首页 > 最新文献

2019 53rd Annual Conference on Information Sciences and Systems (CISS)最新文献

英文 中文
Secure Key Generation for Distributed Inference in IoT Invited Presentation 物联网邀请演示中分布式推理的安全密钥生成
Pub Date : 2019-04-16 DOI: 10.1109/CISS.2019.8692935
Henri Hentila, V. Koivunen, H. Poor, Rick S. Blum
A secret key generation scheme is proposed for generating keys to be used for one-time pad encryption. This type of encryption is suitable for e.g., short packet communication in distributed inference in IoT. The scheme exploits the phase of the channel fading coefficient in a Rayleigh fading channel to extract highly correlated key bits at two legitimate parties. Compared to other existing methods, the proposed scheme trades off higher bit error probabilities in the keys for lower error correction communication requirements. The bit error of generated keys is characterized via an approximate upper bound, which is shown to be fairly tight for reasonable signal-to-noise ratios.
提出了一种用于一次性填充加密的密钥生成方案。这种类型的加密适用于物联网中分布式推理中的短包通信。该方案利用瑞利衰落信道中信道衰落系数的相位来提取合法双方高度相关的密钥位。与其他现有方法相比,该方案以较高的密钥误码概率换取较低的纠错通信要求。生成密钥的误码是通过一个近似的上界来表征的,对于合理的信噪比来说,这是相当严格的。
{"title":"Secure Key Generation for Distributed Inference in IoT Invited Presentation","authors":"Henri Hentila, V. Koivunen, H. Poor, Rick S. Blum","doi":"10.1109/CISS.2019.8692935","DOIUrl":"https://doi.org/10.1109/CISS.2019.8692935","url":null,"abstract":"A secret key generation scheme is proposed for generating keys to be used for one-time pad encryption. This type of encryption is suitable for e.g., short packet communication in distributed inference in IoT. The scheme exploits the phase of the channel fading coefficient in a Rayleigh fading channel to extract highly correlated key bits at two legitimate parties. Compared to other existing methods, the proposed scheme trades off higher bit error probabilities in the keys for lower error correction communication requirements. The bit error of generated keys is characterized via an approximate upper bound, which is shown to be fairly tight for reasonable signal-to-noise ratios.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124437902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Deep learning to detect catheter tips in vivo during photoacoustic-guided catheter interventions : Invited Presentation 深度学习在光声引导导管介入过程中检测导管尖端:特邀报告
Pub Date : 2019-04-16 DOI: 10.1109/CISS.2019.8692864
Derek Allman, Fabrizio R. Assis, J. Chrispin, M. Bell
Catheter guidance is typically performed with fluoroscopy, which requires patient and operator exposure to ionizing radiation. Our group is exploring robotic photoacoustic imaging as an alternative to fluoroscopy to track catheter tips. However, the catheter tip segmentation step in the photoacoustic-based robotic visual servoing algorithm is limited by the presence of confusing photoacoustic artifacts. We previously demonstrated that a deep neural network is capable of detecting photoacoustic sources in the presence of artifacts in simulated, phantom, and in vivo data. This paper directly compares the in vivo results obtained with linear and phased ultrasound receiver arrays. Two convolutional neural networks (CNNs) were trained to detect point sources in simulated photoacoustic channel data and tested with in vivo images from a swine catheterization procedure. The CNN trained with a linear array receiver model correctly classified 88.8% of sources, and the CNN trained with a phased array receiver model correctly classified 91.4% of sources. These results demonstrate that a deep learning approach to photoacoustic image formation is capable of detecting catheter tips during interventional procedures. Therefore, the proposed approach is a promising replacement to the segmentation step in photoacoustic-based robotic visual servoing algorithms.
导尿管引导通常是通过透视进行的,这需要患者和操作员暴露在电离辐射中。我们的研究小组正在探索机器人光声成像技术,以替代透视技术来跟踪导管尖端。然而,在基于光声的机器人视觉伺服算法中,导管尖端分割步骤受到光声伪影混淆的限制。我们之前证明了深度神经网络能够在模拟、幻影和活体数据中检测存在伪影的光声源。本文直接比较了线性和相控超声接收机阵列在体内得到的结果。训练两个卷积神经网络(cnn)来检测模拟光声通道数据中的点源,并使用猪导管插入术的体内图像进行测试。使用线阵接收器模型训练的CNN对源的正确率为88.8%,而使用相控阵接收器模型训练的CNN对源的正确率为91.4%。这些结果表明,光声图像形成的深度学习方法能够在介入过程中检测导管尖端。因此,该方法有望取代基于光声的机器人视觉伺服算法中的分割步骤。
{"title":"Deep learning to detect catheter tips in vivo during photoacoustic-guided catheter interventions : Invited Presentation","authors":"Derek Allman, Fabrizio R. Assis, J. Chrispin, M. Bell","doi":"10.1109/CISS.2019.8692864","DOIUrl":"https://doi.org/10.1109/CISS.2019.8692864","url":null,"abstract":"Catheter guidance is typically performed with fluoroscopy, which requires patient and operator exposure to ionizing radiation. Our group is exploring robotic photoacoustic imaging as an alternative to fluoroscopy to track catheter tips. However, the catheter tip segmentation step in the photoacoustic-based robotic visual servoing algorithm is limited by the presence of confusing photoacoustic artifacts. We previously demonstrated that a deep neural network is capable of detecting photoacoustic sources in the presence of artifacts in simulated, phantom, and in vivo data. This paper directly compares the in vivo results obtained with linear and phased ultrasound receiver arrays. Two convolutional neural networks (CNNs) were trained to detect point sources in simulated photoacoustic channel data and tested with in vivo images from a swine catheterization procedure. The CNN trained with a linear array receiver model correctly classified 88.8% of sources, and the CNN trained with a phased array receiver model correctly classified 91.4% of sources. These results demonstrate that a deep learning approach to photoacoustic image formation is capable of detecting catheter tips during interventional procedures. Therefore, the proposed approach is a promising replacement to the segmentation step in photoacoustic-based robotic visual servoing algorithms.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128903612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Prospect Theoretical Extension of a Communication Game Under Jamming 干扰下通信博弈的理论拓展
Pub Date : 2019-04-16 DOI: 10.1109/CISS.2019.8692847
A. Garnaev, W. Trappe
In this paper, we consider how subjectivity affects the problem of reliable communication. To model subjective factor we formulate a prospect theoretical (PT) extension of a zero sum game involving a primary user (PU) that must communicate with one of n users, while avoiding being jammed by an adversary. We prove that the PT equilibrium strategies, which are generalizations of the Nash equilibrium, exist for any probability weighting functions that models the corresponding subjective factors. Moreover, the PT-equilibrium strategy for the adversary is unique, and it can be found in water-filling form. We establish conditions for the PT-equilibrium of the PU to be unique. If PT-equilibrium of the PU is not unique, then a continuum of PT-equilibria arise. All of the PT-equilibria are found in water-filling form, and a hierarchical relationship between the derived water-filling equations is established. Finally, the sensitivity of the PT equilibrium strategies to environmental parameters is theoretically proven and numerically illustrated.
在本文中,我们考虑了主观性是如何影响可靠通信问题的。为了对主观因素进行建模,我们制定了一个零和博弈的前景理论(PT)扩展,其中涉及一个主用户(PU),该用户必须与n个用户中的一个进行通信,同时避免被对手干扰。我们证明了PT均衡策略,即纳什均衡的推广,存在于任何概率加权函数,建模相应的主观因素。此外,对手的pt平衡策略是独特的,它可以在注水形式中找到。我们建立了PU的pt -平衡是唯一的条件。如果PU的pt平衡不是唯一的,那么就会出现连续的pt平衡。所有pt平衡均以充水形式存在,并在推导的充水方程之间建立了层次关系。最后,从理论上证明了PT均衡策略对环境参数的敏感性,并进行了数值说明。
{"title":"A Prospect Theoretical Extension of a Communication Game Under Jamming","authors":"A. Garnaev, W. Trappe","doi":"10.1109/CISS.2019.8692847","DOIUrl":"https://doi.org/10.1109/CISS.2019.8692847","url":null,"abstract":"In this paper, we consider how subjectivity affects the problem of reliable communication. To model subjective factor we formulate a prospect theoretical (PT) extension of a zero sum game involving a primary user (PU) that must communicate with one of n users, while avoiding being jammed by an adversary. We prove that the PT equilibrium strategies, which are generalizations of the Nash equilibrium, exist for any probability weighting functions that models the corresponding subjective factors. Moreover, the PT-equilibrium strategy for the adversary is unique, and it can be found in water-filling form. We establish conditions for the PT-equilibrium of the PU to be unique. If PT-equilibrium of the PU is not unique, then a continuum of PT-equilibria arise. All of the PT-equilibria are found in water-filling form, and a hierarchical relationship between the derived water-filling equations is established. Finally, the sensitivity of the PT equilibrium strategies to environmental parameters is theoretically proven and numerically illustrated.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114102495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sparse Dictionary Learning and Per-source Filtering for Blind Radio Source Separation 稀疏字典学习和逐源滤波的盲分离
Pub Date : 2019-04-16 DOI: 10.1109/CISS.2019.8693055
Annan Dong, O. Simeone, A. Haimovich, J. Dabin
Radio frequency sources are observed at a fusion center via sensor measurements made over slow unknown flat-fading channels. The number of sources may be larger than the number of sensors, but their activity is sparse and intermittent with bursty transmission patterns accounted by hidden Markov models. The problem of blind source estimation in the absence of channel state information is tackled via a novel algorithm, consisting of a dictionary learning (DL) stage and a per-source stochastic filtering (PSF) stage. To this end, smooth LASSO is integrated with DL, while the forward-backward algorithm is leveraged for PSF. It is shown that the proposed algorithm can enhance the detection performance of the sources.
射频源是通过传感器测量在一个融合中心进行的缓慢未知的平坦衰落信道。源的数量可能大于传感器的数量,但它们的活动是稀疏的和间歇性的,具有由隐马尔可夫模型计算的突发传输模式。通过一种新的算法,包括字典学习(DL)阶段和逐源随机滤波(PSF)阶段,解决了信道状态信息缺失时的盲源估计问题。为此,将平滑LASSO与深度学习相结合,而将前向向后算法用于PSF。实验结果表明,该算法能有效地提高信号源的检测性能。
{"title":"Sparse Dictionary Learning and Per-source Filtering for Blind Radio Source Separation","authors":"Annan Dong, O. Simeone, A. Haimovich, J. Dabin","doi":"10.1109/CISS.2019.8693055","DOIUrl":"https://doi.org/10.1109/CISS.2019.8693055","url":null,"abstract":"Radio frequency sources are observed at a fusion center via sensor measurements made over slow unknown flat-fading channels. The number of sources may be larger than the number of sensors, but their activity is sparse and intermittent with bursty transmission patterns accounted by hidden Markov models. The problem of blind source estimation in the absence of channel state information is tackled via a novel algorithm, consisting of a dictionary learning (DL) stage and a per-source stochastic filtering (PSF) stage. To this end, smooth LASSO is integrated with DL, while the forward-backward algorithm is leveraged for PSF. It is shown that the proposed algorithm can enhance the detection performance of the sources.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130021216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exponential Error Bounds and Decoding Complexity for Block Codes Constructed by Unit Memory Trellis Codes of Branch Length Two 分支长度为2的单元存储格码构造分组码的指数误差边界和译码复杂度
Pub Date : 2019-04-16 DOI: 10.1109/CISS.2019.8692938
S. Hirasawa, H. Yagi, Manabu Kobayashi, M. Kasahara
Performance of block codes constructed by unit memory (UM) trellis codes is discussed from random coding arguments. There are three methods to obtain block codes from trellis codes, i.e., those of (a) Tail Termination (TT), (b) Direct Truncation (DT), and (c) Tail Biting (TB). In this paper, we derive exponential error bounds and decoding complexity for block codes constructed by the UM trellis codes of branch length two based on the above three methods to uniformly discuss their performance. For the UM trellis codes of branch length two, the error exponent of the tail biting unit memory (TB-UM) trellis codes is shown to be larger than or equal to those of the ordinary block codes, the tail termination unit memory (TT-UM) and the direct truncation unit memory (DT-UM) trellis codes for all rates less than the capacity. Decoding complexity for the TB-UM trellis codes of branch length two exhibits interesting property since their trellis diagrams become simple. Taking into account of the asymptotic decoding complexity, the TB-UM trellis codes are also shown to have a smaller upper bound on the probability of decoding error compared to the ordinary block codes for the same rate with the same decoding complexity.
从随机编码的角度讨论了单元存储器格码构造的分组码的性能。从格子码中获取分组码的方法有三种,分别是(a) Tail Termination (TT), (b) Direct Truncation (DT)和(c) Tail bites (TB)。本文在上述三种方法的基础上,导出了由分支长度为2的UM格码构造的分组码的指数误差界和译码复杂度,并统一讨论了它们的性能。对于分支长度为2的UM格码,尾部咬入单元存储器(TB-UM)格码的误差指数大于或等于普通分组码、尾部终止单元存储器(TT-UM)和直接截断单元存储器(DT-UM)格码的误差指数。分支长度为2的TB-UM格子码的解码复杂度表现出有趣的特性,因为它们的格子图变得简单。考虑到译码复杂度的渐近性,TB-UM格子码在译码复杂度相同、译码率相同的情况下,译码错误概率的上界也比普通分组码小。
{"title":"Exponential Error Bounds and Decoding Complexity for Block Codes Constructed by Unit Memory Trellis Codes of Branch Length Two","authors":"S. Hirasawa, H. Yagi, Manabu Kobayashi, M. Kasahara","doi":"10.1109/CISS.2019.8692938","DOIUrl":"https://doi.org/10.1109/CISS.2019.8692938","url":null,"abstract":"Performance of block codes constructed by unit memory (UM) trellis codes is discussed from random coding arguments. There are three methods to obtain block codes from trellis codes, i.e., those of (a) Tail Termination (TT), (b) Direct Truncation (DT), and (c) Tail Biting (TB). In this paper, we derive exponential error bounds and decoding complexity for block codes constructed by the UM trellis codes of branch length two based on the above three methods to uniformly discuss their performance. For the UM trellis codes of branch length two, the error exponent of the tail biting unit memory (TB-UM) trellis codes is shown to be larger than or equal to those of the ordinary block codes, the tail termination unit memory (TT-UM) and the direct truncation unit memory (DT-UM) trellis codes for all rates less than the capacity. Decoding complexity for the TB-UM trellis codes of branch length two exhibits interesting property since their trellis diagrams become simple. Taking into account of the asymptotic decoding complexity, the TB-UM trellis codes are also shown to have a smaller upper bound on the probability of decoding error compared to the ordinary block codes for the same rate with the same decoding complexity.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126838701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smoothed First-order Algorithms for Expectation-valued Constrained Problems 期望值约束问题的光滑一阶算法
Pub Date : 2019-04-16 DOI: 10.1109/CISS.2019.8692925
A. Jalilzadeh, U. Shanbhag
We consider the development of first-order algorithms for convex stochastic optimization problems with expectation constraints. By recasting the problem as a solution to a monotone stochastic variational inequality problem, we note that a solution to this problem can be obtained as a solution to an unconstrained nonsmooth convex stochastic optimization problem. We utilize a variance-reduced smoothed first-order scheme for resolving such a problem and derive rate statements for such a scheme.
研究了带期望约束的凸随机优化问题的一阶算法的发展。通过将该问题转化为一个单调随机变分不等式问题的解,我们注意到该问题的解可以转化为一个无约束非光滑凸随机优化问题的解。我们利用一个方差减少的平滑一阶格式来解决这个问题,并推导出这种格式的速率表达式。
{"title":"Smoothed First-order Algorithms for Expectation-valued Constrained Problems","authors":"A. Jalilzadeh, U. Shanbhag","doi":"10.1109/CISS.2019.8692925","DOIUrl":"https://doi.org/10.1109/CISS.2019.8692925","url":null,"abstract":"We consider the development of first-order algorithms for convex stochastic optimization problems with expectation constraints. By recasting the problem as a solution to a monotone stochastic variational inequality problem, we note that a solution to this problem can be obtained as a solution to an unconstrained nonsmooth convex stochastic optimization problem. We utilize a variance-reduced smoothed first-order scheme for resolving such a problem and derive rate statements for such a scheme.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121297873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Short-Length LDPC Codes with a CRC and Iterative Ordered Statistic Decoding : (Invited Paper) 用CRC和迭代有序统计译码改进短长度LDPC码:(特邀论文)
Pub Date : 2019-03-20 DOI: 10.1109/CISS.2019.8693053
Wei Zhou, M. Lentmaier
We present a CRC-aided LDPC coding scheme that can outperform the underlying LDPC code under ordered statistic decoding (OSD). In this scheme, the CRC is used jointly with the LDPC code to construct a candidate list, instead of conventionally being regarded as a detection code to prune the list generated by the LDPC code alone. As an example we consider a (128,64)5 G LDPC code with BP decoding, which we can outperform by 2 dB using a (128,72) LDPC code in combination with a 8-bit CRC under OSD of order t=3. The proposed decoding scheme for CRC-aided LDPC codes also achieves a better performance than the conventional scheme where the CRC is used to prune the list. A manageable complexity can be achieved with iterative reliability based OSD, which is demonstrated to perform well with a small OSD order.
我们提出了一种crc辅助LDPC编码方案,该方案在有序统计解码(OSD)下优于底层LDPC编码。在该方案中,CRC与LDPC码共同构建候选列表,而不是传统的将其作为检测码来对LDPC码单独生成的列表进行剪枝。作为一个例子,我们考虑了一个带有BP解码的(128,64)5g LDPC码,我们可以使用(128,72)LDPC码与8位CRC结合使用,在OSD为t=3的情况下,我们可以将其性能提高2 dB。本文提出的CRC辅助LDPC码的译码方案也比使用CRC对列表进行剪枝的传统译码方案取得了更好的性能。基于迭代可靠性的OSD可以实现可管理的复杂性,并且在较小的OSD顺序下表现良好。
{"title":"Improving Short-Length LDPC Codes with a CRC and Iterative Ordered Statistic Decoding : (Invited Paper)","authors":"Wei Zhou, M. Lentmaier","doi":"10.1109/CISS.2019.8693053","DOIUrl":"https://doi.org/10.1109/CISS.2019.8693053","url":null,"abstract":"We present a CRC-aided LDPC coding scheme that can outperform the underlying LDPC code under ordered statistic decoding (OSD). In this scheme, the CRC is used jointly with the LDPC code to construct a candidate list, instead of conventionally being regarded as a detection code to prune the list generated by the LDPC code alone. As an example we consider a (128,64)5 G LDPC code with BP decoding, which we can outperform by 2 dB using a (128,72) LDPC code in combination with a 8-bit CRC under OSD of order t=3. The proposed decoding scheme for CRC-aided LDPC codes also achieves a better performance than the conventional scheme where the CRC is used to prune the list. A manageable complexity can be achieved with iterative reliability based OSD, which is demonstrated to perform well with a small OSD order.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129984477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Securing PKES against Relay Attacks using Coordinate Tracing and Multi-Factor Authentication 利用坐标跟踪和多因素身份验证保护PKES免受中继攻击
Pub Date : 2019-03-20 DOI: 10.1109/CISS.2019.8692790
Syed S. Rizvi, Jarrett Imler, Luke Ritchey, M. Tokar
In most produced modern vehicles, Passive Keyless Entry and Start System (PKES), a newer form of an entry access system, is becoming more and more popular. The PKES system allows the consumer to enter within a certain range and have the vehicle’s doors unlock automatically without pressing any buttons on the key. This technology increases the overall convenience to the consumer; however, it is vulnerable to attacks known as relay and amplified relay attacks. A relay attack consists of placing a device near the vehicle and a device near the key to relay the signal between the key and the vehicle. On the other hand, an amplified relay attack uses only a singular amplifier to increase the range of the vehicle sensors to reach the key. By exploiting these two different vulnerabilities within the PKES system, an attacker can gain unauthorized access to the vehicle, leading to damage or even stolen property. To minimize both vulnerabilities, we propose a coordinate tracing system with an additional Bluetooth communication channel. The coordinate tracing system, or PKES Forcefield, traces the authorized key’s longitude and latitude in real time using two proposed algorithms, known as the Key Bearing algorithm and the Longitude and Latitude Key (LLK) algorithm. To further add security, a Bluetooth communication channel will be implemented. With an additional channel established, a second frequency can be traced within a secondary PKES Forcefield. The LLK Algorithm computes both locations of frequencies and analyzes the results to form a pattern. Furthermore, the PKES Forcefield movement-tracing allows a vehicle to understand when an attacker attempts to transmit an unauthenticated signal and blocks any signal from being amplified over a fixed range.
被动无钥匙进入和启动系统(PKES)作为一种新型的车辆进入系统,在大多数生产的现代车辆中越来越受欢迎。PKES系统允许消费者进入一定范围内,无需按下钥匙上的任何按钮,车门就会自动解锁。这项技术增加了消费者的整体便利性;然而,它很容易受到中继攻击和放大中继攻击的攻击。中继攻击包括在车辆附近放置一个装置,在钥匙附近放置一个装置,在钥匙和车辆之间传递信号。另一方面,放大中继攻击仅使用一个单一放大器来增加车辆传感器到达密钥的范围。通过利用PKES系统中的这两个不同的漏洞,攻击者可以未经授权访问车辆,导致损坏甚至盗窃财产。为了减少这两个漏洞,我们提出了一个带有附加蓝牙通信信道的坐标跟踪系统。坐标跟踪系统,或PKES力场,使用两种算法实时跟踪授权密钥的经度和纬度,称为密钥承载算法和经纬度密钥(LLK)算法。为了进一步增加安全性,将实现蓝牙通信通道。通过建立一个额外的通道,可以在二次PKES力场中跟踪第二个频率。LLK算法计算频率的两个位置并分析结果以形成模式。此外,PKES力场运动追踪允许车辆了解攻击者何时试图传输未经认证的信号,并阻止任何信号在固定范围内被放大。
{"title":"Securing PKES against Relay Attacks using Coordinate Tracing and Multi-Factor Authentication","authors":"Syed S. Rizvi, Jarrett Imler, Luke Ritchey, M. Tokar","doi":"10.1109/CISS.2019.8692790","DOIUrl":"https://doi.org/10.1109/CISS.2019.8692790","url":null,"abstract":"In most produced modern vehicles, Passive Keyless Entry and Start System (PKES), a newer form of an entry access system, is becoming more and more popular. The PKES system allows the consumer to enter within a certain range and have the vehicle’s doors unlock automatically without pressing any buttons on the key. This technology increases the overall convenience to the consumer; however, it is vulnerable to attacks known as relay and amplified relay attacks. A relay attack consists of placing a device near the vehicle and a device near the key to relay the signal between the key and the vehicle. On the other hand, an amplified relay attack uses only a singular amplifier to increase the range of the vehicle sensors to reach the key. By exploiting these two different vulnerabilities within the PKES system, an attacker can gain unauthorized access to the vehicle, leading to damage or even stolen property. To minimize both vulnerabilities, we propose a coordinate tracing system with an additional Bluetooth communication channel. The coordinate tracing system, or PKES Forcefield, traces the authorized key’s longitude and latitude in real time using two proposed algorithms, known as the Key Bearing algorithm and the Longitude and Latitude Key (LLK) algorithm. To further add security, a Bluetooth communication channel will be implemented. With an additional channel established, a second frequency can be traced within a secondary PKES Forcefield. The LLK Algorithm computes both locations of frequencies and analyzes the results to form a pattern. Furthermore, the PKES Forcefield movement-tracing allows a vehicle to understand when an attacker attempts to transmit an unauthenticated signal and blocks any signal from being amplified over a fixed range.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133281223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Compressive Sensing for Indoor Millimeter Wave Massive MIMO : (Invited Paper) 室内毫米波海量MIMO压缩感知研究(特邀论文)
Pub Date : 2019-03-20 DOI: 10.1109/CISS.2019.8692928
John Franklin, A. Cooper
Under sparse channel assumptions, channel state information for the massive MIMO uplink can be effectively estimated without sampling every antenna. Assuming a slow flat fading multipath channel, orthogonal pilot signals, and a uniform rectangular array, channel estimation is performed by leveraging sparsity in the spatial and pilot code domains to reconstruct the channel to all antennas. Results of sampling from 25 percent of a 32 by 64 element massive MIMO array during the uplink piloting phase are presented. The sum rate achieved by using compressed sensing and sparse recovery channel estimates exceeds that achieved with the least squares channel estimate for the same number of sampled antennas.
在稀疏信道假设下,无需对每个天线采样即可有效估计海量MIMO上行链路的信道状态信息。假设有一个缓慢的平坦衰落多径信道、正交导频信号和均匀的矩形阵列,通过利用空间和导频码域的稀疏性来重建到所有天线的信道来进行信道估计。给出了在上行导频阶段对32 × 64元大规模MIMO阵列进行25%采样的结果。使用压缩感知和稀疏恢复信道估计获得的和速率超过了使用最小二乘信道估计获得的和速率。
{"title":"Compressive Sensing for Indoor Millimeter Wave Massive MIMO : (Invited Paper)","authors":"John Franklin, A. Cooper","doi":"10.1109/CISS.2019.8692928","DOIUrl":"https://doi.org/10.1109/CISS.2019.8692928","url":null,"abstract":"Under sparse channel assumptions, channel state information for the massive MIMO uplink can be effectively estimated without sampling every antenna. Assuming a slow flat fading multipath channel, orthogonal pilot signals, and a uniform rectangular array, channel estimation is performed by leveraging sparsity in the spatial and pilot code domains to reconstruct the channel to all antennas. Results of sampling from 25 percent of a 32 by 64 element massive MIMO array during the uplink piloting phase are presented. The sum rate achieved by using compressed sensing and sparse recovery channel estimates exceeds that achieved with the least squares channel estimate for the same number of sampled antennas.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132742915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Socio-Emotional Robot with Distributed Multi-Platform Neuromorphic Processing : (Invited Presentation) 具有分布式多平台神经形态处理的社会情感机器人:(特邀报告)
Pub Date : 2019-03-20 DOI: 10.1109/CISS.2019.8692945
Kate D. Fischl, Adam B. Cellon, T. Stewart, T. Horiuchi, A. Andreou
Social robotics is a highly useful field that is rapidly growing. Advances in embedded systems and fields like neuromorphic computing provide hardware solutions for the computationally complex models needed to produce realistic, pro-social socio-emotional robots. This work details a robot which executes a simplified amygdala model to determine an emotional state from visual input and a subsequent behavioral response. Each nuclei of this model is processed on a different neuromorphic platform, including the SpiNNaker, Loihi, and Braindrop chips. Although simplified, this robot and its underlying model illustrate a proof of concept for more complicated and biologically-plausible socio-emotional robots.
社交机器人是一个非常有用的领域,正在迅速发展。嵌入式系统和神经形态计算等领域的进步为生产现实的、亲社会的、有情感的机器人所需的计算复杂模型提供了硬件解决方案。这项工作详细介绍了一个机器人,它执行一个简化的杏仁核模型,从视觉输入和随后的行为反应中确定情绪状态。该模型的每个细胞核都在不同的神经形态平台上进行处理,包括SpiNNaker、Loihi和Braindrop芯片。虽然被简化了,但这个机器人和它的底层模型为更复杂的、生物学上可信的社会情感机器人提供了概念证明。
{"title":"Socio-Emotional Robot with Distributed Multi-Platform Neuromorphic Processing : (Invited Presentation)","authors":"Kate D. Fischl, Adam B. Cellon, T. Stewart, T. Horiuchi, A. Andreou","doi":"10.1109/CISS.2019.8692945","DOIUrl":"https://doi.org/10.1109/CISS.2019.8692945","url":null,"abstract":"Social robotics is a highly useful field that is rapidly growing. Advances in embedded systems and fields like neuromorphic computing provide hardware solutions for the computationally complex models needed to produce realistic, pro-social socio-emotional robots. This work details a robot which executes a simplified amygdala model to determine an emotional state from visual input and a subsequent behavioral response. Each nuclei of this model is processed on a different neuromorphic platform, including the SpiNNaker, Loihi, and Braindrop chips. Although simplified, this robot and its underlying model illustrate a proof of concept for more complicated and biologically-plausible socio-emotional robots.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131897916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2019 53rd Annual Conference on Information Sciences and Systems (CISS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1