首页 > 最新文献

2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)最新文献

英文 中文
A Real-Time Distributed Deep Learning Approach for Intelligent Event Recognition in Long Distance Pipeline Monitoring with DOFS 基于dfs的长距离管道监测智能事件识别的实时分布式深度学习方法
Jiping Chen, Huijuan Wu, Xiangrong Liu, Yao Xiao, Mengjiao Wang, Mingru Yang, Y. Rao
Intelligent event recognition along the fiber is still a challenging problem in long distance pipeline monitoring with distributed optical fiber sensors (DOFS), because the complicated burying environments are changing from time to time, and the interference sources are unpredictable at different fiber locations. The fixed hand crafted feature extraction is always time-consuming and laborious, and the update of algorithm always lags behind the environmental change, which restricts its practical scale applications. Thus in this paper, we propose a real-time distributed deep learning model by using the efficient 1-D convolutional neural network (1-D CNN), to learn the distinguishable features of different disturbances and identify them automatically by training the raw event data (signal), which also can be updated easily. The experimental results from the real field data for the safety monitoring of oil pipelines demonstrate the effectiveness of the proposed method, which performs better than the 2-D CNN in terms of both recognition metrics and speed.
由于埋地环境复杂多变,且不同光纤位置的干扰源不可预测,在分布式光纤传感器长距管道监测中,沿光纤智能事件识别仍然是一个具有挑战性的问题。固定手工特征提取费时费力,且算法更新滞后于环境变化,制约了其实际规模应用。因此,在本文中,我们提出了一种实时分布式深度学习模型,利用高效的1-D卷积神经网络(1-D CNN)学习不同干扰的可区分特征,并通过训练原始事件数据(信号)来自动识别它们,并且这些数据(信号)易于更新。输油管道安全监测的实际现场数据实验结果表明了该方法的有效性,在识别指标和速度方面都优于二维CNN。
{"title":"A Real-Time Distributed Deep Learning Approach for Intelligent Event Recognition in Long Distance Pipeline Monitoring with DOFS","authors":"Jiping Chen, Huijuan Wu, Xiangrong Liu, Yao Xiao, Mengjiao Wang, Mingru Yang, Y. Rao","doi":"10.1109/CYBERC.2018.00059","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00059","url":null,"abstract":"Intelligent event recognition along the fiber is still a challenging problem in long distance pipeline monitoring with distributed optical fiber sensors (DOFS), because the complicated burying environments are changing from time to time, and the interference sources are unpredictable at different fiber locations. The fixed hand crafted feature extraction is always time-consuming and laborious, and the update of algorithm always lags behind the environmental change, which restricts its practical scale applications. Thus in this paper, we propose a real-time distributed deep learning model by using the efficient 1-D convolutional neural network (1-D CNN), to learn the distinguishable features of different disturbances and identify them automatically by training the raw event data (signal), which also can be updated easily. The experimental results from the real field data for the safety monitoring of oil pipelines demonstrate the effectiveness of the proposed method, which performs better than the 2-D CNN in terms of both recognition metrics and speed.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125762250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An IoT Based Smart Parking System Using LoRa 基于物联网的LoRa智能停车系统
R. Kodali, Krishna Yogi Borra, N. SharanSaiG., Honey Jehova Domma
Internet of Things (IoT) plays a fundamental role in connecting the ecological things around us to a network. It helps us monitor the parameters of the things with the usage of sensors that are familiarize for remote sensing of the specific data and forward the information over the network cloud by means of Internet Connection. This paper centers around the idea of knowing the status of parking availability in a parking lot through Internet with the help of Internet of Things Technology. This uses Ultrasonic sensor to detect the vehicle in the parking slot, TTGO-ESP32-LoRa (transmitter) boards placed at different parking lots in different places to transmit the data. TTGO-ESP32-LoRa (receiver) receives the data which is placed near to the parking lots and also sends the slot information to IBM Watson IoT platform through WiFi protocol present in the Esp32 board. The status of the parking availability can also be viewed in the Android Phone
物联网(IoT)在将我们周围的生态事物连接到网络中起着基础性的作用。它帮助我们使用熟悉的传感器对具体数据进行遥感,并通过互联网连接的方式在网络云上转发信息,从而监测事物的参数。本文围绕物联网技术在互联网上了解停车场可用车位状况的思路展开。该方案利用超声波传感器探测车位内的车辆,TTGO-ESP32-LoRa(发射机)板放置在不同的停车场的不同位置来传输数据。TTGO-ESP32-LoRa(接收器)接收放置在停车场附近的数据,并通过Esp32板中的WiFi协议将槽位信息发送到IBM沃森物联网平台。停车可用状态也可以在Android手机上查看
{"title":"An IoT Based Smart Parking System Using LoRa","authors":"R. Kodali, Krishna Yogi Borra, N. SharanSaiG., Honey Jehova Domma","doi":"10.1109/CYBERC.2018.00039","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00039","url":null,"abstract":"Internet of Things (IoT) plays a fundamental role in connecting the ecological things around us to a network. It helps us monitor the parameters of the things with the usage of sensors that are familiarize for remote sensing of the specific data and forward the information over the network cloud by means of Internet Connection. This paper centers around the idea of knowing the status of parking availability in a parking lot through Internet with the help of Internet of Things Technology. This uses Ultrasonic sensor to detect the vehicle in the parking slot, TTGO-ESP32-LoRa (transmitter) boards placed at different parking lots in different places to transmit the data. TTGO-ESP32-LoRa (receiver) receives the data which is placed near to the parking lots and also sends the slot information to IBM Watson IoT platform through WiFi protocol present in the Esp32 board. The status of the parking availability can also be viewed in the Android Phone","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127285357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
An Algorithm to Generate Password Structure Dictionary Based on Gene Bank 基于基因库的密码结构字典生成算法
Liping Li, Qinglei Zhou, Bin Li, Xueming Si
Identity authentication is the first line of defense to ensure the security of information systems, and passwords are the most widely used authentication method. Choosing a valid password structure is an effective way to prevent password attacks, such as password dictionary attack. This article talked 68386069 real plaintext passwords with statistical their various features, summarized several rules for generating highly utilized passwords in certain styles. Based on these statistical features and rules, it generated high-probability password structure gene banks. With them, it formulates a dictionary to generate the candidate passwords. Thereby, this can enhance the efficiency of password recovery. We conducted extensive experiments by the real password test data, and the experimental results, compared with the dictionary provided by major websites, show that the dictionary of high probability password structure hit rate increased by about 30%. At the same time, this dictionary can save about one-third of the running time.
身份认证是保证信息系统安全的第一道防线,密码是目前使用最广泛的认证方式。选择有效的密码结构是防止密码字典攻击等密码攻击的有效手段。本文讨论了68386069个真实明文密码,并统计了它们的各种特性,总结了几种生成某些样式的高利用率密码的规则。基于这些统计特征和规律,生成高概率密码结构基因库。有了它们,它就形成了一个字典来生成候选密码。这样可以提高密码恢复的效率。我们利用真实的密码测试数据进行了大量的实验,实验结果与各大网站提供的字典相比,高概率密码结构字典的命中率提高了30%左右。同时,该字典可以节省大约三分之一的运行时间。
{"title":"An Algorithm to Generate Password Structure Dictionary Based on Gene Bank","authors":"Liping Li, Qinglei Zhou, Bin Li, Xueming Si","doi":"10.1109/CYBERC.2018.00014","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00014","url":null,"abstract":"Identity authentication is the first line of defense to ensure the security of information systems, and passwords are the most widely used authentication method. Choosing a valid password structure is an effective way to prevent password attacks, such as password dictionary attack. This article talked 68386069 real plaintext passwords with statistical their various features, summarized several rules for generating highly utilized passwords in certain styles. Based on these statistical features and rules, it generated high-probability password structure gene banks. With them, it formulates a dictionary to generate the candidate passwords. Thereby, this can enhance the efficiency of password recovery. We conducted extensive experiments by the real password test data, and the experimental results, compared with the dictionary provided by major websites, show that the dictionary of high probability password structure hit rate increased by about 30%. At the same time, this dictionary can save about one-third of the running time.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133689956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficiency Optimization Method Under the Scene of Wireless Information and Energy Simultaneous Transmission 无线信息与能量同步传输场景下的能效优化方法
Hui Huang, Chunlong Li, Chao Wu, Fan Wu, Luming Li
In wireless sensor network, nodes with limited energy bring negative impact of network data aggregation. This paper solves the problem based on the RF transfer technology. We first study the impact of simultaneous transmission of wireless information and energy method SWIPT on data aggregation energy consumption, and obtains the result that the TS-SWIPT method can improve the initial energy efficiency of the node, and use node's redundancy energy to optimize the energy efficiency of the network. The paper also proposes an energy transfer time slot optimization method CSAS to develop an efficient TS-SWIPT transmission strategy. In order to solve the CSAS slot allocation problem, a heuristic algorithm is given to obtain a set of feasible solutions reasonably and effectively based on the energy consumption distribution of nodes. The final simulation results show that the CSAS allocation strategy can make reasonable use of the node's redundant energy, improve the initial energy efficiency of the node, and prolong the life of the high-load node. Compared with the DOEE algorithm which does not use the TS-SWIPT method, the proposed algorithm improves the performance of network lifetime and total data aggregation to some degree.
在无线传感器网络中,能量有限的节点会对网络数据的聚合带来负面影响。本文基于射频传输技术解决了这一问题。首先研究了同时传输无线信息和能量方法SWIPT对数据聚合能耗的影响,得出TS-SWIPT方法可以提高节点的初始能量效率,并利用节点的冗余能量来优化网络的能量效率。本文还提出了一种能量传输时隙优化方法CSAS,以开发高效的TS-SWIPT传输策略。为了解决CSAS槽位分配问题,提出了一种基于节点能耗分布的启发式算法,合理有效地获得一组可行解。最后的仿真结果表明,CSAS分配策略可以合理利用节点的冗余能量,提高节点的初始能量效率,延长高负载节点的寿命。与未使用TS-SWIPT方法的DOEE算法相比,该算法在一定程度上提高了网络生存期和总数据聚合性能。
{"title":"Energy Efficiency Optimization Method Under the Scene of Wireless Information and Energy Simultaneous Transmission","authors":"Hui Huang, Chunlong Li, Chao Wu, Fan Wu, Luming Li","doi":"10.1109/CYBERC.2018.00064","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00064","url":null,"abstract":"In wireless sensor network, nodes with limited energy bring negative impact of network data aggregation. This paper solves the problem based on the RF transfer technology. We first study the impact of simultaneous transmission of wireless information and energy method SWIPT on data aggregation energy consumption, and obtains the result that the TS-SWIPT method can improve the initial energy efficiency of the node, and use node's redundancy energy to optimize the energy efficiency of the network. The paper also proposes an energy transfer time slot optimization method CSAS to develop an efficient TS-SWIPT transmission strategy. In order to solve the CSAS slot allocation problem, a heuristic algorithm is given to obtain a set of feasible solutions reasonably and effectively based on the energy consumption distribution of nodes. The final simulation results show that the CSAS allocation strategy can make reasonable use of the node's redundant energy, improve the initial energy efficiency of the node, and prolong the life of the high-load node. Compared with the DOEE algorithm which does not use the TS-SWIPT method, the proposed algorithm improves the performance of network lifetime and total data aggregation to some degree.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131449206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Nonlinear Precoding Design for Two-Group Alamouti System in MIMO Correlated Channel MIMO相关信道中两组Alamouti系统的非线性预编码设计
Yingbo Shang, Xinying Guo, Youyou Zhao, X. Mu, Jiankang Zhang
In order to simplify the detection complexity of the receiver and improve the bit error rate (BER) performance of the two-group Alamouti system in correlated channel, we design a nonlinear precoding scheme for two-group Alamouti system in multiple input multiple output (MIMO) correlated channel in this paper. We apply the geometric mean decomposition (GMD) algorithm to the equivalent channel matrix and the dirty paper coding (DPC) technique to the transmitter of the system. Thus, interference between signals can be eliminated at the transmitter, meanwhile, sub-channel with equal gain are obtained. However, a high peak power ratio is caused by the dirty paper coding technique at the transmitter. To solve this problem, Tomlinson-Harashima Precoding (THP) with modulo operation is applied to the transmitter. From the simulation results, it is observed that the proposed system can significantly improve the BER performance as well as Peak-to-Average Power Ratio (PAPR) performance.
为了简化接收机的检测复杂度,提高两组Alamouti系统在相关信道中的误码率(BER)性能,本文设计了一种多输入多输出(MIMO)相关信道中两组Alamouti系统的非线性预编码方案。对等效信道矩阵采用几何平均分解(GMD)算法,对系统的发射机采用脏纸编码(DPC)技术。这样可以在发射机处消除信号间的干扰,同时获得等增益的子信道。然而,发射机的脏纸编码技术导致了高峰值功率比。为了解决这一问题,对发射机进行了带模运算的Tomlinson-Harashima预编码(THP)。仿真结果表明,该系统能显著提高误码率性能和峰值平均功率比(PAPR)性能。
{"title":"A Nonlinear Precoding Design for Two-Group Alamouti System in MIMO Correlated Channel","authors":"Yingbo Shang, Xinying Guo, Youyou Zhao, X. Mu, Jiankang Zhang","doi":"10.1109/CYBERC.2018.00068","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00068","url":null,"abstract":"In order to simplify the detection complexity of the receiver and improve the bit error rate (BER) performance of the two-group Alamouti system in correlated channel, we design a nonlinear precoding scheme for two-group Alamouti system in multiple input multiple output (MIMO) correlated channel in this paper. We apply the geometric mean decomposition (GMD) algorithm to the equivalent channel matrix and the dirty paper coding (DPC) technique to the transmitter of the system. Thus, interference between signals can be eliminated at the transmitter, meanwhile, sub-channel with equal gain are obtained. However, a high peak power ratio is caused by the dirty paper coding technique at the transmitter. To solve this problem, Tomlinson-Harashima Precoding (THP) with modulo operation is applied to the transmitter. From the simulation results, it is observed that the proposed system can significantly improve the BER performance as well as Peak-to-Average Power Ratio (PAPR) performance.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134365207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Planning Station Capacity and Bike Rebalance Based on Visual Analytics of Taxi and Bike-Sharing Data 基于出租车和共享单车数据可视化分析的站点容量规划与自行车再平衡
Jian Zhang, Yaozong Pan
Bike-sharing systems allow people to rent a bicycle at a near dock, ride for a short journey and return it to any dock near your destination. In bike-sharing systems, dock location and capacity planning are two key issues that bike managers should solve. In this paper, station capacity and bike rebalancing are mainly considered. We propose three indexes for visualization. A novel visual method is put forward, which is used to analyze large-scale taxi and bike-sharing data conjointly for planning the scale of bicycle docks. We can get more important information through the visualization of taxi and bike data than only use of bicycle data. It is evaluated based on the Citibike and yellow_taxi data. The results indicate that the visual method we present is very effective in planning station capacity and in bike rebalancing operations.
自行车共享系统允许人们在附近的码头租一辆自行车,骑一段短途旅行,然后还车到目的地附近的任何一个码头。在共享单车系统中,泊位和容量规划是自行车管理者需要解决的两个关键问题。本文主要考虑车站容量和自行车再平衡。我们提出了可视化的三个指标。提出了一种新的可视化方法,将大规模出租车和共享单车数据联合分析,用于规划自行车码头的规模。通过对出租车和自行车数据的可视化,我们可以获得比仅使用自行车数据更重要的信息。根据Citibike和yellow_taxi的数据对其进行评估。结果表明,本文提出的可视化方法在车站容量规划和自行车再平衡操作中是非常有效的。
{"title":"Planning Station Capacity and Bike Rebalance Based on Visual Analytics of Taxi and Bike-Sharing Data","authors":"Jian Zhang, Yaozong Pan","doi":"10.1109/CYBERC.2018.00061","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00061","url":null,"abstract":"Bike-sharing systems allow people to rent a bicycle at a near dock, ride for a short journey and return it to any dock near your destination. In bike-sharing systems, dock location and capacity planning are two key issues that bike managers should solve. In this paper, station capacity and bike rebalancing are mainly considered. We propose three indexes for visualization. A novel visual method is put forward, which is used to analyze large-scale taxi and bike-sharing data conjointly for planning the scale of bicycle docks. We can get more important information through the visualization of taxi and bike data than only use of bicycle data. It is evaluated based on the Citibike and yellow_taxi data. The results indicate that the visual method we present is very effective in planning station capacity and in bike rebalancing operations.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126284483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Credit Scoring Based on Transaction Sequence Classification 基于交易序列分类的信用评分
Xiaofen Gu, Hao Zhou, Lei Fan
The growing volume of credit card and personal loan applications has spurred the need for financial institutions to improve their credit scoring methods to make intelligent decisions. In this paper, we introduce a novel credit scoring framework based on transaction sequence classification. This framework involves a CNN-based structure for sequential feature extraction. It can be applied to both raw transaction sequences and feature matrixes aggregated by time window to capture short-term and long-term sequential features. Other non-sequential personal features are also integrated to the model to help making the final decision. In the experiments, evaluations on the performance of model-based, feature-based sequence classification and the whole framework are done respectively. Our sequence classification method as well as the credit scoring framework outperforms other state-of-art methods in the experiments on real-world labelled application and transaction data from a major payment organization.
信用卡和个人贷款申请量的增长促使金融机构需要改进其信用评分方法,以做出明智的决策。本文提出了一种基于交易序列分类的信用评分框架。该框架涉及到一个基于cnn的序列特征提取结构。它既可以应用于原始事务序列,也可以应用于按时间窗口聚合的特征矩阵,以捕获短期和长期的序列特征。其他非顺序的个人特征也被集成到模型中,以帮助做出最终决定。在实验中,分别对基于模型的序列分类、基于特征的序列分类和整个框架的性能进行了评价。我们的序列分类方法以及信用评分框架在真实世界标记应用程序和来自主要支付组织的交易数据的实验中优于其他最先进的方法。
{"title":"Credit Scoring Based on Transaction Sequence Classification","authors":"Xiaofen Gu, Hao Zhou, Lei Fan","doi":"10.1109/CYBERC.2018.00062","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00062","url":null,"abstract":"The growing volume of credit card and personal loan applications has spurred the need for financial institutions to improve their credit scoring methods to make intelligent decisions. In this paper, we introduce a novel credit scoring framework based on transaction sequence classification. This framework involves a CNN-based structure for sequential feature extraction. It can be applied to both raw transaction sequences and feature matrixes aggregated by time window to capture short-term and long-term sequential features. Other non-sequential personal features are also integrated to the model to help making the final decision. In the experiments, evaluations on the performance of model-based, feature-based sequence classification and the whole framework are done respectively. Our sequence classification method as well as the credit scoring framework outperforms other state-of-art methods in the experiments on real-world labelled application and transaction data from a major payment organization.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122090794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Vulnerabilities and Countermeasures in the RPL-Based Internet of Things 基于rpl的物联网安全漏洞及对策
Wei Yang, Y. Wang, Zhixiang Lai, Yadong Wan, Zhuo Cheng
RPL is a routing protocol for Low-Power and Lossy Networks, which is the routing protocol standardized for the Internet of Things (IoT). However, RPL has many serious vulnerabilities which can be exploited by attackers. In this paper, we adopt an finite state machines(FSM) based vulnerability discovering approach to analyze the security vulnerabilities of RPL, which can successfully discover sinkhole attack, selective-forwarding attack and hello flood attack. Then we propose some security countermeasures to defend against the attacks. Finally, we run a thorough set of simulations to assess the impact of the sinkhole attack and the effectiveness of proposed countermeasure. The results show that the attack can significantly damage the RPL and the countermeasure can successfully detect the malicious node.
RPL是一种针对低功耗和有损网络的路由协议,是针对物联网(IoT)标准化的路由协议。然而,RPL有许多可以被攻击者利用的严重漏洞。本文采用基于有限状态机(FSM)的漏洞发现方法对RPL的安全漏洞进行分析,成功发现了天坑攻击、选择性转发攻击和hello flood攻击。在此基础上提出了防范网络攻击的安全对策。最后,我们进行了一套全面的模拟,以评估天坑攻击的影响和提出的对策的有效性。结果表明,该攻击对RPL具有明显的破坏作用,该对策能够成功检测到恶意节点。
{"title":"Security Vulnerabilities and Countermeasures in the RPL-Based Internet of Things","authors":"Wei Yang, Y. Wang, Zhixiang Lai, Yadong Wan, Zhuo Cheng","doi":"10.1109/CYBERC.2018.00020","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00020","url":null,"abstract":"RPL is a routing protocol for Low-Power and Lossy Networks, which is the routing protocol standardized for the Internet of Things (IoT). However, RPL has many serious vulnerabilities which can be exploited by attackers. In this paper, we adopt an finite state machines(FSM) based vulnerability discovering approach to analyze the security vulnerabilities of RPL, which can successfully discover sinkhole attack, selective-forwarding attack and hello flood attack. Then we propose some security countermeasures to defend against the attacks. Finally, we run a thorough set of simulations to assess the impact of the sinkhole attack and the effectiveness of proposed countermeasure. The results show that the attack can significantly damage the RPL and the countermeasure can successfully detect the malicious node.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125544177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
BDDS: An Efficient Data Screening Algorithm Based on Binary Digit BDDS:一种基于二进制数的高效数据筛选算法
Haowei Lin, Xiaolong Xu
In order to improve the efficiency and accuracy of data analysis, excellent data screening algorithms are needed in this era of big data. This paper proposes a binary-digit-based data screening algorithm (BDDS), utilizing the binary storage form of data in hardware and recording the data changes over a period of time with a binary-bit recorder, whose number of digits in the binary form is used to remove the influence of the medium-distance data from the current data, left shift of the binary form is used to reduce the influence of the data which are very close to the current data, and the decimal meaning is used to determine whether the data are valid data. Experiments have proved that the algorithm, as an auxiliary algorithm, can be better combined with the current mainstream data analysis algorithms to reduce the impact of marginal data, save additional storage space, and improve the accuracy and efficiency of subsequent data analysis.
在这个大数据时代,为了提高数据分析的效率和准确性,需要优秀的数据筛选算法。提出了一种binary-digit-based数据筛选算法(bdd),利用二进制存储硬件和记录的形式的数据在一段时间内的数据变化与二进制位记录仪,其号码位数的二进制形式用于去除的影响中等距离的数据从当前数据左移的二进制形式是用来减少的影响数据非常接近当前的数据,并使用十进制含义来确定数据是否为有效数据。实验证明,该算法作为一种辅助算法,可以更好地与当前主流的数据分析算法相结合,减少边缘数据的影响,节省额外的存储空间,提高后续数据分析的准确性和效率。
{"title":"BDDS: An Efficient Data Screening Algorithm Based on Binary Digit","authors":"Haowei Lin, Xiaolong Xu","doi":"10.1109/CYBERC.2018.00096","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00096","url":null,"abstract":"In order to improve the efficiency and accuracy of data analysis, excellent data screening algorithms are needed in this era of big data. This paper proposes a binary-digit-based data screening algorithm (BDDS), utilizing the binary storage form of data in hardware and recording the data changes over a period of time with a binary-bit recorder, whose number of digits in the binary form is used to remove the influence of the medium-distance data from the current data, left shift of the binary form is used to reduce the influence of the data which are very close to the current data, and the decimal meaning is used to determine whether the data are valid data. Experiments have proved that the algorithm, as an auxiliary algorithm, can be better combined with the current mainstream data analysis algorithms to reduce the impact of marginal data, save additional storage space, and improve the accuracy and efficiency of subsequent data analysis.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132365495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Smart QoE Aware Network Selection Solution for IoT Systems in HetNets Based 5G Scenarios 基于HetNets的5G场景下物联网系统智能QoE选择解决方案
Lina Xu, Ning Cao
As small cells and network Access Points (APs) have been massively deployed in the cities, industrial, academic campuses, communication techniques utilising same or different spectrum bands are required to coordinate each other and coexist in harmony. Meanwhile, User Equipments (UEs) including Internet of Things (IoT) devices are more advanced in terms of communication ability. Simultaneously supporting data transmission through multiple network interfaces is prevalent nowadays. The current networks have many diversities and will continually involves more user scenarios and more advanced smart devices. The communication between those devices, is mostly through wireless media, such as, bluetooth, WiFi or LTE. Meanwhile, with the evolution of wireless technology, the communication in most systems will migrate to Heterogeneous Networks (HetNets)/5G networks. The devices in those systems will be able to support 5G communication, enabling more than one radio access interfaces through Multiple-In-Multiple-Out (MIMO) antennas. In order to realise 5G communication, massive regulations and standards are proposed and HetNets have become one popular means since it can utilise the existing infrastructure. The focus of 5G has changes since the last generation from operator centric to user centric services. For purpose of achieving Quality of user Experience (QoE) supported 5G, network selection in HetNets based approach is necessary and also should be intelligent. In this paper, we have proposed that the classic utility function can be applied in such a HetNets scenario. With modifications on the classic utility approach, more advanced features can be enhanced to support QoE aware communication in HetNets based 5G networks. Furthermore, we have demonstrated this idea through a LTE and WiFi integrated network. A solution for smart network selection is delivered in order to achieve 1) better user experience, 2) manageable resource allocation and 3) price control. Based on the analysis, we argue that such a solution can also be extended and implemented for more complex 5G networks to accomplish QoE awareness.
随着小型蜂窝和网络接入点(ap)在城市、工业、学术校园大量部署,要求使用相同或不同频段的通信技术相互协调,和谐共存。同时,包括物联网(IoT)设备在内的用户设备(ue)在通信能力方面更加先进。同时支持通过多个网络接口进行数据传输是目前非常普遍的。当前的网络是多种多样的,并将不断涉及更多的用户场景和更先进的智能设备。这些设备之间的通信,主要是通过无线媒体,如蓝牙,WiFi或LTE。同时,随着无线技术的发展,大多数系统的通信将向异构网络(HetNets)/5G网络迁移。这些系统中的设备将能够支持5G通信,通过多入多出(MIMO)天线实现多个无线电接入接口。为了实现5G通信,提出了大量的法规和标准,HetNets已经成为一种流行的手段,因为它可以利用现有的基础设施。自上一代以来,5G的重点已经从以运营商为中心转变为以用户为中心的服务。为了实现支持5G的用户体验质量(QoE),基于HetNets的网络选择是必要的,并且应该是智能的。在本文中,我们提出了经典效用函数可以应用于这种HetNets场景。通过对经典实用程序方法的修改,可以增强更高级的功能,以支持基于HetNets的5G网络中的QoE感知通信。此外,我们已经通过LTE和WiFi集成网络证明了这一想法。为实现1)更好的用户体验,2)可管理的资源分配,3)价格控制,提供智能网络选择解决方案。基于分析,我们认为这种解决方案也可以扩展和实施到更复杂的5G网络中,以实现QoE感知。
{"title":"A Smart QoE Aware Network Selection Solution for IoT Systems in HetNets Based 5G Scenarios","authors":"Lina Xu, Ning Cao","doi":"10.1109/CYBERC.2018.00071","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00071","url":null,"abstract":"As small cells and network Access Points (APs) have been massively deployed in the cities, industrial, academic campuses, communication techniques utilising same or different spectrum bands are required to coordinate each other and coexist in harmony. Meanwhile, User Equipments (UEs) including Internet of Things (IoT) devices are more advanced in terms of communication ability. Simultaneously supporting data transmission through multiple network interfaces is prevalent nowadays. The current networks have many diversities and will continually involves more user scenarios and more advanced smart devices. The communication between those devices, is mostly through wireless media, such as, bluetooth, WiFi or LTE. Meanwhile, with the evolution of wireless technology, the communication in most systems will migrate to Heterogeneous Networks (HetNets)/5G networks. The devices in those systems will be able to support 5G communication, enabling more than one radio access interfaces through Multiple-In-Multiple-Out (MIMO) antennas. In order to realise 5G communication, massive regulations and standards are proposed and HetNets have become one popular means since it can utilise the existing infrastructure. The focus of 5G has changes since the last generation from operator centric to user centric services. For purpose of achieving Quality of user Experience (QoE) supported 5G, network selection in HetNets based approach is necessary and also should be intelligent. In this paper, we have proposed that the classic utility function can be applied in such a HetNets scenario. With modifications on the classic utility approach, more advanced features can be enhanced to support QoE aware communication in HetNets based 5G networks. Furthermore, we have demonstrated this idea through a LTE and WiFi integrated network. A solution for smart network selection is delivered in order to achieve 1) better user experience, 2) manageable resource allocation and 3) price control. Based on the analysis, we argue that such a solution can also be extended and implemented for more complex 5G networks to accomplish QoE awareness.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116245447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1