首页 > 最新文献

MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)最新文献

英文 中文
Cooperative UAV Jammer for Enhancing Physical Layer Security: Robust Design for Jamming Power and Trajectory 增强物理层安全性的协同型无人机干扰机:干扰功率和轨迹的鲁棒设计
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9021084
Yujung Roh, Seungjae Jung, Joonhyuk Kang
An unmanned aerial vehicle (UAV)-aided network is becoming a promising application for the future wireless communication due to the flexible deployment and dominant line-of-sight channel. In this paper, we consider the UAV is operated as a cooperative jammer to enhance the physical layer security of the ground legitimated nodes in the presence of an eavesdropper (Eve). Furthermore, we assume that the UAV has imperfect information on the locations of the receiver and Eve due to GPS jamming and covert operation of Eve, respectively. With these uncertainties of the nodes' locations, we formulate a robust joint optimization problem of the UAV's jamming power and trajectory to maximize the average secrecy rate. To handle the non-convexity of the optimization problem, we propose an iterative suboptimal algorithm based on the block coordinate descent method. Simulation results present that the proposed algorithm has outstanding performance in terms of physical layer security compared to other benchmark methods.
无人机辅助网络由于其部署灵活、视距信道优势等优点,正成为未来无线通信的重要应用领域。在本文中,我们考虑将无人机作为一个协作干扰器来运行,以增强地面合法节点在窃听者(Eve)存在下的物理层安全性。进一步,我们假设由于GPS干扰和Eve的隐蔽行动,无人机对接收机和Eve的位置信息不完全。针对节点位置的不确定性,提出了以平均保密率最大化为目标的无人机干扰功率和轨迹鲁棒联合优化问题。针对优化问题的非凸性,提出了一种基于块坐标下降法的迭代次优算法。仿真结果表明,与其他基准方法相比,该算法在物理层安全性方面具有突出的性能。
{"title":"Cooperative UAV Jammer for Enhancing Physical Layer Security: Robust Design for Jamming Power and Trajectory","authors":"Yujung Roh, Seungjae Jung, Joonhyuk Kang","doi":"10.1109/MILCOM47813.2019.9021084","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9021084","url":null,"abstract":"An unmanned aerial vehicle (UAV)-aided network is becoming a promising application for the future wireless communication due to the flexible deployment and dominant line-of-sight channel. In this paper, we consider the UAV is operated as a cooperative jammer to enhance the physical layer security of the ground legitimated nodes in the presence of an eavesdropper (Eve). Furthermore, we assume that the UAV has imperfect information on the locations of the receiver and Eve due to GPS jamming and covert operation of Eve, respectively. With these uncertainties of the nodes' locations, we formulate a robust joint optimization problem of the UAV's jamming power and trajectory to maximize the average secrecy rate. To handle the non-convexity of the optimization problem, we propose an iterative suboptimal algorithm based on the block coordinate descent method. Simulation results present that the proposed algorithm has outstanding performance in terms of physical layer security compared to other benchmark methods.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127228598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Practical Radio Frequency Learning for Future Wireless Communication Systems 未来无线通信系统的实用射频学习
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020807
D. Adesina, J. Bassey, Lijun Qian
In future wireless systems, intelligent capabilities are of utmost importance. To efficiently utilize resources, communication systems require knowledge of the prevalent situation in a frequency band through learning. To learn appropriately, it is critical for practitioners to select the right parameters in building learning models, use the appropriate algorithms and performance evaluation methods. In this paper, we evaluate the performance of some deep learning models compared to other machine learning methods, explore the different scenarios in which deep learning can be used for radio frequency (RF) monitoring, and evaluate performance in the various scenarios. Our work looks at the best practices and procedures for developing intelligent RF Learning. Specifically, we analysed over-the-air RF dataset collected from a USRP-based testbed to identify the number of interfering devices as a case study. From the obtained results, we discuss how Signal-to-Noise Ratio (SNR) selection for training affects the model performance as it relates to practical implementation of Deep Learning in communications systems.
在未来的无线系统中,智能能力是至关重要的。为了有效地利用资源,通信系统需要通过学习了解某一频段的流行情况。为了正确地学习,从业者在构建学习模型时选择正确的参数,使用适当的算法和性能评估方法至关重要。在本文中,我们评估了一些深度学习模型与其他机器学习方法的性能,探索了将深度学习用于射频(RF)监测的不同场景,并评估了各种场景下的性能。我们的工作着眼于开发智能射频学习的最佳实践和程序。具体来说,我们分析了从基于usrp的测试平台收集的无线射频数据集,以确定干扰设备的数量作为案例研究。根据获得的结果,我们讨论了训练的信噪比(SNR)选择如何影响模型性能,因为它与通信系统中深度学习的实际实施有关。
{"title":"Practical Radio Frequency Learning for Future Wireless Communication Systems","authors":"D. Adesina, J. Bassey, Lijun Qian","doi":"10.1109/MILCOM47813.2019.9020807","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020807","url":null,"abstract":"In future wireless systems, intelligent capabilities are of utmost importance. To efficiently utilize resources, communication systems require knowledge of the prevalent situation in a frequency band through learning. To learn appropriately, it is critical for practitioners to select the right parameters in building learning models, use the appropriate algorithms and performance evaluation methods. In this paper, we evaluate the performance of some deep learning models compared to other machine learning methods, explore the different scenarios in which deep learning can be used for radio frequency (RF) monitoring, and evaluate performance in the various scenarios. Our work looks at the best practices and procedures for developing intelligent RF Learning. Specifically, we analysed over-the-air RF dataset collected from a USRP-based testbed to identify the number of interfering devices as a case study. From the obtained results, we discuss how Signal-to-Noise Ratio (SNR) selection for training affects the model performance as it relates to practical implementation of Deep Learning in communications systems.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130386886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Application of Trust Assessment Techniques to IoBT Systems 信任评估技术在IoBT系统中的应用
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020774
Ioannis Agadakos, Gabriela F. Cretu-Ciocarlie, Bogdan Copos, M. Emmi, Jemin George, Nandi O. Leslie, James R. Michaelis
Continued advances in IoT technology have prompted new investigation into its usage for military operations, both to augment and complement existing military sensing assets and support next-generation artificial intelligence and machine learning systems. Under the emerging Internet of Battlefield Things (IoBT) paradigm, current operational conditions necessitate the development of novel security techniques, centered on establishment of trust for individual assets and supporting resilience of broader systems. To advance current IoBT efforts, a collection of prior-developed cybersecurity techniques is reviewed for applicability to conditions presented by IoBT operational environments (e.g., diverse asset ownership, degraded networking infrastructure, adversary activities) through use of supporting case study examples. The research techniques covered focus on two themes: (1) Supporting trust assessment for known/unknown IoT assets; (2) ensuring continued trust of known IoT assets and IoBT systems.
物联网技术的持续进步促使人们对其在军事行动中的应用进行了新的调查,以增强和补充现有的军事传感资产,并支持下一代人工智能和机器学习系统。在新兴的战场物联网(IoBT)范式下,当前的作战条件需要开发新的安全技术,以建立对单个资产的信任和支持更广泛系统的弹性为中心。为了推进当前的IoBT工作,通过使用支持性案例研究示例,审查了一系列先前开发的网络安全技术,以适应IoBT操作环境(例如,多样化的资产所有权,降级的网络基础设施,对手活动)所呈现的条件。所涵盖的研究技术主要集中在两个主题上:(1)支持对已知/未知物联网资产的信任评估;(2)确保对已知物联网资产和物联网系统的持续信任。
{"title":"Application of Trust Assessment Techniques to IoBT Systems","authors":"Ioannis Agadakos, Gabriela F. Cretu-Ciocarlie, Bogdan Copos, M. Emmi, Jemin George, Nandi O. Leslie, James R. Michaelis","doi":"10.1109/MILCOM47813.2019.9020774","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020774","url":null,"abstract":"Continued advances in IoT technology have prompted new investigation into its usage for military operations, both to augment and complement existing military sensing assets and support next-generation artificial intelligence and machine learning systems. Under the emerging Internet of Battlefield Things (IoBT) paradigm, current operational conditions necessitate the development of novel security techniques, centered on establishment of trust for individual assets and supporting resilience of broader systems. To advance current IoBT efforts, a collection of prior-developed cybersecurity techniques is reviewed for applicability to conditions presented by IoBT operational environments (e.g., diverse asset ownership, degraded networking infrastructure, adversary activities) through use of supporting case study examples. The research techniques covered focus on two themes: (1) Supporting trust assessment for known/unknown IoT assets; (2) ensuring continued trust of known IoT assets and IoBT systems.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128026837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pub/Sub-Sum: A Content Summarization Pub/Sub Protocol for Information-Centric Networks Pub/Sub- sum:信息中心网络的内容摘要Pub/Sub协议
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020777
Jongdeog Lee, Suk Min Hwang, T. Abdelzaher, K. Marcus, K. Chan
In an age of data overload and scenarios that require fast-distributed situational understanding, we envision that content summarization services will become a critical capability of underlying networked systems. Previous work, called InfoMax, proposed such a service in the transport layer to minimize semantic redundancy of transmitted content and maximize information coverage. Here, we extended this work in three ways. First, we adapted summarization to the needs of streaming content and developed a corresponding publish-subscribe protocol (called Pub/Sub-Sum) with on-the-fly extractive summarization of continuous content streams (as opposed to extractive summarization of fixed data sets). Next, we supported many-to-many communication between publishers and subscribers, as opposed to InfoMax, which was designed to disseminate data from one producer to multiple consumers. Lastly, we introduce a new type of congestion handling mechanism that adaptively controls the level of summarization by considering available network bandwidth. We conducted experiments for functionality and performance on Mininet (a network emulator) and on a real device testbed. Evaluation results indicated that the new protocol summarizes data appropriately to available network resources, offering an improved compromise between received data quality and resource consumption.
在数据过载和需要快速分布式情景理解的场景的时代,我们设想内容摘要服务将成为底层网络系统的关键功能。以前的工作,称为InfoMax,在传输层提出了这样的服务,以最小化传输内容的语义冗余并最大化信息覆盖。在这里,我们以三种方式扩展了这项工作。首先,我们根据流内容的需求调整了摘要,并开发了相应的发布-订阅协议(称为Pub/Sub-Sum),对连续内容流进行动态提取摘要(与固定数据集的提取摘要相反)。接下来,我们支持发布者和订阅者之间的多对多通信,这与InfoMax相反,InfoMax旨在将数据从一个生产者传播到多个消费者。最后,我们引入了一种新型的拥塞处理机制,该机制通过考虑可用的网络带宽自适应地控制汇总级别。我们在Mininet(一个网络模拟器)和一个真实的设备测试台上进行了功能和性能实验。评估结果表明,新协议恰当地将数据汇总到可用的网络资源中,在接收数据质量和资源消耗之间提供了更好的折衷。
{"title":"Pub/Sub-Sum: A Content Summarization Pub/Sub Protocol for Information-Centric Networks","authors":"Jongdeog Lee, Suk Min Hwang, T. Abdelzaher, K. Marcus, K. Chan","doi":"10.1109/MILCOM47813.2019.9020777","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020777","url":null,"abstract":"In an age of data overload and scenarios that require fast-distributed situational understanding, we envision that content summarization services will become a critical capability of underlying networked systems. Previous work, called InfoMax, proposed such a service in the transport layer to minimize semantic redundancy of transmitted content and maximize information coverage. Here, we extended this work in three ways. First, we adapted summarization to the needs of streaming content and developed a corresponding publish-subscribe protocol (called Pub/Sub-Sum) with on-the-fly extractive summarization of continuous content streams (as opposed to extractive summarization of fixed data sets). Next, we supported many-to-many communication between publishers and subscribers, as opposed to InfoMax, which was designed to disseminate data from one producer to multiple consumers. Lastly, we introduce a new type of congestion handling mechanism that adaptively controls the level of summarization by considering available network bandwidth. We conducted experiments for functionality and performance on Mininet (a network emulator) and on a real device testbed. Evaluation results indicated that the new protocol summarizes data appropriately to available network resources, offering an improved compromise between received data quality and resource consumption.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133700100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experiments with a Queuing Mechanism over Ever-Changing Data Rates in a VHF Network VHF网络中不断变化数据速率的排队机制实验
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020863
R. Lopes, Pooja Hanavadi Balaraju, Adrián Toribio Silva, Paulo H. L. Rettore, P. Sevenich
In this paper, we discuss experimental results testing a hierarchy of queues controlling the user data-flow over a VHF network with ever-changing data rates (up to 9.6 kbps). We challenged our solution creating three patterns of ever-changing data rates using a stochastic model to include the element of chance (randomness) that can be reproduced for quantitative comparisons. We discuss numbers showing that our queuing mechanism adapts its behavior (i.e. shaping the user data-flow) to the network conditions using feedback from the radio buffer (reactive) and from the routing protocol (proactive). Thus, our hybrid solution monitors the radio buffer occupancy to pause the transmission when a threshold is crossed, and proactively adds an inter-packet interval (IPI). The IPI varies as a function of the link data rate (computed by a tactical router), current network usage, packet loss and latency. The experimental results show three queues (for messages, IP packets and the radio buffer) complementing each other to handle different network conditions while transmitting a message that surely overflows the radio buffer (four times the buffer size).
在本文中,我们讨论了在数据速率不断变化(高达9.6 kbps)的VHF网络上测试控制用户数据流的队列层次结构的实验结果。我们对我们的解决方案进行了挑战,使用随机模型创建了三种不断变化的数据速率模式,其中包括可以用于定量比较的机会元素(随机性)。我们讨论了显示我们的排队机制使用来自无线电缓冲区(被动)和路由协议(主动)的反馈来适应其行为(即塑造用户数据流)的网络条件的数字。因此,我们的混合解决方案监视无线电缓冲区占用情况,以便在超过阈值时暂停传输,并主动添加包间间隔(IPI)。IPI随链路数据速率(由战术路由器计算)、当前网络使用、数据包丢失和延迟的函数而变化。实验结果表明,三个队列(用于消息、IP数据包和无线电缓冲区)相互补充,以处理不同的网络条件,同时传输一定会溢出无线电缓冲区(缓冲区大小的四倍)的消息。
{"title":"Experiments with a Queuing Mechanism over Ever-Changing Data Rates in a VHF Network","authors":"R. Lopes, Pooja Hanavadi Balaraju, Adrián Toribio Silva, Paulo H. L. Rettore, P. Sevenich","doi":"10.1109/MILCOM47813.2019.9020863","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020863","url":null,"abstract":"In this paper, we discuss experimental results testing a hierarchy of queues controlling the user data-flow over a VHF network with ever-changing data rates (up to 9.6 kbps). We challenged our solution creating three patterns of ever-changing data rates using a stochastic model to include the element of chance (randomness) that can be reproduced for quantitative comparisons. We discuss numbers showing that our queuing mechanism adapts its behavior (i.e. shaping the user data-flow) to the network conditions using feedback from the radio buffer (reactive) and from the routing protocol (proactive). Thus, our hybrid solution monitors the radio buffer occupancy to pause the transmission when a threshold is crossed, and proactively adds an inter-packet interval (IPI). The IPI varies as a function of the link data rate (computed by a tactical router), current network usage, packet loss and latency. The experimental results show three queues (for messages, IP packets and the radio buffer) complementing each other to handle different network conditions while transmitting a message that surely overflows the radio buffer (four times the buffer size).","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134352252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Joint Flocking and Deconfliction in Unmanned Aerial Vehicle Swarms 无人机蜂群的联合群集与去冲突
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020935
Srijita Mukherjee, K. Namuduri
Flocking and deconfliction are two important functional aspects of swarms. Flocking in Unmanned Aerial Vehicle (UAV) swarms refers to UAVs flying in a pattern whereas deconfliction refers to collision avoidance. Flocking enables communications and information sharing among neighbors. This paper presents a distributed model and establishes the necessary control laws for joint flocking and deconfliction. The proposed model and control laws are developed based on the principles of consensus-building and social potential functions. Experiments with promising results are presented to support the derived model.
群集和去冲突是群体的两个重要功能方面。在无人机(UAV)群体中,蜂群是指无人机按照一定的模式飞行,而去冲突是指避免碰撞。集群使邻居之间能够进行通信和信息共享。本文提出了一个分布式模型,并建立了联合群集和消除冲突的必要控制律。拟议的模型和控制法是根据建立共识和社会潜在功能的原则制定的。实验结果表明,所建立的模型是可靠的。
{"title":"Joint Flocking and Deconfliction in Unmanned Aerial Vehicle Swarms","authors":"Srijita Mukherjee, K. Namuduri","doi":"10.1109/MILCOM47813.2019.9020935","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020935","url":null,"abstract":"Flocking and deconfliction are two important functional aspects of swarms. Flocking in Unmanned Aerial Vehicle (UAV) swarms refers to UAVs flying in a pattern whereas deconfliction refers to collision avoidance. Flocking enables communications and information sharing among neighbors. This paper presents a distributed model and establishes the necessary control laws for joint flocking and deconfliction. The proposed model and control laws are developed based on the principles of consensus-building and social potential functions. Experiments with promising results are presented to support the derived model.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133104536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoTSpot: Identifying the IoT Devices Using their Anonymous Network Traffic Data IoT spot:使用匿名网络流量数据识别物联网设备
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020977
Liangdong Deng, Yuzhou Feng, Dong Chen, N. Rishe
The Internet of Things (IoT) has been erupting the world widely over the decade. Smart home owners and smart building managers are increasingly deploying IoT devices to monitor and control their environments due to the rapid decline in the price of IoT devices. The network traffic data produced by these IoT devices are collected by Internet Service Providers (ISPs) and telecom providers, and often shared with third-parties to maintain and promote user services. Such network traffic data is considered “anonymous” if it is not associated with identifying device information, e.g., MAC address and DHCP negotiation. Extensive prior work has shown that IoT devices are vulnerable to multiple cyber attacks. However, people do not believe that these attacks can be launched successfully without the knowledge of what IoT devices are deployed in their houses. Our key insight is that the network traffic data is not anonymous: IoT devices have unique network traffic patterns, and they embedded detailed device information. To explore the severity and extent of this privacy threat, we design IoTSpot to identify the IoT devices using their “anonymous” network traffic data. We evaluate IoTSpot on publicly-available network traffic data from 3 homes. We find that IoTSpot is able to identify 19 IoT devices with F1 accuracy of 0.984. More importantly, our approach only requires very limited data for training, as few as 40 minutes. IoTSpot paves the way for operators of smart homes and smart buildings to monitor the functionality, security and privacy threat without requiring any additional devices.
近十年来,物联网(IoT)在世界范围内广泛爆发。由于物联网设备价格的快速下降,智能家居业主和智能建筑管理人员越来越多地部署物联网设备来监控和控制他们的环境。这些物联网设备产生的网络流量数据由互联网服务提供商(isp)和电信提供商收集,并经常与第三方共享,以维护和促进用户服务。这样的网络流量数据被认为是“匿名的”,如果它不与识别设备信息相关联,例如,MAC地址和DHCP协商。之前的大量工作表明,物联网设备容易受到多种网络攻击。然而,人们不相信这些攻击可以在不知道他们家里部署了什么物联网设备的情况下成功发起。我们的关键见解是,网络流量数据不是匿名的:物联网设备具有独特的网络流量模式,并且它们嵌入了详细的设备信息。为了探索这种隐私威胁的严重性和程度,我们设计了IoTSpot来识别物联网设备,使用它们的“匿名”网络流量数据。我们对来自3个家庭的公开可用网络流量数据进行了IoTSpot评估。我们发现,IoTSpot能够识别19个物联网设备,F1准确率为0.984。更重要的是,我们的方法只需要非常有限的训练数据,少到40分钟。IoTSpot为智能家居和智能建筑运营商监控功能、安全和隐私威胁铺平了道路,而无需任何额外的设备。
{"title":"IoTSpot: Identifying the IoT Devices Using their Anonymous Network Traffic Data","authors":"Liangdong Deng, Yuzhou Feng, Dong Chen, N. Rishe","doi":"10.1109/MILCOM47813.2019.9020977","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020977","url":null,"abstract":"The Internet of Things (IoT) has been erupting the world widely over the decade. Smart home owners and smart building managers are increasingly deploying IoT devices to monitor and control their environments due to the rapid decline in the price of IoT devices. The network traffic data produced by these IoT devices are collected by Internet Service Providers (ISPs) and telecom providers, and often shared with third-parties to maintain and promote user services. Such network traffic data is considered “anonymous” if it is not associated with identifying device information, e.g., MAC address and DHCP negotiation. Extensive prior work has shown that IoT devices are vulnerable to multiple cyber attacks. However, people do not believe that these attacks can be launched successfully without the knowledge of what IoT devices are deployed in their houses. Our key insight is that the network traffic data is not anonymous: IoT devices have unique network traffic patterns, and they embedded detailed device information. To explore the severity and extent of this privacy threat, we design IoTSpot to identify the IoT devices using their “anonymous” network traffic data. We evaluate IoTSpot on publicly-available network traffic data from 3 homes. We find that IoTSpot is able to identify 19 IoT devices with F1 accuracy of 0.984. More importantly, our approach only requires very limited data for training, as few as 40 minutes. IoTSpot paves the way for operators of smart homes and smart buildings to monitor the functionality, security and privacy threat without requiring any additional devices.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131035577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Evaluating Usability of Permissioned Blockchain for Internet-of-Battlefield Things Security 评估许可区块链用于战场物联网安全的可用性
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020736
Erick D. Buenrostro, Abel O. Gomez Rivera, Deepak K. Tosh, Jaime C. Acosta, L. Njilla
Military technology is ever-evolving to increase the safety and security of soldiers on the field while integrating Internet-of-Things solutions to improve operational efficiency in mission oriented tasks in the battlefield. Centralized communication technology is the traditional network model used for battlefields and is vulnerable to denial of service attacks, therefore suffers performance hazards. They also lead to a central point of failure, due to which, a flexible model that is mobile, resilient, and effective for different scenarios must be proposed. Blockchain offers a distributed platform that allows multiple nodes to update a distributed ledger in a tamper-resistant manner. The decentralized nature of this system suggests that it can be an effective tool for battlefields in securing data communication among Internet-of-Battlefield Things (IoBT). In this paper, we integrate a permissioned blockchain, namely Hyperledger Sawtooth, in IoBT context and evaluate its performance with the goal of determining whether it has the potential to serve the performance needs of IoBT environment. Using different testing parameters, the metric data would help in suggesting the best parameter set, network configuration and blockchain usability views in IoBT context. We show that a blockchain-integrated IoBT platform has heavy dependency on the characteristics of the underlying network such as topology, link bandwidth, jitter, and other communication configurations, that can be tuned up to achieve optimal performance.
军事技术不断发展,以提高战场上士兵的安全和保障,同时集成物联网解决方案,以提高战场上任务导向任务的作战效率。集中式通信技术是战场上使用的传统网络模式,容易受到拒绝服务攻击,存在性能隐患。它们还会导致中心故障点,因此,必须提出一种灵活的模型,该模型具有可移动性、弹性和对不同场景有效。区块链提供了一个分布式平台,允许多个节点以防篡改的方式更新分布式账本。这个系统的分散性质表明,它可以是一种有效的工具,战场在保障数据通信Internet-of-Battlefield事情(IoBT)。在本文中,我们在IoBT环境中集成了一个被许可的区块链,即Hyperledger Sawtooth,并评估其性能,目的是确定它是否有潜力满足IoBT环境的性能需求。使用不同的测试参数,度量数据将有助于在IoBT上下文中建议最佳参数集、网络配置和区块链可用性视图。我们表明,区块链集成的IoBT平台严重依赖底层网络的特征,如拓扑、链路带宽、抖动和其他通信配置,这些特征可以进行调整以实现最佳性能。
{"title":"Evaluating Usability of Permissioned Blockchain for Internet-of-Battlefield Things Security","authors":"Erick D. Buenrostro, Abel O. Gomez Rivera, Deepak K. Tosh, Jaime C. Acosta, L. Njilla","doi":"10.1109/MILCOM47813.2019.9020736","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020736","url":null,"abstract":"Military technology is ever-evolving to increase the safety and security of soldiers on the field while integrating Internet-of-Things solutions to improve operational efficiency in mission oriented tasks in the battlefield. Centralized communication technology is the traditional network model used for battlefields and is vulnerable to denial of service attacks, therefore suffers performance hazards. They also lead to a central point of failure, due to which, a flexible model that is mobile, resilient, and effective for different scenarios must be proposed. Blockchain offers a distributed platform that allows multiple nodes to update a distributed ledger in a tamper-resistant manner. The decentralized nature of this system suggests that it can be an effective tool for battlefields in securing data communication among Internet-of-Battlefield Things (IoBT). In this paper, we integrate a permissioned blockchain, namely Hyperledger Sawtooth, in IoBT context and evaluate its performance with the goal of determining whether it has the potential to serve the performance needs of IoBT environment. Using different testing parameters, the metric data would help in suggesting the best parameter set, network configuration and blockchain usability views in IoBT context. We show that a blockchain-integrated IoBT platform has heavy dependency on the characteristics of the underlying network such as topology, link bandwidth, jitter, and other communication configurations, that can be tuned up to achieve optimal performance.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115086299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multiple Machine Learning Algorithms Comparison for Modulation Type Classification for Efficient Cognitive Radio 高效认知无线电调制类型分类的多机器学习算法比较
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020735
Inna Valieva, M. Björkman, J. Åkerberg, Mikael Ekström, I. Voitenko
In this paper the potential of improving channel utilization by signal modulation type classification based on machine learning algorithms has been studied. The classification has been performed between two popular digital modulations: BPSK and FSK in target application. Classification was based on three features available on a popular software defined radio transceiver AD9361: In-phase and quadrature components of the digital time domain signal and signal-to-noise ratio (SNR), measured as RSSI value. Data used for network training, validation and testing was generated by the Simulink model consisting mainly of modulator, transceiver AD9361 and AWGN to generate the signal with SNR ranging from 1 to 30 dB. Twenty-three supervised machine learning algorithms including K-nearest neighbor, Support Vector Machines, Decision Trees and Ensembles have been studied, evaluated and verified against the target application's requirements in terms of classification accuracy and speed. The highest average classification accuracy of 86.9% was achieved by Support Vector Machines with Fine Gaussian kernel, however with demonstrated classification speed of 790 objects per second it was considered unable to meet target application's real-time operation requirement of 2000 objects per second. Fine Decision Trees and Ensemble Boosted Trees have shown optimal performance in terms of both reaching classification speed of 1200000 objects per second and average classification accuracy of 86.0% and 86.3% respectively. Classification accuracy has been also studied as a function of SNR to determine the most accurate classifier for each SNR level. At the target application's demodulation threshold of 12 dB 87.0% classification accuracy has been observed for the Fine Decision Trees, 87.5% for both Fine Gaussian SVM and Coarse KNN. At SNR higher than 27 dB Fine Trees, Coarse KNN have reached 97.5% classification accuracy. The effects of data set size and number of classification features on classification speed and accuracy have been studied too.
本文研究了基于机器学习算法的信号调制类型分类提高信道利用率的潜力。分类之间进行了两种流行的数字调制:BPSK和FSK在目标应用。分类基于流行的软件定义无线电收发器AD9361的三个特征:数字时域信号的同相分量和正交分量以及以RSSI值测量的信噪比(SNR)。用于网络训练、验证和测试的数据由Simulink模型生成,该模型主要由调制器、收发器AD9361和AWGN组成,产生信噪比为1 ~ 30db的信号。针对目标应用在分类精度和速度方面的要求,研究、评估和验证了23种监督机器学习算法,包括k近邻、支持向量机、决策树和集成。采用细高斯核的支持向量机的平均分类准确率最高,达到86.9%,但其显示的分类速度为每秒790个对象,被认为无法满足目标应用每秒2000个对象的实时运行要求。Fine Decision Trees和Ensemble boosting Trees在分类速度达到每秒120万个对象、平均分类准确率分别达到86.0%和86.3%方面表现出了最优的性能。分类精度也作为信噪比的函数进行了研究,以确定每个信噪比水平下最准确的分类器。在目标应用程序的解调阈值为12 dB时,精细决策树的分类准确率为87.0%,精细高斯支持向量机和粗KNN的分类准确率均为87.5%。在信噪比高于27 dB Fine Trees的情况下,粗KNN的分类准确率达到97.5%。研究了数据集大小和分类特征数量对分类速度和准确率的影响。
{"title":"Multiple Machine Learning Algorithms Comparison for Modulation Type Classification for Efficient Cognitive Radio","authors":"Inna Valieva, M. Björkman, J. Åkerberg, Mikael Ekström, I. Voitenko","doi":"10.1109/MILCOM47813.2019.9020735","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020735","url":null,"abstract":"In this paper the potential of improving channel utilization by signal modulation type classification based on machine learning algorithms has been studied. The classification has been performed between two popular digital modulations: BPSK and FSK in target application. Classification was based on three features available on a popular software defined radio transceiver AD9361: In-phase and quadrature components of the digital time domain signal and signal-to-noise ratio (SNR), measured as RSSI value. Data used for network training, validation and testing was generated by the Simulink model consisting mainly of modulator, transceiver AD9361 and AWGN to generate the signal with SNR ranging from 1 to 30 dB. Twenty-three supervised machine learning algorithms including K-nearest neighbor, Support Vector Machines, Decision Trees and Ensembles have been studied, evaluated and verified against the target application's requirements in terms of classification accuracy and speed. The highest average classification accuracy of 86.9% was achieved by Support Vector Machines with Fine Gaussian kernel, however with demonstrated classification speed of 790 objects per second it was considered unable to meet target application's real-time operation requirement of 2000 objects per second. Fine Decision Trees and Ensemble Boosted Trees have shown optimal performance in terms of both reaching classification speed of 1200000 objects per second and average classification accuracy of 86.0% and 86.3% respectively. Classification accuracy has been also studied as a function of SNR to determine the most accurate classifier for each SNR level. At the target application's demodulation threshold of 12 dB 87.0% classification accuracy has been observed for the Fine Decision Trees, 87.5% for both Fine Gaussian SVM and Coarse KNN. At SNR higher than 27 dB Fine Trees, Coarse KNN have reached 97.5% classification accuracy. The effects of data set size and number of classification features on classification speed and accuracy have been studied too.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122960316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards Mature Federated Cyber Incident Management and Information Sharing Capabilities in NATO and NATO Nations 迈向成熟的北约和北约国家联合网络事件管理和信息共享能力
Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020814
Sarah Brown, Tamsin Moye, Rob Hubertse, Cezar Glăvan
For the past decade, cyber security teams around the world have recognized the growing importance of sharing cyber security information. Data regarding recently discovered vulnerabilities, cyber threats, and cyber incident information has been recognized as vital for cyber security teams to stay resilient in the face of the ever-changing threat landscape. This paper introduces federated cyber incident management and cyber information sharing requirements for NATO and Nations and highlights the Cyber Information and Incident Coordination System (CIICS), developed in the Multinational Cyber Defence Capability Development (MN CD2) Smart Defence program, designed specifically to address such requirements.
在过去的十年中,世界各地的网络安全团队已经认识到共享网络安全信息的重要性日益增加。有关最近发现的漏洞、网络威胁和网络事件信息的数据已被认为是网络安全团队在面对不断变化的威胁环境时保持弹性的关键。本文介绍了北约和各国的联合网络事件管理和网络信息共享要求,并重点介绍了在多国网络防御能力发展(MN CD2)智能防御计划中开发的网络信息和事件协调系统(CIICS),该系统专门设计用于满足此类要求。
{"title":"Towards Mature Federated Cyber Incident Management and Information Sharing Capabilities in NATO and NATO Nations","authors":"Sarah Brown, Tamsin Moye, Rob Hubertse, Cezar Glăvan","doi":"10.1109/MILCOM47813.2019.9020814","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020814","url":null,"abstract":"For the past decade, cyber security teams around the world have recognized the growing importance of sharing cyber security information. Data regarding recently discovered vulnerabilities, cyber threats, and cyber incident information has been recognized as vital for cyber security teams to stay resilient in the face of the ever-changing threat landscape. This paper introduces federated cyber incident management and cyber information sharing requirements for NATO and Nations and highlights the Cyber Information and Incident Coordination System (CIICS), developed in the Multinational Cyber Defence Capability Development (MN CD2) Smart Defence program, designed specifically to address such requirements.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121932474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1