首页 > 最新文献

ACM Transactions on Cyber-Physical Systems最新文献

英文 中文
I Think Therefore You Are 我思故我在
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-06-18 DOI: 10.1145/3375403
Lukas Esterle, John N. A. Brown
Cyber-physical systems operate in our real world, constantly interacting with the environment and collaborating with other systems. The increasing number of devices will make it infeasible to control each one individually. It will also be infeasible to prepare each of them for every imaginable rapidly unfolding situation. Therefore, we must increase the autonomy of future Cyber-physical Systems. Making these systems self-aware allows them to reason about their own capabilities and their immediate environment. In this article, we extend the idea of the self-awareness of individual systems toward networked self-awareness. This gives systems the ability to reason about how they are being affected by the actions and interactions of others within their perceived environment, as well as in the extended environment that is beyond their direct perception. We propose that different levels of networked self-awareness can develop over time in systems as they do in humans. Furthermore, we propose that this could have the same benefits for networks of systems that it has had for communities of humans, increasing performance and adaptability.
网络物理系统在我们的现实世界中运行,不断与环境互动,并与其他系统合作。设备数量的增加将使单独控制每个设备变得不可行。为每一个可以想象的迅速发展的局势做好准备也是不可行的。因此,我们必须提高未来网络物理系统的自主权。让这些系统具有自我意识可以让他们对自己的能力和直接环境进行推理。在本文中,我们将个体系统的自我意识的概念扩展到网络化的自我意识。这使系统能够推理自己在感知环境中以及在超出直接感知范围的扩展环境中如何受到他人行为和互动的影响。我们提出,随着时间的推移,不同水平的网络自我意识可以在系统中发展,就像在人类中一样。此外,我们提出,这对系统网络的好处与对人类社区的好处相同,可以提高性能和适应性。
{"title":"I Think Therefore You Are","authors":"Lukas Esterle, John N. A. Brown","doi":"10.1145/3375403","DOIUrl":"https://doi.org/10.1145/3375403","url":null,"abstract":"Cyber-physical systems operate in our real world, constantly interacting with the environment and collaborating with other systems. The increasing number of devices will make it infeasible to control each one individually. It will also be infeasible to prepare each of them for every imaginable rapidly unfolding situation. Therefore, we must increase the autonomy of future Cyber-physical Systems. Making these systems self-aware allows them to reason about their own capabilities and their immediate environment. In this article, we extend the idea of the self-awareness of individual systems toward networked self-awareness. This gives systems the ability to reason about how they are being affected by the actions and interactions of others within their perceived environment, as well as in the extended environment that is beyond their direct perception. We propose that different levels of networked self-awareness can develop over time in systems as they do in humans. Furthermore, we propose that this could have the same benefits for networks of systems that it has had for communities of humans, increasing performance and adaptability.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":" ","pages":"1 - 25"},"PeriodicalIF":2.3,"publicationDate":"2020-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3375403","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48287201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MC-Safe MC安全
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-06-18 DOI: 10.1145/3394961
Yunhao Bai, Kuangyu Zheng, Zejiang Wang, Xiaorui Wang, Junmin Wang
In a Vehicular Cyber Physical System (VCPS), ensuring the real-time delivery of safety messages is an important research problem for Vehicle to Vehicle (V2V) communication. Unfortunately, existing work relies only on one or two pre-selected control channels for safety message communication, which can result in poor packet delivery and potential accident when the vehicle density is high. If all the available channels can be dynamically utilized when the control channel is having severe contention, then safety messages can have a much better chance to meet their real-time deadlines. In this article, we propose MC-Safe, a multi-channel V2V communication framework that monitors all the available channels and dynamically selects the best one for safety message transmission. During normal driving, MC-Safe monitors periodic beacons sent by other vehicles and estimates the communication delay on all the channels. Upon the detection of a potential accident, MC-Safe leverages a novel channel negotiation scheme that allows all the involved vehicles to work collaboratively, in a distributed manner, for identifying a communication channel that meets the delay requirement. MC-safe also features a novel coordinator selection algorithm that minimizes the delay of channel negotiation. Once a channel is selected, all the involved vehicles switch to the same selected channel for real-time communication with the least amount of interference. Our evaluation results both in simulation and on a hardware testbed with scaled cars show that MC-Safe outperforms existing single-channel solutions and other well-designed multi-channel baselines by having a 23.4% lower packet delay on average compared with other well-designed channel selection baselines.
在车载网络物理系统(VCPS)中,确保安全信息的实时传递是车对车(V2V)通信的一个重要研究问题。然而,现有的工作仅依赖于一个或两个预先选择的控制通道进行安全信息通信,当车辆密度较大时,这可能导致数据包传递不佳和潜在的事故。如果在控制通道发生严重争用时可以动态地利用所有可用通道,那么安全消息就有更好的机会满足其实时截止日期。在本文中,我们提出了MC-Safe,一个多通道V2V通信框架,它可以监控所有可用的通道,并动态选择最佳的通道进行安全消息传输。在正常驾驶期间,MC-Safe监控其他车辆发送的周期性信标,并估计所有信道上的通信延迟。在检测到潜在事故后,MC-Safe利用一种新颖的通道协商方案,允许所有相关车辆以分布式方式协同工作,以确定满足延迟要求的通信通道。MC-safe还具有一种新颖的协调器选择算法,可以最大限度地减少信道协商的延迟。一旦选定频道,所有相关车辆都会切换到同一频道进行实时通信,干扰最小。我们在模拟和硬件测试平台上的评估结果表明,MC-Safe优于现有的单通道解决方案和其他设计良好的多通道基线,与其他设计良好的通道选择基线相比,平均数据包延迟降低23.4%。
{"title":"MC-Safe","authors":"Yunhao Bai, Kuangyu Zheng, Zejiang Wang, Xiaorui Wang, Junmin Wang","doi":"10.1145/3394961","DOIUrl":"https://doi.org/10.1145/3394961","url":null,"abstract":"In a Vehicular Cyber Physical System (VCPS), ensuring the real-time delivery of safety messages is an important research problem for Vehicle to Vehicle (V2V) communication. Unfortunately, existing work relies only on one or two pre-selected control channels for safety message communication, which can result in poor packet delivery and potential accident when the vehicle density is high. If all the available channels can be dynamically utilized when the control channel is having severe contention, then safety messages can have a much better chance to meet their real-time deadlines. In this article, we propose MC-Safe, a multi-channel V2V communication framework that monitors all the available channels and dynamically selects the best one for safety message transmission. During normal driving, MC-Safe monitors periodic beacons sent by other vehicles and estimates the communication delay on all the channels. Upon the detection of a potential accident, MC-Safe leverages a novel channel negotiation scheme that allows all the involved vehicles to work collaboratively, in a distributed manner, for identifying a communication channel that meets the delay requirement. MC-safe also features a novel coordinator selection algorithm that minimizes the delay of channel negotiation. Once a channel is selected, all the involved vehicles switch to the same selected channel for real-time communication with the least amount of interference. Our evaluation results both in simulation and on a hardware testbed with scaled cars show that MC-Safe outperforms existing single-channel solutions and other well-designed multi-channel baselines by having a 23.4% lower packet delay on average compared with other well-designed channel selection baselines.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":" ","pages":"1 - 27"},"PeriodicalIF":2.3,"publicationDate":"2020-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3394961","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47495010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Gordian 棘手的
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-06-18 DOI: 10.1145/3386568
Matthew Weber, Baihong Jin, Gil Lederman, Yasser Shoukry, Edward A. Lee, S. Seshia, A. Sangiovanni-Vincentelli
Accurate localization from Cyber-Physical Systems (CPS) is a critical enabling technology for context-aware applications and control. As localization plays an increasingly safety-critical role, location systems must be able to identify and eliminate faulty measurements to prevent dangerously inaccurate localization. In this article, we consider the range-based localization problem and propose a method to detect coordinated adversarial corruption on anchor positions and distance measurements. Our algorithm, Gordian, rapidly finds attacks by identifying geometric inconsistencies at the graph level without requiring assumptions about hardware, ranging mechanisms, or cryptographic protocols. We give necessary conditions for which attack detection is guaranteed to be successful in the noiseless case, and we use that intuition to extend Gordian to the noisy case where fewer guarantees are possible. In simulations generated from real-world sensor noise, we empirically show that Gordian’s trilateration counterexample generation procedure enables rapid attack detection even for combinatorially difficult problems.
来自信息物理系统(CPS)的精确定位是上下文感知应用和控制的关键使能技术。由于定位扮演着越来越重要的安全角色,定位系统必须能够识别和消除错误的测量,以防止危险的不准确定位。在本文中,我们考虑了基于距离的定位问题,并提出了一种检测锚点位置和距离测量上协调对抗性损坏的方法。我们的算法Gordian通过在图级识别几何不一致性来快速发现攻击,而不需要对硬件、测距机制或加密协议进行假设。我们给出了在无噪声情况下保证攻击检测成功的必要条件,并且我们使用这种直觉将Gordian扩展到有噪声情况,其中可能的保证更少。在由真实传感器噪声生成的模拟中,我们经验地表明,Gordian的三边反例生成过程即使对于组合困难的问题也能实现快速攻击检测。
{"title":"Gordian","authors":"Matthew Weber, Baihong Jin, Gil Lederman, Yasser Shoukry, Edward A. Lee, S. Seshia, A. Sangiovanni-Vincentelli","doi":"10.1145/3386568","DOIUrl":"https://doi.org/10.1145/3386568","url":null,"abstract":"Accurate localization from Cyber-Physical Systems (CPS) is a critical enabling technology for context-aware applications and control. As localization plays an increasingly safety-critical role, location systems must be able to identify and eliminate faulty measurements to prevent dangerously inaccurate localization. In this article, we consider the range-based localization problem and propose a method to detect coordinated adversarial corruption on anchor positions and distance measurements. Our algorithm, Gordian, rapidly finds attacks by identifying geometric inconsistencies at the graph level without requiring assumptions about hardware, ranging mechanisms, or cryptographic protocols. We give necessary conditions for which attack detection is guaranteed to be successful in the noiseless case, and we use that intuition to extend Gordian to the noisy case where fewer guarantees are possible. In simulations generated from real-world sensor noise, we empirically show that Gordian’s trilateration counterexample generation procedure enables rapid attack detection even for combinatorially difficult problems.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"15 1","pages":"1 - 27"},"PeriodicalIF":2.3,"publicationDate":"2020-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89094125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Runtime Adaptation in Wireless Sensor Nodes Using Structured Learning 基于结构化学习的无线传感器节点运行时自适应
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-06-15 DOI: 10.1145/3372153
A. Sapio, S. Bhattacharyya, M. Wolf
Markov Decision Processes (MDPs) provide important capabilities for facilitating the dynamic adaptation and self-optimization of cyber physical systems at runtime. In recent years, this has primarily taken the form of Reinforcement Learning (RL) techniques that eliminate some MDP components for the purpose of reducing computational requirements. In this work, we show that recent advancements in Compact MDP Models (CMMs) provide sufficient cause to question this trend when designing wireless sensor network nodes. In this work, a novel CMM-based approach to designing self-aware wireless sensor nodes is presented and compared to Q-Learning, a popular RL technique. We show that a certain class of CPS nodes is not well served by RL methods and contrast RL versus CMM methods in this context. Through both simulation and a prototype implementation, we demonstrate that CMM methods can provide significantly better runtime adaptation performance relative to Q-Learning, with comparable resource requirements.
马尔可夫决策过程(MDP)为促进网络物理系统在运行时的动态适应和自优化提供了重要的能力。近年来,这主要采用强化学习(RL)技术的形式,该技术消除了一些MDP组件,以减少计算需求。在这项工作中,我们表明,在设计无线传感器网络节点时,紧凑型MDP模型(CMM)的最新进展为质疑这一趋势提供了充分的理由。在这项工作中,提出了一种新的基于CMM的自感知无线传感器节点设计方法,并将其与流行的RL技术Q-Learning进行了比较。我们证明了RL方法不能很好地服务于某类CPS节点,并在这种情况下对比了RL与CMM方法。通过仿真和原型实现,我们证明了CMM方法可以提供比Q-Learning更好的运行时自适应性能,并且具有相当的资源需求。
{"title":"Runtime Adaptation in Wireless Sensor Nodes Using Structured Learning","authors":"A. Sapio, S. Bhattacharyya, M. Wolf","doi":"10.1145/3372153","DOIUrl":"https://doi.org/10.1145/3372153","url":null,"abstract":"Markov Decision Processes (MDPs) provide important capabilities for facilitating the dynamic adaptation and self-optimization of cyber physical systems at runtime. In recent years, this has primarily taken the form of Reinforcement Learning (RL) techniques that eliminate some MDP components for the purpose of reducing computational requirements. In this work, we show that recent advancements in Compact MDP Models (CMMs) provide sufficient cause to question this trend when designing wireless sensor network nodes. In this work, a novel CMM-based approach to designing self-aware wireless sensor nodes is presented and compared to Q-Learning, a popular RL technique. We show that a certain class of CPS nodes is not well served by RL methods and contrast RL versus CMM methods in this context. Through both simulation and a prototype implementation, we demonstrate that CMM methods can provide significantly better runtime adaptation performance relative to Q-Learning, with comparable resource requirements.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"4 1","pages":"1 - 28"},"PeriodicalIF":2.3,"publicationDate":"2020-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3372153","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48069251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CANOA: CAN Origin Authentication Through Power Side-Channel Monitoring CANOA:通过电源侧通道监控进行CAN起源认证
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-06-12 DOI: 10.1145/3571288
Shailja Thakur, Carlos Moreno, S. Fischmeister
The lack of any sender authentication mechanism in place makes Controller Area Network (CAN) vulnerable to security threats. For instance, an attacker can impersonate an Electronic Control Unit (ECU) on the bus and send spoofed messages unobtrusively with the identifier of the impersonated ECU. To address this problem, we propose a novel source authentication technique that uses power consumption measurements of the ECU to authenticate the source of a message. A transmission of an ECU affects the power consumption and a characteristic pattern will appear. Our technique exploits the power consumption of each ECU during the transmission of a message to determine whether the message actually originated from the purported sender. We evaluate our approach in both a lab setup and a real vehicle. We also evaluate our approach against factors that can impact the power consumption measurement of the ECU. The results of the evaluation show that the proposed technique is applicable in a broad range of operating conditions with reasonable computational power requirements and attaining good accuracy.
由于缺乏任何发送器身份验证机制,控制器局域网(CAN)容易受到安全威胁。例如,攻击者可以模拟总线上的电子控制单元(ECU),并使用模拟ECU的标识符不引人注目地发送伪造消息。为了解决这个问题,我们提出了一种新的源认证技术,该技术使用ECU的功耗测量来认证消息的源。ECU的变速器会影响功耗,并且会出现特性模式。我们的技术利用每个ECU在消息传输过程中的功耗来确定消息是否真的来自所谓的发送者。我们在实验室设置和实际车辆中评估我们的方法。我们还针对可能影响ECU功耗测量的因素来评估我们的方法。评估结果表明,所提出的技术适用于广泛的操作条件,具有合理的计算能力要求,并获得了良好的精度。
{"title":"CANOA: CAN Origin Authentication Through Power Side-Channel Monitoring","authors":"Shailja Thakur, Carlos Moreno, S. Fischmeister","doi":"10.1145/3571288","DOIUrl":"https://doi.org/10.1145/3571288","url":null,"abstract":"The lack of any sender authentication mechanism in place makes Controller Area Network (CAN) vulnerable to security threats. For instance, an attacker can impersonate an Electronic Control Unit (ECU) on the bus and send spoofed messages unobtrusively with the identifier of the impersonated ECU. To address this problem, we propose a novel source authentication technique that uses power consumption measurements of the ECU to authenticate the source of a message. A transmission of an ECU affects the power consumption and a characteristic pattern will appear. Our technique exploits the power consumption of each ECU during the transmission of a message to determine whether the message actually originated from the purported sender. We evaluate our approach in both a lab setup and a real vehicle. We also evaluate our approach against factors that can impact the power consumption measurement of the ECU. The results of the evaluation show that the proposed technique is applicable in a broad range of operating conditions with reasonable computational power requirements and attaining good accuracy.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2020-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49519523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
HUCDO: A Hybrid User-centric Data Outsourcing Scheme 以用户为中心的混合数据外包方案
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-05-25 DOI: 10.1145/3379464
Ke Huang, Xiaosong Zhang, Xiaofeng Wang, Y. Mu, F. Rezaeibagha, Guangquan Xu, Hao Wang, Xi Zheng, Guomin Yang, Qi Xia, Xiaojiang Du
Outsourcing helps relocate data from the cyber-physical system (CPS) for efficient storage at low cost. Current server-based outsourcing mainly focuses on the benefits of servers. This cannot attract users well, as their security, efficiency, and economy are not guaranteed. To solve with this issue, a hybrid outsourcing model that exploits both cloud server and edge devices to store data is needed. Meanwhile, the requirements of security and efficiency are different under specific scenarios. There is a lack of a comprehensive solution that considers all of the above issues. In this work, we overcome the above issues by proposing the first hybrid user-centric data outsourcing (HUCDO) scheme. It allows users to outsource data securely, efficiently, and economically via different CPSs. Brielly, our contributions consist of theories, implementations, and evaluations. Our theories include the first homomorphic collision-resistant chameleon hash (HCCH) and homomorphic designated-receiver signcryption (HDRS). As implementations, we instantiate how to use our proposals to outsource small- or large-scale data through distinct CPS, respectively. Additionally, a blockchain with proof-of-discrete-logarithm (B-PoDL) is instantiated to help improve our performance. Last, as demonstrated by our evaluations, our proposals are secure, efficient, and economic for users to implement while outsourcing their data via CPSs.
外包有助于从网络物理系统(CPS)中重新定位数据,以实现低成本的高效存储。目前基于服务器的外包主要关注服务器的好处。这样不能很好地吸引用户,安全性、效率、经济性得不到保证。为了解决这个问题,需要一个混合外包模型,利用云服务器和边缘设备来存储数据。同时,在不同的场景下,对安全性和效率的要求也不尽相同。目前还缺乏一个综合考虑上述所有问题的解决方案。在这项工作中,我们通过提出第一个以用户为中心的混合数据外包(HUCDO)方案来克服上述问题。它允许用户通过不同的cps安全、高效、经济地外包数据。简而言之,我们的贡献包括理论、实现和评估。我们的理论包括第一个同态抗碰撞变色龙哈希(HCCH)和同态指定接收者签名加密(HDRS)。作为实现,我们分别实例化了如何使用我们的建议通过不同的CPS来外包小型或大型数据。此外,还实例化了一个具有离散对数证明(B-PoDL)的区块链,以帮助提高性能。最后,正如我们的评估所证明的那样,我们的建议对于通过cps外包数据的用户来说是安全、高效和经济的。
{"title":"HUCDO: A Hybrid User-centric Data Outsourcing Scheme","authors":"Ke Huang, Xiaosong Zhang, Xiaofeng Wang, Y. Mu, F. Rezaeibagha, Guangquan Xu, Hao Wang, Xi Zheng, Guomin Yang, Qi Xia, Xiaojiang Du","doi":"10.1145/3379464","DOIUrl":"https://doi.org/10.1145/3379464","url":null,"abstract":"Outsourcing helps relocate data from the cyber-physical system (CPS) for efficient storage at low cost. Current server-based outsourcing mainly focuses on the benefits of servers. This cannot attract users well, as their security, efficiency, and economy are not guaranteed. To solve with this issue, a hybrid outsourcing model that exploits both cloud server and edge devices to store data is needed. Meanwhile, the requirements of security and efficiency are different under specific scenarios. There is a lack of a comprehensive solution that considers all of the above issues. In this work, we overcome the above issues by proposing the first hybrid user-centric data outsourcing (HUCDO) scheme. It allows users to outsource data securely, efficiently, and economically via different CPSs. Brielly, our contributions consist of theories, implementations, and evaluations. Our theories include the first homomorphic collision-resistant chameleon hash (HCCH) and homomorphic designated-receiver signcryption (HDRS). As implementations, we instantiate how to use our proposals to outsource small- or large-scale data through distinct CPS, respectively. Additionally, a blockchain with proof-of-discrete-logarithm (B-PoDL) is instantiated to help improve our performance. Last, as demonstrated by our evaluations, our proposals are secure, efficient, and economic for users to implement while outsourcing their data via CPSs.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"4 1","pages":"35:1-35:23"},"PeriodicalIF":2.3,"publicationDate":"2020-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3379464","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64026470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Anomaly Detection Based on RBM-LSTM Neural Network for CPS in Advanced Driver Assistance System 基于RBM-LSTM神经网络的高级驾驶辅助系统CPS异常检测
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-05-18 DOI: 10.1145/3377408
Di Wu, Hanlin Zhu, Yongxin Zhu, Victor I. Chang, Cong He, Ching‐Hsien Hsu, Hui Wang, Songlin Feng, Li Tian, Zunkai Huang
Advanced Driver Assistance System (ADAS) is a typical Cyber Physical System (CPS) application for human–computer interaction. In the process of vehicle driving, we use the information from CPS on ADAS to not only help us understand the driving condition of the car but also help us change the driving strategies to drive in a better and safer way. After getting the information, the driver can evaluate the feedback information of the vehicle, so as to enhance the ability to assist in driving of the ADAS system. This completes a complete human–computer interaction process. However, the data obtained during the interaction usually form a large dimension, and irrelevant features sometimes hide the occurrence of anomalies, which poses a significant challenge to us to better understand the driving states of the car. To solve this problem, we propose an anomaly detection framework based on RBM-LSTM. In this hybrid framework, RBM is trained to extract general underlying features from data collected by CPS, and LSTM is trained from the features learned by RBM. This framework can effectively improve the prediction speed and present a good prediction accuracy to show vehicle driving condition. Besides, drivers are allowed to evaluate the prediction results, so as to improve the accuracy of prediction. Through the experimental results, we can find that the proposed framework not only simplifies the training of the entire neural network and increases the training speed but also greatly improves the accuracy of the interaction-driven data analysis. It is a valid method to analyze the data generated during the human interaction.
高级驾驶辅助系统(ADAS)是一种典型的人机交互网络物理系统(CPS)应用。在车辆行驶过程中,我们利用ADAS上CPS的信息,不仅可以帮助我们了解车辆的行驶状况,还可以帮助我们改变驾驶策略,以更好、更安全的方式驾驶。获取信息后,驾驶员可以对车辆的反馈信息进行评估,从而增强ADAS系统的辅助驾驶能力。这样就完成了一个完整的人机交互过程。然而,在交互过程中获得的数据通常形成一个大维度,不相关的特征有时会隐藏异常的发生,这对我们更好地了解汽车的驾驶状态提出了重大挑战。为了解决这一问题,我们提出了一种基于RBM-LSTM的异常检测框架。在这个混合框架中,RBM从CPS收集的数据中提取一般的底层特征,LSTM从RBM学习到的特征中进行训练。该框架能有效提高预测速度,并能较好地反映车辆行驶状况。并且允许驾驶员对预测结果进行评价,提高预测的准确性。通过实验结果,我们发现所提出的框架不仅简化了整个神经网络的训练,提高了训练速度,而且大大提高了交互驱动数据分析的准确性。它是分析人机交互过程中产生的数据的有效方法。
{"title":"Anomaly Detection Based on RBM-LSTM Neural Network for CPS in Advanced Driver Assistance System","authors":"Di Wu, Hanlin Zhu, Yongxin Zhu, Victor I. Chang, Cong He, Ching‐Hsien Hsu, Hui Wang, Songlin Feng, Li Tian, Zunkai Huang","doi":"10.1145/3377408","DOIUrl":"https://doi.org/10.1145/3377408","url":null,"abstract":"Advanced Driver Assistance System (ADAS) is a typical Cyber Physical System (CPS) application for human–computer interaction. In the process of vehicle driving, we use the information from CPS on ADAS to not only help us understand the driving condition of the car but also help us change the driving strategies to drive in a better and safer way. After getting the information, the driver can evaluate the feedback information of the vehicle, so as to enhance the ability to assist in driving of the ADAS system. This completes a complete human–computer interaction process. However, the data obtained during the interaction usually form a large dimension, and irrelevant features sometimes hide the occurrence of anomalies, which poses a significant challenge to us to better understand the driving states of the car. To solve this problem, we propose an anomaly detection framework based on RBM-LSTM. In this hybrid framework, RBM is trained to extract general underlying features from data collected by CPS, and LSTM is trained from the features learned by RBM. This framework can effectively improve the prediction speed and present a good prediction accuracy to show vehicle driving condition. Besides, drivers are allowed to evaluate the prediction results, so as to improve the accuracy of prediction. Through the experimental results, we can find that the proposed framework not only simplifies the training of the entire neural network and increases the training speed but also greatly improves the accuracy of the interaction-driven data analysis. It is a valid method to analyze the data generated during the human interaction.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"4 1","pages":"1 - 17"},"PeriodicalIF":2.3,"publicationDate":"2020-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3377408","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42822244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Introduction to the Special Issue on User-Centric Security and Safety for CPS CPS以用户为中心的安全保障特刊简介
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-05-18 DOI: 10.1145/3392715
N. Saxena, A. Cárdenas, R. Beyah, R. Lu, K. Choo, Yiran Chen
The recent spate of cyber security attacks has reinforced the importance of cyber security. Cyber security is no longer just a technical issue requiring the proficiency and capabilities of technical experts, it is a global phenomenon requiring the attention of stakeholders across different information domains. We organize this special issue on user-centric security and safety aspects of cyber-physical systems (CPS) with the aim of filling gaps between user behaviour and the design of complex CPS. These include different stakeholders’ roles and responsibilities, user-centric decision-making capabilities and situational awareness, user experience design, mitigation of user errors and analysing their impact, adaptive risk management, user or operator’s trust, security and safety in the device’s or system’s authentication, access control, and configuration management, hence, the relation to the development of the system’s security and safety in the cyber-physical world. It is presumed that alignment of user-oriented processes, standards, and guidelines for security and safety are required to cope with the complexities and interoperability of cyber-physical systems. In other words, this special issue aims to publish the latest advancements in user-centric security and safety techniques and controls for CPS and related components. The following seven contributed articles are included in this special issue: The first article, entitled “Efficient Multi-factor User Authentication Protocol with Forward Secrecy for Real-time Data Access in WSNs,” proposes a robust multi-factor authentication scheme that makes use of the imbalanced computational nature of the RSA cryptosystem, particularly suitable for scenarios where sensor nodes (but not the user’s device) are the main energy bottleneck. This work is the first one that can satisfy all 12 criteria of the state-of-the-art evaluation metric under the harshest adversary model so far. The second article, entitled “A Multi-label Fuzzy Relevance Clustering System for Malware Attack Attribution in the Edge Layer of Cyber Physical Networks,” proposes a novel multi-label fuzzy clustering system for malware attack attribution. The authors first observed that a multilabel classifier does not classify a part of the samples when classifying malware families. To overcome this problem, the authors developed an ensemble-based multi-label fuzzy classification method to suggest the relevance of a malware instance to the stricken families. The third article, entitled “A User-centric Security Solution for Internet of Things and Edge Convergence,” proposes a user-centric security solution to ensure the trustworthiness of the data for emergency evaluation in Edge datacenters (EDCs). A user centric security approach by authenticating users and devices before any communications is established. The fourth article, entitled “MobileTrust: Secure Knowledge Integration in VANETs,” is about the security of Vehicular Ad hoc NETworks (VAN
最近一连串的网络安全攻击强化了网络安全的重要性。网络安全不再仅仅是一个需要技术专家熟练掌握和能力的技术问题,它是一个全球性现象,需要不同信息领域的利益相关者关注。我们组织了这期关于网络物理系统(CPS)以用户为中心的安全和安全方面的特刊,目的是填补用户行为和复杂CPS设计之间的空白。其中包括不同利益相关者的角色和责任、以用户为中心的决策能力和态势感知、用户体验设计、减轻用户错误并分析其影响、自适应风险管理、用户或运营商的信任、设备或系统认证、访问控制和配置管理中的安全性,网络物理世界中与系统安全性发展的关系。据推测,为了应对网络物理系统的复杂性和互操作性,需要协调面向用户的流程、标准和安全指南。换言之,本期特刊旨在发布以用户为中心的CPS和相关组件的安全技术和控制的最新进展。本期特刊收录了以下七篇文章:第一篇题为“用于WSN中实时数据访问的具有前向保密性的高效多因素用户认证协议”,提出了一种利用RSA密码系统的不平衡计算特性的鲁棒多因素认证方案,特别适用于传感器节点(但不是用户的设备)是主要能量瓶颈的场景。这项工作是迄今为止第一项能够在最苛刻的对手模型下满足最先进评估指标的所有12个标准的工作。第二篇文章题为“网络物理网络边缘层恶意软件攻击归因的多标签模糊相关聚类系统”,提出了一种新的恶意软件攻击归属的多标签Fuzzy聚类系统。作者首先观察到,在对恶意软件家族进行分类时,多标签分类器不会对部分样本进行分类。为了克服这个问题,作者开发了一种基于集合的多标签模糊分类方法,以表明恶意软件实例与受害家庭的相关性。第三篇文章题为“物联网和边缘融合的以用户为中心的安全解决方案”,提出了一种以用户为核心的安全解决解决方案,以确保边缘数据中心(EDC)应急评估数据的可信度。一种以用户为中心的安全方法,在建立任何通信之前对用户和设备进行身份验证。第四篇文章题为“MobileTrust:VANET中的安全知识集成”,是关于车载自组织网络(VANET)的安全性。作者提出了MobileTrust——一种基于混合信任的VANET安全资源共享系统。该方案利用云
{"title":"Introduction to the Special Issue on User-Centric Security and Safety for CPS","authors":"N. Saxena, A. Cárdenas, R. Beyah, R. Lu, K. Choo, Yiran Chen","doi":"10.1145/3392715","DOIUrl":"https://doi.org/10.1145/3392715","url":null,"abstract":"The recent spate of cyber security attacks has reinforced the importance of cyber security. Cyber security is no longer just a technical issue requiring the proficiency and capabilities of technical experts, it is a global phenomenon requiring the attention of stakeholders across different information domains. We organize this special issue on user-centric security and safety aspects of cyber-physical systems (CPS) with the aim of filling gaps between user behaviour and the design of complex CPS. These include different stakeholders’ roles and responsibilities, user-centric decision-making capabilities and situational awareness, user experience design, mitigation of user errors and analysing their impact, adaptive risk management, user or operator’s trust, security and safety in the device’s or system’s authentication, access control, and configuration management, hence, the relation to the development of the system’s security and safety in the cyber-physical world. It is presumed that alignment of user-oriented processes, standards, and guidelines for security and safety are required to cope with the complexities and interoperability of cyber-physical systems. In other words, this special issue aims to publish the latest advancements in user-centric security and safety techniques and controls for CPS and related components. The following seven contributed articles are included in this special issue: The first article, entitled “Efficient Multi-factor User Authentication Protocol with Forward Secrecy for Real-time Data Access in WSNs,” proposes a robust multi-factor authentication scheme that makes use of the imbalanced computational nature of the RSA cryptosystem, particularly suitable for scenarios where sensor nodes (but not the user’s device) are the main energy bottleneck. This work is the first one that can satisfy all 12 criteria of the state-of-the-art evaluation metric under the harshest adversary model so far. The second article, entitled “A Multi-label Fuzzy Relevance Clustering System for Malware Attack Attribution in the Edge Layer of Cyber Physical Networks,” proposes a novel multi-label fuzzy clustering system for malware attack attribution. The authors first observed that a multilabel classifier does not classify a part of the samples when classifying malware families. To overcome this problem, the authors developed an ensemble-based multi-label fuzzy classification method to suggest the relevance of a malware instance to the stricken families. The third article, entitled “A User-centric Security Solution for Internet of Things and Edge Convergence,” proposes a user-centric security solution to ensure the trustworthiness of the data for emergency evaluation in Edge datacenters (EDCs). A user centric security approach by authenticating users and devices before any communications is established. The fourth article, entitled “MobileTrust: Secure Knowledge Integration in VANETs,” is about the security of Vehicular Ad hoc NETworks (VAN","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"4 1","pages":"1 - 2"},"PeriodicalIF":2.3,"publicationDate":"2020-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3392715","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43476845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A User-centric Security Solution for Internet of Things and Edge Convergence 以用户为中心的物联网和边缘融合安全解决方案
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-05-18 DOI: 10.1145/3351882
PuthalDeepak, T. YangLaurence, DustdarSchahram, WenZhenyu, JunSong, MoorselAad van, RanjanRajiv
The Internet of Things (IoT) is becoming a backbone of sensing infrastructure to several mission-critical applications such as smart health, disaster management, and smart cities. Due to resource-c...
物联网(IoT)正在成为智能健康、灾害管理和智能城市等关键任务应用的传感基础设施的支柱。由于资源原因。。。
{"title":"A User-centric Security Solution for Internet of Things and Edge Convergence","authors":"PuthalDeepak, T. YangLaurence, DustdarSchahram, WenZhenyu, JunSong, MoorselAad van, RanjanRajiv","doi":"10.1145/3351882","DOIUrl":"https://doi.org/10.1145/3351882","url":null,"abstract":"The Internet of Things (IoT) is becoming a backbone of sensing infrastructure to several mission-critical applications such as smart health, disaster management, and smart cities. Due to resource-c...","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"4 1","pages":"1-19"},"PeriodicalIF":2.3,"publicationDate":"2020-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3351882","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45195452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
System-level Logical Execution Time 系统级逻辑执行时间
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-05-07 DOI: 10.1145/3381847
Kai-Björn Gemlau, Leonie Köhler, R. Ernst, Sophie Quinton
Logical Execution Time (LET) is a timed programming abstraction, which features predictable and composable timing. It has recently gained considerable attention in the automotive industry, where it was successfully applied to master the distribution of software applications on multi-core electronic control units. However, the LET abstraction in its conventional form is only valid within the scope of a single component. With the recent introduction of System-level Logical Execution Time (SL LET), the concept could be transferred to a system-wide scope. This article improves over a first paper on SL LET, by providing matured definitions and an extensive discussion of the concept. It also features a comprehensive evaluation exploring the impacts of SL LET with regard to design, verification, performance, and implementability. The evaluation goes far beyond the contexts in which LET was originally applied. Indeed, SL LET allows us to address many open challenges in the design and verification of complex embedded hardware/software systems addressing predictability, synchronization, composability, and extensibility. Furthermore, we investigate performance trade-offs, and we quantify implementation costs by providing an analysis of the additionally required buffers.
逻辑执行时间(LET)是一种定时编程抽象,其特点是可预测和可组合计时。它最近在汽车工业中获得了相当大的关注,在汽车工业中,它成功地应用于掌握多核电子控制单元上的软件应用程序的分发。然而,传统形式的LET抽象仅在单个组件的范围内有效。随着最近系统级逻辑执行时间(SL LET)的引入,这个概念可以转移到系统范围。本文通过提供成熟的定义和对该概念的广泛讨论,对第一篇关于SL LET的文章进行了改进。它还以全面的评估为特色,探讨了SL LET在设计、验证、性能和可实现性方面的影响。评估远远超出了最初应用LET的范围。实际上,SL LET允许我们解决复杂嵌入式硬件/软件系统设计和验证中的许多开放挑战,包括可预测性、同步性、可组合性和可扩展性。此外,我们还研究了性能权衡,并通过提供额外所需缓冲区的分析来量化实现成本。
{"title":"System-level Logical Execution Time","authors":"Kai-Björn Gemlau, Leonie Köhler, R. Ernst, Sophie Quinton","doi":"10.1145/3381847","DOIUrl":"https://doi.org/10.1145/3381847","url":null,"abstract":"Logical Execution Time (LET) is a timed programming abstraction, which features predictable and composable timing. It has recently gained considerable attention in the automotive industry, where it was successfully applied to master the distribution of software applications on multi-core electronic control units. However, the LET abstraction in its conventional form is only valid within the scope of a single component. With the recent introduction of System-level Logical Execution Time (SL LET), the concept could be transferred to a system-wide scope. This article improves over a first paper on SL LET, by providing matured definitions and an extensive discussion of the concept. It also features a comprehensive evaluation exploring the impacts of SL LET with regard to design, verification, performance, and implementability. The evaluation goes far beyond the contexts in which LET was originally applied. Indeed, SL LET allows us to address many open challenges in the design and verification of complex embedded hardware/software systems addressing predictability, synchronization, composability, and extensibility. Furthermore, we investigate performance trade-offs, and we quantify implementation costs by providing an analysis of the additionally required buffers.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":" ","pages":"1 - 27"},"PeriodicalIF":2.3,"publicationDate":"2020-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3381847","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44853056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
ACM Transactions on Cyber-Physical Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1