首页 > 最新文献

Electron. Commun. Eur. Assoc. Softw. Sci. Technol.最新文献

英文 中文
Deep Reinforcement Learning for Smart Queue Management 智能队列管理的深度强化学习
Pub Date : 2021-09-08 DOI: 10.14279/TUJ.ECEASST.80.1139
Hassan Ismail Fawaz, D. Zeghlache, Tran Anh Quang Pham, Jérémie Leguay, P. Medagliani
With the goal of meeting the stringent throughput and delay requirements of classified network flows, we propose a Deep Q-learning Network (DQN) for optimal weight selection in an active queue management system based on Weighted Fair Queuing (WFQ). Our system schedules flows belonging to different priority classes (Gold, Silver, and Bronze) into separate queues, and learns how and when to dequeue from each queue. The neural network implements deep reinforcement learning tools such as target networks and replay buffers to help learn the best weights depending on the network state. We show, via simulations, that our algorithm converges to an efficient model capable of adapting to the flow demands, producing thus lower delays with respect to traditional WFQ.
为了满足分类网络流严格的吞吐量和延迟要求,我们提出了一种深度q -学习网络(DQN),用于基于加权公平排队(WFQ)的主动队列管理系统的最优权值选择。我们的系统将属于不同优先级类(Gold、Silver和Bronze)的流调度到单独的队列中,并学习如何以及何时从每个队列中退出队列。神经网络实现了深度强化学习工具,如目标网络和重播缓冲区,以帮助根据网络状态学习最佳权重。我们通过模拟表明,我们的算法收敛到一个有效的模型,能够适应流量需求,因此相对于传统的WFQ产生更低的延迟。
{"title":"Deep Reinforcement Learning for Smart Queue Management","authors":"Hassan Ismail Fawaz, D. Zeghlache, Tran Anh Quang Pham, Jérémie Leguay, P. Medagliani","doi":"10.14279/TUJ.ECEASST.80.1139","DOIUrl":"https://doi.org/10.14279/TUJ.ECEASST.80.1139","url":null,"abstract":"With the goal of meeting the stringent throughput and delay requirements of classified network flows, we propose a Deep Q-learning Network (DQN) for optimal weight selection in an active queue management system based on Weighted Fair Queuing (WFQ). Our system schedules flows belonging to different priority classes (Gold, Silver, and Bronze) into separate queues, and learns how and when to dequeue from each queue. The neural network implements deep reinforcement learning tools such as target networks and replay buffers to help learn the best weights depending on the network state. We show, via simulations, that our algorithm converges to an efficient model capable of adapting to the flow demands, producing thus lower delays with respect to traditional WFQ.","PeriodicalId":115235,"journal":{"name":"Electron. Commun. Eur. Assoc. Softw. Sci. Technol.","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125226766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Ray-tracing based Inference Attacks on Physical Layer Security 基于光线追踪的物理层安全推理攻击
Pub Date : 2021-09-08 DOI: 10.14279/TUJ.ECEASST.80.1149
Paul Walther, Markus Richter, T. Strufe
In wireless network security, physical layer security provides a viable alternative to classical cryptography, which deliver high security guarantees with minimal energy expenditure. Nevertheless, these cryptograhpic primitives are based on assumptions about physical conditions which in practice may not be fulfilled. In this work we present a ray-tracing based attack, which challenges the basic assumption of uncorrelated channel properties for eavesdroppers. We realize this attack and evaluate it with real world measurement, and thereby show that such attacks can predict channel properties better than previous attacks and are also more generally applicable.
在无线网络安全中,物理层安全提供了一种可行的替代经典加密的方法,以最小的能量消耗提供高安全性保证。然而,这些密码原语是基于对物理条件的假设,而这些假设在实践中可能无法实现。在这项工作中,我们提出了一种基于光线追踪的攻击,它挑战了窃听者信道属性不相关的基本假设。我们实现了这种攻击,并用真实世界的测量对其进行了评估,从而表明这种攻击比以前的攻击可以更好地预测信道属性,并且也更普遍适用。
{"title":"Ray-tracing based Inference Attacks on Physical Layer Security","authors":"Paul Walther, Markus Richter, T. Strufe","doi":"10.14279/TUJ.ECEASST.80.1149","DOIUrl":"https://doi.org/10.14279/TUJ.ECEASST.80.1149","url":null,"abstract":"In wireless network security, physical layer security provides a viable alternative to classical cryptography, which deliver high security guarantees with minimal energy expenditure. Nevertheless, these cryptograhpic primitives are based on assumptions about physical conditions which in practice may not be fulfilled. In this work we present a ray-tracing based attack, which challenges the basic assumption of uncorrelated channel properties for eavesdroppers. We realize this attack and evaluate it with real world measurement, and thereby show that such attacks can predict channel properties better than previous attacks and are also more generally applicable.","PeriodicalId":115235,"journal":{"name":"Electron. Commun. Eur. Assoc. Softw. Sci. Technol.","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127695547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Congestion Aware Objects Filtering for Collective Perception 群体感知的拥塞感知对象过滤
Pub Date : 2021-09-08 DOI: 10.14279/TUJ.ECEASST.80.1160
Quentin Delooz, Andreas Festag, A. Vinel
This paper addresses collective perception for connected and automated driving. It proposes the adaptation of filtering rules based on the currently available channel resources, referred to as Enhanced DCC-Aware Filtering (EDAF).
本文讨论了联网和自动驾驶的集体感知。提出了基于当前可用信道资源的自适应滤波规则,称为增强型dcc感知滤波(EDAF)。
{"title":"Congestion Aware Objects Filtering for Collective Perception","authors":"Quentin Delooz, Andreas Festag, A. Vinel","doi":"10.14279/TUJ.ECEASST.80.1160","DOIUrl":"https://doi.org/10.14279/TUJ.ECEASST.80.1160","url":null,"abstract":"This paper addresses collective perception for connected and automated driving. It proposes the adaptation of filtering rules based on the currently available channel resources, referred to as Enhanced DCC-Aware Filtering (EDAF).","PeriodicalId":115235,"journal":{"name":"Electron. Commun. Eur. Assoc. Softw. Sci. Technol.","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116463889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Discrete event simulation for the purpose of real-time performance evaluation of distributed hardware-in-the-loop simulators for autonomous driving vehicle validation 离散事件仿真用于自动驾驶车辆验证的分布式半实物仿真器的实时性能评估
Pub Date : 2021-09-08 DOI: 10.14279/TUJ.ECEASST.80.1150
Christoph Funda, K. Hielscher, R. German
Hardware-in-the-loop test benches are distributed computer systems including software, hardware and networking devices, which require strict real-time guarantees. To guarantee strict real-time of the simulator the performance needs to be evaluated. To evaluate the timing performance a discrete event simulation model is built up. The input modeling is based on measurements from the real system in a prototype phase. The results of the simulation model are validated with measurements from a prototype of the real system. The workload is increased until the streaming source becomes unstable, by either exceeding a certain limit of bytes or exceeding the number of parallel software processes running on the cores of the central processing unit. To evaluate the performance beyond these limits, the discrete event simulation model needs to be enriched by a scheduler and a hardware model. To provide real-time guarantees an analytical model needs to be built up.
硬件在环试验台是分布式计算机系统,包括软件、硬件和网络设备,需要严格的实时性保证。为了保证仿真器的实时性,需要对仿真器的性能进行评估。为了评估定时性能,建立了离散事件仿真模型。输入建模是基于在原型阶段的实际系统的测量。仿真模型的结果与实际系统样机的测量结果进行了验证。通过超过一定的字节限制或超过在中央处理单元的核心上运行的并行软件进程的数量,工作负载会不断增加,直到流源变得不稳定为止。为了评估超出这些限制的性能,离散事件模拟模型需要通过调度器和硬件模型来充实。为了提供实时保证,需要建立一个分析模型。
{"title":"Discrete event simulation for the purpose of real-time performance evaluation of distributed hardware-in-the-loop simulators for autonomous driving vehicle validation","authors":"Christoph Funda, K. Hielscher, R. German","doi":"10.14279/TUJ.ECEASST.80.1150","DOIUrl":"https://doi.org/10.14279/TUJ.ECEASST.80.1150","url":null,"abstract":"Hardware-in-the-loop test benches are distributed computer systems including software, hardware and networking devices, which require strict real-time guarantees. To guarantee strict real-time of the simulator the performance needs to be evaluated. To evaluate the timing performance a discrete event simulation model is built up. The input modeling is based on measurements from the real system in a prototype phase. The results of the simulation model are validated with measurements from a prototype of the real system. The workload is increased until the streaming source becomes unstable, by either exceeding a certain limit of bytes or exceeding the number of parallel software processes running on the cores of the central processing unit. To evaluate the performance beyond these limits, the discrete event simulation model needs to be enriched by a scheduler and a hardware model. To provide real-time guarantees an analytical model needs to be built up.","PeriodicalId":115235,"journal":{"name":"Electron. Commun. Eur. Assoc. Softw. Sci. Technol.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125472246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Demo: Simulation-as-a-Service to Benchmark Opportunistic Networks 演示:模拟即服务基准机会网络
Pub Date : 2021-09-08 DOI: 10.14279/TUJ.ECEASST.80.1131
Jens Dede, A. Udugama, Anna Förster
Repeatability, reproducibility, and replicability are essential aspects of experimental and simulation-driven research. Use of benchmarks in such evaluations further as sists corroborative performance evaluations. In this work, we present a demonstrator of a simulation service, called ”OPS on the bench” which tackles these challenges in performance evaluations of opportunistic networks.
重复性、再现性和可复制性是实验和模拟驱动研究的基本方面。在这种评价中使用基准进一步有助于进行确证的业绩评价。在这项工作中,我们提出了一个模拟服务的演示,称为“板凳上的OPS”,它解决了机会主义网络性能评估中的这些挑战。
{"title":"Demo: Simulation-as-a-Service to Benchmark Opportunistic Networks","authors":"Jens Dede, A. Udugama, Anna Förster","doi":"10.14279/TUJ.ECEASST.80.1131","DOIUrl":"https://doi.org/10.14279/TUJ.ECEASST.80.1131","url":null,"abstract":"Repeatability, reproducibility, and replicability are essential aspects of experimental and simulation-driven research. Use of benchmarks in such evaluations further as sists corroborative performance evaluations. In this work, we present a demonstrator of a simulation service, called ”OPS on the bench” which tackles these challenges in performance evaluations of opportunistic networks.","PeriodicalId":115235,"journal":{"name":"Electron. Commun. Eur. Assoc. Softw. Sci. Technol.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127802788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modular Platform for Detecting and Classifying Phishing Websites Using Cyber Threat Intelligence 基于网络威胁情报的网络钓鱼网站检测与分类模块化平台
Pub Date : 2021-09-08 DOI: 10.14279/TUJ.ECEASST.80.1178.1114
Ahmed M. Elmisery, Mirela Sertovic
Phishing attacks are deceptive types of social engineering techniques that attackers use to imitate genuine websites in order to steal the login credentials and private data of the end-users. The continued success of these attacks is heavily attributed to the prolific adoption of online services and the lack of proper training to foster a security awareness mindset of online users. In addition to the financial and reputational damages caused by data breaches of individual users and businesses, cyber adversaries can further use the leaked data for various malicious purposes. In this work, a modular platform was introduced that facilitates accurate detection and automatic evaluation of websites visited by employees of a company or organization. The basis for this approach is a preceding website analysis, which is essential when hunting for potential threats from proxy logs. The platform contains three modules. Characterization of suspicious websites relies on a set of pre-defined features and a multi-stage threat intelligence technique, the functionality of which has been ascertained in initial tests on real data sets
网络钓鱼攻击是一种欺骗性的社会工程技术,攻击者使用它来模仿真实的网站,以窃取最终用户的登录凭据和私人数据。这些攻击的持续成功在很大程度上归因于大量采用在线服务和缺乏适当的培训来培养在线用户的安全意识。除了个人用户和企业的数据泄露造成的财务和声誉损失外,网络攻击者还可以进一步利用泄露的数据进行各种恶意目的。本文介绍了一个模块化的平台,可以对公司或组织的员工访问过的网站进行准确的检测和自动评估。这种方法的基础是之前的网站分析,这在从代理日志中寻找潜在威胁时是必不可少的。该平台包含三个模块。可疑网站的特征描述依赖于一组预定义的特征和多阶段威胁情报技术,其功能已在真实数据集的初始测试中确定
{"title":"Modular Platform for Detecting and Classifying Phishing Websites Using Cyber Threat Intelligence","authors":"Ahmed M. Elmisery, Mirela Sertovic","doi":"10.14279/TUJ.ECEASST.80.1178.1114","DOIUrl":"https://doi.org/10.14279/TUJ.ECEASST.80.1178.1114","url":null,"abstract":"Phishing attacks are deceptive types of social engineering techniques that attackers use to imitate genuine websites in order to steal the login credentials and private data of the end-users. The continued success of these attacks is heavily attributed to the prolific adoption of online services and the lack of proper training to foster a security awareness mindset of online users. In addition to the financial and reputational damages caused by data breaches of individual users and businesses, cyber adversaries can further use the leaked data for various malicious purposes. In this work, a modular platform was introduced that facilitates accurate detection and automatic evaluation of websites visited by employees of a company or organization. The basis for this approach is a preceding website analysis, which is essential when hunting for potential threats from proxy logs. The platform contains three modules. Characterization of suspicious websites relies on a set of pre-defined features and a multi-stage threat intelligence technique, the functionality of which has been ascertained in initial tests on real data sets","PeriodicalId":115235,"journal":{"name":"Electron. Commun. Eur. Assoc. Softw. Sci. Technol.","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127656589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demo: Traffic Splitting for Tor - A Defense against Fingerprinting Attacks 演示:流量分割为Tor -防御指纹攻击
Pub Date : 2021-09-08 DOI: 10.14279/TUJ.ECEASST.80.1151
Sebastian Reuter, Jens Hiller, J. Pennekamp, A. Panchenko, Klaus Wehrle
Website fingerprinting (WFP) attacks on the anonymity network Tor have become ever more effective. Furthermore, research discovered that proposed defenses are insufficient or cause high overhead. In previous work, we presented a new WFP defense for Tor that incorporates multipath transmissions to repel malicious Tor nodes from conducting WFP attacks. In this demo, we showcase the operation of our traffic splitting defense by visually illustrating the underlying Tor multipath transmission using LED-equipped Raspberry Pis.
匿名网络Tor的网站指纹(WFP)攻击变得越来越有效。此外,研究发现,拟议的防御措施不够充分,或者会导致高开销。在之前的工作中,我们为Tor提出了一种新的WFP防御方法,该方法结合了多路径传输来击退恶意Tor节点进行WFP攻击。在本演示中,我们通过使用配备led的Raspberry Pis直观地说明底层Tor多路径传输来展示流量分割防御的操作。
{"title":"Demo: Traffic Splitting for Tor - A Defense against Fingerprinting Attacks","authors":"Sebastian Reuter, Jens Hiller, J. Pennekamp, A. Panchenko, Klaus Wehrle","doi":"10.14279/TUJ.ECEASST.80.1151","DOIUrl":"https://doi.org/10.14279/TUJ.ECEASST.80.1151","url":null,"abstract":"Website fingerprinting (WFP) attacks on the anonymity network Tor have become ever more effective. Furthermore, research discovered that proposed defenses are insufficient or cause high overhead. In previous work, we presented a new WFP defense for Tor that incorporates multipath transmissions to repel malicious Tor nodes from conducting WFP attacks. In this demo, we showcase the operation of our traffic splitting defense by visually illustrating the underlying Tor multipath transmission using LED-equipped Raspberry Pis.","PeriodicalId":115235,"journal":{"name":"Electron. Commun. Eur. Assoc. Softw. Sci. Technol.","volume":"2019 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114740469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Navigating Communication Networks with Deep Reinforcement Learning 用深度强化学习导航通信网络
Pub Date : 2021-09-08 DOI: 10.14279/TUJ.ECEASST.80.1177.1119
Patrick Krämer, Andreas Blenk
Traditional routing protocols such as Open Shortest Path First cannot incorporate fast-changing network states due to their inherent slowness and limited expressiveness. To overcome these limitations, we propose COMNAV, a system that uses Reinforcement Learning (RL) to learn a distributed routing protocol tailored to a specific network. COMNAV interprets routing as a navigational problem, in which flows have to find a way from source to destination. Thus, COMNAV has a close connection to congestion games. The key concept and main contribution is the design of the learning process as a congestion game that allows RL to effectively learn a distributed protocol. Game Theory thereby provides a solid foundation against which the policies RL learns can be evaluated, interpreted, and questioned. We evaluate the capabilities of the learning system in two scenarios in which the routing protocol must react to changes in the network state, and make decisions based on the properties of the flow. Our results show that RL can learn the desired behavior and requires the exchange of only 16 bits of information.
传统的路由协议,如开放最短路径优先,由于其固有的慢性和有限的表达能力,无法适应快速变化的网络状态。为了克服这些限制,我们提出了COMNAV,这是一个使用强化学习(RL)来学习针对特定网络定制的分布式路由协议的系统。COMNAV将路由解释为导航问题,其中流必须找到从源到目的地的路径。因此,《COMNAV》与拥堵游戏有着密切的联系。关键概念和主要贡献是将学习过程设计为一个拥塞游戏,允许强化学习有效地学习分布式协议。因此,博弈论提供了一个坚实的基础,在此基础上,RL学习的政策可以被评估、解释和质疑。我们在两种情况下评估了学习系统的能力,在这两种情况下,路由协议必须对网络状态的变化做出反应,并根据流的属性做出决策。我们的研究结果表明,强化学习可以学习所需的行为,并且只需要交换16位信息。
{"title":"Navigating Communication Networks with Deep Reinforcement Learning","authors":"Patrick Krämer, Andreas Blenk","doi":"10.14279/TUJ.ECEASST.80.1177.1119","DOIUrl":"https://doi.org/10.14279/TUJ.ECEASST.80.1177.1119","url":null,"abstract":"Traditional routing protocols such as Open Shortest Path First cannot incorporate fast-changing network states due to their inherent slowness and limited expressiveness. To overcome these limitations, we propose COMNAV, a system that uses Reinforcement Learning (RL) to learn a distributed routing protocol tailored to a specific network. COMNAV interprets routing as a navigational problem, in which flows have to find a way from source to destination. Thus, COMNAV has a close connection to congestion games. The key concept and main contribution is the design of the learning process as a congestion game that allows RL to effectively learn a distributed protocol. Game Theory thereby provides a solid foundation against which the policies RL learns can be evaluated, interpreted, and questioned. We evaluate the capabilities of the learning system in two scenarios in which the routing protocol must react to changes in the network state, and make decisions based on the properties of the flow. Our results show that RL can learn the desired behavior and requires the exchange of only 16 bits of information.","PeriodicalId":115235,"journal":{"name":"Electron. Commun. Eur. Assoc. Softw. Sci. Technol.","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131112816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
"Vehicular Steganography"?: Opportunities and Challenges “车辆隐写术”?:机遇与挑战
Pub Date : 2021-09-08 DOI: 10.14279/TUJ.ECEASST.80.1166.1118
M. Cooney, E. Järpe, A. Vinel
What if an autonomous vehicle (AV) could secretly warn of potential threats? “Steganography”, the hiding of messages, is a vital way for vulnerable populations to communicate securely and get help. Here, we shine light on the concept of vehicular steganography (VS) using a speculative approach: We identify some key scenarios, highlighting unique challenges that arise from indirect perception, message generation, and effects of perspective–as well as potential carrier signals and message generation considerations. One observation is that, despite challenges to transmission rates and robustness, physical signals such as locomotion or sound could offer a complementary, currently-unused alternative to traditional methods. The immediate implication is that VS could help to mitigate some costly safety problems–suggesting the benefit of further discussion and ideation.
如果自动驾驶汽车(AV)可以秘密地警告潜在的威胁呢?“隐写术”,即隐藏信息,是弱势群体安全沟通和获得帮助的重要途径。在这里,我们使用一种推测的方法来阐明车辆隐写术(VS)的概念:我们确定了一些关键场景,强调了间接感知、信息生成和视角影响以及潜在的载波信号和信息生成考虑因素所带来的独特挑战。一个观察结果是,尽管传输速率和稳健性存在挑战,但运动或声音等物理信号可以提供一种补充,目前尚未使用的替代传统方法。直接的暗示是,人工智能可以帮助减轻一些代价高昂的安全问题,这表明进一步的讨论和构想是有益的。
{"title":"\"Vehicular Steganography\"?: Opportunities and Challenges","authors":"M. Cooney, E. Järpe, A. Vinel","doi":"10.14279/TUJ.ECEASST.80.1166.1118","DOIUrl":"https://doi.org/10.14279/TUJ.ECEASST.80.1166.1118","url":null,"abstract":"What if an autonomous vehicle (AV) could secretly warn of potential threats? “Steganography”, the hiding of messages, is a vital way for vulnerable populations to communicate securely and get help. Here, we shine light on the concept of vehicular steganography (VS) using a speculative approach: We identify some key scenarios, highlighting unique challenges that arise from indirect perception, message generation, and effects of perspective–as well as potential carrier signals and message generation considerations. One observation is that, despite challenges to transmission rates and robustness, physical signals such as locomotion or sound could offer a complementary, currently-unused alternative to traditional methods. The immediate implication is that VS could help to mitigate some costly safety problems–suggesting the benefit of further discussion and ideation.","PeriodicalId":115235,"journal":{"name":"Electron. Commun. Eur. Assoc. Softw. Sci. Technol.","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124627064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Smart Urban Data Space for Citizen Science 面向公民科学的智慧城市数据空间
Pub Date : 2021-09-08 DOI: 10.14279/TUJ.ECEASST.80.1158.1102
Heiko Bornholdt, David Jost, Philipp Kisters, Michel Rottleuthner, Sehrish Shafeeq, W. Lamersdorf, T. Schmidt, Mathias Fischer
In smart cities, the number of citizen-operated sensor devices continues to increase. This development multiplies the amount of collectible data about our urban environment. Currently, many of those sensors are connected to proprietary cloud services with questionable effects on user privacy. Simply avoiding interconnecting those devices misses out on opportunities to collectively use data as a shared source of information. The city of Hamburg sponsored project Smart Networks for Urban Citizen Participation (SANE) aims at enabling citizens to connect existing sensors to create a city-wide data space while keeping control of devices and gathered data. Interconnecting these sensors enables all citizens to generate higher value information and thus improve their urban environmental awareness. In this paper, we describe the demo of our SANE architecture. The demo presents how citizens connect to the city-wide data space, how data can be collected, processed, and shared in a privately manner.
在智慧城市中,市民操作的传感器设备数量不断增加。这种发展增加了关于我们城市环境的可收集数据的数量。目前,许多传感器都连接到专有云服务,对用户隐私的影响值得怀疑。简单地避免将这些设备互连,就错过了将数据作为共享信息源的机会。汉堡市赞助的城市公民参与智能网络(SANE)项目旨在使市民能够连接现有传感器,创建全市范围的数据空间,同时保持对设备和收集数据的控制。将这些传感器相互连接,使所有市民能够产生更高价值的信息,从而提高他们的城市环境意识。在本文中,我们描述了我们的SANE架构的演示。该演示展示了市民如何连接到全市范围的数据空间,以及如何以私人方式收集、处理和共享数据。
{"title":"Smart Urban Data Space for Citizen Science","authors":"Heiko Bornholdt, David Jost, Philipp Kisters, Michel Rottleuthner, Sehrish Shafeeq, W. Lamersdorf, T. Schmidt, Mathias Fischer","doi":"10.14279/TUJ.ECEASST.80.1158.1102","DOIUrl":"https://doi.org/10.14279/TUJ.ECEASST.80.1158.1102","url":null,"abstract":"In smart cities, the number of citizen-operated sensor devices continues to increase. This development multiplies the amount of collectible data about our urban environment. Currently, many of those sensors are connected to proprietary cloud services with questionable effects on user privacy. Simply avoiding interconnecting those devices misses out on opportunities to collectively use data as a shared source of information. The city of Hamburg sponsored project Smart Networks for Urban Citizen Participation (SANE) aims at enabling citizens to connect existing sensors to create a city-wide data space while keeping control of devices and gathered data. Interconnecting these sensors enables all citizens to generate higher value information and thus improve their urban environmental awareness. In this paper, we describe the demo of our SANE architecture. The demo presents how citizens connect to the city-wide data space, how data can be collected, processed, and shared in a privately manner.","PeriodicalId":115235,"journal":{"name":"Electron. Commun. Eur. Assoc. Softw. Sci. Technol.","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122826046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Electron. Commun. Eur. Assoc. Softw. Sci. Technol.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1