首页 > 最新文献

2015 IEEE Trustcom/BigDataSE/ISPA最新文献

英文 中文
An Efficient Clustering Mining Algorithm for Indoor Moving Target Trajectory Based on the Improved AGNES 一种基于改进AGNES的室内运动目标轨迹聚类挖掘算法
Pub Date : 2015-12-03 DOI: 10.1109/Trustcom.2015.524
Weiqing Huang, Chang Ding, Siye Wang, Shuang Hu
In recent years, with the rapid development of wireless communication technology including Wi-Fi, Bluetooth and RFID and other new types of positioning method, the indoor mobile object positioning has become possible. At present the research on indoor mobile object trajectory analysis is still in the start stage. But as people and goods stay indoor environment for most of time, the indoor positioning technology and the analysis of the indoor moving targets track will be the developing trend in the future. When deployed in real environment, the existing indoor moving target trajectory analysis methods need high equipment cost and their scalability is also very poor. In this paper we proposes an algorithm for indoor moving target trajectory analysis and data clustering based on improved AGNES algorithm. Through improving the weighted function of the algorithm, we realize the extraction and analysis of the indoor moving target trajectory. After deploying in the actual environment, we test the algorithm in practice. The results indicate that the improved algorithm greatly reduces the number of hardware and the deployment cost. And it can also effectively improve the efficiency of the moving target trajectory analysis.
近年来,随着无线通信技术包括Wi-Fi、蓝牙和RFID等新型定位方式的快速发展,室内移动物体的定位成为可能。目前对室内移动目标轨迹分析的研究还处于起步阶段。但由于人和物品大部分时间都停留在室内环境中,室内定位技术和室内运动目标轨迹分析将是未来的发展趋势。现有的室内运动目标轨迹分析方法在实际环境中部署时,设备成本高,可扩展性差。本文提出了一种基于改进的AGNES算法的室内运动目标轨迹分析和数据聚类算法。通过改进算法的加权函数,实现了室内运动目标轨迹的提取与分析。在实际环境中部署后,对算法进行了实际测试。结果表明,改进后的算法大大减少了硬件数量和部署成本。并能有效地提高运动目标轨迹分析的效率。
{"title":"An Efficient Clustering Mining Algorithm for Indoor Moving Target Trajectory Based on the Improved AGNES","authors":"Weiqing Huang, Chang Ding, Siye Wang, Shuang Hu","doi":"10.1109/Trustcom.2015.524","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.524","url":null,"abstract":"In recent years, with the rapid development of wireless communication technology including Wi-Fi, Bluetooth and RFID and other new types of positioning method, the indoor mobile object positioning has become possible. At present the research on indoor mobile object trajectory analysis is still in the start stage. But as people and goods stay indoor environment for most of time, the indoor positioning technology and the analysis of the indoor moving targets track will be the developing trend in the future. When deployed in real environment, the existing indoor moving target trajectory analysis methods need high equipment cost and their scalability is also very poor. In this paper we proposes an algorithm for indoor moving target trajectory analysis and data clustering based on improved AGNES algorithm. Through improving the weighted function of the algorithm, we realize the extraction and analysis of the indoor moving target trajectory. After deploying in the actual environment, we test the algorithm in practice. The results indicate that the improved algorithm greatly reduces the number of hardware and the deployment cost. And it can also effectively improve the efficiency of the moving target trajectory analysis.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130148197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
WAVE: Secure Wireless Pairing Exploiting Human Body Movements WAVE:利用人体运动的安全无线配对
Pub Date : 2015-12-03 DOI: 10.1109/Trustcom.2015.512
Wei Wang, Zhan Wang, W. Zhu, Lei Wang
Secure pairing between wireless devices with limited I/O interfaces is a challenging problem due to the difficulty in implementing authentication. Wireless channel characteristics can be utilized to facilitate authentication between such devices. In this paper, we propose WAVE, a novel scheme for pairing nearby wireless devices by monitoring the received signal strength (RSS) under the interference of intentionally involved human body movements. The deliberate body movements pose different effects on the legitimate channel and the attacking channel, which helps to distinguish a nearby legitimate device from an illegitimate one that is placed relatively further. The experimental results show the effectiveness of the scheme. Compared with other existing solutions, WAVE achieves high time efficiency and requires minimum hardware support, making it a favorable choice for appliances in wireless personal area networks.
由于难以实现身份验证,具有有限I/O接口的无线设备之间的安全配对是一个具有挑战性的问题。可以利用无线信道特性来促进这类设备之间的身份验证。在本文中,我们提出了一种新的方案WAVE,通过监测在有意涉及人体运动的干扰下接收到的信号强度(RSS)来配对附近的无线设备。故意的身体动作对合法通道和攻击通道产生不同的影响,有助于区分附近的合法设备和放置较远的非法设备。实验结果表明了该方案的有效性。与现有的其他解决方案相比,WAVE实现了高的时间效率,并且对硬件支持的要求最少,是无线个人区域网络中家电的理想选择。
{"title":"WAVE: Secure Wireless Pairing Exploiting Human Body Movements","authors":"Wei Wang, Zhan Wang, W. Zhu, Lei Wang","doi":"10.1109/Trustcom.2015.512","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.512","url":null,"abstract":"Secure pairing between wireless devices with limited I/O interfaces is a challenging problem due to the difficulty in implementing authentication. Wireless channel characteristics can be utilized to facilitate authentication between such devices. In this paper, we propose WAVE, a novel scheme for pairing nearby wireless devices by monitoring the received signal strength (RSS) under the interference of intentionally involved human body movements. The deliberate body movements pose different effects on the legitimate channel and the attacking channel, which helps to distinguish a nearby legitimate device from an illegitimate one that is placed relatively further. The experimental results show the effectiveness of the scheme. Compared with other existing solutions, WAVE achieves high time efficiency and requires minimum hardware support, making it a favorable choice for appliances in wireless personal area networks.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124798112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Study on the Coverage of Adaptive Wireless Sensor Network Based on Trust 基于信任的自适应无线传感器网络覆盖研究
Pub Date : 2015-12-03 DOI: 10.1109/Trustcom.2015.523
Huan Zhao, Chaoming Hu, Rui Zheng, Bin Lv
Wireless sensor network coverage is a core problem of wireless sensor network and the deployment performance of the nodes directly influence the entire WSN. However, the nodes are extremely vulnerable to attacks or intrusion during the process of covering. Therefore, how to ensure the communication security and coverage reliability of the WSN under attack is a big challenge. To address it, this paper proposes an adaptive intrusion tolerant coverage method of WSN based on trust through combining an optimization algorithm with the trust model. Firstly, the method evaluates the trust degree of every node and then adjusts its perception radius and decision radius according to the value. Combined with the improved PSO algorithm, we implement the adaptive intrusion tolerant coverage of WSN. The proposed method is tested and compared with the traditional coverage methods, and it demonstrates that when WSN is attacked, the presented method is more security and has a better coverage.
无线传感器网络的覆盖是无线传感器网络的核心问题,节点的部署性能直接影响整个传感器网络的性能。然而,节点在覆盖过程中极易受到攻击或入侵。因此,如何保证受到攻击的无线传感器网络的通信安全性和覆盖可靠性是一个很大的挑战。针对这一问题,将优化算法与信任模型相结合,提出了一种基于信任的WSN自适应容错覆盖方法。该方法首先评估每个节点的信任程度,然后根据该值调整节点的感知半径和决策半径。结合改进的粒子群算法,实现了无线传感器网络的自适应容错覆盖。与传统的覆盖方法进行了测试和比较,结果表明,当无线传感器网络受到攻击时,该方法具有更高的安全性和更好的覆盖范围。
{"title":"Study on the Coverage of Adaptive Wireless Sensor Network Based on Trust","authors":"Huan Zhao, Chaoming Hu, Rui Zheng, Bin Lv","doi":"10.1109/Trustcom.2015.523","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.523","url":null,"abstract":"Wireless sensor network coverage is a core problem of wireless sensor network and the deployment performance of the nodes directly influence the entire WSN. However, the nodes are extremely vulnerable to attacks or intrusion during the process of covering. Therefore, how to ensure the communication security and coverage reliability of the WSN under attack is a big challenge. To address it, this paper proposes an adaptive intrusion tolerant coverage method of WSN based on trust through combining an optimization algorithm with the trust model. Firstly, the method evaluates the trust degree of every node and then adjusts its perception radius and decision radius according to the value. Combined with the improved PSO algorithm, we implement the adaptive intrusion tolerant coverage of WSN. The proposed method is tested and compared with the traditional coverage methods, and it demonstrates that when WSN is attacked, the presented method is more security and has a better coverage.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122179449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Sensor Deployment Approach Using Fruit Fly Optimization Algorithm in Wireless Sensor Networks 基于果蝇优化算法的无线传感器网络传感器部署新方法
Pub Date : 2015-12-03 DOI: 10.1109/Trustcom.2015.520
Huan Zhao, Qian Zhang, L. Zhang, Yan Wang
The sensor deployment is a fundamental problem in wireless sensor networks(WSN), the performance of WSN largely depends on a good sensor deployment scheme. In this paper,we present a novel sensor deployment scheme based on fruit fly algorithm(FOA) to improve the coverage rate. Each fruit fly represents a solution for sensor deployment independently, and they are given the random direction and distance for finding food using osphresis.Then we find out the fruit fly with the highest smell concentration judgment value from the fruit fly group and keep its positions,and then the fruit fly group will fly towards that position by using their sensitive vision.We have done simulations both in the ideal and obstacle areas, FOA-based sensor deployment is compared with the classic standard PSO and the novel GSO,simulation results show the effectiveness of the proposed approach.
传感器部署是无线传感器网络的一个基本问题,良好的传感器部署方案在很大程度上决定了无线传感器网络的性能。本文提出了一种基于果蝇算法(FOA)的传感器部署方案,以提高传感器的覆盖率。每只果蝇都代表了一种传感器独立部署的解决方案,它们被赋予随机的方向和距离,用眼球运动来寻找食物。然后从果蝇群中找出嗅觉浓度判断值最高的果蝇并保持其位置,然后果蝇群利用其敏感的视觉向该位置飞去。在理想区域和障碍物区域分别进行了仿真,将基于foa的传感器部署与经典的标准粒子群算法和新型粒子群算法进行了比较,仿真结果表明了该方法的有效性。
{"title":"A Novel Sensor Deployment Approach Using Fruit Fly Optimization Algorithm in Wireless Sensor Networks","authors":"Huan Zhao, Qian Zhang, L. Zhang, Yan Wang","doi":"10.1109/Trustcom.2015.520","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.520","url":null,"abstract":"The sensor deployment is a fundamental problem in wireless sensor networks(WSN), the performance of WSN largely depends on a good sensor deployment scheme. In this paper,we present a novel sensor deployment scheme based on fruit fly algorithm(FOA) to improve the coverage rate. Each fruit fly represents a solution for sensor deployment independently, and they are given the random direction and distance for finding food using osphresis.Then we find out the fruit fly with the highest smell concentration judgment value from the fruit fly group and keep its positions,and then the fruit fly group will fly towards that position by using their sensitive vision.We have done simulations both in the ideal and obstacle areas, FOA-based sensor deployment is compared with the classic standard PSO and the novel GSO,simulation results show the effectiveness of the proposed approach.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115397709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme in Wireless Sensor Networks 无线传感器网络中可信路由方案的定量可信评估方案
Pub Date : 2015-12-03 DOI: 10.1109/Trustcom.2015.517
Hongsong Chen, Z. Han, Zhongchuan Fu
With the rapid development and application of wireless sensor network(WSN),security and trust are important to the network. The initial requirement for wireless sensor networks is power efficiency. As the cooperation character of the network, trust routing and management are also important to wireless sensor network. As the threats come from various attacks, novel trust routing scheme is proposed to enhance security of the network. Trust routing scheme is becoming a key method to protect the security of protocol in wireless sensor network. Quantitative trust evaluation scheme is proposed to enhance security and reliability of wireless sensor network. The definition and mathematic description of trust routing is proposed in the paper. Ad hoc On-Demand Distance Vector (AODV) routing protocol is used to validate trust routing scheme in wireless sensor network, Route Reply (RREP) Message is extended to record node residual energy evaluation and attack behaviour evaluation. NS-2 simulator is used to simulate the trust routing scheme under different network attack behaviors. Five kinds of node attack behaviors are used to evaluate and validate the trust routing scheme. Simulation results show that trust routing scheme can improve the security and performance of network. It shows better than other security scheme.
随着无线传感器网络(WSN)的快速发展和应用,网络的安全性和信任度变得越来越重要。无线传感器网络的初始要求是功率效率。由于网络的协作特性,信任路由和管理对无线传感器网络也很重要。针对各种攻击的威胁,提出了一种新的信任路由方案来提高网络的安全性。在无线传感器网络中,信任路由方案正成为保护协议安全的一种关键方法。为了提高无线传感器网络的安全性和可靠性,提出了定量信任评估方案。本文给出了信任路由的定义和数学描述。采用自组织按需距离矢量(AODV)路由协议验证无线传感器网络中的信任路由方案,将路由回复(RREP)消息扩展到记录节点剩余能量评估和攻击行为评估。NS-2仿真器用于模拟不同网络攻击行为下的信任路由方案。采用五种节点攻击行为对信任路由方案进行评估和验证。仿真结果表明,信任路由方案可以提高网络的安全性和性能。该方案比其他安全方案效果更好。
{"title":"Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme in Wireless Sensor Networks","authors":"Hongsong Chen, Z. Han, Zhongchuan Fu","doi":"10.1109/Trustcom.2015.517","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.517","url":null,"abstract":"With the rapid development and application of wireless sensor network(WSN),security and trust are important to the network. The initial requirement for wireless sensor networks is power efficiency. As the cooperation character of the network, trust routing and management are also important to wireless sensor network. As the threats come from various attacks, novel trust routing scheme is proposed to enhance security of the network. Trust routing scheme is becoming a key method to protect the security of protocol in wireless sensor network. Quantitative trust evaluation scheme is proposed to enhance security and reliability of wireless sensor network. The definition and mathematic description of trust routing is proposed in the paper. Ad hoc On-Demand Distance Vector (AODV) routing protocol is used to validate trust routing scheme in wireless sensor network, Route Reply (RREP) Message is extended to record node residual energy evaluation and attack behaviour evaluation. NS-2 simulator is used to simulate the trust routing scheme under different network attack behaviors. Five kinds of node attack behaviors are used to evaluate and validate the trust routing scheme. Simulation results show that trust routing scheme can improve the security and performance of network. It shows better than other security scheme.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126900194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Security Topology Protocol of Wireless Sensor Networks Based on Community Detection and Energy Aware 基于社区检测和能量感知的无线传感器网络安全拓扑协议
Pub Date : 2015-12-03 DOI: 10.1109/Trustcom.2015.519
Zuo Chen, Mengyuan Jia, Yan Wang, Xiaolong Yan
It is a key problem for reducing the network energy consumption and improving energy utilization of sensor nodes, due to the limited energy of sensor nodes. Because of open, distributed and self-organization characteristics of WSNs, it is vulnerable to the threat of energy in the network topology construction and communication process, but traditional methods which assume the sensor nodes to be credible were unable to cope with the energy attacks. Based on this, this paper proposes a security topology protocol of wireless sensor network named as CDEA according to community detection and energy aware. The method uses complex network community division algorithm for detecting the similar energy behaviour nodes in the neighbourhood of these nodes, and elects the cluster head according to energy, credibility and the distance to the base station, and carries on the choice of the next hop node accessing based on the principle of the immune response and finally gets low power consumption secure topological structure. The experimental results shows that the CDEA not only can reduce and balance the network energy, but also prolong the survival time of the system, and resist the energy attack at the same time.
由于传感器节点的能量有限,如何降低网络能耗,提高传感器节点的能量利用率是一个关键问题。由于无线传感器网络具有开放性、分布式和自组织的特点,在网络拓扑构建和通信过程中容易受到能量的威胁,而传统的假设传感器节点可信的方法无法应对能量攻击。在此基础上,本文提出了一种基于社区检测和能量感知的无线传感器网络安全拓扑协议CDEA。该方法利用复杂网络社区划分算法检测这些节点附近能量行为相似的节点,并根据能量、可信度和与基站的距离选择簇头,并根据免疫应答原理选择下一跳节点访问,最终得到低功耗安全拓扑结构。实验结果表明,CDEA不仅可以减少和平衡网络能量,还可以延长系统的生存时间,同时抵抗能量攻击。
{"title":"A Security Topology Protocol of Wireless Sensor Networks Based on Community Detection and Energy Aware","authors":"Zuo Chen, Mengyuan Jia, Yan Wang, Xiaolong Yan","doi":"10.1109/Trustcom.2015.519","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.519","url":null,"abstract":"It is a key problem for reducing the network energy consumption and improving energy utilization of sensor nodes, due to the limited energy of sensor nodes. Because of open, distributed and self-organization characteristics of WSNs, it is vulnerable to the threat of energy in the network topology construction and communication process, but traditional methods which assume the sensor nodes to be credible were unable to cope with the energy attacks. Based on this, this paper proposes a security topology protocol of wireless sensor network named as CDEA according to community detection and energy aware. The method uses complex network community division algorithm for detecting the similar energy behaviour nodes in the neighbourhood of these nodes, and elects the cluster head according to energy, credibility and the distance to the base station, and carries on the choice of the next hop node accessing based on the principle of the immune response and finally gets low power consumption secure topological structure. The experimental results shows that the CDEA not only can reduce and balance the network energy, but also prolong the survival time of the system, and resist the energy attack at the same time.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124481985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mission-Aware Vulnerability Assessment for Cyber-Physical Systems 网络物理系统的任务感知脆弱性评估
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.496
Xiaotian Wang, M. Davis, Junjie Zhang, V. Saunders
Designing secure cyber-physical systems (CPS) is fundamentally important and performing vulnerability assessment becomes indispensable. In this paper, we discuss our ongoing work on building an automated mission-aware vulnerability CPS assessment framework that can accomplish three objectives including i) mapping CPS missions into infrastructural components, ii) evaluating global impact of each vulnerability, and iii) achieving verifiable results and high flexibility. In order to accomplish these objectives, we follow a model-assisted analysis strategy. Specifically, we take advantage of CPS simulator to model the behaviors of CPS components under different missions, our framework facilitates a bottom-up approach to construct a holistic model of a CPS that aim at profiling relationships among all CPS components. Formal methods, including program symbolic execution, logic programming, and linear optimization, have been employed to analyze the model, which build mathematical rigor into our framework. The framework first identifies mission-critical components, then discovers all attack paths from system access points to mission-critical components, and finally recommends the optimized mitigation plan.
设计安全的网络物理系统(CPS)至关重要,进行漏洞评估变得必不可少。在本文中,我们讨论了我们正在进行的构建任务感知脆弱性自动化CPS评估框架的工作,该框架可以实现三个目标,包括i)将CPS任务映射到基础设施组件中,ii)评估每个漏洞的全球影响,以及iii)实现可验证的结果和高灵活性。为了实现这些目标,我们遵循模型辅助分析策略。具体来说,我们利用CPS模拟器来模拟不同任务下CPS组件的行为,我们的框架促进了自下而上的方法来构建一个CPS的整体模型,旨在分析所有CPS组件之间的关系。正式的方法,包括程序符号执行,逻辑编程和线性优化,已经被用来分析模型,建立数学严谨性到我们的框架。该框架首先识别关键任务组件,然后发现从系统访问点到关键任务组件的所有攻击路径,最后推荐优化的缓解计划。
{"title":"Mission-Aware Vulnerability Assessment for Cyber-Physical Systems","authors":"Xiaotian Wang, M. Davis, Junjie Zhang, V. Saunders","doi":"10.1109/Trustcom.2015.496","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.496","url":null,"abstract":"Designing secure cyber-physical systems (CPS) is fundamentally important and performing vulnerability assessment becomes indispensable. In this paper, we discuss our ongoing work on building an automated mission-aware vulnerability CPS assessment framework that can accomplish three objectives including i) mapping CPS missions into infrastructural components, ii) evaluating global impact of each vulnerability, and iii) achieving verifiable results and high flexibility. In order to accomplish these objectives, we follow a model-assisted analysis strategy. Specifically, we take advantage of CPS simulator to model the behaviors of CPS components under different missions, our framework facilitates a bottom-up approach to construct a holistic model of a CPS that aim at profiling relationships among all CPS components. Formal methods, including program symbolic execution, logic programming, and linear optimization, have been employed to analyze the model, which build mathematical rigor into our framework. The framework first identifies mission-critical components, then discovers all attack paths from system access points to mission-critical components, and finally recommends the optimized mitigation plan.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115318326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the Resource Consumption of Secure Data Sharing 安全数据共享的资源消耗研究
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.460
H. Kühner, H. Hartenstein
Sharing data within a closed user group is the basis for lots of applications today in both personal and professional life. The risk that the storage provider or an attacker illegitimately inspects or tampers with the shared data can be mitigated by employing client-side cryptography. In this work, we estimate the resource consumption that secure data sharing based on client-side cryptography requires in terms of computation time and network traffic volume. We therefore go beyond asymptotical analyses and state the absolute resource consumption for different secure data sharing protocols and client devices under realistic sharing models. These sharing models are extracted from traces of real-world collaboration platforms running in production. To the best of our knowledge, this is the first time that such a characterization of sharing models is published. Furthermore, we provide a clearly defined resource consumption estimation model. Our results show that for users who just up-and download data, the execution time of required cryptographic operations is typically up to a few seconds. The results also show that group owners have to deal with significantly higher computation times and network traffic when a user is removed from a sharing group with a few hundred or more members, given that basic secure data sharing protocols are used as they are in place today. A further finding is that computation time and network traffic volume are considerably lowered by extending the secure data sharing protocol with group key management approaches, at the price of slightly raised computation times for smaller groups.
在封闭的用户组中共享数据是当今许多应用程序的基础,无论是个人生活还是职业生活。存储提供商或攻击者非法检查或篡改共享数据的风险可以通过使用客户端加密来降低。在这项工作中,我们根据计算时间和网络流量估算了基于客户端加密的安全数据共享所需的资源消耗。因此,我们超越渐近分析,并陈述了在现实共享模型下不同安全数据共享协议和客户端设备的绝对资源消耗。这些共享模型是从在生产环境中运行的实际协作平台的痕迹中提取出来的。据我们所知,这是第一次对共享模型进行这样的描述。此外,我们提供了一个明确定义的资源消耗估算模型。我们的结果表明,对于只下载数据的用户,所需加密操作的执行时间通常长达几秒钟。结果还表明,考虑到目前使用的基本安全数据共享协议,当用户从拥有数百或更多成员的共享组中删除时,组所有者必须处理明显更高的计算时间和网络流量。进一步的发现是,通过使用组密钥管理方法扩展安全数据共享协议,计算时间和网络通信量大大降低,但代价是较小的组的计算时间略有增加。
{"title":"On the Resource Consumption of Secure Data Sharing","authors":"H. Kühner, H. Hartenstein","doi":"10.1109/Trustcom.2015.460","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.460","url":null,"abstract":"Sharing data within a closed user group is the basis for lots of applications today in both personal and professional life. The risk that the storage provider or an attacker illegitimately inspects or tampers with the shared data can be mitigated by employing client-side cryptography. In this work, we estimate the resource consumption that secure data sharing based on client-side cryptography requires in terms of computation time and network traffic volume. We therefore go beyond asymptotical analyses and state the absolute resource consumption for different secure data sharing protocols and client devices under realistic sharing models. These sharing models are extracted from traces of real-world collaboration platforms running in production. To the best of our knowledge, this is the first time that such a characterization of sharing models is published. Furthermore, we provide a clearly defined resource consumption estimation model. Our results show that for users who just up-and download data, the execution time of required cryptographic operations is typically up to a few seconds. The results also show that group owners have to deal with significantly higher computation times and network traffic when a user is removed from a sharing group with a few hundred or more members, given that basic secure data sharing protocols are used as they are in place today. A further finding is that computation time and network traffic volume are considerably lowered by extending the secure data sharing protocol with group key management approaches, at the price of slightly raised computation times for smaller groups.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125210997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Similarity Measure Based on Low-Rank Approximation for Highly Scalable Recommender Systems 基于低秩近似的高可扩展推荐系统相似度度量
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.563
Sepideh Seifzadeh, A. Miri
Recommender systems are mostly used to make the appropriate personalized recommendation for different customers. Collaborative filtering recommendation is one of the most popular methods among E-commerce systems, but it has some shortcomings, such as cold starts, in which the system fails to consider items which no one in the community has rated previously, and sparse data, which is caused by a low number of rankings by users which results in a sparse similarity matrix. Most of the existing approaches have shortcomings of sparsity and scalability. In this paper we propose a method that approximates the matrix of users similarities with Nyström low-rank approximations and is based on Collaborative Filtering (CF). The proposed method avoids the high computation cost of Singular Value Decomposition (SVD) and also enables us to use the low-rank approximation of the similarity matrix to handle huge datasets with low computation costs. The experimental results show that the proposed approach can solve the problem of sparsity, while increasing the efficiency and scalability of the system.
推荐系统主要用于为不同的客户提供适当的个性化推荐。协同过滤推荐是电子商务系统中最受欢迎的方法之一,但它存在一些缺点,如冷启动(系统没有考虑社区中没有人评价过的商品)和数据稀疏(用户排名次数少导致相似度矩阵稀疏)。现有的大多数方法都存在稀疏性和可扩展性不足的缺点。在本文中,我们提出了一种基于协同过滤(CF)的方法,使用Nyström低秩近似近似用户相似度矩阵。该方法避免了奇异值分解(SVD)的高计算成本,并使我们能够以低计算成本使用相似矩阵的低秩逼近来处理庞大的数据集。实验结果表明,该方法在解决稀疏性问题的同时,提高了系统的效率和可扩展性。
{"title":"Similarity Measure Based on Low-Rank Approximation for Highly Scalable Recommender Systems","authors":"Sepideh Seifzadeh, A. Miri","doi":"10.1109/Trustcom.2015.563","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.563","url":null,"abstract":"Recommender systems are mostly used to make the appropriate personalized recommendation for different customers. Collaborative filtering recommendation is one of the most popular methods among E-commerce systems, but it has some shortcomings, such as cold starts, in which the system fails to consider items which no one in the community has rated previously, and sparse data, which is caused by a low number of rankings by users which results in a sparse similarity matrix. Most of the existing approaches have shortcomings of sparsity and scalability. In this paper we propose a method that approximates the matrix of users similarities with Nyström low-rank approximations and is based on Collaborative Filtering (CF). The proposed method avoids the high computation cost of Singular Value Decomposition (SVD) and also enables us to use the low-rank approximation of the similarity matrix to handle huge datasets with low computation costs. The experimental results show that the proposed approach can solve the problem of sparsity, while increasing the efficiency and scalability of the system.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116643947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Secure Multi-tenant Virtualized Networks 迈向安全的多租户虚拟化网络
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.502
Nicolae Paladi, C. Gehrmann
Network virtualization enables multi-tenancy over physical network infrastructure, with a side-effect of increased network complexity. Software-defined networking (SDN) is a novel network architectural model -- one where the control plane is separated from the data plane by a standardized API -- which aims to reduce the network management overhead. However, as the SDN model itself is evolving, its application to multi-tenant virtualized networks raises multiple security challenges. In this paper, we present a security analysis of SDN-based multi-tenant virtualized networks: we outline the security assumptions applicable to such networks, define the relevant adversarial model, identify the main attack vectors for such network infrastructure deployments and finally synthesize a set of high-level security requirements for SDN-based multi-tenant virtualized networks. This paper sets the foundation for future design of secure SDN-based multi-tenant virtualized networks.
网络虚拟化支持物理网络基础设施上的多租户,其副作用是增加了网络复杂性。软件定义网络(SDN)是一种新颖的网络体系结构模型——通过标准化的API将控制平面与数据平面分离开来——旨在减少网络管理开销。然而,随着SDN模型本身的发展,它在多租户虚拟化网络中的应用带来了多重安全挑战。在本文中,我们对基于sdn的多租户虚拟化网络进行了安全分析:我们概述了适用于此类网络的安全假设,定义了相关的对抗模型,确定了此类网络基础设施部署的主要攻击向量,并最终综合了一组基于sdn的多租户虚拟化网络的高级安全要求。本文为今后基于sdn的安全多租户虚拟化网络的设计奠定了基础。
{"title":"Towards Secure Multi-tenant Virtualized Networks","authors":"Nicolae Paladi, C. Gehrmann","doi":"10.1109/Trustcom.2015.502","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.502","url":null,"abstract":"Network virtualization enables multi-tenancy over physical network infrastructure, with a side-effect of increased network complexity. Software-defined networking (SDN) is a novel network architectural model -- one where the control plane is separated from the data plane by a standardized API -- which aims to reduce the network management overhead. However, as the SDN model itself is evolving, its application to multi-tenant virtualized networks raises multiple security challenges. In this paper, we present a security analysis of SDN-based multi-tenant virtualized networks: we outline the security assumptions applicable to such networks, define the relevant adversarial model, identify the main attack vectors for such network infrastructure deployments and finally synthesize a set of high-level security requirements for SDN-based multi-tenant virtualized networks. This paper sets the foundation for future design of secure SDN-based multi-tenant virtualized networks.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117205938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2015 IEEE Trustcom/BigDataSE/ISPA
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1