininger, C. Stary","doi":"10.1145/3445969.3450422","DOIUrl":"https://doi.org/10.1145/3445969.3450422","url":null,"abstract":"Autonomy has been touted to be a major asset of Cyber-Physical Systems (CPS) and its components. By intertwining non-physical and physical processes they seamlessly integrate interdependent computational and physical components. In this contribution we take a closer look on structural constellations of CPS and their components that refer to autonomy. We also take into account development aspects and demonstrate encoding autonomy aspects into a behavior-centered representation scheme for digital twins. It features encapsulation on various layers of abstraction in the course of design and choreography for self-contained while networked operation of CPS as System-of-Systems. As digital twin models created in the course of CPS design activities can be executed automatically, the implementation and adaptation of CPS (components) is intertwined with design activities. Consequently, users can act as designers and experience CPS behavior through digital twin execution interactively. Critical elements, such as managing private data in healthcare, can be monitored and adapted to individual needs.","PeriodicalId":103324,"journal":{"name":"Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129756717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Role-Based Administration of Role-Based Smart Home IoT 基于角色的智能家居物联网基于角色的管理
Mehrnoosh Shakarami, R. Sandhu
Using role-based access control (RBAC) to manage RBAC is among RBAC's attractive benefits, contributing to its long-standing dominance in practice. Administrative models facilitate management of (mostly configuration) changes in the underlying operational models. Overall system security is crucially dependent on both the administrative and operational models. In this paper, we develop an RBAC administrative model to manage authorization assignments in the EGRBAC (enhanced generalized role-based access control) operational model for smart home IoT. We design the administrative model based on pairwise disjoint Administrative Units, each of which contains a uniquely assigned administrative role and a set of administrative tasks. Administrative tasks determine the administrative permissions available to manage the operational model assignments. We begin with a model containing a single administrative unit and then extend it to include additional units. Multiple administrative units enable decentralized administration which could be adapted to provide scalability in inherently distributed and large-scale environments beyond smart home, such as smart buildings or smart campuses. We provide formalism of our proposed model and illustrate it by specifying operational and administrative use cases. Although, the model is proposed based on a specific smart home operational model, our approach could be applied to environments with similar dynamics.
使用基于角色的访问控制(RBAC)来管理RBAC是RBAC具有吸引力的优点之一,有助于其在实践中长期占据主导地位。管理模型有助于对底层操作模型中的变更进行管理(主要是配置)。整个系统的安全性主要依赖于管理模型和操作模型。在本文中,我们开发了一个RBAC管理模型来管理智能家居物联网EGRBAC(增强型基于角色的访问控制)运营模型中的授权分配。我们基于成对不相交的管理单元设计管理模型,每个管理单元包含一个唯一分配的管理角色和一组管理任务。管理任务确定可用于管理操作模型分配的管理权限。我们从包含单个管理单元的模型开始,然后将其扩展到包含其他单元。多个管理单元支持分散管理,可以适应在智能家居以外的固有分布式和大规模环境(如智能建筑或智能校园)中提供可伸缩性。我们提供了我们所建议的模型的形式化,并通过指定操作和管理用例来说明它。虽然该模型是基于特定的智能家居操作模型提出的,但我们的方法可以应用于具有类似动态的环境。
{"title":"Role-Based Administration of Role-Based Smart Home IoT","authors":"Mehrnoosh Shakarami, R. Sandhu","doi":"10.1145/3445969.3450426","DOIUrl":"https://doi.org/10.1145/3445969.3450426","url":null,"abstract":"Using role-based access control (RBAC) to manage RBAC is among RBAC's attractive benefits, contributing to its long-standing dominance in practice. Administrative models facilitate management of (mostly configuration) changes in the underlying operational models. Overall system security is crucially dependent on both the administrative and operational models. In this paper, we develop an RBAC administrative model to manage authorization assignments in the EGRBAC (enhanced generalized role-based access control) operational model for smart home IoT. We design the administrative model based on pairwise disjoint Administrative Units, each of which contains a uniquely assigned administrative role and a set of administrative tasks. Administrative tasks determine the administrative permissions available to manage the operational model assignments. We begin with a model containing a single administrative unit and then extend it to include additional units. Multiple administrative units enable decentralized administration which could be adapted to provide scalability in inherently distributed and large-scale environments beyond smart home, such as smart buildings or smart campuses. We provide formalism of our proposed model and illustrate it by specifying operational and administrative use cases. Although, the model is proposed based on a specific smart home operational model, our approach could be applied to environments with similar dynamics.","PeriodicalId":103324,"journal":{"name":"Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122380994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The HABAC Model for Smart Home IoT and Comparison to EGRBAC 智能家居物联网的HABAC模型及其与EGRBAC的比较
Safwa Ameer, R. Sandhu
In the near future IoT will be part of every home turning our houses into smart houses, in which we have multiple users with complex social relationships between them using the same smart devices. This requires sophisticated access control specification and enforcement models. Recently, several access control models have been developed or adapted for IoT in general, with a few specifically designed for the smart home IoT domain. The majority of these models are built on role-based access control (RBAC) or attribute-based access control (ABAC) models which have had considerable traction in traditional non-IoT domains. In this paper, we introduce the smart home IoT attribute-based access control model (HABAC). HABAC is a dynamic and fine-grained model that is developed specifically to meet smart home IoT challenges. Currently it is not precisely clear what are the pros and cons of ABAC over RBAC in general, and in smart home IoT in particular. To this end we provide an analysis of HABAC relative to the previously published EGRBAC (extended generalized role based access control) model for smart home IoT. We compare the theoretical expressive power of these models by providing algorithms for converting an HABAC specification to EGRBAC and vice versa, and discuss the insights for practical deployment of these models resulting from these constructions. We conclude that a hybrid model combining ABAC and RBAC features may be the most suitable for smart home IoT, and likely more generally.
在不久的将来,物联网将成为每个家庭的一部分,将我们的房屋变成智能房屋,其中我们有多个用户,他们之间具有复杂的社会关系,使用相同的智能设备。这需要复杂的访问控制规范和实施模型。最近,有几种访问控制模型已经开发或适用于物联网,其中一些是专门为智能家居物联网领域设计的。这些模型中的大多数是建立在基于角色的访问控制(RBAC)或基于属性的访问控制(ABAC)模型之上的,这些模型在传统的非物联网领域具有相当大的吸引力。本文介绍了基于属性的智能家居物联网访问控制模型(HABAC)。HABAC是一个动态的细粒度模型,专门为应对智能家居物联网挑战而开发。目前还不清楚ABAC与RBAC的优缺点,特别是在智能家居物联网方面。为此,我们提供了相对于先前发布的智能家居物联网EGRBAC(扩展广义基于角色的访问控制)模型的HABAC分析。我们通过提供将HABAC规范转换为EGRBAC的算法来比较这些模型的理论表达能力,反之亦然,并讨论了由这些结构产生的这些模型的实际部署的见解。我们得出结论,结合ABAC和RBAC功能的混合模型可能最适合智能家居物联网,并且可能更普遍。
{"title":"The HABAC Model for Smart Home IoT and Comparison to EGRBAC","authors":"Safwa Ameer, R. Sandhu","doi":"10.1145/3445969.3450428","DOIUrl":"https://doi.org/10.1145/3445969.3450428","url":null,"abstract":"In the near future IoT will be part of every home turning our houses into smart houses, in which we have multiple users with complex social relationships between them using the same smart devices. This requires sophisticated access control specification and enforcement models. Recently, several access control models have been developed or adapted for IoT in general, with a few specifically designed for the smart home IoT domain. The majority of these models are built on role-based access control (RBAC) or attribute-based access control (ABAC) models which have had considerable traction in traditional non-IoT domains. In this paper, we introduce the smart home IoT attribute-based access control model (HABAC). HABAC is a dynamic and fine-grained model that is developed specifically to meet smart home IoT challenges. Currently it is not precisely clear what are the pros and cons of ABAC over RBAC in general, and in smart home IoT in particular. To this end we provide an analysis of HABAC relative to the previously published EGRBAC (extended generalized role based access control) model for smart home IoT. We compare the theoretical expressive power of these models by providing algorithms for converting an HABAC specification to EGRBAC and vice versa, and discuss the insights for practical deployment of these models resulting from these constructions. We conclude that a hybrid model combining ABAC and RBAC features may be the most suitable for smart home IoT, and likely more generally.","PeriodicalId":103324,"journal":{"name":"Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115694928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems 网络物理系统中发布/订阅通信的透明端到端安全
M. Dahlmanns, J. Pennekamp, I. Fink, Bernd Schoolmann, Klaus Wehrle, Martin Henze
The ongoing digitization of industrial manufacturing leads to a decisive change in industrial communication paradigms. Moving from traditional one-to-one to many-to-many communication, publish/subscribe systems promise a more dynamic and efficient exchange of data. However, the resulting significantly more complex communication relationships render traditional end-to-end security futile for sufficiently protecting the sensitive and safety-critical data transmitted in industrial systems. Most notably, the central message brokers inherent in publish/subscribe systems introduce a designated weak spot for security as they can access all communication messages. To address this issue, we propose ENTRUST, a novel solution for key server-based end-to-end security in publish/subscribe systems. ENTRUST transparently realizes confidentiality, integrity, and authentication for publish/subscribe systems without any modification of the underlying protocol. We exemplarily implement ENTRUST on top of MQTT, the de-facto standard for machine-to-machine communication, showing that ENTRUST can integrate seamlessly into existing publish/subscribe systems.
工业制造的持续数字化导致了工业通信范式的决定性变化。从传统的一对一通信到多对多通信,发布/订阅系统承诺更动态、更有效的数据交换。然而,由此产生的更加复杂的通信关系使得传统的端到端安全无法充分保护工业系统中传输的敏感和安全关键数据。最值得注意的是,发布/订阅系统中固有的中心消息代理引入了指定的安全弱点,因为它们可以访问所有通信消息。为了解决这个问题,我们提出了一种新颖的解决方案,用于发布/订阅系统中基于密钥服务器的端到端安全。委托透明地实现发布/订阅系统的机密性、完整性和身份验证,而无需修改底层协议。我们举例地在MQTT(机器对机器通信的事实标准)之上实现了委托,这表明委托可以无缝地集成到现有的发布/订阅系统中。
{"title":"Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems","authors":"M. Dahlmanns, J. Pennekamp, I. Fink, Bernd Schoolmann, Klaus Wehrle, Martin Henze","doi":"10.1145/3445969.3450423","DOIUrl":"https://doi.org/10.1145/3445969.3450423","url":null,"abstract":"The ongoing digitization of industrial manufacturing leads to a decisive change in industrial communication paradigms. Moving from traditional one-to-one to many-to-many communication, publish/subscribe systems promise a more dynamic and efficient exchange of data. However, the resulting significantly more complex communication relationships render traditional end-to-end security futile for sufficiently protecting the sensitive and safety-critical data transmitted in industrial systems. Most notably, the central message brokers inherent in publish/subscribe systems introduce a designated weak spot for security as they can access all communication messages. To address this issue, we propose ENTRUST, a novel solution for key server-based end-to-end security in publish/subscribe systems. ENTRUST transparently realizes confidentiality, integrity, and authentication for publish/subscribe systems without any modification of the underlying protocol. We exemplarily implement ENTRUST on top of MQTT, the de-facto standard for machine-to-machine communication, showing that ENTRUST can integrate seamlessly into existing publish/subscribe systems.","PeriodicalId":103324,"journal":{"name":"Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121917201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Session details: Keynote Talk 会议详情:主题演讲
Maanak Gupta
{"title":"Session details: Keynote Talk","authors":"Maanak Gupta","doi":"10.1145/3460494","DOIUrl":"https://doi.org/10.1145/3460494","url":null,"abstract":"","PeriodicalId":103324,"journal":{"name":"Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134470506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust-but-Verify in Cyber-Physical Systems 网络物理系统中的信任但验证
K. Perumalla
Cyber-physical systems span a wide spectrum, from long-lived legacy systems to more modern installations. Trust is an issue that arises across the spectrum, albeit with different variants of goals and constraints. On the one end of the spectrum, legacy systems are characterized by function-based designs in which trust is an implicitly in-built concept -- the operation is historically designed, implemented, and optimized in a benign stance with respect to intended use. On the other end of the spectrum, modern systems are characterized by offerings from manufacturers, vendors, and system installers -- the devices and deployments use a variety of security features that offer promises of increased trust. All along this spectrum of cyber-physical systems, extending trust beyond the traditional cyber portions to the arteries that connect the physical portions to the cyber portions is a major challenge. Here, we identify a Trust-but-Verify approach that spans this spectrum in addressing trust.
网络物理系统的范围很广,从长期使用的遗留系统到更现代的安装。信任是一个广泛存在的问题,尽管有不同的目标和约束。在范围的一端,遗留系统的特点是基于功能的设计,其中信任是一个隐含的内置概念——操作是在相对于预期用途的良性状态下设计、实现和优化的。另一方面,现代系统的特点是制造商、供应商和系统安装商提供的产品——设备和部署使用各种安全特性,承诺增加信任。在整个网络物理系统的频谱中,将信任从传统的网络部分扩展到连接物理部分和网络部分的动脉是一个主要挑战。在这里,我们确定了一种信任但验证的方法,它跨越了解决信任问题的范围。
{"title":"Trust-but-Verify in Cyber-Physical Systems","authors":"K. Perumalla","doi":"10.1145/3445969.3450434","DOIUrl":"https://doi.org/10.1145/3445969.3450434","url":null,"abstract":"Cyber-physical systems span a wide spectrum, from long-lived legacy systems to more modern installations. Trust is an issue that arises across the spectrum, albeit with different variants of goals and constraints. On the one end of the spectrum, legacy systems are characterized by function-based designs in which trust is an implicitly in-built concept -- the operation is historically designed, implemented, and optimized in a benign stance with respect to intended use. On the other end of the spectrum, modern systems are characterized by offerings from manufacturers, vendors, and system installers -- the devices and deployments use a variety of security features that offer promises of increased trust. All along this spectrum of cyber-physical systems, extending trust beyond the traditional cyber portions to the arteries that connect the physical portions to the cyber portions is a major challenge. Here, we identify a Trust-but-Verify approach that spans this spectrum in addressing trust.","PeriodicalId":103324,"journal":{"name":"Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134222194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 2: Access Control 会话详细信息:会话2:访问控制
Smriti Bhatt
{"title":"Session details: Session 2: Access Control","authors":"Smriti Bhatt","doi":"10.1145/3460496","DOIUrl":"https://doi.org/10.1145/3460496","url":null,"abstract":"","PeriodicalId":103324,"journal":{"name":"Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130119713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine Learning 基于区块链和对抗性机器学习的网格用户数据隐私保护
Ibrahim Yilmaz, K. Kapoor, Ambareen Siraj, Mahmoud Abouyoussef
Utilities around the world are reported to invest a total of around $30 billion over the next few years for installation of more than 300 million smart meters, replacing traditional analog meters citeinfo. By mid-decade, with full country wide deployment, there will be almost 1.3 billion smart meters in place citeinfo. Collection of fine-grained energy usage data by these smart meters provides numerous advantages such as energy savings for customers with use of demand optimization, a billing system of higher accuracy with dynamic pricing programs, bidirectional information exchange ability between end-users for better consumer-operator interaction, and so on. However, all these perks associated with fine-grained energy usage data collection threaten the privacy of users. With this technology, customers' personal data such as sleeping cycle, number of occupants, and even type and number of appliances stream into the hands of the utility companies and can be subject to misuse. This research paper addresses privacy violation of consumers' energy usage data collected from smart meters and provides a novel solution for the privacy protection while allowing benefits of energy data analytics. First, we demonstrate the successful application of occupancy detection attacks using a deep neural network method that yields high accuracy results. We then introduce Adversarial Machine Learning Occupancy Detection Avoidance with Blockchain (AMLODA-B) framework as a counter-attack by deploying an algorithm based on the Long Short Term Memory (LSTM) model into the standardized smart metering infrastructure to prevent leakage of consumer's personal information. Our privacy-aware approach protects consumers' privacy without compromising the correctness of billing and preserves operational efficiency without use of authoritative intermediaries.
据报道,世界各地的公用事业公司将在未来几年内投资约300亿美元,安装超过3亿个智能电表,取代传统的模拟电表。到十年中期,随着在全国范围内的全面部署,将有近13亿个智能电表到位。通过这些智能电表收集细粒度的能源使用数据提供了许多优势,例如通过使用需求优化为客户节省能源,具有动态定价程序的更高精度的计费系统,最终用户之间的双向信息交换能力,以实现更好的消费者-运营商交互,等等。然而,所有这些与细粒度能源使用数据收集相关的好处都威胁到了用户的隐私。有了这项技术,客户的个人数据,如睡眠周期、居住者的数量,甚至电器的类型和数量,都会流入公用事业公司的手中,并可能被滥用。本研究解决了智能电表收集的消费者能源使用数据的隐私侵犯问题,并提供了一种新的解决方案,以保护隐私,同时允许能源数据分析的好处。首先,我们展示了使用深度神经网络方法的占用检测攻击的成功应用,该方法产生了高精度的结果。然后,我们通过将基于长短期记忆(LSTM)模型的算法部署到标准化智能计量基础设施中,将区块链(AMLODA-B)框架引入对抗性机器学习占用检测规避(Occupancy Detection Avoidance)框架作为反击,以防止消费者个人信息泄露。我们的隐私意识保护消费者的隐私,而不影响账单的正确性,并在不使用权威中介的情况下保持运营效率。
{"title":"Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine Learning","authors":"Ibrahim Yilmaz, K. Kapoor, Ambareen Siraj, Mahmoud Abouyoussef","doi":"10.1145/3445969.3450431","DOIUrl":"https://doi.org/10.1145/3445969.3450431","url":null,"abstract":"Utilities around the world are reported to invest a total of around $30 billion over the next few years for installation of more than 300 million smart meters, replacing traditional analog meters citeinfo. By mid-decade, with full country wide deployment, there will be almost 1.3 billion smart meters in place citeinfo. Collection of fine-grained energy usage data by these smart meters provides numerous advantages such as energy savings for customers with use of demand optimization, a billing system of higher accuracy with dynamic pricing programs, bidirectional information exchange ability between end-users for better consumer-operator interaction, and so on. However, all these perks associated with fine-grained energy usage data collection threaten the privacy of users. With this technology, customers' personal data such as sleeping cycle, number of occupants, and even type and number of appliances stream into the hands of the utility companies and can be subject to misuse. This research paper addresses privacy violation of consumers' energy usage data collected from smart meters and provides a novel solution for the privacy protection while allowing benefits of energy data analytics. First, we demonstrate the successful application of occupancy detection attacks using a deep neural network method that yields high accuracy results. We then introduce Adversarial Machine Learning Occupancy Detection Avoidance with Blockchain (AMLODA-B) framework as a counter-attack by deploying an algorithm based on the Long Short Term Memory (LSTM) model into the standardized smart metering infrastructure to prevent leakage of consumer's personal information. Our privacy-aware approach protects consumers' privacy without compromising the correctness of billing and preserves operational efficiency without use of authoritative intermediaries.","PeriodicalId":103324,"journal":{"name":"Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129046051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Ontology driven AI and Access Control Systems for Smart Fisheries 面向智能渔业的本体驱动AI和访问控制系统
Sai Sree Laya Chukkapalli, S. Aziz, Nouran Alotaibi, Sudip Mittal, Maanak Gupta, Mahmoud Abdelsalam
Increasing number of internet connected devices has paved a path for smarter ecosystems in various sectors such as agriculture, aquaculture, manufacturing, healthcare, etc. Especially, integrating technologies like big data, artificial intelligence (AI), blockchain, etc. with internet connected devices has increased efficiency and productivity. Therefore, fishery farmers have started adopting smart fisheries technologies to better manage their fish farms. Despite their technological advancements smart fisheries are exposed and vulnerable to cyber-attacks that would cause a negative impact on the ecosystem both physically and economically. Therefore in this paper, we present a smart fisheries ecosystem where the architecture describes various interactions that happen between internet connected devices. We develop a smart fisheries ontology based on the architecture and implement Attribute Based Access Control System (ABAC) where access to resources of smart fisheries is granted by evaluating the requests. We also discuss how access control decisions are made in multiple use case scenarios of a smart fisheries ecosystem. Furthermore, we elaborate on some AI applications that would enhance the smart fisheries ecosystem.
越来越多的互联网连接设备为农业、水产养殖、制造业、医疗保健等各个领域的智能生态系统铺平了道路。特别是,将大数据、人工智能(AI)、区块链等技术与互联网连接设备相结合,提高了效率和生产力。因此,渔民已经开始采用智能渔业技术来更好地管理他们的养鱼场。尽管技术进步,智能渔业仍然容易受到网络攻击,这将对生态系统造成物理和经济上的负面影响。因此,在本文中,我们提出了一个智能渔业生态系统,其中架构描述了互联网连接设备之间发生的各种交互。在此基础上开发了智能渔业本体,并实现了基于属性的访问控制系统(ABAC),通过对请求的评估来授予对智能渔业资源的访问权限。我们还讨论了如何在智能渔业生态系统的多个用例场景中做出访问控制决策。此外,我们还详细介绍了一些可以增强智能渔业生态系统的人工智能应用。
{"title":"Ontology driven AI and Access Control Systems for Smart Fisheries","authors":"Sai Sree Laya Chukkapalli, S. Aziz, Nouran Alotaibi, Sudip Mittal, Maanak Gupta, Mahmoud Abdelsalam","doi":"10.1145/3445969.3450429","DOIUrl":"https://doi.org/10.1145/3445969.3450429","url":null,"abstract":"Increasing number of internet connected devices has paved a path for smarter ecosystems in various sectors such as agriculture, aquaculture, manufacturing, healthcare, etc. Especially, integrating technologies like big data, artificial intelligence (AI), blockchain, etc. with internet connected devices has increased efficiency and productivity. Therefore, fishery farmers have started adopting smart fisheries technologies to better manage their fish farms. Despite their technological advancements smart fisheries are exposed and vulnerable to cyber-attacks that would cause a negative impact on the ecosystem both physically and economically. Therefore in this paper, we present a smart fisheries ecosystem where the architecture describes various interactions that happen between internet connected devices. We develop a smart fisheries ontology based on the architecture and implement Attribute Based Access Control System (ABAC) where access to resources of smart fisheries is granted by evaluating the requests. We also discuss how access control decisions are made in multiple use case scenarios of a smart fisheries ecosystem. Furthermore, we elaborate on some AI applications that would enhance the smart fisheries ecosystem.","PeriodicalId":103324,"journal":{"name":"Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131053097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1