首页 > 最新文献

2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)最新文献

英文 中文
Introduction to Quantum Systems and Security Vulnerabilities 量子系统和安全漏洞简介
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454809
Ignacio Astaburuaga, Shamik Sengupta
The objective of this paper is to propose and establish a new area of research and increase awareness of key cybersecurity aspects relating to the manufacturing, creation, development, and maintenance of quantum systems and identify key challenges in this domain. It aims to present areas of focus of cybersecurity in the quantum field. Through research, we have established a new emerging gap in the security of quantum systems. This paper introduces the basics of quantum systems, circuits, and computers. Then, it continues to introduce the current state of quantum technologies. Finally, it introduces cybersecurity and quantum and establishes new avenues of attacks for such systems.
本文旨在提出并建立一个新的研究领域,提高人们对与量子系统的制造、创建、开发和维护有关的关键网络安全问题的认识,并确定该领域的关键挑战。本文旨在介绍量子领域网络安全的重点领域。通过研究,我们发现了量子系统安全方面新出现的缺口。本文介绍了量子系统、电路和计算机的基础知识。然后,继续介绍量子技术的现状。最后,它介绍了网络安全和量子,并为此类系统建立了新的攻击途径。
{"title":"Introduction to Quantum Systems and Security Vulnerabilities","authors":"Ignacio Astaburuaga, Shamik Sengupta","doi":"10.1109/CCNC51664.2024.10454809","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454809","url":null,"abstract":"The objective of this paper is to propose and establish a new area of research and increase awareness of key cybersecurity aspects relating to the manufacturing, creation, development, and maintenance of quantum systems and identify key challenges in this domain. It aims to present areas of focus of cybersecurity in the quantum field. Through research, we have established a new emerging gap in the security of quantum systems. This paper introduces the basics of quantum systems, circuits, and computers. Then, it continues to introduce the current state of quantum technologies. Finally, it introduces cybersecurity and quantum and establishes new avenues of attacks for such systems.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"79 3","pages":"345-351"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Train Your Attention and Executive Functions with Eye-Riders! A Videogame for Improving Cognitive Abilities in Neurodiverse Children 用 Eye-Riders 训练你的注意力和执行功能!提高神经多样性儿童认知能力的视频游戏
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454866
Mariagrazia Benassi, Davide Paolillo, Matilde Spinoso, S. Giovagnoli, Noemi Mazzoni, Luca Formica, Gianni Tumedei, Catia Prandi
Although it is increasingly common to use digital games for the cognitive training, to date there is still a need for more studies of the effectiveness of neuropsychological treatments based on digital games, especially for populations with Specific Learning Disorders (SLDs). This study aims to present the effectiveness of Eye-Riders, a serious game developed to train executive functions in neurodiverse children. A group of 41 children (age range 7–9 years) participated in the study: 13 with SLDs and 28 with typical development. The training consisted in playing Eye-Riders in 9 sessions of 20 minutes each, with a frequency of 3 times a week for three weeks. The effectiveness of the training was assessed by means of the Nepsy-II battery of executive and attentional function scales, administered before and after the training. The gaming style was measured by Gaming Style Questionnaire (GSQ). The results showed significant improvement in the skills of Auditory Attention, Visual Attention, Inhibition and Switching in both groups. These results had a positive impact in reading abilities. In addition, the results reveal that in children with SLD, the improvement achieved in visual attention skills can be attributed to the improvement in game performance. In conclusion, Eye-Riders is an effective video game to of executive functions in neurodivergent children.
尽管使用数字游戏进行认知训练越来越普遍,但迄今为止,仍需要对基于数字游戏的神经心理学治疗的有效性进行更多的研究,尤其是针对有特殊学习障碍(SLD)的人群。本研究旨在介绍《Eye-Riders》这款严肃游戏的有效性,该游戏是为训练神经多样化儿童的执行功能而开发的。共有 41 名儿童(年龄在 7-9 岁之间)参与了这项研究:其中 13 名患有特殊学习障碍,28 名发育正常。训练包括玩 "Eye-Riders "游戏,共 9 次,每次 20 分钟,每周 3 次,持续 3 周。训练前后,通过 Nepsy-II 执行和注意功能量表对训练效果进行了评估。游戏风格通过游戏风格问卷(GSQ)进行测量。结果显示,两组学生的听觉注意力、视觉注意力、抑制和转换能力都有了明显的提高。这些结果对阅读能力产生了积极影响。此外,研究结果还显示,对于患有特殊学习障碍的儿童来说,视觉注意力技能的提高可归因于游戏成绩的提高。总之,《Eye-Riders》是一款能有效提高神经发育迟缓儿童执行功能的视频游戏。
{"title":"Train Your Attention and Executive Functions with Eye-Riders! A Videogame for Improving Cognitive Abilities in Neurodiverse Children","authors":"Mariagrazia Benassi, Davide Paolillo, Matilde Spinoso, S. Giovagnoli, Noemi Mazzoni, Luca Formica, Gianni Tumedei, Catia Prandi","doi":"10.1109/CCNC51664.2024.10454866","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454866","url":null,"abstract":"Although it is increasingly common to use digital games for the cognitive training, to date there is still a need for more studies of the effectiveness of neuropsychological treatments based on digital games, especially for populations with Specific Learning Disorders (SLDs). This study aims to present the effectiveness of Eye-Riders, a serious game developed to train executive functions in neurodiverse children. A group of 41 children (age range 7–9 years) participated in the study: 13 with SLDs and 28 with typical development. The training consisted in playing Eye-Riders in 9 sessions of 20 minutes each, with a frequency of 3 times a week for three weeks. The effectiveness of the training was assessed by means of the Nepsy-II battery of executive and attentional function scales, administered before and after the training. The gaming style was measured by Gaming Style Questionnaire (GSQ). The results showed significant improvement in the skills of Auditory Attention, Visual Attention, Inhibition and Switching in both groups. These results had a positive impact in reading abilities. In addition, the results reveal that in children with SLD, the improvement achieved in visual attention skills can be attributed to the improvement in game performance. In conclusion, Eye-Riders is an effective video game to of executive functions in neurodivergent children.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"70 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Integration of Digital Twin Networks into City Digital Twins: Benefits and Challenges 论数字孪生网络与城市数字孪生网络的整合:效益与挑战
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454704
Ion Turcanu, German Castignani, Sébastien Faye
The concept of Digital Twin (DT) holds great potential for all sectors seeking to monitor, automate, and optimize their processes. This paper focuses specifically on Digital Twin Networks (DTNs) and City Digital Twins (CDTs), offering an analysis of the relevant literature while exploring their interrelationship, which is essential for urban planners and network operators. Although DTN is foreseen as a pillar of future 5G and 6G network architectures, it is often addressed in isolation in the existing literature (i.e., with limited consideration of other domain-specific constraints), even though it constitutes an essential asset in urban environments. In contrast, CDT is often based on the idea of infallible connectivity, which is an optimistic assumption. This study details the benefits and challenges associated with the integration of DTNs into CDTs, paving the way for further research in this field.
数字孪生(DT)的概念对于寻求监控、自动化和优化流程的所有行业都具有巨大的潜力。本文特别关注数字孪生网络(DTN)和城市数字孪生(CDT),对相关文献进行了分析,同时探讨了它们之间的相互关系,这对城市规划者和网络运营商至关重要。虽然 DTN 被认为是未来 5G 和 6G 网络架构的支柱,但在现有文献中,它往往被孤立地处理(即对其他特定领域的限制因素考虑有限),尽管它是城市环境中的重要资产。与此相反,CDT 通常建立在无误连接的基础上,这是一种乐观的假设。本研究详细介绍了将 DTN 集成到 CDT 中的好处和挑战,为这一领域的进一步研究铺平了道路。
{"title":"On the Integration of Digital Twin Networks into City Digital Twins: Benefits and Challenges","authors":"Ion Turcanu, German Castignani, Sébastien Faye","doi":"10.1109/CCNC51664.2024.10454704","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454704","url":null,"abstract":"The concept of Digital Twin (DT) holds great potential for all sectors seeking to monitor, automate, and optimize their processes. This paper focuses specifically on Digital Twin Networks (DTNs) and City Digital Twins (CDTs), offering an analysis of the relevant literature while exploring their interrelationship, which is essential for urban planners and network operators. Although DTN is foreseen as a pillar of future 5G and 6G network architectures, it is often addressed in isolation in the existing literature (i.e., with limited consideration of other domain-specific constraints), even though it constitutes an essential asset in urban environments. In contrast, CDT is often based on the idea of infallible connectivity, which is an optimistic assumption. This study details the benefits and challenges associated with the integration of DTNs into CDTs, paving the way for further research in this field.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"68 10","pages":"752-758"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Indoor Millimeter Radio Communication: A Probabilistic Approach to RSS Map Estimation 增强室内毫米波无线电通信:RSS 地图估计的概率方法
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454887
Daiki Kodama, Kenji Ohira, Hideyuki Shimonishi, Toshiro Nakahira, Daisuke Murayama, Tomoaki Ogawa
In Cyber-Physical Systems (CPS), the reliability of wireless communication is paramount to ensuring safety. Received Signal Strength (RSS) map is particularly beneficial for safe robot operation, for example. However, accurately estimating an RSS map poses significant challenges, particularly when higher frequency bands are employed for broadband communications. Therefore, it is also important to not only further enhance the accuracy of the estimation, which is the target of many existing methods, but also design system that can tolerate errors in the estimation. In this paper, we propose a method for constructing a digital twin that represents the quality of the wireless network using probability distributions. Representing data probabilistically proves effective for risk-sensitive robot control or robust planning of base station positioning. We propose using a graphical model known as Markov Random Field (MRF), to depict the spatial structure of the RSS map. The probability distribution of the RSS value at each point within the space is provided as the marginal probabilities of the MRF. We then evaluated the proposed method in our own 28 GHz Private 5G environment and extensively studied the characteristics of indoor millimeter radio communication. We confirmed that each estimated point can be well estimated by probability distribution using the proposed method. In addition, the design of error toler-ance based probability distribution is discussed. By determining a margin on the estimated expected value based on the standard deviation of the estimated distribution, the margin can be set more efficiently than by determining a uniform margin for each points.
在网络物理系统(CPS)中,无线通信的可靠性对确保安全至关重要。例如,接收信号强度(RSS)图对机器人的安全操作尤其有利。然而,准确估算 RSS 地图是一项重大挑战,尤其是在宽带通信采用较高频段时。因此,不仅要进一步提高估算的准确性(这也是许多现有方法的目标),还要设计出能够容忍估算误差的系统。在本文中,我们提出了一种构建数字孪生的方法,该方法使用概率分布来表示无线网络的质量。事实证明,以概率方式表示数据对于风险敏感型机器人控制或基站定位的稳健规划非常有效。我们建议使用一种称为马尔可夫随机场(MRF)的图形模型来描述 RSS 地图的空间结构。空间内各点 RSS 值的概率分布作为 MRF 的边际概率提供。然后,我们在自己的 28 GHz 专用 5G 环境中对所提出的方法进行了评估,并广泛研究了室内毫米波无线电通信的特性。我们证实,使用所提出的方法,每个估计点都能通过概率分布得到很好的估计。此外,我们还讨论了基于概率分布的容错设计。通过根据估计分布的标准偏差确定估计期望值的余量,可以比为每个点确定统一余量更有效地设置余量。
{"title":"Enhancing Indoor Millimeter Radio Communication: A Probabilistic Approach to RSS Map Estimation","authors":"Daiki Kodama, Kenji Ohira, Hideyuki Shimonishi, Toshiro Nakahira, Daisuke Murayama, Tomoaki Ogawa","doi":"10.1109/CCNC51664.2024.10454887","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454887","url":null,"abstract":"In Cyber-Physical Systems (CPS), the reliability of wireless communication is paramount to ensuring safety. Received Signal Strength (RSS) map is particularly beneficial for safe robot operation, for example. However, accurately estimating an RSS map poses significant challenges, particularly when higher frequency bands are employed for broadband communications. Therefore, it is also important to not only further enhance the accuracy of the estimation, which is the target of many existing methods, but also design system that can tolerate errors in the estimation. In this paper, we propose a method for constructing a digital twin that represents the quality of the wireless network using probability distributions. Representing data probabilistically proves effective for risk-sensitive robot control or robust planning of base station positioning. We propose using a graphical model known as Markov Random Field (MRF), to depict the spatial structure of the RSS map. The probability distribution of the RSS value at each point within the space is provided as the marginal probabilities of the MRF. We then evaluated the proposed method in our own 28 GHz Private 5G environment and extensively studied the characteristics of indoor millimeter radio communication. We confirmed that each estimated point can be well estimated by probability distribution using the proposed method. In addition, the design of error toler-ance based probability distribution is discussed. By determining a margin on the estimated expected value based on the standard deviation of the estimated distribution, the margin can be set more efficiently than by determining a uniform margin for each points.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"63 7","pages":"241-247"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized Defense: Leveraging Blockchain against Poisoning Attacks in Federated Learning Systems 去中心化防御:利用区块链对抗联合学习系统中的中毒攻击
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454688
Rashmi Thennakoon, Arosha Wanigasundara, Sanjaya Weerasinghe, Chatura Seneviratne, Yushan Siriwardhana, Madhusanka Liyanage
Federated learning (FL) has become the next generation of machine learning (ML) by avoiding local data sharing with a central server. While this becomes a major advantage to client-side privacy, it has a trade-off of becoming vulnerable to poisoning attacks and malicious behavior of the central server. As the decentralization of systems enhances security concerns, integrating decentralized defense for the existing FL systems has been extensively studied to eliminate the security issues of FL systems. This paper proposes a decentralized defense approach to FL systems with blockchain technology to overcome the poisoning attack without affecting the existing FL system's performance. We introduce a reliable blockchain-based FL (BCFL) architecture in two different models, namely, Centralized Aggregated BCFL (CA-BCFL) and Fully Decentralized BCFL (FD-BCFL). Both models utilize secure off-chain computations for malicious mitigation as an alternative to high-cost on-chain computations. Our comprehensive analysis shows that the proposed BCFL architectures can defend in a similar manner against poisoning attacks that compromise the aggregator. As a better measure, the paper has included an evaluation of the gas consumption of our two system models.
通过避免与中央服务器共享本地数据,联合学习(FL)已成为下一代机器学习(ML)。虽然这对客户端的隐私保护有很大好处,但同时也容易受到中毒攻击和中央服务器恶意行为的影响。由于系统的去中心化增强了安全问题,为消除 FL 系统的安全问题,人们对现有 FL 系统的去中心化防御进行了广泛研究。本文提出了一种利用区块链技术对 FL 系统进行去中心化防御的方法,以在不影响现有 FL 系统性能的情况下克服中毒攻击。我们介绍了一种可靠的基于区块链的 FL(BCFL)架构,它有两种不同的模式,即集中式聚合 BCFL(CA-BCFL)和完全去中心化 BCFL(FD-BCFL)。这两种模式都利用安全的链外计算来减少恶意,以替代高成本的链上计算。我们的综合分析表明,所提出的 BCFL 架构能以类似的方式抵御危及聚合器的中毒攻击。作为更好的衡量标准,本文还包括对两种系统模型耗气量的评估。
{"title":"Decentralized Defense: Leveraging Blockchain against Poisoning Attacks in Federated Learning Systems","authors":"Rashmi Thennakoon, Arosha Wanigasundara, Sanjaya Weerasinghe, Chatura Seneviratne, Yushan Siriwardhana, Madhusanka Liyanage","doi":"10.1109/CCNC51664.2024.10454688","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454688","url":null,"abstract":"Federated learning (FL) has become the next generation of machine learning (ML) by avoiding local data sharing with a central server. While this becomes a major advantage to client-side privacy, it has a trade-off of becoming vulnerable to poisoning attacks and malicious behavior of the central server. As the decentralization of systems enhances security concerns, integrating decentralized defense for the existing FL systems has been extensively studied to eliminate the security issues of FL systems. This paper proposes a decentralized defense approach to FL systems with blockchain technology to overcome the poisoning attack without affecting the existing FL system's performance. We introduce a reliable blockchain-based FL (BCFL) architecture in two different models, namely, Centralized Aggregated BCFL (CA-BCFL) and Fully Decentralized BCFL (FD-BCFL). Both models utilize secure off-chain computations for malicious mitigation as an alternative to high-cost on-chain computations. Our comprehensive analysis shows that the proposed BCFL architectures can defend in a similar manner against poisoning attacks that compromise the aggregator. As a better measure, the paper has included an evaluation of the gas consumption of our two system models.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"94 10","pages":"950-955"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lightweight Aggregate Authentication Protocol for Internet of Drones 无人机互联网轻量级聚合认证协议
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454703
Image Bhattarai, Cong Pu, Kim–Kwang Raymond Choo
The Internet of Drones (IoD), an innovative aerial-ground communication architecture, has quickly became the driving force for various civilian applications (e.g., body temperature detecting drones during the global pandemic of coronavirus disease). In the IoD, a fleet of drones are deployed over an area of interest, collect task-specific data, and then deliver them to the ground station for further data exploration and analysis. To fully exploit the potential of IoD in today's dynamic and evolving cyber-threat environment, the security and efficiency challenges existing in the IoD communications should be well addressed. Some researchers have developed security mechanisms to enable the authentication between the ground station and the drones in the IoD systems. Nonetheless, those schemes mainly focus on the security aspect but overlook the importance of communication efficiency to the resource-constrained drones. In order to fill this research gap, this paper proposes a lightweight aggregate authentication scheme (hereafter referred to as liteAGAP) to tackle the challenges of communication security and efficiency together. Specifically, liteAGAP utilizes cryptographic primitives such as physical unclonable function and bilinear pairing to efficiently secure the data exchange between the ground station and a group of drones in the IoD systems. To evaluate its security performance, liteAGAP is first implemented in the security-sensitive protocol modeling language. Then, we analyze and verify liteAGAP using AVISPA, which is a well-known Internet security protocol verification framework. We also implement liteAGAP and its counterpart schemes in a simulation environment, where the simulation-based experiments are conducted to obtain the results of communication overhead, running time, memory storage usage, and energy consumption. According to the results of security verification/analysis and performance evaluation, we conclude that not only liteAGAP meets the expected security requirements, but also provides superior performance compared to the existing schemes.
无人机互联网(IoD)是一种创新的空地通信架构,已迅速成为各种民用应用的推动力(例如,在冠状病毒疾病全球流行期间的无人机体温检测)。在 IoD 中,无人机机群被部署到感兴趣的区域上空,收集特定任务的数据,然后将数据传送到地面站进行进一步的数据探索和分析。在当今动态和不断演变的网络威胁环境中,要充分发挥 IoD 的潜力,就必须妥善解决 IoD 通信中存在的安全和效率挑战。一些研究人员开发了安全机制,以实现 IoD 系统中地面站与无人机之间的身份验证。然而,这些方案主要侧重于安全方面,却忽视了通信效率对资源有限的无人机的重要性。为了填补这一研究空白,本文提出了一种轻量级聚合身份验证方案(以下简称 liteAGAP),以同时应对通信安全和效率的挑战。具体来说,liteAGAP 利用物理不可克隆函数和双线性配对等加密原语,有效地保证了 IoD 系统中地面站与一组无人机之间数据交换的安全。为了评估其安全性能,我们首先用安全敏感协议建模语言实现了 liteAGAP。然后,我们使用著名的互联网安全协议验证框架 AVISPA 对 liteAGAP 进行分析和验证。我们还在仿真环境中实现了 liteAGAP 及其对应方案,并进行了基于仿真的实验,以获得通信开销、运行时间、内存存储使用和能耗的结果。根据安全验证/分析和性能评估的结果,我们得出结论:与现有方案相比,liteAGAP 不仅能满足预期的安全要求,还能提供更优越的性能。
{"title":"A Lightweight Aggregate Authentication Protocol for Internet of Drones","authors":"Image Bhattarai, Cong Pu, Kim–Kwang Raymond Choo","doi":"10.1109/CCNC51664.2024.10454703","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454703","url":null,"abstract":"The Internet of Drones (IoD), an innovative aerial-ground communication architecture, has quickly became the driving force for various civilian applications (e.g., body temperature detecting drones during the global pandemic of coronavirus disease). In the IoD, a fleet of drones are deployed over an area of interest, collect task-specific data, and then deliver them to the ground station for further data exploration and analysis. To fully exploit the potential of IoD in today's dynamic and evolving cyber-threat environment, the security and efficiency challenges existing in the IoD communications should be well addressed. Some researchers have developed security mechanisms to enable the authentication between the ground station and the drones in the IoD systems. Nonetheless, those schemes mainly focus on the security aspect but overlook the importance of communication efficiency to the resource-constrained drones. In order to fill this research gap, this paper proposes a lightweight aggregate authentication scheme (hereafter referred to as liteAGAP) to tackle the challenges of communication security and efficiency together. Specifically, liteAGAP utilizes cryptographic primitives such as physical unclonable function and bilinear pairing to efficiently secure the data exchange between the ground station and a group of drones in the IoD systems. To evaluate its security performance, liteAGAP is first implemented in the security-sensitive protocol modeling language. Then, we analyze and verify liteAGAP using AVISPA, which is a well-known Internet security protocol verification framework. We also implement liteAGAP and its counterpart schemes in a simulation environment, where the simulation-based experiments are conducted to obtain the results of communication overhead, running time, memory storage usage, and energy consumption. According to the results of security verification/analysis and performance evaluation, we conclude that not only liteAGAP meets the expected security requirements, but also provides superior performance compared to the existing schemes.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"68 3","pages":"143-151"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SwitchingNet: Edge-Assisted Model Switching for Accurate Video Recognition Over Best-Effort Networks 交换网络:边缘辅助模型切换,通过尽力网络实现准确视频识别
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454650
Florian Beye, Yasunori Babazaki, Ryuhei Ando, Takashi Oshiba, Koichi Nihei, Katsuhiko Takahashi
Despite the remarkable success of deep-learning in image and video recognition, constructing real-time recognition systems for computationally intensive tasks such as spatio-temporal human action localization is still challenging. As computational complexity of these tasks can easily exceed the capacity of edge devices, inference must be performed in remote (cloud) environments. But then, recognition accuracy is subject to fluctuating networking conditions in best-effort networks due to compression artefacts incurred from low-bitrate video streaming. To improve overall recognition accuracy under various networking conditions, we propose SwitchingNet, an edge-assisted inference model switching method. In SwitchingNet, we train multiple recognition models specialized towards different levels of image quality and a neural switching model for dynamically choosing among the specialized recognition models during system operation. Switching decisions are made at the edge given an image quality vector calculated from compressed and uncompressed frames. In the experiments, we show that our approach can on average sustain higher recognition accuracy than plain recognition systems under heavily fluctuating networking conditions. Also, our switching-based recognition approach is far less computationally intensive than competing ensemble methods and allows to significantly reduce cloud computing costs.
尽管深度学习在图像和视频识别领域取得了巨大成功,但为计算密集型任务(如时空人类动作定位)构建实时识别系统仍然充满挑战。由于这些任务的计算复杂度很容易超出边缘设备的能力,因此必须在远程(云)环境中进行推理。但是,在尽力而为的网络中,由于低比特率视频流造成的压缩假象,识别准确率会受到网络条件波动的影响。为了提高各种网络条件下的整体识别准确率,我们提出了一种边缘辅助推理模型切换方法 SwitchingNet。在 SwitchingNet 中,我们针对不同的图像质量水平训练了多个专门的识别模型,并训练了一个神经切换模型,用于在系统运行过程中动态选择专门的识别模型。根据压缩和未压缩帧计算出的图像质量向量,在边缘做出切换决定。在实验中,我们发现在网络严重波动的条件下,我们的方法比普通识别系统平均能保持更高的识别准确率。此外,我们基于切换的识别方法的计算密集度远远低于同类的集合方法,可以显著降低云计算成本。
{"title":"SwitchingNet: Edge-Assisted Model Switching for Accurate Video Recognition Over Best-Effort Networks","authors":"Florian Beye, Yasunori Babazaki, Ryuhei Ando, Takashi Oshiba, Koichi Nihei, Katsuhiko Takahashi","doi":"10.1109/CCNC51664.2024.10454650","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454650","url":null,"abstract":"Despite the remarkable success of deep-learning in image and video recognition, constructing real-time recognition systems for computationally intensive tasks such as spatio-temporal human action localization is still challenging. As computational complexity of these tasks can easily exceed the capacity of edge devices, inference must be performed in remote (cloud) environments. But then, recognition accuracy is subject to fluctuating networking conditions in best-effort networks due to compression artefacts incurred from low-bitrate video streaming. To improve overall recognition accuracy under various networking conditions, we propose SwitchingNet, an edge-assisted inference model switching method. In SwitchingNet, we train multiple recognition models specialized towards different levels of image quality and a neural switching model for dynamically choosing among the specialized recognition models during system operation. Switching decisions are made at the edge given an image quality vector calculated from compressed and uncompressed frames. In the experiments, we show that our approach can on average sustain higher recognition accuracy than plain recognition systems under heavily fluctuating networking conditions. Also, our switching-based recognition approach is far less computationally intensive than competing ensemble methods and allows to significantly reduce cloud computing costs.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"93 2","pages":"37-43"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why Real-Time Matters: Performance Evaluation of Recent Ultra-Low Latency Audio Communication Systems 为什么实时很重要?最新超低延迟音频通信系统的性能评估
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454742
Ramon Moscatelli, Kevin Stahel, Robert Kraneis, Christian Werner
Latency-optimized audio communication systems for the Internet have mainly been studied in the context of networked music performances (NMP) and high-end video conferencing systems. To date, the research in this field has focused on approaches for compensating the negative effects of network jitter on the audio transmission. The contribution of this paper is threefold: first, the authors summarize the state of the art in the area of ultra-low latency audio communications; second, they provide a quantitative performance analysis of recent implementations; and finally, they discuss the benefits of real-time-capable endpoint implementations. This discussion shows that not only the network jitter has a significant impact on the overall system performance, but also the timing jitter induced by endpoint systems running non-real-time software. This opens up enormous research potential for future work on real-time systems for latency-optimized audio communication.
针对互联网的延迟优化音频通信系统主要是在网络音乐表演(NMP)和高端视频会议系统中进行研究的。迄今为止,该领域的研究主要集中在补偿网络抖动对音频传输负面影响的方法上。本文有三方面的贡献:首先,作者总结了超低延迟音频通信领域的技术现状;其次,他们对最近的实施方案进行了定量性能分析;最后,他们讨论了支持实时的终端实施方案的优势。讨论表明,不仅网络抖动对系统整体性能有重大影响,运行非实时软件的终端系统引起的定时抖动也会对系统整体性能产生重大影响。这为未来针对延迟优化音频通信实时系统的工作开辟了巨大的研究潜力。
{"title":"Why Real-Time Matters: Performance Evaluation of Recent Ultra-Low Latency Audio Communication Systems","authors":"Ramon Moscatelli, Kevin Stahel, Robert Kraneis, Christian Werner","doi":"10.1109/CCNC51664.2024.10454742","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454742","url":null,"abstract":"Latency-optimized audio communication systems for the Internet have mainly been studied in the context of networked music performances (NMP) and high-end video conferencing systems. To date, the research in this field has focused on approaches for compensating the negative effects of network jitter on the audio transmission. The contribution of this paper is threefold: first, the authors summarize the state of the art in the area of ultra-low latency audio communications; second, they provide a quantitative performance analysis of recent implementations; and finally, they discuss the benefits of real-time-capable endpoint implementations. This discussion shows that not only the network jitter has a significant impact on the overall system performance, but also the timing jitter induced by endpoint systems running non-real-time software. This opens up enormous research potential for future work on real-time systems for latency-optimized audio communication.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"16 4","pages":"77-83"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced SB-SPS Scheme to Mitigate Half Duplex Problem for Relay Transmission in Vehicle Platooning 增强型 SB-SPS 方案缓解车辆编队中中继传输的半双工问题
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454642
Akito Ohshima, K. Sanada, Hiroyuki Hatano, Kazuo Mori
In vehicle platooning, relay transmission using sidelink communications, specified by the C-V2X (Cellular Vehicle-to-Everything) standard is considered as a means of information exchange. The autonomous resource management scheme, SB-SPS (Sensing Based Semi Persistent Scheduling), has been standardized for sidelink communications. However, a half duplex problem, one of major problems in the SB-SPS, is not sufficiently resolved for the relay transmission in vehicle platooning. This work proposes an enhanced resource management scheme to mitigate half duplex problem in vehicle platooning employing the SB-SPS scheme. The performance evaluation through computer simulation demonstrates the effectiveness of the proposed scheme.
在车辆编队中,使用 C-V2X(蜂窝式车对物)标准规定的侧链路通信进行中继传输被视为一种信息交换手段。自主资源管理方案 SB-SPS(基于传感的半持久调度)已被标准化用于侧链路通信。然而,SB-SPS 的主要问题之一--半双工问题,在排车中的中继传输中没有得到充分解决。这项工作提出了一种增强的资源管理方案,以缓解车辆排成队时采用 SB-SPS 方案的半双工问题。通过计算机仿真进行的性能评估证明了所提方案的有效性。
{"title":"Enhanced SB-SPS Scheme to Mitigate Half Duplex Problem for Relay Transmission in Vehicle Platooning","authors":"Akito Ohshima, K. Sanada, Hiroyuki Hatano, Kazuo Mori","doi":"10.1109/CCNC51664.2024.10454642","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454642","url":null,"abstract":"In vehicle platooning, relay transmission using sidelink communications, specified by the C-V2X (Cellular Vehicle-to-Everything) standard is considered as a means of information exchange. The autonomous resource management scheme, SB-SPS (Sensing Based Semi Persistent Scheduling), has been standardized for sidelink communications. However, a half duplex problem, one of major problems in the SB-SPS, is not sufficiently resolved for the relay transmission in vehicle platooning. This work proposes an enhanced resource management scheme to mitigate half duplex problem in vehicle platooning employing the SB-SPS scheme. The performance evaluation through computer simulation demonstrates the effectiveness of the proposed scheme.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"107 6","pages":"654-655"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COPS: A Compact On-Device Pipeline for Real-Time Smishing Detection COPS:用于实时检测钓鱼网站的紧凑型设备管道
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454635
Harichandana B S S, Sumit Kumar, Manjunath B. Ujjinakoppa, Barath Raj Kandur Raja
Smartphones have become indispensable in our daily lives and can do almost everything, from communication to online shopping. However, with the increased usage, cybercrime aimed at mobile devices is rocketing. Smishing attacks, in particular, have observed a significant upsurge in recent years. This problem is further exacerbated by the perpetrator creating new deceptive websites daily, with an average life cycle of under 15 hours. This renders the standard practice of keeping a database of malicious URLs ineffective. To this end, we propose a novel on-device pipeline: COPS that intelligently identifies features of fraudulent messages and URLs to alert the user in real-time. COPS is a lightweight pipeline with a detection module based on the Disentangled Variational Autoencoder of size 3.46MB for smishing and URL phishing detection, and we benchmark it on open datasets. We achieve an accuracy of 98.15% and 99.5%, respectively, for both tasks, with a false negative and false positive rate of a mere 0.037 and 0.015, outperforming previous works with the added advantage of ensuring real-time alerts on resource-constrained devices.
智能手机已成为我们日常生活中不可或缺的工具,从通讯到网上购物,几乎无所不能。然而,随着使用率的提高,针对移动设备的网络犯罪也在急剧上升。尤其是 Smishing 攻击,近年来显著增加。由于犯罪者每天都在创建新的欺骗性网站,而网站的平均生命周期不到 15 个小时,这进一步加剧了这一问题。这使得保存恶意 URL 数据库的标准做法无法奏效。为此,我们提出了一种新颖的设备管道:COPS 可智能识别欺诈信息和 URL 的特征,从而实时向用户发出警报。COPS 是一个轻量级的管道,它的检测模块基于离散变异自动编码器(Disentangled Variational Autoencoder),大小为 3.46MB,可用于网络钓鱼和 URL 钓鱼检测,我们在开放数据集上对其进行了基准测试。在这两项任务中,我们的准确率分别达到了 98.15% 和 99.5%,假阴性率和假阳性率仅为 0.037 和 0.015,性能优于之前的研究成果,而且还能确保在资源有限的设备上发出实时警报。
{"title":"COPS: A Compact On-Device Pipeline for Real-Time Smishing Detection","authors":"Harichandana B S S, Sumit Kumar, Manjunath B. Ujjinakoppa, Barath Raj Kandur Raja","doi":"10.1109/CCNC51664.2024.10454635","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454635","url":null,"abstract":"Smartphones have become indispensable in our daily lives and can do almost everything, from communication to online shopping. However, with the increased usage, cybercrime aimed at mobile devices is rocketing. Smishing attacks, in particular, have observed a significant upsurge in recent years. This problem is further exacerbated by the perpetrator creating new deceptive websites daily, with an average life cycle of under 15 hours. This renders the standard practice of keeping a database of malicious URLs ineffective. To this end, we propose a novel on-device pipeline: COPS that intelligently identifies features of fraudulent messages and URLs to alert the user in real-time. COPS is a lightweight pipeline with a detection module based on the Disentangled Variational Autoencoder of size 3.46MB for smishing and URL phishing detection, and we benchmark it on open datasets. We achieve an accuracy of 98.15% and 99.5%, respectively, for both tasks, with a false negative and false positive rate of a mere 0.037 and 0.015, outperforming previous works with the added advantage of ensuring real-time alerts on resource-constrained devices.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"71 10","pages":"172-179"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1