首页 > 最新文献

2021 International Conference on Networking and Network Applications (NaNA)最新文献

英文 中文
Online Scheduling of Machine Learning Jobs in Edge-Cloud Networks 边缘云网络中机器学习作业的在线调度
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00031
Jingping She, Ne Wang, Ruiting Zhou, Chen Tian
Compared with traditional cloud computing, edge-cloud computing brings many benefits, such as low latency, low bandwidth cost, and high security. Thanks to these advantages, a large number of distributed machine learning (ML) jobs are trained on the edge-cloud network to support smart applications, adopting the parameter server (PS) architecture. The scheduling of such ML jobs needs to consider different data transmission delay and frequent communication between workers and PSs, which brings a fundamental challenge: how to deploy workers and PSs on edge-cloud networks for ML jobs to minimize the average job completion time. To solve this problem, we propose an online scheduling framework to determine the location and execution time window for each job upon its arrival. Our algorithm includes: (i) an online scheduling framework that groups unprocessed ML jobs iteratively into multiple batches; (ii) a batch scheduling algorithm that maximizes the number of scheduled jobs in the current batch; (iii) two greedy algorithms that deploy workers and PSs to minimize the deployment cost. Large-scale and trace-driven simulations show that our algorithm is superior to the most common and advanced schedulers in today’s cloud systems.
与传统云计算相比,边缘云计算具有低时延、低带宽成本、高安全性等优点。由于这些优势,采用参数服务器(PS)架构,在边缘云网络上训练大量分布式机器学习(ML)作业以支持智能应用程序。这种机器学习作业的调度需要考虑不同的数据传输延迟以及工人和ps之间频繁的通信,这就带来了一个根本性的挑战:如何在边缘云网络上为机器学习作业部署工人和ps,以最小化平均作业完成时间。为了解决这个问题,我们提出了一个在线调度框架来确定每个作业到达时的位置和执行时间窗口。我们的算法包括:(i)一个在线调度框架,将未处理的机器学习作业迭代地分成多个批次;(ii)使当前批处理中的计划作业数量最大化的批调度算法;(iii)两种贪婪算法,部署工人和ps以最小化部署成本。大规模和跟踪驱动的模拟表明,我们的算法优于当今云系统中最常见和最先进的调度器。
{"title":"Online Scheduling of Machine Learning Jobs in Edge-Cloud Networks","authors":"Jingping She, Ne Wang, Ruiting Zhou, Chen Tian","doi":"10.1109/NaNA53684.2021.00031","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00031","url":null,"abstract":"Compared with traditional cloud computing, edge-cloud computing brings many benefits, such as low latency, low bandwidth cost, and high security. Thanks to these advantages, a large number of distributed machine learning (ML) jobs are trained on the edge-cloud network to support smart applications, adopting the parameter server (PS) architecture. The scheduling of such ML jobs needs to consider different data transmission delay and frequent communication between workers and PSs, which brings a fundamental challenge: how to deploy workers and PSs on edge-cloud networks for ML jobs to minimize the average job completion time. To solve this problem, we propose an online scheduling framework to determine the location and execution time window for each job upon its arrival. Our algorithm includes: (i) an online scheduling framework that groups unprocessed ML jobs iteratively into multiple batches; (ii) a batch scheduling algorithm that maximizes the number of scheduled jobs in the current batch; (iii) two greedy algorithms that deploy workers and PSs to minimize the deployment cost. Large-scale and trace-driven simulations show that our algorithm is superior to the most common and advanced schedulers in today’s cloud systems.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114996857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NLEU: A Semantic-based Taint Analysis for Vetting Apps in Android NLEU:基于语义的Android应用程序污点分析
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00063
Yuanqing Liu, Ning Xi, Yongbo Zhi
Due to the widespread of Android apps in our daily life, vulnerable or malicious apps have become two major threats on clients’ privacy. Taint analysis is one of the most widely used approach for detecting information leakage by tracking sensitive flows through the apps in accord with specific taint propagation rules and predefined sensitive sources and sinks. However, most existing static taint analysis tools, including FlowDroid, IccTA, etc., neglect the semantics of detected flows, especially for conditional branch in apps, which may cause a precision loss in practical environment. In this paper, we propose NLEU, a semantic-based taint analysis approach to improve the precision of traditional flow tracking techniques, which introduce a new dimension of information, i.e., the program’s semantics, for vetting Android apps. At the same time, NLEU can eliminate the insensitive flows of flow tracking techniques. The NLP techniques are adopted to extract the program semantics from codes and their comments. Through the experiments and evaluations, the result show that NLEU can improve the overall performance effectively compared with the traditional tools.
由于Android应用在我们日常生活中的广泛应用,漏洞或恶意应用已经成为客户隐私的两大威胁。根据特定的污染传播规则和预定义的敏感源和敏感汇,通过跟踪流经应用程序的敏感流来检测信息泄漏,是应用最广泛的方法之一。然而,现有的大多数静态污染分析工具,包括FlowDroid、IccTA等,都忽略了检测流的语义,特别是对于应用程序中的条件分支,这在实际环境中可能会造成精度损失。在本文中,我们提出了一种基于语义的污点分析方法NLEU,以提高传统流量跟踪技术的精度,该方法引入了一个新的信息维度,即程序的语义,用于审查Android应用程序。同时,NLEU可以消除流动跟踪技术中的不敏感流动。采用自然语言处理技术从代码及其注释中提取程序语义。通过实验和评估,结果表明,与传统工具相比,NLEU可以有效地提高整体性能。
{"title":"NLEU: A Semantic-based Taint Analysis for Vetting Apps in Android","authors":"Yuanqing Liu, Ning Xi, Yongbo Zhi","doi":"10.1109/NaNA53684.2021.00063","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00063","url":null,"abstract":"Due to the widespread of Android apps in our daily life, vulnerable or malicious apps have become two major threats on clients’ privacy. Taint analysis is one of the most widely used approach for detecting information leakage by tracking sensitive flows through the apps in accord with specific taint propagation rules and predefined sensitive sources and sinks. However, most existing static taint analysis tools, including FlowDroid, IccTA, etc., neglect the semantics of detected flows, especially for conditional branch in apps, which may cause a precision loss in practical environment. In this paper, we propose NLEU, a semantic-based taint analysis approach to improve the precision of traditional flow tracking techniques, which introduce a new dimension of information, i.e., the program’s semantics, for vetting Android apps. At the same time, NLEU can eliminate the insensitive flows of flow tracking techniques. The NLP techniques are adopted to extract the program semantics from codes and their comments. Through the experiments and evaluations, the result show that NLEU can improve the overall performance effectively compared with the traditional tools.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127244270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Transmission Characteristics of Photonic Crystal Fiber Filled with Magnetic Fluid 磁流体填充光子晶体光纤的传输特性
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00050
Wen Wang, Yuejuan Liu, Shikai Shen
Photonic Crystal Fiber (PCF) is also called microstructure fiber. The PCF is filled with magnetic fluid, and the optical characteristics of the PCF can be tuned and sensed according to the adjustable characteristics of the refractive index of the magnetic fluid. In this paper, the influence of filling magnetic fluid (MF) on the transmission characteristics of the PCF is analyzed. Precisely, PCF mode field distribution, fundamental mode refractive index and loss characteristics were analyzed. Analyze the influence of temperature on the transmission characteristics of two types of PCFs. The simulation results showed that the mode field area of the circular holes PCF is about twice that of the elliptical holes PCF under the condition of 20°C. With the increase of temperature, the loss peaks of elliptical holes PCF and circular holes PCF both increase and redshift. The wavelength sensitivity and loss sensitivity of the circular holes PCF are higher than that of the elliptical holes PCF. This work provides a reference for designing high-sensitivity optical fiber sensor devices.
光子晶体光纤(PCF)又称微结构光纤。PCF内填充磁流体,根据磁流体折射率的可调特性对PCF的光学特性进行调谐和传感。本文分析了填充磁流体对PCF传动特性的影响。精确地分析了PCF模场分布、基模折射率和损耗特性。分析温度对两种聚氯乙烯传输特性的影响。仿真结果表明,在20℃条件下,圆孔PCF的模场面积约为椭圆孔PCF的两倍。随着温度的升高,椭圆孔PCF和圆孔PCF的损耗峰均增加且红移。圆孔PCF的波长灵敏度和损耗灵敏度均高于椭圆孔PCF。为设计高灵敏度光纤传感器器件提供了参考。
{"title":"Transmission Characteristics of Photonic Crystal Fiber Filled with Magnetic Fluid","authors":"Wen Wang, Yuejuan Liu, Shikai Shen","doi":"10.1109/NaNA53684.2021.00050","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00050","url":null,"abstract":"Photonic Crystal Fiber (PCF) is also called microstructure fiber. The PCF is filled with magnetic fluid, and the optical characteristics of the PCF can be tuned and sensed according to the adjustable characteristics of the refractive index of the magnetic fluid. In this paper, the influence of filling magnetic fluid (MF) on the transmission characteristics of the PCF is analyzed. Precisely, PCF mode field distribution, fundamental mode refractive index and loss characteristics were analyzed. Analyze the influence of temperature on the transmission characteristics of two types of PCFs. The simulation results showed that the mode field area of the circular holes PCF is about twice that of the elliptical holes PCF under the condition of 20°C. With the increase of temperature, the loss peaks of elliptical holes PCF and circular holes PCF both increase and redshift. The wavelength sensitivity and loss sensitivity of the circular holes PCF are higher than that of the elliptical holes PCF. This work provides a reference for designing high-sensitivity optical fiber sensor devices.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125169985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterizing and Improving the Probability of Correct Phase Ambiguity Resolution for Uniform Circular Array Phase Interferometers 均匀圆阵相位干涉仪相位模糊度正确分辨概率的表征与改进
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00094
Mingyi You, Binhua Shi, Yunxia Ye, Kai Huang
Correct phase ambiguity resolution (CPAR) for a uniform circular array (UCA) phase interferometer is formally defined and some theoretic results for CPAR are derived. The probability of CPAR is numerically investigated considering the impact of baseline formulation, number of elements, radius wavelength ratio and phase measuring mechanism. Three methods for improving the probability of CPAR are proposed based on the findings of the characteristics of UCA phase interferometers. An extensive numerical investigation is conducted to validate the effectiveness of the proposed methods. The investigation results validate the effectiveness of the proposed methods and suggest choosing among the three proposed methods by considering the specific needs and engineering limitations.
正式定义了均匀圆阵列相位干涉仪的正确相位模糊分辨率,并推导了正确相位模糊分辨率的一些理论结果。考虑基线配方、元素数量、半径波长比和相位测量机制等因素的影响,对CPAR的概率进行了数值研究。基于对UCA相位干涉仪特性的研究,提出了三种提高CPAR概率的方法。为了验证所提出方法的有效性,进行了广泛的数值研究。调查结果验证了所提出方法的有效性,并根据具体需求和工程限制,建议在三种方法中进行选择。
{"title":"Characterizing and Improving the Probability of Correct Phase Ambiguity Resolution for Uniform Circular Array Phase Interferometers","authors":"Mingyi You, Binhua Shi, Yunxia Ye, Kai Huang","doi":"10.1109/NaNA53684.2021.00094","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00094","url":null,"abstract":"Correct phase ambiguity resolution (CPAR) for a uniform circular array (UCA) phase interferometer is formally defined and some theoretic results for CPAR are derived. The probability of CPAR is numerically investigated considering the impact of baseline formulation, number of elements, radius wavelength ratio and phase measuring mechanism. Three methods for improving the probability of CPAR are proposed based on the findings of the characteristics of UCA phase interferometers. An extensive numerical investigation is conducted to validate the effectiveness of the proposed methods. The investigation results validate the effectiveness of the proposed methods and suggest choosing among the three proposed methods by considering the specific needs and engineering limitations.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123005256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Driving Risk Prediction Approach Based on Generative Adversarial Networks and VANET for Autonomous Trams 基于生成对抗网络和VANET的自动有轨电车驾驶风险预测方法
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00096
Wenjiang Ji, Jiangcheng Yang, Yichuan Wang, Lei Zhu, Yuan Qiu, Xinhong Hei
Driving safety is an essential prerequisite to the rapid development of autonomous trams. However, the relationship of driving risk factors is nonlinear, which makes modeling difficult. To improve the accuracy of driving risk prediction, a data driven approach based on Generative Adversarial Networks was proposed. First of all, a communication and alarming scenario of Vehicular Ad-hoc Networks was demonstrated, in which the original data sets can be collected and transmitted by the help of sensors and Road Side Units. Then the RFE feature selection algorithm was used to keep the key features. To deal the sample asymmetry problem, a DCGAN model was designed for sparse samples expansion. At last, the XGBoost algorithm was used to classification and output the risk prediction result. During the experiment implemented with the public and real data sets, the risk prediction accuracy of proposed approach can up to 97.24%, for which takes the advantages in generating of the sparse samples.
驾驶安全是自动驾驶有轨电车快速发展的重要前提。然而,驱动风险因素之间的关系是非线性的,这给建模带来了困难。为了提高驾驶风险预测的准确性,提出了一种基于生成式对抗网络的数据驱动方法。首先,演示了一种车载自组织网络的通信报警场景,在该场景中,传感器和路侧单元可以收集和传输原始数据集。然后使用RFE特征选择算法保留关键特征;为了解决样本不对称问题,设计了一种稀疏样本展开的DCGAN模型。最后,利用XGBoost算法对风险预测结果进行分类并输出。在公开数据集和真实数据集的实验中,该方法的风险预测准确率可达97.24%,具有稀疏样本生成的优势。
{"title":"A Driving Risk Prediction Approach Based on Generative Adversarial Networks and VANET for Autonomous Trams","authors":"Wenjiang Ji, Jiangcheng Yang, Yichuan Wang, Lei Zhu, Yuan Qiu, Xinhong Hei","doi":"10.1109/NaNA53684.2021.00096","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00096","url":null,"abstract":"Driving safety is an essential prerequisite to the rapid development of autonomous trams. However, the relationship of driving risk factors is nonlinear, which makes modeling difficult. To improve the accuracy of driving risk prediction, a data driven approach based on Generative Adversarial Networks was proposed. First of all, a communication and alarming scenario of Vehicular Ad-hoc Networks was demonstrated, in which the original data sets can be collected and transmitted by the help of sensors and Road Side Units. Then the RFE feature selection algorithm was used to keep the key features. To deal the sample asymmetry problem, a DCGAN model was designed for sparse samples expansion. At last, the XGBoost algorithm was used to classification and output the risk prediction result. During the experiment implemented with the public and real data sets, the risk prediction accuracy of proposed approach can up to 97.24%, for which takes the advantages in generating of the sparse samples.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128646901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Covert Authentication at the Physical Layer 在物理层隐蔽身份验证
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00015
Xufei Li, Shuiguang Zeng, Yangyang Liu
The open nature of wireless communication makes it facing variable interferences, the one by malicious attackers can be more harmful since they can choose worthful messages to interfere for benefit maximization. Such targeted messages generally require comprehensive protection by variable security mechanisms, which improve security in some sense as well as the risk of being selective attacked. One is the authentication mechanism that guarantees authenticity but suffers from length detection since the common authentication is conducted by appending digital signature bits to message. Due to this disadvantage, in this paper, we consider embedding the digital signature into the message at the physical layer, which is difficult to be sensed by attackers. Unlike the previous radio frequency (RF) watermark technique that adds low-power authentication tag symbols to base message symbols, while performing obvious constellation characteristics that still can be detected, to make the authentication tag non-perceptible to attackers, we propose to use Trellis coded modulation (TCM) in the embedding process to prevent constellation characteristics based detection. The accuracy of such an authentication scheme and its effect on the based messages are demonstrated by simulations. Simulation results show that the proposed method can greatly provide covert authentication while satisfying good authentication accuracy.
无线通信的开放性使其面临着各种各样的干扰,恶意攻击者可以选择有价值的信息进行干扰,从而达到利益最大化。这种针对性的消息通常需要各种安全机制的全面保护,这在一定程度上提高了安全性,同时也降低了被选择性攻击的风险。一种是保证真实性的身份验证机制,但由于普通身份验证是通过向消息添加数字签名位来进行的,因此受到长度检测的影响。鉴于这一缺点,本文考虑在物理层将数字签名嵌入到消息中,使其难以被攻击者感知。不同于以往的射频水印技术在基本消息符号中加入低功耗的认证标签符号,同时表现出明显的星座特征,使攻击者无法察觉,我们提出在嵌入过程中使用网格编码调制(TCM)来阻止基于星座特征的检测。仿真结果验证了该认证方案的准确性及其对基于消息的影响。仿真结果表明,该方法在保证良好的认证精度的同时,具有较强的隐蔽性。
{"title":"Covert Authentication at the Physical Layer","authors":"Xufei Li, Shuiguang Zeng, Yangyang Liu","doi":"10.1109/NaNA53684.2021.00015","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00015","url":null,"abstract":"The open nature of wireless communication makes it facing variable interferences, the one by malicious attackers can be more harmful since they can choose worthful messages to interfere for benefit maximization. Such targeted messages generally require comprehensive protection by variable security mechanisms, which improve security in some sense as well as the risk of being selective attacked. One is the authentication mechanism that guarantees authenticity but suffers from length detection since the common authentication is conducted by appending digital signature bits to message. Due to this disadvantage, in this paper, we consider embedding the digital signature into the message at the physical layer, which is difficult to be sensed by attackers. Unlike the previous radio frequency (RF) watermark technique that adds low-power authentication tag symbols to base message symbols, while performing obvious constellation characteristics that still can be detected, to make the authentication tag non-perceptible to attackers, we propose to use Trellis coded modulation (TCM) in the embedding process to prevent constellation characteristics based detection. The accuracy of such an authentication scheme and its effect on the based messages are demonstrated by simulations. Simulation results show that the proposed method can greatly provide covert authentication while satisfying good authentication accuracy.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121355232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient authentication scheme based on Zero Trust for UAV swarm 基于零信任的高效无人机群认证方案
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00068
Dongyu Yang, Yue Zhao, Kaijun Wu, Xiaoyu Guo, Haiyang Peng
In recent years, the concept of UAV (Unmanned Aerial Vehicle) swarm has been proposed and developed, which effectively solves the shortcomings of relatively small payload and relatively weak information perception processing capability in a single UAV operation. The research and application of UAV swarm technology has become an important direction of the development of UAV technology. UAV swarm not only can effectively improve the load capacity and information processing capacity through close cooperation between single UAV, but also has a high “self-healing” ability and strong robustness. However, due to the limited computing resources and complex external environment of UAVs, UAV swarm are vulnerable to forgery attacks, man-in-the-middle attacks and reply attacks. It is necessary to establish an authentication scheme to ensure the legitimate and reliable identity of UAVs for data exchange and sharing. However, traditional authentication schemes based on username, password or dynamic key have lower security levels, while RSA authentication requires a long session key and cannot meet the lightweight requirements in an UAV swarm. Based on the analysis and summary of existing authentication technologies and the special requirements of UAV swarm for cyber security, this paper puts forward an authentication scheme based on Zero Trust, achieves rapid authentication of UAV swarm in data exchange and sharing, and strengthens its ability to respond to cyber attacks.
近年来,UAV (Unmanned Aerial Vehicle) swarm的概念被提出并发展,有效解决了单架无人机作战时载荷相对较小、信息感知处理能力相对较弱的缺点。无人机群技术的研究与应用已成为无人机技术发展的重要方向。无人机群不仅可以通过单架无人机之间的紧密协作有效提高载荷能力和信息处理能力,而且具有较高的“自愈”能力和较强的鲁棒性。然而,由于无人机计算资源有限和外部环境复杂,无人机群容易受到伪造攻击、中间人攻击和应答攻击。为了保证无人机的合法、可靠的身份,进行数据交换和共享,有必要建立一个认证方案。然而,传统的基于用户名、密码或动态密钥的认证方案安全级别较低,而RSA认证需要较长的会话密钥,无法满足无人机群的轻量化要求。本文在分析和总结现有认证技术的基础上,结合无人机群对网络安全的特殊要求,提出了一种基于零信任的认证方案,实现了无人机群在数据交换和共享中的快速认证,增强了无人机群应对网络攻击的能力。
{"title":"An efficient authentication scheme based on Zero Trust for UAV swarm","authors":"Dongyu Yang, Yue Zhao, Kaijun Wu, Xiaoyu Guo, Haiyang Peng","doi":"10.1109/NaNA53684.2021.00068","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00068","url":null,"abstract":"In recent years, the concept of UAV (Unmanned Aerial Vehicle) swarm has been proposed and developed, which effectively solves the shortcomings of relatively small payload and relatively weak information perception processing capability in a single UAV operation. The research and application of UAV swarm technology has become an important direction of the development of UAV technology. UAV swarm not only can effectively improve the load capacity and information processing capacity through close cooperation between single UAV, but also has a high “self-healing” ability and strong robustness. However, due to the limited computing resources and complex external environment of UAVs, UAV swarm are vulnerable to forgery attacks, man-in-the-middle attacks and reply attacks. It is necessary to establish an authentication scheme to ensure the legitimate and reliable identity of UAVs for data exchange and sharing. However, traditional authentication schemes based on username, password or dynamic key have lower security levels, while RSA authentication requires a long session key and cannot meet the lightweight requirements in an UAV swarm. Based on the analysis and summary of existing authentication technologies and the special requirements of UAV swarm for cyber security, this paper puts forward an authentication scheme based on Zero Trust, achieves rapid authentication of UAV swarm in data exchange and sharing, and strengthens its ability to respond to cyber attacks.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132529490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deep Learning for GPS Spoofing Detection in Cellular-Enabled UAV Systems 基于深度学习的蜂窝无人机系统GPS欺骗检测
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00093
Yongchao Dang, Chafika Benzaïd, Bin Yang, T. Taleb
Cellular-based Unmanned Aerial Vehicle (UAV) systems are a promising paradigm to provide reliable and fast Beyond Visual Line of Sight (BVLoS) communication services for UAV operations. However, such systems are facing a serious GPS spoofing threat for UAV’s position. To enable safe and secure UAV navigation BVLoS, this paper proposes a cellular network assisted UAV position monitoring and anti-GPS spoofing system, where deep learning approach is used to live detect spoofed GPS positions. Specifically, the proposed system introduces a MultiLayer Perceptron (MLP) model which is trained on the statistical properties of path loss measurements collected from nearby base stations to decide the authenticity of the GPS position. Experiment results indicate the accuracy rate of detecting GPS spoofing under our proposed approach is more than 93% with three base stations and it can also reach 80% with only one base station.
基于蜂窝的无人机(UAV)系统是为无人机操作提供可靠和快速的超视距(BVLoS)通信服务的一个有前途的范例。然而,这种系统面临着严重的GPS欺骗威胁,对无人机的位置。为了实现安全可靠的无人机导航BVLoS,本文提出了一种蜂窝网络辅助无人机位置监测和反GPS欺骗系统,该系统采用深度学习方法实时检测欺骗GPS位置。具体来说,该系统引入了一个多层感知器(MLP)模型,该模型根据从附近基站收集的路径损耗测量数据的统计特性进行训练,以确定GPS位置的真实性。实验结果表明,该方法在3个基站情况下检测GPS欺骗的准确率可达93%以上,单基站情况下检测准确率可达80%以上。
{"title":"Deep Learning for GPS Spoofing Detection in Cellular-Enabled UAV Systems","authors":"Yongchao Dang, Chafika Benzaïd, Bin Yang, T. Taleb","doi":"10.1109/NaNA53684.2021.00093","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00093","url":null,"abstract":"Cellular-based Unmanned Aerial Vehicle (UAV) systems are a promising paradigm to provide reliable and fast Beyond Visual Line of Sight (BVLoS) communication services for UAV operations. However, such systems are facing a serious GPS spoofing threat for UAV’s position. To enable safe and secure UAV navigation BVLoS, this paper proposes a cellular network assisted UAV position monitoring and anti-GPS spoofing system, where deep learning approach is used to live detect spoofed GPS positions. Specifically, the proposed system introduces a MultiLayer Perceptron (MLP) model which is trained on the statistical properties of path loss measurements collected from nearby base stations to decide the authenticity of the GPS position. Experiment results indicate the accuracy rate of detecting GPS spoofing under our proposed approach is more than 93% with three base stations and it can also reach 80% with only one base station.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134608838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Heterogeneous Network Embedding With Enhanced Event Awareness Via Triplet Network 基于三重网络增强事件感知的异构网络嵌入
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00047
Zhi Qiao, Bo Liu, Bo Tian, Yu Liu
Network analysis is an unavoidable topic in data mining today, and network embedding is an important means to help solve network analysis. With the increasing of network data volume, the content is increasingly complicated, the embedding scenario of homogeneous graph has been gradually replaced by heterogeneous graph. More and more embedding algorithms for heterogeneous graphs are proposed. Heterogeneous network can naturally integrate different aspects of information, so heterogeneous network embedding is a relatively effective method to solve the diversity of big data. It is helpful in the areas of anomaly detection, user clustering and intent recommendation. Here we propose a Siamese Neural Network optimization method based on event relations and meta graphs. This method ensures the semantic integrity and event integrity of heterogeneous graphs by using events and meta graphs respectively. Then put the graph information in Triplet Network for training, and the embedding results are produced. A classification task on a dataset for the true network are designed to prove the method. A real network data set classification task is designed to prove that this method is helpful for heterogeneous graph analysis.
网络分析是当今数据挖掘中不可回避的话题,而网络嵌入是解决网络分析问题的重要手段。随着网络数据量的增加,内容的日益复杂,同构图的嵌入场景逐渐被异构图所取代。异构图的嵌入算法越来越多。异构网络可以自然地整合不同方面的信息,因此异构网络嵌入是解决大数据多样性的一种相对有效的方法。它在异常检测、用户聚类和意图推荐等方面都很有帮助。本文提出了一种基于事件关系和元图的Siamese神经网络优化方法。该方法通过使用事件图和元图来保证异构图的语义完整性和事件完整性。然后将图信息放入三元网络中进行训练,得到嵌入结果。设计了一个真实网络数据集上的分类任务来验证该方法。设计了一个真实的网络数据集分类任务,验证了该方法对异构图分析的帮助。
{"title":"Heterogeneous Network Embedding With Enhanced Event Awareness Via Triplet Network","authors":"Zhi Qiao, Bo Liu, Bo Tian, Yu Liu","doi":"10.1109/NaNA53684.2021.00047","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00047","url":null,"abstract":"Network analysis is an unavoidable topic in data mining today, and network embedding is an important means to help solve network analysis. With the increasing of network data volume, the content is increasingly complicated, the embedding scenario of homogeneous graph has been gradually replaced by heterogeneous graph. More and more embedding algorithms for heterogeneous graphs are proposed. Heterogeneous network can naturally integrate different aspects of information, so heterogeneous network embedding is a relatively effective method to solve the diversity of big data. It is helpful in the areas of anomaly detection, user clustering and intent recommendation. Here we propose a Siamese Neural Network optimization method based on event relations and meta graphs. This method ensures the semantic integrity and event integrity of heterogeneous graphs by using events and meta graphs respectively. Then put the graph information in Triplet Network for training, and the embedding results are produced. A classification task on a dataset for the true network are designed to prove the method. A real network data set classification task is designed to prove that this method is helpful for heterogeneous graph analysis.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117353427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chinese named entity recognition method for the field of network security based on RoBERTa 基于RoBERTa的网络安全领域中文命名实体识别方法
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00079
Xiaoyan Zhu, Y. Zhang, Lei Zhu, Xinhong Hei, Yichuan Wang, Feixiong Hu, Yanni Yao
As the mobile Internet is developing rapidly, people who use cell phones to access the Internet dominate, and the mobile Internet has changed the development environment of online public opinion and made online public opinion events spread more widely. In the online environment, any kind of public issues may become a trigger for the generation of public opinion and thus need to be controlled for network supervision. The method in this paper can identify entities from the event texts obtained from mobile Today's Headlines, People's Daily, etc., and informatize security of public opinion in event instances, thus strengthening network supervision and control in mobile, and providing sufficient support for national security event management. In this paper, we present a SW-BiLSTM-CRF model, as well as a model combining the RoBERTa pre-trained model with the classical neural network BiLSTM model. Our experiments show that this approach provided achieves quite good results on Chinese emergency corpus, with accuracy and F1 values of 87.21% and 78.78%, respectively.
随着移动互联网的快速发展,使用手机上网的人群占主导地位,移动互联网改变了网络舆情的发展环境,使得网络舆情事件传播更加广泛。在网络环境中,任何一种公共问题都可能成为舆论产生的导火索,因此需要网络监管加以控制。本文方法可以从手机《今日头条》、《人民日报》等获取的事件文本中识别实体,对事件实例中的舆情安全进行信息化处理,从而加强移动网络的监管和控制,为国家安全事件管理提供充足的支持。在本文中,我们提出了SW-BiLSTM-CRF模型,以及RoBERTa预训练模型与经典神经网络BiLSTM模型相结合的模型。实验表明,该方法在中文应急语料库上取得了较好的效果,准确率和F1值分别为87.21%和78.78%。
{"title":"Chinese named entity recognition method for the field of network security based on RoBERTa","authors":"Xiaoyan Zhu, Y. Zhang, Lei Zhu, Xinhong Hei, Yichuan Wang, Feixiong Hu, Yanni Yao","doi":"10.1109/NaNA53684.2021.00079","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00079","url":null,"abstract":"As the mobile Internet is developing rapidly, people who use cell phones to access the Internet dominate, and the mobile Internet has changed the development environment of online public opinion and made online public opinion events spread more widely. In the online environment, any kind of public issues may become a trigger for the generation of public opinion and thus need to be controlled for network supervision. The method in this paper can identify entities from the event texts obtained from mobile Today's Headlines, People's Daily, etc., and informatize security of public opinion in event instances, thus strengthening network supervision and control in mobile, and providing sufficient support for national security event management. In this paper, we present a SW-BiLSTM-CRF model, as well as a model combining the RoBERTa pre-trained model with the classical neural network BiLSTM model. Our experiments show that this approach provided achieves quite good results on Chinese emergency corpus, with accuracy and F1 values of 87.21% and 78.78%, respectively.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129873504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 International Conference on Networking and Network Applications (NaNA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1