首页 > 最新文献

ACM Transactions on Internet of Things最新文献

英文 中文
TONARI: Reactive Detection of Close Physical Contact using Unlicensed LPWAN Signals TONARI:利用未授权的 LPWAN 信号对近距离物理接触进行反应式检测
IF 2.7 Pub Date : 2024-02-15 DOI: 10.1145/3648572
Chenglong Shao, Osamu Muta
Recognizing if two objects are in close physical contact (CPC) is the basis of various Internet-of-Things services such as vehicle proximity alert and radiation exposure reduction. This is achieved traditionally through tailor-made proximity sensors that proactively transmit wireless signals and analyze the reflection from an object. Despite its feasibility, the past few years have witnessed the prosperity of reactive CPC detection techniques that do not need spontaneous signal transmission and merely exploit received wireless signals from a target. Unlike existing approaches entailing additional effort of multiple antennas, dedicated signal emitters, human intervention, or a back-end server, this paper presents TONARI, an effortless CPC detection framework that performs in a reactive manner. TONARI is developed for the first time with LoRa, the representative of unlicensed low-power wide area network (LPWAN) technologies, as the wireless signal for CPC detection. At the heart of TONARI lies a novel feature arbitrator that decides whether two devices are in CPC or not by distinguishing different types of LoRa chirp-based additive sample magnitude sequences. Software-defined radio-based experiments are conducted to show that the achievable CPC detection accuracy via TONARI can reach 100% in most practical cases.
识别两个物体是否有密切的物理接触(CPC)是各种物联网服务的基础,如车辆接近警报和减少辐射照射。传统上,这是通过量身定制的接近传感器来实现的,这些传感器会主动发射无线信号并分析来自物体的反射。尽管这种方法可行,但在过去几年中,无需自发信号传输、只需利用从目标接收到的无线信号的被动式 CPC 检测技术得到了蓬勃发展。与需要额外使用多天线、专用信号发射器、人工干预或后端服务器的现有方法不同,本文介绍的 TONARI 是一种以被动方式执行的轻松 CPC 检测框架。TONARI 首次使用 LoRa(未授权低功耗广域网 (LPWAN) 技术的代表)作为 CPC 检测的无线信号进行开发。TONARI 的核心是一个新颖的特征仲裁器,它通过区分不同类型的基于 LoRa 的啁啾加法采样幅度序列来决定两个设备是否处于 CPC 中。基于软件定义无线电的实验表明,在大多数实际情况下,通过 TONARI 实现的 CPC 检测准确率可达 100%。
{"title":"TONARI: Reactive Detection of Close Physical Contact using Unlicensed LPWAN Signals","authors":"Chenglong Shao, Osamu Muta","doi":"10.1145/3648572","DOIUrl":"https://doi.org/10.1145/3648572","url":null,"abstract":"Recognizing if two objects are in close physical contact (CPC) is the basis of various Internet-of-Things services such as vehicle proximity alert and radiation exposure reduction. This is achieved traditionally through tailor-made proximity sensors that proactively transmit wireless signals and analyze the reflection from an object. Despite its feasibility, the past few years have witnessed the prosperity of reactive CPC detection techniques that do not need spontaneous signal transmission and merely exploit received wireless signals from a target. Unlike existing approaches entailing additional effort of multiple antennas, dedicated signal emitters, human intervention, or a back-end server, this paper presents TONARI, an effortless CPC detection framework that performs in a reactive manner. TONARI is developed for the first time with LoRa, the representative of unlicensed low-power wide area network (LPWAN) technologies, as the wireless signal for CPC detection. At the heart of TONARI lies a novel feature arbitrator that decides whether two devices are in CPC or not by distinguishing different types of LoRa chirp-based additive sample magnitude sequences. Software-defined radio-based experiments are conducted to show that the achievable CPC detection accuracy via TONARI can reach 100% in most practical cases.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139835839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication, Authorization, Access Control, and Key Exchange in Internet of Things 物联网中的认证、授权、访问控制和密钥交换
IF 2.7 Pub Date : 2024-02-03 DOI: 10.1145/3643867
I. Simsek
The Internet of Things (IoT) is a dynamic network of devices and infrastructure supporting instances composed to platforms being based on cloud/fog and blockchain technologies. Its intervention in more and more sensitive areas requires IoT entities (devices and platform instances) to communicate with each other via secure channels generally established by using cryptographical methods. This needs an authentic key exchange which in turn requires an authentication process. Moreover, it has to be ensured that client entities can access only authorized services provided by authorized server entities. Additionally, requirements specifically introduced by IoT complicate realizing these security goals even more. This paper introduces a novel approach providing authentication, authorization, access control, and key exchange in instance-to-instance, device-to-instance, and device-to-device communications to handle cloud/fog-based and blockchain-based platforms. In contrast to related work, realizations of these security goals are not disjunct processes and are integrated with each other in our approach combining zero-knowledge and identity-based schemes while meeting the IoT security requirements. Thus, it does not require any public data pre-distribution or secret pre-sharing between communicating entities, and no entity has to hold any device-specific or instance-specific data to be used for authentication or authorization. While supporting the autonomous character of IoT, our approach is independent of application and platform types without requiring additional components or procedures. Moreover, it is resistant to active man in the middle attacks and does not include costly cryptographic operations. This paper also demonstrates the high performance of our approach with regard to multiple affecting factors.
物联网(IoT)是由基于云/雾和区块链技术的平台组成的设备和基础设施支持实例的动态网络。物联网介入越来越多的敏感领域,这就要求物联网实体(设备和平台实例)通过通常使用加密方法建立的安全渠道相互通信。这就需要进行真实的密钥交换,而这反过来又需要一个验证过程。此外,还必须确保客户端实体只能访问授权服务器实体提供的授权服务。此外,物联网特别引入的要求使这些安全目标的实现更加复杂。本文介绍了一种在实例到实例、设备到实例和设备到设备通信中提供身份验证、授权、访问控制和密钥交换的新方法,以处理基于云/雾和区块链的平台。与相关工作不同的是,在我们的方法中,这些安全目标的实现并不是相互割裂的过程,而是相互融合的,它结合了零知识和基于身份的方案,同时满足了物联网的安全要求。因此,它不需要在通信实体之间预先分发任何公共数据或共享任何秘密,也没有任何实体需要持有任何特定于设备或特定于实例的数据来进行身份验证或授权。在支持物联网自主特性的同时,我们的方法独立于应用程序和平台类型,无需额外的组件或程序。此外,它还能抵御主动中间人攻击,并且不包含昂贵的加密操作。本文还展示了我们的方法在多种影响因素方面的高性能。
{"title":"Authentication, Authorization, Access Control, and Key Exchange in Internet of Things","authors":"I. Simsek","doi":"10.1145/3643867","DOIUrl":"https://doi.org/10.1145/3643867","url":null,"abstract":"The Internet of Things (IoT) is a dynamic network of devices and infrastructure supporting instances composed to platforms being based on cloud/fog and blockchain technologies. Its intervention in more and more sensitive areas requires IoT entities (devices and platform instances) to communicate with each other via secure channels generally established by using cryptographical methods. This needs an authentic key exchange which in turn requires an authentication process. Moreover, it has to be ensured that client entities can access only authorized services provided by authorized server entities. Additionally, requirements specifically introduced by IoT complicate realizing these security goals even more. This paper introduces a novel approach providing authentication, authorization, access control, and key exchange in instance-to-instance, device-to-instance, and device-to-device communications to handle cloud/fog-based and blockchain-based platforms. In contrast to related work, realizations of these security goals are not disjunct processes and are integrated with each other in our approach combining zero-knowledge and identity-based schemes while meeting the IoT security requirements. Thus, it does not require any public data pre-distribution or secret pre-sharing between communicating entities, and no entity has to hold any device-specific or instance-specific data to be used for authentication or authorization. While supporting the autonomous character of IoT, our approach is independent of application and platform types without requiring additional components or procedures. Moreover, it is resistant to active man in the middle attacks and does not include costly cryptographic operations. This paper also demonstrates the high performance of our approach with regard to multiple affecting factors.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139808508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication, Authorization, Access Control, and Key Exchange in Internet of Things 物联网中的认证、授权、访问控制和密钥交换
IF 2.7 Pub Date : 2024-02-03 DOI: 10.1145/3643867
I. Simsek
The Internet of Things (IoT) is a dynamic network of devices and infrastructure supporting instances composed to platforms being based on cloud/fog and blockchain technologies. Its intervention in more and more sensitive areas requires IoT entities (devices and platform instances) to communicate with each other via secure channels generally established by using cryptographical methods. This needs an authentic key exchange which in turn requires an authentication process. Moreover, it has to be ensured that client entities can access only authorized services provided by authorized server entities. Additionally, requirements specifically introduced by IoT complicate realizing these security goals even more. This paper introduces a novel approach providing authentication, authorization, access control, and key exchange in instance-to-instance, device-to-instance, and device-to-device communications to handle cloud/fog-based and blockchain-based platforms. In contrast to related work, realizations of these security goals are not disjunct processes and are integrated with each other in our approach combining zero-knowledge and identity-based schemes while meeting the IoT security requirements. Thus, it does not require any public data pre-distribution or secret pre-sharing between communicating entities, and no entity has to hold any device-specific or instance-specific data to be used for authentication or authorization. While supporting the autonomous character of IoT, our approach is independent of application and platform types without requiring additional components or procedures. Moreover, it is resistant to active man in the middle attacks and does not include costly cryptographic operations. This paper also demonstrates the high performance of our approach with regard to multiple affecting factors.
物联网(IoT)是由基于云/雾和区块链技术的平台组成的设备和基础设施支持实例的动态网络。物联网介入越来越多的敏感领域,这就要求物联网实体(设备和平台实例)通过通常使用加密方法建立的安全渠道相互通信。这就需要进行真实的密钥交换,而这反过来又需要一个验证过程。此外,还必须确保客户端实体只能访问授权服务器实体提供的授权服务。此外,物联网特别引入的要求使这些安全目标的实现更加复杂。本文介绍了一种在实例到实例、设备到实例和设备到设备通信中提供身份验证、授权、访问控制和密钥交换的新方法,以处理基于云/雾和区块链的平台。与相关工作不同的是,在我们的方法中,这些安全目标的实现并不是相互割裂的过程,而是相互融合的,它结合了零知识和基于身份的方案,同时满足了物联网的安全要求。因此,它不需要在通信实体之间预先分发任何公共数据或共享任何秘密,也没有任何实体需要持有任何特定于设备或特定于实例的数据来进行身份验证或授权。在支持物联网自主特性的同时,我们的方法独立于应用程序和平台类型,无需额外的组件或程序。此外,它还能抵御主动中间人攻击,并且不包含昂贵的加密操作。本文还展示了我们的方法在多种影响因素方面的高性能。
{"title":"Authentication, Authorization, Access Control, and Key Exchange in Internet of Things","authors":"I. Simsek","doi":"10.1145/3643867","DOIUrl":"https://doi.org/10.1145/3643867","url":null,"abstract":"The Internet of Things (IoT) is a dynamic network of devices and infrastructure supporting instances composed to platforms being based on cloud/fog and blockchain technologies. Its intervention in more and more sensitive areas requires IoT entities (devices and platform instances) to communicate with each other via secure channels generally established by using cryptographical methods. This needs an authentic key exchange which in turn requires an authentication process. Moreover, it has to be ensured that client entities can access only authorized services provided by authorized server entities. Additionally, requirements specifically introduced by IoT complicate realizing these security goals even more. This paper introduces a novel approach providing authentication, authorization, access control, and key exchange in instance-to-instance, device-to-instance, and device-to-device communications to handle cloud/fog-based and blockchain-based platforms. In contrast to related work, realizations of these security goals are not disjunct processes and are integrated with each other in our approach combining zero-knowledge and identity-based schemes while meeting the IoT security requirements. Thus, it does not require any public data pre-distribution or secret pre-sharing between communicating entities, and no entity has to hold any device-specific or instance-specific data to be used for authentication or authorization. While supporting the autonomous character of IoT, our approach is independent of application and platform types without requiring additional components or procedures. Moreover, it is resistant to active man in the middle attacks and does not include costly cryptographic operations. This paper also demonstrates the high performance of our approach with regard to multiple affecting factors.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139868332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MiSleep: Human Sleep Posture Identification from Deep Learning Augmented Millimeter-Wave Wireless Systems MiSleep:通过深度学习增强毫米波无线系统识别人类睡姿
IF 2.7 Pub Date : 2024-02-01 DOI: 10.1145/3643866
Aakriti Adhikari, Sanjib Sur
In this work, we propose MiSleep , a deep learning augmented millimeter-wave (mmWave) wireless system to monitor human sleep posture by predicting the 3D location of the body joints of a person during sleep. Unlike existing vision- or wearable-based sleep monitoring systems, MiSleep is not privacy-invasive and does not require users to wear anything on their body. MiSleep leverages knowledge of human anatomical features and deep learning models to solve challenges in existing mmWave devices with low-resolution and aliased imaging, and specularity in signals. MiSleep builds the model by learning the relationship between mmWave reflected signals and body postures from thousands of existing samples. Since a practical sleep also involves sudden toss-turns, which could introduce errors in posture prediction, MiSleep designs a state machine based on the reflected signals to classify the sleeping states into rest or toss-turn, and predict the posture only during the rest states. We evaluate MiSleep with real data collected from Commercial-Off-The-Shelf mmWave devices for 8 volunteers of diverse ages, genders, and heights performing different sleep postures. We observe that MiSleep identifies the toss-turn events start time and duration within 1.25 s and 1.7 s of the ground truth, respectively, and predicts the 3D location of body joints with a median error of 1.3 cm only and can perform even under the blankets, with accuracy on par with the existing vision-based system, unlocking the potential of mmWave systems for privacy-noninvasive at-home healthcare applications.
在这项工作中,我们提出了一种深度学习增强毫米波(mmWave)无线系统--MiSleep,通过预测人在睡眠时身体关节的三维位置来监测人的睡眠姿势。与现有的基于视觉或可穿戴设备的睡眠监测系统不同,MiSleep 不侵犯隐私,也不需要用户在身上佩戴任何东西。MiSleep 利用人体解剖学特征知识和深度学习模型,解决了现有毫米波设备在低分辨率、混叠成像和信号镜面反射方面的难题。MiSleep 通过从数以千计的现有样本中学习毫米波反射信号与身体姿势之间的关系来建立模型。由于实际睡眠中也会出现突然翻身的情况,这会给姿势预测带来误差,因此 MiSleep 根据反射信号设计了一个状态机,将睡眠状态分为休息和翻身两种,并只预测休息状态下的姿势。我们利用从商用现成毫米波设备收集的真实数据对 MiSleep 进行了评估,这些数据来自 8 名不同年龄、性别和身高的志愿者,他们在不同的睡眠姿势下工作。我们观察到,MiSleep 能分别在地面实况的 1.25 秒和 1.7 秒内识别翻腾事件的开始时间和持续时间,并能预测身体关节的三维位置,中位误差仅为 1.3 厘米,甚至能在毯子下进行预测,其准确性与现有的基于视觉的系统相当,从而释放了毫米波系统在隐私无创家庭医疗保健应用方面的潜力。
{"title":"MiSleep: Human Sleep Posture Identification from Deep Learning Augmented Millimeter-Wave Wireless Systems","authors":"Aakriti Adhikari, Sanjib Sur","doi":"10.1145/3643866","DOIUrl":"https://doi.org/10.1145/3643866","url":null,"abstract":"\u0000 In this work, we propose\u0000 MiSleep\u0000 , a deep learning augmented millimeter-wave (mmWave) wireless system to monitor human sleep posture by predicting the 3D location of the body joints of a person during sleep. Unlike existing vision- or wearable-based sleep monitoring systems,\u0000 MiSleep\u0000 is not privacy-invasive and does not require users to wear anything on their body.\u0000 MiSleep\u0000 leverages knowledge of human anatomical features and deep learning models to solve challenges in existing mmWave devices with low-resolution and aliased imaging, and specularity in signals.\u0000 MiSleep\u0000 builds the model by learning the relationship between mmWave reflected signals and body postures from thousands of existing samples. Since a practical sleep also involves sudden toss-turns, which could introduce errors in posture prediction,\u0000 MiSleep\u0000 designs a state machine based on the reflected signals to classify the sleeping states into rest or toss-turn, and predict the posture only during the rest states. We evaluate\u0000 MiSleep\u0000 with real data collected from Commercial-Off-The-Shelf mmWave devices for 8 volunteers of diverse ages, genders, and heights performing different sleep postures. We observe that\u0000 MiSleep\u0000 identifies the toss-turn events start time and duration within 1.25 s and 1.7 s of the ground truth, respectively, and predicts the 3D location of body joints with a median error of 1.3 cm only and can perform even under the blankets, with accuracy on par with the existing vision-based system, unlocking the potential of mmWave systems for privacy-noninvasive at-home healthcare applications.\u0000","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139683834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to the Special Issue on Wireless Sensing for IoT 物联网无线传感特刊简介
IF 2.7 Pub Date : 2023-11-30 DOI: 10.1145/3633078
Huadong Ma, Yuan He, Mo Li, Neal Patwari, Stephan Sigg
ACM TIOT launched its first special issue on the theme of wireless sensing for IoT. As an important component of the special issue and a novel practice of the journal, an online virtual workshop will be held, with presentations for each of the accepted articles. Welcome to join us for online discussion! Free registration is required for an attendee of the workshop. The zoom link will be shared to registered attendees before the workshop.
ACM TIOT 推出了以物联网无线传感为主题的第一期特刊。作为该特刊的重要组成部分和本期刊的新颖做法,将举办在线虚拟研讨会,并对每篇录用文章进行介绍。欢迎参加在线讨论!研讨会与会者需免费注册。变焦链接将在研讨会前发送给注册与会者。
{"title":"Introduction to the Special Issue on Wireless Sensing for IoT","authors":"Huadong Ma, Yuan He, Mo Li, Neal Patwari, Stephan Sigg","doi":"10.1145/3633078","DOIUrl":"https://doi.org/10.1145/3633078","url":null,"abstract":"ACM TIOT launched its first special issue on the theme of wireless sensing for IoT. As an important component of the special issue and a novel practice of the journal, an online virtual workshop will be held, with presentations for each of the accepted articles. Welcome to join us for online discussion! Free registration is required for an attendee of the workshop. The zoom link will be shared to registered attendees before the workshop.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139197586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special Issue on Wireless Sensing for IoT: A Word from the Editor-in-Chief 物联网无线传感特刊:主编的话
IF 2.7 Pub Date : 2023-11-30 DOI: 10.1145/3633752
G. Picco
{"title":"Special Issue on Wireless Sensing for IoT: A Word from the Editor-in-Chief","authors":"G. Picco","doi":"10.1145/3633752","DOIUrl":"https://doi.org/10.1145/3633752","url":null,"abstract":"","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139203625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilient Intermediary‐Based Key Exchange Protocol for IoT 基于中间人的物联网弹性密钥交换协议
IF 2.7 Pub Date : 2023-11-20 DOI: 10.1145/3632408
Zhangxiang Hu, Jun Li, Christopher Wilson
Due to the limited resources of Internet of Things (IoT) devices, Symmetric Key Cryptography (SKC) is typically favored over resource-intensive Public Key Cryptography (PKC) to secure communication between IoT devices. To utilize SKC, devices need to execute a key exchange protocol to establish a session key before initiating communication. However, existing SKC-based key exchange protocols assume communication devices have a pre-shared secret or there are trusted intermediaries between them; neither is always realistic in IoT. We introduce a new SKC-based key exchange protocol for IoT devices. While also intermediary-based, our protocol fundamentally departs from existing intermediary-based solutions in that intermediaries between two key exchange devices may be malicious, and moreover, our protocol can detect cheating behaviors and identify malicious intermediaries. We prove our protocol is secure under the universally composable model, and show it can detect malicious intermediaries with probability 1.0. We implemented and evaluated our protocol on different IoT devices. We show our protocol has significant improvements in computation time and energy cost. Compared to the PKC-based protocols ECDH, DH, and RSA, our protocol is 2.3 to 1591 times faster on one of the two key exchange devices and 0.7 to 4.67 times faster on the other.
由于物联网(IoT)设备的资源有限,对称密钥加密(SKC)通常比资源密集型公钥加密(PKC)更受青睐,以确保物联网设备之间的通信安全。要使用 SKC,设备需要执行密钥交换协议,以便在启动通信前建立会话密钥。然而,现有的基于 SKC 的密钥交换协议假定通信设备之间有一个预先共享的秘密或存在可信的中间人,但这两种情况在物联网中都不现实。我们为物联网设备引入了一种新的基于 SKC 的密钥交换协议。虽然我们的协议也是基于中介的,但它与现有的基于中介的解决方案有本质区别,因为两个密钥交换设备之间的中介可能是恶意的,而且我们的协议可以检测作弊行为并识别恶意中介。我们证明了我们的协议在普遍可组合模型下是安全的,并证明它能以 1.0 的概率检测到恶意中间人。我们在不同的物联网设备上实施并评估了我们的协议。结果表明,我们的协议在计算时间和能源成本方面都有显著改善。与基于 PKC 的 ECDH、DH 和 RSA 协议相比,我们的协议在两台密钥交换设备中的一台上要快 2.3 到 1591 倍,在另一台上要快 0.7 到 4.67 倍。
{"title":"Resilient Intermediary‐Based Key Exchange Protocol for IoT","authors":"Zhangxiang Hu, Jun Li, Christopher Wilson","doi":"10.1145/3632408","DOIUrl":"https://doi.org/10.1145/3632408","url":null,"abstract":"Due to the limited resources of Internet of Things (IoT) devices, Symmetric Key Cryptography (SKC) is typically favored over resource-intensive Public Key Cryptography (PKC) to secure communication between IoT devices. To utilize SKC, devices need to execute a key exchange protocol to establish a session key before initiating communication. However, existing SKC-based key exchange protocols assume communication devices have a pre-shared secret or there are trusted intermediaries between them; neither is always realistic in IoT. We introduce a new SKC-based key exchange protocol for IoT devices. While also intermediary-based, our protocol fundamentally departs from existing intermediary-based solutions in that intermediaries between two key exchange devices may be malicious, and moreover, our protocol can detect cheating behaviors and identify malicious intermediaries. We prove our protocol is secure under the universally composable model, and show it can detect malicious intermediaries with probability 1.0. We implemented and evaluated our protocol on different IoT devices. We show our protocol has significant improvements in computation time and energy cost. Compared to the PKC-based protocols ECDH, DH, and RSA, our protocol is 2.3 to 1591 times faster on one of the two key exchange devices and 0.7 to 4.67 times faster on the other.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139257855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Two-Mode, Adaptive Security Framework for Smart Home Security Applications 智能家居安全应用的双模式自适应安全框架
IF 2.7 Pub Date : 2023-11-17 DOI: 10.1145/3617504
Devkishen Sisodia, Jun Li, Samuel Mergendahl, Hasan Cam
With the growth of the Internet of Things (IoT), the number of cyber attacks on the Internet is on the rise. However, the resource-constrained nature of IoT devices and their networks makes many classical security systems ineffective or inapplicable. We introduce TWINKLE, a two-mode, adaptive security framework that allows an IoT network to be in regular mode for most of the time, which incurs a low resource consumption rate, and to switch to vigilant mode only when suspicious behavior is detected, which potentially incurs a higher overhead. Compared to the early version of this work, this paper presents a more comprehensive design and architecture of TWINKLE, describes challenges and details in implementing TWINKLE, and reports evaluations of TWINKLE based on real-world IoT testbeds with more metrics. We show the efficacy of TWINKLE in two case studies where we examine two existing intrusion detection and prevention systems and transform both into new, improved systems using TWINKLE. Our evaluations show that TWINKLE is not only effective at securing resource-constrained IoT networks, but can also successfully detect and prevent attacks with a significantly lower overhead and detection latency than existing solutions.
随着物联网(IoT)的发展,互联网上的网络攻击数量不断上升。然而,物联网设备及其网络资源受限的特性使得许多经典安全系统失效或不适用。我们引入了 TWINKLE,这是一种双模式自适应安全框架,它允许物联网网络在大部分时间内处于常规模式(资源消耗率较低),只有在检测到可疑行为时才切换到警惕模式(可能会产生较高的开销)。与本文的早期版本相比,本文介绍了 TWINKLE 更全面的设计和架构,描述了实现 TWINKLE 所面临的挑战和细节,并报告了基于真实世界物联网测试平台的 TWINKLE 评估结果和更多指标。我们在两个案例研究中展示了 TWINKLE 的功效,在这两个案例研究中,我们检查了两个现有的入侵检测和防御系统,并使用 TWINKLE 将这两个系统转化为新的、改进的系统。我们的评估结果表明,TWINKLE 不仅能有效保护资源有限的物联网网络,还能成功检测和预防攻击,其开销和检测延迟明显低于现有解决方案。
{"title":"A Two-Mode, Adaptive Security Framework for Smart Home Security Applications","authors":"Devkishen Sisodia, Jun Li, Samuel Mergendahl, Hasan Cam","doi":"10.1145/3617504","DOIUrl":"https://doi.org/10.1145/3617504","url":null,"abstract":"With the growth of the Internet of Things (IoT), the number of cyber attacks on the Internet is on the rise. However, the resource-constrained nature of IoT devices and their networks makes many classical security systems ineffective or inapplicable. We introduce TWINKLE, a two-mode, adaptive security framework that allows an IoT network to be in regular mode for most of the time, which incurs a low resource consumption rate, and to switch to vigilant mode only when suspicious behavior is detected, which potentially incurs a higher overhead. Compared to the early version of this work, this paper presents a more comprehensive design and architecture of TWINKLE, describes challenges and details in implementing TWINKLE, and reports evaluations of TWINKLE based on real-world IoT testbeds with more metrics. We show the efficacy of TWINKLE in two case studies where we examine two existing intrusion detection and prevention systems and transform both into new, improved systems using TWINKLE. Our evaluations show that TWINKLE is not only effective at securing resource-constrained IoT networks, but can also successfully detect and prevent attacks with a significantly lower overhead and detection latency than existing solutions.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139263350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online learning for dynamic impending collision prediction using FMCW radar 基于FMCW雷达的动态碰撞预测在线学习
IF 2.7 Pub Date : 2023-08-26 DOI: 10.1145/3616018
Aarti Singh, Neal Patwari
Radar collision prediction systems can play a crucial role in safety critical applications, such as autonomous vehicles and smart helmets for contact sports, by predicting impending collision just before it will occur. Collision prediction algorithms use the velocity and range measurements provided by radar to calculate time to collision. However, radar measurements used in such systems contain significant clutter, noise, and inaccuracies which hamper reliability. Existing solutions to reduce clutter are based on static filtering methods. In this paper, we present a deep learning approach using frequency modulated continuous wave (FMCW) radar and inertial sensing that learns the environmental and user-specific conditions that lead to future collisions. We present a process of converting raw radar samples to range-Doppler matrices (RDMs) and then training a deep convolutional neural network that outputs predictions (impending collision vs. none) for any measured RDM. The system is retrained to work in dynamically changing environments and maintain prediction accuracy. We demonstrate the effectiveness of our approach of using the information from radar data to predict impending collisions in real-time via real-world experiments, and show that our method achieves an F1-score of 0.91 and outperforms a traditional approach in accuracy and adaptability.
雷达碰撞预测系统可以在碰撞发生之前预测即将发生的碰撞,在安全关键应用中发挥至关重要的作用,例如自动驾驶汽车和接触式运动的智能头盔。碰撞预测算法使用雷达提供的速度和距离测量来计算碰撞时间。然而,在这种系统中使用的雷达测量包含显著的杂波、噪声和不准确性,从而妨碍了可靠性。现有的减少杂波的解决方案是基于静态过滤方法。在本文中,我们提出了一种使用调频连续波(FMCW)雷达和惯性传感的深度学习方法,该方法可以学习导致未来碰撞的环境和用户特定条件。我们提出了一个将原始雷达样本转换为距离多普勒矩阵(RDM)的过程,然后训练一个深度卷积神经网络,该网络为任何测量的RDM输出预测(即将发生的碰撞与无碰撞)。该系统经过再训练,可以在动态变化的环境中工作,并保持预测的准确性。我们通过现实世界的实验证明了利用雷达数据信息实时预测即将发生碰撞的方法的有效性,并表明我们的方法达到了f1得分0.91,并且在准确性和适应性方面优于传统方法。
{"title":"Online learning for dynamic impending collision prediction using FMCW radar","authors":"Aarti Singh, Neal Patwari","doi":"10.1145/3616018","DOIUrl":"https://doi.org/10.1145/3616018","url":null,"abstract":"Radar collision prediction systems can play a crucial role in safety critical applications, such as autonomous vehicles and smart helmets for contact sports, by predicting impending collision just before it will occur. Collision prediction algorithms use the velocity and range measurements provided by radar to calculate time to collision. However, radar measurements used in such systems contain significant clutter, noise, and inaccuracies which hamper reliability. Existing solutions to reduce clutter are based on static filtering methods. In this paper, we present a deep learning approach using frequency modulated continuous wave (FMCW) radar and inertial sensing that learns the environmental and user-specific conditions that lead to future collisions. We present a process of converting raw radar samples to range-Doppler matrices (RDMs) and then training a deep convolutional neural network that outputs predictions (impending collision vs. none) for any measured RDM. The system is retrained to work in dynamically changing environments and maintain prediction accuracy. We demonstrate the effectiveness of our approach of using the information from radar data to predict impending collisions in real-time via real-world experiments, and show that our method achieves an F1-score of 0.91 and outperforms a traditional approach in accuracy and adaptability.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86369942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CH-MAC: Achieving Low-latency Reliable Communication via Coding and Hopping in LPWAN CH-MAC:在LPWAN中通过编码和跳变实现低延迟可靠通信
IF 2.7 Pub Date : 2023-08-25 DOI: 10.1145/3617505
Junzhou Luo, Zhuqing Xu, Jingkai Lin, Ciyuan Chen, Runqun Xiong
Wireless sensing has emerged as a powerful environmental sensing technology that is vulnerable to the impact of all kinds of ambient noises. LoRa is a novel interference-resilient technology of low-power wide-area networks (LPWAN), which has attracted wide attention from scientific and industrial communities. However, LoRa transmission suffers from serious latency in those complex wireless sensing environments requiring transmission reliability. In this paper, we present CH-MAC, the first MAC-layer protocol based on the local corruption nature of packets and the time-varying nature of channels to reduce end-to-end transmission latency in LPWAN with reliable communication requirements. Specifically, CH-MAC employs Luby Transform code to divide and encode the payload into several blocks such that the receiver can retain part of the coded information in the corrupted packets. In addition, CH-MAC utilizes hopping to transmit different blocks of a packet with various channels to avoid sudden noise collision. Moreover, CH-MAC adopts a dynamic packet length adjustment mechanism to mitigate network congestion. Extensive evaluations on a real-world hardware testbed and a simulation platform show that CH-MAC can reduce end-to-end transmission latency by 2.63 × with a communication success rate requirement of > (95% ) compared with state-of-the-art methods.
无线传感作为一种强大的环境传感技术,极易受到各种环境噪声的影响。LoRa是一种新型的低功耗广域网抗干扰技术,受到了科学界和工业界的广泛关注。然而,在要求传输可靠性的复杂无线传感环境中,LoRa传输存在严重的时延问题。在本文中,我们提出了CH-MAC,这是第一个基于分组本地损坏性质和信道时变性质的mac层协议,以减少具有可靠通信要求的LPWAN中的端到端传输延迟。具体来说,CH-MAC使用Luby Transform代码将有效载荷划分并编码为几个块,以便接收器可以在损坏的数据包中保留部分编码信息。此外,CH-MAC利用跳频技术将数据包的不同块以不同的信道传输,避免了突然的噪声碰撞。此外,CH-MAC采用动态数据包长度调整机制来缓解网络拥塞。在实际硬件测试平台和仿真平台上进行的大量评估表明,与现有方法相比,CH-MAC可以将端到端传输延迟降低2.63 x,通信成功率要求> (95% )。
{"title":"CH-MAC: Achieving Low-latency Reliable Communication via Coding and Hopping in LPWAN","authors":"Junzhou Luo, Zhuqing Xu, Jingkai Lin, Ciyuan Chen, Runqun Xiong","doi":"10.1145/3617505","DOIUrl":"https://doi.org/10.1145/3617505","url":null,"abstract":"Wireless sensing has emerged as a powerful environmental sensing technology that is vulnerable to the impact of all kinds of ambient noises. LoRa is a novel interference-resilient technology of low-power wide-area networks (LPWAN), which has attracted wide attention from scientific and industrial communities. However, LoRa transmission suffers from serious latency in those complex wireless sensing environments requiring transmission reliability. In this paper, we present CH-MAC, the first MAC-layer protocol based on the local corruption nature of packets and the time-varying nature of channels to reduce end-to-end transmission latency in LPWAN with reliable communication requirements. Specifically, CH-MAC employs Luby Transform code to divide and encode the payload into several blocks such that the receiver can retain part of the coded information in the corrupted packets. In addition, CH-MAC utilizes hopping to transmit different blocks of a packet with various channels to avoid sudden noise collision. Moreover, CH-MAC adopts a dynamic packet length adjustment mechanism to mitigate network congestion. Extensive evaluations on a real-world hardware testbed and a simulation platform show that CH-MAC can reduce end-to-end transmission latency by 2.63 × with a communication success rate requirement of > (95% ) compared with state-of-the-art methods.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84414636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1