首页 > 最新文献

2017 IEEE Trustcom/BigDataSE/ICESS最新文献

英文 中文
Digital Witness and Privacy in IoT: Anonymous Witnessing Approach 物联网中的数字见证与隐私:匿名见证方法
Pub Date : 2017-08-01 DOI: 10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.295
Ana Nieto, Ruben Rios, Javier López
The digital witness approach defines the collaboration between IoT devices - from wearables to vehicles - to provide digital evidence through a Digital Chain of Custody to an authorised entity. As one of the cores of the digital witness, binding credentials unequivocally identify the user behind the digital witness. The objective of this article is to perform a critical analysis of the digital witness approach from the perspective of privacy, and to propose solutions that help include some notions of privacy in the scheme (for those cases where it is possible). In addition, digital anonymous witnessing as a tradeoff mechanism between the original approach and privacy requirements is proposed. This is a clear challenge in this context given the restriction that the identities of the links in the digital chain of custody should be known.
数字证人方法定义了物联网设备(从可穿戴设备到车辆)之间的协作,通过数字监管链向授权实体提供数字证据。作为数字见证的核心之一,绑定凭证明确地标识了数字见证背后的用户。本文的目的是从隐私的角度对数字证人方法进行批判性分析,并提出有助于在方案中包含一些隐私概念的解决方案(对于可能的情况)。此外,提出了数字匿名见证作为原始方法和隐私要求之间的权衡机制。鉴于数字监管链中链接的身份应该是已知的限制,这在这种情况下是一个明显的挑战。
{"title":"Digital Witness and Privacy in IoT: Anonymous Witnessing Approach","authors":"Ana Nieto, Ruben Rios, Javier López","doi":"10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.295","DOIUrl":"https://doi.org/10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.295","url":null,"abstract":"The digital witness approach defines the collaboration between IoT devices - from wearables to vehicles - to provide digital evidence through a Digital Chain of Custody to an authorised entity. As one of the cores of the digital witness, binding credentials unequivocally identify the user behind the digital witness. The objective of this article is to perform a critical analysis of the digital witness approach from the perspective of privacy, and to propose solutions that help include some notions of privacy in the scheme (for those cases where it is possible). In addition, digital anonymous witnessing as a tradeoff mechanism between the original approach and privacy requirements is proposed. This is a clear challenge in this context given the restriction that the identities of the links in the digital chain of custody should be known.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133725013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-Parties 基于两方加密数据集的外包保密ID3决策树算法
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.354
Ye Li, Z. L. Jiang, Xuan Wang, S. Yiu, Peng Zhang
ID3 decision tree data mining is a popular and widely studied data analysis technique for a range of applications. In this paper, we focus on the privacy-preserving ID3 decision tree algorithm on horizontally partitioned datasets. In such a scenario, data owners wish to learn the decision tree result from a collective data set but disclose minimal information about their own sensitive data. In this paper, we consider a scenario in which multiple parties with weak computational power need to run an ID3 algorithm on their databases jointly while simultaneously outsourcing most of the computation of the protocol and databases to the cloud. In such a scenario, each party can have the correct result calculated on the data from all the parties with most of the computation outsourced to the cloud. Concerning privacy, the data owned by each party should be kept confidential from both the other parties and the cloud. To ensure data privacy, we modify the Secure Equivalent Testing Protocol (SET) and design the Outsourced Secure Shared xlnx Protocol (OSSx ln x) and other sub-protocols. We then propose a cloud-aided ID3 solution based on these protocols, which is used to build an outsourced privacy-preserving ID3 data mining solution.
ID3决策树数据挖掘是一种流行且被广泛研究的数据分析技术,具有广泛的应用前景。本文研究了水平分割数据集上的隐私保护的ID3决策树算法。在这样的场景中,数据所有者希望从一个集合数据集中学习决策树的结果,但对他们自己的敏感数据披露的信息最少。在本文中,我们考虑了这样一种场景:计算能力较弱的多方需要在各自的数据库上共同运行一个ID3算法,同时将协议和数据库的大部分计算外包给云。在这种情况下,每一方都可以根据来自所有各方的数据计算出正确的结果,并将大部分计算外包给云。在隐私方面,每一方拥有的数据都应该对另一方和云保密。为了保证数据的隐私性,我们修改了安全等效测试协议(SET),设计了外包安全共享xlnx协议(ossxlnx)和其他子协议。然后,我们提出了基于这些协议的云辅助ID3解决方案,并使用该解决方案构建了一个外包的隐私保护ID3数据挖掘解决方案。
{"title":"Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-Parties","authors":"Ye Li, Z. L. Jiang, Xuan Wang, S. Yiu, Peng Zhang","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.354","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.354","url":null,"abstract":"ID3 decision tree data mining is a popular and widely studied data analysis technique for a range of applications. In this paper, we focus on the privacy-preserving ID3 decision tree algorithm on horizontally partitioned datasets. In such a scenario, data owners wish to learn the decision tree result from a collective data set but disclose minimal information about their own sensitive data. In this paper, we consider a scenario in which multiple parties with weak computational power need to run an ID3 algorithm on their databases jointly while simultaneously outsourcing most of the computation of the protocol and databases to the cloud. In such a scenario, each party can have the correct result calculated on the data from all the parties with most of the computation outsourced to the cloud. Concerning privacy, the data owned by each party should be kept confidential from both the other parties and the cloud. To ensure data privacy, we modify the Secure Equivalent Testing Protocol (SET) and design the Outsourced Secure Shared xlnx Protocol (OSSx ln x) and other sub-protocols. We then propose a cloud-aided ID3 solution based on these protocols, which is used to build an outsourced privacy-preserving ID3 data mining solution.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134036861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Reconfigurable High-Speed ECC Processor Over NIST Primes 基于NIST质数的可重构高速ECC处理器
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.353
Jinnan Ding, Shuguo Li
Elliptic curve cryptography (ECC) is widely used in the field of cyber security such as TLS protocol. Compared with symmetric cryptography, the computation of ECC is much slower. In this paper, a reconfigurable high-speed processor supporting all currently used NIST primes on FPGA platform is constructed. The modular addition and substraction is eliminated in our design by applying lazy reduction strategy. Throughput of modular multiplication is improved significantly with Karatsuba algorithm and compact pipeline schedule. The latency of modular inverse is tactfully avoided by pipeline coverage at the level of scalar multiplication. Furthermore, Montgomery-ladder algorithm and base-point randomization is applied to resist side-channel and timing attacks. Most of these techniques can also be used in software designs. Compared with previous works, our FPGA design outperforms times of others in term of scalar multiplication performance, while the hardware cost remains moderate, which makes it suitable for computation-intensive applications.
椭圆曲线加密(ECC)在网络安全领域的应用非常广泛,如TLS协议。与对称密码学相比,ECC的计算速度要慢得多。本文在FPGA平台上构建了一种支持现有NIST质数的可重构高速处理器。通过采用延迟约简策略,我们的设计消除了模块化的加减法。采用Karatsuba算法和紧凑的流水线调度,显著提高了模乘法的吞吐量。通过在标量乘法级别上的管道覆盖,巧妙地避免了模逆的延迟。在此基础上,采用Montgomery-ladder算法和基点随机化来抵御侧信道攻击和定时攻击。这些技术中的大多数也可以用于软件设计。与以往的工作相比,我们的FPGA设计在标量乘法性能方面优于其他FPGA设计,而硬件成本仍然适中,适合计算密集型应用。
{"title":"A Reconfigurable High-Speed ECC Processor Over NIST Primes","authors":"Jinnan Ding, Shuguo Li","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.353","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.353","url":null,"abstract":"Elliptic curve cryptography (ECC) is widely used in the field of cyber security such as TLS protocol. Compared with symmetric cryptography, the computation of ECC is much slower. In this paper, a reconfigurable high-speed processor supporting all currently used NIST primes on FPGA platform is constructed. The modular addition and substraction is eliminated in our design by applying lazy reduction strategy. Throughput of modular multiplication is improved significantly with Karatsuba algorithm and compact pipeline schedule. The latency of modular inverse is tactfully avoided by pipeline coverage at the level of scalar multiplication. Furthermore, Montgomery-ladder algorithm and base-point randomization is applied to resist side-channel and timing attacks. Most of these techniques can also be used in software designs. Compared with previous works, our FPGA design outperforms times of others in term of scalar multiplication performance, while the hardware cost remains moderate, which makes it suitable for computation-intensive applications.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129346947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Integration Testing Platform for Software Vulnerability Detection Method 一种集成测试平台的软件漏洞检测方法
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.341
Jin Li, Jinfu Chen, Minhuan Huang, Minmin Zhou, Lin Zhang, Wanggen Xie
Software vulnerability detecting is an important way of discovering the existing loopholes in software in order to ensure the information security. With the rapid development of the information technology in our society, a large variety of application software with various potentially vulnerabilities has emerged. Therefore, a timely discovery and repair of these loopholes before they are exploited by attackers can effectively reduce the threat in the information system. It is of great significance for us to take the initiative to explore and analyze the system security loopholes, so that the danger or threat to the system will be effectively reduced. From the previous research on the software vulnerability detection we have found that each of the existing vulnerability detection methods or tools can only perform well in some particular occasions. In order to overcome such shortcoming and improve these existing detection methods, we present a more accurate and complete analysis of current mainstream detection methods as well as design a set of evaluation criteria for different detection methods in this paper. Meanwhile, we also propose and design an integrated test framework, on which we can test the typical static analysis methods and dynamic mining methods as well as make the comparison, so that we can obtain an intuitive comparative analysis of the results. Finally, we report the experimental analysis to verify the feasibility and effectiveness of the proposed evaluation method and the testing framework, with the results showing that the final test results will serve as a form of guidance to aid the selection of the most appropriate and effective method or tools in vulnerability detection activity.
软件漏洞检测是发现软件存在漏洞以保证信息安全的重要手段。随着社会信息技术的飞速发展,出现了大量具有各种潜在漏洞的应用软件。因此,在漏洞被攻击者利用之前及时发现并修复这些漏洞,可以有效降低信息系统的威胁。主动探索和分析系统安全漏洞,有效降低系统面临的危险或威胁,对我们来说意义重大。从以往对软件漏洞检测的研究中我们发现,现有的每一种漏洞检测方法或工具都只能在某些特定的场合表现良好。为了克服这些缺点,改进现有的检测方法,本文对目前的主流检测方法进行了更准确和完整的分析,并设计了一套针对不同检测方法的评价标准。同时,我们还提出并设计了一个集成测试框架,在该框架上对典型的静态分析方法和动态挖掘方法进行测试并进行对比,从而对结果进行直观的对比分析。最后,我们报告了实验分析,验证了所提出的评估方法和测试框架的可行性和有效性,结果表明,最终的测试结果将作为一种指导形式,帮助在漏洞检测活动中选择最合适、最有效的方法或工具。
{"title":"An Integration Testing Platform for Software Vulnerability Detection Method","authors":"Jin Li, Jinfu Chen, Minhuan Huang, Minmin Zhou, Lin Zhang, Wanggen Xie","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.341","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.341","url":null,"abstract":"Software vulnerability detecting is an important way of discovering the existing loopholes in software in order to ensure the information security. With the rapid development of the information technology in our society, a large variety of application software with various potentially vulnerabilities has emerged. Therefore, a timely discovery and repair of these loopholes before they are exploited by attackers can effectively reduce the threat in the information system. It is of great significance for us to take the initiative to explore and analyze the system security loopholes, so that the danger or threat to the system will be effectively reduced. From the previous research on the software vulnerability detection we have found that each of the existing vulnerability detection methods or tools can only perform well in some particular occasions. In order to overcome such shortcoming and improve these existing detection methods, we present a more accurate and complete analysis of current mainstream detection methods as well as design a set of evaluation criteria for different detection methods in this paper. Meanwhile, we also propose and design an integrated test framework, on which we can test the typical static analysis methods and dynamic mining methods as well as make the comparison, so that we can obtain an intuitive comparative analysis of the results. Finally, we report the experimental analysis to verify the feasibility and effectiveness of the proposed evaluation method and the testing framework, with the results showing that the final test results will serve as a form of guidance to aid the selection of the most appropriate and effective method or tools in vulnerability detection activity.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125851887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Analysis of a Modified Remote Attestation Protocol 一种改进的远程认证协议设计与分析
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.287
Monika Santra, S. K. Peddoju, A. Bhattacharjee, Arindam Khan
Secure interaction amongst system components is inherent to ensure the trustworthiness of the applications. In a distributed system, the attester should know whether the communicating client as well as the user who is using that client system is trustworthy. This can be achieved by a technique called remote attestation. This study presents a three-phase remote attestation protocol which provides relaxation over the low extensibility and low openness problem of binary remote attestation method, using the support of the SELinux module. It also analyses the performance of different existing and related binary remote attestation methods with the proposed approach which shows that the suggested remote attestation method is efficient. The results of the formal analysis are achieved using ProVerif tool which proves that the proposed remote attestation protocol satisfies several security properties such as secrecy, authenticity, indistinguishability and unlinkability.
系统组件之间的安全交互是确保应用程序可信性的内在要求。在分布式系统中,验证者应该知道通信客户端以及使用该客户端系统的用户是否值得信任。这可以通过一种称为远程认证的技术来实现。在SELinux模块的支持下,提出了一种三相远程认证协议,解决了二进制远程认证方法的低扩展性和低开放性问题。利用本文提出的方法对现有的和相关的二进制远程认证方法进行了性能分析,结果表明本文提出的远程认证方法是有效的。利用ProVerif工具进行形式化分析,证明所提出的远程认证协议满足保密性、真实性、不可区分性和不可链接性等安全特性。
{"title":"Design and Analysis of a Modified Remote Attestation Protocol","authors":"Monika Santra, S. K. Peddoju, A. Bhattacharjee, Arindam Khan","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.287","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.287","url":null,"abstract":"Secure interaction amongst system components is inherent to ensure the trustworthiness of the applications. In a distributed system, the attester should know whether the communicating client as well as the user who is using that client system is trustworthy. This can be achieved by a technique called remote attestation. This study presents a three-phase remote attestation protocol which provides relaxation over the low extensibility and low openness problem of binary remote attestation method, using the support of the SELinux module. It also analyses the performance of different existing and related binary remote attestation methods with the proposed approach which shows that the suggested remote attestation method is efficient. The results of the formal analysis are achieved using ProVerif tool which proves that the proposed remote attestation protocol satisfies several security properties such as secrecy, authenticity, indistinguishability and unlinkability.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124744209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
CSCdroid: Accurately Detect Android Malware via Contribution-Level-Based System Call Categorization CSCdroid:通过基于贡献级别的系统调用分类准确检测Android恶意软件
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.237
Shaofeng Zhang, Xi Xiao
The detection of the malicious application or malware on Android platform is a very concerned issue. Many studies have demonstrated their effect from static property analysis and dynamic analysis. However, their accuracy and efficacy still cannot satisfy the demand. In this paper, we propose CSCdroid, an accurate malware detection approach for Android via contribution-level-based system call (SC) categorization. Different from existing works, which use all SCs to construct feature vectors so as to determine the security of applications, CSCdroid first introduces a concept named contribution to quantitatively evaluate SCs relevance for malware identification. Based on the contribution level, CSCdroid can categorize SCs into two types, determinate SCs and normal SCs. Eventually, CSCdroid builds a Markov chain by replacing all normal SCs with one specific SC in the SC sequence. Then it constructs the target feature vector from the probability matrix and use the Support Vector Machine (SVM) to detect Android malware. Such way can effectively reduce the state number of Markov chains, and cut down the dimension of the feature vectors into the SVM classifier. Our evaluation confirms our approach possesses the malware detection ability with a high accuracy rate.
Android平台上的恶意应用程序或恶意软件的检测是一个非常受关注的问题。许多研究从静态特性分析和动态特性分析两方面证明了它们的作用。然而,其准确性和有效性仍不能满足需求。在本文中,我们提出了CSCdroid,一种基于贡献级别的系统调用(SC)分类的Android精确恶意软件检测方法。与现有作品使用所有SCs构建特征向量来确定应用程序的安全性不同,CSCdroid首先引入了一个名为贡献的概念来定量评估SCs与恶意软件识别的相关性。基于贡献水平,CSCdroid可以将SCs分为两种类型,即确定型SCs和正常型SCs。最终,CSCdroid通过用SC序列中的特定SC替换所有正常SC来构建马尔可夫链。然后根据概率矩阵构造目标特征向量,利用支持向量机(SVM)检测Android恶意软件。这种方法可以有效地减少马尔可夫链的状态数,并将特征向量降维到SVM分类器中。经评估,该方法具有较高的检测准确率。
{"title":"CSCdroid: Accurately Detect Android Malware via Contribution-Level-Based System Call Categorization","authors":"Shaofeng Zhang, Xi Xiao","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.237","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.237","url":null,"abstract":"The detection of the malicious application or malware on Android platform is a very concerned issue. Many studies have demonstrated their effect from static property analysis and dynamic analysis. However, their accuracy and efficacy still cannot satisfy the demand. In this paper, we propose CSCdroid, an accurate malware detection approach for Android via contribution-level-based system call (SC) categorization. Different from existing works, which use all SCs to construct feature vectors so as to determine the security of applications, CSCdroid first introduces a concept named contribution to quantitatively evaluate SCs relevance for malware identification. Based on the contribution level, CSCdroid can categorize SCs into two types, determinate SCs and normal SCs. Eventually, CSCdroid builds a Markov chain by replacing all normal SCs with one specific SC in the SC sequence. Then it constructs the target feature vector from the probability matrix and use the Support Vector Machine (SVM) to detect Android malware. Such way can effectively reduce the state number of Markov chains, and cut down the dimension of the feature vectors into the SVM classifier. Our evaluation confirms our approach possesses the malware detection ability with a high accuracy rate.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126152117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
On Designing Collusion-Resistant Incentive Mechanisms for Mobile Crowdsensing Systems 移动众测系统抗合谋激励机制设计研究
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.233
Shiyu Ji, Tingting Chen
With the tremendous popularity of smartphones and other portable devices, crowdsensing applications have become a center of attention in recent years. Different mechanisms have been designed to incentivize mobile users to participate in crowdsensing. However, there are still many open issues needed to be investigated for these incentive mechanisms. In this paper, we systematically study the collusion resistance issue for incentive mechanisms in crowdsensing applications. For a typical type of mobile crowdsensing scenarios, we have two theoretical findings, i.e., the criteria to determine whether an incentive mechanism can inherently resist the collusions with and without profit trading respectively. These criteria have direct practical benefits in screening potential incentive mechanisms for mobile crowdsensing. Furthermore, we also propose our solution that can resist any form of collusion attacks, even including profit trading among the attackers. We conduct extensive experiments to verify our theoretical results and evaluate the performance of our proposed mechanisms.
近年来,随着智能手机和其他便携式设备的广泛普及,众感应用成为人们关注的焦点。设计了不同的机制来激励手机用户参与众感。然而,这些激励机制仍有许多悬而未决的问题需要研究。本文系统地研究了众感应用中激励机制的抗合谋问题。对于一类典型的移动众感场景,我们分别得到了两个理论发现,即判断激励机制是否能够内在抵制有利润交易和无利润交易的共谋行为的标准。这些标准在筛选移动人群感知的潜在激励机制方面具有直接的实际效益。此外,我们还提出了可以抵抗任何形式的串通攻击的解决方案,甚至包括攻击者之间的利润交易。我们进行了大量的实验来验证我们的理论结果并评估我们提出的机制的性能。
{"title":"On Designing Collusion-Resistant Incentive Mechanisms for Mobile Crowdsensing Systems","authors":"Shiyu Ji, Tingting Chen","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.233","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.233","url":null,"abstract":"With the tremendous popularity of smartphones and other portable devices, crowdsensing applications have become a center of attention in recent years. Different mechanisms have been designed to incentivize mobile users to participate in crowdsensing. However, there are still many open issues needed to be investigated for these incentive mechanisms. In this paper, we systematically study the collusion resistance issue for incentive mechanisms in crowdsensing applications. For a typical type of mobile crowdsensing scenarios, we have two theoretical findings, i.e., the criteria to determine whether an incentive mechanism can inherently resist the collusions with and without profit trading respectively. These criteria have direct practical benefits in screening potential incentive mechanisms for mobile crowdsensing. Furthermore, we also propose our solution that can resist any form of collusion attacks, even including profit trading among the attackers. We conduct extensive experiments to verify our theoretical results and evaluate the performance of our proposed mechanisms.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130320141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Efficient and Secure Itinerary-Based Data Aggregation Algorithm for WSNs 一种高效安全的基于行程的wsn数据聚合算法
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.268
Taochun Wang, Ji Zhang, Yonglong Luo, Kaizhong Zuo, Xintao Ding
The existing privacy-preserving data aggregation methods in wireless sensor networks (WSNs) generally rely on a network infrastructure, and data privacy is achieved by encryption techniques. However, such an infrastructure is very susceptible to the dynamic network topologies, and excessive encryption process causes a high energy consumption and re-duces the accuracy of the aggregation results. In this paper, we propose a secure and concentric-circle itinerary-based data aggregation algorithm (called SCIDA for short). With the help of a well-designed itinerary for aggregation propagation and data aggregation, SCIDA is not susceptible to network topology structure and thus suitable for wireless sensor net-works with dynamic network topologies and can save energy for network infrastructure maintenance. In addition, SCIDA uses a secure channel to ensure data privacy and avoids dramatic energy consumption caused by heavy encryption operations. SCIDA does not need to carry out encryption during data aggregation, which significantly reduces energy consumption, and prolongs the lifetime of the network. Theoretical analysis and experimental results show that SCIDA enjoys low communication overhead and energy con-sumption, yet high safety and accuracy.
现有的无线传感器网络数据聚合方法通常依赖于网络基础设施,数据隐私是通过加密技术实现的。但是,这种基础设施容易受到动态网络拓扑的影响,并且过度的加密过程会导致高能耗和降低聚合结果的准确性。本文提出了一种安全的、基于同心圆行程的数据聚合算法(简称SCIDA)。通过精心设计的聚合传播和数据聚合路线,SCIDA不受网络拓扑结构的影响,适用于网络拓扑动态的无线传感器网络,可以节省网络基础设施维护的能量。此外,SCIDA使用安全通道确保数据隐私,避免了繁重加密操作带来的巨大能耗。SCIDA在数据汇聚过程中不需要进行加密,大大降低了能耗,延长了网络的生命周期。理论分析和实验结果表明,该方法具有通信开销低、能耗低、安全性高、精度高等优点。
{"title":"An Efficient and Secure Itinerary-Based Data Aggregation Algorithm for WSNs","authors":"Taochun Wang, Ji Zhang, Yonglong Luo, Kaizhong Zuo, Xintao Ding","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.268","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.268","url":null,"abstract":"The existing privacy-preserving data aggregation methods in wireless sensor networks (WSNs) generally rely on a network infrastructure, and data privacy is achieved by encryption techniques. However, such an infrastructure is very susceptible to the dynamic network topologies, and excessive encryption process causes a high energy consumption and re-duces the accuracy of the aggregation results. In this paper, we propose a secure and concentric-circle itinerary-based data aggregation algorithm (called SCIDA for short). With the help of a well-designed itinerary for aggregation propagation and data aggregation, SCIDA is not susceptible to network topology structure and thus suitable for wireless sensor net-works with dynamic network topologies and can save energy for network infrastructure maintenance. In addition, SCIDA uses a secure channel to ensure data privacy and avoids dramatic energy consumption caused by heavy encryption operations. SCIDA does not need to carry out encryption during data aggregation, which significantly reduces energy consumption, and prolongs the lifetime of the network. Theoretical analysis and experimental results show that SCIDA enjoys low communication overhead and energy con-sumption, yet high safety and accuracy.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122967830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sensor Data Modeling for Data Trustworthiness 面向数据可信度的传感器数据建模
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.330
Karthik N, S. AnanthanarayanaV.
Wireless sensor networks (WSNs) are installed in the terrain for observing the physical and environmental parameters. The nodes in the network are resource constrained in nature and faces several challenges for producing the data from the unfriendly environment. Large amount of data is generated from WSN and suffers from data fault, inaccuracy and inconsistency. To increase the reliability of application, several data trust management schemes are introduced to ensure the trustworthiness of data in decision making process. Apart from these schemes, in the absence of ground truth, sensor data models are used to find the trustiness of the sensor data. The data generated from the simulation of data model is used as a metric to evaluate the degree of trustiness of sensor data. The existing sensor data models suffer from high energy consumption for data trustiness detection and it becomes inaccurate when the data fault rate is high. In this paper, we are proposing an energy efficient sensor data model for evaluating the sensor data trustworthiness and reconstruct the sensor data in case of any data loss and data fault. The proposed data model is hybrid in nature and it works at low level sensor nodes and also at sink node. Results show that the proposed data model is able to detect the untrustworthy data and gives remedy to untrustworthy and missing data with the help of data reconstruction in an energy efficient way and it is able to identify the events in reliable fashion.
无线传感器网络(WSNs)安装在地形中,用于观测地形的物理和环境参数。网络中的节点本质上是资源受限的,在不友好的环境中产生数据面临着一些挑战。无线传感器网络产生大量数据,存在数据错误、不准确和不一致的问题。为了提高应用的可靠性,引入了几种数据信任管理方案,以保证决策过程中数据的可信度。除了这些方案外,在缺乏地面真实度的情况下,使用传感器数据模型来寻找传感器数据的可信度。将数据模型仿真产生的数据作为衡量传感器数据可信度的指标。现有的传感器数据模型存在数据可信度检测能耗高、数据错误率高时不准确的问题。在本文中,我们提出了一种节能的传感器数据模型,用于评估传感器数据的可信度,并在数据丢失和数据故障时重建传感器数据。所提出的数据模型是混合型的,既适用于低层传感器节点,也适用于汇聚节点。结果表明,所提出的数据模型能够有效地检测出不可信数据,并通过数据重构对不可信数据和缺失数据进行补救,能够以可靠的方式识别事件。
{"title":"Sensor Data Modeling for Data Trustworthiness","authors":"Karthik N, S. AnanthanarayanaV.","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.330","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.330","url":null,"abstract":"Wireless sensor networks (WSNs) are installed in the terrain for observing the physical and environmental parameters. The nodes in the network are resource constrained in nature and faces several challenges for producing the data from the unfriendly environment. Large amount of data is generated from WSN and suffers from data fault, inaccuracy and inconsistency. To increase the reliability of application, several data trust management schemes are introduced to ensure the trustworthiness of data in decision making process. Apart from these schemes, in the absence of ground truth, sensor data models are used to find the trustiness of the sensor data. The data generated from the simulation of data model is used as a metric to evaluate the degree of trustiness of sensor data. The existing sensor data models suffer from high energy consumption for data trustiness detection and it becomes inaccurate when the data fault rate is high. In this paper, we are proposing an energy efficient sensor data model for evaluating the sensor data trustworthiness and reconstruct the sensor data in case of any data loss and data fault. The proposed data model is hybrid in nature and it works at low level sensor nodes and also at sink node. Results show that the proposed data model is able to detect the untrustworthy data and gives remedy to untrustworthy and missing data with the help of data reconstruction in an energy efficient way and it is able to identify the events in reliable fashion.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130920999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Real-Time Operating System with CAN-Based Inter-Node Shared Resource Management and Distributed Shared Memory 基于can的节点间共享资源管理和分布式共享内存的实时操作系统
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.315
Kota Ishibashi, Myungryun Yoo, T. Yokoyama
The paper presents a real-time operating system (RTOS) that supports location-transparent shared resource management and distributed shared memory for distributed embedded control systems with CAN (Control Area Network) buses. In a distributed embedded control system, location-transparent mechanisms are required because application tasks are distributed to a number of nodes. We have developed a RTOS that supports location-transparent inter-node shared resource management and distributed shared memory. The inter-node resource access protocol is based on the Multiprocessor Priority Ceiling Protocol and inter-node locking is efficiently implemented using the arbitration mechanism of CAN. The distributed shared memory with mutual exclusion is also efficiently implemented. The RTOS is an extension to OSEK OS and supports not only inter-node resource management but also inter-core resource management for multi-core processors and inter-core and inter-node system calls for task management and event control. We have evaluated the performance of the RTOS and have confirmed that the performance is acceptable for practical embedded control systems.
提出了一种支持位置透明共享资源管理和分布式共享内存的实时操作系统(RTOS),用于具有CAN(控制区域网络)总线的分布式嵌入式控制系统。在分布式嵌入式控制系统中,由于应用程序任务分布到许多节点,因此需要位置透明机制。我们开发了一个支持位置透明节点间共享资源管理和分布式共享内存的RTOS。节点间资源访问协议基于多处理器优先级上限协议,节点间锁定采用CAN仲裁机制有效实现。同时还有效地实现了互斥的分布式共享内存。RTOS是OSEK操作系统的扩展,不仅支持节点间资源管理,还支持多核处理器的核间资源管理,支持核间和节点间系统调用的任务管理和事件控制。我们已经评估了RTOS的性能,并确认其性能可用于实际的嵌入式控制系统。
{"title":"A Real-Time Operating System with CAN-Based Inter-Node Shared Resource Management and Distributed Shared Memory","authors":"Kota Ishibashi, Myungryun Yoo, T. Yokoyama","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.315","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.315","url":null,"abstract":"The paper presents a real-time operating system (RTOS) that supports location-transparent shared resource management and distributed shared memory for distributed embedded control systems with CAN (Control Area Network) buses. In a distributed embedded control system, location-transparent mechanisms are required because application tasks are distributed to a number of nodes. We have developed a RTOS that supports location-transparent inter-node shared resource management and distributed shared memory. The inter-node resource access protocol is based on the Multiprocessor Priority Ceiling Protocol and inter-node locking is efficiently implemented using the arbitration mechanism of CAN. The distributed shared memory with mutual exclusion is also efficiently implemented. The RTOS is an extension to OSEK OS and supports not only inter-node resource management but also inter-core resource management for multi-core processors and inter-core and inter-node system calls for task management and event control. We have evaluated the performance of the RTOS and have confirmed that the performance is acceptable for practical embedded control systems.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116954045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2017 IEEE Trustcom/BigDataSE/ICESS
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1