首页 > 最新文献

IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)最新文献

英文 中文
Fountain-Coding-Aided Secure Delivery via Cross-locking Between Payload Data and Control Information 基于有效载荷数据和控制信息交叉锁定的喷泉编码辅助安全传输
Pub Date : 2020-07-01 DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162910
Hanxun Ren, Qinghe Du, Yijie Ou, Pinyi Ren
The conventional fountain-coding aided strategies realize transmission secrecy by ensuring the legitimate user to receive the sufficient number of fountain-coded packets ahead of the eavesdropper does, which emphasise on the security of entire file. However, in the process of communication a fraction of confidential message will be recovered by parts of correct decoding of intercepted packets at the eavesdropper, which is forbidden for some scenarios with stringent security requirement. To solve the above mentioned issue, we propose a secure transmission scheme via cross-locking between the fountain-coded data and the codebook information, in which the generating matrix of fountain codes is implicitly transferred between legitimate pairs such that the inter-data codebook information can be protected. Specifically, the transmitter exploits fountain-coded packets legitimate user received to encrypt the key associated with the generating matrix to prevent eavesdropper from decoding any coded packets, thereby the secure transmission is guaranteed. A wireless secure transmission system based on the proposed scheme is developed on the software radio platform and its security performance is evaluated in actual scenarios. The experimental results prove that the proposed scheme outperforms the comparison schemes in the matter of the intercept probability and the recovering proportion for eavesdropper.
传统的源编码辅助策略通过保证合法用户比窃听者接收到足够数量的源编码数据包来实现传输保密,强调整个文件的安全性。然而,在通信过程中,窃听者会对截获的数据包进行部分正确解码,从而恢复一部分机密信息,这在某些对安全要求严格的场景中是不允许的。为了解决上述问题,我们提出了一种通过喷泉编码数据与码本信息交叉锁定的安全传输方案,该方案将喷泉码的生成矩阵隐式地在合法对之间传输,从而保护了数据间的码本信息。具体来说,发送端利用合法用户收到的源编码数据包对生成矩阵关联的密钥进行加密,防止窃听者对任何编码的数据包进行解码,从而保证了传输的安全。在软件无线电平台上开发了基于该方案的无线安全传输系统,并在实际场景中对其安全性能进行了评估。实验结果表明,该方案在拦截概率和窃听恢复比例方面都优于比较方案。
{"title":"Fountain-Coding-Aided Secure Delivery via Cross-locking Between Payload Data and Control Information","authors":"Hanxun Ren, Qinghe Du, Yijie Ou, Pinyi Ren","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162910","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162910","url":null,"abstract":"The conventional fountain-coding aided strategies realize transmission secrecy by ensuring the legitimate user to receive the sufficient number of fountain-coded packets ahead of the eavesdropper does, which emphasise on the security of entire file. However, in the process of communication a fraction of confidential message will be recovered by parts of correct decoding of intercepted packets at the eavesdropper, which is forbidden for some scenarios with stringent security requirement. To solve the above mentioned issue, we propose a secure transmission scheme via cross-locking between the fountain-coded data and the codebook information, in which the generating matrix of fountain codes is implicitly transferred between legitimate pairs such that the inter-data codebook information can be protected. Specifically, the transmitter exploits fountain-coded packets legitimate user received to encrypt the key associated with the generating matrix to prevent eavesdropper from decoding any coded packets, thereby the secure transmission is guaranteed. A wireless secure transmission system based on the proposed scheme is developed on the software radio platform and its security performance is evaluated in actual scenarios. The experimental results prove that the proposed scheme outperforms the comparison schemes in the matter of the intercept probability and the recovering proportion for eavesdropper.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130117594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detecting and Mitigating ARP Attacks in SDN-Based Cloud Environment 基于sdn的云环境下ARP攻击的检测与缓解
Pub Date : 2020-07-01 DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162965
Sixian Sun, Xiao Fu, B. Luo, Xiaojiang Du
Cloud computing is making a greater impact on internet industry, medical industry, insurance industry, and so on. Due to its influence, cloud computing networking is in great need of security, and protecting cloud environment from diverse attacks has been a hot issue. On the other hand, Software Defined Network (SDN) separates the control plane from the data plane and makes networks programmable, which promotes the centralized management of network devices. Compared to traditional networks, SDN increases the utilization efficiency of resources, increases the flexibility of network services, and reduces the cost of maintenance. Therefore, in this paper, we apply SDN to protect cloud computing networking from Address Resolution Protocol (ARP) attacks. In the proposed approach, a cluster of controllers detects ARP packets that hosts send, in order to find out the forged ones and to prevent ARP spoofing attacks. Also, controllers monitor statistical data of ARP packets once in a while to detect ARP flooding attacks. Once an attack is detected, controllers install flow entries on corresponding switches, to block flow for a specific time. Finally, we conduct experiments to show that our approach is useful to detect and mitigate ARP attacks in SDN-based cloud environment.
云计算正在对互联网行业、医疗行业、保险行业等产生更大的影响。由于其影响,云计算网络对安全的需求很大,保护云环境免受各种攻击一直是一个热点问题。另一方面,软件定义网络(SDN)将控制平面与数据平面分离,使网络可编程,从而促进了网络设备的集中管理。与传统网络相比,SDN提高了资源的利用效率,增加了网络业务的灵活性,降低了维护成本。因此,在本文中,我们应用SDN来保护云计算网络免受地址解析协议(ARP)攻击。在该方法中,控制器集群检测主机发送的ARP报文,从而发现伪造的ARP报文,防止ARP欺骗攻击。同时,控制器定时监控ARP报文的统计数据,检测ARP泛洪攻击。一旦检测到攻击,控制器将在相应的交换机上安装流量条目,以在特定时间内阻止流量。最后,我们进行了实验,表明我们的方法有助于在基于sdn的云环境中检测和减轻ARP攻击。
{"title":"Detecting and Mitigating ARP Attacks in SDN-Based Cloud Environment","authors":"Sixian Sun, Xiao Fu, B. Luo, Xiaojiang Du","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162965","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162965","url":null,"abstract":"Cloud computing is making a greater impact on internet industry, medical industry, insurance industry, and so on. Due to its influence, cloud computing networking is in great need of security, and protecting cloud environment from diverse attacks has been a hot issue. On the other hand, Software Defined Network (SDN) separates the control plane from the data plane and makes networks programmable, which promotes the centralized management of network devices. Compared to traditional networks, SDN increases the utilization efficiency of resources, increases the flexibility of network services, and reduces the cost of maintenance. Therefore, in this paper, we apply SDN to protect cloud computing networking from Address Resolution Protocol (ARP) attacks. In the proposed approach, a cluster of controllers detects ARP packets that hosts send, in order to find out the forged ones and to prevent ARP spoofing attacks. Also, controllers monitor statistical data of ARP packets once in a while to detect ARP flooding attacks. Once an attack is detected, controllers install flow entries on corresponding switches, to block flow for a specific time. Finally, we conduct experiments to show that our approach is useful to detect and mitigate ARP attacks in SDN-based cloud environment.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130269377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
LeTera: Stochastic Beam Control Through ESN Learning in Terahertz-Band Wireless UAV Networks 基于回声状态网络学习的太赫兹无线无人机网络随机波束控制
Pub Date : 2020-07-01 DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162766
Sabarish Krishna Moorthy, Zhangyu Guan
Terahertz (THz)-band communication is a key technology to achieve ultra-high-data-rate wireless links in beyond-5G wireless networks. A main challenge with this frequency band is that the wireless links can be easily disconnected because of beam misalignment in mobile environments. This paper focuses on beam control in THz-band wireless Unmanned Aerial Vehicle (UAV) networks, where perfect beam alignment is hard to achieve in the presence of multi-scale mobility uncertainties of the flying UAVs. We propose a learning-based stochastic beam control scheme called LeTera to reduce the outage probability of the THz-band wireless links based on Echo State Networks (ESN). The scheme dynamically predicts through echo state learning the best beam width based on statistical information of the UAV mobility pattern. The scheme is evaluated using mobility traces collected through a series of UAV flight field experiments in different weather. Results show that LeTera can predict the optimal beam width with 99% accuracy and nearly optimal link capacity can be achieved in the presence of beam alignment latency.
太赫兹(THz)频段通信是在超5g无线网络中实现超高数据速率无线链路的关键技术。该频段的一个主要挑战是,在移动环境中,由于波束不对准,无线链路很容易断开。针对太赫兹波段无人机飞行存在多尺度机动性不确定性,难以实现完美波束对准的问题,研究了太赫兹波段无人机无线网络的波束控制问题。为了降低太赫兹波段无线链路的中断概率,提出了一种基于学习的随机波束控制方案LeTera。该方案基于无人机移动方向的统计信息,通过回波状态学习动态预测最佳波束宽度。利用无人机在不同天气条件下的飞行现场实验收集的机动性轨迹对该方案进行了评价。结果表明,LeTera预测最优波束宽度的准确率为99%,在存在波束对准延迟的情况下,可以实现接近最优的链路容量。
{"title":"LeTera: Stochastic Beam Control Through ESN Learning in Terahertz-Band Wireless UAV Networks","authors":"Sabarish Krishna Moorthy, Zhangyu Guan","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162766","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162766","url":null,"abstract":"Terahertz (THz)-band communication is a key technology to achieve ultra-high-data-rate wireless links in beyond-5G wireless networks. A main challenge with this frequency band is that the wireless links can be easily disconnected because of beam misalignment in mobile environments. This paper focuses on beam control in THz-band wireless Unmanned Aerial Vehicle (UAV) networks, where perfect beam alignment is hard to achieve in the presence of multi-scale mobility uncertainties of the flying UAVs. We propose a learning-based stochastic beam control scheme called LeTera to reduce the outage probability of the THz-band wireless links based on Echo State Networks (ESN). The scheme dynamically predicts through echo state learning the best beam width based on statistical information of the UAV mobility pattern. The scheme is evaluated using mobility traces collected through a series of UAV flight field experiments in different weather. Results show that LeTera can predict the optimal beam width with 99% accuracy and nearly optimal link capacity can be achieved in the presence of beam alignment latency.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131654389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
U-ASG: A Universal Method to Perform Adversarial Attack on Autoencoder based Network Anomaly Detection Systems U-ASG:对基于自编码器的网络异常检测系统进行对抗性攻击的通用方法
Pub Date : 2020-07-01 DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162699
Chenming Yang, Liang Zhou, Hui Wen, Yue Wu
Semi-supervised machine learning models, especially deep neural networks, have been widely used in network anomaly detection for their capability of capturing patterns in normal data. However, the models face security challenges when an attacker has obtained their full details. In this paper, we propose a universal adversarial sample generator (U-ASG), to perform white-box adversarial attacks on autoencoder-based semi-supervised network anomaly detection (SSNAD) systems. The purpose of adversarial attacks is to generate small adversarial perturbations and add them to targeted anomalous samples to fly under the radar. We model the generation process of adversarial perturbations as an optimization problem, in which we minimize the reconstruction errors of the adversarial samples through the trained autoencoder and approximate it to solve. Furthermore, to improve the attack performance against the variational autoencoder (VAE), which is robust to tiny perturbations through uncertainty modeling, we design a mechanism to weaken its robustness by introducing a variance regularizer to the optimization. Simulation results show that the adversarial attacks generated by our U-ASG can effectively degrade the performance of the autoencoder-based SSNAD systems.
半监督机器学习模型,特别是深度神经网络,因其在正常数据中捕获模式的能力而被广泛应用于网络异常检测。然而,当攻击者获得模型的全部详细信息时,这些模型面临安全挑战。在本文中,我们提出了一种通用对抗性样本生成器(U-ASG),用于对基于自编码器的半监督网络异常检测(SSNAD)系统执行白盒对抗性攻击。对抗性攻击的目的是产生小的对抗性扰动,并将其添加到目标异常样本中以在雷达下飞行。我们将对抗性扰动的生成过程建模为一个优化问题,通过训练好的自编码器使对抗性样本的重构误差最小化并进行近似求解。此外,为了提高针对变分自编码器(VAE)的攻击性能,我们设计了一种机制,通过在优化中引入方差正则器来削弱其鲁棒性,该变分自编码器通过不确定性建模对微小扰动具有鲁棒性。仿真结果表明,U-ASG产生的对抗性攻击会有效降低基于自编码器的SSNAD系统的性能。
{"title":"U-ASG: A Universal Method to Perform Adversarial Attack on Autoencoder based Network Anomaly Detection Systems","authors":"Chenming Yang, Liang Zhou, Hui Wen, Yue Wu","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162699","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162699","url":null,"abstract":"Semi-supervised machine learning models, especially deep neural networks, have been widely used in network anomaly detection for their capability of capturing patterns in normal data. However, the models face security challenges when an attacker has obtained their full details. In this paper, we propose a universal adversarial sample generator (U-ASG), to perform white-box adversarial attacks on autoencoder-based semi-supervised network anomaly detection (SSNAD) systems. The purpose of adversarial attacks is to generate small adversarial perturbations and add them to targeted anomalous samples to fly under the radar. We model the generation process of adversarial perturbations as an optimization problem, in which we minimize the reconstruction errors of the adversarial samples through the trained autoencoder and approximate it to solve. Furthermore, to improve the attack performance against the variational autoencoder (VAE), which is robust to tiny perturbations through uncertainty modeling, we design a mechanism to weaken its robustness by introducing a variance regularizer to the optimization. Simulation results show that the adversarial attacks generated by our U-ASG can effectively degrade the performance of the autoencoder-based SSNAD systems.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131116999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Sperax: An Approach To Defeat Long Range Attacks In Blockchains Sperax:一种在区块链中击败远程攻击的方法
Pub Date : 2020-07-01 DOI: 10.1109/INFOCOMWKSHPS50562.2020.9163036
Yongge Wang, Jingwen Sun, Xin Wang, Yunchuan Wei, Hao Wu, Zhou Yu, Gillian Chu
Since Bitcoin's seminal work of achieving consensus under the assumption that more than 51% computational power is honest, many researchers have proposed various kinds of consensus protocols. In recent years, there has been a trend in designing proof of stake (PoS) based consensus protocols. Unfortunately, PoS based consensus protocols are inherently not secure and are vulnerable to “long range attacks”. Thus PoS based blockchains have the potential risk of being forked with a minimal cost for double spending. In this paper, we propose a PoS protocol that is secure against long range attack based double spending. The security is achieved using secure randomness beacons generated by tamper proof hardware modules.
由于比特币在假设超过51%的计算能力的前提下达成共识的开创性工作是诚实的,许多研究人员提出了各种共识协议。近年来,设计基于权益证明(PoS)的共识协议已经成为一种趋势。不幸的是,基于PoS的共识协议本质上是不安全的,容易受到“远程攻击”。因此,基于PoS的区块链具有以最小的双重支出成本进行分叉的潜在风险。在本文中,我们提出了一种安全的PoS协议,可以防止基于远程攻击的双重支付。安全性是通过防篡改硬件模块生成的安全随机信标来实现的。
{"title":"Sperax: An Approach To Defeat Long Range Attacks In Blockchains","authors":"Yongge Wang, Jingwen Sun, Xin Wang, Yunchuan Wei, Hao Wu, Zhou Yu, Gillian Chu","doi":"10.1109/INFOCOMWKSHPS50562.2020.9163036","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9163036","url":null,"abstract":"Since Bitcoin's seminal work of achieving consensus under the assumption that more than 51% computational power is honest, many researchers have proposed various kinds of consensus protocols. In recent years, there has been a trend in designing proof of stake (PoS) based consensus protocols. Unfortunately, PoS based consensus protocols are inherently not secure and are vulnerable to “long range attacks”. Thus PoS based blockchains have the potential risk of being forked with a minimal cost for double spending. In this paper, we propose a PoS protocol that is secure against long range attack based double spending. The security is achieved using secure randomness beacons generated by tamper proof hardware modules.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133673360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Demo abstract: Leveraging AI players for QoE estimation in cloud gaming 演示摘要:利用AI玩家在云游戏中进行QoE估计
Pub Date : 2020-07-01 DOI: 10.1109/infocomwkshps50562.2020.9162732
G. Sviridov, Cedric Beliard, G. Simon, A. Bianco, P. Giaccone, Dario Rossi
Quality of Experience (QoE) assessment in video games is notorious for its burdensomeness. Employing human subjects to understand network impact on the perceived gaming QoE presents major drawbacks in terms of resources requirement, results interpretability and poor transferability across different games. To overcome these shortcomings, we propose to substitute human players with artificial agents trained with state-of-the-art Deep Reinforcement Learning techniques. Equivalently to traditional QoE assessment, we measure the in-game score achieved by an artificial agent for the game of Doom for varying network parameters. Our results show that the proposed methodology can be applied to understand fine-grained impact of network conditions on gaming experience while opening a lot of new opportunities for network operators and game developers.
电子游戏中的体验质量(QoE)评估因其繁琐而臭名昭著。利用人类受试者来理解网络对感知游戏QoE的影响,在资源需求、结果可解释性和不同游戏之间的可移植性方面存在主要缺陷。为了克服这些缺点,我们建议用经过最先进的深度强化学习技术训练的人工智能代替人类玩家。与传统的QoE评估相同,我们衡量《毁灭战士》的人工代理在不同网络参数下获得的游戏内得分。我们的研究结果表明,所提出的方法可以应用于理解网络条件对游戏体验的细粒度影响,同时为网络运营商和游戏开发商开辟了许多新的机会。
{"title":"Demo abstract: Leveraging AI players for QoE estimation in cloud gaming","authors":"G. Sviridov, Cedric Beliard, G. Simon, A. Bianco, P. Giaccone, Dario Rossi","doi":"10.1109/infocomwkshps50562.2020.9162732","DOIUrl":"https://doi.org/10.1109/infocomwkshps50562.2020.9162732","url":null,"abstract":"Quality of Experience (QoE) assessment in video games is notorious for its burdensomeness. Employing human subjects to understand network impact on the perceived gaming QoE presents major drawbacks in terms of resources requirement, results interpretability and poor transferability across different games. To overcome these shortcomings, we propose to substitute human players with artificial agents trained with state-of-the-art Deep Reinforcement Learning techniques. Equivalently to traditional QoE assessment, we measure the in-game score achieved by an artificial agent for the game of Doom for varying network parameters. Our results show that the proposed methodology can be applied to understand fine-grained impact of network conditions on gaming experience while opening a lot of new opportunities for network operators and game developers.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131442987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain Technology and Neural Networks for the Internet of Medical Things 医疗物联网的区块链技术和神经网络
Pub Date : 2020-07-01 DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162735
Dawid Połap, Gautam Srivastava, A. Jolfaei, R. Parizi
In today's technological climate, users require fast automation and digitization of results for large amounts of data at record speeds. Especially in the field of medicine, where each patient is often asked to undergo many different examinations within one diagnosis or treatment. Each examination can help in the diagnosis or prediction of further disease progression. Furthermore, all produced data from these examinations must be stored somewhere and available to various medical practitioners for analysis who may be in geographically diverse locations. The current medical climate leans towards remote patient monitoring and AI-assisted diagnosis. To make this possible, medical data should ideally be secured and made accessible to many medical practitioners, which makes them prone to malicious entities. Medical information has inherent value to malicious entities due to its privacy-sensitive nature in a variety of ways. Furthermore, if access to data is distributively made available to AI algorithms (particularly neural networks) for further analysis/diagnosis, the danger to the data may increase (e.g., model poisoning with fake data introduction). In this paper, we propose a federated learning approach that uses decentralized learning with blockchain-based security and a proposition that accompanies that training intelligent systems using distributed and locally-stored data for the use of all patients. Our work in progress hopes to contribute to the latest trend of the Internet of Medical Things security and privacy.
在当今的技术环境下,用户需要以创纪录的速度对大量数据进行快速自动化和数字化处理。特别是在医学领域,在一个诊断或治疗中,每个病人经常被要求接受许多不同的检查。每次检查都有助于诊断或预测疾病的进一步进展。此外,从这些检查中产生的所有数据必须存储在某个地方,供可能在不同地理位置的各种医疗从业人员分析。目前的医疗环境倾向于远程患者监护和人工智能辅助诊断。为了实现这一点,理想情况下应该保护医疗数据,并使许多医疗从业人员可以访问这些数据,这使他们容易受到恶意实体的攻击。由于医疗信息在许多方面具有隐私敏感性,因此对恶意实体具有固有价值。此外,如果对数据的访问分散地提供给人工智能算法(特别是神经网络)以进行进一步分析/诊断,则对数据的危险可能会增加(例如,通过虚假数据引入模型中毒)。在本文中,我们提出了一种联邦学习方法,该方法使用分散学习和基于区块链的安全性,并提出了使用分布式和本地存储的数据训练智能系统以供所有患者使用的建议。我们正在进行的工作希望为医疗物联网安全与隐私的最新趋势做出贡献。
{"title":"Blockchain Technology and Neural Networks for the Internet of Medical Things","authors":"Dawid Połap, Gautam Srivastava, A. Jolfaei, R. Parizi","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162735","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162735","url":null,"abstract":"In today's technological climate, users require fast automation and digitization of results for large amounts of data at record speeds. Especially in the field of medicine, where each patient is often asked to undergo many different examinations within one diagnosis or treatment. Each examination can help in the diagnosis or prediction of further disease progression. Furthermore, all produced data from these examinations must be stored somewhere and available to various medical practitioners for analysis who may be in geographically diverse locations. The current medical climate leans towards remote patient monitoring and AI-assisted diagnosis. To make this possible, medical data should ideally be secured and made accessible to many medical practitioners, which makes them prone to malicious entities. Medical information has inherent value to malicious entities due to its privacy-sensitive nature in a variety of ways. Furthermore, if access to data is distributively made available to AI algorithms (particularly neural networks) for further analysis/diagnosis, the danger to the data may increase (e.g., model poisoning with fake data introduction). In this paper, we propose a federated learning approach that uses decentralized learning with blockchain-based security and a proposition that accompanies that training intelligent systems using distributed and locally-stored data for the use of all patients. Our work in progress hopes to contribute to the latest trend of the Internet of Medical Things security and privacy.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128814671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Adaptive CNN-based Private LTE Solution for Fair Coexistence with Wi-Fi in Unlicensed Spectrum 基于cnn的非授权频谱下与Wi-Fi公平共存的自适应专用LTE解决方案
Pub Date : 2020-07-01 DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162663
M. Girmay, Vasilis Maglogiannis, D. Naudts, Jaron Fontaine, A. Shahid, E. D. Poorter, I. Moerman
Recently, the expansion of wireless network deployments is resulting in increased scarcity of available licensed radio spectrum. As the domain of wireless communications is progressing rapidly, many industries are looking into wireless network solutions that can increase their productivity. Private LTE is a promising wireless network solution as it can be customised independently without the control of a mobile network operator while providing reliable and spectrum efficient services. For this reason, the deployment of Private LTE in the unlicensed spectrum and its coexistence with Wi-Fi is becoming a popular topic in research. In this paper, we propose a coexistence scheme for private LTE network in unlicensed spectrum that enables a fair spectrum sharing with co-located Wi-Fi networks. This is achieved by exploiting various LTE frame configurations consisting of different combinations of downlink, uplink, special subframe and muted subframes. The configuration of a single frame is decided based on a rule based algorithm that exploits Wi-Fi spectrum occupancy statistics that is obtained from a technology recognition system which is based on a Convolutional Neural Network. The performance of the proposed private LTE scheme and its coexistence with Wi-Fi is investigated for different traffic scenarios showcasing how the proposed scheme can lead to a harmless coexistence of LTE and Wi-Fi.
最近,无线网络部署的扩展导致可用许可无线电频谱的日益稀缺。随着无线通信领域的快速发展,许多行业都在寻找可以提高其生产力的无线网络解决方案。私有LTE是一种很有前途的无线网络解决方案,因为它可以在不受移动网络运营商控制的情况下独立定制,同时提供可靠和频谱效率高的服务。因此,在非授权频谱上部署专用LTE并与Wi-Fi共存成为研究热点。在本文中,我们提出了一种在非授权频谱上的专用LTE网络共存方案,该方案能够与同址Wi-Fi网络公平共享频谱。这是通过利用由下行链路、上行链路、特殊子帧和静音子帧的不同组合组成的各种LTE帧配置来实现的。单个帧的配置是基于基于规则的算法决定的,该算法利用了从基于卷积神经网络的技术识别系统获得的Wi-Fi频谱占用统计数据。在不同的流量场景下,研究了所提出的私有LTE方案的性能及其与Wi-Fi的共存,展示了所提出的方案如何导致LTE和Wi-Fi的无害共存。
{"title":"Adaptive CNN-based Private LTE Solution for Fair Coexistence with Wi-Fi in Unlicensed Spectrum","authors":"M. Girmay, Vasilis Maglogiannis, D. Naudts, Jaron Fontaine, A. Shahid, E. D. Poorter, I. Moerman","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162663","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162663","url":null,"abstract":"Recently, the expansion of wireless network deployments is resulting in increased scarcity of available licensed radio spectrum. As the domain of wireless communications is progressing rapidly, many industries are looking into wireless network solutions that can increase their productivity. Private LTE is a promising wireless network solution as it can be customised independently without the control of a mobile network operator while providing reliable and spectrum efficient services. For this reason, the deployment of Private LTE in the unlicensed spectrum and its coexistence with Wi-Fi is becoming a popular topic in research. In this paper, we propose a coexistence scheme for private LTE network in unlicensed spectrum that enables a fair spectrum sharing with co-located Wi-Fi networks. This is achieved by exploiting various LTE frame configurations consisting of different combinations of downlink, uplink, special subframe and muted subframes. The configuration of a single frame is decided based on a rule based algorithm that exploits Wi-Fi spectrum occupancy statistics that is obtained from a technology recognition system which is based on a Convolutional Neural Network. The performance of the proposed private LTE scheme and its coexistence with Wi-Fi is investigated for different traffic scenarios showcasing how the proposed scheme can lead to a harmless coexistence of LTE and Wi-Fi.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115206710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Lightweight Authentication Protocol for Inter Base Station Communication in Heterogeneous Networks 异构网络中基站间通信的轻量级认证协议
Pub Date : 2020-07-01 DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162714
Gaurang Bansal, V. Chamola
Over the past few years, with increasing mobile traffic and decreasing revenue per user, Heterogeneous Networks (HetNets) have become a topic of interest to many stakeholders. HetNets is a combination of networks with different access technologies and cell types working with each other. Mobile network operators are keen to reduce operational expenses by deploying HetNets while they provide better QoS to the user anywhere, anytime wireless connectivity. Although HetNets provide various benefits, yet many open issues need to be addressed to harness their impact. They are also prone to several security threats such as physical attacks, man-in-the-middle (MITM) attacks, impersonation attacks, replay attacks, and node tampering attacks. Moreover, due to the different nature and structure of each network in a HetNet, secure handover between various wireless networks is a complex task that is not yet resolved. In this paper, we address the issues mentioned above by designing a secure handover mechanism that is resistant to both passive and active attacks. We also show a performance comparison of our protocol with the state-of-the-art protocols for securing hetnets based on computation, communication, and memory storage cost.
在过去的几年里,随着移动流量的增加和每用户收入的减少,异构网络(HetNets)已经成为许多利益相关者感兴趣的话题。HetNets是具有不同接入技术的网络和相互协作的蜂窝类型的组合。移动网络运营商热衷于通过部署HetNets来减少运营费用,同时为用户提供更好的QoS,随时随地的无线连接。尽管HetNets提供了各种好处,但要利用其影响,还需要解决许多悬而未决的问题。它们还容易受到物理攻击、中间人攻击、模拟攻击、重放攻击和节点篡改攻击等安全威胁。此外,由于HetNet中各个网络的性质和结构不同,各种无线网络之间的安全切换是一项复杂的任务,目前还没有解决。在本文中,我们通过设计一种既能抵抗被动攻击又能抵抗主动攻击的安全切换机制来解决上述问题。我们还展示了我们的协议与基于计算、通信和内存存储成本的最先进的保护网络的协议的性能比较。
{"title":"Lightweight Authentication Protocol for Inter Base Station Communication in Heterogeneous Networks","authors":"Gaurang Bansal, V. Chamola","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162714","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162714","url":null,"abstract":"Over the past few years, with increasing mobile traffic and decreasing revenue per user, Heterogeneous Networks (HetNets) have become a topic of interest to many stakeholders. HetNets is a combination of networks with different access technologies and cell types working with each other. Mobile network operators are keen to reduce operational expenses by deploying HetNets while they provide better QoS to the user anywhere, anytime wireless connectivity. Although HetNets provide various benefits, yet many open issues need to be addressed to harness their impact. They are also prone to several security threats such as physical attacks, man-in-the-middle (MITM) attacks, impersonation attacks, replay attacks, and node tampering attacks. Moreover, due to the different nature and structure of each network in a HetNet, secure handover between various wireless networks is a complex task that is not yet resolved. In this paper, we address the issues mentioned above by designing a secure handover mechanism that is resistant to both passive and active attacks. We also show a performance comparison of our protocol with the state-of-the-art protocols for securing hetnets based on computation, communication, and memory storage cost.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115430146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Probability Distribution of the AoI in Queues with Infinitely Many Servers 具有无限多服务器的队列中AoI的概率分布
Pub Date : 2020-07-01 DOI: 10.1109/infocomwkshps50562.2020.9162968
Yoshiaki Inoue
In this paper, we derive an explicit expression for the probability distribution of the age of information (AoI) in the $mathrm{GI}/mathrm{GI}/infty$ queue with loss. Two special cases $mathrm{M}/mathrm{GI}/infty$ and $mathrm{D}/mathrm{GI}/infty$ are discussed, where the distribution function of the AoI is shown to take a simple closed-form. In addition, a comparison result between the $mathrm{M}/mathrm{GI}/infty$ and $mathrm{D}/mathrm{GI}/infty$ queues in terms of the AoI distribution is presented.
本文导出了具有损失的$mathrm{GI}/mathrm{GI}/infty$队列中信息年龄(AoI)的概率分布的一个显式表达式。讨论了两个特殊情况$mathrm{M}/mathrm{GI}/infty$和$mathrm{D}/mathrm{GI}/infty$,其中AoI的分布函数显示为简单的封闭形式。此外,还给出了$mathrm{M}/mathrm{GI}/infty$和$mathrm{D}/mathrm{GI}/infty$队列在AoI分布方面的比较结果。
{"title":"The Probability Distribution of the AoI in Queues with Infinitely Many Servers","authors":"Yoshiaki Inoue","doi":"10.1109/infocomwkshps50562.2020.9162968","DOIUrl":"https://doi.org/10.1109/infocomwkshps50562.2020.9162968","url":null,"abstract":"In this paper, we derive an explicit expression for the probability distribution of the age of information (AoI) in the $mathrm{GI}/mathrm{GI}/infty$ queue with loss. Two special cases $mathrm{M}/mathrm{GI}/infty$ and $mathrm{D}/mathrm{GI}/infty$ are discussed, where the distribution function of the AoI is shown to take a simple closed-form. In addition, a comparison result between the $mathrm{M}/mathrm{GI}/infty$ and $mathrm{D}/mathrm{GI}/infty$ queues in terms of the AoI distribution is presented.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117272447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1