首页 > 最新文献

Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications最新文献

英文 中文
Decelerating Suspend and Resume in Operating Systems 在操作系统中减速挂起和恢复
Shuang Zhai, Liwei Guo, Xiangyu Li, F. Lin
Short-lived tasks have a large impact on mobile computer's battery life. In executing such tasks, the whole system transitions in and out of the deep sleep mode. This suspend/resume procedure is controlled by the operating system (OS), which consumes a dominating portion of energy. Through characterizing the Linux kernel on a variety of modern system-on-chips (SoCs), we show that the OS suspend/resume mechanism is fundamentally slowed down by various IO devices, which frequently keep CPU waiting. To minimize energy consumption, we advocate offloading the OS suspend/resume to a miniature processor that waits more efficiently. To this end, we propose a new virtual executor that runs on a miniature core and directly executes the unmodified kernel binary of the main CPU. We construct the virtual executor centering on software-only, cross-ISA binary translation, an approach previously considered prohibitively expensive. Through novel designs and optimizations, we reduce the translation overhead by 5×. The preliminary benchmarks show promising energy efficiency.
短期任务对移动电脑的电池寿命有很大的影响。在执行这些任务时,整个系统会在深度睡眠模式中切换。这个挂起/恢复过程是由操作系统(OS)控制的,它消耗了大部分的能量。通过对各种现代片上系统(soc)上的Linux内核进行表征,我们表明,操作系统的挂起/恢复机制从根本上被各种IO设备减慢,这些设备经常使CPU等待。为了最小化能耗,我们提倡将操作系统的挂起/恢复任务卸载到一个更有效等待的微型处理器上。为此,我们提出了一种新的虚拟执行器,它运行在微型内核上,直接执行主CPU未修改的内核二进制文件。我们以纯软件、跨isa二进制转换为中心构建虚拟执行器,这种方法以前被认为过于昂贵。通过新颖的设计和优化,我们将翻译开销减少了5倍。初步的基准测试显示,能源效率大有希望。
{"title":"Decelerating Suspend and Resume in Operating Systems","authors":"Shuang Zhai, Liwei Guo, Xiangyu Li, F. Lin","doi":"10.1145/3032970.3032975","DOIUrl":"https://doi.org/10.1145/3032970.3032975","url":null,"abstract":"Short-lived tasks have a large impact on mobile computer's battery life. In executing such tasks, the whole system transitions in and out of the deep sleep mode. This suspend/resume procedure is controlled by the operating system (OS), which consumes a dominating portion of energy. Through characterizing the Linux kernel on a variety of modern system-on-chips (SoCs), we show that the OS suspend/resume mechanism is fundamentally slowed down by various IO devices, which frequently keep CPU waiting. To minimize energy consumption, we advocate offloading the OS suspend/resume to a miniature processor that waits more efficiently. To this end, we propose a new virtual executor that runs on a miniature core and directly executes the unmodified kernel binary of the main CPU. We construct the virtual executor centering on software-only, cross-ISA binary translation, an approach previously considered prohibitively expensive. Through novel designs and optimizations, we reduce the translation overhead by 5×. The preliminary benchmarks show promising energy efficiency.","PeriodicalId":309322,"journal":{"name":"Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124805374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
ThruMapper: Through-Wall Building Tomography with a Single Mapping Robot ThruMapper:使用单个测绘机器人的穿墙建筑断层扫描
Bo Tan, K. Chetty, K. Jamieson
Vision- and LIDAR-based Simultaneous Localization and Mapping (SLAM) techniques can build indoor building floorplans with ease, but require line-of-sight into every room of a building. We are developing a radio microwave-based system for building indoor floor plans using SLAM techniques, but without the requirement that the mapping robot has access to every room in the building. Our system uses multiple antennas to direct radio energy through walls in particular directions, and joint time- and angle-of-arrival estimation techniques to estimate their backscatter returns from the walls of the building. Wide bandwidth (120 MHz) transmissions combined with an iterative transmit nulling and receive cancellation strategy allows ThruMapper to isolate individual walls and measure the location of a non-line-of-sight wall hidden behind another wall and office clutter to within a 50-centimetre RMS error.
基于视觉和激光雷达的同步定位和测绘(SLAM)技术可以轻松构建室内建筑平面图,但需要对建筑物的每个房间都有视线。我们正在开发一种基于无线电微波的系统,用于使用SLAM技术构建室内平面图,但不要求绘图机器人可以访问建筑物中的每个房间。我们的系统使用多个天线来引导无线电能量穿过特定方向的墙壁,并联合时间和到达角估计技术来估计它们从建筑物墙壁返回的反向散射。宽带宽(120mhz)传输结合迭代发射零和接收抵消策略,使ThruMapper能够隔离单个墙壁,并测量隐藏在另一面墙和办公室杂波后面的非视线墙壁的位置,RMS误差在50厘米以内。
{"title":"ThruMapper: Through-Wall Building Tomography with a Single Mapping Robot","authors":"Bo Tan, K. Chetty, K. Jamieson","doi":"10.1145/3032970.3032973","DOIUrl":"https://doi.org/10.1145/3032970.3032973","url":null,"abstract":"Vision- and LIDAR-based Simultaneous Localization and Mapping (SLAM) techniques can build indoor building floorplans with ease, but require line-of-sight into every room of a building. We are developing a radio microwave-based system for building indoor floor plans using SLAM techniques, but without the requirement that the mapping robot has access to every room in the building. Our system uses multiple antennas to direct radio energy through walls in particular directions, and joint time- and angle-of-arrival estimation techniques to estimate their backscatter returns from the walls of the building. Wide bandwidth (120 MHz) transmissions combined with an iterative transmit nulling and receive cancellation strategy allows ThruMapper to isolate individual walls and measure the location of a non-line-of-sight wall hidden behind another wall and office clutter to within a 50-centimetre RMS error.","PeriodicalId":309322,"journal":{"name":"Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116697092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Blood Count on a Smartphone Microscope: Challenges 智能手机显微镜上的血液计数:挑战
U. Moravapalle, A. Deshpande, Ashish Kapoor, R. Ramjee, Priya Ravi
Low-cost lenses with magnifications of 150-200x are being sold in the market today as accessories for mobile smartphones. Attaching these lenses to a smartphone camera creates low-cost, ultra-portable digital microscopes, with a potential for significant impact on applications in a variety of fields such as healthcare, agriculture, education etc. In this paper, we consider a low-cost do-it-yourself Complete Blood Count (CBC) application using a smartphone microscope. We discuss several unique challenges that come up in implementing this application that include preparing the blood sample, correcting the small field of view and blur of the lens, and automating the cell counting procedure. We present our approach to overcome these challenges and report early promising results on counting red blood cells.
目前市场上出售的低成本镜头放大率为150-200倍,是智能手机的配件。将这些镜头连接到智能手机相机上,就可以创造出低成本、超便携的数字显微镜,对医疗、农业、教育等各个领域的应用都有潜在的重大影响。在本文中,我们考虑了使用智能手机显微镜的低成本diy全血细胞计数(CBC)应用程序。我们讨论了在实现该应用程序时出现的几个独特挑战,包括准备血液样本,纠正镜头的小视野和模糊,以及细胞计数过程的自动化。我们提出了克服这些挑战的方法,并报告了红细胞计数的早期有希望的结果。
{"title":"Blood Count on a Smartphone Microscope: Challenges","authors":"U. Moravapalle, A. Deshpande, Ashish Kapoor, R. Ramjee, Priya Ravi","doi":"10.1145/3032970.3032986","DOIUrl":"https://doi.org/10.1145/3032970.3032986","url":null,"abstract":"Low-cost lenses with magnifications of 150-200x are being sold in the market today as accessories for mobile smartphones. Attaching these lenses to a smartphone camera creates low-cost, ultra-portable digital microscopes, with a potential for significant impact on applications in a variety of fields such as healthcare, agriculture, education etc. In this paper, we consider a low-cost do-it-yourself Complete Blood Count (CBC) application using a smartphone microscope. We discuss several unique challenges that come up in implementing this application that include preparing the blood sample, correcting the small field of view and blur of the lens, and automating the cell counting procedure. We present our approach to overcome these challenges and report early promising results on counting red blood cells.","PeriodicalId":309322,"journal":{"name":"Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127835701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Understanding Sensor Notifications on Mobile Devices 理解移动设备上的传感器通知
Zongheng Ma, S. Mirzamohammadi, A. A. Sani
Mobile devices, such as smartphones and tablets, use notifications to inform their users of events. Some security- and privacy-related events are time-sensitive: the user must be notified immediately. In this paper, we perform a user study with 40 participants to understand the properties of such time-sensitive notifications. We specifically focus on sensor notifications that notify the users when one of the sensitive sensors, such as camera, microphone, or location is being accessed. We show that none of the notification channels available on mobile devices, i.e., LED, vibration, sound, and display, can grab the user's attention in more than 24% of the time. Among them, vibration achieves the best success rates on average. Moreover, our results show that less intrusive channels, e.g., display, can achieve significantly better results if the device's physical context, i.e., ambient light intensity, is considered. Based on our findings, we suggest that display notification is the best option for camera while different vibration patterns are best options for microphone and location sensor.
智能手机和平板电脑等移动设备使用通知来通知用户事件。一些与安全和隐私相关的事件是时间敏感的:必须立即通知用户。在本文中,我们对40名参与者进行了用户研究,以了解这种时间敏感通知的属性。我们特别关注传感器通知,当其中一个敏感传感器(如摄像头、麦克风或位置)被访问时通知用户。我们发现,移动设备上可用的通知渠道,如LED、振动、声音和显示,都不能在超过24%的时间内抓住用户的注意力。其中,振动的平均成功率最高。此外,我们的研究结果表明,如果考虑到设备的物理环境(即环境光强度),那么较少干扰的通道(例如显示)可以获得明显更好的结果。根据我们的研究结果,我们建议显示通知是相机的最佳选择,而不同的振动模式是麦克风和位置传感器的最佳选择。
{"title":"Understanding Sensor Notifications on Mobile Devices","authors":"Zongheng Ma, S. Mirzamohammadi, A. A. Sani","doi":"10.1145/3032970.3032978","DOIUrl":"https://doi.org/10.1145/3032970.3032978","url":null,"abstract":"Mobile devices, such as smartphones and tablets, use notifications to inform their users of events. Some security- and privacy-related events are time-sensitive: the user must be notified immediately. In this paper, we perform a user study with 40 participants to understand the properties of such time-sensitive notifications. We specifically focus on sensor notifications that notify the users when one of the sensitive sensors, such as camera, microphone, or location is being accessed. We show that none of the notification channels available on mobile devices, i.e., LED, vibration, sound, and display, can grab the user's attention in more than 24% of the time. Among them, vibration achieves the best success rates on average. Moreover, our results show that less intrusive channels, e.g., display, can achieve significantly better results if the device's physical context, i.e., ambient light intensity, is considered. Based on our findings, we suggest that display notification is the best option for camera while different vibration patterns are best options for microphone and location sensor.","PeriodicalId":309322,"journal":{"name":"Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126151766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PrIA: A Private Intelligent Assistant 私人智能助理
Shashank Jain, V. Tiwari, A. Balasubramanian, Niranjan Balasubramanian, Supriyo Chakraborty
Personalized services such as news recommendations are becoming an integral part of our digital lives. The problem is that they extract a steep cost in terms of privacy. The service providers collect and analyze user's personal data to provide the service, but can infer sensitive information about the user in the process. In this work we ask the question "How can we provide personalized news recommendation without sharing sensitive data with the provider?" We propose a local private intelligence assistance framework (PrIA), which collects user data and builds a profile about the user and provides recommendations, all on the user's personal device. It decouples aggregation and personalization: it uses the existing aggregation services on the cloud to obtain candidate articles but makes the personalized recommendations locally. Our proof-of-concept implementation and small scale user study shows the feasibility of a local news recommendation system. In building a private profile, PrIA avoids sharing sensitive information with the cloud-based recommendation service. However, the trade-off is that unlike cloud-based services, PrIA cannot leverage collective knowledge from large number of users. We quantify this trade-off by comparing PrIA with Google's cloud-based recommendation service. We find that the average precision of PrIA's recommendation is only 14% lower than that of Google's service. Rather than choose between privacy or personalization, this result motivates further study of systems that can provide both with acceptable trade-offs.
新闻推荐等个性化服务正在成为我们数字生活中不可或缺的一部分。问题在于,它们在隐私方面付出了高昂的代价。服务提供商收集和分析用户的个人数据以提供服务,但在此过程中可能会推断出用户的敏感信息。在这项工作中,我们提出了这样一个问题:“我们如何在不与提供商共享敏感数据的情况下提供个性化的新闻推荐?”我们提出了一个本地私人情报协助框架(PrIA),它收集用户数据,建立用户档案并提供建议,所有这些都在用户的个人设备上。它将聚合和个性化解耦:它使用云上现有的聚合服务来获取候选文章,但在本地进行个性化推荐。我们的概念验证实现和小规模用户研究表明了本地新闻推荐系统的可行性。在建立私人档案时,PrIA避免与基于云的推荐服务共享敏感信息。然而,与基于云的服务不同的是,PrIA不能利用大量用户的集体知识。我们通过比较PrIA和谷歌基于云的推荐服务来量化这种权衡。我们发现,PrIA推荐的平均精度仅比谷歌的服务低14%。与其在隐私或个性化之间做出选择,这个结果激发了对能够提供两者可接受的折衷的系统的进一步研究。
{"title":"PrIA: A Private Intelligent Assistant","authors":"Shashank Jain, V. Tiwari, A. Balasubramanian, Niranjan Balasubramanian, Supriyo Chakraborty","doi":"10.1145/3032970.3032988","DOIUrl":"https://doi.org/10.1145/3032970.3032988","url":null,"abstract":"Personalized services such as news recommendations are becoming an integral part of our digital lives. The problem is that they extract a steep cost in terms of privacy. The service providers collect and analyze user's personal data to provide the service, but can infer sensitive information about the user in the process. In this work we ask the question \"How can we provide personalized news recommendation without sharing sensitive data with the provider?\" We propose a local private intelligence assistance framework (PrIA), which collects user data and builds a profile about the user and provides recommendations, all on the user's personal device. It decouples aggregation and personalization: it uses the existing aggregation services on the cloud to obtain candidate articles but makes the personalized recommendations locally. Our proof-of-concept implementation and small scale user study shows the feasibility of a local news recommendation system. In building a private profile, PrIA avoids sharing sensitive information with the cloud-based recommendation service. However, the trade-off is that unlike cloud-based services, PrIA cannot leverage collective knowledge from large number of users. We quantify this trade-off by comparing PrIA with Google's cloud-based recommendation service. We find that the average precision of PrIA's recommendation is only 14% lower than that of Google's service. Rather than choose between privacy or personalization, this result motivates further study of systems that can provide both with acceptable trade-offs.","PeriodicalId":309322,"journal":{"name":"Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126985137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Extending Cell Tower Coverage through Drones 通过无人机扩展蜂窝塔的覆盖范围
Ashutosh Dhekne, Mahanth K. Gowda, Romit Roy Choudhury
This paper explores a future in which drones serve as extensions to cellular networks. Equipped with a WiFi interface and a (LTE/5G) backhaul link, we envision a drone to fly in and create a WiFi network in a desired region. Analogous to fire engines, these drones can offer on-demand network service, alleviating unpredictable problems such as sudden traffic hotspots, poor coverage, and natural disasters. While realizing such a vision would need various pieces to come together, we focus on the problem of "drone placement". We ask: when several scattered users demand cellular connectivity in a particular area, where should the drone hover so that the aggregate demands are optimally satisfied? This is essentially a search problem, i.e., the drone needs to determine a 3D location from which its SNR to all the clients is maximized. Given the unknown environmental conditions (such as multipath, wireless shadows, foliage, and absorption), it is not trivial to predict the best hovering location. We explore the possibility of using RF ray tracing as a hint to narrow down the scope of search. Our key idea is to use 3D models from Google Earth to roughly model the terrain of the region, and then simulate how signals would scatter from the drone to various clients. While such simulations offer coarse-grained results, we find that they can still be valuable in broadly guiding the drone in the right direction. Once the drone has narrowed down the 3D search space, it can then physically move to quickly select the best hovering location. Measurement results from a WiFi mounted drone, communicating with 7 clients scattered in the UIUC campus, are encouraging. Our early prototype, DroneNet, reports 44% throughput gain with only 10% measurement overhead compared to a full scan of the entire region.
本文探讨了无人机作为蜂窝网络扩展的未来。配备WiFi接口和(LTE/5G)回程链路,我们设想一架无人机可以在理想区域飞行并创建WiFi网络。类似于消防车,这些无人机可以提供按需网络服务,缓解突发交通热点、覆盖率低和自然灾害等不可预测的问题。虽然实现这样的愿景需要各个部分结合在一起,但我们专注于“无人机放置”的问题。我们的问题是:当几个分散的用户在特定区域要求蜂窝连接时,无人机应该在哪里悬停,以最佳地满足总需求?这本质上是一个搜索问题,也就是说,无人机需要确定一个3D位置,从它到所有客户端的信噪比是最大化的。考虑到未知的环境条件(如多路径、无线阴影、树叶和吸收),预测最佳悬停位置并非易事。我们探索使用射频射线追踪作为提示缩小搜索范围的可能性。我们的关键想法是使用谷歌地球上的3D模型来大致模拟该地区的地形,然后模拟信号如何从无人机散射到不同的客户端。虽然这样的模拟提供了粗粒度的结果,但我们发现它们仍然可以在正确的方向上广泛地指导无人机。一旦无人机缩小了3D搜索范围,它就可以进行物理移动,快速选择最佳悬停位置。一架安装了WiFi的无人机与分布在UIUC校园内的7个客户端进行了通信,其测量结果令人鼓舞。我们的早期原型DroneNet报告说,与对整个区域进行全面扫描相比,只需要10%的测量开销,就可以获得44%的吞吐量提升。
{"title":"Extending Cell Tower Coverage through Drones","authors":"Ashutosh Dhekne, Mahanth K. Gowda, Romit Roy Choudhury","doi":"10.1145/3032970.3032984","DOIUrl":"https://doi.org/10.1145/3032970.3032984","url":null,"abstract":"This paper explores a future in which drones serve as extensions to cellular networks. Equipped with a WiFi interface and a (LTE/5G) backhaul link, we envision a drone to fly in and create a WiFi network in a desired region. Analogous to fire engines, these drones can offer on-demand network service, alleviating unpredictable problems such as sudden traffic hotspots, poor coverage, and natural disasters. While realizing such a vision would need various pieces to come together, we focus on the problem of \"drone placement\". We ask: when several scattered users demand cellular connectivity in a particular area, where should the drone hover so that the aggregate demands are optimally satisfied? This is essentially a search problem, i.e., the drone needs to determine a 3D location from which its SNR to all the clients is maximized. Given the unknown environmental conditions (such as multipath, wireless shadows, foliage, and absorption), it is not trivial to predict the best hovering location. We explore the possibility of using RF ray tracing as a hint to narrow down the scope of search. Our key idea is to use 3D models from Google Earth to roughly model the terrain of the region, and then simulate how signals would scatter from the drone to various clients. While such simulations offer coarse-grained results, we find that they can still be valuable in broadly guiding the drone in the right direction. Once the drone has narrowed down the 3D search space, it can then physically move to quickly select the best hovering location. Measurement results from a WiFi mounted drone, communicating with 7 clients scattered in the UIUC campus, are encouraging. Our early prototype, DroneNet, reports 44% throughput gain with only 10% measurement overhead compared to a full scan of the entire region.","PeriodicalId":309322,"journal":{"name":"Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115791743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Session details: Reimagining Virtual Reality 会议细节:重新想象虚拟现实
David Chu
{"title":"Session details: Reimagining Virtual Reality","authors":"David Chu","doi":"10.1145/3257164","DOIUrl":"https://doi.org/10.1145/3257164","url":null,"abstract":"","PeriodicalId":309322,"journal":{"name":"Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133496281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Practical GPS Location Spoofing Attack in Road Navigation Scenario 一种实用的道路导航GPS位置欺骗攻击
K. Zeng, Yuanchao Shu, Shinan Liu, Yanzhi Dou, Yaling Yang
High value of GPS location information and easy availability of portable GPS signal spoofing devices incentivize attackers to launch GPS spoofing attacks against location-based applications. In this paper, we propose an attack model in road navigation scenario, and develop a complete framework to analyze, simulate and evaluate the spoofing attacks under practical constraints. To launch an attack, the framework first constructs a road network, and then searches for an attack route that smoothly diverts a victim without his awareness. In extensive data-driven simulations in College Point, New York City, we managed to navigate a victim to locations 1km away from his original destination.
GPS位置信息的高价值和便携式GPS信号欺骗设备的易获得性激励了攻击者对基于位置的应用程序发动GPS欺骗攻击。在本文中,我们提出了一种道路导航场景下的攻击模型,并开发了一个完整的框架来分析、模拟和评估实际约束下的欺骗攻击。为了发动攻击,该框架首先构建一个路网,然后寻找一条攻击路线,使受害者在没有意识到的情况下顺利转移。在纽约市大学角进行的大规模数据驱动模拟中,我们成功地将一名受害者定位到距离其原定目的地一公里的地方。
{"title":"A Practical GPS Location Spoofing Attack in Road Navigation Scenario","authors":"K. Zeng, Yuanchao Shu, Shinan Liu, Yanzhi Dou, Yaling Yang","doi":"10.1145/3032970.3032983","DOIUrl":"https://doi.org/10.1145/3032970.3032983","url":null,"abstract":"High value of GPS location information and easy availability of portable GPS signal spoofing devices incentivize attackers to launch GPS spoofing attacks against location-based applications. In this paper, we propose an attack model in road navigation scenario, and develop a complete framework to analyze, simulate and evaluate the spoofing attacks under practical constraints. To launch an attack, the framework first constructs a road network, and then searches for an attack route that smoothly diverts a victim without his awareness. In extensive data-driven simulations in College Point, New York City, we managed to navigate a victim to locations 1km away from his original destination.","PeriodicalId":309322,"journal":{"name":"Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116120508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
Augmented Vehicular Reality: Enabling Extended Vision for Future Vehicles 增强车辆现实:为未来车辆提供扩展视野
Hang Qiu, Fawad Ahmad, R. Govindan, M. Gruteser, F. Bai, Gorkem Kar
Like today's autonomous vehicle prototypes, vehicles in the future will have rich sensors to map and identify objects in the environment. For example, many autonomous vehicle prototypes today come with line-of-sight depth perception sensors like 3D cameras. These cameras are used for improving vehicular safety in autonomous driving, but have fundamentally limited visibility due to occlusions, sensing range, and extreme weather and lighting conditions. To improve visibility and performance, not just for autonomous vehicles but for other Advanced Driving Assistance Systems (ADAS), we explore a capability called Augmented Vehicular Reality (AVR). AVR broadens the vehicle's visual horizon by enabling it to share visual information with other nearby vehicles, but requires careful techniques to align coordinate frames of reference, and to detect dynamic objects. Preliminary evaluations hint at the feasibility of AVR and also highlight research challenges in achieving AVR's potential to improve autonomous vehicles and ADAS.
就像今天的自动驾驶汽车原型一样,未来的汽车将拥有丰富的传感器来绘制和识别环境中的物体。例如,如今许多自动驾驶汽车原型都配备了3D摄像头等视线深度感知传感器。这些摄像头用于提高自动驾驶车辆的安全性,但由于遮挡、传感范围、极端天气和光照条件,从根本上限制了能见度。为了提高自动驾驶汽车以及其他高级驾驶辅助系统(ADAS)的可视性和性能,我们探索了一种名为增强车辆现实(AVR)的功能。AVR通过与附近其他车辆共享视觉信息,扩大了车辆的视野,但需要谨慎的技术来调整参考坐标系,并检测动态物体。初步评估暗示了AVR的可行性,同时也强调了实现AVR改善自动驾驶汽车和ADAS的潜力所面临的研究挑战。
{"title":"Augmented Vehicular Reality: Enabling Extended Vision for Future Vehicles","authors":"Hang Qiu, Fawad Ahmad, R. Govindan, M. Gruteser, F. Bai, Gorkem Kar","doi":"10.1145/3032970.3032976","DOIUrl":"https://doi.org/10.1145/3032970.3032976","url":null,"abstract":"Like today's autonomous vehicle prototypes, vehicles in the future will have rich sensors to map and identify objects in the environment. For example, many autonomous vehicle prototypes today come with line-of-sight depth perception sensors like 3D cameras. These cameras are used for improving vehicular safety in autonomous driving, but have fundamentally limited visibility due to occlusions, sensing range, and extreme weather and lighting conditions. To improve visibility and performance, not just for autonomous vehicles but for other Advanced Driving Assistance Systems (ADAS), we explore a capability called Augmented Vehicular Reality (AVR). AVR broadens the vehicle's visual horizon by enabling it to share visual information with other nearby vehicles, but requires careful techniques to align coordinate frames of reference, and to detect dynamic objects. Preliminary evaluations hint at the feasibility of AVR and also highlight research challenges in achieving AVR's potential to improve autonomous vehicles and ADAS.","PeriodicalId":309322,"journal":{"name":"Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications","volume":"59 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114022494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Convoy: Physical Context Verification for Vehicle Platoon Admission 车队:车辆排入场的物理背景验证
Jun Han, M. Harishankar, Xiao Wang, Albert Jin Chung, P. Tague
Truck platooning is emerging as a promising solution with many economic incentives. However, securely admitting a new vehicle into a platoon is an extremely important yet difficult task. There is no adequate method today for verifying physical arrangements of vehicles within a platoon formation. Specifically, we address the problem of a platoon ghost attack wherein an attacker spoofs presence within a platoon to gain admission and subsequently execute malicious attacks. To address such concerns, we present Convoy, a novel autonomous platoon admission scheme which binds the vehicles' digital certificates to their physical context (i.e., locality). Convoy exploits the findings that vehicles traveling together experience similar context to prove to each other over time that they are co-present. Specifically, they experience similar road (e.g., bumps and cracks) and traffic (e.g., acceleration and steering) conditions. Our approach is based on the ability for vehicles to capture this context, generate fingerprints to establish shared keys, and later bind these symmetric keys to their public keys. We design and implement the Convoy protocol and evaluate it with real-world driving data. Our implementation demonstrates that vehicles traveling in adjacent lanes can be sufficiently distinguished by their context and this can be utilized to thwart platoon ghost attacks and similar misbehavior.
卡车车队正在成为一个有前景的解决方案,有许多经济激励措施。然而,让一辆新车安全地进入车队是一项极其重要但又困难的任务。目前还没有足够的方法来验证排队内车辆的物理安排。具体来说,我们解决了排鬼攻击的问题,其中攻击者在排中欺骗存在以获得许可并随后执行恶意攻击。为了解决这些问题,我们提出了Convoy,这是一种新颖的自主车队准入方案,它将车辆的数字证书与其物理环境(即位置)绑定在一起。车队利用了这样的发现:车辆在一起行驶时,会经历相似的环境,随着时间的推移,它们会向彼此证明它们是共同存在的。具体来说,它们经历了类似的道路(例如,颠簸和裂缝)和交通(例如,加速和转向)条件。我们的方法是基于车辆捕获此上下文的能力,生成指纹以建立共享密钥,然后将这些对称密钥绑定到它们的公钥。我们设计并实现了护航协议,并用实际驾驶数据对其进行了评估。我们的实现表明,在相邻车道上行驶的车辆可以根据它们的环境充分区分,这可以用来阻止排鬼攻击和类似的不当行为。
{"title":"Convoy: Physical Context Verification for Vehicle Platoon Admission","authors":"Jun Han, M. Harishankar, Xiao Wang, Albert Jin Chung, P. Tague","doi":"10.1145/3032970.3032987","DOIUrl":"https://doi.org/10.1145/3032970.3032987","url":null,"abstract":"Truck platooning is emerging as a promising solution with many economic incentives. However, securely admitting a new vehicle into a platoon is an extremely important yet difficult task. There is no adequate method today for verifying physical arrangements of vehicles within a platoon formation. Specifically, we address the problem of a platoon ghost attack wherein an attacker spoofs presence within a platoon to gain admission and subsequently execute malicious attacks. To address such concerns, we present Convoy, a novel autonomous platoon admission scheme which binds the vehicles' digital certificates to their physical context (i.e., locality). Convoy exploits the findings that vehicles traveling together experience similar context to prove to each other over time that they are co-present. Specifically, they experience similar road (e.g., bumps and cracks) and traffic (e.g., acceleration and steering) conditions. Our approach is based on the ability for vehicles to capture this context, generate fingerprints to establish shared keys, and later bind these symmetric keys to their public keys. We design and implement the Convoy protocol and evaluate it with real-world driving data. Our implementation demonstrates that vehicles traveling in adjacent lanes can be sufficiently distinguished by their context and this can be utilized to thwart platoon ghost attacks and similar misbehavior.","PeriodicalId":309322,"journal":{"name":"Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131864881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
期刊
Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1