首页 > 最新文献

2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)最新文献

英文 中文
Message from the Joint Workshop Chairs 联合讲习班主席致辞
{"title":"Message from the Joint Workshop Chairs","authors":"","doi":"10.1109/wowmom54355.2022.00098","DOIUrl":"https://doi.org/10.1109/wowmom54355.2022.00098","url":null,"abstract":"","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129608058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reviewers: NTN-6G 2022 审稿人:NTN-6G 2022
{"title":"Reviewers: NTN-6G 2022","authors":"","doi":"10.1109/wowmom54355.2022.00011","DOIUrl":"https://doi.org/10.1109/wowmom54355.2022.00011","url":null,"abstract":"","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120947947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Analog Eigen-Beamforming Procedure for Wideband mmWave MIMO-OFDM Systems 宽带毫米波MIMO-OFDM系统的有效模拟本征波束形成方法
Corentin Fonteneau, M. Crussiére, B. Jahan
Millimeter wave communication systems define a new paradigm for wireless communications. At such high frequencies, multi-input multi-output (MIMO) processing is done on the radio-frequency signals to limit the hardware complexity and the energy consumption. Consequently, the channel experienced by the receiver directly depends on the transmitter and receiver antenna array responses, making the determination of the analog precoder and combiner an intertwined problem. In this paper, we propose a procedure capable of calculating analog weights at the transmitter and at the receiver, which allows the maximization of the wideband spectral efficiency for single stream transmission single user MIMO (SU-MIMO). While solely relying on partial channel state information (CSI), our procedure has close performance to full CSI-dependent schemes.
毫米波通信系统定义了无线通信的新范式。在如此高的频率下,对射频信号进行多输入多输出(MIMO)处理,以限制硬件复杂性和能量消耗。因此,接收器所经历的信道直接取决于发射器和接收器天线阵列的响应,使得模拟预编码器和合并器的确定成为一个相互交织的问题。在本文中,我们提出了一种能够计算发送端和接收端的模拟权重的方法,该方法允许单流传输单用户MIMO (SU-MIMO)的宽带频谱效率最大化。虽然仅依赖于部分通道状态信息(CSI),但我们的过程具有接近完全依赖于CSI的方案的性能。
{"title":"An Efficient Analog Eigen-Beamforming Procedure for Wideband mmWave MIMO-OFDM Systems","authors":"Corentin Fonteneau, M. Crussiére, B. Jahan","doi":"10.1109/WoWMoM54355.2022.00040","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00040","url":null,"abstract":"Millimeter wave communication systems define a new paradigm for wireless communications. At such high frequencies, multi-input multi-output (MIMO) processing is done on the radio-frequency signals to limit the hardware complexity and the energy consumption. Consequently, the channel experienced by the receiver directly depends on the transmitter and receiver antenna array responses, making the determination of the analog precoder and combiner an intertwined problem. In this paper, we propose a procedure capable of calculating analog weights at the transmitter and at the receiver, which allows the maximization of the wideband spectral efficiency for single stream transmission single user MIMO (SU-MIMO). While solely relying on partial channel state information (CSI), our procedure has close performance to full CSI-dependent schemes.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114310445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intelligent Machine Learning Approach for Smart Grid Theft Detection 一种智能机器学习方法用于智能电网盗窃检测
D. Garg, Neeraj Kumar, Nazeeruddin Mohammad
Smart grids are an improvement of the traditional electric grids. They allow a much higher degree of automation and more efficient power distribution. Nonetheless, due to automation, these grids become more vulnerable to cyber attacks. Hence, cyber security becomes a major milestone to overcome before we can permanently shift to smart grids. Electric theft is one of the most dangerous cyber attacks in a smart grid. It allows users to lie about their load profiles and decrease their electricity bills. Several research studies have been conducted regarding the detection of such cyber attacks in a smart grid, but none of them consider weather information as a feature. This paper proposes a novel machine learning-based approach to smart grid electricity theft detection using both the load profile of a household and the weather features. The results show that our current approach using both load and weather information perform much better than previous approaches that only use load information.
智能电网是对传统电网的改进。它们允许更高程度的自动化和更有效的配电。然而,由于自动化,这些电网变得更容易受到网络攻击。因此,在我们永久转向智能电网之前,网络安全成为一个需要克服的重要里程碑。电力盗窃是智能电网中最危险的网络攻击之一。它允许用户谎报他们的负荷概况并减少他们的电费。关于在智能电网中检测此类网络攻击已经进行了几项研究,但没有一项研究将天气信息作为特征。本文提出了一种基于机器学习的智能电网窃电检测方法,该方法同时使用家庭负荷概况和天气特征。结果表明,我们目前使用的同时使用负载和天气信息的方法比以前只使用负载信息的方法性能要好得多。
{"title":"An Intelligent Machine Learning Approach for Smart Grid Theft Detection","authors":"D. Garg, Neeraj Kumar, Nazeeruddin Mohammad","doi":"10.1109/WoWMoM54355.2022.00079","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00079","url":null,"abstract":"Smart grids are an improvement of the traditional electric grids. They allow a much higher degree of automation and more efficient power distribution. Nonetheless, due to automation, these grids become more vulnerable to cyber attacks. Hence, cyber security becomes a major milestone to overcome before we can permanently shift to smart grids. Electric theft is one of the most dangerous cyber attacks in a smart grid. It allows users to lie about their load profiles and decrease their electricity bills. Several research studies have been conducted regarding the detection of such cyber attacks in a smart grid, but none of them consider weather information as a feature. This paper proposes a novel machine learning-based approach to smart grid electricity theft detection using both the load profile of a household and the weather features. The results show that our current approach using both load and weather information perform much better than previous approaches that only use load information.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130259922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Artificial Intelligence Recognition Technology Based On Convolutional Neural Networks 基于卷积神经网络的人工智能识别新技术
K. Chen, Shuyi Wang, Haotong Cao
With the continuous development of social science and technology, artificial intelligence identification has been widely used and plays a very important role in some special fields. Convolutional neural network has a good effect in image processing, so it is widely used in intelligent recognition scenario. Activation functions can help convolutional neural network better understand and fit complex function models, It is necessary to design an efficient activation function. This paper proposes a new convolutional neural network model based on improved activation function usage patterns, and the performances of three common used activation functions, including sigmoid function, tanh function and relu function, in centralized and decentralized training methods are detailed analyzed respectively. The experiment results show that the effect of repeated training with different activation functions is better than that of single linear rectification function in recognition accuracy and recognition of special cases, and the recognition speed is obviously faster than the traditional model. Furthermore, under the same activation function, when the number of training rounds and the training amount are small, the expected accuracy of centralized training is lower compared with that of decentralized training, but the detection accuracy is improved due to the detection mechanism.
随着社会科学技术的不断发展,人工智能识别得到了广泛的应用,并在一些特殊领域发挥着非常重要的作用。卷积神经网络具有良好的图像处理效果,因此在智能识别场景中得到了广泛的应用。激活函数可以帮助卷积神经网络更好地理解和拟合复杂的函数模型,设计一种高效的激活函数是必要的。本文提出了一种基于改进激活函数使用模式的卷积神经网络模型,并分别详细分析了sigmoid函数、tanh函数和relu函数三种常用的激活函数在集中式和分散式训练方法中的性能。实验结果表明,不同激活函数的重复训练在识别精度和特殊情况识别上都优于单一线性校正函数,识别速度明显快于传统模型。此外,在相同的激活函数下,当训练轮数和训练量较小时,集中训练的期望准确率低于分散训练,但由于检测机制的作用,检测准确率得到了提高。
{"title":"A New Artificial Intelligence Recognition Technology Based On Convolutional Neural Networks","authors":"K. Chen, Shuyi Wang, Haotong Cao","doi":"10.1109/WoWMoM54355.2022.00080","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00080","url":null,"abstract":"With the continuous development of social science and technology, artificial intelligence identification has been widely used and plays a very important role in some special fields. Convolutional neural network has a good effect in image processing, so it is widely used in intelligent recognition scenario. Activation functions can help convolutional neural network better understand and fit complex function models, It is necessary to design an efficient activation function. This paper proposes a new convolutional neural network model based on improved activation function usage patterns, and the performances of three common used activation functions, including sigmoid function, tanh function and relu function, in centralized and decentralized training methods are detailed analyzed respectively. The experiment results show that the effect of repeated training with different activation functions is better than that of single linear rectification function in recognition accuracy and recognition of special cases, and the recognition speed is obviously faster than the traditional model. Furthermore, under the same activation function, when the number of training rounds and the training amount are small, the expected accuracy of centralized training is lower compared with that of decentralized training, but the detection accuracy is improved due to the detection mechanism.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133977866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Demystifying Resource Allocation Policies in Operational 5G mmWave Networks 5G运营毫米波网络资源分配策略揭秘
Phuc Dinh, Moinak Ghoshal, Dimitrios Koutsonikolas, Joerg Widmer
5G mmWave is being rapidly deployed by all major mobile operators. With the technology still in its infancy, several early research works analyze the performance of operational 5G mmWave networks. Nonetheless, these measurement studies primarily focus on single-user performance, leaving the sharing and resource allocation policies largely unexplored. In this paper, we fill this gap by conducting the, to our best knowledge, first systematic study of resource allocation policies of current 5G mmWave mobile network deployments through an extensive measurement campaign across four major US cities and two major mobile operators. Our study reveals that resource allocation among multiple flows is strictly governed by the cellular operators and flows are not allowed to compete with each other in a shared queue. Operators employ simple threshold-based policies and often over-allocate resources to new flows with low traffic demands or reserve some capacity for future usage. Interestingly, these policies vary not only among operators but also for a single operator in different cities. We also discuss a number of anomalous behaviors we observed in our experiments across different cities and operators.
5G毫米波正在被所有主要移动运营商快速部署。由于该技术仍处于起步阶段,一些早期研究工作分析了可操作的5G毫米波网络的性能。尽管如此,这些度量研究主要关注单用户性能,使得共享和资源分配策略在很大程度上未被探索。在本文中,我们通过在美国四个主要城市和两家主要移动运营商进行广泛的测量活动,对当前5G毫米波移动网络部署的资源分配政策进行了首次系统研究,以填补这一空白。我们的研究表明,多个流之间的资源分配是由蜂窝运营商严格控制的,并且不允许流在共享队列中相互竞争。运营商采用简单的基于阈值的策略,通常会将资源过度分配给低流量需求的新流量,或者保留一些容量以供将来使用。有趣的是,这些政策不仅在运营商之间不同,而且在不同城市的单一运营商之间也不同。我们还讨论了我们在不同城市和运营商的实验中观察到的一些异常行为。
{"title":"Demystifying Resource Allocation Policies in Operational 5G mmWave Networks","authors":"Phuc Dinh, Moinak Ghoshal, Dimitrios Koutsonikolas, Joerg Widmer","doi":"10.1109/WoWMoM54355.2022.00016","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00016","url":null,"abstract":"5G mmWave is being rapidly deployed by all major mobile operators. With the technology still in its infancy, several early research works analyze the performance of operational 5G mmWave networks. Nonetheless, these measurement studies primarily focus on single-user performance, leaving the sharing and resource allocation policies largely unexplored. In this paper, we fill this gap by conducting the, to our best knowledge, first systematic study of resource allocation policies of current 5G mmWave mobile network deployments through an extensive measurement campaign across four major US cities and two major mobile operators. Our study reveals that resource allocation among multiple flows is strictly governed by the cellular operators and flows are not allowed to compete with each other in a shared queue. Operators employ simple threshold-based policies and often over-allocate resources to new flows with low traffic demands or reserve some capacity for future usage. Interestingly, these policies vary not only among operators but also for a single operator in different cities. We also discuss a number of anomalous behaviors we observed in our experiments across different cities and operators.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134472745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
LightGyro:A Light-based Orientation Measuring Scheme Using Batteryless Reflective Film 光陀螺:一种利用无电池反射膜的基于光的定向测量方案
Qing Guo, Linfu Xie, Xinran Lu, Baoliu Ye, Sanglu Lu
In industrial production, the orientation of facility is a powerful indicator to verify whether the facility is in a normal operating track. In this paper, we present LightGyro, a cheap and efficient batteryless scheme to measure the facility orientation, it leverages the orientation amplification effect of reflection to improve the measuring accuracy to one degree. LightGyro system is composed of low-cost camera, batteryless reflective film and LEDs. In the working process of LightGyro, we attach a reflective film to the target and let it reflect the light from LEDs to the camera. Then the LightGyro would extract the LED-related spots in the captured frame and restore the reflection route to measure the orientation. To extract the LED-related spots from complicated background automatically, we propose to leverage the affine transformation to search for the topology of multiple spots which is related to the deployed LED array. To address the dimension missing issue caused by camera projection and restore the reflection route, we propose a light array-based reflection model to extract the missing dimension from relative positions of multiple spots. To the best of our knowledge, this is the first work to utilize light reflection to measure orientation. Our experiments show that the average accuracy of LightGyro achieves less than 2◦. When the reflective film is far from the camera, the mean error is less than 1◦.
在工业生产中,设备的方位是检验设备是否处于正常运行轨道的有力指标。本文提出了一种廉价、高效的无电池设备定向测量方案LightGyro,它利用反射的定向放大效应,将测量精度提高了1度。光陀螺系统由低成本相机、无电池反射膜和led组成。在LightGyro的工作过程中,我们在目标上附着一层反射膜,让它将led发出的光反射到相机上。然后,LightGyro将在捕获的帧中提取与led相关的斑点并恢复反射路线以测量方向。为了从复杂背景中自动提取与LED相关的斑点,我们提出利用仿射变换来搜索与部署的LED阵列相关的多个斑点的拓扑结构。为了解决相机投影造成的维数缺失问题并恢复反射路径,我们提出了一种基于光阵列的反射模型,从多个点的相对位置提取缺失维数。据我们所知,这是第一次利用光反射来测量方位。我们的实验表明,光陀螺的平均精度达到小于2◦。当反射膜距离相机较远时,平均误差小于1◦。
{"title":"LightGyro:A Light-based Orientation Measuring Scheme Using Batteryless Reflective Film","authors":"Qing Guo, Linfu Xie, Xinran Lu, Baoliu Ye, Sanglu Lu","doi":"10.1109/WoWMoM54355.2022.00064","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00064","url":null,"abstract":"In industrial production, the orientation of facility is a powerful indicator to verify whether the facility is in a normal operating track. In this paper, we present LightGyro, a cheap and efficient batteryless scheme to measure the facility orientation, it leverages the orientation amplification effect of reflection to improve the measuring accuracy to one degree. LightGyro system is composed of low-cost camera, batteryless reflective film and LEDs. In the working process of LightGyro, we attach a reflective film to the target and let it reflect the light from LEDs to the camera. Then the LightGyro would extract the LED-related spots in the captured frame and restore the reflection route to measure the orientation. To extract the LED-related spots from complicated background automatically, we propose to leverage the affine transformation to search for the topology of multiple spots which is related to the deployed LED array. To address the dimension missing issue caused by camera projection and restore the reflection route, we propose a light array-based reflection model to extract the missing dimension from relative positions of multiple spots. To the best of our knowledge, this is the first work to utilize light reflection to measure orientation. Our experiments show that the average accuracy of LightGyro achieves less than 2◦. When the reflective film is far from the camera, the mean error is less than 1◦.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125817553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Context Aware Adaptive ML Inference in Mobile-Cloud Applications 移动云应用中的上下文感知自适应ML推理
Koustabh Dolui, Sam Michiels, D. Hughes, H. Hallez
With the emergence of mobile devices having enough resources to execute real-time ML inference, deployment opportunities arise on mobile devices while keeping privacy-sensitive data close to the source and reducing server load. Moreover, offloading inference to a cloud server facilitates deployment of neural network-based applications on resource-constrained devices. Depending on the application goals and execution context of the application, the optimal deployment on either cloud server or mobile device varies during the lifetime of an application. In this paper, we propose a context-aware middleware that enables optimization of deployed application software to satisfy the application’s functional goals in accordance with changing execution context and environmental conditions. We facilitate system design through the abstraction of deployed software components as states and make use of finite state machines and contextual triggers to model the reconfiguration of the system. We evaluate our framework using a real-world nutritional monitoring application via food image recognition deployed in a two-tier mobile and cloud architecture. We compare the proposed solution with various static deployments of the application and show that our approach can react to changing application goals at run-time in order to reduce server load and thereby increase scalability.
随着拥有足够资源来执行实时ML推理的移动设备的出现,移动设备上的部署机会出现了,同时保持隐私敏感数据靠近源并减少服务器负载。此外,将推理卸载到云服务器有助于在资源受限的设备上部署基于神经网络的应用程序。根据应用程序的目标和执行上下文,在云服务器或移动设备上的最佳部署在应用程序的生命周期中会有所不同。在本文中,我们提出了一种上下文感知中间件,它可以根据不断变化的执行上下文和环境条件优化已部署的应用软件,以满足应用程序的功能目标。我们通过将部署的软件组件抽象为状态来促进系统设计,并利用有限状态机和上下文触发器对系统的重新配置进行建模。我们通过在两层移动和云架构中部署的食品图像识别,使用现实世界的营养监测应用程序来评估我们的框架。我们将建议的解决方案与应用程序的各种静态部署进行比较,并表明我们的方法可以在运行时对不断变化的应用程序目标做出反应,从而减少服务器负载,从而提高可伸缩性。
{"title":"Context Aware Adaptive ML Inference in Mobile-Cloud Applications","authors":"Koustabh Dolui, Sam Michiels, D. Hughes, H. Hallez","doi":"10.1109/WoWMoM54355.2022.00031","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00031","url":null,"abstract":"With the emergence of mobile devices having enough resources to execute real-time ML inference, deployment opportunities arise on mobile devices while keeping privacy-sensitive data close to the source and reducing server load. Moreover, offloading inference to a cloud server facilitates deployment of neural network-based applications on resource-constrained devices. Depending on the application goals and execution context of the application, the optimal deployment on either cloud server or mobile device varies during the lifetime of an application. In this paper, we propose a context-aware middleware that enables optimization of deployed application software to satisfy the application’s functional goals in accordance with changing execution context and environmental conditions. We facilitate system design through the abstraction of deployed software components as states and make use of finite state machines and contextual triggers to model the reconfiguration of the system. We evaluate our framework using a real-world nutritional monitoring application via food image recognition deployed in a two-tier mobile and cloud architecture. We compare the proposed solution with various static deployments of the application and show that our approach can react to changing application goals at run-time in order to reduce server load and thereby increase scalability.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127463223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel and Efficient Anonymous Authentication Scheme Based on Extended Chebyshev Chaotic Maps for Smart Grid 基于扩展Chebyshev混沌映射的智能电网新型高效匿名认证方案
Cong Wang, Xiaohan Li, M. Ma, Yiying Zhang
In a smart grid, the identity authentication between a smart meter and an aggregator is a prerequisite for both parties to establish a secure channel. All existing authentication schemes have their own shortcomings in either security or efficiency to make them difficult to meet the security requirements of the smart grid. In this paper, we are motivated to propose an efficient and secure mutual authentication scheme based on the extended Chebyshev chaotic maps. The smart meters and aggregators are registered with a trusted third party to conduct a mutual authentication. The proposed scheme provides anonymity protection for smart meters to achieve perfect forward secrecy. Through security analysis, we conclude that the proposed scheme has the characteristics of high security. In addition, we compare the proposed scheme with other three schemes in terms of number of encryption operations, computation delay. The performance comparison demonstrates that the proposed scheme is efficient without sacrificing the desired security properties.
在智能电网中,智能电表与聚合器之间的身份认证是双方建立安全通道的前提。现有的各种认证方案在安全性和效率上都存在一定的不足,难以满足智能电网的安全要求。在本文中,我们提出了一种基于扩展Chebyshev混沌映射的高效安全的互认证方案。智能电表和聚合器在可信的第三方注册,进行相互认证。该方案为智能电表提供匿名保护,实现完美的前向保密。通过安全性分析,我们得出该方案具有高安全性的特点。此外,我们还在加密操作次数、计算延迟等方面与其他三种方案进行了比较。性能比较表明,该方案在不牺牲安全性能的前提下是有效的。
{"title":"A Novel and Efficient Anonymous Authentication Scheme Based on Extended Chebyshev Chaotic Maps for Smart Grid","authors":"Cong Wang, Xiaohan Li, M. Ma, Yiying Zhang","doi":"10.1109/WoWMoM54355.2022.00055","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00055","url":null,"abstract":"In a smart grid, the identity authentication between a smart meter and an aggregator is a prerequisite for both parties to establish a secure channel. All existing authentication schemes have their own shortcomings in either security or efficiency to make them difficult to meet the security requirements of the smart grid. In this paper, we are motivated to propose an efficient and secure mutual authentication scheme based on the extended Chebyshev chaotic maps. The smart meters and aggregators are registered with a trusted third party to conduct a mutual authentication. The proposed scheme provides anonymity protection for smart meters to achieve perfect forward secrecy. Through security analysis, we conclude that the proposed scheme has the characteristics of high security. In addition, we compare the proposed scheme with other three schemes in terms of number of encryption operations, computation delay. The performance comparison demonstrates that the proposed scheme is efficient without sacrificing the desired security properties.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121308266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PicP-MUD: Profiling Information Content of Payloads in MUD Flows for IoT Devices PicP-MUD:剖析物联网设备MUD流中有效载荷的信息内容
Arman Pashamokhtari, Arunan Sivanathan, Ayyoob Hamza, H. Gharakheili
The Manufacturer Usage Description (MUD) standard aims to reduce the attack surface for IoT devices by locking down their behavior to a formally-specified set of network flows (access control entries). Formal network behaviors can also be systematically and rigorously verified in any operating environment. Enforcing MUD flows and monitoring their activity in real-time can be relatively effective in securing IoT devices; however, its scope is limited to endpoints (domain names and IP addresses) and transport-layer protocols and services. Therefore, misconfigured or compromised IoTs may conform to their MUD-specified behavior but exchange unintended (or even malicious) contents across those flows. This paper develops PicP-MUD with the aim to profile the information content of packet payloads (whether unencrypted, encoded, or encrypted) in each MUD flow of an IoT device. That way, certain tasks like cyber-risk analysis, change detection, or selective deep packet inspection can be performed in a more systematic manner. Our contributions are twofold: (1) We analyze over 123K network flows of 6 transparent (e.g., HTTP), 11 encrypted (e.g., TLS), and 7 encoded (e.g., RTP) protocols, collected in our lab and obtained from public datasets, to identify 17 statistical features of their application payload, helping us distinguish different content types; and (2) We develop and evaluate PicP-MUD using a machine learning model, and show how we achieve an average accuracy of 99% in predicting the content type of a flow.
制造商使用描述(MUD)标准旨在通过将物联网设备的行为锁定到一组正式指定的网络流(访问控制项)来减少物联网设备的攻击面。正式的网络行为也可以在任何操作环境中进行系统和严格的验证。实施MUD流并实时监控其活动可以相对有效地保护物联网设备;然而,它的范围仅限于端点(域名和IP地址)和传输层协议和服务。因此,配置错误或受损的物联网可能符合其mud指定的行为,但在这些流中交换意外的(甚至是恶意的)内容。本文开发了PicP-MUD,目的是在物联网设备的每个MUD流中分析数据包有效负载(无论是未加密,编码还是加密)的信息内容。这样,某些任务,如网络风险分析、变化检测或选择性深度包检测,可以以更系统的方式执行。我们的贡献是双重的:(1)我们分析了超过123K的网络流,包括6种透明(如HTTP)、11种加密(如TLS)和7种编码(如RTP)协议,这些协议收集于我们的实验室并从公共数据集中获得,以确定其应用程序有效载荷的17个统计特征,帮助我们区分不同的内容类型;(2)我们使用机器学习模型开发和评估PicP-MUD,并展示了我们如何在预测流的内容类型方面达到99%的平均准确率。
{"title":"PicP-MUD: Profiling Information Content of Payloads in MUD Flows for IoT Devices","authors":"Arman Pashamokhtari, Arunan Sivanathan, Ayyoob Hamza, H. Gharakheili","doi":"10.1109/WoWMoM54355.2022.00081","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00081","url":null,"abstract":"The Manufacturer Usage Description (MUD) standard aims to reduce the attack surface for IoT devices by locking down their behavior to a formally-specified set of network flows (access control entries). Formal network behaviors can also be systematically and rigorously verified in any operating environment. Enforcing MUD flows and monitoring their activity in real-time can be relatively effective in securing IoT devices; however, its scope is limited to endpoints (domain names and IP addresses) and transport-layer protocols and services. Therefore, misconfigured or compromised IoTs may conform to their MUD-specified behavior but exchange unintended (or even malicious) contents across those flows. This paper develops PicP-MUD with the aim to profile the information content of packet payloads (whether unencrypted, encoded, or encrypted) in each MUD flow of an IoT device. That way, certain tasks like cyber-risk analysis, change detection, or selective deep packet inspection can be performed in a more systematic manner. Our contributions are twofold: (1) We analyze over 123K network flows of 6 transparent (e.g., HTTP), 11 encrypted (e.g., TLS), and 7 encoded (e.g., RTP) protocols, collected in our lab and obtained from public datasets, to identify 17 statistical features of their application payload, helping us distinguish different content types; and (2) We develop and evaluate PicP-MUD using a machine learning model, and show how we achieve an average accuracy of 99% in predicting the content type of a flow.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"345 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116657898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1