首页 > 最新文献

2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)最新文献

英文 中文
Are You Really Charging Me? 你真的在收费吗?
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00075
Chi Lin, Ziwei Yang, Jiankang Ren, Lei Wang, Wei Zhong, Guowei Wu, Qiang Zhang
Wireless rechargeable sensor networks (WRSNs), which benefit from recent breakthroughs in Wireless Power Transfer (WPT) technology, emerge as very promising for network lifetime extension. Traditional methods concentrate on system performance improvement while little attention has been paid to security, making them vulnerable to novel attacks. In this paper, we develop a novel Charging Spoofing Attack (CSA), in which a mobile charger (MC) is charging a node intuitively. Nevertheless, it is launching an attack based on the nonlinear superposition principle of electromagnetic waves, causing the target node to be unable to receive any energy and finally exhausted in vain. First, we explain and model the nonlinear superposition effect through experiments, which points out the potential of launching such a novel attack. Second, we formalize the attacking problem as a charging uTility optImization problem with key noDe timE window constraints (TIDE). Then, we propose an approximation algorithm termed CSA to solve the TIDE problem with a bounded performance guarantee. Theoretical analyses are presented to exploit the feature of CSA. Finally, to demonstrate the outperformed features of our scheme, extensive simulations and test-bed experiments are conducted, revealing that CSA can exhaust at least 80% of key nodes without being detected.
无线充电传感器网络(WRSNs)得益于无线能量传输(WPT)技术的最新突破,在延长网络寿命方面具有很大的前景。传统的方法主要关注系统性能的提高,而对安全性的关注较少,容易受到新的攻击。本文提出了一种新的充电欺骗攻击(CSA)方法,利用移动充电器对节点进行直观的充电。然而,它是基于电磁波的非线性叠加原理发动攻击,导致目标节点无法接收任何能量,最终徒劳地耗尽。首先,我们通过实验对非线性叠加效应进行了解释和建模,指出了发起这种新型攻击的潜力。其次,我们将攻击问题形式化为具有关键节点时间窗口约束(TIDE)的充电效用优化问题。然后,我们提出了一种称为CSA的近似算法来解决具有有界性能保证的TIDE问题。对CSA的特点进行了理论分析。最后,为了证明我们方案的优越特性,进行了大量的模拟和试验台实验,表明CSA可以在不被检测到的情况下耗尽至少80%的关键节点。
{"title":"Are You Really Charging Me?","authors":"Chi Lin, Ziwei Yang, Jiankang Ren, Lei Wang, Wei Zhong, Guowei Wu, Qiang Zhang","doi":"10.1109/ICDCS54860.2022.00075","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00075","url":null,"abstract":"Wireless rechargeable sensor networks (WRSNs), which benefit from recent breakthroughs in Wireless Power Transfer (WPT) technology, emerge as very promising for network lifetime extension. Traditional methods concentrate on system performance improvement while little attention has been paid to security, making them vulnerable to novel attacks. In this paper, we develop a novel Charging Spoofing Attack (CSA), in which a mobile charger (MC) is charging a node intuitively. Nevertheless, it is launching an attack based on the nonlinear superposition principle of electromagnetic waves, causing the target node to be unable to receive any energy and finally exhausted in vain. First, we explain and model the nonlinear superposition effect through experiments, which points out the potential of launching such a novel attack. Second, we formalize the attacking problem as a charging uTility optImization problem with key noDe timE window constraints (TIDE). Then, we propose an approximation algorithm termed CSA to solve the TIDE problem with a bounded performance guarantee. Theoretical analyses are presented to exploit the feature of CSA. Finally, to demonstrate the outperformed features of our scheme, extensive simulations and test-bed experiments are conducted, revealing that CSA can exhaust at least 80% of key nodes without being detected.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"74 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116469205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design Considerations of A Novel Distributed Key-Value Store for New Storage 新型分布式键值存储的设计考虑
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00131
Ruicheng Liu, Peiquan Jin, Xiaoliang Wang, Yongping Luo, Zhaole Chu
The emergence of new storage like persistent memory (PM) and zoned namespaces SSDs (ZNS-SSDs) introduces new challenges and opportunities for distributed key-value stores. Since LSM-tree has been widely adopted in distributed key-value stores, such as RocksDB and HBase, it is necessary to revisit the LSM-tree to make it adapt to new storage. In this paper, we first analyze the challenges of adapting the LSM-tree for new storage. Then, we propose a high-level architecture for a new-storage-aware LSM-tree-based key-value store called Hybrid-LSM. We explain the key structural issues of different storage layers in Hybrid-LSM and present some preliminary design ideas.
持久性内存(PM)和分区命名空间ssd (zns - ssd)等新存储的出现为分布式键值存储带来了新的挑战和机遇。由于LSM-tree在分布式键值存储(如RocksDB和HBase)中被广泛采用,因此有必要重新访问LSM-tree以使其适应新的存储。在本文中,我们首先分析了使lsm树适应新存储的挑战。然后,我们提出了一种高级架构,用于一种新的存储感知的基于lsm树的键值存储,称为Hybrid-LSM。我们解释了混合lsm中不同存储层的关键结构问题,并提出了一些初步的设计思路。
{"title":"Design Considerations of A Novel Distributed Key-Value Store for New Storage","authors":"Ruicheng Liu, Peiquan Jin, Xiaoliang Wang, Yongping Luo, Zhaole Chu","doi":"10.1109/ICDCS54860.2022.00131","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00131","url":null,"abstract":"The emergence of new storage like persistent memory (PM) and zoned namespaces SSDs (ZNS-SSDs) introduces new challenges and opportunities for distributed key-value stores. Since LSM-tree has been widely adopted in distributed key-value stores, such as RocksDB and HBase, it is necessary to revisit the LSM-tree to make it adapt to new storage. In this paper, we first analyze the challenges of adapting the LSM-tree for new storage. Then, we propose a high-level architecture for a new-storage-aware LSM-tree-based key-value store called Hybrid-LSM. We explain the key structural issues of different storage layers in Hybrid-LSM and present some preliminary design ideas.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124997794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sectum: Accurate Latency Prediction for TEE-hosted Deep Learning Inference 分组:tee承载深度学习推理的准确延迟预测
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00092
Yan Li, Junming Ma, Donggang Cao, Hong Mei
As the security issue of cloud-offloaded Deep Learning (DL) inference is drawing increasing attention, running DL inference in Trusted Execution Environments (TEEs) has become a common practice. Latency prediction of TEE-hosted DL model inference is essential for many scenarios, such as DNN model architecture searching with a latency constraint or layer scheduling in model-parallelism inference. However, existing solutions fail to address the memory over-commitment issue in resource-constrained environments inside TEEs.This paper presents Sectum, an accurate latency predictor for DL inference inside TEE enclaves. We first perform a synthetic empirical study to analyze the relationship between inference latency and memory occupation. Sectum predicts inference latency following a two-stage design based on some critical observations. First, Sectum uses a Graph Neural Network (GNN)-based model to detect whether a given model would trigger memory over-commitment in TEEs. Then, combining operator-level latency modeling with linear regression, Sectum could predict the latency of a model. To evaluate Sectum, we design a large dataset that contains the latency information of over 6k CNN models. Our experiments demonstrate that Sectum could achieve over 85% ±10% accuracy of latency prediction. To our knowledge, Sectum is the first method to predict TEE-hosted DL inference latency accurately.
随着云卸载深度学习(DL)推理的安全问题越来越受到关注,在可信执行环境(tee)中运行深度学习推理已经成为一种普遍的做法。基于tee的深度学习模型推理的延迟预测在许多情况下都是必不可少的,例如在模型并行推理中具有延迟约束的深度神经网络模型架构搜索或层调度。然而,现有的解决方案无法解决tee内部资源受限环境中的内存过度承诺问题。本文介绍了Sectum,一个准确的延迟预测器,用于TEE飞地内的DL推断。我们首先进行综合实证研究,分析推理延迟与内存占用之间的关系。Sectum根据一些关键观察结果预测了两阶段设计后的推理延迟。首先,Sectum使用基于图神经网络(GNN)的模型来检测给定模型是否会触发tee中的内存过度使用。然后,将算子级延迟建模与线性回归相结合,Sectum可以预测模型的延迟。为了评估Sectum,我们设计了一个包含超过6k个CNN模型延迟信息的大型数据集。我们的实验表明,Sectum可以达到85%±10%以上的延迟预测准确率。据我们所知,Sectum是第一个准确预测tee承载的DL推理延迟的方法。
{"title":"Sectum: Accurate Latency Prediction for TEE-hosted Deep Learning Inference","authors":"Yan Li, Junming Ma, Donggang Cao, Hong Mei","doi":"10.1109/ICDCS54860.2022.00092","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00092","url":null,"abstract":"As the security issue of cloud-offloaded Deep Learning (DL) inference is drawing increasing attention, running DL inference in Trusted Execution Environments (TEEs) has become a common practice. Latency prediction of TEE-hosted DL model inference is essential for many scenarios, such as DNN model architecture searching with a latency constraint or layer scheduling in model-parallelism inference. However, existing solutions fail to address the memory over-commitment issue in resource-constrained environments inside TEEs.This paper presents Sectum, an accurate latency predictor for DL inference inside TEE enclaves. We first perform a synthetic empirical study to analyze the relationship between inference latency and memory occupation. Sectum predicts inference latency following a two-stage design based on some critical observations. First, Sectum uses a Graph Neural Network (GNN)-based model to detect whether a given model would trigger memory over-commitment in TEEs. Then, combining operator-level latency modeling with linear regression, Sectum could predict the latency of a model. To evaluate Sectum, we design a large dataset that contains the latency information of over 6k CNN models. Our experiments demonstrate that Sectum could achieve over 85% ±10% accuracy of latency prediction. To our knowledge, Sectum is the first method to predict TEE-hosted DL inference latency accurately.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127354828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Themis: An Equal, Unpredictable, and Scalable Consensus for Consortium Blockchain Themis:一个平等的、不可预测的、可扩展的区块链联盟共识
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00031
Linpeng Jia, Keyuan Wang, Xin Wang, Lei Yu, Zhongcheng Li, Yi Sun
Consensus algorithm is the core component of consortium blockchains. Equality, Unpredictability and Scalability are three important demands for the consensus algorithms of consortium blockchain. Existing deterministic consensus algorithms (e.g. PBFT) can ensure Equality, but cannot meanwhile meet Unpredictability and Scalability; probabilistic consensus algorithms (e.g. PoW) can achieve Scalability and guarantee a decent Unpredictability, but cannot meet the Equality requirement. In this paper, we propose a new consensus algorithm, namely Themis, which takes the three properties into account. Themis independently adjusts the block-producing difficulty of each node through a self-adaptive node election mechanism, effectively reducing the correlation between the block-producing frequency and the invested computing power of each node. Besides, a GEOST main chain consensus rule is proposed to handle forks and further improve the performance of the algorithm. If a fork occurs, consensus nodes will choose the sub-chain with the highest Equality to join the main chain. Evaluations show that Themis achieves outstanding performance in Equality and Unpredictability while ensuring Scalability, compared with the existing algorithms.
共识算法是联盟区块链的核心组成部分。等价性、不可预测性和可扩展性是区块链联盟共识算法的三个重要要求。现有的确定性共识算法(如PBFT)可以保证等式性,但不能同时满足不可预测性和可扩展性;概率一致性算法(例如PoW)可以实现可扩展性并保证良好的不可预测性,但不能满足相等性要求。在本文中,我们提出了一个新的共识算法,即Themis,它考虑了这三个属性。Themis通过自适应节点选举机制独立调整每个节点的产块难度,有效降低了每个节点的产块频率与投入计算能力之间的相关性。此外,提出了GEOST主链共识规则来处理分叉,进一步提高了算法的性能。如果发生分叉,共识节点将选择平等度最高的子链加入主链。评估表明,与现有算法相比,Themis在保证可扩展性的同时,在平等性和不可预测性方面取得了出色的性能。
{"title":"Themis: An Equal, Unpredictable, and Scalable Consensus for Consortium Blockchain","authors":"Linpeng Jia, Keyuan Wang, Xin Wang, Lei Yu, Zhongcheng Li, Yi Sun","doi":"10.1109/ICDCS54860.2022.00031","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00031","url":null,"abstract":"Consensus algorithm is the core component of consortium blockchains. Equality, Unpredictability and Scalability are three important demands for the consensus algorithms of consortium blockchain. Existing deterministic consensus algorithms (e.g. PBFT) can ensure Equality, but cannot meanwhile meet Unpredictability and Scalability; probabilistic consensus algorithms (e.g. PoW) can achieve Scalability and guarantee a decent Unpredictability, but cannot meet the Equality requirement. In this paper, we propose a new consensus algorithm, namely Themis, which takes the three properties into account. Themis independently adjusts the block-producing difficulty of each node through a self-adaptive node election mechanism, effectively reducing the correlation between the block-producing frequency and the invested computing power of each node. Besides, a GEOST main chain consensus rule is proposed to handle forks and further improve the performance of the algorithm. If a fork occurs, consensus nodes will choose the sub-chain with the highest Equality to join the main chain. Evaluations show that Themis achieves outstanding performance in Equality and Unpredictability while ensuring Scalability, compared with the existing algorithms.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114233217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scube: Efficient Summarization for Skewed Graph Streams sccube:倾斜图流的高效总结
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00019
Ming Chen, Renxiang Zhou, Hanhua Chen, Hai Jin
Graph stream, which represents an evolving graph updating as an infinite edge stream, is a special emerging graph data model widely adopted in big data analysis applications. Entirely storing the continuously produced and tremendously large-scale datasets is impractical. Therefore, graph stream summarization structures which support approximate graph stream storage and management attract much recent attention. Existing designs commonly leverage a compressive matrix and use hash-based schemes to map each edge to a bucket of the matrix. Accordingly, they store the edges associated with the same node in the same row or column of the matrix. We show that existing designs suffer from unacceptable query latency and precision in the presence of node degree skewness in graph streams.We argue that the key to efficient graph stream summarization is to identify the high-degree nodes and leverage a differentiated strategy for the associated edges. However, it is not trivial to estimate the degree of a node in real-time graph streams due to the rigorous requirements of space and time efficiency. Moreover, the existence of duplicate edges makes high-degree nodes identification difficult. To solve the problem, we propose Scube, an efficient summarization structure for skewed graph streams. Two factors contribute to the efficiency of Scube. First, Scube proposes a space and computation efficient probabilistic counting scheme to identify high-degree nodes in a graph stream. Second, Scube differentiates the storage strategy for the edges associated with high-degree nodes by dynamically allocating multiple rows or columns. We conduct comprehensive experiments to evaluate the performance of Scube on large-scale real-world datasets. The results show that Scube significantly reduces the query latency over a graph stream by 48%-99%, as well as achieving acceptable query accuracy compared to the state-of-the-art designs.
图流是大数据分析应用中广泛采用的一种特殊的新兴图数据模型,它以无限边缘流的形式表现了图的不断更新。完全存储连续产生的和超大规模的数据集是不切实际的。因此,支持近似图流存储和管理的图流摘要结构引起了人们的广泛关注。现有的设计通常利用压缩矩阵,并使用基于哈希的方案将每个边映射到矩阵的一个桶。相应地,它们将与同一节点相关联的边存储在矩阵的同一行或同列中。我们表明,在图流中存在节点度偏差的情况下,现有的设计存在不可接受的查询延迟和精度。我们认为,高效图流总结的关键是识别高节点,并对相关边利用差异化策略。然而,由于对空间和时间效率的严格要求,在实时图流中估计节点的程度并不是一件容易的事情。此外,重复边的存在使得高次节点的识别变得困难。为了解决这个问题,我们提出了一种高效的歪斜图流摘要结构Scube。有两个因素影响着Scube的效率。首先,sccube提出了一种空间和计算效率高的概率计数方案来识别图流中的高节点。其次,Scube通过动态分配多行或多列来区分与高节点相关的边的存储策略。我们进行了全面的实验来评估sccube在大规模真实数据集上的性能。结果表明,与最先进的设计相比,sccube显着将图流上的查询延迟减少了48%-99%,并且实现了可接受的查询精度。
{"title":"Scube: Efficient Summarization for Skewed Graph Streams","authors":"Ming Chen, Renxiang Zhou, Hanhua Chen, Hai Jin","doi":"10.1109/ICDCS54860.2022.00019","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00019","url":null,"abstract":"Graph stream, which represents an evolving graph updating as an infinite edge stream, is a special emerging graph data model widely adopted in big data analysis applications. Entirely storing the continuously produced and tremendously large-scale datasets is impractical. Therefore, graph stream summarization structures which support approximate graph stream storage and management attract much recent attention. Existing designs commonly leverage a compressive matrix and use hash-based schemes to map each edge to a bucket of the matrix. Accordingly, they store the edges associated with the same node in the same row or column of the matrix. We show that existing designs suffer from unacceptable query latency and precision in the presence of node degree skewness in graph streams.We argue that the key to efficient graph stream summarization is to identify the high-degree nodes and leverage a differentiated strategy for the associated edges. However, it is not trivial to estimate the degree of a node in real-time graph streams due to the rigorous requirements of space and time efficiency. Moreover, the existence of duplicate edges makes high-degree nodes identification difficult. To solve the problem, we propose Scube, an efficient summarization structure for skewed graph streams. Two factors contribute to the efficiency of Scube. First, Scube proposes a space and computation efficient probabilistic counting scheme to identify high-degree nodes in a graph stream. Second, Scube differentiates the storage strategy for the edges associated with high-degree nodes by dynamically allocating multiple rows or columns. We conduct comprehensive experiments to evaluate the performance of Scube on large-scale real-world datasets. The results show that Scube significantly reduces the query latency over a graph stream by 48%-99%, as well as achieving acceptable query accuracy compared to the state-of-the-art designs.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129350334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sustainable Federated Learning with Long-term Online VCG Auction Mechanism 基于长期在线VCG拍卖机制的可持续联邦学习
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00091
Leijie Wu, Song Guo, Yi Liu, Zicong Hong, Yufeng Zhan, Wenchao Xu
Federated learning (FL) clients may be reluctant to participate in the energy-consuming FL unless they are incentivized. Existing incentive mechanisms seldom consider the economic properties, e.g., social welfare, individual rationality and incentive compatibility, which significantly limits the sustainability of FL to attract more clients. The Vickrey–Clarke–Groves (VCG) auction is an ideal mechanism for simultaneously guaranteeing all crucial economic properties to maximize social welfare. However, VCG auction cannot be applied directly to FL scenarios due to the following challenges: 1) It requires precise analytical derivation of the optimal strategy, which is unavailable due to the inherent model-unknown and privacy-sensitive characteristics of FL. 2) Current auction modeling decomposes the entire process into multiple independent rounds and solves them one-by-one, which breaks the successive correlation between rounds in the long-term training process of FL. To overcome these challenges, this paper presents a long-term online VCG auction mechanism for FL that employs an experience-driven deep reinforcement learning algorithm to obtain the optimal strategy. Besides, we extend long-term forms of the crucial economic properties for the successive FL process. Furthermore, knowledge transfer is applied to reduce the excessive training overhead arising from the VCG payment rules. By exploiting the environmental similarity among sub-auctions, we develop the strategy sharing to significantly cut the training time by half. Finally, we theoretically prove the extended economic properties and conduct extensive experiments on multiple real-world datasets. Compared with state-of-the-art approaches, the long-term social welfare of FL increases by 36% with a 37% reduction in payment.
联邦学习(FL)客户可能不愿意参与耗能的FL,除非他们受到激励。现有的激励机制很少考虑社会福利、个人理性和激励兼容性等经济属性,这极大地限制了FL吸引更多客户的可持续性。维克里-克拉克-格罗夫斯(VCG)拍卖是一种理想的机制,可以同时保证所有重要的经济财产,使社会福利最大化。然而,由于以下挑战,VCG拍卖不能直接应用于FL场景:1)需要对最优策略进行精确的解析推导,这是FL固有的模型未知和隐私敏感特性所无法实现的。2)目前的拍卖建模将整个过程分解为多个独立的轮次,逐个求解,打破了FL长期训练过程中轮次之间的连续相关性。本文提出了一种用于FL的长期在线VCG拍卖机制,该机制采用经验驱动的深度强化学习算法来获得最优策略。此外,我们扩展了连续FL过程的关键经济性质的长期形式。此外,该方法还采用知识转移的方法来减少由于VCG支付规则而产生的过多的训练开销。通过利用子拍卖之间的环境相似性,我们开发了共享策略,将训练时间大大缩短了一半。最后,我们从理论上证明了扩展的经济性质,并在多个真实世界的数据集上进行了广泛的实验。与最先进的方法相比,FL的长期社会福利增加了36%,而支付减少了37%。
{"title":"Sustainable Federated Learning with Long-term Online VCG Auction Mechanism","authors":"Leijie Wu, Song Guo, Yi Liu, Zicong Hong, Yufeng Zhan, Wenchao Xu","doi":"10.1109/ICDCS54860.2022.00091","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00091","url":null,"abstract":"Federated learning (FL) clients may be reluctant to participate in the energy-consuming FL unless they are incentivized. Existing incentive mechanisms seldom consider the economic properties, e.g., social welfare, individual rationality and incentive compatibility, which significantly limits the sustainability of FL to attract more clients. The Vickrey–Clarke–Groves (VCG) auction is an ideal mechanism for simultaneously guaranteeing all crucial economic properties to maximize social welfare. However, VCG auction cannot be applied directly to FL scenarios due to the following challenges: 1) It requires precise analytical derivation of the optimal strategy, which is unavailable due to the inherent model-unknown and privacy-sensitive characteristics of FL. 2) Current auction modeling decomposes the entire process into multiple independent rounds and solves them one-by-one, which breaks the successive correlation between rounds in the long-term training process of FL. To overcome these challenges, this paper presents a long-term online VCG auction mechanism for FL that employs an experience-driven deep reinforcement learning algorithm to obtain the optimal strategy. Besides, we extend long-term forms of the crucial economic properties for the successive FL process. Furthermore, knowledge transfer is applied to reduce the excessive training overhead arising from the VCG payment rules. By exploiting the environmental similarity among sub-auctions, we develop the strategy sharing to significantly cut the training time by half. Finally, we theoretically prove the extended economic properties and conduct extensive experiments on multiple real-world datasets. Compared with state-of-the-art approaches, the long-term social welfare of FL increases by 36% with a 37% reduction in payment.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130191334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Security Investigation of Ban Score and Misbehavior Tracking in Bitcoin Network 比特币网络禁制分数与不当行为追踪的安全性研究
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00027
Wenjun Fan, Simeon Wuthier, Hsiang-Jen Hong, Xiaobo Zhou, Yan Bai, Sang-Yoon Chang
Bitcoin P2P networking is especially vulnerable to networking threats because it is permissionless and does not have the security protections based on the trust in identities, which enables the attackers to manipulate the identities for Sybil and spoofing attacks. The Bitcoin node keeps track of its peer’s networking misbehaviors through ban scores. In this paper, we investigate the security problems of the ban-score mechanism and discover that the ban score is not only ineffective against the Bitcoin Message-based DoS (BM-DoS) attacks but also vulnerable to the Defamation attack as the network adversary can exploit the ban score to defame innocent peers. To defend against these threats, we design an anomaly detection approach that is effective, lightweight, and tailored to the networking threats exploiting Bitcoin’s ban-score mechanism. We prototype our threat discoveries against a real-world Bitcoin node connected to the Bitcoin Mainnet and conduct experiments based on the prototype implementation. The experimental results show that the attacks have devastating impacts on the targeted victim while being cost-effective on the attacker side. For example, an attacker can ban a peer in two milliseconds and reduce the victim’s mining rate by hundreds of thousands of hash computations per second. Furthermore, to counter the threats, we empirically validate our detection countermeasure’s effectiveness and performances against the BM-DoS and Defamation attacks.
比特币P2P网络特别容易受到网络威胁,因为它是未经许可的,并且没有基于身份信任的安全保护,这使得攻击者能够操纵身份进行Sybil和欺骗攻击。比特币节点通过禁止评分来跟踪其同行的网络不当行为。在本文中,我们研究了禁止分数机制的安全问题,发现禁止分数不仅对基于比特币消息的DoS (BM-DoS)攻击无效,而且容易受到诽谤攻击,因为网络对手可以利用禁止分数来诋毁无辜的同伴。为了防御这些威胁,我们设计了一种有效、轻量级的异常检测方法,并针对利用比特币禁令评分机制的网络威胁进行了量身定制。我们针对连接到比特币主网的真实比特币节点对我们的威胁发现进行了原型化,并基于原型实现进行了实验。实验结果表明,该攻击对目标目标具有破坏性的影响,同时攻击方具有较高的成本效益。例如,攻击者可以在两毫秒内禁止一个peer,并将受害者的挖掘速率降低每秒数十万次哈希计算。此外,为了应对威胁,我们通过经验验证了我们的检测对策对BM-DoS和诽谤攻击的有效性和性能。
{"title":"The Security Investigation of Ban Score and Misbehavior Tracking in Bitcoin Network","authors":"Wenjun Fan, Simeon Wuthier, Hsiang-Jen Hong, Xiaobo Zhou, Yan Bai, Sang-Yoon Chang","doi":"10.1109/ICDCS54860.2022.00027","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00027","url":null,"abstract":"Bitcoin P2P networking is especially vulnerable to networking threats because it is permissionless and does not have the security protections based on the trust in identities, which enables the attackers to manipulate the identities for Sybil and spoofing attacks. The Bitcoin node keeps track of its peer’s networking misbehaviors through ban scores. In this paper, we investigate the security problems of the ban-score mechanism and discover that the ban score is not only ineffective against the Bitcoin Message-based DoS (BM-DoS) attacks but also vulnerable to the Defamation attack as the network adversary can exploit the ban score to defame innocent peers. To defend against these threats, we design an anomaly detection approach that is effective, lightweight, and tailored to the networking threats exploiting Bitcoin’s ban-score mechanism. We prototype our threat discoveries against a real-world Bitcoin node connected to the Bitcoin Mainnet and conduct experiments based on the prototype implementation. The experimental results show that the attacks have devastating impacts on the targeted victim while being cost-effective on the attacker side. For example, an attacker can ban a peer in two milliseconds and reduce the victim’s mining rate by hundreds of thousands of hash computations per second. Furthermore, to counter the threats, we empirically validate our detection countermeasure’s effectiveness and performances against the BM-DoS and Defamation attacks.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130457261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BloomBox: Improving Availability and Efficiency in Geographic Hash Tables BloomBox:提高地理哈希表的可用性和效率
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00063
Xinwen Wang, R. V. Renesse
Mobile Ad Hoc Networks are important today for scenarios in which centralized cloud infrastructure is missing, has broken down, or imposes censure or undesirable monitoring of storage and communication. Unfortunately, existing peer-to-peer storage systems such as a Geographic Hash Table (GHT) can consume a significant amount of network bandwidth just to maintain a certain required number of replicas of the data due to the churn present in the network. The replicas have to continuously exchange heartbeat messages in order to detect failures of replicas. If heartbeat messages get lost, an unnecessary but expensive recovery protocol ends up wasting significant bandwidth. To avoid this, replicas are placed close to one another, but that makes them vulnerable to dependent failures.Based on Mergeable Bloom Filters, a new data structure proposed for peer-to-peer distributed systems, we build BloomBox, a failure detection protocol for a GHT. Our simulations show that BloomBox can significantly reduce bandwidth usage needed for regenerated blocks compared to heartbeat-based failure detection. Moreover, BloomBox can provide significantly better availability than protocols based on heartbeats by placing replicas in geographically diverse locations.
如今,移动自组织网络对于集中式云基础设施缺失、崩溃或对存储和通信施加谴责或不希望的监控的场景非常重要。不幸的是,现有的点对点存储系统(如地理散列表(GHT))可能会消耗大量的网络带宽,只是为了维护由于网络中存在的混乱而需要的一定数量的数据副本。为了检测副本的故障,副本必须不断地交换心跳消息。如果心跳消息丢失,那么不必要但昂贵的恢复协议最终会浪费大量带宽。为了避免这种情况,副本被放置在彼此靠近的位置,但这使得它们容易受到依赖故障的影响。基于Mergeable Bloom Filters(一种用于点对点分布式系统的新数据结构),我们构建了用于GHT的故障检测协议BloomBox。我们的模拟表明,与基于心跳的故障检测相比,BloomBox可以显着减少再生块所需的带宽使用。此外,通过在不同的地理位置放置副本,BloomBox可以提供比基于心跳的协议更好的可用性。
{"title":"BloomBox: Improving Availability and Efficiency in Geographic Hash Tables","authors":"Xinwen Wang, R. V. Renesse","doi":"10.1109/ICDCS54860.2022.00063","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00063","url":null,"abstract":"Mobile Ad Hoc Networks are important today for scenarios in which centralized cloud infrastructure is missing, has broken down, or imposes censure or undesirable monitoring of storage and communication. Unfortunately, existing peer-to-peer storage systems such as a Geographic Hash Table (GHT) can consume a significant amount of network bandwidth just to maintain a certain required number of replicas of the data due to the churn present in the network. The replicas have to continuously exchange heartbeat messages in order to detect failures of replicas. If heartbeat messages get lost, an unnecessary but expensive recovery protocol ends up wasting significant bandwidth. To avoid this, replicas are placed close to one another, but that makes them vulnerable to dependent failures.Based on Mergeable Bloom Filters, a new data structure proposed for peer-to-peer distributed systems, we build BloomBox, a failure detection protocol for a GHT. Our simulations show that BloomBox can significantly reduce bandwidth usage needed for regenerated blocks compared to heartbeat-based failure detection. Moreover, BloomBox can provide significantly better availability than protocols based on heartbeats by placing replicas in geographically diverse locations.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133953467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement Learning for Minimizing Communication Delay in Edge Computing 边缘计算中最小化通信延迟的强化学习
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00128
K. Rajashekar
For real-time edge computing applications working under stringent deadlines, communication delay between IoT devices and edge devices needs to be minimized. In order to minimize the communication delay between the IoT devices and the edge devices, we need a sophisticated approach for assignment IoT devices to the edge devices. Most of the heuristics solutions previously used to tackle the problem faced issues being solution stuck at local optima and high computational over head. To that end, researchers used reinforcement learning (RL) algorithms to explore the search space to get near optimal solutions. For our work, we consider RL based algorithms and show the preliminary results.
对于在严格期限下工作的实时边缘计算应用,需要最大限度地减少物联网设备和边缘设备之间的通信延迟。为了最大限度地减少物联网设备和边缘设备之间的通信延迟,我们需要一种复杂的方法来将物联网设备分配到边缘设备。以前用于解决问题的大多数启发式解决方案都面临着解决方案卡在局部最优点和高计算量的问题。为此,研究人员使用强化学习(RL)算法来探索搜索空间,以获得接近最优解。对于我们的工作,我们考虑了基于强化学习的算法,并展示了初步结果。
{"title":"Reinforcement Learning for Minimizing Communication Delay in Edge Computing","authors":"K. Rajashekar","doi":"10.1109/ICDCS54860.2022.00128","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00128","url":null,"abstract":"For real-time edge computing applications working under stringent deadlines, communication delay between IoT devices and edge devices needs to be minimized. In order to minimize the communication delay between the IoT devices and the edge devices, we need a sophisticated approach for assignment IoT devices to the edge devices. Most of the heuristics solutions previously used to tackle the problem faced issues being solution stuck at local optima and high computational over head. To that end, researchers used reinforcement learning (RL) algorithms to explore the search space to get near optimal solutions. For our work, we consider RL based algorithms and show the preliminary results.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134461705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BikeCAP: Deep Spatial-temporal Capsule Network for Multi-step Bike Demand Prediction BikeCAP:用于多步自行车需求预测的深度时空胶囊网络
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00085
Shuxin Zhong, Wenjun Lyu, Desheng Zhang, Yu Yang
Given the recent global development of bike-sharing systems, numerous methods have been proposed to predict their user demand. These methods work fine for single-step prediction (i.e., 10 mins) but are limited to predicting in a multi-step prediction (i.e., more than 60 mins), which is essential for applications such as bike re-balancing that requires long operation time. To address this limitation, we leverage the fact that the demand for upstream transportation, e.g., subways, can assist the future demand prediction of downstream transportation, e.g., bikes. Specifically, we design a deep spatial-temporal capsule network called BikeCAP with three components: (1) a historical capsule that learns the demand characteristics for both the upstream (i.e., subways) and downstream (i.e., bikes) transportation systems, where a pyramid convolutional layer explores the simultaneous spatial-temporal correlations; (2) a future capsule that actively captures the dynamic spatial-temporal propagation correlations from the upstream to the downstream system, in which a spatial-temporal routing technique benefits to reduce the accumulated prediction errors; (3) a 3D-deconvolution decoder that constructs future bike demand considering the similar downstream demand patterns in neighboring grids and adjacent time slots. Experimentally, we conduct comprehensive experiments on the data of 30, 000 bikes and 7 subway lines collected in Shenzhen City, China, The results show that BikeCAP outperforms several state-of-the-art methods, significantly increasing the performance by 38.6% in terms of accuracy in multi-step prediction. We also conduct ablation studies to show the significance of BikeCAP’s different designed components.
鉴于最近全球共享单车系统的发展,已经提出了许多方法来预测其用户需求。这些方法适用于单步预测(即10分钟),但仅限于多步预测(即超过60分钟),这对于需要长时间操作的自行车重新平衡等应用至关重要。为了解决这一限制,我们利用上游交通(如地铁)的需求可以帮助下游交通(如自行车)的未来需求预测这一事实。具体来说,我们设计了一个名为BikeCAP的深度时空胶囊网络,它有三个组成部分:(1)一个历史胶囊,它学习上游(即地铁)和下游(即自行车)交通系统的需求特征,其中金字塔卷积层探索同时存在的时空相关性;(2)主动捕获从上游系统到下游系统的动态时空传播相关性的未来胶囊,其中时空路由技术有利于减少累积的预测误差;(3) 3d反卷积解码器,考虑相邻网格和相邻时隙中相似的下游需求模式,构建未来自行车需求。实验中,我们对中国深圳市收集的3万辆自行车和7条地铁线路的数据进行了综合实验,结果表明,BikeCAP在多步预测方面的性能优于几种最先进的方法,准确率显著提高了38.6%。我们还进行了消融研究,以显示BikeCAP不同设计组件的重要性。
{"title":"BikeCAP: Deep Spatial-temporal Capsule Network for Multi-step Bike Demand Prediction","authors":"Shuxin Zhong, Wenjun Lyu, Desheng Zhang, Yu Yang","doi":"10.1109/ICDCS54860.2022.00085","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00085","url":null,"abstract":"Given the recent global development of bike-sharing systems, numerous methods have been proposed to predict their user demand. These methods work fine for single-step prediction (i.e., 10 mins) but are limited to predicting in a multi-step prediction (i.e., more than 60 mins), which is essential for applications such as bike re-balancing that requires long operation time. To address this limitation, we leverage the fact that the demand for upstream transportation, e.g., subways, can assist the future demand prediction of downstream transportation, e.g., bikes. Specifically, we design a deep spatial-temporal capsule network called BikeCAP with three components: (1) a historical capsule that learns the demand characteristics for both the upstream (i.e., subways) and downstream (i.e., bikes) transportation systems, where a pyramid convolutional layer explores the simultaneous spatial-temporal correlations; (2) a future capsule that actively captures the dynamic spatial-temporal propagation correlations from the upstream to the downstream system, in which a spatial-temporal routing technique benefits to reduce the accumulated prediction errors; (3) a 3D-deconvolution decoder that constructs future bike demand considering the similar downstream demand patterns in neighboring grids and adjacent time slots. Experimentally, we conduct comprehensive experiments on the data of 30, 000 bikes and 7 subway lines collected in Shenzhen City, China, The results show that BikeCAP outperforms several state-of-the-art methods, significantly increasing the performance by 38.6% in terms of accuracy in multi-step prediction. We also conduct ablation studies to show the significance of BikeCAP’s different designed components.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130937012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1