首页 > 最新文献

2020 IEEE 18th International Conference on Embedded and Ubiquitous Computing (EUC)最新文献

英文 中文
Trusted Video Streams in Camera Sensor Networks 摄像机传感器网络中的可信视频流
Pub Date : 2020-12-01 DOI: 10.1109/EUC50751.2020.00010
Sven-Jannik Wöhnert, Kai Hendrik Wöhnert, Eldar Almamedov, V. Skwarek
Proof of integrity in produced video data by surveillance cameras requires active forensic methods such as signatures, otherwise authenticity and integrity can be comprised and data becomes unusable e. g. for legal evidence. But a simple file- or stream-signature loses its validity when the stream is cut in parts or by separating data and signature. Using the principles of security in distributed systems similar to those of blockchain and distributed ledger technologies (BC/DLT), a chain which consists of the frames of a video which frame hash values will be distributed among a camera sensor network is presented. The backbone of this Framechain within the camera sensor network will be a camera identity concept to ensure accountability, integrity and authenticity according to the extended CIA triad security concept. Modularity by secure sequences, autarky in proof and robustness against natural modulation of data are the key parameters of this new approach. It allows the standalone data and even parts of it to be used as hard evidence.
监控摄像机制作的视频数据的完整性证明需要积极的法医方法,如签名,否则真实性和完整性可能会被破坏,数据将无法使用,例如作为法律证据。但是一个简单的文件或流签名在流被分割或数据和签名分离时就失去了有效性。利用类似于区块链和分布式账本技术(BC/DLT)的分布式系统中的安全原理,提出了一个由视频帧组成的链,其中帧哈希值将在摄像机传感器网络中分布。摄像头传感器网络框架链的骨干将是一个摄像头身份概念,以确保根据扩展的CIA三合会安全概念的问责性、完整性和真实性。安全序列的模块化、证明的自依赖性和对数据自然调制的鲁棒性是这种新方法的关键参数。它允许独立的数据甚至部分数据被用作确凿的证据。
{"title":"Trusted Video Streams in Camera Sensor Networks","authors":"Sven-Jannik Wöhnert, Kai Hendrik Wöhnert, Eldar Almamedov, V. Skwarek","doi":"10.1109/EUC50751.2020.00010","DOIUrl":"https://doi.org/10.1109/EUC50751.2020.00010","url":null,"abstract":"Proof of integrity in produced video data by surveillance cameras requires active forensic methods such as signatures, otherwise authenticity and integrity can be comprised and data becomes unusable e. g. for legal evidence. But a simple file- or stream-signature loses its validity when the stream is cut in parts or by separating data and signature. Using the principles of security in distributed systems similar to those of blockchain and distributed ledger technologies (BC/DLT), a chain which consists of the frames of a video which frame hash values will be distributed among a camera sensor network is presented. The backbone of this Framechain within the camera sensor network will be a camera identity concept to ensure accountability, integrity and authenticity according to the extended CIA triad security concept. Modularity by secure sequences, autarky in proof and robustness against natural modulation of data are the key parameters of this new approach. It allows the standalone data and even parts of it to be used as hard evidence.","PeriodicalId":331605,"journal":{"name":"2020 IEEE 18th International Conference on Embedded and Ubiquitous Computing (EUC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133538622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Difference Analysis Algorithm for Runtime Requirement Degradation under System Functional Fault 系统功能故障下运行时需求退化的高效差分分析算法
Pub Date : 2020-12-01 DOI: 10.1109/EUC50751.2020.00012
Jialong Li, Kazuya Aizawa, K. Tei, S. Honiden
In event-based systems, safety properties are critical requirements to prevent the system from bad things happen. However, safety properties may be violated because of the runtime system functional fault. From the viewpoint of a self-adaptive system, such a system should be requirement-aware and changes its behavior to satisfy the designed requirements as much as possible. The previous work proposed a method to analyze possible adaptation options with degrading different requirements. Here, we propose an efficient difference analysis algorithm to shorten the analysis time so that the adaptation to functional fault can be more timely. Our idea is to reuse the analysis result of development time and re-analyze the changed part only, instead of performing the complete analysis from scratch. We evaluated our algorithm’s efficiency based on three case studies: a coalmine pump-control system, a cyber-physical security people-flow restriction system, and a factory production cell system. The experiment results indicate that our algorithm averagely reduces 75.9% of analysis time compared with the existing analysis technique.
在基于事件的系统中,安全属性是防止系统发生不良事件的关键要求。但是,由于运行时系统功能故障,可能会违反安全属性。从自适应系统的角度来看,这样的系统应该是需求感知的,并改变其行为以尽可能多地满足设计的需求。先前的工作提出了一种方法来分析可能的适应方案,降低不同的需求。本文提出了一种高效的差分分析算法,缩短了分析时间,从而更及时地适应功能故障。我们的想法是重用开发时间的分析结果,只重新分析已更改的部分,而不是从头开始执行完整的分析。我们基于三个案例研究评估了算法的效率:煤矿泵控制系统、网络物理安全人员流动限制系统和工厂生产单元系统。实验结果表明,与现有的分析技术相比,我们的算法平均减少了75.9%的分析时间。
{"title":"Efficient Difference Analysis Algorithm for Runtime Requirement Degradation under System Functional Fault","authors":"Jialong Li, Kazuya Aizawa, K. Tei, S. Honiden","doi":"10.1109/EUC50751.2020.00012","DOIUrl":"https://doi.org/10.1109/EUC50751.2020.00012","url":null,"abstract":"In event-based systems, safety properties are critical requirements to prevent the system from bad things happen. However, safety properties may be violated because of the runtime system functional fault. From the viewpoint of a self-adaptive system, such a system should be requirement-aware and changes its behavior to satisfy the designed requirements as much as possible. The previous work proposed a method to analyze possible adaptation options with degrading different requirements. Here, we propose an efficient difference analysis algorithm to shorten the analysis time so that the adaptation to functional fault can be more timely. Our idea is to reuse the analysis result of development time and re-analyze the changed part only, instead of performing the complete analysis from scratch. We evaluated our algorithm’s efficiency based on three case studies: a coalmine pump-control system, a cyber-physical security people-flow restriction system, and a factory production cell system. The experiment results indicate that our algorithm averagely reduces 75.9% of analysis time compared with the existing analysis technique.","PeriodicalId":331605,"journal":{"name":"2020 IEEE 18th International Conference on Embedded and Ubiquitous Computing (EUC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123171848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 IEEE 18th International Conference on Embedded and Ubiquitous Computing (EUC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1