首页 > 最新文献

2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)最新文献

英文 中文
A Decentralised Mechanism for Secure Cloud Computing Transactions 安全云计算事务的分散机制
Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732405
Monjur Ahmed, M. Bhuiyan, Sapna Jaidka, P. Jiranantanagorn
In this paper, we present an innovative mechanism for transaction processing for big data in Cloud Computing context. We focus on data and information security in proposing the decentralised mechanism. Traditional transaction processing, if monitored, can potentially help an attacker to construct context of the information stored by the client to subsequently determine of value of the client's digital asset. In the proposed mechanism, we take a de centralised and collaborative approach both in terms of implementations and operations of transactions between end-users and Cloud servers. In the proposed transaction mechanism, the total picture of a transaction is not recoverable by unwanted third parties and thus the information on data processed by a transaction may not become a knowledge of an eavesdropper. The proposed mechanism is built upon and motivated by the principles of Ki-Ngā-KNgōpuku - a de centralised and distributed computing security model that employs scattered and redundant de centralised processing.
在本文中,我们提出了一种在云计算环境下处理大数据事务的创新机制。我们在提出分散式机制时,以数据及资讯安全为重点。如果受到监控,传统的事务处理可能会帮助攻击者构建客户端存储的信息的上下文,从而确定客户端数字资产的价值。在提议的机制中,我们在最终用户和云服务器之间的事务实现和操作方面采用了去中心化和协作的方法。在建议的交易机制中,交易的全图不会被不需要的第三方所恢复,因此交易所处理的数据信息可能不会成为窃听者的知识。提出的机制建立在Ki-Ngā-KNgōpuku原则的基础上,并受到其激励——Ki-Ngā-KNgōpuku是一种采用分散和冗余去中心化处理的去中心化和分布式计算安全模型。
{"title":"A Decentralised Mechanism for Secure Cloud Computing Transactions","authors":"Monjur Ahmed, M. Bhuiyan, Sapna Jaidka, P. Jiranantanagorn","doi":"10.1109/FMEC54266.2021.9732405","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732405","url":null,"abstract":"In this paper, we present an innovative mechanism for transaction processing for big data in Cloud Computing context. We focus on data and information security in proposing the decentralised mechanism. Traditional transaction processing, if monitored, can potentially help an attacker to construct context of the information stored by the client to subsequently determine of value of the client's digital asset. In the proposed mechanism, we take a de centralised and collaborative approach both in terms of implementations and operations of transactions between end-users and Cloud servers. In the proposed transaction mechanism, the total picture of a transaction is not recoverable by unwanted third parties and thus the information on data processed by a transaction may not become a knowledge of an eavesdropper. The proposed mechanism is built upon and motivated by the principles of Ki-Ngā-KNgōpuku - a de centralised and distributed computing security model that employs scattered and redundant de centralised processing.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114746153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reviews in Online Data Stream and Active Learning for Cyber Intrusion Detection - A Systematic Literature Review 网络入侵检测的在线数据流和主动学习研究综述-系统文献综述
Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732566
Christopher Nixon, Mohamed H. Sedky, Mohamed Hassan
Intrusion Detection Systems (IDS) monitor com-puter networks for attack. Network data streams are potentially infinite and require real-time processing in order to provide timely detection of changing attacks. To address the nature of the network data stream it is important to consider the use of online data stream learning methods for IDS. Online data stream learning is an extension of Machine Learning (ML) where special consideration is given to finding anomalies in the data stream via supervised and unsupervised methods, adapting to concept drift, processing real-time events, and management of labelling cost by using Active Learning (AL). This paper asks the question of which online data stream and AL methods for IDS have been recently reviewed? A Systematic Literature Review (SLR) was performed and found that there is currently no reviews available that focus primarily on IDS data stream learning. Reviews were organised into categories and key considerations presented.
入侵检测系统(IDS)监视计算机网络的攻击。网络数据流可能是无限的,需要实时处理,以便及时检测不断变化的攻击。为了解决网络数据流的性质,考虑使用IDS的在线数据流学习方法是很重要的。在线数据流学习是机器学习(ML)的延伸,其中特别考虑通过监督和无监督方法发现数据流中的异常,适应概念漂移,处理实时事件,以及使用主动学习(AL)管理标签成本。本文提出了一个问题,即IDS的在线数据流和人工智能方法最近得到了哪些综述?进行了系统文献综述(SLR),发现目前没有主要关注IDS数据流学习的综述。审查分为不同类别,并提出了主要考虑因素。
{"title":"Reviews in Online Data Stream and Active Learning for Cyber Intrusion Detection - A Systematic Literature Review","authors":"Christopher Nixon, Mohamed H. Sedky, Mohamed Hassan","doi":"10.1109/FMEC54266.2021.9732566","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732566","url":null,"abstract":"Intrusion Detection Systems (IDS) monitor com-puter networks for attack. Network data streams are potentially infinite and require real-time processing in order to provide timely detection of changing attacks. To address the nature of the network data stream it is important to consider the use of online data stream learning methods for IDS. Online data stream learning is an extension of Machine Learning (ML) where special consideration is given to finding anomalies in the data stream via supervised and unsupervised methods, adapting to concept drift, processing real-time events, and management of labelling cost by using Active Learning (AL). This paper asks the question of which online data stream and AL methods for IDS have been recently reviewed? A Systematic Literature Review (SLR) was performed and found that there is currently no reviews available that focus primarily on IDS data stream learning. Reviews were organised into categories and key considerations presented.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127697638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling Polymorphic Ciphers 多态密码建模
Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732571
Albert H Carlson, I. Dutta, Bhaskar Ghosh, Michael Totaro
Polymorphic ciphers are a relatively new construct in the field of encryption. Although the first real example of the encryption, the One Time Pad (OTP), has been known since the early part of the 20th century, the idea of a “mutating cipher” has not been implemented and well studied until now. Since these ciphers are actually “engines” comprised of single algorithm ciphers with good encryption properties, such as a large key space, evaluating the characteristics of the engine becomes im-portant. In this paper, we present a simple method to classify the polymorphic properties of ciphers and the polymorphic engine. In addition, the security of such engines is presented, along with an analysis of the additional latency and overhead costs.
多态密码是加密领域中一个相对较新的结构。尽管自20世纪早期以来,人们就已经知道了加密的第一个真正的例子,即一次性密码(One Time Pad, OTP),但直到现在,“变异密码”的概念还没有得到实现和充分的研究。由于这些密码实际上是由具有良好加密属性(如大密钥空间)的单个算法密码组成的“引擎”,因此评估引擎的特性变得非常重要。在本文中,我们提出了一种简单的方法来分类密码的多态性质和多态引擎。此外,还介绍了此类引擎的安全性,并分析了额外的延迟和开销成本。
{"title":"Modeling Polymorphic Ciphers","authors":"Albert H Carlson, I. Dutta, Bhaskar Ghosh, Michael Totaro","doi":"10.1109/FMEC54266.2021.9732571","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732571","url":null,"abstract":"Polymorphic ciphers are a relatively new construct in the field of encryption. Although the first real example of the encryption, the One Time Pad (OTP), has been known since the early part of the 20th century, the idea of a “mutating cipher” has not been implemented and well studied until now. Since these ciphers are actually “engines” comprised of single algorithm ciphers with good encryption properties, such as a large key space, evaluating the characteristics of the engine becomes im-portant. In this paper, we present a simple method to classify the polymorphic properties of ciphers and the polymorphic engine. In addition, the security of such engines is presented, along with an analysis of the additional latency and overhead costs.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133393115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Distributed Trust Layer for Edge Infrastructure 边缘基础设施的分布式信任层
Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732606
V. T. Le, Nabil El Ioini, C. Pahl, H. Barzegar, C. Ardagna
Recently, Mobile Edge Cloud computing (MEC) has attracted attention both from academia and industry. The idea of moving a part of cloud resources closer to users and data sources can bring many advantages in terms of speed, data traffic, security and context-aware services. The MEC infrastructure does not only host and serves applications next to the end-users, but services can be dynamically migrated and reallocated as mobile users move in order to guarantee latency and performance constraints. This specific requirement calls for the involvement and collaboration of multiple MEC providers, which raises a major issue related to trustworthiness. Two main challenges need to be addressed: i) trustworthiness needs to be handled in a manner that does not affect latency or performance, ii) trustworthiness is considered in different dimensions - not only security metrics but also performance and quality metrics in general. In this paper, we propose a trust layer for public MEC infrastructure that handles establishing and updating trust relations among all MEC entities, making the interaction withing a MEC network transparent. First, we define trust attributes affecting the trusted quality of the entire infrastructure and then a methodology with a computation model that combines these trust attribute values. Our experiments showed that the trust model allows us to reduce latency by removing the burden from a single MEC node, while at the same time increase the network trustworthiness.
近年来,移动边缘云计算(MEC)引起了学术界和工业界的广泛关注。将一部分云资源移动到离用户和数据源更近的地方的想法可以在速度、数据流量、安全性和上下文感知服务方面带来许多优势。MEC基础设施不仅在终端用户旁边托管和服务应用程序,而且可以随着移动用户的移动动态迁移和重新分配服务,以保证延迟和性能限制。这一具体要求要求多个MEC供应商的参与和合作,这就提出了一个与可信度相关的主要问题。需要解决两个主要挑战:i)可靠性需要以不影响延迟或性能的方式处理,ii)可靠性需要从不同的维度考虑——不仅是安全指标,还有一般的性能和质量指标。在本文中,我们提出了一个公共MEC基础设施的信任层,它处理所有MEC实体之间的信任关系的建立和更新,使MEC网络内部的交互透明。首先,我们定义了影响整个基础设施可信质量的信任属性,然后定义了一种结合这些信任属性值的计算模型的方法。我们的实验表明,信任模型允许我们通过消除单个MEC节点的负担来减少延迟,同时增加网络的可信度。
{"title":"A Distributed Trust Layer for Edge Infrastructure","authors":"V. T. Le, Nabil El Ioini, C. Pahl, H. Barzegar, C. Ardagna","doi":"10.1109/FMEC54266.2021.9732606","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732606","url":null,"abstract":"Recently, Mobile Edge Cloud computing (MEC) has attracted attention both from academia and industry. The idea of moving a part of cloud resources closer to users and data sources can bring many advantages in terms of speed, data traffic, security and context-aware services. The MEC infrastructure does not only host and serves applications next to the end-users, but services can be dynamically migrated and reallocated as mobile users move in order to guarantee latency and performance constraints. This specific requirement calls for the involvement and collaboration of multiple MEC providers, which raises a major issue related to trustworthiness. Two main challenges need to be addressed: i) trustworthiness needs to be handled in a manner that does not affect latency or performance, ii) trustworthiness is considered in different dimensions - not only security metrics but also performance and quality metrics in general. In this paper, we propose a trust layer for public MEC infrastructure that handles establishing and updating trust relations among all MEC entities, making the interaction withing a MEC network transparent. First, we define trust attributes affecting the trusted quality of the entire infrastructure and then a methodology with a computation model that combines these trust attribute values. Our experiments showed that the trust model allows us to reduce latency by removing the burden from a single MEC node, while at the same time increase the network trustworthiness.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130462117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
EdgeRE: An Edge Computing-enhanced Network Redundancy Elimination Service for Connected Cars EdgeRE:一种基于边缘计算的互联汽车网络冗余消除服务
Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732548
Masahiro Yoshida, Koya Mori, Tomohiro Inoue, Hiroyuki Tanaka
Connected cars generate a huge amount of Internet of Things (IoT) sensor information called Controller Area Network (CAN) data. Interest has recently been growing in collecting CAN data from connected cars in a cloud system in order to enable life-critical use cases such as safe driving support. Although each CAN data packet is very small, a connected car generates thousands of CAN data packets per second. Therefore, real-time CAN data collection from connected cars to a cloud system is one of the most challenging problems in the current IoT. In this paper, we propose an Edge computing-enhanced network Redundancy Elimination service (EdgeRE) for CAN data collection. In developing EdgeRE, we design a CAN data compression architecture that combines in-vehicle computers, edge datacenters, and a public cloud system. EdgeRE includes the idea of a hierarchical data compression and dynamic data buffering at edge datacenters for real-time CAN data collection. Across a wide range of field tests with connected cars and an edge computing testbed, we show that the EdgeRE reduces the bandwidth usage by 88% and the number of packets by 99%.
联网汽车产生大量的物联网(IoT)传感器信息,称为控制器区域网络(CAN)数据。最近,人们对在云系统中收集联网汽车的CAN数据越来越感兴趣,以实现诸如安全驾驶支持之类的关键用例。虽然每个CAN数据包非常小,但一辆联网的汽车每秒会产生数千个CAN数据包。因此,从联网汽车到云系统的实时CAN数据收集是当前物联网中最具挑战性的问题之一。在本文中,我们提出了一种边缘计算增强的网络冗余消除服务(EdgeRE),用于CAN数据收集。在开发EdgeRE时,我们设计了一个CAN数据压缩架构,该架构结合了车载计算机、边缘数据中心和公共云系统。EdgeRE包括在边缘数据中心进行分层数据压缩和动态数据缓冲的思想,用于实时CAN数据收集。通过联网汽车和边缘计算试验台的广泛现场测试,我们表明,EdgeRE将带宽使用减少了88%,数据包数量减少了99%。
{"title":"EdgeRE: An Edge Computing-enhanced Network Redundancy Elimination Service for Connected Cars","authors":"Masahiro Yoshida, Koya Mori, Tomohiro Inoue, Hiroyuki Tanaka","doi":"10.1109/FMEC54266.2021.9732548","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732548","url":null,"abstract":"Connected cars generate a huge amount of Internet of Things (IoT) sensor information called Controller Area Network (CAN) data. Interest has recently been growing in collecting CAN data from connected cars in a cloud system in order to enable life-critical use cases such as safe driving support. Although each CAN data packet is very small, a connected car generates thousands of CAN data packets per second. Therefore, real-time CAN data collection from connected cars to a cloud system is one of the most challenging problems in the current IoT. In this paper, we propose an Edge computing-enhanced network Redundancy Elimination service (EdgeRE) for CAN data collection. In developing EdgeRE, we design a CAN data compression architecture that combines in-vehicle computers, edge datacenters, and a public cloud system. EdgeRE includes the idea of a hierarchical data compression and dynamic data buffering at edge datacenters for real-time CAN data collection. Across a wide range of field tests with connected cars and an edge computing testbed, we show that the EdgeRE reduces the bandwidth usage by 88% and the number of packets by 99%.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114255222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Architecture for Component Authentication using Secure Cyber-physical Information and Blockchain 使用安全网络物理信息和区块链的组件认证体系结构
Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732547
M. Sandborn, Carlos Olea, Sam Hays, Jules White
Cyber-physical systems (CPSs) tie software to components that manipulate physical space, and safety-critical CPSs comprise an increasing share of roles in process automation, transportation, and industrial operations. As device intercon-nectivity increases, security paradigms must be developed to address cross-domain interactions and prevent vulnerabilities from one domain (e.g. misconfigured robot controller software) manifesting in the other (e.g. mechatronic arm harms factory worker). In particular, counterfeit goods pose a significant threat to the construction of safety-critical CPSs with downstream effects spanning both cyber and physical environments (e.g. commercial aircraft with faulty fuel pump). In this paper, we present a theoretical architecture for exchanging and verifying Signed Physically Unclonable iDentities (SPUDs). The proposed system, based on Blockchain, allows tracking of components throughout a CPS supply network using both cyber and physical identifiers.
网络物理系统(cps)将软件与操纵物理空间的组件联系在一起,安全关键cps在过程自动化、运输和工业操作中扮演着越来越重要的角色。随着设备互联性的增加,必须开发安全范例来解决跨域交互,并防止一个域的漏洞(例如配置错误的机器人控制器软件)在另一个域显现(例如机电臂伤害工厂工人)。特别是,假冒商品对安全关键型cps的建设构成重大威胁,其下游影响跨越网络和物理环境(例如,燃油泵故障的商用飞机)。本文提出了一种交换和验证签名物理不可克隆身份(spud)的理论体系结构。基于区块链的拟议系统允许使用网络和物理标识符跟踪整个CPS供应网络中的组件。
{"title":"An Architecture for Component Authentication using Secure Cyber-physical Information and Blockchain","authors":"M. Sandborn, Carlos Olea, Sam Hays, Jules White","doi":"10.1109/FMEC54266.2021.9732547","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732547","url":null,"abstract":"Cyber-physical systems (CPSs) tie software to components that manipulate physical space, and safety-critical CPSs comprise an increasing share of roles in process automation, transportation, and industrial operations. As device intercon-nectivity increases, security paradigms must be developed to address cross-domain interactions and prevent vulnerabilities from one domain (e.g. misconfigured robot controller software) manifesting in the other (e.g. mechatronic arm harms factory worker). In particular, counterfeit goods pose a significant threat to the construction of safety-critical CPSs with downstream effects spanning both cyber and physical environments (e.g. commercial aircraft with faulty fuel pump). In this paper, we present a theoretical architecture for exchanging and verifying Signed Physically Unclonable iDentities (SPUDs). The proposed system, based on Blockchain, allows tracking of components throughout a CPS supply network using both cyber and physical identifiers.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128944217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A micro grid information architecture with open source components 一个带有开源组件的微网格信息架构
Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732593
A. Smith, Buhle Mkhize, Boitumelo Mahlobo, S. Isaac
Presented is an information system architecture based on open source platforms to support the successful management of a micro grid. The paper justifies the use of open source platforms in the micro grid context. Also given are the benefits of a micro grid as it relates to distributed energy generation and subsequently the need explained for an information system that keeps a record of all devices and their interconnections, while simultaneously providing access to instantaneous data along various points in the micro grid. Three examples of services made possible by the architecture are given.
提出了一种基于开源平台的信息系统架构,以支持微电网的成功管理。本文证明了在微电网环境中使用开源平台的合理性。此外,还介绍了微电网的好处,因为它与分布式能源发电有关,随后解释了需要一个信息系统,该系统可以记录所有设备及其互连,同时提供对微电网中各个点的瞬时数据的访问。给出了通过该体系结构实现的三个服务示例。
{"title":"A micro grid information architecture with open source components","authors":"A. Smith, Buhle Mkhize, Boitumelo Mahlobo, S. Isaac","doi":"10.1109/FMEC54266.2021.9732593","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732593","url":null,"abstract":"Presented is an information system architecture based on open source platforms to support the successful management of a micro grid. The paper justifies the use of open source platforms in the micro grid context. Also given are the benefits of a micro grid as it relates to distributed energy generation and subsequently the need explained for an information system that keeps a record of all devices and their interconnections, while simultaneously providing access to instantaneous data along various points in the micro grid. Three examples of services made possible by the architecture are given.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130594493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Self-Healing for Cyber-Security 网络安全的自我修复
Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732575
B. Gijsen, R. Montalto, J. Panneman, Federico Falconieri, Paul Wiper, P. Zuraniewski
Autonomic computing long since holds the promise to achieve properties including self-healing IT. The self-healing property provides a new perspective in the continuous battle between cyber attackers and defenders. Emerging containerization technology, and accompanying monitoring and deployment tools, can boost the state-of-the-art regarding self-healing IT. In this paper, we demonstrate how emerging technology can be integrated into a platform for regenerating and adaptive, self-healing containers. This Self-Healing for Cyber-Security (SH4CS) contribution paves the way towards a new type of autonomous cyber-security solutions.
自主计算长期以来一直承诺实现包括自我修复IT在内的特性。自愈特性为网络攻击者和防御者之间的持续战斗提供了新的视角。新兴的容器化技术,以及伴随的监控和部署工具,可以推动自我修复IT的发展。在本文中,我们演示了如何将新兴技术集成到一个用于再生和自适应、自修复容器的平台中。这种网络安全自我修复(SH4CS)的贡献为新型自主网络安全解决方案铺平了道路。
{"title":"Self-Healing for Cyber-Security","authors":"B. Gijsen, R. Montalto, J. Panneman, Federico Falconieri, Paul Wiper, P. Zuraniewski","doi":"10.1109/FMEC54266.2021.9732575","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732575","url":null,"abstract":"Autonomic computing long since holds the promise to achieve properties including self-healing IT. The self-healing property provides a new perspective in the continuous battle between cyber attackers and defenders. Emerging containerization technology, and accompanying monitoring and deployment tools, can boost the state-of-the-art regarding self-healing IT. In this paper, we demonstrate how emerging technology can be integrated into a platform for regenerating and adaptive, self-healing containers. This Self-Healing for Cyber-Security (SH4CS) contribution paves the way towards a new type of autonomous cyber-security solutions.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133364416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scheduling Real-Time IoT Workflows in a Fog Computing Environment Utilizing Cloud Resources with Data-Aware Elasticity 利用具有数据感知弹性的云资源在雾计算环境中调度实时物联网工作流
Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732561
Georgios L. Stavrinides, H. Karatza
In a fog computing environment the supplementary public cloud resources should be managed as effectively as possible, utilizing a dynamic scaling mechanism, in order to provide monetary cost savings and resilience against workload fluctuations. Furthermore, the dynamic scaling strategy should take into account the data dependencies of the workload, in order to prevent data loss. Towards this direction, in this paper we propose a reactive data-aware dynamic scaling mechanism for the provision of cloud resources, along with a heuristic for the scheduling of real-time Internet of Things (IoT) workflows, in a three-tier IoT-fog-cloud architecture. The performance of the proposed scheme is evaluated and compared via simulation to a static provisioning case, under different patterns of incoming workload. The simulation results provide useful insights into how each workload pattern affects the performance of the framework under study, in each of the provisioning cases of the cloud resources.
在雾计算环境中,应利用动态扩展机制尽可能有效地管理补充公共云资源,以节省资金成本,并能够抵御工作负载波动。此外,动态扩展策略应该考虑到工作负载的数据依赖性,以防止数据丢失。朝着这个方向,在本文中,我们在三层物联网雾云架构中提出了一种响应式数据感知动态扩展机制,用于提供云资源,以及一种启发式的实时物联网(IoT)工作流调度。在不同的传入工作负载模式下,通过仿真来评估和比较所提出方案的性能。模拟结果提供了有用的见解,可以了解在云资源的每种配置情况下,每个工作负载模式如何影响所研究的框架的性能。
{"title":"Scheduling Real-Time IoT Workflows in a Fog Computing Environment Utilizing Cloud Resources with Data-Aware Elasticity","authors":"Georgios L. Stavrinides, H. Karatza","doi":"10.1109/FMEC54266.2021.9732561","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732561","url":null,"abstract":"In a fog computing environment the supplementary public cloud resources should be managed as effectively as possible, utilizing a dynamic scaling mechanism, in order to provide monetary cost savings and resilience against workload fluctuations. Furthermore, the dynamic scaling strategy should take into account the data dependencies of the workload, in order to prevent data loss. Towards this direction, in this paper we propose a reactive data-aware dynamic scaling mechanism for the provision of cloud resources, along with a heuristic for the scheduling of real-time Internet of Things (IoT) workflows, in a three-tier IoT-fog-cloud architecture. The performance of the proposed scheme is evaluated and compared via simulation to a static provisioning case, under different patterns of incoming workload. The simulation results provide useful insights into how each workload pattern affects the performance of the framework under study, in each of the provisioning cases of the cloud resources.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131393400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Anti-jamming strategy based on game theory in single-channel UAV communication network 基于博弈论的单通道无人机通信网络抗干扰策略
Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732602
Jiangwei Xu, Kehao Wang, Xun Zhang, Pei Liu, Dejin Kong, Hongkuan Zhou
This paper investigates the power control prob-lem in unmanned aerial vehicle (UAV) communication network anti-jamming system. To obtain the optimal power of UAVs, Stackelberg game and Nash game, two different anti-jamming models, are proposed to achieve the best performance. In the Stackelberg game model, as the leader, the smart jammer who has the privilege to take actions ahead of the user, while the user acts as the follower after knowing the strategy of the smart jammer and adjusts transmission power adaptively to maximize the utility function. We design a simulated annealing algorithm to obtain Stackelberg equilibrium (SE). In the Nash game model, two players would take actions simultaneously, and the closed-form expression of Nash equilibrium (NE) is derived. Finally, we verify the convergence of proposed algorithm, compare the two game models and analyze the influence of observation error and transmission distance on the user UAV's and jammer UAV's utility function through detailed simulations.
研究了无人机通信网络抗干扰系统中的功率控制问题。为了获得无人机的最优功率,提出了Stackelberg博弈和Nash博弈两种不同的抗干扰模型,以达到最佳性能。在Stackelberg博弈模型中,智能干扰者作为领导者,拥有先于用户采取行动的特权,而用户在了解智能干扰者的策略后,作为追随者,自适应调整发射功率,使效用函数最大化。我们设计了一种模拟退火算法来获得Stackelberg均衡(SE)。在纳什博弈模型中,两个参与者同时采取行动,推导出纳什均衡(NE)的封闭表达式。最后,通过仿真验证了算法的收敛性,比较了两种博弈模型,分析了观测误差和传输距离对用户无人机和干扰无人机效用函数的影响。
{"title":"Anti-jamming strategy based on game theory in single-channel UAV communication network","authors":"Jiangwei Xu, Kehao Wang, Xun Zhang, Pei Liu, Dejin Kong, Hongkuan Zhou","doi":"10.1109/FMEC54266.2021.9732602","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732602","url":null,"abstract":"This paper investigates the power control prob-lem in unmanned aerial vehicle (UAV) communication network anti-jamming system. To obtain the optimal power of UAVs, Stackelberg game and Nash game, two different anti-jamming models, are proposed to achieve the best performance. In the Stackelberg game model, as the leader, the smart jammer who has the privilege to take actions ahead of the user, while the user acts as the follower after knowing the strategy of the smart jammer and adjusts transmission power adaptively to maximize the utility function. We design a simulated annealing algorithm to obtain Stackelberg equilibrium (SE). In the Nash game model, two players would take actions simultaneously, and the closed-form expression of Nash equilibrium (NE) is derived. Finally, we verify the convergence of proposed algorithm, compare the two game models and analyze the influence of observation error and transmission distance on the user UAV's and jammer UAV's utility function through detailed simulations.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128757144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1