Pub Date : 2020-06-01DOI: 10.1109/SECONWorkshops50264.2020.9149780
Francesco Betti Sorbelli, M. Conti, M. C. Pinotti, Giulio Rigoni
Recently, Unmanned Aerial Vehicles (UAVs) are employed for a plethora of civilian applications. Such flying vehicles can accomplish tasks under the pilot’s eyesight within the range of a remote controller, or autonomously according to a certain pre-loaded path configuration. Different path deviation attacks can be performed by malicious users against UAVs. We classify such attacks and the relative defenses based on the UAV’s flight mode, i.e., (i) First Person View (FPV), (ii) civilian Global Navigation Satellite System based (GNSS), and (iii) GNSS "plus" auxiliary technologies (GNSS+), and on the multiplicity, i.e., (i) Single UAV, and (ii) Multiple UAVs. We found that very little has been done to secure the FPV flight mode against path deviation. In GNSS mode, spoofing is the most worrisome attack. The best defense against spoofing seems to be redundancy, such as adding vision chips to single UAV or using multiple arranged UAVs. No specific attacks and defenses have been found in literature for GNSS+ or for UAVs moving in group without a pre-ordered arrangement. These aspects require further investigation.
{"title":"UAVs Path Deviation Attacks: Survey and Research Challenges","authors":"Francesco Betti Sorbelli, M. Conti, M. C. Pinotti, Giulio Rigoni","doi":"10.1109/SECONWorkshops50264.2020.9149780","DOIUrl":"https://doi.org/10.1109/SECONWorkshops50264.2020.9149780","url":null,"abstract":"Recently, Unmanned Aerial Vehicles (UAVs) are employed for a plethora of civilian applications. Such flying vehicles can accomplish tasks under the pilot’s eyesight within the range of a remote controller, or autonomously according to a certain pre-loaded path configuration. Different path deviation attacks can be performed by malicious users against UAVs. We classify such attacks and the relative defenses based on the UAV’s flight mode, i.e., (i) First Person View (FPV), (ii) civilian Global Navigation Satellite System based (GNSS), and (iii) GNSS \"plus\" auxiliary technologies (GNSS+), and on the multiplicity, i.e., (i) Single UAV, and (ii) Multiple UAVs. We found that very little has been done to secure the FPV flight mode against path deviation. In GNSS mode, spoofing is the most worrisome attack. The best defense against spoofing seems to be redundancy, such as adding vision chips to single UAV or using multiple arranged UAVs. No specific attacks and defenses have been found in literature for GNSS+ or for UAVs moving in group without a pre-ordered arrangement. These aspects require further investigation.","PeriodicalId":341927,"journal":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115000964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/SECONWorkshops50264.2020.9149781
Igor Dias Da Silva, C. Caillouet
The use of autonomous unmanned aerial vehicles (UAVs) or drones has emerged to efficiently collect data from mobile sensors when there is no infrastructure available. The drones can form a flying ad-hoc network through which the sensors can send their data to a base station at any time. In this paper, we present a mixed integer linear program to find the drones’ optimal trajectories to form and maintain this network through time while minimizing their movements and energy consumption. Furthermore we analyze the trade-off between distance and energy, where increasing the drones’ mobility can reduce their energy consumption, and derive a fair trade-off optimal solution to balance the two opposite objectives.
{"title":"Optimizing the trajectory of drones: trade-off between distance and energy","authors":"Igor Dias Da Silva, C. Caillouet","doi":"10.1109/SECONWorkshops50264.2020.9149781","DOIUrl":"https://doi.org/10.1109/SECONWorkshops50264.2020.9149781","url":null,"abstract":"The use of autonomous unmanned aerial vehicles (UAVs) or drones has emerged to efficiently collect data from mobile sensors when there is no infrastructure available. The drones can form a flying ad-hoc network through which the sensors can send their data to a base station at any time. In this paper, we present a mixed integer linear program to find the drones’ optimal trajectories to form and maintain this network through time while minimizing their movements and energy consumption. Furthermore we analyze the trade-off between distance and energy, where increasing the drones’ mobility can reduce their energy consumption, and derive a fair trade-off optimal solution to balance the two opposite objectives.","PeriodicalId":341927,"journal":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124398196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/SECONWorkshops50264.2020.9149776
A. Antonini, Luca Bini, Gabriele Rafanelli, Ilaria Cantini
Teaching about climate change with project- based learning is one of the key strategies for future perspective of human behaviour. This work is focused on the development of a low-cost weather station prototype for the measurements of atmospheric parameters. Teams of high school students have been set up for carrying out the work, with the supervision of teachers and experts, including companies in the sensor industry and agriculture. The proposed project concerns a general purpose system, able to manage several types of sensors and tested with most of them, from tipping bucket rain gauges, magnetic reed devices anemometers, capacitive/resistive thermohygrometers, and innovative impact piezo-element rain gauge. The control block based on ARDUINO and Raspberry systems, is interfaced with an IoT infrastructure to take advantage of low-cost communication technologies, and to exploit the possibility of dislocating several sensors linked to one control system. Some very low-cost sensors solutions have been selected for a preliminary implementation of the weather system: barometric, thermohygrometric and piezo-element impact rain sensors. During a period of about one year the weather station has been tested in outdoor, also numerically comparing the sensors measurements with official measures.
{"title":"Implementation of a low-cost weather station developed in design-based learning framework","authors":"A. Antonini, Luca Bini, Gabriele Rafanelli, Ilaria Cantini","doi":"10.1109/SECONWorkshops50264.2020.9149776","DOIUrl":"https://doi.org/10.1109/SECONWorkshops50264.2020.9149776","url":null,"abstract":"Teaching about climate change with project- based learning is one of the key strategies for future perspective of human behaviour. This work is focused on the development of a low-cost weather station prototype for the measurements of atmospheric parameters. Teams of high school students have been set up for carrying out the work, with the supervision of teachers and experts, including companies in the sensor industry and agriculture. The proposed project concerns a general purpose system, able to manage several types of sensors and tested with most of them, from tipping bucket rain gauges, magnetic reed devices anemometers, capacitive/resistive thermohygrometers, and innovative impact piezo-element rain gauge. The control block based on ARDUINO and Raspberry systems, is interfaced with an IoT infrastructure to take advantage of low-cost communication technologies, and to exploit the possibility of dislocating several sensors linked to one control system. Some very low-cost sensors solutions have been selected for a preliminary implementation of the weather system: barometric, thermohygrometric and piezo-element impact rain sensors. During a period of about one year the weather station has been tested in outdoor, also numerically comparing the sensors measurements with official measures.","PeriodicalId":341927,"journal":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121256371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/SECONWorkshops50264.2020.9149779
A. Aigner, Abdelmajid Khelil
The usage of connected devices and their role within our daily- and business life gains more and more impact. In addition, various derivations of Cyber-Physical Systems (CPS) reach new business fields, like smart healthcare or Industry 4.0. Although these systems do bring many advantages for users by extending the overall functionality of existing systems, they come with several challenges, especially for system engineers and architects. One key challenge consists in achieving a sufficiently high level of security within the CPS environment, as sensitive data or safety-critical functions are often integral parts of CPS. Being system of systems (SoS), CPS complexity, unpredictability and heterogeneity complicate analyzing the overall level of security, as well as providing a way to detect ongoing attacks. Usually, security metrics and frameworks provide an effective tool to measure the level of security of a given component or system. Although several comprehensive surveys exist, an assessment of the effectiveness of the existing solutions for CPS environments is insufficiently investigated in literature. In this work, we address this gap by benchmarking a carefully selected variety of existing security metrics in terms of their usability for CPS. Accordingly, we pinpoint critical CPS challenges and qualitatively assess the effectiveness of the existing metrics for CPS systems.
{"title":"A Benchmark of Security Metrics in Cyber-Physical Systems","authors":"A. Aigner, Abdelmajid Khelil","doi":"10.1109/SECONWorkshops50264.2020.9149779","DOIUrl":"https://doi.org/10.1109/SECONWorkshops50264.2020.9149779","url":null,"abstract":"The usage of connected devices and their role within our daily- and business life gains more and more impact. In addition, various derivations of Cyber-Physical Systems (CPS) reach new business fields, like smart healthcare or Industry 4.0. Although these systems do bring many advantages for users by extending the overall functionality of existing systems, they come with several challenges, especially for system engineers and architects. One key challenge consists in achieving a sufficiently high level of security within the CPS environment, as sensitive data or safety-critical functions are often integral parts of CPS. Being system of systems (SoS), CPS complexity, unpredictability and heterogeneity complicate analyzing the overall level of security, as well as providing a way to detect ongoing attacks. Usually, security metrics and frameworks provide an effective tool to measure the level of security of a given component or system. Although several comprehensive surveys exist, an assessment of the effectiveness of the existing solutions for CPS environments is insufficiently investigated in literature. In this work, we address this gap by benchmarking a carefully selected variety of existing security metrics in terms of their usability for CPS. Accordingly, we pinpoint critical CPS challenges and qualitatively assess the effectiveness of the existing metrics for CPS systems.","PeriodicalId":341927,"journal":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134564720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Unmanned Aerials Vehicles (UAVs), most known as drones, recently gained a lot of interest in several domains of civil applications. With the number of operating drones expected to quickly rise in the next few years comes the need to develop efficient collision avoidance solutions. To ensure the applicability of the collision avoidance solutions, given the limitations of UAVs, they must rely on a reliable source of information, and must be computationally efficient. This paper aims at providing an implementation of the Velocity Obstacle collision avoidance method, based on the information transmitted by the other UAVs. Multi-agent based simulations using the simulation software AirSim and the multi-agent platform SARL are proposed to assess the validity of the proposed solution.
{"title":"Velocity Obstacle Based Strategy for Multi-agent Collision Avoidance of Unmanned Aerial Vehicles","authors":"Alexandre Lombard, Lilian Durand, Stéphane Galland","doi":"10.1109/SECONWorkshops50264.2020.9149770","DOIUrl":"https://doi.org/10.1109/SECONWorkshops50264.2020.9149770","url":null,"abstract":"Unmanned Aerials Vehicles (UAVs), most known as drones, recently gained a lot of interest in several domains of civil applications. With the number of operating drones expected to quickly rise in the next few years comes the need to develop efficient collision avoidance solutions. To ensure the applicability of the collision avoidance solutions, given the limitations of UAVs, they must rely on a reliable source of information, and must be computationally efficient. This paper aims at providing an implementation of the Velocity Obstacle collision avoidance method, based on the information transmitted by the other UAVs. Multi-agent based simulations using the simulation software AirSim and the multi-agent platform SARL are proposed to assess the validity of the proposed solution.","PeriodicalId":341927,"journal":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134074307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/SECONWorkshops50264.2020.9149775
Saibal K. Ghosh, D. Agrawal
The paradigm of Internet of Things (IoT) is the result of rapid advances in the development of small low powered computing devices with wireless connectivity. This has given rise to a plethora of new applications, including, but not limited to monitoring, sensing, intrusion detection and others. Due to the nature of these applications, IoT devices are often burdened with receiving and transmitting a large volume of data that is time and delay sensitive. Furthermore, since most of these devices are battery powered, a data deluge often renders parts of the network depleted of energy, causing that part to go dark. In this work, we propose an energy optimization framework based on predictive cubic splines that anticipate a sudden increase in the bandwidth and minimize energy consumed by these devices while still maintaining an optimum degree of availability and reducing bottlenecks in the data flow.
{"title":"Optimizing the energy envelope in the Internet of Things using predictive cubic splines","authors":"Saibal K. Ghosh, D. Agrawal","doi":"10.1109/SECONWorkshops50264.2020.9149775","DOIUrl":"https://doi.org/10.1109/SECONWorkshops50264.2020.9149775","url":null,"abstract":"The paradigm of Internet of Things (IoT) is the result of rapid advances in the development of small low powered computing devices with wireless connectivity. This has given rise to a plethora of new applications, including, but not limited to monitoring, sensing, intrusion detection and others. Due to the nature of these applications, IoT devices are often burdened with receiving and transmitting a large volume of data that is time and delay sensitive. Furthermore, since most of these devices are battery powered, a data deluge often renders parts of the network depleted of energy, causing that part to go dark. In this work, we propose an energy optimization framework based on predictive cubic splines that anticipate a sudden increase in the bandwidth and minimize energy consumed by these devices while still maintaining an optimum degree of availability and reducing bottlenecks in the data flow.","PeriodicalId":341927,"journal":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114873162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/seconworkshops50264.2020.9149777
{"title":"SECON Workshops 2020 Committee","authors":"","doi":"10.1109/seconworkshops50264.2020.9149777","DOIUrl":"https://doi.org/10.1109/seconworkshops50264.2020.9149777","url":null,"abstract":"","PeriodicalId":341927,"journal":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133385678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/seconworkshops50264.2020.9149778
{"title":"SECON Workshops 2020 Welcome Messages","authors":"","doi":"10.1109/seconworkshops50264.2020.9149778","DOIUrl":"https://doi.org/10.1109/seconworkshops50264.2020.9149778","url":null,"abstract":"","PeriodicalId":341927,"journal":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126130541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/SECONWorkshops50264.2020.9149774
Alket Cecaj, Marco Lippi, M. Mamei, F. Zambonelli
In this work we present a forecasting method that can be used to predict crowd distribution across the city. Specifically, we analyze and forecast cellular network traffic and estimate crowd on such basis. Our forecasting model is based on a neural network combined with time series decomposition techniques. Our analysis shows that this approach can give interesting results in two directions. First, it creates a forecasting solution that fits all the variability in our dataset without having to create specific features and without complex search procedures for optimal parameters. Second, the method performs well, showing to be robust even in the presence of spikes in the data thus enabling better applications such as event management and detection of crowd gathering.
{"title":"Forecasting Crowd Distribution in Smart Cities","authors":"Alket Cecaj, Marco Lippi, M. Mamei, F. Zambonelli","doi":"10.1109/SECONWorkshops50264.2020.9149774","DOIUrl":"https://doi.org/10.1109/SECONWorkshops50264.2020.9149774","url":null,"abstract":"In this work we present a forecasting method that can be used to predict crowd distribution across the city. Specifically, we analyze and forecast cellular network traffic and estimate crowd on such basis. Our forecasting model is based on a neural network combined with time series decomposition techniques. Our analysis shows that this approach can give interesting results in two directions. First, it creates a forecasting solution that fits all the variability in our dataset without having to create specific features and without complex search procedures for optimal parameters. Second, the method performs well, showing to be robust even in the presence of spikes in the data thus enabling better applications such as event management and detection of crowd gathering.","PeriodicalId":341927,"journal":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128290777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/SECONWorkshops50264.2020.9149772
Takayuki Sasaki, Koki Tomita, Yuto Hayaki, Seng Pei Liew, Norio Yamagaki
IoT realizes efficient system such as smart cities, smart factories, and smart agriculture. However, there are risks of cyber attacks against the IoT with the potential to cause serious damage. To protect the IoT systems, protection of the entire system including end-point IoT devices is essential. However, existing software-based protection is insufficient against recent sophisticated attackers who disable or bypass security mechanisms. In this paper, to ensure correct operations of security mechanisms, we propose a secure IoT device architecture using TrustZone. A monitoring engine can be protected from attacks by deploying the engine in a secure world which is isolated from a non-secure. Here, a problem is that each secure and non-secure world has its own virtual memory and OS, thus the monitoring engine in the secure world cannot directly monitor software in the non-secure world. To cope with the semantic gap between the non-secure world and the secure world, the proposed architecture has two monitoring engines: a monitoring engine in the non-secure world for measuring software in the non-secure world and a monitoring engine in secure world for attesting the engine in non-secure world. Moreover, we implement the architecture and show the proposed architecture is feasible on the basis of its evaluation results.
{"title":"Secure IoT Device Architecture Using TrustZone","authors":"Takayuki Sasaki, Koki Tomita, Yuto Hayaki, Seng Pei Liew, Norio Yamagaki","doi":"10.1109/SECONWorkshops50264.2020.9149772","DOIUrl":"https://doi.org/10.1109/SECONWorkshops50264.2020.9149772","url":null,"abstract":"IoT realizes efficient system such as smart cities, smart factories, and smart agriculture. However, there are risks of cyber attacks against the IoT with the potential to cause serious damage. To protect the IoT systems, protection of the entire system including end-point IoT devices is essential. However, existing software-based protection is insufficient against recent sophisticated attackers who disable or bypass security mechanisms. In this paper, to ensure correct operations of security mechanisms, we propose a secure IoT device architecture using TrustZone. A monitoring engine can be protected from attacks by deploying the engine in a secure world which is isolated from a non-secure. Here, a problem is that each secure and non-secure world has its own virtual memory and OS, thus the monitoring engine in the secure world cannot directly monitor software in the non-secure world. To cope with the semantic gap between the non-secure world and the secure world, the proposed architecture has two monitoring engines: a monitoring engine in the non-secure world for measuring software in the non-secure world and a monitoring engine in secure world for attesting the engine in non-secure world. Moreover, we implement the architecture and show the proposed architecture is feasible on the basis of its evaluation results.","PeriodicalId":341927,"journal":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117269203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}