Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454809
Ignacio Astaburuaga, Shamik Sengupta
The objective of this paper is to propose and establish a new area of research and increase awareness of key cybersecurity aspects relating to the manufacturing, creation, development, and maintenance of quantum systems and identify key challenges in this domain. It aims to present areas of focus of cybersecurity in the quantum field. Through research, we have established a new emerging gap in the security of quantum systems. This paper introduces the basics of quantum systems, circuits, and computers. Then, it continues to introduce the current state of quantum technologies. Finally, it introduces cybersecurity and quantum and establishes new avenues of attacks for such systems.
{"title":"Introduction to Quantum Systems and Security Vulnerabilities","authors":"Ignacio Astaburuaga, Shamik Sengupta","doi":"10.1109/CCNC51664.2024.10454809","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454809","url":null,"abstract":"The objective of this paper is to propose and establish a new area of research and increase awareness of key cybersecurity aspects relating to the manufacturing, creation, development, and maintenance of quantum systems and identify key challenges in this domain. It aims to present areas of focus of cybersecurity in the quantum field. Through research, we have established a new emerging gap in the security of quantum systems. This paper introduces the basics of quantum systems, circuits, and computers. Then, it continues to introduce the current state of quantum technologies. Finally, it introduces cybersecurity and quantum and establishes new avenues of attacks for such systems.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"79 3","pages":"345-351"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Although it is increasingly common to use digital games for the cognitive training, to date there is still a need for more studies of the effectiveness of neuropsychological treatments based on digital games, especially for populations with Specific Learning Disorders (SLDs). This study aims to present the effectiveness of Eye-Riders, a serious game developed to train executive functions in neurodiverse children. A group of 41 children (age range 7–9 years) participated in the study: 13 with SLDs and 28 with typical development. The training consisted in playing Eye-Riders in 9 sessions of 20 minutes each, with a frequency of 3 times a week for three weeks. The effectiveness of the training was assessed by means of the Nepsy-II battery of executive and attentional function scales, administered before and after the training. The gaming style was measured by Gaming Style Questionnaire (GSQ). The results showed significant improvement in the skills of Auditory Attention, Visual Attention, Inhibition and Switching in both groups. These results had a positive impact in reading abilities. In addition, the results reveal that in children with SLD, the improvement achieved in visual attention skills can be attributed to the improvement in game performance. In conclusion, Eye-Riders is an effective video game to of executive functions in neurodivergent children.
{"title":"Train Your Attention and Executive Functions with Eye-Riders! A Videogame for Improving Cognitive Abilities in Neurodiverse Children","authors":"Mariagrazia Benassi, Davide Paolillo, Matilde Spinoso, S. Giovagnoli, Noemi Mazzoni, Luca Formica, Gianni Tumedei, Catia Prandi","doi":"10.1109/CCNC51664.2024.10454866","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454866","url":null,"abstract":"Although it is increasingly common to use digital games for the cognitive training, to date there is still a need for more studies of the effectiveness of neuropsychological treatments based on digital games, especially for populations with Specific Learning Disorders (SLDs). This study aims to present the effectiveness of Eye-Riders, a serious game developed to train executive functions in neurodiverse children. A group of 41 children (age range 7–9 years) participated in the study: 13 with SLDs and 28 with typical development. The training consisted in playing Eye-Riders in 9 sessions of 20 minutes each, with a frequency of 3 times a week for three weeks. The effectiveness of the training was assessed by means of the Nepsy-II battery of executive and attentional function scales, administered before and after the training. The gaming style was measured by Gaming Style Questionnaire (GSQ). The results showed significant improvement in the skills of Auditory Attention, Visual Attention, Inhibition and Switching in both groups. These results had a positive impact in reading abilities. In addition, the results reveal that in children with SLD, the improvement achieved in visual attention skills can be attributed to the improvement in game performance. In conclusion, Eye-Riders is an effective video game to of executive functions in neurodivergent children.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"70 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454704
Ion Turcanu, German Castignani, Sébastien Faye
The concept of Digital Twin (DT) holds great potential for all sectors seeking to monitor, automate, and optimize their processes. This paper focuses specifically on Digital Twin Networks (DTNs) and City Digital Twins (CDTs), offering an analysis of the relevant literature while exploring their interrelationship, which is essential for urban planners and network operators. Although DTN is foreseen as a pillar of future 5G and 6G network architectures, it is often addressed in isolation in the existing literature (i.e., with limited consideration of other domain-specific constraints), even though it constitutes an essential asset in urban environments. In contrast, CDT is often based on the idea of infallible connectivity, which is an optimistic assumption. This study details the benefits and challenges associated with the integration of DTNs into CDTs, paving the way for further research in this field.
{"title":"On the Integration of Digital Twin Networks into City Digital Twins: Benefits and Challenges","authors":"Ion Turcanu, German Castignani, Sébastien Faye","doi":"10.1109/CCNC51664.2024.10454704","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454704","url":null,"abstract":"The concept of Digital Twin (DT) holds great potential for all sectors seeking to monitor, automate, and optimize their processes. This paper focuses specifically on Digital Twin Networks (DTNs) and City Digital Twins (CDTs), offering an analysis of the relevant literature while exploring their interrelationship, which is essential for urban planners and network operators. Although DTN is foreseen as a pillar of future 5G and 6G network architectures, it is often addressed in isolation in the existing literature (i.e., with limited consideration of other domain-specific constraints), even though it constitutes an essential asset in urban environments. In contrast, CDT is often based on the idea of infallible connectivity, which is an optimistic assumption. This study details the benefits and challenges associated with the integration of DTNs into CDTs, paving the way for further research in this field.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"68 10","pages":"752-758"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In Cyber-Physical Systems (CPS), the reliability of wireless communication is paramount to ensuring safety. Received Signal Strength (RSS) map is particularly beneficial for safe robot operation, for example. However, accurately estimating an RSS map poses significant challenges, particularly when higher frequency bands are employed for broadband communications. Therefore, it is also important to not only further enhance the accuracy of the estimation, which is the target of many existing methods, but also design system that can tolerate errors in the estimation. In this paper, we propose a method for constructing a digital twin that represents the quality of the wireless network using probability distributions. Representing data probabilistically proves effective for risk-sensitive robot control or robust planning of base station positioning. We propose using a graphical model known as Markov Random Field (MRF), to depict the spatial structure of the RSS map. The probability distribution of the RSS value at each point within the space is provided as the marginal probabilities of the MRF. We then evaluated the proposed method in our own 28 GHz Private 5G environment and extensively studied the characteristics of indoor millimeter radio communication. We confirmed that each estimated point can be well estimated by probability distribution using the proposed method. In addition, the design of error toler-ance based probability distribution is discussed. By determining a margin on the estimated expected value based on the standard deviation of the estimated distribution, the margin can be set more efficiently than by determining a uniform margin for each points.
{"title":"Enhancing Indoor Millimeter Radio Communication: A Probabilistic Approach to RSS Map Estimation","authors":"Daiki Kodama, Kenji Ohira, Hideyuki Shimonishi, Toshiro Nakahira, Daisuke Murayama, Tomoaki Ogawa","doi":"10.1109/CCNC51664.2024.10454887","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454887","url":null,"abstract":"In Cyber-Physical Systems (CPS), the reliability of wireless communication is paramount to ensuring safety. Received Signal Strength (RSS) map is particularly beneficial for safe robot operation, for example. However, accurately estimating an RSS map poses significant challenges, particularly when higher frequency bands are employed for broadband communications. Therefore, it is also important to not only further enhance the accuracy of the estimation, which is the target of many existing methods, but also design system that can tolerate errors in the estimation. In this paper, we propose a method for constructing a digital twin that represents the quality of the wireless network using probability distributions. Representing data probabilistically proves effective for risk-sensitive robot control or robust planning of base station positioning. We propose using a graphical model known as Markov Random Field (MRF), to depict the spatial structure of the RSS map. The probability distribution of the RSS value at each point within the space is provided as the marginal probabilities of the MRF. We then evaluated the proposed method in our own 28 GHz Private 5G environment and extensively studied the characteristics of indoor millimeter radio communication. We confirmed that each estimated point can be well estimated by probability distribution using the proposed method. In addition, the design of error toler-ance based probability distribution is discussed. By determining a margin on the estimated expected value based on the standard deviation of the estimated distribution, the margin can be set more efficiently than by determining a uniform margin for each points.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"63 7","pages":"241-247"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Federated learning (FL) has become the next generation of machine learning (ML) by avoiding local data sharing with a central server. While this becomes a major advantage to client-side privacy, it has a trade-off of becoming vulnerable to poisoning attacks and malicious behavior of the central server. As the decentralization of systems enhances security concerns, integrating decentralized defense for the existing FL systems has been extensively studied to eliminate the security issues of FL systems. This paper proposes a decentralized defense approach to FL systems with blockchain technology to overcome the poisoning attack without affecting the existing FL system's performance. We introduce a reliable blockchain-based FL (BCFL) architecture in two different models, namely, Centralized Aggregated BCFL (CA-BCFL) and Fully Decentralized BCFL (FD-BCFL). Both models utilize secure off-chain computations for malicious mitigation as an alternative to high-cost on-chain computations. Our comprehensive analysis shows that the proposed BCFL architectures can defend in a similar manner against poisoning attacks that compromise the aggregator. As a better measure, the paper has included an evaluation of the gas consumption of our two system models.
{"title":"Decentralized Defense: Leveraging Blockchain against Poisoning Attacks in Federated Learning Systems","authors":"Rashmi Thennakoon, Arosha Wanigasundara, Sanjaya Weerasinghe, Chatura Seneviratne, Yushan Siriwardhana, Madhusanka Liyanage","doi":"10.1109/CCNC51664.2024.10454688","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454688","url":null,"abstract":"Federated learning (FL) has become the next generation of machine learning (ML) by avoiding local data sharing with a central server. While this becomes a major advantage to client-side privacy, it has a trade-off of becoming vulnerable to poisoning attacks and malicious behavior of the central server. As the decentralization of systems enhances security concerns, integrating decentralized defense for the existing FL systems has been extensively studied to eliminate the security issues of FL systems. This paper proposes a decentralized defense approach to FL systems with blockchain technology to overcome the poisoning attack without affecting the existing FL system's performance. We introduce a reliable blockchain-based FL (BCFL) architecture in two different models, namely, Centralized Aggregated BCFL (CA-BCFL) and Fully Decentralized BCFL (FD-BCFL). Both models utilize secure off-chain computations for malicious mitigation as an alternative to high-cost on-chain computations. Our comprehensive analysis shows that the proposed BCFL architectures can defend in a similar manner against poisoning attacks that compromise the aggregator. As a better measure, the paper has included an evaluation of the gas consumption of our two system models.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"94 10","pages":"950-955"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454703
Image Bhattarai, Cong Pu, Kim–Kwang Raymond Choo
The Internet of Drones (IoD), an innovative aerial-ground communication architecture, has quickly became the driving force for various civilian applications (e.g., body temperature detecting drones during the global pandemic of coronavirus disease). In the IoD, a fleet of drones are deployed over an area of interest, collect task-specific data, and then deliver them to the ground station for further data exploration and analysis. To fully exploit the potential of IoD in today's dynamic and evolving cyber-threat environment, the security and efficiency challenges existing in the IoD communications should be well addressed. Some researchers have developed security mechanisms to enable the authentication between the ground station and the drones in the IoD systems. Nonetheless, those schemes mainly focus on the security aspect but overlook the importance of communication efficiency to the resource-constrained drones. In order to fill this research gap, this paper proposes a lightweight aggregate authentication scheme (hereafter referred to as liteAGAP) to tackle the challenges of communication security and efficiency together. Specifically, liteAGAP utilizes cryptographic primitives such as physical unclonable function and bilinear pairing to efficiently secure the data exchange between the ground station and a group of drones in the IoD systems. To evaluate its security performance, liteAGAP is first implemented in the security-sensitive protocol modeling language. Then, we analyze and verify liteAGAP using AVISPA, which is a well-known Internet security protocol verification framework. We also implement liteAGAP and its counterpart schemes in a simulation environment, where the simulation-based experiments are conducted to obtain the results of communication overhead, running time, memory storage usage, and energy consumption. According to the results of security verification/analysis and performance evaluation, we conclude that not only liteAGAP meets the expected security requirements, but also provides superior performance compared to the existing schemes.
{"title":"A Lightweight Aggregate Authentication Protocol for Internet of Drones","authors":"Image Bhattarai, Cong Pu, Kim–Kwang Raymond Choo","doi":"10.1109/CCNC51664.2024.10454703","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454703","url":null,"abstract":"The Internet of Drones (IoD), an innovative aerial-ground communication architecture, has quickly became the driving force for various civilian applications (e.g., body temperature detecting drones during the global pandemic of coronavirus disease). In the IoD, a fleet of drones are deployed over an area of interest, collect task-specific data, and then deliver them to the ground station for further data exploration and analysis. To fully exploit the potential of IoD in today's dynamic and evolving cyber-threat environment, the security and efficiency challenges existing in the IoD communications should be well addressed. Some researchers have developed security mechanisms to enable the authentication between the ground station and the drones in the IoD systems. Nonetheless, those schemes mainly focus on the security aspect but overlook the importance of communication efficiency to the resource-constrained drones. In order to fill this research gap, this paper proposes a lightweight aggregate authentication scheme (hereafter referred to as liteAGAP) to tackle the challenges of communication security and efficiency together. Specifically, liteAGAP utilizes cryptographic primitives such as physical unclonable function and bilinear pairing to efficiently secure the data exchange between the ground station and a group of drones in the IoD systems. To evaluate its security performance, liteAGAP is first implemented in the security-sensitive protocol modeling language. Then, we analyze and verify liteAGAP using AVISPA, which is a well-known Internet security protocol verification framework. We also implement liteAGAP and its counterpart schemes in a simulation environment, where the simulation-based experiments are conducted to obtain the results of communication overhead, running time, memory storage usage, and energy consumption. According to the results of security verification/analysis and performance evaluation, we conclude that not only liteAGAP meets the expected security requirements, but also provides superior performance compared to the existing schemes.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"68 3","pages":"143-151"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Despite the remarkable success of deep-learning in image and video recognition, constructing real-time recognition systems for computationally intensive tasks such as spatio-temporal human action localization is still challenging. As computational complexity of these tasks can easily exceed the capacity of edge devices, inference must be performed in remote (cloud) environments. But then, recognition accuracy is subject to fluctuating networking conditions in best-effort networks due to compression artefacts incurred from low-bitrate video streaming. To improve overall recognition accuracy under various networking conditions, we propose SwitchingNet, an edge-assisted inference model switching method. In SwitchingNet, we train multiple recognition models specialized towards different levels of image quality and a neural switching model for dynamically choosing among the specialized recognition models during system operation. Switching decisions are made at the edge given an image quality vector calculated from compressed and uncompressed frames. In the experiments, we show that our approach can on average sustain higher recognition accuracy than plain recognition systems under heavily fluctuating networking conditions. Also, our switching-based recognition approach is far less computationally intensive than competing ensemble methods and allows to significantly reduce cloud computing costs.
{"title":"SwitchingNet: Edge-Assisted Model Switching for Accurate Video Recognition Over Best-Effort Networks","authors":"Florian Beye, Yasunori Babazaki, Ryuhei Ando, Takashi Oshiba, Koichi Nihei, Katsuhiko Takahashi","doi":"10.1109/CCNC51664.2024.10454650","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454650","url":null,"abstract":"Despite the remarkable success of deep-learning in image and video recognition, constructing real-time recognition systems for computationally intensive tasks such as spatio-temporal human action localization is still challenging. As computational complexity of these tasks can easily exceed the capacity of edge devices, inference must be performed in remote (cloud) environments. But then, recognition accuracy is subject to fluctuating networking conditions in best-effort networks due to compression artefacts incurred from low-bitrate video streaming. To improve overall recognition accuracy under various networking conditions, we propose SwitchingNet, an edge-assisted inference model switching method. In SwitchingNet, we train multiple recognition models specialized towards different levels of image quality and a neural switching model for dynamically choosing among the specialized recognition models during system operation. Switching decisions are made at the edge given an image quality vector calculated from compressed and uncompressed frames. In the experiments, we show that our approach can on average sustain higher recognition accuracy than plain recognition systems under heavily fluctuating networking conditions. Also, our switching-based recognition approach is far less computationally intensive than competing ensemble methods and allows to significantly reduce cloud computing costs.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"93 2","pages":"37-43"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454742
Ramon Moscatelli, Kevin Stahel, Robert Kraneis, Christian Werner
Latency-optimized audio communication systems for the Internet have mainly been studied in the context of networked music performances (NMP) and high-end video conferencing systems. To date, the research in this field has focused on approaches for compensating the negative effects of network jitter on the audio transmission. The contribution of this paper is threefold: first, the authors summarize the state of the art in the area of ultra-low latency audio communications; second, they provide a quantitative performance analysis of recent implementations; and finally, they discuss the benefits of real-time-capable endpoint implementations. This discussion shows that not only the network jitter has a significant impact on the overall system performance, but also the timing jitter induced by endpoint systems running non-real-time software. This opens up enormous research potential for future work on real-time systems for latency-optimized audio communication.
{"title":"Why Real-Time Matters: Performance Evaluation of Recent Ultra-Low Latency Audio Communication Systems","authors":"Ramon Moscatelli, Kevin Stahel, Robert Kraneis, Christian Werner","doi":"10.1109/CCNC51664.2024.10454742","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454742","url":null,"abstract":"Latency-optimized audio communication systems for the Internet have mainly been studied in the context of networked music performances (NMP) and high-end video conferencing systems. To date, the research in this field has focused on approaches for compensating the negative effects of network jitter on the audio transmission. The contribution of this paper is threefold: first, the authors summarize the state of the art in the area of ultra-low latency audio communications; second, they provide a quantitative performance analysis of recent implementations; and finally, they discuss the benefits of real-time-capable endpoint implementations. This discussion shows that not only the network jitter has a significant impact on the overall system performance, but also the timing jitter induced by endpoint systems running non-real-time software. This opens up enormous research potential for future work on real-time systems for latency-optimized audio communication.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"16 4","pages":"77-83"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454642
Akito Ohshima, K. Sanada, Hiroyuki Hatano, Kazuo Mori
In vehicle platooning, relay transmission using sidelink communications, specified by the C-V2X (Cellular Vehicle-to-Everything) standard is considered as a means of information exchange. The autonomous resource management scheme, SB-SPS (Sensing Based Semi Persistent Scheduling), has been standardized for sidelink communications. However, a half duplex problem, one of major problems in the SB-SPS, is not sufficiently resolved for the relay transmission in vehicle platooning. This work proposes an enhanced resource management scheme to mitigate half duplex problem in vehicle platooning employing the SB-SPS scheme. The performance evaluation through computer simulation demonstrates the effectiveness of the proposed scheme.
{"title":"Enhanced SB-SPS Scheme to Mitigate Half Duplex Problem for Relay Transmission in Vehicle Platooning","authors":"Akito Ohshima, K. Sanada, Hiroyuki Hatano, Kazuo Mori","doi":"10.1109/CCNC51664.2024.10454642","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454642","url":null,"abstract":"In vehicle platooning, relay transmission using sidelink communications, specified by the C-V2X (Cellular Vehicle-to-Everything) standard is considered as a means of information exchange. The autonomous resource management scheme, SB-SPS (Sensing Based Semi Persistent Scheduling), has been standardized for sidelink communications. However, a half duplex problem, one of major problems in the SB-SPS, is not sufficiently resolved for the relay transmission in vehicle platooning. This work proposes an enhanced resource management scheme to mitigate half duplex problem in vehicle platooning employing the SB-SPS scheme. The performance evaluation through computer simulation demonstrates the effectiveness of the proposed scheme.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"107 6","pages":"654-655"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454635
Harichandana B S S, Sumit Kumar, Manjunath B. Ujjinakoppa, Barath Raj Kandur Raja
Smartphones have become indispensable in our daily lives and can do almost everything, from communication to online shopping. However, with the increased usage, cybercrime aimed at mobile devices is rocketing. Smishing attacks, in particular, have observed a significant upsurge in recent years. This problem is further exacerbated by the perpetrator creating new deceptive websites daily, with an average life cycle of under 15 hours. This renders the standard practice of keeping a database of malicious URLs ineffective. To this end, we propose a novel on-device pipeline: COPS that intelligently identifies features of fraudulent messages and URLs to alert the user in real-time. COPS is a lightweight pipeline with a detection module based on the Disentangled Variational Autoencoder of size 3.46MB for smishing and URL phishing detection, and we benchmark it on open datasets. We achieve an accuracy of 98.15% and 99.5%, respectively, for both tasks, with a false negative and false positive rate of a mere 0.037 and 0.015, outperforming previous works with the added advantage of ensuring real-time alerts on resource-constrained devices.
{"title":"COPS: A Compact On-Device Pipeline for Real-Time Smishing Detection","authors":"Harichandana B S S, Sumit Kumar, Manjunath B. Ujjinakoppa, Barath Raj Kandur Raja","doi":"10.1109/CCNC51664.2024.10454635","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454635","url":null,"abstract":"Smartphones have become indispensable in our daily lives and can do almost everything, from communication to online shopping. However, with the increased usage, cybercrime aimed at mobile devices is rocketing. Smishing attacks, in particular, have observed a significant upsurge in recent years. This problem is further exacerbated by the perpetrator creating new deceptive websites daily, with an average life cycle of under 15 hours. This renders the standard practice of keeping a database of malicious URLs ineffective. To this end, we propose a novel on-device pipeline: COPS that intelligently identifies features of fraudulent messages and URLs to alert the user in real-time. COPS is a lightweight pipeline with a detection module based on the Disentangled Variational Autoencoder of size 3.46MB for smishing and URL phishing detection, and we benchmark it on open datasets. We achieve an accuracy of 98.15% and 99.5%, respectively, for both tasks, with a false negative and false positive rate of a mere 0.037 and 0.015, outperforming previous works with the added advantage of ensuring real-time alerts on resource-constrained devices.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"71 10","pages":"172-179"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}