首页 > 最新文献

IEEE Transactions on Information Forensics and Security最新文献

英文 中文
Generating Location Traces With Semantic- Constrained Local Differential Privacy 利用语义约束的局部差分隐私生成位置轨迹
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-14 DOI: 10.1109/TIFS.2024.3480712
Xinyue Sun;Qingqing Ye;Haibo Hu;Jiawei Duan;Qiao Xue;Tianyu Wo;Weizhe Zhang;Jie Xu
Valuable information and knowledge can be learned from users’ location traces and support various location-based applications such as intelligent traffic control, incident response, and COVID-19 contact tracing. However, due to privacy concerns, no authority could simply collect users’ private location traces for mining or even publishing. To echo such concerns, local differential privacy (LDP) enables individual privacy by allowing each user to report a perturbed version of their data. Unfortunately, when applied to location traces, LDP cannot preserve the semantics in the context of location traces because it treats all locations (i.e., various points of interest) as equally sensitive. This results in a low utility of LDP mechanisms for collecting location traces. In this paper, we address the challenge of collecting and sharing location traces with valuable semantics while providing sufficient privacy protection for participating users. We first propose semantic-constrained local differential privacy (SLDP), a new privacy model to provide a provable mathematical privacy guarantee while preserving desirable semantics. Then, we design a location trace perturbation mechanism (LTPM) that users can use to perturb their traces in a way that satisfies SLDP. Finally, we propose a private location trace synthesis (PLTS) framework in which users use LTPM to perturb their traces before sending them to the collector, who aggregates the users’ perturbed data to generate location traces with valuable semantics. Extensive experiments on three real-world datasets demonstrate that our PLTS outperforms existing state-of-the-art methods by at least 21% in a range of real-world applications, such as spatial visiting queries and frequent pattern mining, under the same privacy leakage.
从用户的位置轨迹中可以获得宝贵的信息和知识,并支持各种基于位置的应用,如智能交通控制、事件响应和 COVID-19 联系人追踪。然而,出于对隐私的考虑,任何机构都不能简单地收集用户的私人位置轨迹进行挖掘甚至发布。为了回应这种担忧,局部差分隐私(LDP)通过允许每个用户报告其数据的扰动版本来实现个人隐私。遗憾的是,在应用于位置轨迹时,LDP 无法保留位置轨迹的语义,因为它将所有位置(即各种兴趣点)都视为同等敏感。这就导致 LDP 机制在收集位置轨迹时效用较低。在本文中,我们要解决的难题是收集和共享有价值语义的位置痕迹,同时为参与用户提供足够的隐私保护。我们首先提出了语义约束局部差分隐私(SLDP),这是一种新的隐私模型,可在保留理想语义的同时提供可证明的数学隐私保证。然后,我们设计了一种位置轨迹扰动机制(LTPM),用户可以用它来扰动自己的轨迹,从而满足 SLDP。最后,我们提出了一个私有位置轨迹合成(PLTS)框架,在该框架中,用户使用 LTPM 扰动其轨迹,然后将其发送给收集者,收集者汇总用户的扰动数据,生成有价值语义的位置轨迹。在三个真实世界数据集上进行的广泛实验表明,在空间访问查询和频繁模式挖掘等一系列真实世界应用中,在隐私泄露相同的情况下,我们的PLTS比现有的最先进方法至少高出21%。
{"title":"Generating Location Traces With Semantic- Constrained Local Differential Privacy","authors":"Xinyue Sun;Qingqing Ye;Haibo Hu;Jiawei Duan;Qiao Xue;Tianyu Wo;Weizhe Zhang;Jie Xu","doi":"10.1109/TIFS.2024.3480712","DOIUrl":"10.1109/TIFS.2024.3480712","url":null,"abstract":"Valuable information and knowledge can be learned from users’ location traces and support various location-based applications such as intelligent traffic control, incident response, and COVID-19 contact tracing. However, due to privacy concerns, no authority could simply collect users’ private location traces for mining or even publishing. To echo such concerns, local differential privacy (LDP) enables individual privacy by allowing each user to report a perturbed version of their data. Unfortunately, when applied to location traces, LDP cannot preserve the semantics in the context of location traces because it treats all locations (i.e., various points of interest) as equally sensitive. This results in a low utility of LDP mechanisms for collecting location traces. In this paper, we address the challenge of collecting and sharing location traces with valuable semantics while providing sufficient privacy protection for participating users. We first propose semantic-constrained local differential privacy (SLDP), a new privacy model to provide a provable mathematical privacy guarantee while preserving desirable semantics. Then, we design a location trace perturbation mechanism (LTPM) that users can use to perturb their traces in a way that satisfies SLDP. Finally, we propose a private location trace synthesis (PLTS) framework in which users use LTPM to perturb their traces before sending them to the collector, who aggregates the users’ perturbed data to generate location traces with valuable semantics. Extensive experiments on three real-world datasets demonstrate that our PLTS outperforms existing state-of-the-art methods by at least 21% in a range of real-world applications, such as spatial visiting queries and frequent pattern mining, under the same privacy leakage.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"9850-9865"},"PeriodicalIF":6.3,"publicationDate":"2024-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142439883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
No-Box Universal Adversarial Perturbations Against Image Classifiers via Artificial Textures 通过人工纹理对图像分类器进行无箱通用对抗性干扰
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-11 DOI: 10.1109/TIFS.2024.3478828
Ningping Mou;Binqing Guo;Lingchen Zhao;Cong Wang;Yue Zhao;Qian Wang
Recent advancements in adversarial attack research have seen a transition from white-box to black-box and even no-box threat models, greatly enhancing the practicality of these attacks. However, existing no-box attacks focus on instance-specific perturbations, leaving more powerful universal adversarial perturbations (UAPs) unexplored. This study addresses a crucial question: can UAPs be generated under a no-box threat model? Our findings provide an affirmative answer with a texture-based method. Artificially crafted textures can act as UAPs, termed Texture-Adv. With a modest density and a fixed budget for perturbations, it can achieve an attack success rate of 80% under the constraint of $l_{infty }$ = 10/255. In addition, Texture-Adv can also take effect under traditional black-box threat models. Building upon a phenomenon associated with dominant labels, we utilize Texture-Adv to develop a highly efficient decision-based attack strategy, named Adv-Pool. This approach creates and traverses a set of Texture-Adv instances with diverse classification distributions, significantly reducing the average query budget to less than 1.3, which is near the 1-query lower bound for decision-based attacks. Moreover, we empirically demonstrate that Texture-Adv, when used as a starting point, can enhance the success rates of existing transfer attacks and the efficiency of decision-based attacks. The discovery suggests its potential as an effective starting point for various adversarial attacks while preserving the original constraints of their threat models.
最近,对抗性攻击研究取得了长足进步,威胁模型已从白盒过渡到黑盒甚至无盒,大大提高了这些攻击的实用性。然而,现有的无箱攻击主要针对特定实例的扰动,而更强大的通用对抗扰动(UAPs)尚未被探索。本研究解决了一个关键问题:在无盒威胁模型下能否生成 UAP?我们的研究结果通过一种基于纹理的方法给出了肯定的答案。人工制作的纹理可以充当 UAP,被称为纹理-Adv。 在适度的密度和固定的扰动预算下,它可以在 $l_{infty }$ = 10/255 的约束条件下实现 80% 的攻击成功率。此外,Texture-Adv 还能在传统的黑盒威胁模型下发挥作用。基于与优势标签相关的现象,我们利用 Texture-Adv 开发出一种高效的基于决策的攻击策略,命名为 Adv-Pool。这种方法创建并遍历一组具有不同分类分布的 Texture-Adv 实例,从而将平均查询预算大幅降低到 1.3 以下,接近基于决策的攻击的 1 查询下限。此外,我们还通过经验证明,以 Texture-Adv 为起点,可以提高现有转移攻击的成功率和基于决策攻击的效率。这一发现表明,Texture-Adv 有潜力成为各种对抗性攻击的有效起点,同时保留其威胁模型的原始约束。
{"title":"No-Box Universal Adversarial Perturbations Against Image Classifiers via Artificial Textures","authors":"Ningping Mou;Binqing Guo;Lingchen Zhao;Cong Wang;Yue Zhao;Qian Wang","doi":"10.1109/TIFS.2024.3478828","DOIUrl":"10.1109/TIFS.2024.3478828","url":null,"abstract":"Recent advancements in adversarial attack research have seen a transition from white-box to black-box and even no-box threat models, greatly enhancing the practicality of these attacks. However, existing no-box attacks focus on instance-specific perturbations, leaving more powerful universal adversarial perturbations (UAPs) unexplored. This study addresses a crucial question: can UAPs be generated under a no-box threat model? Our findings provide an affirmative answer with a texture-based method. Artificially crafted textures can act as UAPs, termed Texture-Adv. With a modest density and a fixed budget for perturbations, it can achieve an attack success rate of 80% under the constraint of \u0000<inline-formula> <tex-math>$l_{infty }$ </tex-math></inline-formula>\u0000 = 10/255. In addition, Texture-Adv can also take effect under traditional black-box threat models. Building upon a phenomenon associated with dominant labels, we utilize Texture-Adv to develop a highly efficient decision-based attack strategy, named Adv-Pool. This approach creates and traverses a set of Texture-Adv instances with diverse classification distributions, significantly reducing the average query budget to less than 1.3, which is near the 1-query lower bound for decision-based attacks. Moreover, we empirically demonstrate that Texture-Adv, when used as a starting point, can enhance the success rates of existing transfer attacks and the efficiency of decision-based attacks. The discovery suggests its potential as an effective starting point for various adversarial attacks while preserving the original constraints of their threat models.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"9803-9818"},"PeriodicalIF":6.3,"publicationDate":"2024-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142415531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mean Estimation of Numerical Data Under (ϵ,δ) -Utility-Optimized Local Differential Privacy 在(ϵ, δ)效用优化的局部差分隐私条件下的数值数据均值估计
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-11 DOI: 10.1109/TIFS.2024.3478823
Yue Zhang;Youwen Zhu;Shaowei Wang;Xiaohua Huang
Utility-optimized local differential privacy (ULDP) considers input domain including non-sensitive values which reduces utility loss by leaking some non-sensitive values, without lowering protection to any sensitive one compared with local differential privacy (LDP). The existing ULDP mechanisms are designed under $epsilon $ -ULDP which preserve sensitive values under $epsilon $ -LDP. Nevertheless, it is still challenging to achieve $(epsilon ,delta)$ -ULDP. In this paper, we consider mean aggregation in $(epsilon ,delta)$ -ULDP, where sensitive values are protected under $(epsilon ,delta)$ -LDP. Specifically, we first propose One-Bit perturbation Mechanism (OBM) for unbiased mean estimation under $(epsilon ,delta)$ -LDP and then obtain optimal OBM by minimizing its worst-case error. In OBM, each output is a 1-bit value, and it thus is highly communication-efficient. Second, based on OBM, we design an unbiased mean estimation mechanism in $(epsilon ,delta)$ -ULDP, Utility-optimized OBM (UOBM), where sensitive values are strictly protected under $(epsilon ,delta)$ -LDP while non-sensitive ones could be disclosed to achieve higher utility. Further, we extend UOBM to the personalized scene where each user has specific privacy budget and sensitive range. Additionally, we theoretically and experimentally compare the proposed mechanisms with existing ones. The results show OBM outperforms existing mechanisms in utility, though its output is just a 1-bit value. UOBM can dramatically decrease the estimation error, compared with OBM.
效用优化的局部差分隐私(ULDP)考虑了包括非敏感值在内的输入域,与局部差分隐私(LDP)相比,它减少了因泄漏一些非敏感值而造成的效用损失,同时又不会降低对任何敏感值的保护。现有的 ULDP 机制是在 $epsilon $ -ULDP 下设计的,而在 $epsilon $ -LDP 下保留了敏感值。然而,要实现 $(epsilon ,delta)$ -ULDP,仍然具有挑战性。本文考虑了 $(epsilon ,delta)$ -ULDP 中的均值聚合,其中敏感值在 $(epsilon ,delta)$ -LDP 下受到保护。具体来说,我们首先提出了在 $(epsilon ,delta)$ -LDP 条件下用于无偏均值估计的一比特扰动机制(OBM),然后通过最小化其最坏情况误差获得最优 OBM。在 OBM 中,每个输出都是 1 位值,因此具有很高的通信效率。其次,基于 OBM,我们在 $(epsilon ,delta)$ -ULDP 中设计了一种无偏均值估计机制--效用优化的 OBM(UOBM),其中敏感值在 $(epsilon ,delta)$ -LDP 下受到严格保护,而非敏感值则可以公开以获得更高的效用。此外,我们还将 UOBM 扩展到个性化场景,即每个用户都有特定的隐私预算和敏感范围。此外,我们还从理论上和实验上将所提出的机制与现有机制进行了比较。结果表明,尽管 OBM 的输出只是一个 1 位值,但其效用优于现有机制。与 OBM 相比,UOBM 可以显著降低估计误差。
{"title":"Mean Estimation of Numerical Data Under (ϵ,δ) -Utility-Optimized Local Differential Privacy","authors":"Yue Zhang;Youwen Zhu;Shaowei Wang;Xiaohua Huang","doi":"10.1109/TIFS.2024.3478823","DOIUrl":"10.1109/TIFS.2024.3478823","url":null,"abstract":"Utility-optimized local differential privacy (ULDP) considers input domain including non-sensitive values which reduces utility loss by leaking some non-sensitive values, without lowering protection to any sensitive one compared with local differential privacy (LDP). The existing ULDP mechanisms are designed under \u0000<inline-formula> <tex-math>$epsilon $ </tex-math></inline-formula>\u0000-ULDP which preserve sensitive values under \u0000<inline-formula> <tex-math>$epsilon $ </tex-math></inline-formula>\u0000-LDP. Nevertheless, it is still challenging to achieve \u0000<inline-formula> <tex-math>$(epsilon ,delta)$ </tex-math></inline-formula>\u0000-ULDP. In this paper, we consider mean aggregation in \u0000<inline-formula> <tex-math>$(epsilon ,delta)$ </tex-math></inline-formula>\u0000-ULDP, where sensitive values are protected under \u0000<inline-formula> <tex-math>$(epsilon ,delta)$ </tex-math></inline-formula>\u0000-LDP. Specifically, we first propose One-Bit perturbation Mechanism (OBM) for unbiased mean estimation under \u0000<inline-formula> <tex-math>$(epsilon ,delta)$ </tex-math></inline-formula>\u0000-LDP and then obtain optimal OBM by minimizing its worst-case error. In OBM, each output is a 1-bit value, and it thus is highly communication-efficient. Second, based on OBM, we design an unbiased mean estimation mechanism in \u0000<inline-formula> <tex-math>$(epsilon ,delta)$ </tex-math></inline-formula>\u0000-ULDP, Utility-optimized OBM (UOBM), where sensitive values are strictly protected under \u0000<inline-formula> <tex-math>$(epsilon ,delta)$ </tex-math></inline-formula>\u0000-LDP while non-sensitive ones could be disclosed to achieve higher utility. Further, we extend UOBM to the personalized scene where each user has specific privacy budget and sensitive range. Additionally, we theoretically and experimentally compare the proposed mechanisms with existing ones. The results show OBM outperforms existing mechanisms in utility, though its output is just a 1-bit value. UOBM can dramatically decrease the estimation error, compared with OBM.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"9656-9669"},"PeriodicalIF":6.3,"publicationDate":"2024-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142415533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Covert Communication: A Detection Attack and Efficient Improvement 基于区块链的隐蔽通信:检测攻击与高效改进
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-11 DOI: 10.1109/TIFS.2024.3478834
Zhuo Chen;Liehuang Zhu;Peng Jiang;Zijian Zhang;Chengxiang Si
Covert channels in blockchain networks achieve undetectable and reliable communication, while transactions incorporating secret data are perpetually stored on the chain, thereby leaving the secret data continuously susceptible to extraction. MTMM (IEEE Transactions on Computers 2023) is a state-of-the-art blockchain-based covert channel. It utilizes Bitcoin network traffic that will not be recorded on the chain to embed data, thus mitigating the above issues. However, we identify a distinctive pattern in MTMM, based on which we propose a comparison attack to accurately detect MTMM traffic. To defend against the attack, we present an improvement named ORIM, which exploits the permutation of transaction hashes within inventory messages to transmit secret data. ORIM leverages a pseudo-random function to obscure the transaction hashes involved in the permutation to ensure unobservability. The obfuscated values, rather than the original transaction hashes, are utilized to encode the confidential data. Furthermore, we introduce a variable-length encoding scheme predicated on complete binary trees. This scheme considerably amplifies the bandwidth and facilitates efficient encoding and decoding of secret data. Experimental results indicate that ORIM maintains unobservability and that ORIM’s bandwidth is approximately $3.7times $ of MTMM.
区块链网络中的隐蔽信道可实现不可检测和可靠的通信,而包含秘密数据的交易则永久存储在链上,从而使秘密数据持续易被提取。MTMM(《电气和电子工程师学会计算机学报》2023 年版)是最先进的基于区块链的隐蔽信道。它利用不会被记录在链上的比特币网络流量嵌入数据,从而缓解了上述问题。然而,我们在 MTMM 中发现了一种独特的模式,并据此提出了一种比较攻击,以准确检测 MTMM 流量。为了抵御这种攻击,我们提出了一种名为 ORIM 的改进方法,它利用库存信息中交易哈希值的排列来传输秘密数据。ORIM 利用伪随机函数来掩盖参与排列的交易哈希值,以确保不可观察性。利用混淆值而不是原始交易哈希值来编码机密数据。此外,我们还引入了一种基于完整二叉树的可变长度编码方案。该方案大大提高了带宽,并促进了机密数据的高效编码和解码。实验结果表明,ORIM 保持了不可观测性,ORIM 的带宽约为 MTMM 的 3.7 倍。
{"title":"Blockchain-Based Covert Communication: A Detection Attack and Efficient Improvement","authors":"Zhuo Chen;Liehuang Zhu;Peng Jiang;Zijian Zhang;Chengxiang Si","doi":"10.1109/TIFS.2024.3478834","DOIUrl":"10.1109/TIFS.2024.3478834","url":null,"abstract":"Covert channels in blockchain networks achieve undetectable and reliable communication, while transactions incorporating secret data are perpetually stored on the chain, thereby leaving the secret data continuously susceptible to extraction. MTMM (IEEE Transactions on Computers 2023) is a state-of-the-art blockchain-based covert channel. It utilizes Bitcoin network traffic that will not be recorded on the chain to embed data, thus mitigating the above issues. However, we identify a distinctive pattern in MTMM, based on which we propose a comparison attack to accurately detect MTMM traffic. To defend against the attack, we present an improvement named ORIM, which exploits the permutation of transaction hashes within inventory messages to transmit secret data. ORIM leverages a pseudo-random function to obscure the transaction hashes involved in the permutation to ensure unobservability. The obfuscated values, rather than the original transaction hashes, are utilized to encode the confidential data. Furthermore, we introduce a variable-length encoding scheme predicated on complete binary trees. This scheme considerably amplifies the bandwidth and facilitates efficient encoding and decoding of secret data. Experimental results indicate that ORIM maintains unobservability and that ORIM’s bandwidth is approximately \u0000<inline-formula> <tex-math>$3.7times $ </tex-math></inline-formula>\u0000 of MTMM.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"9698-9713"},"PeriodicalIF":6.3,"publicationDate":"2024-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142415530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating Propagation of Cyber-Attacks in Wide-Area Measurement Systems 缓解广域测量系统中的网络攻击传播
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-11 DOI: 10.1109/TIFS.2024.3477269
Hamed Sarjan;Mohammadmahdi Asghari;Amir Ameli;Mohsen Ghafouri
Wide Area Measurement Systems (WAMSs) are used in power networks to improve the situational awareness of the operator, as well as to facilitate real-time control and protection decisions. In WAMSs, Phasor Data Concentrators (PDCs) collect time-synchronized data of Phasor Measurement Units (PMUs) through the communication system, and direct it to the control center to be used in wide-area control and protection applications. Due to the dependence of WAMSs on information and communication technologies, cyber-attacks can target these systems and propagate through them, i.e., infect a greater number of components by accessing and controlling a few of them. On this basis, this paper initially develops a Learning-Based Framework (LBF) to estimate the required defense strategy to counter the propagation of cyber-attacks in WAMSs. Afterwards, through solving a linear Binary Integer Programming (BIP) problem, this paper develops a mitigation strategy to optimally reconfigure the communication network and reduce the contamination probability for critical PMUs and PDCs while maintaining the observability of the grid. The simulation results obtained from IEEE 14- and 30-bus test systems corroborate the effectiveness of the proposed LBF and communication network reconfiguration strategy in mitigating the propagation of cyber-attacks in WAMSs.
广域测量系统(WAMS)用于电力网络,以提高操作人员的态势感知能力,并促进实时控制和保护决策。在 WAMS 中,相量数据集中器(PDC)通过通信系统收集相量测量单元(PMU)的时间同步数据,并将其传送到控制中心,用于广域控制和保护应用。由于 WAMS 依赖于信息和通信技术,网络攻击可以针对这些系统并通过它们传播,即通过访问和控制其中的少数组件来感染更多的组件。在此基础上,本文首先开发了一个基于学习的框架(LBF),用于估算应对网络攻击在 WAMS 中传播所需的防御策略。然后,本文通过解决线性二进制整数编程(BIP)问题,制定了一种缓解策略,以优化通信网络的重新配置,降低关键 PMU 和 PDC 的污染概率,同时保持电网的可观测性。从 IEEE 14 总线和 30 总线测试系统获得的仿真结果证实了所提出的 LBF 和通信网络重新配置策略在缓解 WAMS 中网络攻击传播方面的有效性。
{"title":"Mitigating Propagation of Cyber-Attacks in Wide-Area Measurement Systems","authors":"Hamed Sarjan;Mohammadmahdi Asghari;Amir Ameli;Mohsen Ghafouri","doi":"10.1109/TIFS.2024.3477269","DOIUrl":"10.1109/TIFS.2024.3477269","url":null,"abstract":"Wide Area Measurement Systems (WAMSs) are used in power networks to improve the situational awareness of the operator, as well as to facilitate real-time control and protection decisions. In WAMSs, Phasor Data Concentrators (PDCs) collect time-synchronized data of Phasor Measurement Units (PMUs) through the communication system, and direct it to the control center to be used in wide-area control and protection applications. Due to the dependence of WAMSs on information and communication technologies, cyber-attacks can target these systems and propagate through them, i.e., infect a greater number of components by accessing and controlling a few of them. On this basis, this paper initially develops a Learning-Based Framework (LBF) to estimate the required defense strategy to counter the propagation of cyber-attacks in WAMSs. Afterwards, through solving a linear Binary Integer Programming (BIP) problem, this paper develops a mitigation strategy to optimally reconfigure the communication network and reduce the contamination probability for critical PMUs and PDCs while maintaining the observability of the grid. The simulation results obtained from IEEE 14- and 30-bus test systems corroborate the effectiveness of the proposed LBF and communication network reconfiguration strategy in mitigating the propagation of cyber-attacks in WAMSs.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"9984-9999"},"PeriodicalIF":6.3,"publicationDate":"2024-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142415532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CareFL: Contribution Guided Byzantine-Robust Federated Learning CareFL:贡献指导拜占庭式稳健联合学习
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-10 DOI: 10.1109/TIFS.2024.3477912
Qihao Dong;Shengyuan Yang;Zhiyang Dai;Yansong Gao;Shang Wang;Yuan Cao;Anmin Fu;Willy Susilo
Byzantine-robust federated learning (FL) endeavors to empower service providers in acquiring a precise global model, even in the presence of potentially malicious FL clients. While considerable strides have been taken in the development of robust aggregation algorithms for FL in recent years, their efficacy is confined to addressing particular forms of Byzantine attacks, and they exhibit vulnerabilities when confronted with a spectrum of attack vectors. Notably, a prevailing issue lies in the heavy reliance of these algorithms on the examination of local model gradients. It is worth noting that an attacker possesses the ability to manipulate a carefully chosen small gradient of a model within a context where there could be millions of gradients available, thereby facilitating adaptive attacks. Drawing inspiration from the foundational Shapley value methodology in game theory, we introduce an effective FL scheme named CareFL. This scheme is designed to provide robustness against a spectrum of state-of-the-art Byzantine attacks. Unlike approaches that rely on the examination of gradients, CareFL employs a universal metric, the loss of the local model—independent of specific gradients, to identify potentially malicious clients. Specifically, in each aggregation round, the FL server trains a reference model using a small auxiliary dataset— the auxiliary dataset can be removed with a slight defense degradation trade-off. It employs the Shapley value to assess the contribution of each client-submitted model in minimizing the global model loss. Subsequently, the server selects client models closer to the reference model in terms of Shapley values for the global model update. To reduce the computational overhead of CareFL when the number of clients is relatively scaled-up, we construct its variant, namely CareFL+ generally by grouping clients. Extensive experimentation conducted on well-established MNIST and CIFAR-10 datasets, encompassing diverse model architectures, including AlexNet, demonstrates that CareFL consistently achieves accuracy levels comparable to those attained under attack-free conditions when faced with five formidable attacks. CareFL and CareFL+ outperform six existing state-of-the-art Byzantine-robust FL aggregation methods, including FLTrust, across both IID and non-IID data distribution settings.
稳健的拜占庭联合学习(FL)致力于帮助服务提供商获得精确的全局模型,即使在可能存在恶意FL客户端的情况下也是如此。虽然近年来在为联合学习开发稳健的聚合算法方面取得了长足进步,但这些算法的功效仅限于应对特定形式的拜占庭攻击,而且在面对各种攻击载体时表现出脆弱性。值得注意的是,一个普遍存在的问题是,这些算法严重依赖于对局部模型梯度的检验。值得注意的是,在可能存在数百万梯度的情况下,攻击者有能力操纵模型中精心选择的一个小梯度,从而促进自适应攻击。从博弈论中的基础 Shapley 值方法中汲取灵感,我们引入了一种名为 CareFL 的有效 FL 方案。该方案旨在提供对一系列最先进的拜占庭攻击的鲁棒性。与依赖梯度检查的方法不同,CareFL 采用了一种通用指标,即与特定梯度无关的本地模型损失,来识别潜在的恶意客户端。具体来说,在每一轮聚合过程中,FL 服务器都会使用一个小型辅助数据集训练一个参考模型--可以在略微降低防御能力的前提下移除辅助数据集。它利用沙普利值来评估每个客户端提交的模型对最小化全局模型损失的贡献。随后,服务器会选择在 Shapley 值方面更接近参考模型的客户端模型进行全局模型更新。为了在客户端数量相对增加时减少 CareFL 的计算开销,我们一般通过对客户端进行分组来构建其变体,即 CareFL+。在成熟的 MNIST 和 CIFAR-10 数据集(包括 AlexNet 在内的各种模型架构)上进行的大量实验表明,面对五种可怕的攻击,CareFL 始终能达到与无攻击条件下相当的准确率水平。CareFL 和 CareFL+ 在 IID 和非 IID 数据分布环境下的表现均优于包括 FLTrust 在内的六种现有最先进的拜占庭稳健 FL 聚合方法。
{"title":"CareFL: Contribution Guided Byzantine-Robust Federated Learning","authors":"Qihao Dong;Shengyuan Yang;Zhiyang Dai;Yansong Gao;Shang Wang;Yuan Cao;Anmin Fu;Willy Susilo","doi":"10.1109/TIFS.2024.3477912","DOIUrl":"10.1109/TIFS.2024.3477912","url":null,"abstract":"Byzantine-robust federated learning (FL) endeavors to empower service providers in acquiring a precise global model, even in the presence of potentially malicious FL clients. While considerable strides have been taken in the development of robust aggregation algorithms for FL in recent years, their efficacy is confined to addressing particular forms of Byzantine attacks, and they exhibit vulnerabilities when confronted with a spectrum of attack vectors. Notably, a prevailing issue lies in the heavy reliance of these algorithms on the examination of local model gradients. It is worth noting that an attacker possesses the ability to manipulate a carefully chosen small gradient of a model within a context where there could be millions of gradients available, thereby facilitating adaptive attacks. Drawing inspiration from the foundational Shapley value methodology in game theory, we introduce an effective FL scheme named \u0000<monospace>CareFL</monospace>\u0000. This scheme is designed to provide robustness against a spectrum of state-of-the-art Byzantine attacks. Unlike approaches that rely on the examination of gradients, \u0000<monospace>CareFL</monospace>\u0000 employs a universal metric, the loss of the local model—independent of specific gradients, to identify potentially malicious clients. Specifically, in each aggregation round, the FL server trains a reference model using a small auxiliary dataset— the auxiliary dataset can be removed with a slight defense degradation trade-off. It employs the Shapley value to assess the contribution of each client-submitted model in minimizing the global model loss. Subsequently, the server selects client models closer to the reference model in terms of Shapley values for the global model update. To reduce the computational overhead of \u0000<monospace>CareFL</monospace>\u0000 when the number of clients is relatively scaled-up, we construct its variant, namely \u0000<monospace>CareFL</monospace>\u0000+ generally by grouping clients. Extensive experimentation conducted on well-established MNIST and CIFAR-10 datasets, encompassing diverse model architectures, including AlexNet, demonstrates that \u0000<monospace>CareFL</monospace>\u0000 consistently achieves accuracy levels comparable to those attained under attack-free conditions when faced with five formidable attacks. \u0000<monospace>CareFL</monospace>\u0000 and CareFL+ outperform six existing state-of-the-art Byzantine-robust FL aggregation methods, including \u0000<monospace>FLTrust</monospace>\u0000, across both IID and non-IID data distribution settings.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"9714-9729"},"PeriodicalIF":6.3,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142405126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OpenVFL: A Vertical Federated Learning Framework With Stronger Privacy-Preserving OpenVFL:具有更强隐私保护能力的垂直联合学习框架
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-10 DOI: 10.1109/TIFS.2024.3477924
Yunbo Yang;Xiang Chen;Yuhao Pan;Jiachen Shen;Zhenfu Cao;Xiaolei Dong;Xiaoguo Li;Jianfei Sun;Guomin Yang;Robert Deng
Federated learning (FL) allows multiple parties, each holding a dataset, to jointly train a model without leaking any information about their own datasets. In this paper, we focus on vertical FL (VFL). In VFL, each party holds a dataset with the same sample space and different feature spaces. All parties should first agree on the training dataset in the ID alignment phase. However, existing works may leak some information about the training dataset and cause privacy leakage. To address this issue, this paper proposes OpenVFL, a vertical federated learning framework with stronger privacy-preserving. We first propose NCLPSI, a new variant of labeled PSI, in which both parties can invoke this protocol to get the encrypted training dataset without leaking any additional information. After that, both parties train the model over the encrypted training dataset. We also formally analyze the security of OpenVFL. In addition, the experimental results show that OpenVFL achieves the best trade-offs between accuracy, performance, and privacy among the most state-of-the-art works.
联合学习(FL)允许各自拥有数据集的多方联合训练一个模型,而不会泄露各自数据集的任何信息。本文重点讨论垂直联合学习(VFL)。在 VFL 中,每一方都持有具有相同样本空间和不同特征空间的数据集。在 ID 对齐阶段,各方应首先就训练数据集达成一致。然而,现有的工作可能会泄露训练数据集的一些信息,造成隐私泄露。为解决这一问题,本文提出了具有更强隐私保护能力的垂直联合学习框架 OpenVFL。我们首先提出了标签式 PSI 的新变体 NCLPSI,在该协议中,双方都可以调用该协议来获取加密的训练数据集,而不会泄露任何其他信息。之后,双方在加密的训练数据集上训练模型。我们还正式分析了 OpenVFL 的安全性。此外,实验结果表明,OpenVFL 在准确性、性能和隐私之间实现了最佳权衡。
{"title":"OpenVFL: A Vertical Federated Learning Framework With Stronger Privacy-Preserving","authors":"Yunbo Yang;Xiang Chen;Yuhao Pan;Jiachen Shen;Zhenfu Cao;Xiaolei Dong;Xiaoguo Li;Jianfei Sun;Guomin Yang;Robert Deng","doi":"10.1109/TIFS.2024.3477924","DOIUrl":"10.1109/TIFS.2024.3477924","url":null,"abstract":"Federated learning (FL) allows multiple parties, each holding a dataset, to jointly train a model without leaking any information about their own datasets. In this paper, we focus on vertical FL (VFL). In VFL, each party holds a dataset with the same sample space and different feature spaces. All parties should first agree on the training dataset in the ID alignment phase. However, existing works may leak some information about the training dataset and cause privacy leakage. To address this issue, this paper proposes OpenVFL, a vertical federated learning framework with stronger privacy-preserving. We first propose NCLPSI, a new variant of labeled PSI, in which both parties can invoke this protocol to get the encrypted training dataset without leaking any additional information. After that, both parties train the model over the encrypted training dataset. We also formally analyze the security of OpenVFL. In addition, the experimental results show that OpenVFL achieves the best trade-offs between accuracy, performance, and privacy among the most state-of-the-art works.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"9670-9681"},"PeriodicalIF":6.3,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142405127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Boosting Accuracy of Differentially Private Continuous Data Release for Federated Learning 为联合学习提高差异化私有连续数据发布的准确性
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-09 DOI: 10.1109/TIFS.2024.3477325
Jianping Cai;Qingqing Ye;Haibo Hu;Ximeng Liu;Yanggeng Fu
Incorporating differentially private continuous data release (DPCR) into private federated learning (FL) has recently emerged as a powerful technique for enhancing accuracy. Designing an effective DPCR model is the key to improving accuracy. Still, the state-of-the-art DPCR models hinder the potential for accuracy improvement due to insufficient privacy budget allocation and the design only for specific iteration numbers. To boost accuracy further, we develop an augmented BIT-based continuous data release (AuBCR) model, leading to demonstrable accuracy enhancements. By employing a dual-release strategy, AuBCR gains the potential to further improve accuracy, while confronting the challenge of consistent release and doubly-nested complex privacy budget allocation problem. Against this, we design an efficient optimal consistent estimation algorithm with only $O(1)$ complexity per release. Subsequently, we introduce the $(k, N)$ -AuBCR Model concept and design a meta-factor method. This innovation significantly reduces the optimization variables from $O(T)$ to $Oleft ({{lg^{2} T}}right)$ , thereby greatly enhancing the solvability of optimal privacy budget allocation and simultaneously supporting arbitrary iteration number T. Our experiments on classical datasets show that AuBCR boosts accuracy by 4.9% ~ 18.1% compared to traditional private FL and 0.4% ~ 1.2% compared to the state-of-the-art ABCRG model.
将差异化私有连续数据发布(DPCR)纳入私有联合学习(FL)是最近出现的一种提高准确性的强大技术。设计有效的 DPCR 模型是提高准确率的关键。然而,最先进的 DPCR 模型由于隐私预算分配不足以及仅针对特定迭代次数进行设计,阻碍了提高准确率的潜力。为了进一步提高准确性,我们开发了基于 BIT 的增强型连续数据释放(AuBCR)模型,从而显著提高了准确性。通过采用双重发布策略,AuBCR 有可能进一步提高准确性,同时还能应对一致发布和双重嵌套复杂隐私预算分配问题的挑战。为此,我们设计了一种高效的最优一致估计算法,每次释放的复杂度仅为 $O(1)$。随后,我们引入了 $(k, N)$ -AuBCR 模型概念,并设计了一种元因子方法。这一创新将优化变量从$O(T)$大幅减少到$O({{lg^{2} T}}right)$,从而大大提高了最优隐私预算分配的可解性,并同时支持任意迭代次数T。我们在经典数据集上的实验表明,与传统的私有FL相比,AuBCR的准确率提高了4.9% ~ 18.1%,与最先进的ABCRG模型相比,提高了0.4% ~ 1.2%。
{"title":"Boosting Accuracy of Differentially Private Continuous Data Release for Federated Learning","authors":"Jianping Cai;Qingqing Ye;Haibo Hu;Ximeng Liu;Yanggeng Fu","doi":"10.1109/TIFS.2024.3477325","DOIUrl":"10.1109/TIFS.2024.3477325","url":null,"abstract":"Incorporating differentially private continuous data release (DPCR) into private federated learning (FL) has recently emerged as a powerful technique for enhancing accuracy. Designing an effective DPCR model is the key to improving accuracy. Still, the state-of-the-art DPCR models hinder the potential for accuracy improvement due to insufficient privacy budget allocation and the design only for specific iteration numbers. To boost accuracy further, we develop an augmented BIT-based continuous data release (AuBCR) model, leading to demonstrable accuracy enhancements. By employing a dual-release strategy, AuBCR gains the potential to further improve accuracy, while confronting the challenge of consistent release and doubly-nested complex privacy budget allocation problem. Against this, we design an efficient optimal consistent estimation algorithm with only \u0000<inline-formula> <tex-math>$O(1)$ </tex-math></inline-formula>\u0000 complexity per release. Subsequently, we introduce the \u0000<inline-formula> <tex-math>$(k, N)$ </tex-math></inline-formula>\u0000-AuBCR Model concept and design a meta-factor method. This innovation significantly reduces the optimization variables from \u0000<inline-formula> <tex-math>$O(T)$ </tex-math></inline-formula>\u0000 to \u0000<inline-formula> <tex-math>$Oleft ({{lg^{2} T}}right)$ </tex-math></inline-formula>\u0000, thereby greatly enhancing the solvability of optimal privacy budget allocation and simultaneously supporting arbitrary iteration number T. Our experiments on classical datasets show that AuBCR boosts accuracy by 4.9% ~ 18.1% compared to traditional private FL and 0.4% ~ 1.2% compared to the state-of-the-art ABCRG model.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"10287-10301"},"PeriodicalIF":6.3,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142397879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secret Cracking and Security Enhancement for the Image Application of CRT-Based Secret Sharing 基于 CRT 的秘密共享的图像应用的秘密破解与安全增强
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-09 DOI: 10.1109/TIFS.2024.3477265
Rui Wang;Longlong Li;Guozheng Yang;Xuehu Yan;Wei Yan
The Asmuth and Bloom threshold secret sharing (AB-SS) is a classical introduction of the Chinese remainder theorem (CRT) to secret sharing, offering low computational complexity compared to other branches of secret sharing. For decades, numerous schemes have been proposed for practical applications of AB-SS, such as secret image sharing (SIS). However, in terms of security, AB-SS has proved to be neither ideal nor perfect, and its derivatives in image sharing exhibit vulnerabilities associated with secret leakage. This paper studies the security issues in the SIS schemes derived from AB-SS and improves the core sharing principle of AB-SS to enhance security in image protection. First, for $(2,n)$ -CRTSIS schemes, we exploit the vulnerability in a single share image to crack the confidential information of the original image, including secret pixel values and the ratio of different pixels. Then, by employing the XOR operation, we introduce a chain obfuscation technology and propose a secure image sharing scheme based on the Chinese remainder theorem (COxor-CRTSIS). The COxor-CRTSIS scheme utilizes integer linear programming for achieving lossless recovery without segmentation and eliminates potential secret disclosure risks without additional encryption. Furthermore, to comprehensively evaluate the security of existing schemes, this paper presents three metrics, information loss rate, fluctuation degree, and coverage rate, enabling a quantitative comparison of security for the first time. Theoretical analyses and experiments are conducted to validate the effectiveness of our scheme.
阿斯穆斯和布鲁姆阈值秘密共享(AB-SS)是将中国余数定理(CRT)引入秘密共享的经典之作,与其他秘密共享分支相比具有较低的计算复杂度。几十年来,AB-SS 的实际应用方案层出不穷,如秘密图像共享(SIS)。然而,在安全性方面,AB-SS 被证明既不理想也不完美,其在图像共享中的衍生方案表现出与秘密泄漏相关的脆弱性。本文研究了由 AB-SS 衍生出的 SIS 方案中的安全问题,并改进了 AB-SS 的核心共享原理,以提高图像保护的安全性。首先,针对$(2,n)$ -CRTSIS方案,我们利用单个共享图像中的漏洞破解了原始图像的机密信息,包括秘密像素值和不同像素的比例。然后,通过使用 XOR 运算,我们引入了链式混淆技术,并提出了一种基于中国余数定理的安全图像共享方案(COxor-CRTSIS)。COxor-CRTSIS 方案利用整数线性规划实现无损恢复,无需分割,无需额外加密即可消除潜在的泄密风险。此外,为了全面评估现有方案的安全性,本文提出了信息丢失率、波动程度和覆盖率三个指标,首次实现了安全性的定量比较。理论分析和实验验证了我们方案的有效性。
{"title":"Secret Cracking and Security Enhancement for the Image Application of CRT-Based Secret Sharing","authors":"Rui Wang;Longlong Li;Guozheng Yang;Xuehu Yan;Wei Yan","doi":"10.1109/TIFS.2024.3477265","DOIUrl":"10.1109/TIFS.2024.3477265","url":null,"abstract":"The Asmuth and Bloom threshold secret sharing (AB-SS) is a classical introduction of the Chinese remainder theorem (CRT) to secret sharing, offering low computational complexity compared to other branches of secret sharing. For decades, numerous schemes have been proposed for practical applications of AB-SS, such as secret image sharing (SIS). However, in terms of security, AB-SS has proved to be neither ideal nor perfect, and its derivatives in image sharing exhibit vulnerabilities associated with secret leakage. This paper studies the security issues in the SIS schemes derived from AB-SS and improves the core sharing principle of AB-SS to enhance security in image protection. First, for \u0000<inline-formula> <tex-math>$(2,n)$ </tex-math></inline-formula>\u0000-CRTSIS schemes, we exploit the vulnerability in a single share image to crack the confidential information of the original image, including secret pixel values and the ratio of different pixels. Then, by employing the XOR operation, we introduce a chain obfuscation technology and propose a secure image sharing scheme based on the Chinese remainder theorem (COxor-CRTSIS). The COxor-CRTSIS scheme utilizes integer linear programming for achieving lossless recovery without segmentation and eliminates potential secret disclosure risks without additional encryption. Furthermore, to comprehensively evaluate the security of existing schemes, this paper presents three metrics, information loss rate, fluctuation degree, and coverage rate, enabling a quantitative comparison of security for the first time. Theoretical analyses and experiments are conducted to validate the effectiveness of our scheme.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"9819-9834"},"PeriodicalIF":6.3,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142397642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lattice-Based Conditional Privacy-Preserving Batch Authentication Protocol for Fog-Assisted Vehicular Ad Hoc Networks 基于网格的雾辅助车载 Ad Hoc 网络条件式隐私保护批量验证协议
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-09 DOI: 10.1109/TIFS.2024.3477305
Long Li;Chingfang Hsu;Man Ho Au;Jianqun Cui;Lein Harn;Zhuo Zhao
The vehicular ad hoc network (VANET) is a basic component of intelligent transportation systems. Due to the growing security and privacy-preserving requirements of the VANET, a lot of conditional privacy-preserving authentication (CPPA) protocols have been proposed in recent years. Unfortunately, the traditional CPPA protocols, which are based on a trusted authority (TA) and rely solely on classical mathematical problems, cannot resist quantum attacks. Moreover, these protocols do not take into account the increasingly complex traffic flow in the VANET and cannot utilize fog nodes (FNs) to assist in the TA’s authentication work. In this paper, we design a lattice-based and fog-assisted conditional privacy-preserving authentication (LFCPPA) protocol to solve the above challenges. Compared to existing solutions, we have made the following improvements. First, our protocol is resistant to quantum attacks. Second, the solution supports batch processing of signature verification and mutual authentication of identity between the TA / FNs and vehicles. Third, in our design, FNs reduce the computing pressure of the TA to improve the efficiency of the system. In addition, we demonstrate the security of the protocol under the random oracle model with provable security. Finally, the efficiency and security of this scheme are better than similar solutions. Specifically, compared with the latest scheme, in terms of computational cost, our scheme is reduced by 74.47%, 85.58%, 19.69%, and 85.90% in the four stages of the protocol. Meanwhile, in terms of communication cost, our protocol reduces it by 89.98%.
车载临时网络(VANET)是智能交通系统的基本组成部分。由于 VANET 对安全性和隐私保护的要求越来越高,近年来提出了很多条件隐私保护认证(CPPA)协议。遗憾的是,传统的 CPPA 协议以可信机构(TA)为基础,完全依赖于经典数学问题,无法抵御量子攻击。此外,这些协议没有考虑到 VANET 中日益复杂的交通流,也无法利用雾节点(FN)来协助 TA 进行身份验证工作。在本文中,我们设计了一种基于网格和雾节点辅助的有条件隐私保护认证(LFCPPA)协议来解决上述难题。与现有解决方案相比,我们做了以下改进。首先,我们的协议可以抵御量子攻击。其次,该方案支持批量处理 TA / FN 与车辆之间的签名验证和身份相互认证。第三,在我们的设计中,FN 可减轻 TA 的计算压力,从而提高系统效率。此外,我们还证明了该协议在随机甲骨文模型下的安全性。最后,该方案的效率和安全性都优于同类方案。具体来说,与最新方案相比,在计算成本方面,我们的方案在协议的四个阶段分别降低了 74.47%、85.58%、19.69% 和 85.90%。同时,在通信成本方面,我们的协议降低了 89.98%。
{"title":"Lattice-Based Conditional Privacy-Preserving Batch Authentication Protocol for Fog-Assisted Vehicular Ad Hoc Networks","authors":"Long Li;Chingfang Hsu;Man Ho Au;Jianqun Cui;Lein Harn;Zhuo Zhao","doi":"10.1109/TIFS.2024.3477305","DOIUrl":"10.1109/TIFS.2024.3477305","url":null,"abstract":"The vehicular ad hoc network (VANET) is a basic component of intelligent transportation systems. Due to the growing security and privacy-preserving requirements of the VANET, a lot of conditional privacy-preserving authentication (CPPA) protocols have been proposed in recent years. Unfortunately, the traditional CPPA protocols, which are based on a trusted authority (TA) and rely solely on classical mathematical problems, cannot resist quantum attacks. Moreover, these protocols do not take into account the increasingly complex traffic flow in the VANET and cannot utilize fog nodes (FNs) to assist in the TA’s authentication work. In this paper, we design a lattice-based and fog-assisted conditional privacy-preserving authentication (LFCPPA) protocol to solve the above challenges. Compared to existing solutions, we have made the following improvements. First, our protocol is resistant to quantum attacks. Second, the solution supports batch processing of signature verification and mutual authentication of identity between the TA / FNs and vehicles. Third, in our design, FNs reduce the computing pressure of the TA to improve the efficiency of the system. In addition, we demonstrate the security of the protocol under the random oracle model with provable security. Finally, the efficiency and security of this scheme are better than similar solutions. Specifically, compared with the latest scheme, in terms of computational cost, our scheme is reduced by 74.47%, 85.58%, 19.69%, and 85.90% in the four stages of the protocol. Meanwhile, in terms of communication cost, our protocol reduces it by 89.98%.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"9629-9642"},"PeriodicalIF":6.3,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142397881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Forensics and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1