首页 > 最新文献

2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)最新文献

英文 中文
An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems 针对工业控制系统的启发式推理攻击分析框架
Taejun Choi, Guangdong Bai, R. Ko, Naipeng Dong, Wenlu Zhang, Shunyao Wang
Industrial control systems (ICS) of critical infrastructure are increasingly connected to the Internet for remote site management at scale. However, cyber attacks against ICS - especially at the communication channels between human-machine interface (HMIs) and programmable logic controllers (PLCs) - are increasing at a rate which outstrips the rate of mitigation. In this paper, we introduce a vendor-agnostic analytics framework which allows security researchers to analyse attacks against ICS systems, even if the researchers have zero control automation domain knowledge or are faced with a myriad of heterogenous ICS systems. Unlike existing works that require expertise in domain knowledge and specialised tool usage, our analytics framework does not require prior knowledge about ICS communication protocols, PLCs, and expertise of any network penetration testing tool. Using ‘digital twin’ scenarios comprising industry-representative HMIs, PLCs and firewalls in our test lab, our framework's steps were demonstrated to successfully implement a stealthy deception attack based on false data injection attacks (FDIA). Furthermore, our framework also demonstrated the relative ease of attack dataset collection, and the ability to leverage well-known penetration testing tools. We also introduce the concept of ‘heuristic inference attacks', a new family of attack types on ICS which is agnostic to PLC and HMI brands/models commonly deployed in ICS. Our experiments were also validated on a separate ICS dataset collected from a cyber-physical scenario of water utilities. Finally, we utilized time complexity theory to estimate the difficulty for the attacker to conduct the proposed packet analyses, and recommended countermeasures based on our findings.
关键基础设施的工业控制系统(ICS)越来越多地连接到互联网以进行大规模的远程站点管理。然而,针对工业控制系统的网络攻击——尤其是在人机界面(hmi)和可编程逻辑控制器(plc)之间的通信通道上——正在以超过缓解速度的速度增加。在本文中,我们引入了一个与供应商无关的分析框架,该框架允许安全研究人员分析针对ICS系统的攻击,即使研究人员没有控制自动化领域的知识或面临无数异构ICS系统。与现有的需要专业领域知识和专业工具使用的工作不同,我们的分析框架不需要事先了解ICS通信协议、plc和任何网络渗透测试工具的专业知识。在我们的测试实验室中,使用包含行业代表性hmi, plc和防火墙的“数字孪生”场景,我们的框架步骤被证明可以成功地实现基于虚假数据注入攻击(FDIA)的隐形欺骗攻击。此外,我们的框架还展示了相对容易的攻击数据集收集,以及利用知名渗透测试工具的能力。我们还介绍了“启发式推理攻击”的概念,这是ICS上的一种新的攻击类型,与ICS中常用的PLC和HMI品牌/模型无关。我们的实验还在从水务公司的网络物理场景中收集的单独ICS数据集上进行了验证。最后,我们利用时间复杂度理论来估计攻击者进行所提出的数据包分析的难度,并根据我们的发现提出对策。
{"title":"An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems","authors":"Taejun Choi, Guangdong Bai, R. Ko, Naipeng Dong, Wenlu Zhang, Shunyao Wang","doi":"10.1109/TrustCom50675.2020.00112","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00112","url":null,"abstract":"Industrial control systems (ICS) of critical infrastructure are increasingly connected to the Internet for remote site management at scale. However, cyber attacks against ICS - especially at the communication channels between human-machine interface (HMIs) and programmable logic controllers (PLCs) - are increasing at a rate which outstrips the rate of mitigation. In this paper, we introduce a vendor-agnostic analytics framework which allows security researchers to analyse attacks against ICS systems, even if the researchers have zero control automation domain knowledge or are faced with a myriad of heterogenous ICS systems. Unlike existing works that require expertise in domain knowledge and specialised tool usage, our analytics framework does not require prior knowledge about ICS communication protocols, PLCs, and expertise of any network penetration testing tool. Using ‘digital twin’ scenarios comprising industry-representative HMIs, PLCs and firewalls in our test lab, our framework's steps were demonstrated to successfully implement a stealthy deception attack based on false data injection attacks (FDIA). Furthermore, our framework also demonstrated the relative ease of attack dataset collection, and the ability to leverage well-known penetration testing tools. We also introduce the concept of ‘heuristic inference attacks', a new family of attack types on ICS which is agnostic to PLC and HMI brands/models commonly deployed in ICS. Our experiments were also validated on a separate ICS dataset collected from a cyber-physical scenario of water utilities. Finally, we utilized time complexity theory to estimate the difficulty for the attacker to conduct the proposed packet analyses, and recommended countermeasures based on our findings.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"639 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123049300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A novel Q-Learning Algorithm Based on the Stochastic Environment Path Planning Problem 一种新的基于随机环境路径规划问题的q -学习算法
Li Jian, Fei Rong, Tang Yu
In this paper, we proposed a path planning algorithm based on Q-learning model to simulate an environment model, which is suitable for the complex environment. A virtual simulation platform has been built to complete the experiments. The experimental results show that the algorithm proposed in this paper can be effectively applied to the solution of vehicle routing problems in the complex environment.
本文提出了一种基于q -学习模型模拟环境模型的路径规划算法,该算法适用于复杂环境。建立了虚拟仿真平台来完成实验。实验结果表明,本文提出的算法可以有效地应用于复杂环境下的车辆路径问题的求解。
{"title":"A novel Q-Learning Algorithm Based on the Stochastic Environment Path Planning Problem","authors":"Li Jian, Fei Rong, Tang Yu","doi":"10.1109/TrustCom50675.2020.00270","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00270","url":null,"abstract":"In this paper, we proposed a path planning algorithm based on Q-learning model to simulate an environment model, which is suitable for the complex environment. A virtual simulation platform has been built to complete the experiments. The experimental results show that the algorithm proposed in this paper can be effectively applied to the solution of vehicle routing problems in the complex environment.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"35 28","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120813536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Group Communication Needs No Consistent Transcript Distribution 群体交流不需要一致的成绩单分发
K. Herberth
Instant Messaging (IM) clients are lying to you about groups and their consistency. None of the so called secure chat applications provide the same security properties for group communication you know from face-to-face meetings. In this paper we give an overview of the challenges in group communication and introduce a solution to the transcript distribution challenge. We present a new visualization for out-of-order messages and the results of a user study to show that our approach is working for every day users.
即时消息(IM)客户端在组及其一致性方面对您说谎。没有任何所谓的安全聊天应用程序为您从面对面会议中了解的组通信提供相同的安全属性。在本文中,我们概述了在群体沟通的挑战,并介绍了一个解决方案,以抄本分布的挑战。我们展示了一种新的无序消息可视化和用户研究结果,以表明我们的方法适用于日常用户。
{"title":"Group Communication Needs No Consistent Transcript Distribution","authors":"K. Herberth","doi":"10.1109/TrustCom50675.2020.00193","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00193","url":null,"abstract":"Instant Messaging (IM) clients are lying to you about groups and their consistency. None of the so called secure chat applications provide the same security properties for group communication you know from face-to-face meetings. In this paper we give an overview of the challenges in group communication and introduce a solution to the transcript distribution challenge. We present a new visualization for out-of-order messages and the results of a user study to show that our approach is working for every day users.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127113143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and Analysis of RabbitMQ Using UPPAAL 基于UPPAAL的RabbitMQ建模与分析
Ran Li, Jiaqi Yin, Huibiao Zhu
RabbitMQ is a very popular message middleware, which is an implementation of AMQP (Advanced Message Queuing Protocol) using the Erlang language. It supports concurrency and guarantees the sequential consistency of messages. Additionally, RabbitMQ provides the message acknowledgement mechanism to ensure that messages can be delivered reliably to the consumer from the broker. However, these crucial properties have not been verified with formal methods. In this paper, we model the architecture of RabbitMQ with timed automata. By utilizing the model checker UPPAAL, RabbitMQ is abstracted to five timed automata. Based on the formalized model, we verify whether RabbitMQ meets some essential properties, including Reachability of Data, Concurrency, Sequence Consistency and Message Acknowledgement. Consequently, it can be found that RabbitMQ can totally satisfy these properties according to the verification results via UPPAAL.
RabbitMQ是一个非常流行的消息中间件,它使用Erlang语言实现了AMQP(高级消息队列协议)。它支持并发性并保证消息的顺序一致性。此外,RabbitMQ提供了消息确认机制,以确保消息可以可靠地从代理传递到消费者。然而,这些关键的性质还没有得到正式方法的验证。本文采用时间自动机对RabbitMQ的体系结构进行建模。利用模型检查器UPPAAL,将RabbitMQ抽象为5个时间自动机。基于形式化模型,验证RabbitMQ是否满足数据可达性、并发性、序列一致性和消息确认等基本属性。因此,根据UPPAAL的验证结果,可以发现RabbitMQ完全满足这些属性。
{"title":"Modeling and Analysis of RabbitMQ Using UPPAAL","authors":"Ran Li, Jiaqi Yin, Huibiao Zhu","doi":"10.1109/TrustCom50675.2020.00024","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00024","url":null,"abstract":"RabbitMQ is a very popular message middleware, which is an implementation of AMQP (Advanced Message Queuing Protocol) using the Erlang language. It supports concurrency and guarantees the sequential consistency of messages. Additionally, RabbitMQ provides the message acknowledgement mechanism to ensure that messages can be delivered reliably to the consumer from the broker. However, these crucial properties have not been verified with formal methods. In this paper, we model the architecture of RabbitMQ with timed automata. By utilizing the model checker UPPAAL, RabbitMQ is abstracted to five timed automata. Based on the formalized model, we verify whether RabbitMQ meets some essential properties, including Reachability of Data, Concurrency, Sequence Consistency and Message Acknowledgement. Consequently, it can be found that RabbitMQ can totally satisfy these properties according to the verification results via UPPAAL.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124897418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Time is Money: Countering Griefing Attack in Lightning Network 时间就是金钱:对抗闪电网络中的悲伤攻击
Subhra Mazumdar, Prabal Banerjee, S. Ruj
Lightning Network is the most deployed Bitcoin-compatible Payment Channel Network (PCN), ensuring faster execution of transactions. However, this Layer-two solution has its fair share of problems. Topological analysis on Lightning Network reveals that Griefing Attack is a major problem whereby an adversary intentionally exhausts the channel capacity of the network. Though the attack does not always result in a direct monetary gain of the attacker, blocking of channel capacity for several days prevents several nodes from processing any future transaction request, leading to substantial collateral damage. If the attacker is able to lock funds in multiple paths simultaneously, then a major portion of the network may get stalled, reducing the throughput. Mitigating Griefing Attack still remains an open problem. In this paper, we propose an efficient countermeasure for the attack, known as Griefing-Penalty. To realize it, we propose a new payment protocol HTLC-GP or Hashed Timelock Contract with Griefing-Penalty. It not only preserves privacy but also ensures that an attacker cannot ascribe blame on any honest party present in the path relaying the payment. We evaluate the effectiveness of griefing-penalty using different attack strategies and test it on several snapshots of Lightning Network. Our evaluation results show that loss incurred is substantially high for HTLC-GP compared to HTLC.
闪电网络是部署最多的比特币兼容支付通道网络(PCN),确保更快地执行交易。然而,这种第二层解决方案也存在一些问题。对闪电网络的拓扑分析表明,Griefing攻击是攻击者故意耗尽网络信道容量的主要问题。虽然攻击并不总是导致攻击者获得直接的金钱收益,但通道容量阻塞数天会阻止几个节点处理任何未来的交易请求,从而导致实质性的附带损害。如果攻击者能够同时在多条路径上锁定资金,那么网络的大部分可能会停滞,从而降低吞吐量。减轻悲伤攻击仍然是一个悬而未决的问题。在本文中,我们提出了一种有效的应对攻击的对策,称为“悲伤惩罚”。为了实现这一目标,我们提出了一种新的支付协议HTLC-GP,即带悲伤惩罚的哈希时限合同。它不仅保护了隐私,而且确保攻击者不能将责任归咎于中继支付路径中存在的任何诚实方。我们使用不同的攻击策略评估了悲伤惩罚的有效性,并在多个闪电网络快照上进行了测试。我们的评估结果表明,HTLC- gp的损失比HTLC高得多。
{"title":"Time is Money: Countering Griefing Attack in Lightning Network","authors":"Subhra Mazumdar, Prabal Banerjee, S. Ruj","doi":"10.1109/TrustCom50675.2020.00138","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00138","url":null,"abstract":"Lightning Network is the most deployed Bitcoin-compatible Payment Channel Network (PCN), ensuring faster execution of transactions. However, this Layer-two solution has its fair share of problems. Topological analysis on Lightning Network reveals that Griefing Attack is a major problem whereby an adversary intentionally exhausts the channel capacity of the network. Though the attack does not always result in a direct monetary gain of the attacker, blocking of channel capacity for several days prevents several nodes from processing any future transaction request, leading to substantial collateral damage. If the attacker is able to lock funds in multiple paths simultaneously, then a major portion of the network may get stalled, reducing the throughput. Mitigating Griefing Attack still remains an open problem. In this paper, we propose an efficient countermeasure for the attack, known as Griefing-Penalty. To realize it, we propose a new payment protocol HTLC-GP or Hashed Timelock Contract with Griefing-Penalty. It not only preserves privacy but also ensures that an attacker cannot ascribe blame on any honest party present in the path relaying the payment. We evaluate the effectiveness of griefing-penalty using different attack strategies and test it on several snapshots of Lightning Network. Our evaluation results show that loss incurred is substantially high for HTLC-GP compared to HTLC.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116539433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Joint Learning for Document-Level Threat Intelligence Relation Extraction and Coreference Resolution Based on GCN 基于GCN的联合学习文档级威胁情报关系提取与关联解析
Xuren Wang, Mengbo Xiong, Yali Luo, Ning Li, Zhengwei Jiang, Zihan Xiong
In order to help researchers quickly understand the connection between new threat events and previous threat events, threat intelligence document-level relation extraction plays a very important role in threat intelligence text analysis and processing. Because there is no public document-level threat intelligence dataset, we create APTERC-DOC, an APT intelligence entities, relations and coreference dataset. We treat the relation extraction as a multi-classification task. Treating the coreference relation as a kind of predefined relations, we develop a joint learning framework called TIRECO, a model which can simultaneously complete threat intelligence relation extraction and coreference resolution. In order to solve the problem of document-level text being too long to extract feature, we propose the concept of sentence set, which transforms document-level relation extraction into inter-sentence relation extraction. To incorporate relevant information with maximally removing irrelevant content in sentence set, we further apply a novel pruning strategy (SDP-VP-SET) to the input trees considering that verbs are crucial in determining the relation between entities in sentence set. With retaining the shortest path and nodes that are K hops away from the shortest path, we give the edge connected to the verb nodes a weight of w times. Experimental results show that our model not only performs well in the extraction of inter-sentence relations, it is also effective in intra-sentence relations, and the F1 value has increased by 15.694%.
为了帮助研究人员快速了解新的威胁事件和以前的威胁事件之间的联系,威胁情报文档级关系提取在威胁情报文本分析和处理中起着非常重要的作用。由于没有公开的文档级威胁情报数据集,我们创建了APTERC-DOC,一个APT情报实体、关系和共同参考数据集。我们把关系抽取看作是一个多分类的任务。将共参考关系视为一种预定义关系,开发了TIRECO联合学习框架,该模型可以同时完成威胁情报关系提取和共参考解决。为了解决文档级文本太长而无法提取特征的问题,我们提出了句子集的概念,将文档级关系提取转化为句子间关系提取。考虑到动词在决定句子集中实体之间的关系中起着至关重要的作用,我们进一步对输入树应用了一种新的剪枝策略(SDP-VP-SET),以在最大程度上去除句子集中不相关的内容的同时整合相关信息。在保留最短路径和距离最短路径K跳的节点的情况下,我们给连接到动词节点的边赋予w次权值。实验结果表明,我们的模型不仅在句间关系提取方面表现良好,在句内关系提取方面也很有效,F1值提高了15.694%。
{"title":"Joint Learning for Document-Level Threat Intelligence Relation Extraction and Coreference Resolution Based on GCN","authors":"Xuren Wang, Mengbo Xiong, Yali Luo, Ning Li, Zhengwei Jiang, Zihan Xiong","doi":"10.1109/TrustCom50675.2020.00083","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00083","url":null,"abstract":"In order to help researchers quickly understand the connection between new threat events and previous threat events, threat intelligence document-level relation extraction plays a very important role in threat intelligence text analysis and processing. Because there is no public document-level threat intelligence dataset, we create APTERC-DOC, an APT intelligence entities, relations and coreference dataset. We treat the relation extraction as a multi-classification task. Treating the coreference relation as a kind of predefined relations, we develop a joint learning framework called TIRECO, a model which can simultaneously complete threat intelligence relation extraction and coreference resolution. In order to solve the problem of document-level text being too long to extract feature, we propose the concept of sentence set, which transforms document-level relation extraction into inter-sentence relation extraction. To incorporate relevant information with maximally removing irrelevant content in sentence set, we further apply a novel pruning strategy (SDP-VP-SET) to the input trees considering that verbs are crucial in determining the relation between entities in sentence set. With retaining the shortest path and nodes that are K hops away from the shortest path, we give the edge connected to the verb nodes a weight of w times. Experimental results show that our model not only performs well in the extraction of inter-sentence relations, it is also effective in intra-sentence relations, and the F1 value has increased by 15.694%.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122629284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Privacy-Preserving Crowdsensing System with Muti-Blockchain 基于多区块链的隐私保护众测系统
Tao Peng, Jierong Liu, Jianer Chen, Guojun Wang
Mobile crowdsensing system has become a new paradigm application with popularity and development of smart mobile devices. It provides a costless and efficient model to collect sensory data. However, most of mobile crowdsensing systems are based on the centralized structure, which will lead to serious privacy disclosure. In this paper, we combine k-anonymity and blockchain to build a mobile corwdsensing system, in which the users can upload their sensory data and receive corresponding rewards without privacy disclosure concern. With the distributed structure system and encryption algorithm, the system achieves enhanced privacy preservation through breaking the link between data and rewards and their owners.
随着智能移动设备的普及和发展,移动众测系统已经成为一种新的应用范式。它提供了一种低成本、高效率的感官数据采集模型。然而,大多数移动众测系统都是基于集中式结构,这将导致严重的隐私泄露。在本文中,我们将k-匿名和区块链相结合,构建了一个移动群体感知系统,用户可以上传自己的感知数据并获得相应的奖励,而无需担心隐私泄露。该系统采用分布式结构体系和加密算法,打破了数据、奖励与所有者之间的联系,增强了隐私保护。
{"title":"A Privacy-Preserving Crowdsensing System with Muti-Blockchain","authors":"Tao Peng, Jierong Liu, Jianer Chen, Guojun Wang","doi":"10.1109/TrustCom50675.2020.00265","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00265","url":null,"abstract":"Mobile crowdsensing system has become a new paradigm application with popularity and development of smart mobile devices. It provides a costless and efficient model to collect sensory data. However, most of mobile crowdsensing systems are based on the centralized structure, which will lead to serious privacy disclosure. In this paper, we combine k-anonymity and blockchain to build a mobile corwdsensing system, in which the users can upload their sensory data and receive corresponding rewards without privacy disclosure concern. With the distributed structure system and encryption algorithm, the system achieves enhanced privacy preservation through breaking the link between data and rewards and their owners.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122929794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
PASS4IoT 2020 Organizing and Program Committees PASS4IoT 2020组织和项目委员会
{"title":"PASS4IoT 2020 Organizing and Program Committees","authors":"","doi":"10.1109/trustcom50675.2020.00010","DOIUrl":"https://doi.org/10.1109/trustcom50675.2020.00010","url":null,"abstract":"","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128497817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing 边缘计算中模块化幂运算的安全外包算法
Tianyi Zhang, Jian Wang
As one of the most expensive computations in public-key cryptosystems, modular exponentiation is typically out-sourced to the cloud servers. Traditional cloud-based outsourcing algorithms depend on multiple untrusted servers to guarantee the security, which may lead to vulnerability to the collusion attack. Although recent single-server multiple-requests outsourcing algorithms are more secure, they have to perform multiple requests to the single untrusted server to guarantee the security and checkability of the data, which will incur unacceptable latency and local computational costs. In comparison, the edge computing paradigm enhances security since it has multiple computational nodes, including some highly secure local computational nodes. In this paper, we propose the secure outsourcing algorithm of modular exponentiation for the edge computing paradigm. To address the dilemma that the computational resources of different nodes vary significantly, we design two lightweight algorithms to adaptively separate the modular exponentiation to the nodes based on the computational resources. To guarantee the outsourcing checkability, we propose a protocol verify the result returned from each node. We formally prove the security and checkability of our algorithm and validate the efficiency of our algorithm based on experiments and case studies.
作为公钥密码系统中最昂贵的计算之一,模块化幂运算通常外包给云服务器。传统的云外包算法依赖于多个不可信的服务器来保证安全,容易受到合谋攻击。虽然目前的单服务器多请求外包算法更加安全,但它们必须向单个不受信任的服务器执行多个请求,以保证数据的安全性和可检查性,这将产生不可接受的延迟和本地计算成本。相比之下,边缘计算范式增强了安全性,因为它有多个计算节点,包括一些高度安全的本地计算节点。在本文中,我们提出了一种安全外包算法的模块化幂运算的边缘计算范式。为了解决不同节点计算资源差异较大的难题,我们设计了两种轻量级算法,根据计算资源自适应地对节点进行模块化幂次分离。为了保证外包的可检查性,我们提出了一个协议来验证从每个节点返回的结果。通过实验和案例分析,正式证明了算法的安全性和可检查性,并验证了算法的有效性。
{"title":"Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing","authors":"Tianyi Zhang, Jian Wang","doi":"10.1109/TrustCom50675.2020.00082","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00082","url":null,"abstract":"As one of the most expensive computations in public-key cryptosystems, modular exponentiation is typically out-sourced to the cloud servers. Traditional cloud-based outsourcing algorithms depend on multiple untrusted servers to guarantee the security, which may lead to vulnerability to the collusion attack. Although recent single-server multiple-requests outsourcing algorithms are more secure, they have to perform multiple requests to the single untrusted server to guarantee the security and checkability of the data, which will incur unacceptable latency and local computational costs. In comparison, the edge computing paradigm enhances security since it has multiple computational nodes, including some highly secure local computational nodes. In this paper, we propose the secure outsourcing algorithm of modular exponentiation for the edge computing paradigm. To address the dilemma that the computational resources of different nodes vary significantly, we design two lightweight algorithms to adaptively separate the modular exponentiation to the nodes based on the computational resources. To guarantee the outsourcing checkability, we propose a protocol verify the result returned from each node. We formally prove the security and checkability of our algorithm and validate the efficiency of our algorithm based on experiments and case studies.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116566394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Trust Routing Scheme based on Identification of Non-complete Cooperative Nodes in Mobile Peer-to-Peer Networks 移动对等网络中基于非完全合作节点识别的信任路由方案
Dapeng Qu, Jiankun Zhang, Zhenhuan Hou, M. Wan, B. Dong
Mobile peer-to-peer network (MP2P) attracts increasing attentions due to the ubiquitous use of mobile communication and huge success of peer-to-peer (P2P) mode. However, open p2p mode makes nodes tend to be selfish, and the scarcity of resources in mobile nodes aggravates this problem, thus the nodes easily express a non-complete cooperative (NCC) attitude. Therefore, an identification of non-complete cooperative nodes and a corresponding trust routing scheme are proposed for MP2P in this paper. The concept of octant is firstly introduced to build a trust model which analyzes nodes from three dimensions, namely direct trust, internal state and recommendation reliability, and then the individual non-complete cooperative (INCC) nodes can be identified by the division of different octants. The direct trust monitors nodes' external behaviors, and the consideration of internal state and recommendation reliability contributes to differentiate the subjective and objective non-cooperation, and mitigate the attacks about direct trust values respectively. Thus, the trust model can identify various INCC nodes accurately. On the basis of identification of INCC nodes, cosine similarity method is applied to identify collusive non-complete cooperate (CNCC) nodes. Moreover, a trust routing scheme based on the identification of NCC nodes is presented to reasonably deal with different kinds of NCC nodes. Results from extensive simulation experiments demonstrate that this proposed identification and routing scheme have better performances, in terms of identification precision and packet delivery fraction than current schemes respectively.
随着移动通信的普及和P2P模式的巨大成功,移动点对点网络(MP2P)日益受到人们的关注。然而,开放的p2p模式使得节点具有自私自利的倾向,而移动节点资源的稀缺性又加剧了这一问题,因此节点容易表现出非完全合作(NCC)的态度。为此,本文提出了一种基于MP2P的非完全合作节点的识别方法和相应的信任路由方案。首先引入八域概念,建立信任模型,从直接信任、内部状态和推荐信度三个维度对节点进行分析,然后通过划分不同的八域来识别单个的非完全合作(INCC)节点。直接信任监控节点的外部行为,考虑内部状态和推荐可靠性有助于区分主观和客观的不合作,并分别减轻对直接信任值的攻击。因此,信任模型可以准确地识别各种INCC节点。在对CNCC节点进行识别的基础上,采用余弦相似度方法对串通非完全合作(CNCC)节点进行识别。此外,提出了一种基于NCC节点识别的信任路由方案,以合理处理不同类型的NCC节点。大量的仿真实验结果表明,本文提出的识别和路由方案在识别精度和分组分发率方面分别比现有方案具有更好的性能。
{"title":"A Trust Routing Scheme based on Identification of Non-complete Cooperative Nodes in Mobile Peer-to-Peer Networks","authors":"Dapeng Qu, Jiankun Zhang, Zhenhuan Hou, M. Wan, B. Dong","doi":"10.1109/TrustCom50675.2020.00017","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00017","url":null,"abstract":"Mobile peer-to-peer network (MP2P) attracts increasing attentions due to the ubiquitous use of mobile communication and huge success of peer-to-peer (P2P) mode. However, open p2p mode makes nodes tend to be selfish, and the scarcity of resources in mobile nodes aggravates this problem, thus the nodes easily express a non-complete cooperative (NCC) attitude. Therefore, an identification of non-complete cooperative nodes and a corresponding trust routing scheme are proposed for MP2P in this paper. The concept of octant is firstly introduced to build a trust model which analyzes nodes from three dimensions, namely direct trust, internal state and recommendation reliability, and then the individual non-complete cooperative (INCC) nodes can be identified by the division of different octants. The direct trust monitors nodes' external behaviors, and the consideration of internal state and recommendation reliability contributes to differentiate the subjective and objective non-cooperation, and mitigate the attacks about direct trust values respectively. Thus, the trust model can identify various INCC nodes accurately. On the basis of identification of INCC nodes, cosine similarity method is applied to identify collusive non-complete cooperate (CNCC) nodes. Moreover, a trust routing scheme based on the identification of NCC nodes is presented to reasonably deal with different kinds of NCC nodes. Results from extensive simulation experiments demonstrate that this proposed identification and routing scheme have better performances, in terms of identification precision and packet delivery fraction than current schemes respectively.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124379632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1