Pub Date : 2022-06-30DOI: 10.1109/ISCC55528.2022.9912865
J. Galán-Jiménez, Alejandro González Vegas, J. Berrocal
The Internet is the most powerful engine for social and economic growth, and it needs to be accessible to everybody. However, the possibilities for people living in rural areas to use digital services through broadband access are reduced compared to the inhabitants of urban zones. In this paper, digital services are brought closer to people living in rural areas where there is lack of Internet connectivity by means of an Unmanned Aerial Vehicle (UAV) based network. Decomposing loT applications into microservices and deploying them into UAV s allow to reduce their latency and hence to improve the associated quality of service, which is strict for this type of applications. Simulation results show the effectiveness of the proposed solution, comparing the latency experienced by the applications in case there is lack of Internet connectivity with the situation in which one of the UAV s is able to reach a ground base station.
{"title":"Reduction of latency of microservice based loT applications in rural areas with lack of connectivity using UAV-based networks","authors":"J. Galán-Jiménez, Alejandro González Vegas, J. Berrocal","doi":"10.1109/ISCC55528.2022.9912865","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912865","url":null,"abstract":"The Internet is the most powerful engine for social and economic growth, and it needs to be accessible to everybody. However, the possibilities for people living in rural areas to use digital services through broadband access are reduced compared to the inhabitants of urban zones. In this paper, digital services are brought closer to people living in rural areas where there is lack of Internet connectivity by means of an Unmanned Aerial Vehicle (UAV) based network. Decomposing loT applications into microservices and deploying them into UAV s allow to reduce their latency and hence to improve the associated quality of service, which is strict for this type of applications. Simulation results show the effectiveness of the proposed solution, comparing the latency experienced by the applications in case there is lack of Internet connectivity with the situation in which one of the UAV s is able to reach a ground base station.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114945155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-30DOI: 10.1109/ISCC55528.2022.9912814
Marios Adam Sirgiannis, C. Manifavas, I. Papaefstathiou
Cryptography is used to protect the confidentiality, integrity, and authenticity of information by preventing unauthorized users from accessing or modifying them. Encryption techniques are used to protect personal or company data. This work demonstrates practical scenarios where, under certain conditions, encryption may be bypassed. Bypassing encryption, either by recovering the encryption key, a password used to generate the encryption key, or a plaintext copy of the encrypted data, allows for accessing data which appear to be inaccessible in the first place. There are six categories for bypassing encryption: find the key, guess the key, compel the key, exploit a flaw in the encryption scheme, access unencrypted message when the device is in use and locate an unencrypted copy of the message. In this study we utilize publicly available software to demonstrate real-world scenarios that fall into most of the aforementioned categories and show how, in those specific cases, encryption may be successfully bypassed. Moreover, we underline that bypassing encryption is possible only when certain conditions are met (e.g., software misconfiguration, physical access to the target device, etc.) and we highlight each one of them so as to effectively suggest countermeasures to the demonstrated techniques for encryption bypassing. The main aim of this paper is to highlight how encryption can be bypassed and thus make citizens set up their system in such a way that it would be more difficult to be hacked. This is especially important for citizens that may have limited knowledge/exposure to technology as they can be, for example. people from certain diversity groups such as elderly and/or people of very low income.
{"title":"Making Citizens' systems more Secure: Practical Encryption Bypassing and Countermeasures","authors":"Marios Adam Sirgiannis, C. Manifavas, I. Papaefstathiou","doi":"10.1109/ISCC55528.2022.9912814","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912814","url":null,"abstract":"Cryptography is used to protect the confidentiality, integrity, and authenticity of information by preventing unauthorized users from accessing or modifying them. Encryption techniques are used to protect personal or company data. This work demonstrates practical scenarios where, under certain conditions, encryption may be bypassed. Bypassing encryption, either by recovering the encryption key, a password used to generate the encryption key, or a plaintext copy of the encrypted data, allows for accessing data which appear to be inaccessible in the first place. There are six categories for bypassing encryption: find the key, guess the key, compel the key, exploit a flaw in the encryption scheme, access unencrypted message when the device is in use and locate an unencrypted copy of the message. In this study we utilize publicly available software to demonstrate real-world scenarios that fall into most of the aforementioned categories and show how, in those specific cases, encryption may be successfully bypassed. Moreover, we underline that bypassing encryption is possible only when certain conditions are met (e.g., software misconfiguration, physical access to the target device, etc.) and we highlight each one of them so as to effectively suggest countermeasures to the demonstrated techniques for encryption bypassing. The main aim of this paper is to highlight how encryption can be bypassed and thus make citizens set up their system in such a way that it would be more difficult to be hacked. This is especially important for citizens that may have limited knowledge/exposure to technology as they can be, for example. people from certain diversity groups such as elderly and/or people of very low income.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125210606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-30DOI: 10.1109/ISCC55528.2022.9912993
Junjun Si, Zejiang Chen, Bo Tu, Shuaifu Dai, Xiangqun Chen
Mobile positioning plays an essential role in smart city services. This paper proposes a fingerprint positioning framework based on massive Minimization of Drive Test (MDT) data to provide accurate and efficient city-scale positioning without additional equipment and measures. First, a multi-level fingerprint construction method is proposed using the Timing Advance (TA), Reference Signal Receiving Power (RSRP), and Reference Signal Receiving Quality (RSRQ) of the serving cell and neighboring cell. Then, an adaptive online fingerprint matching method is employed to extract and match online data fingerprints. Experiments show that the median positioning error is 29.97 meters with city-scale MDT data. It outperforms the reported accuracy of the state-of-the-art fingerprint positioning method.
{"title":"City-Scale Fingerprint Positioning Framework based on MDT Data","authors":"Junjun Si, Zejiang Chen, Bo Tu, Shuaifu Dai, Xiangqun Chen","doi":"10.1109/ISCC55528.2022.9912993","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912993","url":null,"abstract":"Mobile positioning plays an essential role in smart city services. This paper proposes a fingerprint positioning framework based on massive Minimization of Drive Test (MDT) data to provide accurate and efficient city-scale positioning without additional equipment and measures. First, a multi-level fingerprint construction method is proposed using the Timing Advance (TA), Reference Signal Receiving Power (RSRP), and Reference Signal Receiving Quality (RSRQ) of the serving cell and neighboring cell. Then, an adaptive online fingerprint matching method is employed to extract and match online data fingerprints. Experiments show that the median positioning error is 29.97 meters with city-scale MDT data. It outperforms the reported accuracy of the state-of-the-art fingerprint positioning method.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125592913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-30DOI: 10.1109/ISCC55528.2022.9912803
E. Stathopoulos, A. Shvets, Roberto Carlini, S. Diplaris, S. Vrochidis, L. Wanner, I. Kompatsiaris
Social media and web sites provide an access to pub-lic opinions on certain aspects and therefore play an important role in getting insights on targeted audiences. Designers have been investigating how to use them for grasping social feelings and needs associated with the arrangement of spaces that surround people in everyday life to find inspiration and come up with ideas for adaptive designs. Following this, we propose a novel design-oriented tool-set that retrieves and analyses online public information from Twitter and focused content from relevant web sites. We present the data collection pipeline and multilingual analysis algorithms like concept extraction and sentiment analysis on interior and urban design. Finally, we showcase an application of the proposed tool-set within two case studies.
{"title":"Social Media and Web Sensing on Interior and Urban Design","authors":"E. Stathopoulos, A. Shvets, Roberto Carlini, S. Diplaris, S. Vrochidis, L. Wanner, I. Kompatsiaris","doi":"10.1109/ISCC55528.2022.9912803","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912803","url":null,"abstract":"Social media and web sites provide an access to pub-lic opinions on certain aspects and therefore play an important role in getting insights on targeted audiences. Designers have been investigating how to use them for grasping social feelings and needs associated with the arrangement of spaces that surround people in everyday life to find inspiration and come up with ideas for adaptive designs. Following this, we propose a novel design-oriented tool-set that retrieves and analyses online public information from Twitter and focused content from relevant web sites. We present the data collection pipeline and multilingual analysis algorithms like concept extraction and sentiment analysis on interior and urban design. Finally, we showcase an application of the proposed tool-set within two case studies.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125662251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-30DOI: 10.1109/ISCC55528.2022.9912899
Alaa A. Algamal, A. El-Malek, H. Shalaby
In the recent decades, free-space optical (FSO) communication technology has gained significant importance owing to its promising unique features: high user capacity, license-free spectrum, ease and quick deploy-ability. However, the performance of FSO communication systems depends on the uncontrollable terrestrial atmospheric effects. The second main challenge is that the FSO system performance degrades as a line-of-Sight (LoS) technology due to the misalignment transmitter and receiver. The third challenge is the consideration of time value of money, which is central to most engineering economic analyses in employing communication systems. The opportunity cost of making one choice over another must also be considered. This paper presents a proposed FSO system design model for mitigating the three performance challenges we mentioned. The results show an enhancement by 83.34% in system efficiency in case of moderate scintillation (using gamma-gamma model). This proposed hybrid model is proved to be applicable to any atmospheric channel conditions.
{"title":"Reliable Free-Space Optical Communication System Performance for Matching Multi-level Customer Needs: Using Hybrid Modulation System with Deep Reinforcement Learning","authors":"Alaa A. Algamal, A. El-Malek, H. Shalaby","doi":"10.1109/ISCC55528.2022.9912899","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912899","url":null,"abstract":"In the recent decades, free-space optical (FSO) communication technology has gained significant importance owing to its promising unique features: high user capacity, license-free spectrum, ease and quick deploy-ability. However, the performance of FSO communication systems depends on the uncontrollable terrestrial atmospheric effects. The second main challenge is that the FSO system performance degrades as a line-of-Sight (LoS) technology due to the misalignment transmitter and receiver. The third challenge is the consideration of time value of money, which is central to most engineering economic analyses in employing communication systems. The opportunity cost of making one choice over another must also be considered. This paper presents a proposed FSO system design model for mitigating the three performance challenges we mentioned. The results show an enhancement by 83.34% in system efficiency in case of moderate scintillation (using gamma-gamma model). This proposed hybrid model is proved to be applicable to any atmospheric channel conditions.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128566916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-30DOI: 10.1109/ISCC55528.2022.9912954
Hao Hong, Fan-Hsun Tseng
The Intelligent Reflecting Surface (IRS) is an emerging technology in mobile communication networks. It is regarded as a potential solution for the path fading problem and obstacle issue while using millimeter wave communications. Most existing researches focus on deploying few IRSs within the coverage of a macrocell. In the paper, the deployment problem of multiple macro cells and IRSs is considered. The Macrocell-first and IRS-first algorithms are proposed, and the Ring-based algorithm is further proposed to achieve the highest average utility rate of all served users. It divides a macrocell's coverage into $K$ rings, and deploys IRSs from outer ring to inner ring. Simulation-based results showed that the proposed Ring-based algorithm is superior to the Macrocell-first and IRS-first algorithms in terms of higher average utility rate with slightly fewer number of served users.
{"title":"Ring-based Intelligent Reflecting Surface Placement for 5G and Beyond","authors":"Hao Hong, Fan-Hsun Tseng","doi":"10.1109/ISCC55528.2022.9912954","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912954","url":null,"abstract":"The Intelligent Reflecting Surface (IRS) is an emerging technology in mobile communication networks. It is regarded as a potential solution for the path fading problem and obstacle issue while using millimeter wave communications. Most existing researches focus on deploying few IRSs within the coverage of a macrocell. In the paper, the deployment problem of multiple macro cells and IRSs is considered. The Macrocell-first and IRS-first algorithms are proposed, and the Ring-based algorithm is further proposed to achieve the highest average utility rate of all served users. It divides a macrocell's coverage into $K$ rings, and deploys IRSs from outer ring to inner ring. Simulation-based results showed that the proposed Ring-based algorithm is superior to the Macrocell-first and IRS-first algorithms in terms of higher average utility rate with slightly fewer number of served users.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130907622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-30DOI: 10.1109/ISCC55528.2022.9912985
Pengcheng Liu, Zhen Han, Zhixin Shi, Meimei Li, Meichen Liu
Frequency hopping (FH) technology is one of the most effective technologies in the field of radio countermeasures, meanwhile, the recognition of FH signal has become a research hotspot. FH signal is a typical non-stationary signal whose frequency varies nonlinearly with time and the time-frequency analysis technique provides a very effective method for processing this kind of signal. With the renaissance of deep learning, methods based on time-frequency analysis and deep learning are widely studied. Although these methods have achieved good results, the recognition accuracy still needs to be improved. Through the observation of the datasets, we found that there are still difficult samples that are difficult to identify. Through further analysis, we propose a horizontal spatial attention (HSA) block, which can generate spatial weight vector according to the signal distribution, and then readjust the feature map. The HSA block is a plug-and-play module that can be integrated into common convolutional neural network (CNN) to further improve their performance and these networks with HSA block are collectively called HANets. The HSA block also has the advantages of high recognition accuracy (especially under low SNRs), easy to implant, and almost no influence on the number of parameters. We verified our method on two datasets and a series of comparative experiments show that the proposed method achieves good results on FH datasets.
{"title":"Frequency Hopping Signal Recognition Based on Horizontal Spatial Attention","authors":"Pengcheng Liu, Zhen Han, Zhixin Shi, Meimei Li, Meichen Liu","doi":"10.1109/ISCC55528.2022.9912985","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912985","url":null,"abstract":"Frequency hopping (FH) technology is one of the most effective technologies in the field of radio countermeasures, meanwhile, the recognition of FH signal has become a research hotspot. FH signal is a typical non-stationary signal whose frequency varies nonlinearly with time and the time-frequency analysis technique provides a very effective method for processing this kind of signal. With the renaissance of deep learning, methods based on time-frequency analysis and deep learning are widely studied. Although these methods have achieved good results, the recognition accuracy still needs to be improved. Through the observation of the datasets, we found that there are still difficult samples that are difficult to identify. Through further analysis, we propose a horizontal spatial attention (HSA) block, which can generate spatial weight vector according to the signal distribution, and then readjust the feature map. The HSA block is a plug-and-play module that can be integrated into common convolutional neural network (CNN) to further improve their performance and these networks with HSA block are collectively called HANets. The HSA block also has the advantages of high recognition accuracy (especially under low SNRs), easy to implant, and almost no influence on the number of parameters. We verified our method on two datasets and a series of comparative experiments show that the proposed method achieves good results on FH datasets.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122026864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-30DOI: 10.1109/ISCC55528.2022.9912997
Margarida Silva, André Mourato, G. Marques, S. Sargento, A. Reis
The usage of aerial drones has become more popular as they also become more accessible, both in economic and usability terms. Nowadays, these vehicles can present reduced dimensions and a good cost-benefit ratio, which makes it possible for several services and applications supported by aerial drone networks to emerge. Taking into account the enormous diversity of use cases, many of the existing solutions for autonomous control focus on specific scenarios. Generic mission planning platforms also exist, but most of them only allow missions consisting of linear waypoints to be traversed. These situations translate into a mission support that is not very flexible. This paper proposes a modular infrastructure that can be used in various scenarios, enabling the autonomous control and monitoring of a fleet of aerial drones in a mission context. The platform allows the communication with the flight controller so that it can collect telemetry data and send movement instructions to the drone, and to monitor this data and send the commands remotely, also enabling robust mission planning with multiple drones, and enabling the interaction with internal and external sensors. The real tests performed through the platform show that the planned missions are executed exactly as they are planned in the platform.
{"title":"A Platform for Autonomous Swarms of UAVs","authors":"Margarida Silva, André Mourato, G. Marques, S. Sargento, A. Reis","doi":"10.1109/ISCC55528.2022.9912997","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912997","url":null,"abstract":"The usage of aerial drones has become more popular as they also become more accessible, both in economic and usability terms. Nowadays, these vehicles can present reduced dimensions and a good cost-benefit ratio, which makes it possible for several services and applications supported by aerial drone networks to emerge. Taking into account the enormous diversity of use cases, many of the existing solutions for autonomous control focus on specific scenarios. Generic mission planning platforms also exist, but most of them only allow missions consisting of linear waypoints to be traversed. These situations translate into a mission support that is not very flexible. This paper proposes a modular infrastructure that can be used in various scenarios, enabling the autonomous control and monitoring of a fleet of aerial drones in a mission context. The platform allows the communication with the flight controller so that it can collect telemetry data and send movement instructions to the drone, and to monitor this data and send the commands remotely, also enabling robust mission planning with multiple drones, and enabling the interaction with internal and external sensors. The real tests performed through the platform show that the planned missions are executed exactly as they are planned in the platform.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127841140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a physical authentication scheme based on the full channel information (FCI) in dual-polarized antenna communication systems. Different from channel impulse response (CIR) and channel frequency response (CFR), which only characterize the spatial fading of the channel, FCI reflects the spatial fading and polarization fading of channel, and completely characterizes the channel. Specifically, we use the least square (LS) to estimate channel spatial fading and polarization fading separately. Then based on statistical signal processing and binary hypothesis model, we establish an authen-tication scheme based on FCI and theoretically deduce the false alarm probability, detection probability, and optimal threshold of the proposed scheme. Besides, we conduct numerous simulation analysis on the proposed scheme. The simulation results show that the proposed scheme has higher authentication accuracy than that of CFR based schemes, especially in the case of low SNR.
{"title":"Physical Layer Authentication Based on Full Channel Information under Dual-polarized Antenna Communication Systems","authors":"Yuemei Wu, Dong Wei, Jing Li, Weiqing Huang, Xiang Meng","doi":"10.1109/ISCC55528.2022.9912912","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912912","url":null,"abstract":"In this paper, we propose a physical authentication scheme based on the full channel information (FCI) in dual-polarized antenna communication systems. Different from channel impulse response (CIR) and channel frequency response (CFR), which only characterize the spatial fading of the channel, FCI reflects the spatial fading and polarization fading of channel, and completely characterizes the channel. Specifically, we use the least square (LS) to estimate channel spatial fading and polarization fading separately. Then based on statistical signal processing and binary hypothesis model, we establish an authen-tication scheme based on FCI and theoretically deduce the false alarm probability, detection probability, and optimal threshold of the proposed scheme. Besides, we conduct numerous simulation analysis on the proposed scheme. The simulation results show that the proposed scheme has higher authentication accuracy than that of CFR based schemes, especially in the case of low SNR.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132663380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-30DOI: 10.1109/ISCC55528.2022.9912935
Guangjun Wu, Bing-lian Zhu, Jun Li
In recent years, electronic medical records(EMRs) sharing has played a vital role in formulating optimized treatment plans, providing data sets for researchers, and accelerating the development of biomedical science. However, This unprecedented era of technological confluence poses significant data security and privacy challenges. To solve these problems, we propose a blockchain-based multi-keyword search scheme for medical data sharing called BMKS, focusing on ensuring medical data confidentiality and realizing secure data retrieval. In BMKS, we introduce a two-level search scheme to achieve efficient and verifiable keyword searches. The introduction of the improved Bloom filter significantly improves query efficiency. In addition, we take advantage of blockchain technology to realize ciphertext search and pre-decryption, which reduces user's decryption overhead. Moreover, blockchain's transparency and tamper-preventing characteristics help record the access control process in a traceable and auditable way. The performance evaluation and security analysis show that BMKS is comprehensively safe, efficient, and practical.
{"title":"BMKS: A Blockchain Based Multi-Keyword Search Scheme for Medical Data Sharing","authors":"Guangjun Wu, Bing-lian Zhu, Jun Li","doi":"10.1109/ISCC55528.2022.9912935","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912935","url":null,"abstract":"In recent years, electronic medical records(EMRs) sharing has played a vital role in formulating optimized treatment plans, providing data sets for researchers, and accelerating the development of biomedical science. However, This unprecedented era of technological confluence poses significant data security and privacy challenges. To solve these problems, we propose a blockchain-based multi-keyword search scheme for medical data sharing called BMKS, focusing on ensuring medical data confidentiality and realizing secure data retrieval. In BMKS, we introduce a two-level search scheme to achieve efficient and verifiable keyword searches. The introduction of the improved Bloom filter significantly improves query efficiency. In addition, we take advantage of blockchain technology to realize ciphertext search and pre-decryption, which reduces user's decryption overhead. Moreover, blockchain's transparency and tamper-preventing characteristics help record the access control process in a traceable and auditable way. The performance evaluation and security analysis show that BMKS is comprehensively safe, efficient, and practical.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132885821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}