首页 > 最新文献

ACM Transactions on Cyber-Physical Systems (TCPS)最新文献

英文 中文
Introduction to the Special Section on Selected Papers from ICCPS 2021 ICCPS 2021论文精选专题介绍
Pub Date : 2022-10-31 DOI: 10.1145/3564157
M. A. Al Faruque, Meeko Oishi
The articles in this special section are based on selected papers presented at the 2021 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS 2021), a premier single-track conference that promotes development of fundamental principles that underpin the integration of cyber and physical elements, as well as the development of technologies, tools, architectures, and infrastructure for the design and implementation of CPS. ICCPS 2021 focused on contributions related to smart and connected cities, autonomous CPS, verification and control, security and privacy, and human health and biomedical CPS.
本专题部分的文章基于2021年ACM/IEEE网络物理系统国际会议(ICCPS 2021)上发表的精选论文,ICCPS 2021是一个首屈一指的单轨会议,旨在促进支持网络和物理元素集成的基本原则的发展,以及设计和实施CPS的技术,工具,架构和基础设施的发展。ICCPS 2021的重点是智慧和互联城市、自主CPS、验证和控制、安全和隐私、人类健康和生物医学CPS相关的贡献。
{"title":"Introduction to the Special Section on Selected Papers from ICCPS 2021","authors":"M. A. Al Faruque, Meeko Oishi","doi":"10.1145/3564157","DOIUrl":"https://doi.org/10.1145/3564157","url":null,"abstract":"The articles in this special section are based on selected papers presented at the 2021 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS 2021), a premier single-track conference that promotes development of fundamental principles that underpin the integration of cyber and physical elements, as well as the development of technologies, tools, architectures, and infrastructure for the design and implementation of CPS. ICCPS 2021 focused on contributions related to smart and connected cities, autonomous CPS, verification and control, security and privacy, and human health and biomedical CPS.","PeriodicalId":380257,"journal":{"name":"ACM Transactions on Cyber-Physical Systems (TCPS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126978579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Hard Is Cyber-risk Management in IT/OT Systems? A Theory to Classify and Conquer Hardness of Insuring ICSs IT/OT系统的网络风险管理有多难?国际社会保险分类与克服困难的理论研究
Pub Date : 2022-10-18 DOI: 10.1145/3568399
R. Pal, Peihan Liu, Taoan Lu, Edward Y. Hua
Third-party residual cyber-risk management (RCRM) services (e.g., insurance, re-insurance) are getting increasingly popular (currently, a multi-billion-dollar annual market) with C-suites managing industrial control systems (ICSs) based upon IoT-driven cyber-physical IT and OT technology. Apart from mitigating and diversifying losses from (major) cyber-threats RCRM services positively contribute to improved cyber-security as an added societal benefit. However, it is also well known that RCRM markets (RCRM for ICSs being a mere subset) are relatively nascent and sparse. There is a huge (approximately 10-fold) supply-demand gap in an environment where (a) annual cyber-losses range in trillions of USD, and (b) CRM markets (residual or otherwise) are annually worth only up to 0.25 trillion USD. The main reason for this wide gap is the age-old information asymmetry (IA) bottleneck between the demand and supply sides of the third-party RCRM market, which is significantly amplified in modern cyber-space settings. This setting primarily comprises interdependent and intra-networked ICSs (and/or traditional IT systems) from diverse application sectors inter-networked with each other in a service supply-chain environment. In this article, we are the first to prove that optimal cyber-risk diversification (integral to RCRM) under IA is computationally intractable, i.e., NP-hard, for such (systemic) inter-networked societies. Here, the term “optimal diversification” implies the best way a residual and profit-minded cyber-risk manager can form a portfolio of client coverage contracts. We follow this up with the design and analysis of a computational policy that alleviates this intractability challenge for the social good. Here, the social good can be ensured through denser RCRM markets that in principle improve cyber-security. Our work formally establishes (a) the reason why it has been very difficult in practice (without suitable policy intervention) to densify IA-affected RCRM markets despite their high demand in modern CPS/ICS/IoT societies; and (b) the efficacy of our computational policy to mitigate IA issues between the supply and demand sides of an RCRM market in such societies.
第三方剩余网络风险管理(RCRM)服务(如保险、再保险)正变得越来越受欢迎(目前,每年有数十亿美元的市场),c套件管理基于物联网驱动的网络物理IT和OT技术的工业控制系统(ics)。除了减轻和多样化(主要)网络威胁造成的损失外,RCRM服务还积极促进了网络安全的改善,为社会带来了额外的效益。然而,众所周知,RCRM市场(用于集成电路系统的RCRM只是一个子集)是相对新生的和稀疏的。在一个(a)每年网络损失高达数万亿美元的环境中,存在巨大的(大约10倍的)供需缺口,(b) CRM市场(剩余或其他)每年的价值仅为0.25万亿美元。造成这种巨大差距的主要原因是第三方RCRM市场的供需双方之间存在着由来已久的信息不对称(IA)瓶颈,这种瓶颈在现代网络空间环境中被显著放大。此设置主要包括来自不同应用部门的相互依赖和内部联网的ics(和/或传统IT系统),它们在服务供应链环境中相互联网。在本文中,我们首次证明了IA下的最优网络风险分散(RCRM的积分)在计算上是难以处理的,即对于这样的(系统性)互联网络社会来说,np困难。在这里,“最优多样化”一词指的是残余的、以利润为导向的网络风险经理形成客户覆盖合同组合的最佳方式。接下来,我们设计和分析了一种计算策略,以减轻这种棘手的挑战,造福社会。在这里,可以通过更密集的RCRM市场来确保社会利益,原则上可以提高网络安全。我们的工作正式确立了(a)尽管现代CPS/ICS/IoT社会对受ia影响的RCRM市场有很高的需求,但在实践中(如果没有适当的政策干预)很难强化这些市场的原因;以及(b)我们的计算政策在缓解此类社会中RCRM市场供需双方之间的IA问题方面的有效性。
{"title":"How Hard Is Cyber-risk Management in IT/OT Systems? A Theory to Classify and Conquer Hardness of Insuring ICSs","authors":"R. Pal, Peihan Liu, Taoan Lu, Edward Y. Hua","doi":"10.1145/3568399","DOIUrl":"https://doi.org/10.1145/3568399","url":null,"abstract":"Third-party residual cyber-risk management (RCRM) services (e.g., insurance, re-insurance) are getting increasingly popular (currently, a multi-billion-dollar annual market) with C-suites managing industrial control systems (ICSs) based upon IoT-driven cyber-physical IT and OT technology. Apart from mitigating and diversifying losses from (major) cyber-threats RCRM services positively contribute to improved cyber-security as an added societal benefit. However, it is also well known that RCRM markets (RCRM for ICSs being a mere subset) are relatively nascent and sparse. There is a huge (approximately 10-fold) supply-demand gap in an environment where (a) annual cyber-losses range in trillions of USD, and (b) CRM markets (residual or otherwise) are annually worth only up to 0.25 trillion USD. The main reason for this wide gap is the age-old information asymmetry (IA) bottleneck between the demand and supply sides of the third-party RCRM market, which is significantly amplified in modern cyber-space settings. This setting primarily comprises interdependent and intra-networked ICSs (and/or traditional IT systems) from diverse application sectors inter-networked with each other in a service supply-chain environment. In this article, we are the first to prove that optimal cyber-risk diversification (integral to RCRM) under IA is computationally intractable, i.e., NP-hard, for such (systemic) inter-networked societies. Here, the term “optimal diversification” implies the best way a residual and profit-minded cyber-risk manager can form a portfolio of client coverage contracts. We follow this up with the design and analysis of a computational policy that alleviates this intractability challenge for the social good. Here, the social good can be ensured through denser RCRM markets that in principle improve cyber-security. Our work formally establishes (a) the reason why it has been very difficult in practice (without suitable policy intervention) to densify IA-affected RCRM markets despite their high demand in modern CPS/ICS/IoT societies; and (b) the efficacy of our computational policy to mitigate IA issues between the supply and demand sides of an RCRM market in such societies.","PeriodicalId":380257,"journal":{"name":"ACM Transactions on Cyber-Physical Systems (TCPS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123289443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Game Theory–Based Parameter Tuning for Energy-Efficient Path Planning on Modern UAVs 基于博弈论的现代无人机节能路径规划参数整定
Pub Date : 2022-10-03 DOI: 10.1145/3565270
Diksha Moolchandani, Kishore Yadav, Geesara Prathap, Ilya M. Afanasyev, Anshul Kumar, M. Mazzara, S. Sarangi
Present-day path planning algorithms for UAVs rely on various parameters that need to be tuned at runtime to be able to plan the best possible route. For example, for a sampling-based algorithm, the number of samples plays a crucial role. The dimension of the space that is being searched to plan the path, the minimum distance for extending a path in a direction, and the minimum distance that the drone should maintain with respect to obstacles while traversing the planned path are all important variables. Along with this, we have a choice of vision algorithms, their parameters, and platforms. Finding a suitable configuration for all these parameters at runtime is very challenging because we need to solve a complicated optimization problem, and that too within tens of milliseconds. The area of theoretical exploration of the optimization problems that arise in such settings is dominated by traditional approaches that use regular nonlinear optimization techniques often enhanced with AI-based techniques such as genetic algorithms. These techniques are sadly rather slow, have convergence issues, and are typically not suitable for use at runtime. In this article, we leverage recent and promising research results that propose to solve complex optimization problems by converting them into approximately equivalent game-theoretic problems. The computed equilibrium strategies can then be mapped to the optimal values of the tunable parameters. With simulation studies in virtual worlds, we show that our solutions are 5-21% better than those produced by traditional methods, and our approach is 10× faster.
目前,无人机的路径规划算法依赖于各种参数,这些参数需要在运行时进行调整,以便能够规划最佳路径。例如,对于基于采样的算法,样本的数量起着至关重要的作用。规划路径时搜索的空间维度、在一个方向上延伸路径的最小距离、无人机在穿越规划路径时与障碍物保持的最小距离都是重要的变量。除此之外,我们还可以选择视觉算法,它们的参数和平台。在运行时为所有这些参数找到一个合适的配置是非常具有挑战性的,因为我们需要在几十毫秒内解决一个复杂的优化问题。在这种情况下出现的优化问题的理论探索领域主要是使用常规非线性优化技术的传统方法,这些方法通常通过基于人工智能的技术(如遗传算法)进行增强。遗憾的是,这些技术相当缓慢,有收敛问题,并且通常不适合在运行时使用。在本文中,我们利用最近和有前途的研究成果,提出通过将复杂的优化问题转化为近似等效的博弈论问题来解决复杂的优化问题。计算出的平衡策略可以映射到可调参数的最优值。通过对虚拟世界的仿真研究,我们证明了我们的解决方案比传统方法产生的解决方案好5-21%,并且我们的方法快10倍。
{"title":"Game Theory–Based Parameter Tuning for Energy-Efficient Path Planning on Modern UAVs","authors":"Diksha Moolchandani, Kishore Yadav, Geesara Prathap, Ilya M. Afanasyev, Anshul Kumar, M. Mazzara, S. Sarangi","doi":"10.1145/3565270","DOIUrl":"https://doi.org/10.1145/3565270","url":null,"abstract":"Present-day path planning algorithms for UAVs rely on various parameters that need to be tuned at runtime to be able to plan the best possible route. For example, for a sampling-based algorithm, the number of samples plays a crucial role. The dimension of the space that is being searched to plan the path, the minimum distance for extending a path in a direction, and the minimum distance that the drone should maintain with respect to obstacles while traversing the planned path are all important variables. Along with this, we have a choice of vision algorithms, their parameters, and platforms. Finding a suitable configuration for all these parameters at runtime is very challenging because we need to solve a complicated optimization problem, and that too within tens of milliseconds. The area of theoretical exploration of the optimization problems that arise in such settings is dominated by traditional approaches that use regular nonlinear optimization techniques often enhanced with AI-based techniques such as genetic algorithms. These techniques are sadly rather slow, have convergence issues, and are typically not suitable for use at runtime. In this article, we leverage recent and promising research results that propose to solve complex optimization problems by converting them into approximately equivalent game-theoretic problems. The computed equilibrium strategies can then be mapped to the optimal values of the tunable parameters. With simulation studies in virtual worlds, we show that our solutions are 5-21% better than those produced by traditional methods, and our approach is 10× faster.","PeriodicalId":380257,"journal":{"name":"ACM Transactions on Cyber-Physical Systems (TCPS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124434430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-attack Simulation od1nf1:真跳过入侵检测与航电网络网络攻击仿真
Pub Date : 2022-08-08 DOI: 10.1145/3551893
M. Wrana, Marwa A. Elsayed, K. Lounis, Ziad Mansour, Steven H. H. Ding, Mohammad Zulkernine
MIL-STD-1553 is a communication bus that has been used by many military avionics platforms, such as the F-15 and F-35 fighter jets, for almost 50 years. Recently, it has become clear that the lack of security on MIL-STD-1553 and the requirement for internet communication between planes has revealed numerous potential attack vectors for malicious parties. Prevention of these attacks by modernizing the MIL-STD-1553 is not practical due to the military applications and existing far-reaching installations of the bus. We present a software system that can simulate bus transmissions to create easy, replicable, and large datasets of MIL-STD-1553 communications. We also propose an intrusion detection system (IDS) that can identify anomalies and the precise type of attack using recurrent neural networks with a reinforcement learning true-skip data selection algorithm. Our IDS outperforms existing algorithms designed for MIL-STD-1553 in binary anomaly detection tasks while also performing attack classification and minimizing computational resource cost. Our simulator can generate more data with higher fidelity than existing methods and integrate attack scenarios with greater detail. Furthermore, the simulator and IDS can be combined to form a web-based attack-defense game.
MIL-STD-1553是一种通信总线,已被许多军用航空电子设备平台使用了近50年,如F-15和F-35战斗机。最近,很明显MIL-STD-1553缺乏安全性以及飞机之间互联网通信的要求已经揭示了恶意方的许多潜在攻击向量。通过现代化MIL-STD-1553防止这些攻击是不实际的,因为军事应用和现有的深远的总线安装。我们提出了一个软件系统,可以模拟总线传输,以创建简单,可复制的MIL-STD-1553通信的大型数据集。我们还提出了一种入侵检测系统(IDS),该系统可以使用带有强化学习真跳数据选择算法的递归神经网络识别异常和精确的攻击类型。我们的IDS在二进制异常检测任务中优于为MIL-STD-1553设计的现有算法,同时还执行攻击分类并最小化计算资源成本。我们的模拟器可以生成比现有方法更高保真度的更多数据,并且可以更详细地集成攻击场景。此外,模拟器和IDS可以组合成一个基于web的攻防游戏。
{"title":"OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-attack Simulation","authors":"M. Wrana, Marwa A. Elsayed, K. Lounis, Ziad Mansour, Steven H. H. Ding, Mohammad Zulkernine","doi":"10.1145/3551893","DOIUrl":"https://doi.org/10.1145/3551893","url":null,"abstract":"MIL-STD-1553 is a communication bus that has been used by many military avionics platforms, such as the F-15 and F-35 fighter jets, for almost 50 years. Recently, it has become clear that the lack of security on MIL-STD-1553 and the requirement for internet communication between planes has revealed numerous potential attack vectors for malicious parties. Prevention of these attacks by modernizing the MIL-STD-1553 is not practical due to the military applications and existing far-reaching installations of the bus. We present a software system that can simulate bus transmissions to create easy, replicable, and large datasets of MIL-STD-1553 communications. We also propose an intrusion detection system (IDS) that can identify anomalies and the precise type of attack using recurrent neural networks with a reinforcement learning true-skip data selection algorithm. Our IDS outperforms existing algorithms designed for MIL-STD-1553 in binary anomaly detection tasks while also performing attack classification and minimizing computational resource cost. Our simulator can generate more data with higher fidelity than existing methods and integrate attack scenarios with greater detail. Furthermore, the simulator and IDS can be combined to form a web-based attack-defense game.","PeriodicalId":380257,"journal":{"name":"ACM Transactions on Cyber-Physical Systems (TCPS)","volume":"122 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113967211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Coordinated Charging and Discharging of Electric Vehicles: A New Class of Switching Attacks 电动汽车协同充放电:一类新的开关攻击
Pub Date : 2022-07-21 DOI: 10.1145/3524454
Mohsen Ghafouri, Ekram Kabir, Bassam Moussa, C. Assi
In this work, we investigate that the abundance of Electric Vehicles (EVs) can be exploited to target the stability of the power grid. Through a cyber attack that compromises a lot of available EVs and their charging infrastructure, we present a realistic coordinated switching attack that initiates inter-area oscillations between different areas of the power grid. The threat model as well as linearized state-space representation of the grid are formulated to illustrate possible consequences of the attack. Two variations of switching attack are considered, namely, switching of EV charging and discharging power into the grid. Moreover, two possible attack strategies are also considered (i) using an insider to reveal the accurate system parameters and (ii) using reconnaissance activities in the absence of the grid parameters. In the former strategy, the system equations are used to compute the required knowledge to launch the attack. However, a stealthy system identification technique, which is tailored based on Eigenvalue Realization Algorithm (ERA), is proposed in latter strategy to calculate the required data for attack execution. The two-area Kundur, 39-Bus New England, and the Australian 5-area power grids are used to demonstrate the attack strategies and their consequences. The collected results demonstrate that by manipulation of EV charging stations and launching a coordinated switching attack to those portions of load, inter-area oscillations can be initiated. Finally, to protect the grid from this anticipated attack, a Support Vector Machine (SVM) based framework is proposed to detect and eliminate this attack even before being executed.
在这项工作中,我们研究了电动汽车(ev)的丰度可以被利用来瞄准电网的稳定性。通过网络攻击危及大量可用的电动汽车及其充电基础设施,我们提出了一种现实的协调切换攻击,引发电网不同区域之间的区域间振荡。威胁模型以及栅格的线性化状态空间表示被公式化以说明攻击的可能后果。考虑了切换攻击的两种变化,即电动汽车充电和放电功率的切换进入电网。此外,还考虑了两种可能的攻击策略(i)使用内部人员来揭示准确的系统参数和(ii)在没有网格参数的情况下使用侦察活动。在前一种策略中,使用系统方程来计算发动攻击所需的知识。在后一种策略中,提出了一种基于特征值实现算法(ERA)的隐身系统识别技术,用于计算攻击执行所需的数据。两个区域的昆都尔电网、39-Bus新英格兰电网和澳大利亚的5个区域电网被用来演示攻击策略及其后果。结果表明,通过对电动汽车充电站的操纵,对这些部分负荷发起协调切换攻击,可以引发区域间振荡。最后,为了保护网格免受这种预期的攻击,提出了一种基于支持向量机(SVM)的框架来检测和消除这种攻击,甚至在攻击发生之前。
{"title":"Coordinated Charging and Discharging of Electric Vehicles: A New Class of Switching Attacks","authors":"Mohsen Ghafouri, Ekram Kabir, Bassam Moussa, C. Assi","doi":"10.1145/3524454","DOIUrl":"https://doi.org/10.1145/3524454","url":null,"abstract":"In this work, we investigate that the abundance of Electric Vehicles (EVs) can be exploited to target the stability of the power grid. Through a cyber attack that compromises a lot of available EVs and their charging infrastructure, we present a realistic coordinated switching attack that initiates inter-area oscillations between different areas of the power grid. The threat model as well as linearized state-space representation of the grid are formulated to illustrate possible consequences of the attack. Two variations of switching attack are considered, namely, switching of EV charging and discharging power into the grid. Moreover, two possible attack strategies are also considered (i) using an insider to reveal the accurate system parameters and (ii) using reconnaissance activities in the absence of the grid parameters. In the former strategy, the system equations are used to compute the required knowledge to launch the attack. However, a stealthy system identification technique, which is tailored based on Eigenvalue Realization Algorithm (ERA), is proposed in latter strategy to calculate the required data for attack execution. The two-area Kundur, 39-Bus New England, and the Australian 5-area power grids are used to demonstrate the attack strategies and their consequences. The collected results demonstrate that by manipulation of EV charging stations and launching a coordinated switching attack to those portions of load, inter-area oscillations can be initiated. Finally, to protect the grid from this anticipated attack, a Support Vector Machine (SVM) based framework is proposed to detect and eliminate this attack even before being executed.","PeriodicalId":380257,"journal":{"name":"ACM Transactions on Cyber-Physical Systems (TCPS)","volume":"9 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123827332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient Encrypted Range Query on Cloud Platforms 云平台上的高效加密范围查询
Pub Date : 2022-07-19 DOI: 10.1145/3548657
Ping Yu, Wei Ni, R. Liu, Zhaoxin Zhang, Hua Zhang, Q. Wen
In the Internet of Things (IoT) era, various IoT devices are equipped with sensing capabilities and employed to support clinical applications. The massive electronic health records (EHRs) are expected to be stored in the cloud, where the data are usually encrypted, and the encrypted data can be used for disease diagnosis. There exist some numeric health indicators, such as blood pressure and heart rate. These numeric indicators can be classified into multiple ranges, and each range may represent an indication of normality or abnormity. Once receiving encrypted IoT data, the CS maps it to one of the ranges, achieving timely monitoring and diagnosis of health indicators. This article presents a new approach to identify the range that an encrypted numeric value corresponds to without exposing the explicit value. We establish the sufficient and necessary condition to convert a range query to matchings of encrypted binary sequences with the minimum number of matching operations. We further apply the minimization of range queries to design and implement a secure range query system, where numeric health indicators encrypted independently by multiple IoT devices can be cohesively stored and efficiently queried by using Lagrange polynomial interpolation. Comprehensive performance studies show that the proposed approach can protect both the health records and range query against untrusted cloud platforms and requires less computational and communication cost than existing techniques.
在物联网(IoT)时代,各种物联网设备都配备了传感能力,并用于支持临床应用。大量的电子健康记录(EHRs)预计将存储在云中,数据通常被加密,加密后的数据可用于疾病诊断。还有一些数字健康指标,如血压和心率。这些数字指标可以分为多个范围,每个范围可以代表一个正常或异常的指示。一旦接收到加密的物联网数据,CS将其映射到其中一个范围,实现对健康指标的及时监测和诊断。本文介绍了一种新的方法,可以在不暴露显式值的情况下识别加密数值所对应的范围。建立了将范围查询转换为匹配操作次数最少的加密二进制序列的充要条件。我们进一步应用范围查询的最小化来设计和实现一个安全的范围查询系统,其中由多个物联网设备独立加密的数字健康指标可以通过拉格朗日多项式插值进行内聚存储和高效查询。综合性能研究表明,所提出的方法可以保护健康记录和范围查询不受不可信云平台的影响,并且比现有技术所需的计算和通信成本更低。
{"title":"Efficient Encrypted Range Query on Cloud Platforms","authors":"Ping Yu, Wei Ni, R. Liu, Zhaoxin Zhang, Hua Zhang, Q. Wen","doi":"10.1145/3548657","DOIUrl":"https://doi.org/10.1145/3548657","url":null,"abstract":"In the Internet of Things (IoT) era, various IoT devices are equipped with sensing capabilities and employed to support clinical applications. The massive electronic health records (EHRs) are expected to be stored in the cloud, where the data are usually encrypted, and the encrypted data can be used for disease diagnosis. There exist some numeric health indicators, such as blood pressure and heart rate. These numeric indicators can be classified into multiple ranges, and each range may represent an indication of normality or abnormity. Once receiving encrypted IoT data, the CS maps it to one of the ranges, achieving timely monitoring and diagnosis of health indicators. This article presents a new approach to identify the range that an encrypted numeric value corresponds to without exposing the explicit value. We establish the sufficient and necessary condition to convert a range query to matchings of encrypted binary sequences with the minimum number of matching operations. We further apply the minimization of range queries to design and implement a secure range query system, where numeric health indicators encrypted independently by multiple IoT devices can be cohesively stored and efficiently queried by using Lagrange polynomial interpolation. Comprehensive performance studies show that the proposed approach can protect both the health records and range query against untrusted cloud platforms and requires less computational and communication cost than existing techniques.","PeriodicalId":380257,"journal":{"name":"ACM Transactions on Cyber-Physical Systems (TCPS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132082152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to the Special Issue on Artificial Intelligence and Cyber-Physical Systems - Part 2 人工智能和网络物理系统特刊导论-第二部分
Pub Date : 2022-04-30 DOI: 10.1145/3517045
J. Hu, Qinhua Zhu, Susmit Jha
low-latency monitoring, out-of-distribution detection, and preventive maintenance.In “Fog-supported Low Latency Monitoring of System Disruptions in Industry 4.0: A Federated Learning Approach” , Sahnoun et al. designed a new monitoring tool for system disruption related to the localization of mobile resources. In “Efficient Out-of-Distribution Detection Using Latent Space of β -VAE for Cyber-Physical Systems” , Ramakrishna et al. tackled the problem that the sampled observations used for training the model may never cover the entire state space of the physical environment, and as a result, the system will likely operate in conditions that do not belong to the training distribution. These conditions that do not belong to training distribution are referred to as Out-of-Distribution (OOD) . Detecting OOD conditions at runtime is critical for the safety of CPS. The authors proposed an approach to design and train a single β -Variational Autoencoder de-tector with a partially disentangled latent space sensitive to variations in image features to detect OOD images and identify the most likely feature(s) responsible for the OOD. In “A Hybrid Deep Learning Framework for Intelligent Predictive Maintenance of Cyber-Physical Systems” , Sai et al. proposed a practical and effective hybrid deep learning multi-task framework, which integrates the advantages of convolutional neural network (CNN) and long short-term memory (LSTM) neural network, to reflect the relatedness of remaining useful life prediction with health status detection process in the CPS environment. The proposed framework can provide strong support for the health management and maintenance strategy development of complex multi-object systems.
低延迟监视、分发外检测和预防性维护。在“工业4.0中雾支持的低延迟系统中断监测:一种联邦学习方法”中,Sahnoun等人设计了一种新的监测工具,用于与移动资源本地化相关的系统中断。在“利用β -VAE潜在空间进行网络物理系统的有效分布外检测”中,Ramakrishna等人解决了用于训练模型的采样观测可能永远不会覆盖物理环境的整个状态空间的问题,因此,系统可能会在不属于训练分布的条件下运行。这些不属于培训分布的情况被称为分布外(OOD)。在运行时检测OOD状况对CPS的安全性至关重要。作者提出了一种设计和训练单个β变分自编码器检测器的方法,该检测器具有部分解纠缠的潜在空间,对图像特征的变化敏感,用于检测OOD图像并识别最可能导致OOD的特征。在“网络物理系统智能预测维护的混合深度学习框架”中,Sai等人提出了一种实用有效的混合深度学习多任务框架,该框架融合了卷积神经网络(CNN)和长短期记忆(LSTM)神经网络的优势,以反映CPS环境下剩余使用寿命预测与健康状态检测过程的相关性。该框架可为复杂多目标系统的健康管理和维护策略的制定提供强有力的支持。
{"title":"Introduction to the Special Issue on Artificial Intelligence and Cyber-Physical Systems - Part 2","authors":"J. Hu, Qinhua Zhu, Susmit Jha","doi":"10.1145/3517045","DOIUrl":"https://doi.org/10.1145/3517045","url":null,"abstract":"low-latency monitoring, out-of-distribution detection, and preventive maintenance.In “Fog-supported Low Latency Monitoring of System Disruptions in Industry 4.0: A Federated Learning Approach” , Sahnoun et al. designed a new monitoring tool for system disruption related to the localization of mobile resources. In “Efficient Out-of-Distribution Detection Using Latent Space of β -VAE for Cyber-Physical Systems” , Ramakrishna et al. tackled the problem that the sampled observations used for training the model may never cover the entire state space of the physical environment, and as a result, the system will likely operate in conditions that do not belong to the training distribution. These conditions that do not belong to training distribution are referred to as Out-of-Distribution (OOD) . Detecting OOD conditions at runtime is critical for the safety of CPS. The authors proposed an approach to design and train a single β -Variational Autoencoder de-tector with a partially disentangled latent space sensitive to variations in image features to detect OOD images and identify the most likely feature(s) responsible for the OOD. In “A Hybrid Deep Learning Framework for Intelligent Predictive Maintenance of Cyber-Physical Systems” , Sai et al. proposed a practical and effective hybrid deep learning multi-task framework, which integrates the advantages of convolutional neural network (CNN) and long short-term memory (LSTM) neural network, to reflect the relatedness of remaining useful life prediction with health status detection process in the CPS environment. The proposed framework can provide strong support for the health management and maintenance strategy development of complex multi-object systems.","PeriodicalId":380257,"journal":{"name":"ACM Transactions on Cyber-Physical Systems (TCPS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131747784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cyber-physical Approach for Emergency Braking in Close-Distance Driving Arrangements 近距离驾驶紧急制动的网络物理方法
Pub Date : 2022-04-20 DOI: 10.1145/3526117
Dharshan Krishna Murthy, Alejandro Masrur
In addition to fuel/energy savings, close-distance driving or platooning allows compacting vehicle flows and, hence, increasing throughput on congested roads. The shorter the inter-vehicle separation is in such settings, the more the benefits. However, it becomes considerably harder to guarantee safety, in particular, when braking in an emergency. In this article, we are concerned with this problem and propose a cyber-physical approach that considerably reduces the stopping distance of a platoon with inter-vehicle separations shorter than one vehicle length (i.e., 5 m) without sacrificing safety and independent of the road profile, i.e., whether on a flat road or in a downhill. The basic idea is to implement a cooperative behavior where a vehicle sends a distress message if it fails to achieve an assigned deceleration when braking in a platoon. This way, other vehicles in the arrangement can adapt their decelerations to avoid collisions. We illustrate and evaluate our approach based on detailed simulations involving high-fidelity vehicle models.
除了节省燃料/能源外,近距离驾驶或队列行驶还可以压缩车辆流量,从而增加拥堵道路上的吞吐量。在这种情况下,车辆间间隔越短,收益越大。然而,要保证安全变得相当困难,特别是在紧急情况下刹车时。在本文中,我们关注这个问题,并提出了一种网络物理方法,该方法可以在不牺牲安全和独立于道路轮廓的情况下,大大缩短车辆间距小于一个车辆长度(即5米)的车队的停车距离,即无论是在平坦的道路上还是在下坡的道路上。其基本思想是实现一种合作行为,如果车辆在队列中制动时未能达到指定的减速,则会发送求救信息。这样,其他车辆就可以调整减速以避免碰撞。我们基于涉及高保真车辆模型的详细模拟来说明和评估我们的方法。
{"title":"A Cyber-physical Approach for Emergency Braking in Close-Distance Driving Arrangements","authors":"Dharshan Krishna Murthy, Alejandro Masrur","doi":"10.1145/3526117","DOIUrl":"https://doi.org/10.1145/3526117","url":null,"abstract":"In addition to fuel/energy savings, close-distance driving or platooning allows compacting vehicle flows and, hence, increasing throughput on congested roads. The shorter the inter-vehicle separation is in such settings, the more the benefits. However, it becomes considerably harder to guarantee safety, in particular, when braking in an emergency. In this article, we are concerned with this problem and propose a cyber-physical approach that considerably reduces the stopping distance of a platoon with inter-vehicle separations shorter than one vehicle length (i.e., 5 m) without sacrificing safety and independent of the road profile, i.e., whether on a flat road or in a downhill. The basic idea is to implement a cooperative behavior where a vehicle sends a distress message if it fails to achieve an assigned deceleration when braking in a platoon. This way, other vehicles in the arrangement can adapt their decelerations to avoid collisions. We illustrate and evaluate our approach based on detailed simulations involving high-fidelity vehicle models.","PeriodicalId":380257,"journal":{"name":"ACM Transactions on Cyber-Physical Systems (TCPS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122148824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Beyond Just Safety: Delay-aware Security Monitoring for Real-time Control Systems 超越安全:实时控制系统的延迟感知安全监控
Pub Date : 2022-03-26 DOI: 10.1145/3520136
M. Hasan, Sibin Mohan, R. Bobba, R. Pellizzoni
Modern embedded real-time systems (RTS) are increasingly facing more security threats than the past. A simplistic straightforward integration of security mechanisms might not be able to guarantee the safety and predictability of such systems. In this article, we focus on integrating security mechanisms into RTS (especially legacy RTS). We introduce Contego-C, an analytical model to integrate security tasks into RTS that will allow system designers to improve the security posture without affecting temporal and control constraints of the existing real-time control tasks. We also define a metric (named tightness of periodic monitoring) to measure the effectiveness of such integration. We demonstrate our ideas using a proof-of-concept implementation on an ARM-based rover platform and show that Contego-C can improve security without degrading control performance.
现代嵌入式实时系统(RTS)面临着比过去更多的安全威胁。简单直接的安全机制集成可能无法保证此类系统的安全性和可预测性。在本文中,我们将重点讨论如何将安全机制集成到RTS(特别是遗留RTS)中。我们介绍了Contego-C,这是一个将安全任务集成到RTS中的分析模型,它将允许系统设计人员在不影响现有实时控制任务的时间和控制约束的情况下改进安全状态。我们还定义了一个度量(称为周期性监视的紧密性)来度量这种集成的有效性。我们在基于arm的漫游车平台上使用概念验证实现来演示我们的想法,并表明Contego-C可以在不降低控制性能的情况下提高安全性。
{"title":"Beyond Just Safety: Delay-aware Security Monitoring for Real-time Control Systems","authors":"M. Hasan, Sibin Mohan, R. Bobba, R. Pellizzoni","doi":"10.1145/3520136","DOIUrl":"https://doi.org/10.1145/3520136","url":null,"abstract":"Modern embedded real-time systems (RTS) are increasingly facing more security threats than the past. A simplistic straightforward integration of security mechanisms might not be able to guarantee the safety and predictability of such systems. In this article, we focus on integrating security mechanisms into RTS (especially legacy RTS). We introduce Contego-C, an analytical model to integrate security tasks into RTS that will allow system designers to improve the security posture without affecting temporal and control constraints of the existing real-time control tasks. We also define a metric (named tightness of periodic monitoring) to measure the effectiveness of such integration. We demonstrate our ideas using a proof-of-concept implementation on an ARM-based rover platform and show that Contego-C can improve security without degrading control performance.","PeriodicalId":380257,"journal":{"name":"ACM Transactions on Cyber-Physical Systems (TCPS)","volume":"52 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120818164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Plan B: Design Methodology for Cyber-Physical Systems Robust to Timing Failures 计划B:网络物理系统抗定时故障的设计方法
Pub Date : 2022-03-08 DOI: 10.1145/3516449
M. Khayatian, Mohammadreza Mehrabian, E. Andert, Reese Grimsley, Kyle Liang, Yifan Hu, Ian M. McCormack, Carlee Joe-Wong, Jonathan Aldrich, Bob Iannucci, Aviral Shrivastava
Many Cyber-Physical Systems (CPS) have timing constraints that must be met by the cyber components (software and the network) to ensure safety. It is a tedious job to check if a CPS meets its timing requirement especially when it is distributed and the software and/or the underlying computing platforms are complex. Furthermore, the system design is brittle since a timing failure can still happen (e.g., network failure, soft error bit flip). In this article, we propose a new design methodology called Plan B where timing constraints of the CPS are monitored at runtime, and a proper backup routine is executed when a timing failure happens to ensure safety. We provide a model on how to express the desired timing behavior using a set of timing constructs in a C/C++ code and how to efficiently monitor them at the runtime. We showcase the effectiveness of our approach by conducting experiments on three case studies: (1) the full software stack for autonomous driving (Apollo), (2) a multi-agent system with 1/10th-scale model robots, and (3) a quadrotor for search and rescue application. We show that the system remains safe and stable even when intentional faults are injected to cause a timing failure. We also demonstrate that the system can achieve graceful degradation when a less extreme timing failure happens.
许多网络物理系统(CPS)都有时间限制,网络组件(软件和网络)必须满足这些限制以确保安全。检查CPS是否满足其时间要求是一项繁琐的工作,特别是当它是分布式的,软件和/或底层计算平台很复杂时。此外,系统设计是脆弱的,因为定时故障仍然可能发生(例如,网络故障,软错误位翻转)。在本文中,我们提出了一种称为Plan B的新设计方法,其中在运行时监视CPS的定时约束,并在发生定时故障时执行适当的备份例程以确保安全。我们提供了一个模型,说明如何在C/ c++代码中使用一组计时结构来表达期望的计时行为,以及如何在运行时有效地监视它们。我们通过对三个案例研究进行实验来展示我们方法的有效性:(1)用于自动驾驶的完整软件堆栈(阿波罗),(2)具有1/10比例模型机器人的多智能体系统,以及(3)用于搜索和救援应用的四旋翼飞行器。我们表明,即使故意注入故障导致定时故障,系统仍保持安全稳定。我们还证明,当不太极端的定时故障发生时,系统可以实现优雅的降级。
{"title":"Plan B: Design Methodology for Cyber-Physical Systems Robust to Timing Failures","authors":"M. Khayatian, Mohammadreza Mehrabian, E. Andert, Reese Grimsley, Kyle Liang, Yifan Hu, Ian M. McCormack, Carlee Joe-Wong, Jonathan Aldrich, Bob Iannucci, Aviral Shrivastava","doi":"10.1145/3516449","DOIUrl":"https://doi.org/10.1145/3516449","url":null,"abstract":"Many Cyber-Physical Systems (CPS) have timing constraints that must be met by the cyber components (software and the network) to ensure safety. It is a tedious job to check if a CPS meets its timing requirement especially when it is distributed and the software and/or the underlying computing platforms are complex. Furthermore, the system design is brittle since a timing failure can still happen (e.g., network failure, soft error bit flip). In this article, we propose a new design methodology called Plan B where timing constraints of the CPS are monitored at runtime, and a proper backup routine is executed when a timing failure happens to ensure safety. We provide a model on how to express the desired timing behavior using a set of timing constructs in a C/C++ code and how to efficiently monitor them at the runtime. We showcase the effectiveness of our approach by conducting experiments on three case studies: (1) the full software stack for autonomous driving (Apollo), (2) a multi-agent system with 1/10th-scale model robots, and (3) a quadrotor for search and rescue application. We show that the system remains safe and stable even when intentional faults are injected to cause a timing failure. We also demonstrate that the system can achieve graceful degradation when a less extreme timing failure happens.","PeriodicalId":380257,"journal":{"name":"ACM Transactions on Cyber-Physical Systems (TCPS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127657658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
ACM Transactions on Cyber-Physical Systems (TCPS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1