首页 > 最新文献

2012 IEEE Conference on Technologies for Homeland Security (HST)最新文献

英文 中文
Information sharing requirements and framework needed for community cyber incident detection and response 社区网络事件检测和响应所需的信息共享要求和框架
Pub Date : 2012-12-01 DOI: 10.1109/THS.2012.6459893
K. Harrison, G. White
Communities, and the critical infrastructure that they rely upon, are becoming ever increasingly integrated into cyberspace. At the same time, communities are experiencing increasing activity and sophistication from a variety of threat agents. The effect of cyber attacks on communities has been observed, and the frequency and devastation of these attacks can only increase in the foreseeable future. Early detection of these attacks is critical for a fast and effective response. We propose detecting community cyber incidents by comparing indicators from community members across space and time. Performing spatiotemporal differentiation on these indicators requires that community members, such as private and governmental organizations, share information about these indicators. However, community members are, for good reasons, reluctant to share sensitive security related information. Additionally, sharing large amounts of information with a trusted, centralized location introduces scalability and reliability problems. In this paper we define the information sharing requirements necessary for fast, effective community cyber incident detection and response, while addressing both privacy and scalability concerns. Furthermore, we introduce a framework to meet these requirements, and analyze a proof of concept implementation.
社区及其所依赖的关键基础设施正日益融入网络空间。与此同时,社区正在经历来自各种威胁代理的越来越多的活动和复杂性。网络攻击对社区的影响已经被观察到,在可预见的未来,这些攻击的频率和破坏只会增加。及早发现这些攻击对于快速有效地作出反应至关重要。我们建议通过比较不同时空社区成员的指标来检测社区网络事件。对这些指标进行时空分异需要社区成员(如私人和政府组织)共享有关这些指标的信息。然而,社区成员有充分的理由不愿意分享敏感的安全相关信息。此外,与受信任的集中位置共享大量信息会带来可伸缩性和可靠性问题。在本文中,我们定义了快速、有效的社区网络事件检测和响应所需的信息共享要求,同时解决了隐私和可扩展性问题。此外,我们还介绍了一个满足这些需求的框架,并分析了一个概念验证实现。
{"title":"Information sharing requirements and framework needed for community cyber incident detection and response","authors":"K. Harrison, G. White","doi":"10.1109/THS.2012.6459893","DOIUrl":"https://doi.org/10.1109/THS.2012.6459893","url":null,"abstract":"Communities, and the critical infrastructure that they rely upon, are becoming ever increasingly integrated into cyberspace. At the same time, communities are experiencing increasing activity and sophistication from a variety of threat agents. The effect of cyber attacks on communities has been observed, and the frequency and devastation of these attacks can only increase in the foreseeable future. Early detection of these attacks is critical for a fast and effective response. We propose detecting community cyber incidents by comparing indicators from community members across space and time. Performing spatiotemporal differentiation on these indicators requires that community members, such as private and governmental organizations, share information about these indicators. However, community members are, for good reasons, reluctant to share sensitive security related information. Additionally, sharing large amounts of information with a trusted, centralized location introduces scalability and reliability problems. In this paper we define the information sharing requirements necessary for fast, effective community cyber incident detection and response, while addressing both privacy and scalability concerns. Furthermore, we introduce a framework to meet these requirements, and analyze a proof of concept implementation.","PeriodicalId":355549,"journal":{"name":"2012 IEEE Conference on Technologies for Homeland Security (HST)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131871917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Maritime threat detection using plan recognition 基于计划识别的海上威胁检测
Pub Date : 2012-11-01 DOI: 10.1109/THS.2012.6459857
B. Auslander, K. Gupta, D. Aha
Existing algorithms for maritime threat detection employ a variety of normalcy models that are probabilistic and/or rule-based. Unfortunately, they can be limited in their ability to model the subtlety and complexity of multiple vessel types and their spatio-temporal events, yet their representation is needed to accurately detect anomalies in maritime scenarios. To address these limitations, we apply plan recognition algorithms for maritime anomaly detection. In particular, we examine hierarchical task network (HTN) and case-based algorithms for plan recognition, which detect anomalies by generating expected behaviors for use as a basis for threat detection. We compare their performance with a behavior recognition algorithm on simulated riverine maritime traffic. On a set of simulated maritime scenarios, these plan recognition algorithms outperformed the behavior recognition algorithm, except for one reactive behavior task in which the inverse occurred. Furthermore, our case-based plan recognizer outperformed our HTN algorithm. On the short-term reactive planning scenarios, the plan recognition algorithms outperformed the behavior recognition algorithm on routine plan following. However, they are significantly outperformed on the anomalous scenarios.
现有的海上威胁检测算法采用了各种概率和/或基于规则的正态模型。不幸的是,它们在模拟多种船舶类型及其时空事件的微妙性和复杂性方面的能力可能受到限制,然而,需要它们的表示来准确检测海事场景中的异常。为了解决这些限制,我们将计划识别算法应用于海事异常检测。特别是,我们研究了分层任务网络(HTN)和基于案例的计划识别算法,这些算法通过生成预期行为来检测异常,以作为威胁检测的基础。我们将它们的性能与模拟河流海上交通的行为识别算法进行了比较。在一组模拟海事场景中,除了一个反应性行为任务出现相反情况外,这些计划识别算法的表现优于行为识别算法。此外,我们的基于案例的计划识别器优于我们的HTN算法。在短期反应性规划场景下,计划识别算法优于常规计划跟随行为识别算法。然而,它们在异常情况下的表现明显优于它们。
{"title":"Maritime threat detection using plan recognition","authors":"B. Auslander, K. Gupta, D. Aha","doi":"10.1109/THS.2012.6459857","DOIUrl":"https://doi.org/10.1109/THS.2012.6459857","url":null,"abstract":"Existing algorithms for maritime threat detection employ a variety of normalcy models that are probabilistic and/or rule-based. Unfortunately, they can be limited in their ability to model the subtlety and complexity of multiple vessel types and their spatio-temporal events, yet their representation is needed to accurately detect anomalies in maritime scenarios. To address these limitations, we apply plan recognition algorithms for maritime anomaly detection. In particular, we examine hierarchical task network (HTN) and case-based algorithms for plan recognition, which detect anomalies by generating expected behaviors for use as a basis for threat detection. We compare their performance with a behavior recognition algorithm on simulated riverine maritime traffic. On a set of simulated maritime scenarios, these plan recognition algorithms outperformed the behavior recognition algorithm, except for one reactive behavior task in which the inverse occurred. Furthermore, our case-based plan recognizer outperformed our HTN algorithm. On the short-term reactive planning scenarios, the plan recognition algorithms outperformed the behavior recognition algorithm on routine plan following. However, they are significantly outperformed on the anomalous scenarios.","PeriodicalId":355549,"journal":{"name":"2012 IEEE Conference on Technologies for Homeland Security (HST)","volume":"62 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121806511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modeling of a Regional Hub Reception Center to improve the speed of an urban area evacuation 区域枢纽接待中心的建模以提高城市区域疏散的速度
Pub Date : 2012-11-01 DOI: 10.1109/THS.2012.6459895
A. Kirby, J. E. Dietz, C. Wojtalewicz
The city of Chicago, Illinois is making strides to become more prepared for large-scale disasters. One idea is called a Regional Hub Reception Center (RHRC), which converts an existing facility into a temporary shelter for evacuees in the event of a 10-kiloton nuclear blast being detonated in the center of downtown. The RHRC will provide the evacuees with basic needs and register them for assignment at a more permanent shelter. The Regional Catastrophic Planning Team needs to know if its estimates for time, personnel, and resources are accurate. The best and most reliable way to test what will be needed is to perform simulations. However, large full-scale simulations are time consuming and expensive. A computer-generated model, however, can accurately simulate many variables and scenarios to test the RHRC quickly, cheaply, and repetitively to make it more effective if used. A computer modeling software tool, called AnyLogic, is a multi-paradigm modeling program that allows users to build agent-based, discrete event, and system dynamics models. The modeling paradigm that best suits the simulation of an RHRC is discrete event modeling. This is because a discrete event model represents a chronological sequence of events. When an event occurs in a discrete event model, it represents a change to the entire system. An RHRC is a chronological sequence of events and a system of systems that are constantly changing. As evacuees move through the RHRC, they flow through a predefined set of points, ranging from registration, to care, to shelter assignment, and many others. The data provided is supported by research or by personal field experience where research has not yet been performed. A model is a simulation of the real world. Though it does not represent the 100% of the variables that could occur in an actual simulation, it takes into consideration as many as possible to provide the most accurate results. The RHRC AnyLogic model is a simulation that estimates resource needs and processes of an RHRC. The RHRC model created to support this paper was developed using data collected by all students in Dr. J. Eric Dietz's Homeland Security Seminar graduate level class at Purdue University in the spring semester of 2012. The purpose of this study is to determine if the goals of the Regional Catastrophic Planning Team are attainable based upon the data collected.
伊利诺斯州芝加哥市正在大步前进,为大规模灾难做好准备。其中一个想法被称为区域中心接待中心(RHRC),它将现有设施改造成一个临时避难所,以便在市中心发生1万吨核爆炸时疏散人员。RHRC将为撤离者提供基本需求,并为他们登记,以便分配到更永久的避难所。区域灾难计划小组需要知道它对时间、人员和资源的估计是否准确。测试所需内容的最佳和最可靠的方法是进行模拟。然而,大型全尺寸模拟既耗时又昂贵。然而,计算机生成的模型可以准确地模拟许多变量和场景,以快速、廉价和重复地测试RHRC,使其在使用时更加有效。一种名为AnyLogic的计算机建模软件工具是一种多范式建模程序,允许用户构建基于代理的离散事件和系统动力学模型。最适合RHRC仿真的建模范例是离散事件建模。这是因为离散事件模型表示事件的时间顺序。当一个事件在离散事件模型中发生时,它表示对整个系统的更改。RHRC是事件的时间顺序和不断变化的系统的系统。当撤离人员穿过RHRC时,他们会经过一组预定义的点,从登记到护理,到分配住所等等。所提供的数据由研究或尚未进行研究的个人实地经验支持。模型是对真实世界的模拟。虽然它不能代表实际模拟中可能出现的100%的变量,但它考虑了尽可能多的变量以提供最准确的结果。RHRC AnyLogic模型是一种模拟,用于估计RHRC的资源需求和流程。为支持本文而创建的RHRC模型是利用普渡大学2012年春季学期J. Eric Dietz博士的国土安全研讨会研究生班的所有学生收集的数据开发的。本研究的目的是根据收集的数据确定区域灾难规划小组的目标是否可以实现。
{"title":"Modeling of a Regional Hub Reception Center to improve the speed of an urban area evacuation","authors":"A. Kirby, J. E. Dietz, C. Wojtalewicz","doi":"10.1109/THS.2012.6459895","DOIUrl":"https://doi.org/10.1109/THS.2012.6459895","url":null,"abstract":"The city of Chicago, Illinois is making strides to become more prepared for large-scale disasters. One idea is called a Regional Hub Reception Center (RHRC), which converts an existing facility into a temporary shelter for evacuees in the event of a 10-kiloton nuclear blast being detonated in the center of downtown. The RHRC will provide the evacuees with basic needs and register them for assignment at a more permanent shelter. The Regional Catastrophic Planning Team needs to know if its estimates for time, personnel, and resources are accurate. The best and most reliable way to test what will be needed is to perform simulations. However, large full-scale simulations are time consuming and expensive. A computer-generated model, however, can accurately simulate many variables and scenarios to test the RHRC quickly, cheaply, and repetitively to make it more effective if used. A computer modeling software tool, called AnyLogic, is a multi-paradigm modeling program that allows users to build agent-based, discrete event, and system dynamics models. The modeling paradigm that best suits the simulation of an RHRC is discrete event modeling. This is because a discrete event model represents a chronological sequence of events. When an event occurs in a discrete event model, it represents a change to the entire system. An RHRC is a chronological sequence of events and a system of systems that are constantly changing. As evacuees move through the RHRC, they flow through a predefined set of points, ranging from registration, to care, to shelter assignment, and many others. The data provided is supported by research or by personal field experience where research has not yet been performed. A model is a simulation of the real world. Though it does not represent the 100% of the variables that could occur in an actual simulation, it takes into consideration as many as possible to provide the most accurate results. The RHRC AnyLogic model is a simulation that estimates resource needs and processes of an RHRC. The RHRC model created to support this paper was developed using data collected by all students in Dr. J. Eric Dietz's Homeland Security Seminar graduate level class at Purdue University in the spring semester of 2012. The purpose of this study is to determine if the goals of the Regional Catastrophic Planning Team are attainable based upon the data collected.","PeriodicalId":355549,"journal":{"name":"2012 IEEE Conference on Technologies for Homeland Security (HST)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124270360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Biometric Interagency Testing & Evaluation Schema (BITES) 生物识别跨部门测试与评估方案(BITES)
Pub Date : 2012-11-01 DOI: 10.1109/THS.2012.6459907
R. Lazarick
This paper addresses the concepts of reusable biometric testing in a general sense, and then describes the US Government initiative to establish a mechanism to facilitate sharing of biometric testing information both within the government and with stakeholders. The fundamental motivation for promoting reuse of biometric testing information is to achieve cost avoidance. If a well defined test has been successfully completed and documented by a trusted party, then the results of that testing should be sufficient to allow other consumers of that product to rely on that test, and thereby avoid the cost of repeating that testing. The extent of reusability depends on the type of testing being conducted. The most straightforward type of testing suited for reuse are Conformance tests, such as conformance to American National Standards Institute/National Institute of Standards and Technology (ANSI/NIST) or International Organization for Standardization (ISO) standards. These tests are typically automated and are fully repeatable. Biometric Performance testing using the Technology Testing approach, is similarly repeatable and easily reused given a fixed set of biometric samples. Biometric Performance testing using the Scenario Testing approach is quite different in that it is inherently not repeatable due to the use of human test subjects, and not easily reusable. These tests are also typically expensive. There are several notable examples of testing programs for which the results have demonstrated reusability. One of the first and most visible may be the Federal Bureau of Investigation (FBI) Appendix F Certification of fingerprint image quality supported by the FBI for procurement of livescan fingerprint devices. There are fundamental prerequisites for reusable testing. First, there is a need for agreement on the method/procedure for conducting the testing and reporting the results. Secondly, the methods must be “Open”, and additionally, the product must be tested by a trusted party . In order for reusable testing to work, the participants in a test must have a willingness and the authority to share the results, and establish a common level of integration. In order for reusability to succeed, there must be a capability to disseminate the information. The United States Government (USG) has established an effort to develop a repository for biometrics test methods and successfully completed test results - “BITES” - Biometric Interagency Testing and Evaluation Schema, to promote efficient and effective reuse of biometric testing information.
本文从一般意义上阐述了可重复使用生物识别测试的概念,然后描述了美国政府倡议建立一种机制,以促进政府内部和利益相关者共享生物识别测试信息。促进生物识别测试信息重用的根本动机是为了避免成本。如果一个定义良好的测试已经成功地完成并由一个可信的方记录下来,那么该测试的结果应该足以允许该产品的其他消费者依赖该测试,从而避免重复该测试的成本。可重用性的程度取决于所进行的测试的类型。适合重用的最直接的测试类型是一致性测试,例如与美国国家标准协会/国家标准与技术协会(ANSI/NIST)或国际标准化组织(ISO)标准的一致性。这些测试通常是自动化的,并且完全可重复。使用技术测试方法的生物识别性能测试同样可重复,并且在给定一组固定的生物识别样本时易于重用。使用场景测试方法的生物识别性能测试是完全不同的,因为它本质上是不可重复的,因为使用的是人类测试对象,而且不容易重复使用。这些测试通常也很昂贵。有几个值得注意的测试程序的例子,其结果证明了可重用性。第一个也是最明显的一个可能是联邦调查局(FBI)附录F指纹图像质量认证,该认证由FBI支持,用于采购活体指纹设备。可重用测试有一些基本的先决条件。首先,需要就进行测试和报告结果的方法/程序达成一致。其次,方法必须是“开放的”,此外,产品必须由可信任的方进行测试。为了使可重用的测试工作,测试的参与者必须有意愿和权限来共享结果,并建立一个通用的集成级别。为了成功实现可重用性,必须具备传播信息的能力。美国政府(USG)已着手开发生物识别测试方法储存库,并成功完成了测试结果——“BITES”——生物识别跨部门测试和评估方案,以促进生物识别测试信息的高效和有效再利用。
{"title":"Biometric Interagency Testing & Evaluation Schema (BITES)","authors":"R. Lazarick","doi":"10.1109/THS.2012.6459907","DOIUrl":"https://doi.org/10.1109/THS.2012.6459907","url":null,"abstract":"This paper addresses the concepts of reusable biometric testing in a general sense, and then describes the US Government initiative to establish a mechanism to facilitate sharing of biometric testing information both within the government and with stakeholders. The fundamental motivation for promoting reuse of biometric testing information is to achieve cost avoidance. If a well defined test has been successfully completed and documented by a trusted party, then the results of that testing should be sufficient to allow other consumers of that product to rely on that test, and thereby avoid the cost of repeating that testing. The extent of reusability depends on the type of testing being conducted. The most straightforward type of testing suited for reuse are Conformance tests, such as conformance to American National Standards Institute/National Institute of Standards and Technology (ANSI/NIST) or International Organization for Standardization (ISO) standards. These tests are typically automated and are fully repeatable. Biometric Performance testing using the Technology Testing approach, is similarly repeatable and easily reused given a fixed set of biometric samples. Biometric Performance testing using the Scenario Testing approach is quite different in that it is inherently not repeatable due to the use of human test subjects, and not easily reusable. These tests are also typically expensive. There are several notable examples of testing programs for which the results have demonstrated reusability. One of the first and most visible may be the Federal Bureau of Investigation (FBI) Appendix F Certification of fingerprint image quality supported by the FBI for procurement of livescan fingerprint devices. There are fundamental prerequisites for reusable testing. First, there is a need for agreement on the method/procedure for conducting the testing and reporting the results. Secondly, the methods must be “Open”, and additionally, the product must be tested by a trusted party . In order for reusable testing to work, the participants in a test must have a willingness and the authority to share the results, and establish a common level of integration. In order for reusability to succeed, there must be a capability to disseminate the information. The United States Government (USG) has established an effort to develop a repository for biometrics test methods and successfully completed test results - “BITES” - Biometric Interagency Testing and Evaluation Schema, to promote efficient and effective reuse of biometric testing information.","PeriodicalId":355549,"journal":{"name":"2012 IEEE Conference on Technologies for Homeland Security (HST)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127258690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security in the cloud: Understanding the risks of cloud-as-a-service 云中的安全性:了解云即服务的风险
Pub Date : 2012-11-01 DOI: 10.1109/THS.2012.6459871
Chris Peake
Cloud services are susceptible to faults, failures, and attacks just like enterprise IT architectures, the difference is that when a cloud suffers an outage it can affect numerous customers. But cloud security is not just about accessibility and availability; it must also provide information integrity and confidentiality to assure effective business operations. Therefore, cloud-based services (i.e. SaaS, PaaS, and IaaS) will also have to provide resilient and fault tolerant resources at the application, platform, and infrastructure levels in order to assure cloud consumer mission objectives can be met. This will require the development of a new breed of security technologies that not only provide Information Assurance but also Mission Assurance.
与企业IT架构一样,云服务也容易受到故障、失败和攻击的影响,不同之处在于,当云遭受中断时,它可能会影响众多客户。但云安全不仅仅是可访问性和可用性;它还必须提供信息完整性和保密性,以确保有效的业务操作。因此,基于云的服务(即SaaS、PaaS和IaaS)还必须在应用程序、平台和基础设施级别提供弹性和容错资源,以确保能够满足云消费者的任务目标。这将需要开发一种新的安全技术,不仅提供信息保障,而且提供任务保障。
{"title":"Security in the cloud: Understanding the risks of cloud-as-a-service","authors":"Chris Peake","doi":"10.1109/THS.2012.6459871","DOIUrl":"https://doi.org/10.1109/THS.2012.6459871","url":null,"abstract":"Cloud services are susceptible to faults, failures, and attacks just like enterprise IT architectures, the difference is that when a cloud suffers an outage it can affect numerous customers. But cloud security is not just about accessibility and availability; it must also provide information integrity and confidentiality to assure effective business operations. Therefore, cloud-based services (i.e. SaaS, PaaS, and IaaS) will also have to provide resilient and fault tolerant resources at the application, platform, and infrastructure levels in order to assure cloud consumer mission objectives can be met. This will require the development of a new breed of security technologies that not only provide Information Assurance but also Mission Assurance.","PeriodicalId":355549,"journal":{"name":"2012 IEEE Conference on Technologies for Homeland Security (HST)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126120995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Bio-inspired Evolutionary Sensory system for Cyber-Physical System defense 用于网络物理系统防御的仿生进化传感系统
Pub Date : 2012-11-01 DOI: 10.1007/978-3-662-43616-5_2
M. Azab, M. Eltoweissy
{"title":"Bio-inspired Evolutionary Sensory system for Cyber-Physical System defense","authors":"M. Azab, M. Eltoweissy","doi":"10.1007/978-3-662-43616-5_2","DOIUrl":"https://doi.org/10.1007/978-3-662-43616-5_2","url":null,"abstract":"","PeriodicalId":355549,"journal":{"name":"2012 IEEE Conference on Technologies for Homeland Security (HST)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126156031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Comparison of commercial and next generation quantum key distribution: Technologies for secure communication of information 商业和下一代量子密钥分发的比较:信息安全通信技术
Pub Date : 2012-11-01 DOI: 10.1109/THS.2012.6459842
Lee Oesterling, Don Hayford, Georgeanne Friend
Battelle has been actively exploring emerging quantum key distribution (QKD) cryptographic technologies for secure communication of information with a goal of expanding the use of this technology by commercial enterprises in the United States. In QKD systems, the principles of quantum physics are applied to generate a secret data encryption key, which is distributed between two users. The security of this key is guaranteed by the laws of quantum physics, and this distributed key can be used to encrypt data to enable secure communication on insecure channels. To date, Battelle has studied commercially available and custom-built QKD systems in controlled laboratory environments and is actively working to establish a QKD Test Bed network to characterize performance in real world metropolitan (10-100 km) and long distance (>; 100 km) environments. All QKD systems that we have tested to date utilize a discrete variable (DV) binary approach. In this approach, discrete information is encoded onto a quantum state of a single photon, and binary data are measured using single photon detectors. Recently, continuous variable (CV) QKD systems have been developed and are expected to be commercially available shortly. In CV-QKD systems, randomly generated continuous variables are encoded on coherent states of weak pulses of light, and continuous data values are measured with homodyne detection methods. In certain applications for cyber security, the CV-QKD systems may offer advantages over traditional DV-QKD systems, such as a higher secret key exchange rate for short distances, lower cost, and compatibility with telecommunication technologies. In this paper, current CV- and DV-QKD approaches are described, and security issues and technical challenges fielding these quantum-based systems are discussed. Experimental and theoretical data that have been published on quantum key exchange rates and distances that are relevant to metropolitan and long distance network applications are presented. From an analysis of these data, the relative performance of the two approaches is compared as a function of distance and environment (free space and optical fiber). Additionally, current research activities are described for both technologies, which include network integration and methods to increase secret key distribution rates and distances.
巴特尔一直在积极探索用于信息安全通信的新兴量子密钥分发(QKD)加密技术,目标是扩大美国商业企业对该技术的使用。在QKD系统中,量子物理原理被应用于生成一个秘密的数据加密密钥,该密钥在两个用户之间分发。该密钥的安全性由量子物理定律保证,并且可以使用该分布式密钥对数据进行加密,从而在不安全的信道上实现安全通信。迄今为止,Battelle已经在受控的实验室环境中研究了商用和定制的QKD系统,并积极致力于建立QKD测试平台网络,以表征现实世界大都市(10-100公里)和长距离(>;100公里)的环境。迄今为止,我们测试过的所有QKD系统都使用离散变量(DV)二进制方法。在这种方法中,离散信息被编码到单光子的量子态上,二进制数据使用单光子探测器进行测量。最近,连续变量(CV) QKD系统已经开发出来,并有望很快投入商业使用。在CV-QKD系统中,随机生成的连续变量被编码在弱光脉冲的相干态上,连续数据值用同差检测方法测量。在网络安全的某些应用中,CV-QKD系统可能比传统的DV-QKD系统具有优势,例如短距离更高的密钥交换率、更低的成本以及与电信技术的兼容性。本文描述了当前的CV-和DV-QKD方法,并讨论了这些基于量子系统的安全问题和技术挑战。本文介绍了与城域和长途网络应用相关的量子密钥交换速率和距离的实验和理论数据。通过对这些数据的分析,比较了两种方法的相对性能作为距离和环境(自由空间和光纤)的函数。此外,本文还描述了这两种技术的当前研究活动,包括网络集成和增加密钥分发速率和距离的方法。
{"title":"Comparison of commercial and next generation quantum key distribution: Technologies for secure communication of information","authors":"Lee Oesterling, Don Hayford, Georgeanne Friend","doi":"10.1109/THS.2012.6459842","DOIUrl":"https://doi.org/10.1109/THS.2012.6459842","url":null,"abstract":"Battelle has been actively exploring emerging quantum key distribution (QKD) cryptographic technologies for secure communication of information with a goal of expanding the use of this technology by commercial enterprises in the United States. In QKD systems, the principles of quantum physics are applied to generate a secret data encryption key, which is distributed between two users. The security of this key is guaranteed by the laws of quantum physics, and this distributed key can be used to encrypt data to enable secure communication on insecure channels. To date, Battelle has studied commercially available and custom-built QKD systems in controlled laboratory environments and is actively working to establish a QKD Test Bed network to characterize performance in real world metropolitan (10-100 km) and long distance (>; 100 km) environments. All QKD systems that we have tested to date utilize a discrete variable (DV) binary approach. In this approach, discrete information is encoded onto a quantum state of a single photon, and binary data are measured using single photon detectors. Recently, continuous variable (CV) QKD systems have been developed and are expected to be commercially available shortly. In CV-QKD systems, randomly generated continuous variables are encoded on coherent states of weak pulses of light, and continuous data values are measured with homodyne detection methods. In certain applications for cyber security, the CV-QKD systems may offer advantages over traditional DV-QKD systems, such as a higher secret key exchange rate for short distances, lower cost, and compatibility with telecommunication technologies. In this paper, current CV- and DV-QKD approaches are described, and security issues and technical challenges fielding these quantum-based systems are discussed. Experimental and theoretical data that have been published on quantum key exchange rates and distances that are relevant to metropolitan and long distance network applications are presented. From an analysis of these data, the relative performance of the two approaches is compared as a function of distance and environment (free space and optical fiber). Additionally, current research activities are described for both technologies, which include network integration and methods to increase secret key distribution rates and distances.","PeriodicalId":355549,"journal":{"name":"2012 IEEE Conference on Technologies for Homeland Security (HST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123740034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
A compressed sensing approach for detection of explosive threats at standoff distances using a Passive Array of Scatters 一种利用无源散射阵在离地距离探测爆炸威胁的压缩感知方法
Pub Date : 2012-11-01 DOI: 10.1109/THS.2012.6459838
J. Martinez-Lorenzo, Y. Rodriguez-Vaqueiro, C. Rappaport, O. R. Lopez, A. Pino
This work presents a new radar system concept, working at millimeter wave frequencies, capable of detecting explosive related threats at standoff distances. The system consists of a two dimensional aperture of randomly distributed transmitting/receiving antenna elements, and a Passive Array of Scatters (PAS) positioned in the vicinity of the target. In addition, a novel norm one minimization imaging algorithm has been implemented that is capable of producing super-resolution images. This paper also includes a numerical example in which 7.5 mm resolution is achieved at the standoff range of 40 m for a working frequency of 60 GHz.
这项工作提出了一种新的雷达系统概念,工作在毫米波频率,能够在距离上探测与爆炸相关的威胁。该系统由随机分布的二维孔径发射/接收天线单元和定位在目标附近的无源散射体阵列(PAS)组成。此外,还实现了一种新的范数一最小化成像算法,该算法能够产生超分辨率图像。本文还包括一个数值例子,其中在40 m的距离范围内,在60 GHz的工作频率下实现了7.5 mm的分辨率。
{"title":"A compressed sensing approach for detection of explosive threats at standoff distances using a Passive Array of Scatters","authors":"J. Martinez-Lorenzo, Y. Rodriguez-Vaqueiro, C. Rappaport, O. R. Lopez, A. Pino","doi":"10.1109/THS.2012.6459838","DOIUrl":"https://doi.org/10.1109/THS.2012.6459838","url":null,"abstract":"This work presents a new radar system concept, working at millimeter wave frequencies, capable of detecting explosive related threats at standoff distances. The system consists of a two dimensional aperture of randomly distributed transmitting/receiving antenna elements, and a Passive Array of Scatters (PAS) positioned in the vicinity of the target. In addition, a novel norm one minimization imaging algorithm has been implemented that is capable of producing super-resolution images. This paper also includes a numerical example in which 7.5 mm resolution is achieved at the standoff range of 40 m for a working frequency of 60 GHz.","PeriodicalId":355549,"journal":{"name":"2012 IEEE Conference on Technologies for Homeland Security (HST)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122389635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Face recognition and learning via adaptive dictionaries 通过自适应字典进行人脸识别和学习
Pub Date : 2012-11-01 DOI: 10.1109/THS.2012.6459862
Katia Estabridis
This paper proposes an adaptive face recognition algorithm to jointly classify and learn from unlabeled data. It presents an efficient design that specifically addresses the case when only a single sample per person is available for training. A dictionary composed of regional descriptors serves as the basis for the recognition system while providing a flexible framework to augment or update dictionary atoms. The algorithm is based on l1 minimization techniques and the decision to update the dictionary is made in an unsupervised mode via non-parametric Bayes. The dictionary learning is done via reverse-OMP to select atoms that are orthogonal or near orthogonal to the current dictionary elements. The proposed algorithm was tested with two face databases showing the capability to handle illumination, scale, and some moderate pose and expression variations. Classification results as high as 96% were obtained with the Georgia Tech database and 94% correct classification rates for the Multi-PIE database for the frontal-view scenarios.
提出了一种自适应人脸识别算法,对未标记数据进行联合分类和学习。它提出了一种有效的设计,专门解决了每个人只有一个样本可用于培训的情况。由区域描述符组成的字典作为识别系统的基础,同时提供一个灵活的框架来增加或更新字典原子。该算法基于l1最小化技术,并通过非参数贝叶斯在无监督模式下做出更新字典的决定。字典学习通过反向omp完成,以选择与当前字典元素正交或接近正交的原子。该算法在两个人脸数据库中进行了测试,显示了处理光照、尺度以及一些适度的姿势和表情变化的能力。Georgia Tech数据库的分类结果高达96%,Multi-PIE数据库正面视图场景的分类正确率为94%。
{"title":"Face recognition and learning via adaptive dictionaries","authors":"Katia Estabridis","doi":"10.1109/THS.2012.6459862","DOIUrl":"https://doi.org/10.1109/THS.2012.6459862","url":null,"abstract":"This paper proposes an adaptive face recognition algorithm to jointly classify and learn from unlabeled data. It presents an efficient design that specifically addresses the case when only a single sample per person is available for training. A dictionary composed of regional descriptors serves as the basis for the recognition system while providing a flexible framework to augment or update dictionary atoms. The algorithm is based on l1 minimization techniques and the decision to update the dictionary is made in an unsupervised mode via non-parametric Bayes. The dictionary learning is done via reverse-OMP to select atoms that are orthogonal or near orthogonal to the current dictionary elements. The proposed algorithm was tested with two face databases showing the capability to handle illumination, scale, and some moderate pose and expression variations. Classification results as high as 96% were obtained with the Georgia Tech database and 94% correct classification rates for the Multi-PIE database for the frontal-view scenarios.","PeriodicalId":355549,"journal":{"name":"2012 IEEE Conference on Technologies for Homeland Security (HST)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122634943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multimodal biometric collection and evaluation architecture 多模态生物特征收集和评估架构
Pub Date : 2012-11-01 DOI: 10.1109/THS.2012.6459826
J. Lacirignola, P. Pomianowski, D. Ricke, D. Strom, E. Wack
The size and scope of standoff multimodal biometric datasets can be increased through the adoption of a common architecture to collect, describe, archive, and analyze subject traits. The Extendable Multimodal Biometric Evaluation Range (EMBER) system developed by MIT Lincoln Laboratory is a field-ready, easily adaptable architecture to streamline collections requiring multiple biometric devices in environments of interest. Its data architecture includes a fully featured metadata-rich relational database that supports the aggregation of biometric data collected with proliferated systems into a single corpus for analytical use.
通过采用通用架构来收集、描述、归档和分析主体特征,可以增加多模态生物特征数据集的规模和范围。麻省理工学院林肯实验室开发的可扩展多模态生物识别评估范围(EMBER)系统是一种现场就绪的,易于适应的架构,可以在感兴趣的环境中简化需要多种生物识别设备的收集。它的数据架构包括一个功能齐全的元数据丰富的关系数据库,该数据库支持将增殖系统收集的生物识别数据聚合到单个语料库中以供分析使用。
{"title":"Multimodal biometric collection and evaluation architecture","authors":"J. Lacirignola, P. Pomianowski, D. Ricke, D. Strom, E. Wack","doi":"10.1109/THS.2012.6459826","DOIUrl":"https://doi.org/10.1109/THS.2012.6459826","url":null,"abstract":"The size and scope of standoff multimodal biometric datasets can be increased through the adoption of a common architecture to collect, describe, archive, and analyze subject traits. The Extendable Multimodal Biometric Evaluation Range (EMBER) system developed by MIT Lincoln Laboratory is a field-ready, easily adaptable architecture to streamline collections requiring multiple biometric devices in environments of interest. Its data architecture includes a fully featured metadata-rich relational database that supports the aggregation of biometric data collected with proliferated systems into a single corpus for analytical use.","PeriodicalId":355549,"journal":{"name":"2012 IEEE Conference on Technologies for Homeland Security (HST)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128258921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2012 IEEE Conference on Technologies for Homeland Security (HST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1