首页 > 最新文献

2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)最新文献

英文 中文
UAVs Path Deviation Attacks: Survey and Research Challenges 无人机路径偏离攻击:调查和研究挑战
Pub Date : 2020-06-01 DOI: 10.1109/SECONWorkshops50264.2020.9149780
Francesco Betti Sorbelli, M. Conti, M. C. Pinotti, Giulio Rigoni
Recently, Unmanned Aerial Vehicles (UAVs) are employed for a plethora of civilian applications. Such flying vehicles can accomplish tasks under the pilot’s eyesight within the range of a remote controller, or autonomously according to a certain pre-loaded path configuration. Different path deviation attacks can be performed by malicious users against UAVs. We classify such attacks and the relative defenses based on the UAV’s flight mode, i.e., (i) First Person View (FPV), (ii) civilian Global Navigation Satellite System based (GNSS), and (iii) GNSS "plus" auxiliary technologies (GNSS+), and on the multiplicity, i.e., (i) Single UAV, and (ii) Multiple UAVs. We found that very little has been done to secure the FPV flight mode against path deviation. In GNSS mode, spoofing is the most worrisome attack. The best defense against spoofing seems to be redundancy, such as adding vision chips to single UAV or using multiple arranged UAVs. No specific attacks and defenses have been found in literature for GNSS+ or for UAVs moving in group without a pre-ordered arrangement. These aspects require further investigation.
最近,无人驾驶飞行器(uav)被用于大量的民用应用。这种飞行器可以在一个遥控器的范围内,在飞行员的视线范围内完成任务,也可以根据预先加载的路径配置自动完成任务。恶意用户可以对无人机实施不同的路径偏差攻击。我们根据无人机的飞行模式,即(i)第一人称视角(FPV), (ii)民用全球导航卫星系统(GNSS), (iii) GNSS“+”辅助技术(GNSS+),以及多重性,即(i)单架无人机和(ii)多架无人机,对此类攻击和相关防御进行分类。我们发现在确保FPV飞行模式不受路径偏差影响方面做得很少。在GNSS模式下,欺骗是最令人担忧的攻击。防止欺骗的最佳防御似乎是冗余,例如在单个无人机上添加视觉芯片或使用多个排列的无人机。在文献中没有发现GNSS+或无人机在没有预先订购安排的情况下成群移动的具体攻击和防御。这些方面需要进一步调查。
{"title":"UAVs Path Deviation Attacks: Survey and Research Challenges","authors":"Francesco Betti Sorbelli, M. Conti, M. C. Pinotti, Giulio Rigoni","doi":"10.1109/SECONWorkshops50264.2020.9149780","DOIUrl":"https://doi.org/10.1109/SECONWorkshops50264.2020.9149780","url":null,"abstract":"Recently, Unmanned Aerial Vehicles (UAVs) are employed for a plethora of civilian applications. Such flying vehicles can accomplish tasks under the pilot’s eyesight within the range of a remote controller, or autonomously according to a certain pre-loaded path configuration. Different path deviation attacks can be performed by malicious users against UAVs. We classify such attacks and the relative defenses based on the UAV’s flight mode, i.e., (i) First Person View (FPV), (ii) civilian Global Navigation Satellite System based (GNSS), and (iii) GNSS \"plus\" auxiliary technologies (GNSS+), and on the multiplicity, i.e., (i) Single UAV, and (ii) Multiple UAVs. We found that very little has been done to secure the FPV flight mode against path deviation. In GNSS mode, spoofing is the most worrisome attack. The best defense against spoofing seems to be redundancy, such as adding vision chips to single UAV or using multiple arranged UAVs. No specific attacks and defenses have been found in literature for GNSS+ or for UAVs moving in group without a pre-ordered arrangement. These aspects require further investigation.","PeriodicalId":341927,"journal":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115000964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Optimizing the trajectory of drones: trade-off between distance and energy 优化无人机飞行轨迹:距离与能量的权衡
Pub Date : 2020-06-01 DOI: 10.1109/SECONWorkshops50264.2020.9149781
Igor Dias Da Silva, C. Caillouet
The use of autonomous unmanned aerial vehicles (UAVs) or drones has emerged to efficiently collect data from mobile sensors when there is no infrastructure available. The drones can form a flying ad-hoc network through which the sensors can send their data to a base station at any time. In this paper, we present a mixed integer linear program to find the drones’ optimal trajectories to form and maintain this network through time while minimizing their movements and energy consumption. Furthermore we analyze the trade-off between distance and energy, where increasing the drones’ mobility can reduce their energy consumption, and derive a fair trade-off optimal solution to balance the two opposite objectives.
在没有基础设施的情况下,使用自主无人驾驶飞行器(uav)或无人机有效地从移动传感器收集数据已经出现。这些无人机可以形成一个飞行的自组织网络,通过这个网络,传感器可以随时将数据发送到基站。在本文中,我们提出了一个混合整数线性规划,以找到无人机的最佳轨迹,形成并维持这个网络,同时最小化它们的运动和能量消耗。此外,我们分析了距离和能量之间的权衡,其中增加无人机的机动性可以减少它们的能量消耗,并得出了一个公平权衡的最优解来平衡两个相反的目标。
{"title":"Optimizing the trajectory of drones: trade-off between distance and energy","authors":"Igor Dias Da Silva, C. Caillouet","doi":"10.1109/SECONWorkshops50264.2020.9149781","DOIUrl":"https://doi.org/10.1109/SECONWorkshops50264.2020.9149781","url":null,"abstract":"The use of autonomous unmanned aerial vehicles (UAVs) or drones has emerged to efficiently collect data from mobile sensors when there is no infrastructure available. The drones can form a flying ad-hoc network through which the sensors can send their data to a base station at any time. In this paper, we present a mixed integer linear program to find the drones’ optimal trajectories to form and maintain this network through time while minimizing their movements and energy consumption. Furthermore we analyze the trade-off between distance and energy, where increasing the drones’ mobility can reduce their energy consumption, and derive a fair trade-off optimal solution to balance the two opposite objectives.","PeriodicalId":341927,"journal":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124398196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation of a low-cost weather station developed in design-based learning framework 实施以设计为本的学习架构发展的低成本气象站
Pub Date : 2020-06-01 DOI: 10.1109/SECONWorkshops50264.2020.9149776
A. Antonini, Luca Bini, Gabriele Rafanelli, Ilaria Cantini
Teaching about climate change with project- based learning is one of the key strategies for future perspective of human behaviour. This work is focused on the development of a low-cost weather station prototype for the measurements of atmospheric parameters. Teams of high school students have been set up for carrying out the work, with the supervision of teachers and experts, including companies in the sensor industry and agriculture. The proposed project concerns a general purpose system, able to manage several types of sensors and tested with most of them, from tipping bucket rain gauges, magnetic reed devices anemometers, capacitive/resistive thermohygrometers, and innovative impact piezo-element rain gauge. The control block based on ARDUINO and Raspberry systems, is interfaced with an IoT infrastructure to take advantage of low-cost communication technologies, and to exploit the possibility of dislocating several sensors linked to one control system. Some very low-cost sensors solutions have been selected for a preliminary implementation of the weather system: barometric, thermohygrometric and piezo-element impact rain sensors. During a period of about one year the weather station has been tested in outdoor, also numerically comparing the sensors measurements with official measures.
以项目为基础的气候变化教学是未来人类行为视角的关键策略之一。这项工作的重点是开发一个用于测量大气参数的低成本气象站原型。在教师和专家(包括传感器行业和农业公司)的监督下,已经成立了由高中生组成的团队来开展这项工作。拟议的项目涉及一个通用系统,能够管理多种类型的传感器,并与大多数传感器进行了测试,从翻斗雨量计,磁簧装置风速计,电容/电阻式湿度计,以及创新的冲击压电元件雨量计。基于ARDUINO和Raspberry系统的控制块与物联网基础设施接口,以利用低成本的通信技术,并利用连接到一个控制系统的多个传感器错位的可能性。一些非常低成本的传感器解决方案已经被选择用于天气系统的初步实施:气压计、热湿计和压电元件冲击雨传感器。在大约一年的时间里,气象站在室外进行了测试,并将传感器的测量结果与官方测量结果进行了数值比较。
{"title":"Implementation of a low-cost weather station developed in design-based learning framework","authors":"A. Antonini, Luca Bini, Gabriele Rafanelli, Ilaria Cantini","doi":"10.1109/SECONWorkshops50264.2020.9149776","DOIUrl":"https://doi.org/10.1109/SECONWorkshops50264.2020.9149776","url":null,"abstract":"Teaching about climate change with project- based learning is one of the key strategies for future perspective of human behaviour. This work is focused on the development of a low-cost weather station prototype for the measurements of atmospheric parameters. Teams of high school students have been set up for carrying out the work, with the supervision of teachers and experts, including companies in the sensor industry and agriculture. The proposed project concerns a general purpose system, able to manage several types of sensors and tested with most of them, from tipping bucket rain gauges, magnetic reed devices anemometers, capacitive/resistive thermohygrometers, and innovative impact piezo-element rain gauge. The control block based on ARDUINO and Raspberry systems, is interfaced with an IoT infrastructure to take advantage of low-cost communication technologies, and to exploit the possibility of dislocating several sensors linked to one control system. Some very low-cost sensors solutions have been selected for a preliminary implementation of the weather system: barometric, thermohygrometric and piezo-element impact rain sensors. During a period of about one year the weather station has been tested in outdoor, also numerically comparing the sensors measurements with official measures.","PeriodicalId":341927,"journal":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121256371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Benchmark of Security Metrics in Cyber-Physical Systems 网络物理系统中安全度量的基准
Pub Date : 2020-06-01 DOI: 10.1109/SECONWorkshops50264.2020.9149779
A. Aigner, Abdelmajid Khelil
The usage of connected devices and their role within our daily- and business life gains more and more impact. In addition, various derivations of Cyber-Physical Systems (CPS) reach new business fields, like smart healthcare or Industry 4.0. Although these systems do bring many advantages for users by extending the overall functionality of existing systems, they come with several challenges, especially for system engineers and architects. One key challenge consists in achieving a sufficiently high level of security within the CPS environment, as sensitive data or safety-critical functions are often integral parts of CPS. Being system of systems (SoS), CPS complexity, unpredictability and heterogeneity complicate analyzing the overall level of security, as well as providing a way to detect ongoing attacks. Usually, security metrics and frameworks provide an effective tool to measure the level of security of a given component or system. Although several comprehensive surveys exist, an assessment of the effectiveness of the existing solutions for CPS environments is insufficiently investigated in literature. In this work, we address this gap by benchmarking a carefully selected variety of existing security metrics in terms of their usability for CPS. Accordingly, we pinpoint critical CPS challenges and qualitatively assess the effectiveness of the existing metrics for CPS systems.
联网设备的使用及其在我们日常和商业生活中的作用越来越大。此外,网络物理系统(CPS)的各种衍生产品进入了新的业务领域,如智能医疗保健或工业4.0。尽管这些系统通过扩展现有系统的整体功能为用户带来了许多优势,但它们也带来了一些挑战,特别是对系统工程师和架构师而言。一个关键的挑战是在CPS环境中实现足够高的安全性,因为敏感数据或安全关键功能通常是CPS的组成部分。作为系统的系统(so), CPS的复杂性、不可预测性和异构性使分析整体安全级别以及提供检测正在进行的攻击的方法变得复杂。通常,安全度量和框架提供了一种有效的工具来度量给定组件或系统的安全级别。虽然存在一些全面的调查,但文献中对CPS环境现有解决方案有效性的评估还不够充分。在这项工作中,我们通过对CPS可用性方面精心挑选的各种现有安全指标进行基准测试来解决这一差距。因此,我们指出了关键的CPS挑战,并定性地评估了CPS系统现有指标的有效性。
{"title":"A Benchmark of Security Metrics in Cyber-Physical Systems","authors":"A. Aigner, Abdelmajid Khelil","doi":"10.1109/SECONWorkshops50264.2020.9149779","DOIUrl":"https://doi.org/10.1109/SECONWorkshops50264.2020.9149779","url":null,"abstract":"The usage of connected devices and their role within our daily- and business life gains more and more impact. In addition, various derivations of Cyber-Physical Systems (CPS) reach new business fields, like smart healthcare or Industry 4.0. Although these systems do bring many advantages for users by extending the overall functionality of existing systems, they come with several challenges, especially for system engineers and architects. One key challenge consists in achieving a sufficiently high level of security within the CPS environment, as sensitive data or safety-critical functions are often integral parts of CPS. Being system of systems (SoS), CPS complexity, unpredictability and heterogeneity complicate analyzing the overall level of security, as well as providing a way to detect ongoing attacks. Usually, security metrics and frameworks provide an effective tool to measure the level of security of a given component or system. Although several comprehensive surveys exist, an assessment of the effectiveness of the existing solutions for CPS environments is insufficiently investigated in literature. In this work, we address this gap by benchmarking a carefully selected variety of existing security metrics in terms of their usability for CPS. Accordingly, we pinpoint critical CPS challenges and qualitatively assess the effectiveness of the existing metrics for CPS systems.","PeriodicalId":341927,"journal":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134564720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Velocity Obstacle Based Strategy for Multi-agent Collision Avoidance of Unmanned Aerial Vehicles 基于速度障碍的无人机多智能体避碰策略
Pub Date : 2020-06-01 DOI: 10.1109/SECONWorkshops50264.2020.9149770
Alexandre Lombard, Lilian Durand, Stéphane Galland
Unmanned Aerials Vehicles (UAVs), most known as drones, recently gained a lot of interest in several domains of civil applications. With the number of operating drones expected to quickly rise in the next few years comes the need to develop efficient collision avoidance solutions. To ensure the applicability of the collision avoidance solutions, given the limitations of UAVs, they must rely on a reliable source of information, and must be computationally efficient. This paper aims at providing an implementation of the Velocity Obstacle collision avoidance method, based on the information transmitted by the other UAVs. Multi-agent based simulations using the simulation software AirSim and the multi-agent platform SARL are proposed to assess the validity of the proposed solution.
近年来,无人驾驶飞行器(uav)在民用应用的几个领域引起了人们的极大兴趣。随着未来几年操作无人机的数量预计将迅速增加,需要开发有效的防撞解决方案。为了确保避碰解决方案的适用性,考虑到无人机的局限性,它们必须依赖于可靠的信息源,并且必须具有计算效率。本文旨在提供一种基于其他无人机传输信息的速度障碍避碰方法的实现。利用仿真软件AirSim和多智能体平台SARL进行了基于多智能体的仿真,以评估所提方案的有效性。
{"title":"Velocity Obstacle Based Strategy for Multi-agent Collision Avoidance of Unmanned Aerial Vehicles","authors":"Alexandre Lombard, Lilian Durand, Stéphane Galland","doi":"10.1109/SECONWorkshops50264.2020.9149770","DOIUrl":"https://doi.org/10.1109/SECONWorkshops50264.2020.9149770","url":null,"abstract":"Unmanned Aerials Vehicles (UAVs), most known as drones, recently gained a lot of interest in several domains of civil applications. With the number of operating drones expected to quickly rise in the next few years comes the need to develop efficient collision avoidance solutions. To ensure the applicability of the collision avoidance solutions, given the limitations of UAVs, they must rely on a reliable source of information, and must be computationally efficient. This paper aims at providing an implementation of the Velocity Obstacle collision avoidance method, based on the information transmitted by the other UAVs. Multi-agent based simulations using the simulation software AirSim and the multi-agent platform SARL are proposed to assess the validity of the proposed solution.","PeriodicalId":341927,"journal":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134074307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimizing the energy envelope in the Internet of Things using predictive cubic splines 利用预测三次样条优化物联网中的能量包络
Pub Date : 2020-06-01 DOI: 10.1109/SECONWorkshops50264.2020.9149775
Saibal K. Ghosh, D. Agrawal
The paradigm of Internet of Things (IoT) is the result of rapid advances in the development of small low powered computing devices with wireless connectivity. This has given rise to a plethora of new applications, including, but not limited to monitoring, sensing, intrusion detection and others. Due to the nature of these applications, IoT devices are often burdened with receiving and transmitting a large volume of data that is time and delay sensitive. Furthermore, since most of these devices are battery powered, a data deluge often renders parts of the network depleted of energy, causing that part to go dark. In this work, we propose an energy optimization framework based on predictive cubic splines that anticipate a sudden increase in the bandwidth and minimize energy consumed by these devices while still maintaining an optimum degree of availability and reducing bottlenecks in the data flow.
物联网(IoT)范式是具有无线连接的小型低功耗计算设备快速发展的结果。这产生了大量的新应用,包括但不限于监控、传感、入侵检测等。由于这些应用的性质,物联网设备通常承受着接收和传输大量对时间和延迟敏感的数据的负担。此外,由于这些设备大多是电池供电的,数据泛滥往往会使部分网络耗尽能量,导致该部分变暗。在这项工作中,我们提出了一个基于预测三次样条的能量优化框架,该框架可以预测带宽的突然增加,并最大限度地减少这些设备消耗的能量,同时仍然保持最佳程度的可用性并减少数据流中的瓶颈。
{"title":"Optimizing the energy envelope in the Internet of Things using predictive cubic splines","authors":"Saibal K. Ghosh, D. Agrawal","doi":"10.1109/SECONWorkshops50264.2020.9149775","DOIUrl":"https://doi.org/10.1109/SECONWorkshops50264.2020.9149775","url":null,"abstract":"The paradigm of Internet of Things (IoT) is the result of rapid advances in the development of small low powered computing devices with wireless connectivity. This has given rise to a plethora of new applications, including, but not limited to monitoring, sensing, intrusion detection and others. Due to the nature of these applications, IoT devices are often burdened with receiving and transmitting a large volume of data that is time and delay sensitive. Furthermore, since most of these devices are battery powered, a data deluge often renders parts of the network depleted of energy, causing that part to go dark. In this work, we propose an energy optimization framework based on predictive cubic splines that anticipate a sudden increase in the bandwidth and minimize energy consumed by these devices while still maintaining an optimum degree of availability and reducing bottlenecks in the data flow.","PeriodicalId":341927,"journal":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114873162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SECON Workshops 2020 Committee 第二届研讨会2020委员会
Pub Date : 2020-06-01 DOI: 10.1109/seconworkshops50264.2020.9149777
{"title":"SECON Workshops 2020 Committee","authors":"","doi":"10.1109/seconworkshops50264.2020.9149777","DOIUrl":"https://doi.org/10.1109/seconworkshops50264.2020.9149777","url":null,"abstract":"","PeriodicalId":341927,"journal":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133385678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SECON Workshops 2020 Welcome Messages 第二届研讨会2020欢迎辞
Pub Date : 2020-06-01 DOI: 10.1109/seconworkshops50264.2020.9149778
{"title":"SECON Workshops 2020 Welcome Messages","authors":"","doi":"10.1109/seconworkshops50264.2020.9149778","DOIUrl":"https://doi.org/10.1109/seconworkshops50264.2020.9149778","url":null,"abstract":"","PeriodicalId":341927,"journal":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126130541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forecasting Crowd Distribution in Smart Cities 智慧城市人群分布预测
Pub Date : 2020-06-01 DOI: 10.1109/SECONWorkshops50264.2020.9149774
Alket Cecaj, Marco Lippi, M. Mamei, F. Zambonelli
In this work we present a forecasting method that can be used to predict crowd distribution across the city. Specifically, we analyze and forecast cellular network traffic and estimate crowd on such basis. Our forecasting model is based on a neural network combined with time series decomposition techniques. Our analysis shows that this approach can give interesting results in two directions. First, it creates a forecasting solution that fits all the variability in our dataset without having to create specific features and without complex search procedures for optimal parameters. Second, the method performs well, showing to be robust even in the presence of spikes in the data thus enabling better applications such as event management and detection of crowd gathering.
在这项工作中,我们提出了一种预测方法,可用于预测整个城市的人群分布。具体而言,我们在此基础上分析和预测蜂窝网络流量并估计人群。我们的预测模型是基于神经网络结合时间序列分解技术。我们的分析表明,这种方法可以在两个方向上得到有趣的结果。首先,它创建了一个预测解决方案,适合我们数据集中的所有可变性,而无需创建特定的特征,也无需为最佳参数进行复杂的搜索过程。其次,该方法性能良好,即使在数据中存在峰值时也表现出鲁棒性,因此可以实现更好的应用程序,例如事件管理和人群聚集检测。
{"title":"Forecasting Crowd Distribution in Smart Cities","authors":"Alket Cecaj, Marco Lippi, M. Mamei, F. Zambonelli","doi":"10.1109/SECONWorkshops50264.2020.9149774","DOIUrl":"https://doi.org/10.1109/SECONWorkshops50264.2020.9149774","url":null,"abstract":"In this work we present a forecasting method that can be used to predict crowd distribution across the city. Specifically, we analyze and forecast cellular network traffic and estimate crowd on such basis. Our forecasting model is based on a neural network combined with time series decomposition techniques. Our analysis shows that this approach can give interesting results in two directions. First, it creates a forecasting solution that fits all the variability in our dataset without having to create specific features and without complex search procedures for optimal parameters. Second, the method performs well, showing to be robust even in the presence of spikes in the data thus enabling better applications such as event management and detection of crowd gathering.","PeriodicalId":341927,"journal":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128290777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure IoT Device Architecture Using TrustZone 使用TrustZone保护物联网设备架构
Pub Date : 2020-06-01 DOI: 10.1109/SECONWorkshops50264.2020.9149772
Takayuki Sasaki, Koki Tomita, Yuto Hayaki, Seng Pei Liew, Norio Yamagaki
IoT realizes efficient system such as smart cities, smart factories, and smart agriculture. However, there are risks of cyber attacks against the IoT with the potential to cause serious damage. To protect the IoT systems, protection of the entire system including end-point IoT devices is essential. However, existing software-based protection is insufficient against recent sophisticated attackers who disable or bypass security mechanisms. In this paper, to ensure correct operations of security mechanisms, we propose a secure IoT device architecture using TrustZone. A monitoring engine can be protected from attacks by deploying the engine in a secure world which is isolated from a non-secure. Here, a problem is that each secure and non-secure world has its own virtual memory and OS, thus the monitoring engine in the secure world cannot directly monitor software in the non-secure world. To cope with the semantic gap between the non-secure world and the secure world, the proposed architecture has two monitoring engines: a monitoring engine in the non-secure world for measuring software in the non-secure world and a monitoring engine in secure world for attesting the engine in non-secure world. Moreover, we implement the architecture and show the proposed architecture is feasible on the basis of its evaluation results.
物联网实现智慧城市、智慧工厂、智慧农业等高效系统。然而,物联网存在网络攻击的风险,有可能造成严重损害。为了保护物联网系统,保护包括端点物联网设备在内的整个系统至关重要。然而,现有的基于软件的保护不足以抵御最近禁用或绕过安全机制的复杂攻击者。为了确保安全机制的正确运行,本文提出了一种使用TrustZone的安全物联网设备架构。通过将监视引擎部署在与非安全环境隔离的安全环境中,可以保护监视引擎免受攻击。这里的一个问题是,每个安全和非安全世界都有自己的虚拟内存和操作系统,因此安全世界中的监控引擎无法直接监控非安全世界中的软件。为了解决非安全世界和安全世界之间的语义差距,提出的体系结构有两个监控引擎:用于测量非安全世界中的软件的非安全世界中的监控引擎和用于证明非安全世界中的引擎的安全世界中的监控引擎。最后对该体系结构进行了实现,并根据评估结果证明了该体系结构的可行性。
{"title":"Secure IoT Device Architecture Using TrustZone","authors":"Takayuki Sasaki, Koki Tomita, Yuto Hayaki, Seng Pei Liew, Norio Yamagaki","doi":"10.1109/SECONWorkshops50264.2020.9149772","DOIUrl":"https://doi.org/10.1109/SECONWorkshops50264.2020.9149772","url":null,"abstract":"IoT realizes efficient system such as smart cities, smart factories, and smart agriculture. However, there are risks of cyber attacks against the IoT with the potential to cause serious damage. To protect the IoT systems, protection of the entire system including end-point IoT devices is essential. However, existing software-based protection is insufficient against recent sophisticated attackers who disable or bypass security mechanisms. In this paper, to ensure correct operations of security mechanisms, we propose a secure IoT device architecture using TrustZone. A monitoring engine can be protected from attacks by deploying the engine in a secure world which is isolated from a non-secure. Here, a problem is that each secure and non-secure world has its own virtual memory and OS, thus the monitoring engine in the secure world cannot directly monitor software in the non-secure world. To cope with the semantic gap between the non-secure world and the secure world, the proposed architecture has two monitoring engines: a monitoring engine in the non-secure world for measuring software in the non-secure world and a monitoring engine in secure world for attesting the engine in non-secure world. Moreover, we implement the architecture and show the proposed architecture is feasible on the basis of its evaluation results.","PeriodicalId":341927,"journal":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117269203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1