首页 > 最新文献

2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)最新文献

英文 中文
Efficient and Privacy-Preserving Ad Conversion for V2X-Assisted Proximity Marketing v2x辅助近距离营销中高效且保护隐私的广告转换
Dongxiao Liu, Jianbing Ni, Hongwei Li, Xiaodong Lin, Xuemin Shen
Vehicle-to-Everything (V2X) assisted proximity marketing is one of the most promising V2X services due to its huge potential, and has attracted a lot of research efforts recently. In proximity marketing, roadside merchants rely on third-party ad networks to target their advertisements to nearby vehicles or pedestrians with related interests, and pay ad networks according to some pricing mechanisms, such as cost per-view. It is therefore important for merchants to learn ad conversion rate (how much of their revenue can be attributed to proximity marketing) such that merchants can adjust their advertising strategy. For ad conversion, two-party private set intersection (PSI) technique has been widely adopted, where ad networks and merchants can jointly compute ad conversion rate without leaking sensitive customer information. However, state-of-art literature on PSI either assumes the involved two parties honestly follow the protocol or only tolerates limited adversarial behaviors. In this paper, we first design a novel and efficient PSI scheme that is secure in the presence of malicious adversaries, where two parties can arbitrarily deviate from the scheme. By integrating an efficient input certification mechanism into the designed PSI scheme, we propose a privacy-preserving ad conversion protocol for V2X-assisted proximity marketing, that can achieve input privacy, unlinkability, unforgeability, and output verifiability. Security analysis demonstrates that the proposed ad conversion protocol is secure under cryptographic assumptions. Finally, we show that the proposed ad conversion protocol outperforms the state-of-art approaches when considering both security strength and computation complexity.
车辆到一切(V2X)辅助近距离营销由于其巨大的潜力而成为最有前途的V2X服务之一,最近吸引了大量的研究工作。在近距离营销中,路边商家依靠第三方广告网络向附近有相关兴趣的车辆或行人投放广告,并根据一些定价机制(如按次付费)向广告网络支付费用。因此,对于商家来说,了解广告转化率(他们的收入中有多少可以归因于邻近营销)是很重要的,这样商家就可以调整他们的广告策略。在广告转化方面,双方私集交叉(PSI)技术被广泛采用,该技术可以使广告网络和商家共同计算广告转化率,而不会泄露敏感的客户信息。然而,关于PSI的最新文献要么假设涉及的双方诚实地遵守协议,要么只容忍有限的对抗行为。在本文中,我们首先设计了一种新颖有效的PSI方案,该方案在恶意对手存在的情况下是安全的,其中双方可以任意偏离该方案。通过将有效的输入认证机制集成到所设计的PSI方案中,我们提出了一种用于v2x辅助邻近营销的隐私保护广告转换协议,该协议可以实现输入隐私性、不可链接性、不可伪造性和输出可验证性。安全性分析表明,在密码学假设下,所提出的广告转换协议是安全的。最后,我们证明了所提出的广告转换协议在考虑安全强度和计算复杂性时优于目前的方法。
{"title":"Efficient and Privacy-Preserving Ad Conversion for V2X-Assisted Proximity Marketing","authors":"Dongxiao Liu, Jianbing Ni, Hongwei Li, Xiaodong Lin, Xuemin Shen","doi":"10.1109/MASS.2018.00014","DOIUrl":"https://doi.org/10.1109/MASS.2018.00014","url":null,"abstract":"Vehicle-to-Everything (V2X) assisted proximity marketing is one of the most promising V2X services due to its huge potential, and has attracted a lot of research efforts recently. In proximity marketing, roadside merchants rely on third-party ad networks to target their advertisements to nearby vehicles or pedestrians with related interests, and pay ad networks according to some pricing mechanisms, such as cost per-view. It is therefore important for merchants to learn ad conversion rate (how much of their revenue can be attributed to proximity marketing) such that merchants can adjust their advertising strategy. For ad conversion, two-party private set intersection (PSI) technique has been widely adopted, where ad networks and merchants can jointly compute ad conversion rate without leaking sensitive customer information. However, state-of-art literature on PSI either assumes the involved two parties honestly follow the protocol or only tolerates limited adversarial behaviors. In this paper, we first design a novel and efficient PSI scheme that is secure in the presence of malicious adversaries, where two parties can arbitrarily deviate from the scheme. By integrating an efficient input certification mechanism into the designed PSI scheme, we propose a privacy-preserving ad conversion protocol for V2X-assisted proximity marketing, that can achieve input privacy, unlinkability, unforgeability, and output verifiability. Security analysis demonstrates that the proposed ad conversion protocol is secure under cryptographic assumptions. Finally, we show that the proposed ad conversion protocol outperforms the state-of-art approaches when considering both security strength and computation complexity.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132115328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
GreenMap: Approximated Filtering Towards Energy-Aware Crowdsensing for Indoor Mapping GreenMap:面向室内地图的能量感知人群感知的近似滤波
Johannes Kässinger, Mohamed Abdelaal, Frank Dürr, K. Rothermel
Recently, mobile crowdsensing has become an appealing paradigm thanks to the ubiquitous presence of powerful mobile devices. Indoor mapping, as an example of crowdsensingdriven applications, is essential to provide many indoor locationbased services, such as emergency response, security, and tracking/navigation in large buildings. In this realm, 3D point clouds stand as an optimal data type which can be crowdsensed—using currently-available mobile devices, e.g. Google Tango, Microsoft Hololens and Apple ARKit—to generate floor plans with different levels of detail, i.e. 2D and 3D mapping. However, collecting such bulky data from "resources-limited" mobile devices can significantly harm their energy efficiency. To overcome this challenge, we introduce GreenMap, an energy-aware architectural framework for automatically mapping the interior spaces using crowdsensed point clouds with the support of structural information encoded in formal grammars. GreenMap reduces the energy overhead through projecting the point clouds to several filtration steps on the mobile devices. In this context, GreenMap leverages the potential of approximate computing to reduce the computational cost of data filtering while maintaining a satisfactory level of modeding accuracy. To this end, we propose two approximation strategies, namely DyPR and SuFFUSION. To demonstrate the effectiveness of GreenMap, we implemented a crowdsensing Android App to collect 3D point clouds from two different buildings. We show that GreenMap achieves significant energy savings of up to 67.8%, compared to the baseline methods, while generating comparable floor plans.
最近,由于强大的移动设备无处不在,移动众测已经成为一种吸引人的范例。室内测绘作为众感驱动应用的一个例子,对于提供许多基于室内位置的服务至关重要,例如大型建筑物中的应急响应、安全和跟踪/导航。在这个领域,3D点云是一种最佳的数据类型,可以通过使用当前可用的移动设备(如谷歌Tango、微软Hololens和苹果arkit)进行众感,生成具有不同细节级别的平面图,即2D和3D地图。然而,从“资源有限”的移动设备收集如此庞大的数据可能会严重损害它们的能源效率。为了克服这一挑战,我们引入了GreenMap,这是一个能源感知的建筑框架,可以在形式语法编码的结构信息的支持下,使用众感点云自动映射内部空间。GreenMap通过将点云投影到移动设备上的几个过滤步骤来减少能量开销。在这种情况下,GreenMap利用近似计算的潜力来降低数据过滤的计算成本,同时保持令人满意的建模精度。为此,我们提出了两种近似策略,即DyPR和SuFFUSION。为了证明GreenMap的有效性,我们实现了一个众感Android应用程序,从两个不同的建筑物中收集3D点云。我们表明,与基线方法相比,GreenMap实现了高达67.8%的显著节能,同时生成了可比较的平面图。
{"title":"GreenMap: Approximated Filtering Towards Energy-Aware Crowdsensing for Indoor Mapping","authors":"Johannes Kässinger, Mohamed Abdelaal, Frank Dürr, K. Rothermel","doi":"10.1109/MASS.2018.00069","DOIUrl":"https://doi.org/10.1109/MASS.2018.00069","url":null,"abstract":"Recently, mobile crowdsensing has become an appealing paradigm thanks to the ubiquitous presence of powerful mobile devices. Indoor mapping, as an example of crowdsensingdriven applications, is essential to provide many indoor locationbased services, such as emergency response, security, and tracking/navigation in large buildings. In this realm, 3D point clouds stand as an optimal data type which can be crowdsensed—using currently-available mobile devices, e.g. Google Tango, Microsoft Hololens and Apple ARKit—to generate floor plans with different levels of detail, i.e. 2D and 3D mapping. However, collecting such bulky data from \"resources-limited\" mobile devices can significantly harm their energy efficiency. To overcome this challenge, we introduce GreenMap, an energy-aware architectural framework for automatically mapping the interior spaces using crowdsensed point clouds with the support of structural information encoded in formal grammars. GreenMap reduces the energy overhead through projecting the point clouds to several filtration steps on the mobile devices. In this context, GreenMap leverages the potential of approximate computing to reduce the computational cost of data filtering while maintaining a satisfactory level of modeding accuracy. To this end, we propose two approximation strategies, namely DyPR and SuFFUSION. To demonstrate the effectiveness of GreenMap, we implemented a crowdsensing Android App to collect 3D point clouds from two different buildings. We show that GreenMap achieves significant energy savings of up to 67.8%, compared to the baseline methods, while generating comparable floor plans.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132396014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Q-Learning Based Edge Caching Optimization for D2D Enabled Hierarchical Wireless Networks 基于q学习的D2D分层无线网络边缘缓存优化
Chenyang Wang, Shanjia Wang, Ding Li, Xiaofei Wang, Xiuhua Li, Victor C. M. Leung
Caching at the edge of mobile networks can significantly offload network traffic while satisfying content requests from mobile users locally. The contents can be requested from the proximity users via Device-to-device (D2D) communications while proactive caching the popular content to local users. However, the assumptions that content popularity is equal to user preference in several existing studies, which are invalid and not rigorous due to the fact that content popularity is calculated by the statistic of user requests within a certain period while user preference reflects the probability of a content requested by the individual user. Motivated by this, in this paper, we study the edge caching optimization of hierarchical wireless networks. Our aiming is to maximize the size of content offload by D2D communications. In particular, the edge caching policy with D2D sharing model based on the analysis of user mobility and social relationship is derived. We first prove the problem is NP-hard and then formulate it as a Markov Decision Process (MDP) problem, finally a Q-learning based distributed content replacement strategy is proposed. The large-scale real trace based experiment results show the effectiveness of our proposed framework.
移动网络边缘的缓存可以显著减轻网络流量,同时满足本地移动用户的内容请求。可以通过设备到设备(D2D)通信从邻近用户请求内容,同时主动将流行内容缓存给本地用户。然而,在现有的一些研究中,内容流行度等于用户偏好的假设是无效的,不严谨的,因为内容流行度是通过统计用户在一定时期内的请求量来计算的,而用户偏好反映的是单个用户请求某内容的概率。基于此,本文对分层无线网络的边缘缓存优化问题进行了研究。我们的目标是通过D2D通信最大化内容卸载的大小。特别是在分析用户移动性和社会关系的基础上,推导了具有D2D共享模型的边缘缓存策略。首先证明该问题是np困难问题,然后将其表述为马尔可夫决策过程(MDP)问题,最后提出了一种基于q学习的分布式内容替换策略。基于大规模真实轨迹的实验结果表明了该框架的有效性。
{"title":"Q-Learning Based Edge Caching Optimization for D2D Enabled Hierarchical Wireless Networks","authors":"Chenyang Wang, Shanjia Wang, Ding Li, Xiaofei Wang, Xiuhua Li, Victor C. M. Leung","doi":"10.1109/MASS.2018.00019","DOIUrl":"https://doi.org/10.1109/MASS.2018.00019","url":null,"abstract":"Caching at the edge of mobile networks can significantly offload network traffic while satisfying content requests from mobile users locally. The contents can be requested from the proximity users via Device-to-device (D2D) communications while proactive caching the popular content to local users. However, the assumptions that content popularity is equal to user preference in several existing studies, which are invalid and not rigorous due to the fact that content popularity is calculated by the statistic of user requests within a certain period while user preference reflects the probability of a content requested by the individual user. Motivated by this, in this paper, we study the edge caching optimization of hierarchical wireless networks. Our aiming is to maximize the size of content offload by D2D communications. In particular, the edge caching policy with D2D sharing model based on the analysis of user mobility and social relationship is derived. We first prove the problem is NP-hard and then formulate it as a Markov Decision Process (MDP) problem, finally a Q-learning based distributed content replacement strategy is proposed. The large-scale real trace based experiment results show the effectiveness of our proposed framework.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116819808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
BF-IoT: Securing the IoT Networks via Fingerprinting-Based Device Authentication BF-IoT:通过基于指纹的设备认证保护物联网网络
Tianbo Gu, P. Mohapatra
Bluetooth low energy (BLE) based devices are already deployed in massive quantity as Internet-of-things (IoT) becomes prominent in the last two decades. In order to lower the energy consumption, BLE devices have to compromise with security and privacy problems. Existing research work shows that BLE devices can be easily spoofed and leveraged to gain access to a networking system. In this paper, we propose BF-IoT, the first IoT secure communication framework for BLE-based networks that guards against device spoofing via monitoring the work-life cycles of devices. We dig into the BLE protocol stack and extract the unique network-flow features from the link layer and ATT/GATT service layer so as to generate the fingerprints for device authentication. BF-IoT provides two-phase defense against malicious entities: continuously authenticating device identity before the connection setup and during session establishment. We build a customized system to validate the effectiveness of our mechanism. We extensively evaluate BF-IoT with a dozen of different off-the-shelf commodity IoT devices which shows that the devices can be accurately authenticated via only sniffing the transmission characteristics.
在过去的二十年里,随着物联网(IoT)的发展,基于蓝牙低功耗(BLE)的设备已经大量部署。为了降低能耗,BLE设备必须在安全和隐私问题上妥协。现有的研究工作表明,BLE设备很容易被欺骗,并被利用来访问网络系统。在本文中,我们提出了BF-IoT,这是基于ble的网络的第一个物联网安全通信框架,通过监控设备的工作生命周期来防止设备欺骗。我们深入挖掘BLE协议栈,从链路层和ATT/GATT业务层提取独特的网络流特征,生成用于设备认证的指纹。针对恶意实体,BF-IoT提供了两阶段的防御:连接建立前和会话建立过程中对设备身份进行持续认证。我们建立了一个定制的系统来验证我们机制的有效性。我们用十几种不同的现成商品物联网设备对BF-IoT进行了广泛的评估,结果表明,这些设备可以通过嗅探传输特征来准确地进行身份验证。
{"title":"BF-IoT: Securing the IoT Networks via Fingerprinting-Based Device Authentication","authors":"Tianbo Gu, P. Mohapatra","doi":"10.1109/MASS.2018.00047","DOIUrl":"https://doi.org/10.1109/MASS.2018.00047","url":null,"abstract":"Bluetooth low energy (BLE) based devices are already deployed in massive quantity as Internet-of-things (IoT) becomes prominent in the last two decades. In order to lower the energy consumption, BLE devices have to compromise with security and privacy problems. Existing research work shows that BLE devices can be easily spoofed and leveraged to gain access to a networking system. In this paper, we propose BF-IoT, the first IoT secure communication framework for BLE-based networks that guards against device spoofing via monitoring the work-life cycles of devices. We dig into the BLE protocol stack and extract the unique network-flow features from the link layer and ATT/GATT service layer so as to generate the fingerprints for device authentication. BF-IoT provides two-phase defense against malicious entities: continuously authenticating device identity before the connection setup and during session establishment. We build a customized system to validate the effectiveness of our mechanism. We extensively evaluate BF-IoT with a dozen of different off-the-shelf commodity IoT devices which shows that the devices can be accurately authenticated via only sniffing the transmission characteristics.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114621391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Hierarchical Routing for Unmanned Aerial Vehicle Relayed Tactical Ad Hoc Networks 无人机中继战术自组织网络的分层路由
Beomsu Kim, Ki-Il Kim, Bongsoo Roh, Hyungseok Choi
In this paper, we present dynamic clustering scheme and hierarchical routing for Unmanned Aerial Vehicle (UAV) relayed tactical ad hoc networks. The simulation results are given to prove the higher packet deliver ratio and shorter end-to-end delay through the proposed scheme than typical routing protocol in tactical ad hoc networks.
针对无人机中继战术自组织网络,提出了动态聚类和分层路由方案。仿真结果表明,与战术自组网中的典型路由协议相比,该方案具有更高的分组投递率和更短的端到端时延。
{"title":"Hierarchical Routing for Unmanned Aerial Vehicle Relayed Tactical Ad Hoc Networks","authors":"Beomsu Kim, Ki-Il Kim, Bongsoo Roh, Hyungseok Choi","doi":"10.1109/MASS.2018.00034","DOIUrl":"https://doi.org/10.1109/MASS.2018.00034","url":null,"abstract":"In this paper, we present dynamic clustering scheme and hierarchical routing for Unmanned Aerial Vehicle (UAV) relayed tactical ad hoc networks. The simulation results are given to prove the higher packet deliver ratio and shorter end-to-end delay through the proposed scheme than typical routing protocol in tactical ad hoc networks.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132733190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Minimum Cost Seed Selection for Multiple Influences Diffusion in Communities 多元影响在社区传播的最小成本种子选择
Guoju Gao, Mingjun Xiao, Jie Wu, He Huang, Guoliang Chen
Recently, influence maximization in social networks has attracted great attention. In this paper, we consider that a company intends to select some users to promote its multiple products (called influences) in online social network consisting of many communities, in which each user has different preferences for each influence. We focus on the Minimum Cost Seed Selection (MCSS) problem for multiple influences, that is, how to select some seeds with minimum cost so that the average influenced probability of all users in each community is not less than a threshold. To solve the MCSS problem, we design a submodular utility function, based on which we turn our problem into a non-trivial set cover problem with non-linear constraints. After proving the NP-hardness of MCSS, we propose a greedy algorithm, called G-MCSS, to solve it. We analyze the approximation ratio of G-MCSS. Additionally, we extend the MCSS problem to a complex case, where the number of acceptable influences for each user is limited, and the cost is proportional to the number of allocated influences. We further propose another greedy algorithm to solve the extended problem. Finally, we demonstrate the significant performances of our algorithms through extensive experiments based on real social network traces.
近年来,社交网络中的影响力最大化问题备受关注。在本文中,我们认为一家公司打算在由许多社区组成的在线社交网络中选择一些用户来推广其多种产品(称为影响力),其中每个用户对每种影响力都有不同的偏好。研究了多影响的最小代价种子选择问题,即如何选择一些代价最小的种子,使每个社区中所有用户的平均影响概率不小于一个阈值。为了解决MCSS问题,我们设计了一个子模块实用函数,在此基础上将问题转化为具有非线性约束的非平凡集覆盖问题。在证明了MCSS的np -硬度之后,我们提出了一种贪心算法G-MCSS来解决它。我们分析了G-MCSS的近似比。此外,我们将MCSS问题扩展到一个复杂的情况,其中每个用户可接受的影响数量是有限的,并且成本与分配的影响数量成正比。我们进一步提出了另一种贪心算法来解决扩展问题。最后,我们通过基于真实社交网络痕迹的大量实验证明了我们的算法的显著性能。
{"title":"Minimum Cost Seed Selection for Multiple Influences Diffusion in Communities","authors":"Guoju Gao, Mingjun Xiao, Jie Wu, He Huang, Guoliang Chen","doi":"10.1109/MASS.2018.00048","DOIUrl":"https://doi.org/10.1109/MASS.2018.00048","url":null,"abstract":"Recently, influence maximization in social networks has attracted great attention. In this paper, we consider that a company intends to select some users to promote its multiple products (called influences) in online social network consisting of many communities, in which each user has different preferences for each influence. We focus on the Minimum Cost Seed Selection (MCSS) problem for multiple influences, that is, how to select some seeds with minimum cost so that the average influenced probability of all users in each community is not less than a threshold. To solve the MCSS problem, we design a submodular utility function, based on which we turn our problem into a non-trivial set cover problem with non-linear constraints. After proving the NP-hardness of MCSS, we propose a greedy algorithm, called G-MCSS, to solve it. We analyze the approximation ratio of G-MCSS. Additionally, we extend the MCSS problem to a complex case, where the number of acceptable influences for each user is limited, and the cost is proportional to the number of allocated influences. We further propose another greedy algorithm to solve the extended problem. Finally, we demonstrate the significant performances of our algorithms through extensive experiments based on real social network traces.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130515683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Web Attack Detection Technology Based on Bag of Words and Hidden Markov Model 基于词袋和隐马尔可夫模型的Web攻击检测技术
Xin Ren, Yupeng Hu, Wenxin Kuang, Mohamadou Ballo Souleymanou
An effective web attack detection method appears as a natural solution to protect web security, as they help to protect web applications. The traditional method of detecting web attacks is to encode the attack features manually into corresponding rules for detection. With the diversification of web attack methods, the demerits of the traditional methods have become increasingly noticeable. With the rapid development of high-performance computing and expansion of data volume, machine learning methods can obtain more efficient and accurate web attacks detection. In this paper, we exploit a bag of words based (BOW) model to extract features and further efficiently detect web attacks with hidden Markov algorithms. The experimental results show that, compared with the previous experiments of N-gram extraction feature algorithm, BOW has higher detection rate and lower false alarm rate with a lower cost. Finally, satisfactory results in the real environment are also achieved.
有效的web攻击检测方法可以保护web应用程序,是保护web安全的自然解决方案。传统的web攻击检测方法是将攻击特征手工编码成相应的检测规则。随着web攻击方法的多样化,传统攻击方法的弊端日益凸显。随着高性能计算的快速发展和数据量的不断扩大,机器学习方法可以获得更加高效、准确的web攻击检测。在本文中,我们利用基于词包(BOW)模型来提取特征,并进一步利用隐马尔可夫算法有效地检测web攻击。实验结果表明,与以往的n图提取特征算法相比,BOW具有更高的检测率和更低的虚警率,且成本更低。最后,在实际环境中也取得了令人满意的效果。
{"title":"A Web Attack Detection Technology Based on Bag of Words and Hidden Markov Model","authors":"Xin Ren, Yupeng Hu, Wenxin Kuang, Mohamadou Ballo Souleymanou","doi":"10.1109/MASS.2018.00081","DOIUrl":"https://doi.org/10.1109/MASS.2018.00081","url":null,"abstract":"An effective web attack detection method appears as a natural solution to protect web security, as they help to protect web applications. The traditional method of detecting web attacks is to encode the attack features manually into corresponding rules for detection. With the diversification of web attack methods, the demerits of the traditional methods have become increasingly noticeable. With the rapid development of high-performance computing and expansion of data volume, machine learning methods can obtain more efficient and accurate web attacks detection. In this paper, we exploit a bag of words based (BOW) model to extract features and further efficiently detect web attacks with hidden Markov algorithms. The experimental results show that, compared with the previous experiments of N-gram extraction feature algorithm, BOW has higher detection rate and lower false alarm rate with a lower cost. Finally, satisfactory results in the real environment are also achieved.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130305702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Deep Learning Based Urban Post-Accidental Congestion Prediction 基于深度学习的城市事故后拥堵预测
Mingming Lu, Kunfang Zhang, Junyan Wu, D. Tan
Urban roads tend to cause traffic congestion for a long time after the occurrence of traffic accidents, which greatly affects daily transportations. Therefore, the prediction of the duration of traffic jams caused by traffic accidents can allocate traffic resources more reasonably and effectively, release induced traffic information, avoid secondary congestion, and quickly handle traffic accidents. It is of great significance to the rapid rescue of traffic accidents and to eliminate traffic safety hazards. In response to this hot issue, many scholars have done a lot of researches through numerous models, such as probability distribution and time series, and artificial neural networks. However, these models usually only consider temporal features or are based on shallow networks. Therefore, this work adopts a hybrid deep spatial-temporal residual neural network HD-SP-ResNet to predict the traffic volume and velocity, as well as the road congestion duration after traffic accident, so as to monitor and dispatch real-time traffic, response to the postaccidental congestion in time, in order to reduce the various losses incurred by congestion and improve people's satisfaction with traffic on the road. To verify the effectiveness of the proposed model, we conduct extensive experiments based on the taxi trajectory data and road accident data in Shanghai. The experiment results show that the proposed model can achieve a relatively accurate prediction on traffic volume and velocity, as well as the post-accidental congestion duration.
城市道路在发生交通事故后很长一段时间内容易造成交通拥堵,严重影响日常交通。因此,对交通事故导致的交通拥堵持续时间进行预测,可以更合理有效地配置交通资源,释放诱导交通信息,避免二次拥堵,快速处理交通事故。对快速抢救交通事故,消除交通安全隐患具有重要意义。针对这一热点问题,许多学者通过概率分布、时间序列、人工神经网络等众多模型进行了大量的研究。然而,这些模型通常只考虑时间特征或基于浅网络。因此,本工作采用混合深度时空残差神经网络HD-SP-ResNet对交通事故发生后的交通量、速度以及道路拥堵持续时间进行预测,实时监控和调度交通,及时响应事故后的拥堵,以减少拥堵带来的各种损失,提高人们对道路交通的满意度。为了验证所提出模型的有效性,我们基于上海的出租车轨迹数据和道路事故数据进行了大量的实验。实验结果表明,该模型能够较准确地预测交通流量和速度,以及事故后拥堵持续时间。
{"title":"Deep Learning Based Urban Post-Accidental Congestion Prediction","authors":"Mingming Lu, Kunfang Zhang, Junyan Wu, D. Tan","doi":"10.1109/MASS.2018.00035","DOIUrl":"https://doi.org/10.1109/MASS.2018.00035","url":null,"abstract":"Urban roads tend to cause traffic congestion for a long time after the occurrence of traffic accidents, which greatly affects daily transportations. Therefore, the prediction of the duration of traffic jams caused by traffic accidents can allocate traffic resources more reasonably and effectively, release induced traffic information, avoid secondary congestion, and quickly handle traffic accidents. It is of great significance to the rapid rescue of traffic accidents and to eliminate traffic safety hazards. In response to this hot issue, many scholars have done a lot of researches through numerous models, such as probability distribution and time series, and artificial neural networks. However, these models usually only consider temporal features or are based on shallow networks. Therefore, this work adopts a hybrid deep spatial-temporal residual neural network HD-SP-ResNet to predict the traffic volume and velocity, as well as the road congestion duration after traffic accident, so as to monitor and dispatch real-time traffic, response to the postaccidental congestion in time, in order to reduce the various losses incurred by congestion and improve people's satisfaction with traffic on the road. To verify the effectiveness of the proposed model, we conduct extensive experiments based on the taxi trajectory data and road accident data in Shanghai. The experiment results show that the proposed model can achieve a relatively accurate prediction on traffic volume and velocity, as well as the post-accidental congestion duration.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114190566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast Interference-Aware Scheduling of Multiple Wireless Chargers 多无线充电器的快速抗干扰调度
Zhi Ma, Jie Wu, S. Zhang, Sanglu Lu
Nowadays, breakthroughs in wireless power transfer make it possible to transfer energy over a long distance. Existing works mainly focused on maximizing network lifetime, optimizing charging efficiency, and optimizing charging quality. All these works use a charging model with the linear superposition, which may not be the most accurate in a real life situation. We use a concurrent charging model, which has a nonlinear superposition, and we consider the Fast Charging Scheduling problem (FCS): given multiple chargers and a group of sensor nodes, how can the chargers be optimally scheduled over the time dimension so that the total charging time is minimized and each sensor node has at least energy E? We prove that FCS is NP-complete and propose algorithms to solve the problem in 1D line and 2D plane respectively. Unlike other algorithms, our algorithm does not need to calculate the combined energy of every possible combination of chargers in advance, which greatly reduces the complexity. We obtain a bound in 2D cases when chargers and sensors are uniformly distributed. Extensive simulations demonstrate that the performance of our algorithm is almost as good as the optimal algorithm when the distribution of chargers is not very dense.
如今,无线传输技术的突破使远距离传输能量成为可能。现有工作主要集中在网络寿命最大化、充电效率优化、充电质量优化等方面。所有这些作品都使用了线性叠加的充电模型,这在现实生活中可能不是最准确的。本文采用具有非线性叠加的并行充电模型,考虑快速充电调度问题(FCS):给定多个充电器和一组传感器节点,如何在时间维度上对充电器进行优化调度,使总充电时间最小,且每个传感器节点的能量最少E?我们证明了FCS是np完全的,并分别在一维直线和二维平面上提出了求解该问题的算法。与其他算法不同的是,我们的算法不需要提前计算每一个可能的充电器组合的总能量,大大降低了复杂度。在二维情况下,我们得到了充电器和传感器均匀分布的边界。大量的仿真表明,当充电器分布不是很密集时,我们的算法的性能几乎与最优算法一样好。
{"title":"Fast Interference-Aware Scheduling of Multiple Wireless Chargers","authors":"Zhi Ma, Jie Wu, S. Zhang, Sanglu Lu","doi":"10.1109/MASS.2018.00057","DOIUrl":"https://doi.org/10.1109/MASS.2018.00057","url":null,"abstract":"Nowadays, breakthroughs in wireless power transfer make it possible to transfer energy over a long distance. Existing works mainly focused on maximizing network lifetime, optimizing charging efficiency, and optimizing charging quality. All these works use a charging model with the linear superposition, which may not be the most accurate in a real life situation. We use a concurrent charging model, which has a nonlinear superposition, and we consider the Fast Charging Scheduling problem (FCS): given multiple chargers and a group of sensor nodes, how can the chargers be optimally scheduled over the time dimension so that the total charging time is minimized and each sensor node has at least energy E? We prove that FCS is NP-complete and propose algorithms to solve the problem in 1D line and 2D plane respectively. Unlike other algorithms, our algorithm does not need to calculate the combined energy of every possible combination of chargers in advance, which greatly reduces the complexity. We obtain a bound in 2D cases when chargers and sensors are uniformly distributed. Extensive simulations demonstrate that the performance of our algorithm is almost as good as the optimal algorithm when the distribution of chargers is not very dense.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115689754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Low-Latency Authentication Against Satellite Compromising for Space Information Network 空间信息网络抗卫星入侵低延迟认证
W. Meng, Kaiping Xue, Jie Xu, Jianan Hong, Nenghai Yu
With an advancement of mobile communication technology, the space information network (SIN) has been proposed to meet the increasing demands of mobile communication due to its advantage of providing great expanding access services. In SIN, authentication is significant for the security to prevent the network resource from unauthorized access. However, the features of highly exposed links and extremely high propagation delay make it difficult to design a secure and fast authentication scheme for SIN. Although some existing researches have tried to design authentication protocols for SIN, they haven't taken the intolerable authentication delay and the risk of satellite compromising into consideration. Faced with these problems, we design a proxy signature-based authentication scheme for SIN, in which, the interaction process of authentication can be only implemented between the mobile user and the satellite node, thus reducing the long authentication implementation delay. Furthermore, we utilize the proxy signature to mitigate the risk of satellites being attacked. The results of security and performance analysis show that the proposed scheme can provide the required security and largely reduce the authentication latency.
随着移动通信技术的发展,空间信息网(SIN)以其提供可扩展的接入服务的优势被提出以满足日益增长的移动通信需求。在网络安全中,身份验证对于防止网络资源被非法访问具有重要的安全意义。然而,由于链路高度暴露和传输时延极高的特点,使得设计一种安全、快速的认证方案变得困难。虽然已有的一些研究尝试设计了SIN的认证协议,但没有考虑到无法忍受的认证延迟和卫星妥协的风险。面对这些问题,我们设计了一种基于代理签名的SIN认证方案,该方案中认证的交互过程只在移动用户和卫星节点之间实现,从而减少了较长的认证实现延迟。此外,我们利用代理签名来降低卫星被攻击的风险。安全性和性能分析结果表明,该方案能够提供所需的安全性,并大大降低了认证延迟。
{"title":"Low-Latency Authentication Against Satellite Compromising for Space Information Network","authors":"W. Meng, Kaiping Xue, Jie Xu, Jianan Hong, Nenghai Yu","doi":"10.1109/MASS.2018.00045","DOIUrl":"https://doi.org/10.1109/MASS.2018.00045","url":null,"abstract":"With an advancement of mobile communication technology, the space information network (SIN) has been proposed to meet the increasing demands of mobile communication due to its advantage of providing great expanding access services. In SIN, authentication is significant for the security to prevent the network resource from unauthorized access. However, the features of highly exposed links and extremely high propagation delay make it difficult to design a secure and fast authentication scheme for SIN. Although some existing researches have tried to design authentication protocols for SIN, they haven't taken the intolerable authentication delay and the risk of satellite compromising into consideration. Faced with these problems, we design a proxy signature-based authentication scheme for SIN, in which, the interaction process of authentication can be only implemented between the mobile user and the satellite node, thus reducing the long authentication implementation delay. Furthermore, we utilize the proxy signature to mitigate the risk of satellites being attacked. The results of security and performance analysis show that the proposed scheme can provide the required security and largely reduce the authentication latency.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115771135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1