首页 > 最新文献

International Journal of Network Management最新文献

英文 中文
Intrusion Detection for Blockchain-Based Internet of Things Using Gaussian Mixture–Fully Convolutional Variational Autoencoder Model 使用高斯混杂-完全卷积变异自动编码器模型对基于区块链的物联网进行入侵检测
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-18 DOI: 10.1002/nem.2295
C. U. Om Kumar, Suguna Marappan, Bhavadharini Murugeshan, P. Mercy Rajaselvi Beaulah

The Internet of Things (IoT) is an evolving paradigm that has dramatically transformed the traditional style of living into a smart lifestyle. IoT devices have recently attained great attention due to their wide range of applications in various sectors, such as healthcare, smart home devices, smart industries, smart cities, and so forth. However, security is still a challenging issue in the IoT environment. Because of the disparate nature of IoT devices, it is hard to detect the different kinds of attacks available in IoT. Various existing works aim to provide a reliable intrusion detection system (IDS) technique. But they failed to work because of several security issues. Thus, the proposed study presents a blockchain-based deep learning model for IDS. Initially, the input data are preprocessed using min-max normalization, converting the raw input data into improved quality. In order to detect the presented attacks in the provided dataset, the proposed work introduced Gaussian mixture–fully convolutional variational autoencoder (GM-FCVAE) model. The implementation is performed in Python, and the performance of the proposed GM-FCVAE model is analyzed by evaluating several metrics. The proposed GM-FCVAE model is tested on three datasets and attained superior accuracy of 99.18%, 98.81%, and 98.4% with UNSW-NB15, CICIDS 2019, and N_BaIoT datasets, respectively. The comparison reveals that the proposed GM-FCVAE model obtained higher results than the other deep learning techniques. The outperformance shows the efficacy of the proposed study in identifying security attacks.

物联网(IoT)是一种不断发展的模式,它极大地改变了传统的生活方式,使之成为一种智能生活方式。最近,物联网设备因其在医疗保健、智能家居设备、智能工业、智能城市等各个领域的广泛应用而备受关注。然而,在物联网环境中,安全仍然是一个具有挑战性的问题。由于物联网设备各不相同,因此很难检测到物联网中存在的各种攻击。现有的各种研究旨在提供可靠的入侵检测系统(IDS)技术。但是,由于存在一些安全问题,它们未能奏效。因此,本研究提出了一种基于区块链的 IDS 深度学习模型。首先,使用最小-最大归一化对输入数据进行预处理,将原始输入数据转换为更高质量的数据。为了检测所提供数据集中的攻击,该研究引入了高斯混合-完全卷积变异自动编码器(GM-FCVAE)模型。该模型用 Python 实现,并通过评估多个指标分析了所提出的 GM-FCVAE 模型的性能。所提出的 GM-FCVAE 模型在三个数据集上进行了测试,在 UNSW-NB15、CICIDS 2019 和 N_BaIoT 数据集上的准确率分别达到了 99.18%、98.81% 和 98.4%。对比结果表明,所提出的 GM-FCVAE 模型比其他深度学习技术获得了更高的结果。优异的表现表明,所提出的研究在识别安全攻击方面卓有成效。
{"title":"Intrusion Detection for Blockchain-Based Internet of Things Using Gaussian Mixture–Fully Convolutional Variational Autoencoder Model","authors":"C. U. Om Kumar,&nbsp;Suguna Marappan,&nbsp;Bhavadharini Murugeshan,&nbsp;P. Mercy Rajaselvi Beaulah","doi":"10.1002/nem.2295","DOIUrl":"10.1002/nem.2295","url":null,"abstract":"<div>\u0000 \u0000 <p>The Internet of Things (IoT) is an evolving paradigm that has dramatically transformed the traditional style of living into a smart lifestyle. IoT devices have recently attained great attention due to their wide range of applications in various sectors, such as healthcare, smart home devices, smart industries, smart cities, and so forth. However, security is still a challenging issue in the IoT environment. Because of the disparate nature of IoT devices, it is hard to detect the different kinds of attacks available in IoT. Various existing works aim to provide a reliable intrusion detection system (IDS) technique. But they failed to work because of several security issues. Thus, the proposed study presents a blockchain-based deep learning model for IDS. Initially, the input data are preprocessed using min-max normalization, converting the raw input data into improved quality. In order to detect the presented attacks in the provided dataset, the proposed work introduced Gaussian mixture–fully convolutional variational autoencoder (GM-FCVAE) model. The implementation is performed in Python, and the performance of the proposed GM-FCVAE model is analyzed by evaluating several metrics. The proposed GM-FCVAE model is tested on three datasets and attained superior accuracy of 99.18%, 98.81%, and 98.4% with UNSW-NB15, CICIDS 2019, and N_BaIoT datasets, respectively. The comparison reveals that the proposed GM-FCVAE model obtained higher results than the other deep learning techniques. The outperformance shows the efficacy of the proposed study in identifying security attacks.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142177414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intelligent Reinforcement Learning–Based Method for Threat Detection in Mobile Edge Networks 基于智能强化学习的移动边缘网络威胁检测方法
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-13 DOI: 10.1002/nem.2294
Muhammad Yousaf Saeed, Jingsha He, Nafei Zhu, Muhammad Farhan, Soumyabrata Dev, Thippa Reddy Gadekallu, Ahmad Almadhor
Traditional techniques for detecting threats in mobile edge networks are limited in their ability to adapt to evolving threats. We propose an intelligent reinforcement learning (RL)–based method for real‐time threat detection in mobile edge networks. Our approach enables an agent to continuously learn and adapt its threat detection capabilities based on feedback from the environment. Through experiments, we demonstrate that our technique outperforms traditional methods in detecting threats in dynamic edge network environments. The intelligent and adaptive nature of our RL‐based approach makes it well suited for securing mission‐critical edge applications with stringent latency and reliability requirements. We provide an analysis of threat models in multiaccess edge computing and highlight the role of on‐device learning in enabling distributed threat intelligence across heterogeneous edge nodes. Our technique has the potential, significantly enhancing threat visibility and resiliency in next‐generation mobile edge networks. Future work includes optimizing sample efficiency of our approach and integrating explainable threat detection models for trustworthy human–AI collaboration.
传统的移动边缘网络威胁检测技术在适应不断变化的威胁方面能力有限。我们提出了一种基于智能强化学习(RL)的方法,用于移动边缘网络中的实时威胁检测。我们的方法能让代理根据环境反馈不断学习和调整其威胁检测能力。通过实验,我们证明我们的技术在动态边缘网络环境中检测威胁方面优于传统方法。我们基于 RL 的方法的智能性和适应性使其非常适合于保护具有严格延迟和可靠性要求的关键任务边缘应用。我们对多接入边缘计算中的威胁模型进行了分析,并强调了设备上学习在实现异构边缘节点分布式威胁情报中的作用。我们的技术具有潜力,能显著提高下一代移动边缘网络的威胁可见性和弹性。未来的工作包括优化我们方法的采样效率,并整合可解释的威胁检测模型,以实现值得信赖的人机协作。
{"title":"An Intelligent Reinforcement Learning–Based Method for Threat Detection in Mobile Edge Networks","authors":"Muhammad Yousaf Saeed, Jingsha He, Nafei Zhu, Muhammad Farhan, Soumyabrata Dev, Thippa Reddy Gadekallu, Ahmad Almadhor","doi":"10.1002/nem.2294","DOIUrl":"https://doi.org/10.1002/nem.2294","url":null,"abstract":"Traditional techniques for detecting threats in mobile edge networks are limited in their ability to adapt to evolving threats. We propose an intelligent reinforcement learning (RL)–based method for real‐time threat detection in mobile edge networks. Our approach enables an agent to continuously learn and adapt its threat detection capabilities based on feedback from the environment. Through experiments, we demonstrate that our technique outperforms traditional methods in detecting threats in dynamic edge network environments. The intelligent and adaptive nature of our RL‐based approach makes it well suited for securing mission‐critical edge applications with stringent latency and reliability requirements. We provide an analysis of threat models in multiaccess edge computing and highlight the role of on‐device learning in enabling distributed threat intelligence across heterogeneous edge nodes. Our technique has the potential, significantly enhancing threat visibility and resiliency in next‐generation mobile edge networks. Future work includes optimizing sample efficiency of our approach and integrating explainable threat detection models for trustworthy human–AI collaboration.","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"1 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142177416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Enabled Decentralized Healthcare Data Exchange: Leveraging Novel Encryption Scheme, Smart Contracts, and Ring Signatures for Enhanced Data Security and Patient Privacy 区块链去中心化医疗数据交换:利用新型加密方案、智能合约和环形签名增强数据安全性和患者隐私保护
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-08 DOI: 10.1002/nem.2289
S. Vidhya, P. M. Siva Raja, R. P. Sumithra

The healthcare industry has undergone a digital transformation in recent years, with the adoption of electronic health records (EHRs) becoming increasingly prevalent. While this digitization offers various advantages, concerns regarding the security and privacy of sensitive medical data have also intensified. Data breaches and cyber-attacks targeting healthcare organizations have underscored the need for robust solutions to protect patient data. Blockchain technology has emerged as a promising solution due to its decentralized and immutable nature, which ensures secure and transparent data recording. This paper proposes a novel approach that combines blockchain with advanced encryption scheme and privacy protection technique to establish a secure and privacy protected medical data sharing environment. The proposed system consists of three phases such as initialization phase, data processing phase, and authentication phase. The hybrid Feistal-Shannon homomorphic encryption algorithm (HFSHE) is proposed to encrypt the medical data to ensure data confidentiality, integrity, and availability. Ring signature is integrated to the system to provide additional anonymity and protect the identities of the participants involved in data transactions. In addition, the smart contract developed performs authentication checks on users, generates a time seal, and verifies the ring signature. Through this enhancement, the system becomes more resilient to both external and internal threats, enhancing overall security as well as privacy. A comprehensive security analysis is conducted to compare the proposed method's performance against existing techniques. The results demonstrate the effectiveness of the proposed approach in safeguarding sensitive medical information within the blockchain ecosystem.

近年来,医疗保健行业经历了一场数字化变革,电子病历(EHR)的应用越来越普遍。虽然数字化带来了各种优势,但人们对敏感医疗数据的安全性和隐私性的担忧也在加剧。针对医疗机构的数据泄露和网络攻击凸显了保护患者数据的强大解决方案的必要性。区块链技术因其去中心化和不可更改的特性,确保了数据记录的安全和透明,已成为一种前景广阔的解决方案。本文提出了一种将区块链与先进的加密方案和隐私保护技术相结合的新方法,以建立一个安全和隐私保护的医疗数据共享环境。所提出的系统包括三个阶段,如初始化阶段、数据处理阶段和身份验证阶段。提出了混合费斯特尔-香农同态加密算法(HFSHE)来加密医疗数据,以确保数据的保密性、完整性和可用性。系统还集成了环形签名,以提供额外的匿名性并保护数据交易参与者的身份。此外,开发的智能合约会对用户进行身份验证检查、生成时间印章并验证环形签名。通过这一改进,系统可以更好地抵御外部和内部威胁,提高整体安全性和隐私性。我们进行了全面的安全分析,以比较建议方法与现有技术的性能。结果表明,所提出的方法能有效保护区块链生态系统中的敏感医疗信息。
{"title":"Blockchain-Enabled Decentralized Healthcare Data Exchange: Leveraging Novel Encryption Scheme, Smart Contracts, and Ring Signatures for Enhanced Data Security and Patient Privacy","authors":"S. Vidhya,&nbsp;P. M. Siva Raja,&nbsp;R. P. Sumithra","doi":"10.1002/nem.2289","DOIUrl":"10.1002/nem.2289","url":null,"abstract":"<div>\u0000 \u0000 <p>The healthcare industry has undergone a digital transformation in recent years, with the adoption of electronic health records (EHRs) becoming increasingly prevalent. While this digitization offers various advantages, concerns regarding the security and privacy of sensitive medical data have also intensified. Data breaches and cyber-attacks targeting healthcare organizations have underscored the need for robust solutions to protect patient data. Blockchain technology has emerged as a promising solution due to its decentralized and immutable nature, which ensures secure and transparent data recording. This paper proposes a novel approach that combines blockchain with advanced encryption scheme and privacy protection technique to establish a secure and privacy protected medical data sharing environment. The proposed system consists of three phases such as initialization phase, data processing phase, and authentication phase. The hybrid Feistal-Shannon homomorphic encryption algorithm (HFSHE) is proposed to encrypt the medical data to ensure data confidentiality, integrity, and availability. Ring signature is integrated to the system to provide additional anonymity and protect the identities of the participants involved in data transactions. In addition, the smart contract developed performs authentication checks on users, generates a time seal, and verifies the ring signature. Through this enhancement, the system becomes more resilient to both external and internal threats, enhancing overall security as well as privacy. A comprehensive security analysis is conducted to compare the proposed method's performance against existing techniques. The results demonstrate the effectiveness of the proposed approach in safeguarding sensitive medical information within the blockchain ecosystem.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141927265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DELTA: A Modular, Transparent, and Efficient Synchronization of DLTs and Databases DELTA:模块化、透明、高效的数字签名技术与数据库同步技术
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-05 DOI: 10.1002/nem.2293
F. Javier Fernández-Bravo Peñuela, Jordi Arjona Aroca, Francesc D. Muñoz-Escoí, Yuriy Yatsyk Gavrylyak, Ismael Illán García, José M. Bernabéu-Aubán

Besides cryptocurrencies, DLTs may be also exploited in enterprise systems operated by a consortium of organizations. Their interaction takes usually place on a permissioned blockchain network that holds a set of data to be queried frequently. In this scope, the main problem of DLTs is their unsuitability for a fast service of complex queries on those data. In order to solve this issue, many proposals dump the ledger contents onto databases that, because of their own goals and design, are already optimized for the execution of those queries. Unfortunately, many of those proposals assume that the data to be queried consist in only a block or (cryptocurrency-related) transaction history. However, those organization consortiums commonly store other structured business-related information in the DLT, and there is an evident lack of support for querying that other kind of structured data. To remedy those problems, DELTA synchronizes, with minimal overhead, the DLT state into a database, providing (1) a modular architecture with event-based handling of DLT updates that supports different DLTs and databases, (2) a transparent management, since DLT end users do not need to learn or use any new API in order to handle that synchronization (i.e., those users still rely on the original interface provided by their chosen DLT), (3) the efficient execution of complex queries on those structured data. Thus, DELTA reduces query times up to five orders of magnitude, depending on the DLT and the database, compared to queries directed to the ledger nodes.

除了加密货币,DLT 还可用于由组织联盟运营的企业系统。它们之间的交互通常发生在经过许可的区块链网络上,该网络拥有一组需要经常查询的数据。在这种情况下,DLT 的主要问题是不适合快速提供对这些数据的复杂查询服务。为了解决这个问题,许多建议将分类账内容转储到数据库中,而数据库由于其自身的目标和设计,已经为执行这些查询进行了优化。遗憾的是,其中许多建议都假定要查询的数据只包括区块或(加密货币相关的)交易历史。然而,这些组织联盟通常会在 DLT 中存储其他结构化的业务相关信息,而且显然缺乏对其他类型结构化数据的查询支持。为了解决这些问题,DELTA 以最小的开销将 DLT 状态同步到数据库中,提供(1)模块化架构,基于事件处理 DLT 更新,支持不同的 DLT 和数据库;(2)透明管理,因为 DLT 终端用户不需要学习或使用任何新的应用程序接口来处理同步(即,这些用户仍然依赖其所选 DLT 提供的原始接口);(3)高效执行对这些结构化数据的复杂查询。因此,与针对分类账节点的查询相比,DELTA 可将查询时间缩短达五个数量级,具体取决于 DLT 和数据库。
{"title":"DELTA: A Modular, Transparent, and Efficient Synchronization of DLTs and Databases","authors":"F. Javier Fernández-Bravo Peñuela,&nbsp;Jordi Arjona Aroca,&nbsp;Francesc D. Muñoz-Escoí,&nbsp;Yuriy Yatsyk Gavrylyak,&nbsp;Ismael Illán García,&nbsp;José M. Bernabéu-Aubán","doi":"10.1002/nem.2293","DOIUrl":"10.1002/nem.2293","url":null,"abstract":"<div>\u0000 \u0000 <p>Besides cryptocurrencies, DLTs may be also exploited in enterprise systems operated by a consortium of organizations. Their interaction takes usually place on a permissioned blockchain network that holds a set of data to be queried frequently. In this scope, the main problem of DLTs is their unsuitability for a fast service of complex queries on those data. In order to solve this issue, many proposals dump the ledger contents onto databases that, because of their own goals and design, are already optimized for the execution of those queries. Unfortunately, many of those proposals assume that the data to be queried consist in only a block or (cryptocurrency-related) transaction history. However, those organization consortiums commonly store other structured business-related information in the DLT, and there is an evident lack of support for querying that other kind of structured data. To remedy those problems, DELTA synchronizes, with minimal overhead, the DLT state into a database, providing (1) a modular architecture with event-based handling of DLT updates that supports different DLTs and databases, (2) a transparent management, since DLT end users do not need to learn or use any new API in order to handle that synchronization (i.e., those users still rely on the original interface provided by their chosen DLT), (3) the efficient execution of complex queries on those structured data. Thus, DELTA reduces query times up to five orders of magnitude, depending on the DLT and the database, compared to queries directed to the ledger nodes.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141944861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Preservation of Large Language Models in the Metaverse Era: Research Frontiers, Categorical Comparisons, and Future Directions 元网时代大型语言模型的隐私保护:研究前沿、分类比较和未来方向
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-30 DOI: 10.1002/nem.2292
Dabin Huang, Mengyu Ge, Kunlan Xiang, Xiaolei Zhang, Haomiao Yang
Large language models (LLMs), with their billions to trillions of parameters, excel in natural language processing, machine translation, dialog systems, and text summarization. These capabilities are increasingly pivotal in the metaverse, where they can enhance virtual interactions and environments. However, their extensive use, particularly in the metaverse's immersive platforms, raises significant privacy concerns. This paper analyzes existing privacy issues in LLMs, vital for both traditional and metaverse applications, and examines protection techniques across the entire life cycle of these models, from training to user deployment. We delve into cryptography, embedding layer encoding, differential privacy and its variants, and adversarial networks, highlighting their relevance in the metaverse context. Specifically, we explore technologies like homomorphic encryption and secure multiparty computation, which are essential for metaverse security. Our discussion on Gaussian differential privacy, Renyi differential privacy, Edgeworth accounting, and the generation of adversarial samples and loss functions emphasizes their importance in the metaverse's dynamic and interactive environments. Lastly, the paper discusses the current research status and future challenges in the security of LLMs within and beyond the metaverse, emphasizing urgent problems and potential areas for exploration.
大型语言模型(LLM)拥有数十亿到数万亿个参数,在自然语言处理、机器翻译、对话系统和文本摘要等方面表现出色。这些功能在元宇宙中越来越重要,因为它们可以增强虚拟交互和环境。然而,它们的广泛应用,尤其是在元宇宙的沉浸式平台中的应用,引发了严重的隐私问题。本文分析了 LLM 中现有的隐私问题,这些问题对传统应用和元宇宙应用都至关重要,并研究了这些模型从培训到用户部署的整个生命周期中的保护技术。我们深入研究了密码学、嵌入层编码、差分隐私及其变体和对抗网络,并强调了它们在元宇宙背景下的相关性。具体来说,我们探讨了同态加密和安全多方计算等技术,这些技术对元数据安全至关重要。我们对高斯差分隐私、仁义差分隐私、埃奇沃思会计以及对抗样本和损失函数的生成进行了讨论,强调了它们在元宇宙的动态和交互环境中的重要性。最后,本文讨论了元宇宙内外 LLM 安全的研究现状和未来挑战,强调了亟待解决的问题和潜在的探索领域。
{"title":"Privacy Preservation of Large Language Models in the Metaverse Era: Research Frontiers, Categorical Comparisons, and Future Directions","authors":"Dabin Huang, Mengyu Ge, Kunlan Xiang, Xiaolei Zhang, Haomiao Yang","doi":"10.1002/nem.2292","DOIUrl":"https://doi.org/10.1002/nem.2292","url":null,"abstract":"Large language models (LLMs), with their billions to trillions of parameters, excel in natural language processing, machine translation, dialog systems, and text summarization. These capabilities are increasingly pivotal in the metaverse, where they can enhance virtual interactions and environments. However, their extensive use, particularly in the metaverse's immersive platforms, raises significant privacy concerns. This paper analyzes existing privacy issues in LLMs, vital for both traditional and metaverse applications, and examines protection techniques across the entire life cycle of these models, from training to user deployment. We delve into cryptography, embedding layer encoding, differential privacy and its variants, and adversarial networks, highlighting their relevance in the metaverse context. Specifically, we explore technologies like homomorphic encryption and secure multiparty computation, which are essential for metaverse security. Our discussion on Gaussian differential privacy, Renyi differential privacy, Edgeworth accounting, and the generation of adversarial samples and loss functions emphasizes their importance in the metaverse's dynamic and interactive environments. Lastly, the paper discusses the current research status and future challenges in the security of LLMs within and beyond the metaverse, emphasizing urgent problems and potential areas for exploration.","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"1 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141871662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
No Worker Left (Too Far) Behind: Dynamic Hybrid Synchronization for In‐Network ML Aggregation 没有工人落在后面(太远):网络内 ML 聚合的动态混合同步
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-25 DOI: 10.1002/nem.2290
Diego Cardoso Nunes, Bruno Loureiro Coelho, Ricardo Parizotto, Alberto Egon Schaeffer‐Filho
Achieving high‐performance aggregation is essential to scaling data‐parallel distributed machine learning (ML) training. Recent research in in‐network computing has shown that offloading the aggregation to the network data plane can accelerate the aggregation process compared to traditional server‐only approaches, reducing the propagation delay and consequently speeding up distributed training. However, the existing literature on in‐network aggregation does not provide ways to deal with slower workers (called stragglers). The presence of stragglers can negatively impact distributed training, increasing the time it takes to complete. In this paper, we present Serene, an in‐network aggregation system capable of circumventing the effects of stragglers. Serene coordinates the ML workers to cooperate with a programmable switch using a hybrid synchronization approach where approaches can be changed dynamically. The synchronization can change dynamically through a control plane API that translates high‐level code into switch rules. Serene switch employs an efficient data structure for managing synchronization and a hot‐swapping mechanism to consistently change from one synchronization strategy to another. We implemented and evaluated a prototype using BMv2 and a Proof‐of‐Concept in a Tofino ASIC. We ran experiments with realistic ML workloads, including a neural network trained for image classification. Our results show that Serene can speed up training by up to 40% in emulation scenarios by reducing drastically the cumulative waiting time compared to a synchronous baseline.
实现高性能聚合对于扩展数据并行分布式机器学习(ML)训练至关重要。最近的网络内计算研究表明,与传统的纯服务器方法相比,将聚合卸载到网络数据平面可以加速聚合过程,减少传播延迟,从而加快分布式训练。然而,关于网络内聚合的现有文献并没有提供处理速度较慢的工作者(称为 "游离者")的方法。散兵的存在会对分布式训练产生负面影响,增加训练完成所需的时间。在本文中,我们介绍了 Serene,一种能够规避散兵游勇影响的网内聚合系统。Serene 使用一种混合同步方法协调 ML 工作者与可编程交换机合作,这种方法可以动态改变。同步可通过将高级代码转换为交换规则的控制平面应用程序接口(API)动态更改。Serene switch 采用了一种高效的数据结构来管理同步,并采用了一种热插拔机制,可持续地从一种同步策略切换到另一种同步策略。我们使用 BMv2 实现并评估了一个原型,并在 Tofino ASIC 中进行了概念验证。我们使用现实的 ML 工作负载进行了实验,包括为图像分类而训练的神经网络。结果表明,与同步基线相比,Serene 通过大幅减少累计等待时间,可将仿真场景中的训练速度提高 40%。
{"title":"No Worker Left (Too Far) Behind: Dynamic Hybrid Synchronization for In‐Network ML Aggregation","authors":"Diego Cardoso Nunes, Bruno Loureiro Coelho, Ricardo Parizotto, Alberto Egon Schaeffer‐Filho","doi":"10.1002/nem.2290","DOIUrl":"https://doi.org/10.1002/nem.2290","url":null,"abstract":"Achieving high‐performance aggregation is essential to scaling data‐parallel distributed machine learning (ML) training. Recent research in in‐network computing has shown that offloading the aggregation to the network data plane can accelerate the aggregation process compared to traditional server‐only approaches, reducing the propagation delay and consequently speeding up distributed training. However, the existing literature on in‐network aggregation does not provide ways to deal with slower workers (called stragglers). The presence of stragglers can negatively impact distributed training, increasing the time it takes to complete. In this paper, we present Serene, an in‐network aggregation system capable of circumventing the effects of stragglers. Serene coordinates the ML workers to cooperate with a programmable switch using a hybrid synchronization approach where approaches can be changed dynamically. The synchronization can change dynamically through a control plane API that translates high‐level code into switch rules. Serene switch employs an efficient data structure for managing synchronization and a hot‐swapping mechanism to consistently change from one synchronization strategy to another. We implemented and evaluated a prototype using BMv2 and a Proof‐of‐Concept in a Tofino ASIC. We ran experiments with realistic ML workloads, including a neural network trained for image classification. Our results show that Serene can speed up training by up to 40% in emulation scenarios by reducing drastically the cumulative waiting time compared to a synchronous baseline.","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"22 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141774195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Generalized Lightweight Intrusion Detection Model With Unified Feature Selection for Internet of Things Networks 针对物联网网络的统一特征选择的通用轻量级入侵检测模型
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-23 DOI: 10.1002/nem.2291
Renya Nath N, Hiran V. Nath

The applicability of the Internet of Things (IoT) cutting across different domains has resulted in newer “things” acquiring IP connectivity. These things, technically known as IoT devices, are vulnerable to diverse security threats. Consequently, there has been an exponential increase in IoT malware over the past 5 years, and securing IoT devices from such attacks is a pressing concern in the current era. However, the traditional peripheral security measures do not comply with the lightweight security requirements of the IoT ecosystem. Considering this, we propose a lightweight intrusion detection model for IoT networks (LIDM-IoT) that demonstrates similar efficiency in exposing malicious activities compared with the existing computationally expensive methods. The crux of the proposed model is that it provides efficient attack detection with lower computational requirements in IoT networks. LIDM-IoT achieves the feat through a novel unified feature selection strategy that unifies filter-based and embedded feature selection methods. The proposed feature selection strategy reduces the feature space by 94%. Also, we use only the records of a single attack type to build the model using the XGBoost algorithm. We have tested LIDM-IoT with unseen attack types to ensure its generalized behavior. The results indicate that the proposed model exhibits efficient attack detection, with a reduced feature set, in IoT networks compared with the state-of-the-art models.

物联网(IoT)在不同领域的广泛应用,使越来越多的 "物 "获得了 IP 连接。这些 "物 "在技术上被称为物联网设备,容易受到各种安全威胁。因此,在过去 5 年里,物联网恶意软件呈指数级增长,而确保物联网设备免受此类攻击是当今时代亟待解决的问题。然而,传统的外围安全措施并不符合物联网生态系统的轻量级安全要求。有鉴于此,我们提出了一种适用于物联网网络的轻量级入侵检测模型(LIDM-IoT),与现有的计算成本高昂的方法相比,该模型在揭露恶意活动方面具有类似的效率。所提模型的关键在于,它能在物联网网络中以较低的计算要求提供高效的攻击检测。LIDM-IoT 通过一种新颖的统一特征选择策略实现了这一壮举,该策略统一了基于过滤器的特征选择方法和嵌入式特征选择方法。所提出的特征选择策略将特征空间缩小了 94%。此外,我们仅使用单一攻击类型的记录来使用 XGBoost 算法建立模型。我们用未见过的攻击类型对 LIDM-IoT 进行了测试,以确保其通用性。结果表明,与最先进的模型相比,所提出的模型在物联网网络中以较少的特征集实现了高效的攻击检测。
{"title":"A Generalized Lightweight Intrusion Detection Model With Unified Feature Selection for Internet of Things Networks","authors":"Renya Nath N,&nbsp;Hiran V. Nath","doi":"10.1002/nem.2291","DOIUrl":"10.1002/nem.2291","url":null,"abstract":"<div>\u0000 \u0000 <p>The applicability of the Internet of Things (IoT) cutting across different domains has resulted in newer “things” acquiring IP connectivity. These things, technically known as IoT devices, are vulnerable to diverse security threats. Consequently, there has been an exponential increase in IoT malware over the past 5 years, and securing IoT devices from such attacks is a pressing concern in the current era. However, the traditional peripheral security measures do not comply with the lightweight security requirements of the IoT ecosystem. Considering this, we propose a lightweight intrusion detection model for IoT networks (LIDM-IoT) that demonstrates similar efficiency in exposing malicious activities compared with the existing computationally expensive methods. The crux of the proposed model is that it provides efficient attack detection with lower computational requirements in IoT networks. LIDM-IoT achieves the feat through a novel unified feature selection strategy that unifies filter-based and embedded feature selection methods. The proposed feature selection strategy reduces the feature space by 94%. Also, we use only the records of a single attack type to build the model using the XGBoost algorithm. We have tested LIDM-IoT with unseen attack types to ensure its generalized behavior. The results indicate that the proposed model exhibits efficient attack detection, with a reduced feature set, in IoT networks compared with the state-of-the-art models.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141774197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Domain‐Adaptive Power Profiling Analysis Strategy for the Metaverse 面向元宇宙的领域自适应功率剖析分析策略
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-11 DOI: 10.1002/nem.2288
Xiang Li, Ning Yang, Weifeng Liu, Aidong Chen, Yanlong Zhang, Shuo Wang, Jing Zhou
In the surge of the digital era, the metaverse, as a groundbreaking concept, has become a focal point in the technology sector. It is reshaping human work and life patterns, carving out a new realm of virtual and real interaction. However, the rapid development of the metaverse brings along novel challenges in security and privacy. In this multifaceted and complex technological environment, data protection is of paramount importance. The innovative capabilities of high‐end devices and functions in the metaverse, owing to advanced integrated circuit technology, face unique threats from side‐channel analysis (SCA), potentially leading to breaches in user privacy. Addressing the issue of domain differences caused by different hardware devices, which impact the generalizability of the analysis model and the accuracy of analysis, this paper proposes a strategy of portability power profiling analysis (PPPA). Combining domain adaptation and deep learning techniques, it models and calibrates the domain differences between the profiling and target devices, enhancing the model's adaptability in different device environments. Experiments show that our method can recover the correct key with as few as 389 power traces, effectively recovering keys across different devices. This paper underscores the effectiveness of cross‐device SCA, focusing on the adaptability and robustness of analysis models in different hardware environments, thereby enhancing the security of user data privacy in the metaverse environment.
在汹涌澎湃的数字时代,"元宇宙 "作为一个开创性的概念,已成为技术领域的焦点。它正在重塑人类的工作和生活模式,开辟一个虚拟与现实互动的新领域。然而,元宇宙的快速发展也带来了安全和隐私方面的新挑战。在这个多元而复杂的技术环境中,数据保护至关重要。由于采用了先进的集成电路技术,元宇宙中高端设备和功能的创新能力面临着来自侧信道分析(SCA)的独特威胁,有可能导致用户隐私泄露。针对不同硬件设备造成的领域差异影响分析模型的普适性和分析精度的问题,本文提出了可移植性功率剖析分析(PPPA)策略。它结合领域适应和深度学习技术,对剖析设备和目标设备之间的领域差异进行建模和校准,增强了模型在不同设备环境下的适应性。实验表明,我们的方法只需 389 个电量跟踪就能恢复正确的密钥,在不同设备间有效地恢复密钥。本文强调了跨设备 SCA 的有效性,重点关注分析模型在不同硬件环境中的适应性和鲁棒性,从而提高了元宇宙环境中用户数据隐私的安全性。
{"title":"Domain‐Adaptive Power Profiling Analysis Strategy for the Metaverse","authors":"Xiang Li, Ning Yang, Weifeng Liu, Aidong Chen, Yanlong Zhang, Shuo Wang, Jing Zhou","doi":"10.1002/nem.2288","DOIUrl":"https://doi.org/10.1002/nem.2288","url":null,"abstract":"In the surge of the digital era, the metaverse, as a groundbreaking concept, has become a focal point in the technology sector. It is reshaping human work and life patterns, carving out a new realm of virtual and real interaction. However, the rapid development of the metaverse brings along novel challenges in security and privacy. In this multifaceted and complex technological environment, data protection is of paramount importance. The innovative capabilities of high‐end devices and functions in the metaverse, owing to advanced integrated circuit technology, face unique threats from side‐channel analysis (SCA), potentially leading to breaches in user privacy. Addressing the issue of domain differences caused by different hardware devices, which impact the generalizability of the analysis model and the accuracy of analysis, this paper proposes a strategy of portability power profiling analysis (PPPA). Combining domain adaptation and deep learning techniques, it models and calibrates the domain differences between the profiling and target devices, enhancing the model's adaptability in different device environments. Experiments show that our method can recover the correct key with as few as 389 power traces, effectively recovering keys across different devices. This paper underscores the effectiveness of cross‐device SCA, focusing on the adaptability and robustness of analysis models in different hardware environments, thereby enhancing the security of user data privacy in the metaverse environment.","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"125 20 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141612824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovations in Blockchain for Crypto Assets and Exchanges 区块链在加密资产和交易所方面的创新
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-17 DOI: 10.1002/nem.2287
James Won-Ki Hong, Andreas Veneris, Hongtaek Ju, Taeyeol Jeong, Changhoon Kang

This special issue contains extended versions of the best papers from the IEEE CryptoEx 2023 workshop (https://icbc2023.ieee-icbc.org/workshop/cryptoex-2023), which was held as a co-located workshop with 2023 IEEE International Conference on Blockchain and Cryptocurrency. The workshop was held on Friday, May 5, 2023, in Dubai, UAE. The papers in this special issue explore crucial advancements in fractional NFTs, stablecoins, and cryptocurrency exchanges, reflecting the diverse and innovative applications of blockchain technology.

The first paper, titled “Fractional Non-Fungible Tokens (NFTs): Overview, Evaluation, Marketplaces, and Challenges,” authored by Wonseok Choi, Jongsoo Woo, and James Won-Ki Hong, explores the innovative concept of fractional NFTs. By democratizing access to high-value digital assets, fractional NFTs merge tokenization, smart contracts, and ownership models to revolutionize the digital economy. The paper evaluates gas consumption and examines regulatory and security challenges, underscoring the importance of transparency and robust security measures in fostering trust within fractional NFT ecosystems.

The second paper, titled “Leveraging Ponzi-like Designs in Stablecoins,” by Shange Fu, Qin Wang, Jiangshan Yu, and Shiping Chen, provides a novel perspective on algorithmic stablecoins, which are often dismissed as Ponzi schemes. This study clarifies the fundamental nature of Ponzi schemes and introduces a rational model for evaluating the sustainability of algorithmic stablecoins. By applying historical data, the paper identifies conditions under which these stablecoins can function effectively as rational Ponzi games, offering a new understanding of their stability mechanisms.

The third paper, titled “Athena: Smart Order Routing on Centralized Crypto Exchanges using a Unified Order Book,” authored by Robert Henker, Daniel Atzberger, Jan Ole Vollmer, Willy Scheibel, Jürgen Döllner, and Markus Bick, describes the development and implementation of Athena. This system optimizes trading strategies by integrating order books from multiple centralized crypto exchanges into a unified order book. Athena's smart order routing algorithm significantly reduces implicit trading costs, making it particularly beneficial for institutional investors in illiquid crypto markets.

The fourth paper, titled “Deeper: A Shared Liquidity DEX Design for Low Trading Volume Tokens to Enhance Average Liquidity,” by Srisht Fateh Singh, Panagiotis Michalopoulos, and Andreas Veneris, introduces Deeper, a decentralized exchange design aimed at improving liquidity for low trading volume tokens. By enabling liquidity providers to share reserves of a common token, Deeper addresses issues like high slippage and sandwich attacks. The paper demonstrates the enhanced liquidity achieved through historical price experiments and highlights potential risks for liquidity providers.

We believe that these four papers make significant cont

本特刊收录了 IEEE CryptoEx 2023 研讨会(https://icbc2023.ieee-icbc.org/workshop/cryptoex-2023)的优秀论文扩展版,该研讨会与 2023 IEEE 区块链和加密货币国际会议同期举行。研讨会于 2023 年 5 月 5 日星期五在阿联酋迪拜举行。本特刊中的论文探讨了分数式非可流通代币(NFT)、稳定币和加密货币交易所的重要进展,反映了区块链技术的多样化创新应用:由 Wonseok Choi、Jongsoo Woo 和 James Won-Ki Hong 撰写的第一篇论文题为《分数型不可兑换代币(NFTs):概述、评估、市场和挑战》,探讨了分数型 NFTs 的创新概念。通过实现高价值数字资产访问的民主化,部分 NFT 将代币化、智能合约和所有权模式融合在一起,从而彻底改变数字经济。第二篇论文的题目是 "稳定币中的庞氏骗局式设计"(Leveraging Ponzi-like Designs in Stablecoins),作者是傅山歌、王琴、于江山和陈世平。该研究阐明了庞氏骗局的基本性质,并引入了评估算法稳定币可持续性的合理模型。第三篇论文题为《雅典娜:使用统一订单簿在集中式加密货币交易所进行智能订单路由》,作者包括罗伯特-亨克尔(Robert Henker)、丹尼尔-阿茨伯格(Daniel Atzberger)、扬-奥勒-沃尔默(Jan Ole Vollmer)、威利-谢贝尔(Willy Scheibel)、于尔根-多尔纳(Jürgen Döllner)和马库斯-比克(Markus Bick),介绍了雅典娜的开发和实施。该系统将多个集中式加密货币交易所的订单簿整合到一个统一的订单簿中,从而优化了交易策略。Athena 的智能订单路由算法大大降低了隐性交易成本,特别有利于流动性不足的加密货币市场中的机构投资者:Srisht Fateh Singh、Panagiotis Michalopoulos 和 Andreas Veneris 的论文介绍了 Deeper,这是一种去中心化交易所设计,旨在提高低交易量代币的流动性。通过让流动性提供者共享共同代币的储备,Deeper 解决了高滑点和三明治攻击等问题。我们认为,这四篇论文为加密资产和交易所的区块链领域做出了重大贡献。我们衷心感谢作者们的卓越贡献,感谢审稿人的深刻反馈,感谢编辑团队为策划本特刊所付出的辛勤努力。
{"title":"Innovations in Blockchain for Crypto Assets and Exchanges","authors":"James Won-Ki Hong,&nbsp;Andreas Veneris,&nbsp;Hongtaek Ju,&nbsp;Taeyeol Jeong,&nbsp;Changhoon Kang","doi":"10.1002/nem.2287","DOIUrl":"https://doi.org/10.1002/nem.2287","url":null,"abstract":"<p>This special issue contains extended versions of the best papers from the IEEE CryptoEx 2023 workshop (https://icbc2023.ieee-icbc.org/workshop/cryptoex-2023), which was held as a co-located workshop with 2023 IEEE International Conference on Blockchain and Cryptocurrency. The workshop was held on Friday, May 5, 2023, in Dubai, UAE. The papers in this special issue explore crucial advancements in fractional NFTs, stablecoins, and cryptocurrency exchanges, reflecting the diverse and innovative applications of blockchain technology.</p><p>The first paper, titled “Fractional Non-Fungible Tokens (NFTs): Overview, Evaluation, Marketplaces, and Challenges,” authored by Wonseok Choi, Jongsoo Woo, and James Won-Ki Hong, explores the innovative concept of fractional NFTs. By democratizing access to high-value digital assets, fractional NFTs merge tokenization, smart contracts, and ownership models to revolutionize the digital economy. The paper evaluates gas consumption and examines regulatory and security challenges, underscoring the importance of transparency and robust security measures in fostering trust within fractional NFT ecosystems.</p><p>The second paper, titled “Leveraging Ponzi-like Designs in Stablecoins,” by Shange Fu, Qin Wang, Jiangshan Yu, and Shiping Chen, provides a novel perspective on algorithmic stablecoins, which are often dismissed as Ponzi schemes. This study clarifies the fundamental nature of Ponzi schemes and introduces a rational model for evaluating the sustainability of algorithmic stablecoins. By applying historical data, the paper identifies conditions under which these stablecoins can function effectively as rational Ponzi games, offering a new understanding of their stability mechanisms.</p><p>The third paper, titled “Athena: Smart Order Routing on Centralized Crypto Exchanges using a Unified Order Book,” authored by Robert Henker, Daniel Atzberger, Jan Ole Vollmer, Willy Scheibel, Jürgen Döllner, and Markus Bick, describes the development and implementation of Athena. This system optimizes trading strategies by integrating order books from multiple centralized crypto exchanges into a unified order book. Athena's smart order routing algorithm significantly reduces implicit trading costs, making it particularly beneficial for institutional investors in illiquid crypto markets.</p><p>The fourth paper, titled “Deeper: A Shared Liquidity DEX Design for Low Trading Volume Tokens to Enhance Average Liquidity,” by Srisht Fateh Singh, Panagiotis Michalopoulos, and Andreas Veneris, introduces Deeper, a decentralized exchange design aimed at improving liquidity for low trading volume tokens. By enabling liquidity providers to share reserves of a common token, Deeper addresses issues like high slippage and sandwich attacks. The paper demonstrates the enhanced liquidity achieved through historical price experiments and highlights potential risks for liquidity providers.</p><p>We believe that these four papers make significant cont","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2287","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141624577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Screen‐shooting resistant robust document watermarking in the Discrete Fourier Transform domain 离散傅里叶变换域中的抗屏幕拍摄稳健文件水印技术
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2024-06-02 DOI: 10.1002/nem.2278
Yazhou Zhang, Chaoyue Huang, Shaoteng Liu, Leichao Huang, Tianshu Yang, Xinpeng Zhang, Hanzhou Wu
Metaverse's augmented reality (AR) function allows virtual information to be seamlessly superimposed onto real scenes through the camera of a head‐mounted device. However, this raises concerns about privacy protection and copyright authentication when transmitting cross‐media information. Additionally, there is a risk of secret information leakage due to screen candid shooting in the real world. Ensuring information security and copyright authentication in case of unauthorized screen capturing is crucial. To prevent information loss and interference from cross‐media transfer between screens and cameras, we implement digital watermarking for copyright protection. We have proposed an innovative framework for automatic document watermarking that can resist screen‐shooting. Our approach involves embedding a ring watermark in the document underlay. On the extraction side, the watermark extraction process is divided into three key steps: automatic location, automatic correction, and automatic extraction. First, the document image is located in the covert photography. Then, perspective correction is performed based on the text line features of the document. Finally, the watermark information is extracted by combining the ring watermark features. Our method is capable of automatically extracting watermarks from covert photography while considering aspects such as concealment, robustness, and visual quality. The watermark is embedded in the document underlay, which ensures good visual quality and does not affect the normal reading and editing. We also propose various embedding strength schemes that can adapt to different usage scenarios, providing resistance to screen‐shooting or screenshot attacks, as well as various noise attacks. Through extensive experiments, we have demonstrated the feasibility of the proposed automated framework and the robustness of the watermarking algorithm, as well as the superiority and broad application prospects of our method.
Metaverse 的增强现实(AR)功能可通过头戴式设备的摄像头将虚拟信息无缝叠加到真实场景中。然而,这引发了人们对跨媒体信息传输时隐私保护和版权认证的担忧。此外,由于在现实世界中进行屏幕直拍,还存在秘密信息泄露的风险。在未经授权的屏幕捕捉情况下,确保信息安全和版权认证至关重要。为防止屏幕和摄像机之间的跨媒体传输造成信息丢失和干扰,我们实施了数字水印版权保护。我们提出了一种可抵御屏幕拍摄的自动文件水印创新框架。我们的方法是在文件底层嵌入环形水印。在提取方面,水印提取过程分为三个关键步骤:自动定位、自动校正和自动提取。首先,在隐蔽摄影中定位文档图像。然后,根据文档的文本行特征进行透视校正。最后,结合环形水印特征提取水印信息。我们的方法能够从隐蔽摄影中自动提取水印,同时考虑到隐蔽性、鲁棒性和视觉质量等方面。水印嵌入文档底层,保证了良好的视觉质量,不影响正常阅读和编辑。我们还提出了各种嵌入强度方案,以适应不同的使用场景,抵御屏幕拍摄或截图攻击以及各种噪声攻击。通过大量实验,我们证明了所提出的自动化框架的可行性和水印算法的鲁棒性,以及我们的方法的优越性和广阔的应用前景。
{"title":"Screen‐shooting resistant robust document watermarking in the Discrete Fourier Transform domain","authors":"Yazhou Zhang, Chaoyue Huang, Shaoteng Liu, Leichao Huang, Tianshu Yang, Xinpeng Zhang, Hanzhou Wu","doi":"10.1002/nem.2278","DOIUrl":"https://doi.org/10.1002/nem.2278","url":null,"abstract":"Metaverse's augmented reality (AR) function allows virtual information to be seamlessly superimposed onto real scenes through the camera of a head‐mounted device. However, this raises concerns about privacy protection and copyright authentication when transmitting cross‐media information. Additionally, there is a risk of secret information leakage due to screen candid shooting in the real world. Ensuring information security and copyright authentication in case of unauthorized screen capturing is crucial. To prevent information loss and interference from cross‐media transfer between screens and cameras, we implement digital watermarking for copyright protection. We have proposed an innovative framework for automatic document watermarking that can resist screen‐shooting. Our approach involves embedding a ring watermark in the document underlay. On the extraction side, the watermark extraction process is divided into three key steps: automatic location, automatic correction, and automatic extraction. First, the document image is located in the covert photography. Then, perspective correction is performed based on the text line features of the document. Finally, the watermark information is extracted by combining the ring watermark features. Our method is capable of automatically extracting watermarks from covert photography while considering aspects such as concealment, robustness, and visual quality. The watermark is embedded in the document underlay, which ensures good visual quality and does not affect the normal reading and editing. We also propose various embedding strength schemes that can adapt to different usage scenarios, providing resistance to screen‐shooting or screenshot attacks, as well as various noise attacks. Through extensive experiments, we have demonstrated the feasibility of the proposed automated framework and the robustness of the watermarking algorithm, as well as the superiority and broad application prospects of our method.","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"47 23","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141273737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1