首页 > 最新文献

2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)最新文献

英文 中文
Internet-Wide Scanners Classification using Gaussian Mixture and Hidden Markov Models 使用高斯混合和隐马尔可夫模型的互联网扫描器分类
Giulia De Santis, Abdelkader Lahmadi, J. François, O. Festor
Internet-wide scanners are heavily used for malicious activities. This work models, from the scanned system point of view, spatial and temporal movements of Network Scanning Activities (NSAs), related to the difference of successive scanned IP addresses and timestamps, respectively. Based on real logs of incoming IP packets collected from a darknet, Hidden Markov Models (HMMs) are used to assess what scanning tool is operating. The proposed methodology, using only one of the aforementioned features of the scanning tool, is able to fingerprint what network scanner originated the perceived darknet traffic.
互联网扫描器被大量用于恶意活动。本文从被扫描系统的角度,分别模拟了网络扫描活动(NSAs)的空间和时间运动与连续扫描IP地址和时间戳的差异有关。基于从暗网收集的传入IP数据包的真实日志,使用隐马尔可夫模型(hmm)来评估哪些扫描工具正在运行。所提出的方法,仅使用上述扫描工具的一个特征,能够指纹网络扫描仪产生感知的暗网流量。
{"title":"Internet-Wide Scanners Classification using Gaussian Mixture and Hidden Markov Models","authors":"Giulia De Santis, Abdelkader Lahmadi, J. François, O. Festor","doi":"10.1109/NTMS.2018.8328698","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328698","url":null,"abstract":"Internet-wide scanners are heavily used for malicious activities. This work models, from the scanned system point of view, spatial and temporal movements of Network Scanning Activities (NSAs), related to the difference of successive scanned IP addresses and timestamps, respectively. Based on real logs of incoming IP packets collected from a darknet, Hidden Markov Models (HMMs) are used to assess what scanning tool is operating. The proposed methodology, using only one of the aforementioned features of the scanning tool, is able to fingerprint what network scanner originated the perceived darknet traffic.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114418555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fast Evaluation of Homomorphic Encryption Schemes Based on Ring-LWE 基于Ring-LWE的同态加密方案快速评估
Cyrielle Feron, Vianney Lapôtre, Loïc Lagadec
When evaluating Homomorphic Encryption (HE) schemes, only one set of input parameters is usually considered. Evaluation reports HE scheme time execution and memory consumption since these are the main challenges of HE. The original version of PAnTHErS enables to evaluate HE schemes without executing the scheme, hence with a very low processing time (< 10 sec). Results are provided in terms of computational complexity and memory cost. This allows to evaluate a scheme for numerous sets of input parameters. In this paper, PAnTHErS is improved by a calibration phase, and four HE schemes based on Ring-LWE are analyzed and compared using the proposed tool. Experimentation results show the approach allows analyses of HE scheme with an average of 6% error for a given implementation with a speedup up to 15× compared to actual scheme executions.
在评估同态加密(HE)方案时,通常只考虑一组输入参数。评估报告HE方案的时间执行和内存消耗,因为这些是HE的主要挑战。PAnTHErS的原始版本能够在不执行方案的情况下评估HE方案,因此处理时间非常短(< 10秒)。给出了计算复杂度和内存开销方面的结果。这允许对多个输入参数集的方案进行评估。本文通过一个校正阶段对PAnTHErS进行了改进,并使用该工具对基于Ring-LWE的四种HE方案进行了分析和比较。实验结果表明,该方法允许在给定的实现中以平均6%的误差分析HE方案,并且与实际方案执行相比加速高达15倍。
{"title":"Fast Evaluation of Homomorphic Encryption Schemes Based on Ring-LWE","authors":"Cyrielle Feron, Vianney Lapôtre, Loïc Lagadec","doi":"10.1109/NTMS.2018.8328693","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328693","url":null,"abstract":"When evaluating Homomorphic Encryption (HE) schemes, only one set of input parameters is usually considered. Evaluation reports HE scheme time execution and memory consumption since these are the main challenges of HE. The original version of PAnTHErS enables to evaluate HE schemes without executing the scheme, hence with a very low processing time (< 10 sec). Results are provided in terms of computational complexity and memory cost. This allows to evaluate a scheme for numerous sets of input parameters. In this paper, PAnTHErS is improved by a calibration phase, and four HE schemes based on Ring-LWE are analyzed and compared using the proposed tool. Experimentation results show the approach allows analyses of HE scheme with an average of 6% error for a given implementation with a speedup up to 15× compared to actual scheme executions.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124002790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MANER: Managed Data Dissemination Scheme for LoRa IoT Enabled Wildlife Monitoring System (WMS) MANER: LoRa物联网野生动物监测系统(WMS)的管理数据传播方案
E. D. Ayele, N. Meratnia, P. Havinga
In this paper, we introduce dual radio based IoT network architecture for wildlife monitoring system (WMS). This solution will facilitate an IoT devices to be deployed for sustainable wildlife monitoring applications. In addition we present MANER, a managed data dissemination scheme for WMS. In MANER, data forwarding is optimized with a replication function to control and prioritize data dissemination. In WMS scenario wild animals show a sparsely con- specific mobility, which often results in a sporadic wireless link among nodes. Unlike existing opportunistic algorithms, MANER optimally makes forwarding decisions by leveraging locally available information. Hence, the proposed algorithm adopts to dynamic network topology due to the inherent intermittent connectivity among mobile herd of animals. We evaluated the performance of MANER by considering standard and real-life mobility models. Experimental results indicated that MANER decreases the average latency by up-to 65%, when compared to benchmark opportunistic algorithms. In addition MANER readily increased the network delivery ratio for various data traffic rates.
本文介绍了基于双无线电的野生动物监测系统(WMS)物联网网络架构。该解决方案将有助于部署物联网设备,用于可持续的野生动物监测应用。此外,我们提出了MANER,一种用于WMS的管理数据传播方案。在MANER中,数据转发通过复制功能进行优化,以控制和优先考虑数据的传播。在WMS场景中,野生动物表现出稀疏的非特异性移动性,这通常导致节点之间的零星无线链路。与现有的机会主义算法不同,MANER通过利用本地可用信息来最佳地做出转发决策。因此,由于移动兽群之间固有的间歇性连接,该算法采用了动态网络拓扑。我们通过考虑标准和现实生活中的移动模型来评估MANER的性能。实验结果表明,与基准机会算法相比,MANER将平均延迟降低了65%。此外,MANER很容易提高各种数据流量速率下的网络传输比。
{"title":"MANER: Managed Data Dissemination Scheme for LoRa IoT Enabled Wildlife Monitoring System (WMS)","authors":"E. D. Ayele, N. Meratnia, P. Havinga","doi":"10.1109/NTMS.2018.8328701","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328701","url":null,"abstract":"In this paper, we introduce dual radio based IoT network architecture for wildlife monitoring system (WMS). This solution will facilitate an IoT devices to be deployed for sustainable wildlife monitoring applications. In addition we present MANER, a managed data dissemination scheme for WMS. In MANER, data forwarding is optimized with a replication function to control and prioritize data dissemination. In WMS scenario wild animals show a sparsely con- specific mobility, which often results in a sporadic wireless link among nodes. Unlike existing opportunistic algorithms, MANER optimally makes forwarding decisions by leveraging locally available information. Hence, the proposed algorithm adopts to dynamic network topology due to the inherent intermittent connectivity among mobile herd of animals. We evaluated the performance of MANER by considering standard and real-life mobility models. Experimental results indicated that MANER decreases the average latency by up-to 65%, when compared to benchmark opportunistic algorithms. In addition MANER readily increased the network delivery ratio for various data traffic rates.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"43 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132639811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Direct Vehicle-to-Vehicle Charging Strategy in Vehicular Ad-Hoc Networks 车载Ad-Hoc网络中直接车对车充电策略
Guangyu Li, L. Boukhatem, Lin Zhao, Jinsong Wu
In order to alleviate power overloads of electric grid systems and decrease cost of corresponding infrastructure deployments, a direct vehicle-to-vehicle (V2V) energy-exchange strategy for moving electric vehicles (EVs) has become an emerging research. The main challenges involving the direct V2V charging scheme are 1) to design an effective and economical communication framework for real-time charging information transmissions, and 2) to minimize charging cost and improve charging efficiency. In this paper, we propose an efficient V2V charging strategy for mobile EVs to cope with the above problems. In particular, we first design a VANETs-based (Vehicular Ad-Hoc Networks) communication framework to enable data transmissions between the parking service center(PSC) and mobile EVs in a real-time manner. Then, we propose a globally optimal V2V charging scheme on the basis of the deduced models of travel energy cost and charging pleasure degree. The experiment results implemented in realistic simulation scenarios are presented to indicate that our proposed V2V charging strategy outperforms the benchmark algorithm.
为了缓解电网系统的电力过载和降低相应基础设施的部署成本,移动电动汽车的直接车对车(V2V)能量交换策略已成为一个新兴的研究方向。V2V直接充电方案面临的主要挑战是:1)设计一个有效、经济的通信框架,实现充电信息的实时传输;2)降低充电成本,提高充电效率。针对上述问题,本文提出了一种高效的移动电动汽车V2V充电策略。特别是,我们首先设计了一个基于vanets(车辆自组织网络)的通信框架,以实现停车服务中心(PSC)和移动电动汽车之间的实时数据传输。然后,在推导出的出行能量成本和充电愉悦度模型的基础上,提出了一种全局最优的V2V充电方案。在真实仿真场景下的实验结果表明,我们提出的V2V充电策略优于基准算法。
{"title":"Direct Vehicle-to-Vehicle Charging Strategy in Vehicular Ad-Hoc Networks","authors":"Guangyu Li, L. Boukhatem, Lin Zhao, Jinsong Wu","doi":"10.1109/NTMS.2018.8328689","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328689","url":null,"abstract":"In order to alleviate power overloads of electric grid systems and decrease cost of corresponding infrastructure deployments, a direct vehicle-to-vehicle (V2V) energy-exchange strategy for moving electric vehicles (EVs) has become an emerging research. The main challenges involving the direct V2V charging scheme are 1) to design an effective and economical communication framework for real-time charging information transmissions, and 2) to minimize charging cost and improve charging efficiency. In this paper, we propose an efficient V2V charging strategy for mobile EVs to cope with the above problems. In particular, we first design a VANETs-based (Vehicular Ad-Hoc Networks) communication framework to enable data transmissions between the parking service center(PSC) and mobile EVs in a real-time manner. Then, we propose a globally optimal V2V charging scheme on the basis of the deduced models of travel energy cost and charging pleasure degree. The experiment results implemented in realistic simulation scenarios are presented to indicate that our proposed V2V charging strategy outperforms the benchmark algorithm.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125358341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Extending the Forward Error Correction Paradigm for Multi-Hop Wireless Sensor Networks 扩展多跳无线传感器网络的前向纠错范式
A. Brokalakis, I. Chondroulis, I. Papaefstathiou
In typical Wireless Sensor Network (WSN) applications, the sensor nodes deployed are constrained both in computational and energy resources. For this reason, simple communication protocols are usually employed along with shortrange multi-hop topologies. In this paper, we challenge this notion and propose a structure that employs more robust(and naturally more complex) forward-error correction schemes in multi-hop extended star topologies. We demonstrate using simulation and real-world data based on popular WSN platforms that this approach can actually reduce the overall energy consumption of the nodes by significant margins (from 40 to 70%) compared to traditional WSN schemes that do not support sophisticated communication mechanisms and it is feasible to implement it economically without relying on expensive hardware.
在典型的无线传感器网络(WSN)应用中,部署的传感器节点在计算和能量资源方面都受到限制。出于这个原因,简单的通信协议通常与短程多跳拓扑一起使用。在本文中,我们挑战了这一概念,并提出了一种结构,该结构在多跳扩展星型拓扑中采用更健壮(自然也更复杂)的前向纠错方案。我们使用基于流行WSN平台的仿真和真实世界数据证明,与不支持复杂通信机制的传统WSN方案相比,这种方法实际上可以显著降低节点的总体能耗(从40%到70%),并且在不依赖昂贵硬件的情况下经济地实现它是可行的。
{"title":"Extending the Forward Error Correction Paradigm for Multi-Hop Wireless Sensor Networks","authors":"A. Brokalakis, I. Chondroulis, I. Papaefstathiou","doi":"10.1109/NTMS.2018.8328692","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328692","url":null,"abstract":"In typical Wireless Sensor Network (WSN) applications, the sensor nodes deployed are constrained both in computational and energy resources. For this reason, simple communication protocols are usually employed along with shortrange multi-hop topologies. In this paper, we challenge this notion and propose a structure that employs more robust(and naturally more complex) forward-error correction schemes in multi-hop extended star topologies. We demonstrate using simulation and real-world data based on popular WSN platforms that this approach can actually reduce the overall energy consumption of the nodes by significant margins (from 40 to 70%) compared to traditional WSN schemes that do not support sophisticated communication mechanisms and it is feasible to implement it economically without relying on expensive hardware.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114207440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Extension of Radio Network Information Interfaces for Terminal Activity in a Cell 小区终端活动无线网络信息接口的扩展
E. Pencheva, I. Atanasov
Multi-access Edge Computing (MEC) converges telecommunications and cloud technology at the Radio Access Network (RAN). Taking the advantages of telecom cloud MEC allows rapid content processing at the very edge of the mobile network, delivering real-time services. Third party applications located in RAN may access virtualized network functions through RESTful Application Programming Interfaces (APIs). Radio Network Information APIs provide radio network related information to mobile edge applications and to mobile edge platforms. The paper proposes an extension of Radio Network Information APIs for access to information about terminal activity in a cell. The proposed APIs are described by information flows, data models and actual API definition. Aspects related to mobile edge application that use the proposed extension are discussed.
多接入边缘计算(MEC)在无线接入网(RAN)中融合了电信和云技术。利用电信云MEC的优势,可以在移动网络的最边缘快速处理内容,提供实时服务。位于RAN中的第三方应用程序可以通过RESTful应用程序编程接口(api)访问虚拟化的网络功能。无线网络信息api为移动边缘应用程序和移动边缘平台提供无线网络相关信息。本文提出了无线网络信息api的扩展,用于访问小区中终端活动的信息。提出的API由信息流、数据模型和实际API定义来描述。讨论了使用该扩展的移动边缘应用程序的相关方面。
{"title":"An Extension of Radio Network Information Interfaces for Terminal Activity in a Cell","authors":"E. Pencheva, I. Atanasov","doi":"10.1109/NTMS.2018.8328680","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328680","url":null,"abstract":"Multi-access Edge Computing (MEC) converges telecommunications and cloud technology at the Radio Access Network (RAN). Taking the advantages of telecom cloud MEC allows rapid content processing at the very edge of the mobile network, delivering real-time services. Third party applications located in RAN may access virtualized network functions through RESTful Application Programming Interfaces (APIs). Radio Network Information APIs provide radio network related information to mobile edge applications and to mobile edge platforms. The paper proposes an extension of Radio Network Information APIs for access to information about terminal activity in a cell. The proposed APIs are described by information flows, data models and actual API definition. Aspects related to mobile edge application that use the proposed extension are discussed.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116502720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparison of the Performance Sensitivity to the Primary and Secondary Service Time Distribution in Cognitive Radio Networks 认知无线网络对主次业务时间分布的性能敏感性比较
F. A. Cruz-Pérez, Jose Serrano-Chavez, S. L. Castellanos-Lopez, G. Hernández-Valdez
In this paper, the impact of the service time probability distribution of both primary and secondary users on the performance of Cognitive Radio Networks (CRNs) is investigated. In particular, negative exponential, log-normal, and hyper-exponential probability distributions are considered for the service time of primary and/or secondary users. The performance metrics of the considered CRNs are obtained for both different ratios of time-scales between PUs and SUs and different combinations of values of the coefficient of variation of the service times. Furthermore, two evaluation scenarios have been considered: with and without resources for exclusive use of SUs. Numerical results show that system performance is more sensitive to the service time distribution of SUs than to that of PUs. Additionally, it is observed that to achieve the quasi-stationary regime, greater difference of the time scales at which events of PUs and SUs occur is required as the value of the CoV of service times increases.
研究了主从用户服务时间概率分布对认知无线网络性能的影响。特别是,对于主用户和/或辅助用户的服务时间,考虑了负指数、对数正态和超指数概率分布。在不同的pu和su之间的时间尺度比例和不同的服务时间变异系数值组合下,得到了所考虑的crn的性能指标。此外,还考虑了两种评估场景:有和没有资源专用于SUs。数值结果表明,系统性能对单个单元的服务时间分布比对单个单元的服务时间分布更敏感。此外,为了达到准平稳状态,随着服务时间CoV值的增加,需要pu和su事件发生的时间尺度差异更大。
{"title":"Comparison of the Performance Sensitivity to the Primary and Secondary Service Time Distribution in Cognitive Radio Networks","authors":"F. A. Cruz-Pérez, Jose Serrano-Chavez, S. L. Castellanos-Lopez, G. Hernández-Valdez","doi":"10.1109/NTMS.2018.8328685","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328685","url":null,"abstract":"In this paper, the impact of the service time probability distribution of both primary and secondary users on the performance of Cognitive Radio Networks (CRNs) is investigated. In particular, negative exponential, log-normal, and hyper-exponential probability distributions are considered for the service time of primary and/or secondary users. The performance metrics of the considered CRNs are obtained for both different ratios of time-scales between PUs and SUs and different combinations of values of the coefficient of variation of the service times. Furthermore, two evaluation scenarios have been considered: with and without resources for exclusive use of SUs. Numerical results show that system performance is more sensitive to the service time distribution of SUs than to that of PUs. Additionally, it is observed that to achieve the quasi-stationary regime, greater difference of the time scales at which events of PUs and SUs occur is required as the value of the CoV of service times increases.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"29 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121979084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Measures to Address the Lack of Portability of the RF Fingerprints for Radiometric Identification 解决射频指纹在辐射识别中缺乏便携性的措施
G. Baldini, Raimondo Giuliani, C. Gentile, G. Steri
Radio Frequency (RF) wireless devices can be identified by the RF emissions they produce when transmitting. The reason is that such emissions contain intrinsic features originating from the physical structure and the materials used to build the wireless device itself. These features are usually called RF fingerprints in the literature, and they can be used to uniquely identify a wireless device through a process called radiometric identification. RF fingerprinting can support multifactor authentication of wireless devices in security applications. One of the main unresolved issues in radiometric identification is the lack of portability of the RF fingerprints. The RF emissions are collected by a RF receiver converting them into digital format, from which the fingerprints are extracted. The lack of portability issue is due to the fact that each RF receiver introduces a bias, which degrades the RF fingerprints of the emitting device. As a consequence, RF emissions of the same wireless device collected by different RF receivers will generate different fingerprints for the same wireless device. This issue strongly limits the applicability of RF fingerprinting for security purposes, since we are not afforded to use different RF receivers to perform identification, and the fingerprints are not portable from one receiver to another. In this paper, we propose a novel approach that helps mitigating this portability issue. Our approach is based on the removal of the bias introduced by RF receivers in the frequency domain through the use of one golden reference. The golden reference is used to generate a calibration function, which is then applied to the RF emissions collected by different RF receivers from any other wireless device. The specific approach is empirically validated against a set of ten Internet of Things (IoT) wireless devices (plus the golden reference), and three RF receivers. Our experimental evidence demostrates that our method is able to alleviate the portability issue at the cost of a minor degradation in identification accuracy.
射频(RF)无线设备可以通过其发射时产生的射频发射来识别。其原因是,这种发射含有源自物理结构和用于制造无线设备本身的材料的固有特征。这些特征在文献中通常被称为射频指纹,它们可以通过称为辐射识别的过程来唯一地识别无线设备。射频指纹技术可以支持安全应用中无线设备的多因素认证。射频指纹的便携性不足是射频识别中尚未解决的主要问题之一。射频发射由射频接收器收集,将其转换为数字格式,从中提取指纹。缺乏可移植性的问题是由于每个射频接收器引入了一个偏差,这降低了发射设备的射频指纹。因此,由不同射频接收器收集的同一无线设备的射频发射将为同一无线设备产生不同的指纹。这个问题极大地限制了射频指纹识别在安全目的上的适用性,因为我们不能使用不同的射频接收器来执行识别,而且指纹不能从一个接收器移植到另一个接收器。在本文中,我们提出了一种有助于减轻这种可移植性问题的新方法。我们的方法是基于通过使用一个黄金基准来消除射频接收器在频域中引入的偏置。黄金参考被用来产生一个校准函数,然后将其应用于由不同射频接收器从任何其他无线设备收集的射频发射。具体方法针对一组10个物联网(IoT)无线设备(加上黄金参考)和3个RF接收器进行了经验验证。我们的实验证据表明,我们的方法能够以识别精度的轻微下降为代价减轻可移植性问题。
{"title":"Measures to Address the Lack of Portability of the RF Fingerprints for Radiometric Identification","authors":"G. Baldini, Raimondo Giuliani, C. Gentile, G. Steri","doi":"10.1109/NTMS.2018.8328703","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328703","url":null,"abstract":"Radio Frequency (RF) wireless devices can be identified by the RF emissions they produce when transmitting. The reason is that such emissions contain intrinsic features originating from the physical structure and the materials used to build the wireless device itself. These features are usually called RF fingerprints in the literature, and they can be used to uniquely identify a wireless device through a process called radiometric identification. RF fingerprinting can support multifactor authentication of wireless devices in security applications. One of the main unresolved issues in radiometric identification is the lack of portability of the RF fingerprints. The RF emissions are collected by a RF receiver converting them into digital format, from which the fingerprints are extracted. The lack of portability issue is due to the fact that each RF receiver introduces a bias, which degrades the RF fingerprints of the emitting device. As a consequence, RF emissions of the same wireless device collected by different RF receivers will generate different fingerprints for the same wireless device. This issue strongly limits the applicability of RF fingerprinting for security purposes, since we are not afforded to use different RF receivers to perform identification, and the fingerprints are not portable from one receiver to another. In this paper, we propose a novel approach that helps mitigating this portability issue. Our approach is based on the removal of the bias introduced by RF receivers in the frequency domain through the use of one golden reference. The golden reference is used to generate a calibration function, which is then applied to the RF emissions collected by different RF receivers from any other wireless device. The specific approach is empirically validated against a set of ten Internet of Things (IoT) wireless devices (plus the golden reference), and three RF receivers. Our experimental evidence demostrates that our method is able to alleviate the portability issue at the cost of a minor degradation in identification accuracy.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122012880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Recycling Smart Contracts: Compression of the Ethereum Blockchain 回收智能合约:压缩以太坊区块链
Beltran Borja Fiz Pontiveros, Robert Norvill, R. State
In this work we propose a compression method for smart contracts deployed in the Ethereum blockchain. By taking advantage of the repetition of sections of bytecode among multiple smart contracts previously deployed in the Ethereum blockchain we propose a new pseudo opcode that acts as a pointer that will allow smart contracts to reuse previously deployed code. We show that our proposed algorithm achieves space savings of up to 75% in a dataset of deployed Ethereum smart contracts bytecode, on par with other state of the art compression algorithms while remaining compatible with other methods currently in use for space reduction.
在这项工作中,我们提出了一种用于部署在以太坊区块链中的智能合约的压缩方法。通过利用先前部署在以太坊区块链中的多个智能合约之间字节码部分的重复,我们提出了一种新的伪操作码,它可以作为指针,允许智能合约重用先前部署的代码。我们表明,我们提出的算法在部署的以太坊智能合约字节码数据集中实现了高达75%的空间节省,与其他最先进的压缩算法相当,同时与目前用于减少空间的其他方法保持兼容。
{"title":"Recycling Smart Contracts: Compression of the Ethereum Blockchain","authors":"Beltran Borja Fiz Pontiveros, Robert Norvill, R. State","doi":"10.1109/NTMS.2018.8328742","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328742","url":null,"abstract":"In this work we propose a compression method for smart contracts deployed in the Ethereum blockchain. By taking advantage of the repetition of sections of bytecode among multiple smart contracts previously deployed in the Ethereum blockchain we propose a new pseudo opcode that acts as a pointer that will allow smart contracts to reuse previously deployed code. We show that our proposed algorithm achieves space savings of up to 75% in a dataset of deployed Ethereum smart contracts bytecode, on par with other state of the art compression algorithms while remaining compatible with other methods currently in use for space reduction.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124470744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Localization of Sensors in Indoor Wireless Networks: An Observation Model Using WiFi RSS 室内无线网络传感器定位:基于WiFi RSS的观测模型
D. Alshamaa, F. Mourad, P. Honeine
Indoor localization has become an important issue for wireless sensor networks. This paper presents a zoning-based localization technique that works efficiently in indoor environments. The targeted area is composed of several zones, the objective being to determine the zone of the sensor using an observation model. The observation model is constructed based on fingerprints collected as WiFi signals strengths received from surrounding Access Points. The method creates a belief functions framework that uses all available information to assign evidence to each zone. A hierarchical clustering technique is then applied to create a two-level hierarchy composed of clusters and of original zones in each cluster. At each level of the hierarchy, an Access Point selection approach is proposed to choose the best subset of Access Points in terms of discriminative capacity and redundancy. Real experiments demonstrate the effectiveness of this approach and its competence compared to state-of-the-art methods.
室内定位已成为无线传感器网络的一个重要问题。本文提出了一种在室内环境下有效工作的基于分区的定位技术。目标区域由几个区域组成,目标是使用观测模型确定传感器的区域。观测模型是基于从周围接入点接收到的WiFi信号强度采集的指纹构建的。该方法创建了一个信念函数框架,该框架使用所有可用信息将证据分配给每个区域。然后应用分层聚类技术创建由集群和每个集群中的原始区域组成的两级层次结构。在每个层次结构中,提出了一种选择接入点的方法,以选择具有判别能力和冗余性的最佳接入点子集。实际实验证明了该方法的有效性及其与最先进的方法相比的能力。
{"title":"Localization of Sensors in Indoor Wireless Networks: An Observation Model Using WiFi RSS","authors":"D. Alshamaa, F. Mourad, P. Honeine","doi":"10.1109/NTMS.2018.8328699","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328699","url":null,"abstract":"Indoor localization has become an important issue for wireless sensor networks. This paper presents a zoning-based localization technique that works efficiently in indoor environments. The targeted area is composed of several zones, the objective being to determine the zone of the sensor using an observation model. The observation model is constructed based on fingerprints collected as WiFi signals strengths received from surrounding Access Points. The method creates a belief functions framework that uses all available information to assign evidence to each zone. A hierarchical clustering technique is then applied to create a two-level hierarchy composed of clusters and of original zones in each cluster. At each level of the hierarchy, an Access Point selection approach is proposed to choose the best subset of Access Points in terms of discriminative capacity and redundancy. Real experiments demonstrate the effectiveness of this approach and its competence compared to state-of-the-art methods.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129132993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1