首页 > 最新文献

ACM Transactions on Cyber-Physical Systems最新文献

英文 中文
Utilizing Game Theory to Optimize In-motion Wireless Charging Service Efficiency for Electric Vehicles 利用博弈论优化电动汽车动态无线充电服务效率
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-01-04 DOI: 10.1145/3430194
Li Yan, Haiying Shen
Charger lanes, which are road segments equipped with in-motion wireless chargers, are expected to keep Electric Vehicles (EVs) continuously driving without recharging downtime. To maximize the service efficiency of the in-motion wireless chargers, we must properly coordinate the traffic of the EVs to avoid the generation of congestion at the charger lanes and on the road segments to them. In this article, we propose WPT-Opt, a game-theoretic approach for optimizing in-motion wireless charging efficiency, minimizing EVs’ driving time to the charger, and avoiding traffic congestion at the charger lanes to fulfill this task. We studied a metropolitan-scale dataset of public transportation EVs and observed the EVs’ spatial and temporal preference in selecting chargers, competition for chargers during busy charging times, the relationship between vehicle density and driving velocity on a road segment, the normal distribution of travel time of road segments, and the fact that vehicles have similar frequently driven trajectories. Based on the observations, a central controller estimates the vehicle density of the road segments by measuring the vehicles’ trajectory travel time, the friendship among the vehicles, and the vehicles’ routing choice given the presence of charger lanes. Then, we formulate a non-cooperative Stackelberg game between all the EVs and the central controller, in which each EV aims at minimizing its charging time cost to its selected target charger, while the central controller tries to maximally avoid the generation of congestion on the way through the in-motion wireless chargers. Our trace-driven experiments on SUMO demonstrate that WPT-Opt can maximally reduce the average charging time cost of the EVs by approximately 200% during different hours of a day.
充电车道是一种配备了动态无线充电器的路段,有望让电动汽车在不停机充电的情况下持续行驶。为了最大限度地发挥移动无线充电器的服务效率,必须合理协调电动汽车的交通,避免充电车道和充电路段的拥堵。在本文中,我们提出了一种基于博弈论的WPT-Opt方法来优化动态无线充电效率,最大限度地减少电动汽车到充电器的行驶时间,并避免充电车道上的交通拥堵。以城市规模的公共交通电动汽车数据集为研究对象,观察了电动汽车对充电器选择的时空偏好、充电繁忙时段对充电器的竞争、路段上车辆密度与行驶速度的关系、路段行驶时间的正态分布以及车辆具有相似的频繁行驶轨迹。根据观察结果,中央控制器通过测量车辆的轨迹行驶时间、车辆之间的友谊以及车辆在存在充电车道的情况下的路线选择来估计路段的车辆密度。然后,我们制定了所有电动汽车与中央控制器之间的非合作Stackelberg博弈,其中每辆电动汽车的目标是最小化其对所选目标充电器的充电时间成本,而中央控制器则试图最大限度地避免通过运动中的无线充电器在途中产生拥塞。我们在SUMO上进行的跟踪驱动实验表明,WPT-Opt在一天中不同时间内可以最大限度地减少电动汽车的平均充电时间成本约200%。
{"title":"Utilizing Game Theory to Optimize In-motion Wireless Charging Service Efficiency for Electric Vehicles","authors":"Li Yan, Haiying Shen","doi":"10.1145/3430194","DOIUrl":"https://doi.org/10.1145/3430194","url":null,"abstract":"Charger lanes, which are road segments equipped with in-motion wireless chargers, are expected to keep Electric Vehicles (EVs) continuously driving without recharging downtime. To maximize the service efficiency of the in-motion wireless chargers, we must properly coordinate the traffic of the EVs to avoid the generation of congestion at the charger lanes and on the road segments to them. In this article, we propose WPT-Opt, a game-theoretic approach for optimizing in-motion wireless charging efficiency, minimizing EVs’ driving time to the charger, and avoiding traffic congestion at the charger lanes to fulfill this task. We studied a metropolitan-scale dataset of public transportation EVs and observed the EVs’ spatial and temporal preference in selecting chargers, competition for chargers during busy charging times, the relationship between vehicle density and driving velocity on a road segment, the normal distribution of travel time of road segments, and the fact that vehicles have similar frequently driven trajectories. Based on the observations, a central controller estimates the vehicle density of the road segments by measuring the vehicles’ trajectory travel time, the friendship among the vehicles, and the vehicles’ routing choice given the presence of charger lanes. Then, we formulate a non-cooperative Stackelberg game between all the EVs and the central controller, in which each EV aims at minimizing its charging time cost to its selected target charger, while the central controller tries to maximally avoid the generation of congestion on the way through the in-motion wireless chargers. Our trace-driven experiments on SUMO demonstrate that WPT-Opt can maximally reduce the average charging time cost of the EVs by approximately 200% during different hours of a day.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":" ","pages":"1 - 26"},"PeriodicalIF":2.3,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3430194","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44809492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Taming the State-space Explosion in the Makespan Optimization of Flexible Manufacturing Systems 柔性制造系统制造周期优化中的状态空间爆炸
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-01-04 DOI: 10.1145/3426194
J. Bastos, J. Voeten, S. Stuijk, R. Schiffelers, H. Corporaal
This article presents a modular automaton-based framework to specify flexible manufacturing systems and to optimize the makespan of product batches. The Batch Makespan Optimization (BMO) problem is NP-Hard and optimization can therefore take prohibitively long, depending on the size of the state-space induced by the specification. To tame the state-space explosion problem, we develop an algebra based on automata equivalence and inclusion relations that consider both behavior and structure. The algebra allows us to systematically relate the languages induced by the automata, their state-space sizes, and their solutions to the BMO problem. Further, we introduce a novel constraint-based approach to systematically prune the state-space based on the the notions of nonpermutation-repulsiveness and permutation-attractiveness. We prove that constraining a nonpermutation-repulsing automaton with a permutation-attracting constraint always reduces the state-space. This approach allows us to (i) compute optimal solutions of the BMO problem when the (additional) constraints are taken into account and (ii) compute bounds for the (original) BMO problem (without using the constraints). We demonstrate the effectiveness of our approach by optimizing an industrial wafer handling controller.
本文提出了一个基于模块化自动机的框架来指定灵活的制造系统并优化产品批次的制造周期。批量制造优化(BMO)问题是NP难问题,因此优化可能需要非常长的时间,这取决于规范引起的状态空间的大小。为了解决状态空间爆炸问题,我们开发了一个基于自动机等价和包含关系的代数,同时考虑了行为和结构。代数使我们能够系统地将自动机引发的语言、它们的状态空间大小以及它们对BMO问题的解决方案联系起来。此外,我们引入了一种新的基于约束的方法,基于非突变排斥性和置换吸引性的概念来系统地修剪状态空间。我们证明了用置换吸引约束约束非置换排斥自动机总是减少状态空间。这种方法允许我们(i)在考虑(附加)约束时计算BMO问题的最优解,以及(ii)计算(原始)BMO问题(不使用约束)的边界。我们通过优化工业晶片处理控制器来证明我们的方法的有效性。
{"title":"Taming the State-space Explosion in the Makespan Optimization of Flexible Manufacturing Systems","authors":"J. Bastos, J. Voeten, S. Stuijk, R. Schiffelers, H. Corporaal","doi":"10.1145/3426194","DOIUrl":"https://doi.org/10.1145/3426194","url":null,"abstract":"This article presents a modular automaton-based framework to specify flexible manufacturing systems and to optimize the makespan of product batches. The Batch Makespan Optimization (BMO) problem is NP-Hard and optimization can therefore take prohibitively long, depending on the size of the state-space induced by the specification. To tame the state-space explosion problem, we develop an algebra based on automata equivalence and inclusion relations that consider both behavior and structure. The algebra allows us to systematically relate the languages induced by the automata, their state-space sizes, and their solutions to the BMO problem. Further, we introduce a novel constraint-based approach to systematically prune the state-space based on the the notions of nonpermutation-repulsiveness and permutation-attractiveness. We prove that constraining a nonpermutation-repulsing automaton with a permutation-attracting constraint always reduces the state-space. This approach allows us to (i) compute optimal solutions of the BMO problem when the (additional) constraints are taken into account and (ii) compute bounds for the (original) BMO problem (without using the constraints). We demonstrate the effectiveness of our approach by optimizing an industrial wafer handling controller.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"5 1","pages":"1 - 26"},"PeriodicalIF":2.3,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3426194","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43644889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Placement and Optimal Cooling Energy for Co-working Building Spaces 协同办公建筑空间的用户布局和最佳制冷能量
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-01-04 DOI: 10.1145/3432818
S. Nagarathinam, Arunchandar Vasan, V. Sarangan, Rajesh Jayaprakash, A. Sivasubramaniam
Increasing real estate and other infrastructure costs have resulted in the trend of co-working offices where users pay as they use for individual desks. Co-working offices that provide personalized comfort need to address users with potentially widely varying thermal comfort preferences. Providing personalized comfort in cabins separated by physical partitions with neighboring thermal zones or open-plan offices with a single actuator has received attention in the literature. In this article, the problem of minimizing user discomfort in open-plan co-working offices with multiple actuators while being cognizant of the energy consumed is considered. Specifically, the decision problems of assigning users to desks based on their thermal preferences and jointly controlling the multiple actuators are addressed. The non-linearities in the underlying thermodynamic constraints and the seating decision together make the problem computationally hard. A two-step heuristic that addresses these issues is presented. First, using a model that accounts for spatio-temporal thermodynamics, a one-time assignment of users to desks is performed that reduces the thermal resistance faced by the HVAC systems to provide the preferred comfort levels. Next, the setpoints are decided for all actuators to jointly minimize user discomfort by optimization and model-predictive control. Further, scalability is addressed by clustering user preferences and the associated HVAC actuators’ setpoints for the cases where a large number of actuators may be present in the room.
房地产和其他基础设施成本的增加导致了协同办公的趋势,用户按个人办公桌的使用付费。提供个性化舒适度的协同办公办公室需要满足具有潜在广泛变化的热舒适偏好的用户。在由具有相邻热区的物理分区分隔的舱室或具有单个致动器的开放式办公室中提供个性化的舒适性在文献中受到了关注。在本文中,考虑了在具有多个执行器的开放式协同办公办公室中,在认识到所消耗的能量的同时,最大限度地减少用户不适的问题。具体地,解决了基于用户的热偏好将用户分配到桌子上以及联合控制多个致动器的决策问题。潜在热力学约束中的非线性和座位决策一起使问题在计算上变得困难。提出了一种解决这些问题的两步启发式算法。首先,使用考虑时空热力学的模型,将用户一次性分配到办公桌上,以减少暖通空调系统面临的热阻,从而提供首选的舒适度。接下来,为所有致动器确定设定点,以通过优化和模型预测控制来共同最小化用户不适。此外,针对房间中可能存在大量致动器的情况,通过对用户偏好和相关HVAC致动器的设置点进行聚类来解决可扩展性问题。
{"title":"User Placement and Optimal Cooling Energy for Co-working Building Spaces","authors":"S. Nagarathinam, Arunchandar Vasan, V. Sarangan, Rajesh Jayaprakash, A. Sivasubramaniam","doi":"10.1145/3432818","DOIUrl":"https://doi.org/10.1145/3432818","url":null,"abstract":"Increasing real estate and other infrastructure costs have resulted in the trend of co-working offices where users pay as they use for individual desks. Co-working offices that provide personalized comfort need to address users with potentially widely varying thermal comfort preferences. Providing personalized comfort in cabins separated by physical partitions with neighboring thermal zones or open-plan offices with a single actuator has received attention in the literature. In this article, the problem of minimizing user discomfort in open-plan co-working offices with multiple actuators while being cognizant of the energy consumed is considered. Specifically, the decision problems of assigning users to desks based on their thermal preferences and jointly controlling the multiple actuators are addressed. The non-linearities in the underlying thermodynamic constraints and the seating decision together make the problem computationally hard. A two-step heuristic that addresses these issues is presented. First, using a model that accounts for spatio-temporal thermodynamics, a one-time assignment of users to desks is performed that reduces the thermal resistance faced by the HVAC systems to provide the preferred comfort levels. Next, the setpoints are decided for all actuators to jointly minimize user discomfort by optimization and model-predictive control. Further, scalability is addressed by clustering user preferences and the associated HVAC actuators’ setpoints for the cases where a large number of actuators may be present in the room.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"5 1","pages":"1 - 24"},"PeriodicalIF":2.3,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3432818","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44250507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
VIoLET: An Emulation Environment for Validating IoT Deployments at Large Scales VIoLET:用于大规模验证物联网部署的仿真环境
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-01-01 DOI: 10.1145/3446346
Shrey Baheti, Shreyas Badiger, Yogesh L. Simmhan
Internet of Things (IoT) deployments have been growing manifold, encompassing sensors, networks, edge, fog, and cloud resources. Despite the intense interest from researchers and practitioners, most do not have access to large-scale IoT testbeds for validation. Simulation environments that allow analytical modeling are a poor substitute for evaluating software platforms or application workloads in realistic computing environments. Here, we propose a virtual environment for validating Internet of Things at large scales (VIoLET), an emulator for defining and launching large-scale IoT deployments within cloud VMs. It allows users to declaratively specify container-based compute resources that match the performance of native IoT compute devices using Docker. These can be inter-connected by complex topologies on which bandwidth and latency rules are enforced. Users can configure synthetic sensors for data generation as well. We also incorporate models for CPU resource dynamism, and for failure and recovery of the underlying devices. We offer a detailed comparison of VIoLET’s compute and network performance between the virtual and physical deployments, evaluate its scaling with deployments with up to 1,000 devices and 4, 000 device-cores, and validate its ability to model resource dynamism. Our extensive experiments show that the performance of the virtual IoT environment accurately matches the expected behavior, with deviations levels within what is seen in actual physical devices. It also scales to 1, 000s of devices and at a modest cloud computing costs of under 0.15% of the actual hardware cost, per hour of use, with minimal management effort. This IoT emulation environment fills an essential gap between IoT simulators and real deployments.
物联网(IoT)的部署越来越多样化,包括传感器、网络、边缘、雾和云资源。尽管研究人员和实践者对此非常感兴趣,但大多数人都无法获得大规模的物联网测试平台进行验证。允许分析建模的仿真环境是在实际计算环境中评估软件平台或应用程序工作负载的糟糕替代品。在这里,我们提出了一个用于大规模验证物联网的虚拟环境(VIoLET),这是一个用于定义和启动云vm内大规模物联网部署的模拟器。它允许用户使用Docker声明式地指定基于容器的计算资源,以匹配本地物联网计算设备的性能。它们可以通过复杂的拓扑相互连接,在这些拓扑上执行带宽和延迟规则。用户也可以配置合成传感器来生成数据。我们还合并了CPU资源动态模型,以及底层设备的故障和恢复模型。我们提供了虚拟和物理部署之间VIoLET的计算和网络性能的详细比较,评估了它在多达1,000个设备和4,000个设备核的部署下的可伸缩性,并验证了它对资源动态建模的能力。我们广泛的实验表明,虚拟物联网环境的性能与预期行为准确匹配,在实际物理设备中看到的偏差水平。它还可以扩展到1000台设备,每小时使用的云计算成本不到实际硬件成本的0.15%,管理工作最少。这种物联网仿真环境填补了物联网模拟器和实际部署之间的重要空白。
{"title":"VIoLET: An Emulation Environment for Validating IoT Deployments at Large Scales","authors":"Shrey Baheti, Shreyas Badiger, Yogesh L. Simmhan","doi":"10.1145/3446346","DOIUrl":"https://doi.org/10.1145/3446346","url":null,"abstract":"Internet of Things (IoT) deployments have been growing manifold, encompassing sensors, networks, edge, fog, and cloud resources. Despite the intense interest from researchers and practitioners, most do not have access to large-scale IoT testbeds for validation. Simulation environments that allow analytical modeling are a poor substitute for evaluating software platforms or application workloads in realistic computing environments. Here, we propose a virtual environment for validating Internet of Things at large scales (VIoLET), an emulator for defining and launching large-scale IoT deployments within cloud VMs. It allows users to declaratively specify container-based compute resources that match the performance of native IoT compute devices using Docker. These can be inter-connected by complex topologies on which bandwidth and latency rules are enforced. Users can configure synthetic sensors for data generation as well. We also incorporate models for CPU resource dynamism, and for failure and recovery of the underlying devices. We offer a detailed comparison of VIoLET’s compute and network performance between the virtual and physical deployments, evaluate its scaling with deployments with up to 1,000 devices and 4, 000 device-cores, and validate its ability to model resource dynamism. Our extensive experiments show that the performance of the virtual IoT environment accurately matches the expected behavior, with deviations levels within what is seen in actual physical devices. It also scales to 1, 000s of devices and at a modest cloud computing costs of under 0.15% of the actual hardware cost, per hour of use, with minimal management effort. This IoT emulation environment fills an essential gap between IoT simulators and real deployments.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"5 1","pages":"25:1-25:39"},"PeriodicalIF":2.3,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3446346","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64037409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
TangleCV: A Distributed Ledger Technique for Secure Message Sharing in Connected Vehicles 面向车联网安全信息共享的分布式账本技术
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-01-01 DOI: 10.1145/3404500
Heena Rathore, A. Samant, Murtuza Jadliwala
ing with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2020 Association for Computing Machinery. 2378-962X/2020/12-ART6 $15.00 https://doi.org/10.1145/3404500 ACM Transactions on Cyber-Physical Systems, Vol. 5, No. 1, Article 6. Publication date: December 2020. 6:2 H. Rathore et al. ACM Reference format: Heena Rathore, Abhay Samant, and Murtuza Jadliwala. 2020. TangleCV: A Distributed Ledger Technique for Secure Message Sharing in Connected Vehicles. ACM Trans. Cyber-Phys. Syst. 5, 1, Article 6 (December 2020), 25 pages. https://doi.org/10.1145/3404500
允许赊账付款。以其他方式复制或重新发布,在服务器上发布或重新分发到列表,需要事先获得特定许可和/或付费。从permissions@acm.org请求权限。©2020美国计算机协会。2378-962X/2020/12- art6 $15.00 https://doi.org/10.1145/3404500 ACM信息物理系统学报,第5卷,第1期,第6条。出版日期:2020年12月。6:2 H. Rathore等。ACM参考格式:Heena Rathore, Abhay Samant和Murtuza Jadliwala。2020。面向车联网安全信息共享的分布式账本技术。ACM反式。Cyber-Phys。系统5,1,第六条(2020年12月),25页。https://doi.org/10.1145/3404500
{"title":"TangleCV: A Distributed Ledger Technique for Secure Message Sharing in Connected Vehicles","authors":"Heena Rathore, A. Samant, Murtuza Jadliwala","doi":"10.1145/3404500","DOIUrl":"https://doi.org/10.1145/3404500","url":null,"abstract":"ing with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2020 Association for Computing Machinery. 2378-962X/2020/12-ART6 $15.00 https://doi.org/10.1145/3404500 ACM Transactions on Cyber-Physical Systems, Vol. 5, No. 1, Article 6. Publication date: December 2020. 6:2 H. Rathore et al. ACM Reference format: Heena Rathore, Abhay Samant, and Murtuza Jadliwala. 2020. TangleCV: A Distributed Ledger Technique for Secure Message Sharing in Connected Vehicles. ACM Trans. Cyber-Phys. Syst. 5, 1, Article 6 (December 2020), 25 pages. https://doi.org/10.1145/3404500","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"5 1","pages":"6:1-6:25"},"PeriodicalIF":2.3,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3404500","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64029788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Assessing the Severity of Smart Attacks in Industrial Cyber-Physical Systems 评估工业网络物理系统中智能攻击的严重性
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-12-30 DOI: 10.1145/3422369
Abdelaziz Khaled, Samir Ouchani, Z. Tari, K. Drira
Industrial cyber-physical systems (ICPS) are heterogeneous inter-operating parts that can be physical, technical, networking, and even social like agent operators. Incrementally, they perform a central role in critical and industrial infrastructures, governmental, and personal daily life. Especially with the Industry 4.0 revolution, they became more dependent on the connectivity by supporting novel communication and distance control functionalities, which expand their attack surfaces that result in a high risk for cyber-attacks. Furthermore, regarding physical and social constraints, they may push up new classes of security breaches that might result in serious economic damages. Thus, designing a secure ICPS is a complex task, since this needs to guarantee security and harmonize the functionalities between the various parts that interact with different technologies. This article highlights the significance of cyber-security infrastructure and shows how to evaluate, prevent, and mitigate ICPS-based cyber-attacks. We carried out this objective by establishing an adequate semantics for ICPS’s entities and their composition, which includes social actors that act differently than mobile robots and automated processes. This article also provides the feasible attacks generated by a reinforcement learning mechanism based on multiple criteria that selects both appropriate actions for each ICPS component and the possible countermeasures for mitigation. To efficiently analyze ICPS’s security, we proposed a model-checking-based framework that relies on a set of predefined attacks from where the security requirements are used to assess how well the model is secure. Finally, to show the effectiveness of the proposed solution, we model, analyze, and evaluate the ICPS security on two real use cases.
工业网络物理系统(ICPS)是异构的互操作部件,可以是物理的、技术的、网络的,甚至像代理运营商一样是社会的。逐渐地,它们在关键和工业基础设施、政府和个人日常生活中发挥着核心作用。特别是随着工业4.0革命的到来,他们通过支持新颖的通信和远程控制功能变得更加依赖于连接,这扩大了他们的攻击面,导致网络攻击的高风险。此外,就物理和社会限制而言,它们可能会引发新的安全漏洞,从而可能导致严重的经济损失。因此,设计安全的ICPS是一项复杂的任务,因为这需要保证安全性,并协调与不同技术交互的各个部分之间的功能。本文强调了网络安全基础设施的重要性,并展示了如何评估、预防和减轻基于icps的网络攻击。我们通过为ICPS的实体及其组成建立适当的语义来实现这一目标,其中包括与移动机器人和自动化过程不同的社会参与者。本文还提供了由基于多个标准的强化学习机制生成的可行攻击,该机制为每个ICPS组件选择适当的操作和可能的缓解对策。为了有效地分析ICPS的安全性,我们提出了一个基于模型检查的框架,该框架依赖于一组预定义的攻击,其中使用安全需求来评估模型的安全性。最后,为了证明所提出的解决方案的有效性,我们在两个实际用例上对ICPS安全性进行了建模、分析和评估。
{"title":"Assessing the Severity of Smart Attacks in Industrial Cyber-Physical Systems","authors":"Abdelaziz Khaled, Samir Ouchani, Z. Tari, K. Drira","doi":"10.1145/3422369","DOIUrl":"https://doi.org/10.1145/3422369","url":null,"abstract":"Industrial cyber-physical systems (ICPS) are heterogeneous inter-operating parts that can be physical, technical, networking, and even social like agent operators. Incrementally, they perform a central role in critical and industrial infrastructures, governmental, and personal daily life. Especially with the Industry 4.0 revolution, they became more dependent on the connectivity by supporting novel communication and distance control functionalities, which expand their attack surfaces that result in a high risk for cyber-attacks. Furthermore, regarding physical and social constraints, they may push up new classes of security breaches that might result in serious economic damages. Thus, designing a secure ICPS is a complex task, since this needs to guarantee security and harmonize the functionalities between the various parts that interact with different technologies. This article highlights the significance of cyber-security infrastructure and shows how to evaluate, prevent, and mitigate ICPS-based cyber-attacks. We carried out this objective by establishing an adequate semantics for ICPS’s entities and their composition, which includes social actors that act differently than mobile robots and automated processes. This article also provides the feasible attacks generated by a reinforcement learning mechanism based on multiple criteria that selects both appropriate actions for each ICPS component and the possible countermeasures for mitigation. To efficiently analyze ICPS’s security, we proposed a model-checking-based framework that relies on a set of predefined attacks from where the security requirements are used to assess how well the model is secure. Finally, to show the effectiveness of the proposed solution, we model, analyze, and evaluate the ICPS security on two real use cases.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"5 1","pages":"1 - 28"},"PeriodicalIF":2.3,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3422369","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46231272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems “互联网络物理系统的安全和隐私”特刊简介
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-12-30 DOI: 10.1145/3431201
Moreno Ambrosin, M. Conti, R. Lazzeretti, Chia-Mu Yu
Cyber-Physical Systems (CPS) are becoming pervasive and changing our lives. Smart cyberphysical devices can be used in many different fields, such as connected vehicles, smart homes, mobile social networks and Internet of People, and Industrial Cyber-Physical Systems. CPS devices usually leverage on Machine-to-Machine (M2M) communication. This allows these devices to operate in interconnected groups, enabling them to autonomously perform critical operations, take decisions, or perform tasks that single devices cannot do. As we move towards an era of “automation,” interconnected CPS certainly make their existence as a panacea to address several issues in the smart world, but also are an attractive target for attackers, which can operate on single devices or on the whole network. In fact, these devices are usually resource-constrained and unable to defend themselves against security threats. Even a single compromised node in a group of cooperating devices can pose a serious security threat, e.g., by either disrupting communications (and thus the coordination) within the group, or sharing critical information to unauthorized external parties. Attackers can use devices as a vector to other targets, as in the case of Denial of Service (DoS) attacks, interfere with the normal functionality of the network to force abnormal behaviors, or simply infer private information through compromised devices. As such, security and privacy are a major concern to guarantee both the correct operational capabilities of devices and prevent data thefts and/or privacy violations. This special issue provides significant contributions for the improvement of different interconnected Cyber-physical Systems in several fields with the goal of improving their security and/or privacy. We start our special issue with two articles focusing on smart home security. Kafle et al. provide a systematic security analysis of Google Nest and Philips Hue, two widely popular data store-based smart home platforms. In “Security in Centralized Data Store-based Home Automation Platforms: A Systematic Analysis of Nest and Hue,” authors evaluate the security of the two platforms, identify vulnerabilities in them, and propose solutions for their mitigations. In “Canopy: A Verifiable Privacy-preserving Token Ring–based Communication Protocol for Smart Homes,” Panwar et al. propose a protocol that prevents privacy breaches in smart homes that can arise from the analysis of the traffic generated by smart devices. The protocol is based on a cryptographically secure token circulation in a ring network to which smart home devices are connected. We then continue with two articles whose subject is the network of connected people. Azad et al. in “Privacy-preserving Crowd-sensed Trust Aggregation in the User-centric Internet of People Networks” propose a protocol that uses homomorphic cryptosystem in a decentralized way
信息物理系统(CPS)正变得无处不在,并改变着我们的生活。智能网络物理设备可以应用于许多不同的领域,如互联汽车、智能家居、移动社交网络和人联网、工业网络物理系统等。CPS设备通常利用机器对机器(M2M)通信。这允许这些设备在相互连接的组中运行,使它们能够自主执行关键操作、做出决策或执行单个设备无法完成的任务。随着我们走向“自动化”时代,相互连接的CPS肯定会成为解决智能世界中几个问题的灵丹妙药,但也会成为攻击者的一个有吸引力的目标,攻击者可以在单个设备或整个网络上操作。实际上,这些设备通常资源有限,无法抵御安全威胁。即使是一组协作设备中的单个受损节点也可能构成严重的安全威胁,例如,通过破坏组内的通信(从而破坏协调),或向未经授权的外部方共享关键信息。攻击者可以使用设备作为攻击其他目标的载体,例如在拒绝服务(DoS)攻击的情况下,干扰网络的正常功能以强制执行异常行为,或者简单地通过受损设备推断私人信息。因此,安全和隐私是保证设备正确操作能力和防止数据盗窃和/或隐私侵犯的主要关注点。本特刊为改进不同的互联网络物理系统在几个领域提供了重要的贡献,目的是提高其安全性和/或隐私。我们以两篇关于智能家居安全的文章作为特刊的开始。Kafle等人对谷歌Nest和Philips Hue这两个广受欢迎的基于数据存储的智能家居平台进行了系统的安全分析。在“基于集中式数据存储的家庭自动化平台的安全性:对Nest和Hue的系统分析”中,作者评估了这两个平台的安全性,确定了其中的漏洞,并提出了缓解这些漏洞的解决方案。在“Canopy:一种用于智能家居的可验证的隐私保护令牌环通信协议”中,Panwar等人提出了一种协议,可以防止智能家居中因分析智能设备产生的流量而导致的隐私泄露。该协议基于智能家居设备连接的环形网络中的加密安全令牌循环。然后我们继续看两篇文章,它们的主题是相互联系的人的网络。Azad等人在“以用户为中心的互联网中的隐私保护人群感知信任聚合”中提出了一种以去中心化方式使用同态密码系统的协议
{"title":"Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems","authors":"Moreno Ambrosin, M. Conti, R. Lazzeretti, Chia-Mu Yu","doi":"10.1145/3431201","DOIUrl":"https://doi.org/10.1145/3431201","url":null,"abstract":"Cyber-Physical Systems (CPS) are becoming pervasive and changing our lives. Smart cyberphysical devices can be used in many different fields, such as connected vehicles, smart homes, mobile social networks and Internet of People, and Industrial Cyber-Physical Systems. CPS devices usually leverage on Machine-to-Machine (M2M) communication. This allows these devices to operate in interconnected groups, enabling them to autonomously perform critical operations, take decisions, or perform tasks that single devices cannot do. As we move towards an era of “automation,” interconnected CPS certainly make their existence as a panacea to address several issues in the smart world, but also are an attractive target for attackers, which can operate on single devices or on the whole network. In fact, these devices are usually resource-constrained and unable to defend themselves against security threats. Even a single compromised node in a group of cooperating devices can pose a serious security threat, e.g., by either disrupting communications (and thus the coordination) within the group, or sharing critical information to unauthorized external parties. Attackers can use devices as a vector to other targets, as in the case of Denial of Service (DoS) attacks, interfere with the normal functionality of the network to force abnormal behaviors, or simply infer private information through compromised devices. As such, security and privacy are a major concern to guarantee both the correct operational capabilities of devices and prevent data thefts and/or privacy violations. This special issue provides significant contributions for the improvement of different interconnected Cyber-physical Systems in several fields with the goal of improving their security and/or privacy. We start our special issue with two articles focusing on smart home security. Kafle et al. provide a systematic security analysis of Google Nest and Philips Hue, two widely popular data store-based smart home platforms. In “Security in Centralized Data Store-based Home Automation Platforms: A Systematic Analysis of Nest and Hue,” authors evaluate the security of the two platforms, identify vulnerabilities in them, and propose solutions for their mitigations. In “Canopy: A Verifiable Privacy-preserving Token Ring–based Communication Protocol for Smart Homes,” Panwar et al. propose a protocol that prevents privacy breaches in smart homes that can arise from the analysis of the traffic generated by smart devices. The protocol is based on a cryptographically secure token circulation in a ring network to which smart home devices are connected. We then continue with two articles whose subject is the network of connected people. Azad et al. in “Privacy-preserving Crowd-sensed Trust Aggregation in the User-centric Internet of People Networks” propose a protocol that uses homomorphic cryptosystem in a decentralized way","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"5 1","pages":"1 - 2"},"PeriodicalIF":2.3,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3431201","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47303579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security in Centralized Data Store-based Home Automation Platforms 基于集中式数据存储的家庭自动化平台的安全性
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-12-30 DOI: 10.1145/3418286
Kaushal Kafle, Kevin Moran, Sunil Manandhar, Adwait Nadkarni, D. Poshyvanyk
Home automation platforms enable consumers to conveniently automate various physical aspects of their homes. However, the security flaws in the platforms or integrated third-party products can have serious security and safety implications for the user’s physical environment. This article describes our systematic security evaluation of two popular smart home platforms, Google’s Nest platform and Philips Hue, which implement home automation “routines” (i.e., trigger-action programs involving apps and devices) via manipulation of state variables in a centralized data store. Our semi-automated analysis examines, among other things, platform access control enforcement, the rigor of non-system enforcement procedures, and the potential for misuse of routines, and it leads to 11 key findings with serious security implications. We combine several of the vulnerabilities we find to demonstrate the first end-to-end instance of lateral privilege escalation in the smart home, wherein we remotely disable the Nest Security Camera via a compromised light switch app. Finally, we discuss potential defenses, and the impact of the continuous evolution of smart home platforms on the practicality of security analysis. Our findings draw attention to the unique security challenges of smart home platforms and highlight the importance of enforcing security by design.
家庭自动化平台使消费者能够方便地自动化家庭的各个物理方面。但是,平台或集成的第三方产品中的安全缺陷可能会对用户的物理环境产生严重的安全和影响。本文描述了我们对两种流行的智能家居平台的系统安全评估,b谷歌的Nest平台和飞利浦Hue,它们通过操纵集中数据存储中的状态变量实现家庭自动化“例程”(即涉及应用程序和设备的触发操作程序)。我们的半自动化分析检查了平台访问控制执行、非系统执行过程的严谨性以及滥用例程的可能性,并得出了11个具有严重安全隐患的关键发现。我们结合了我们发现的几个漏洞来展示智能家居中横向特权升级的第一个端到端实例,其中我们通过一个受损的灯开关应用程序远程禁用Nest安全摄像头。最后,我们讨论了潜在的防御措施,以及智能家居平台不断发展对安全分析实用性的影响。我们的研究结果引起了人们对智能家居平台独特的安全挑战的关注,并强调了通过设计加强安全的重要性。
{"title":"Security in Centralized Data Store-based Home Automation Platforms","authors":"Kaushal Kafle, Kevin Moran, Sunil Manandhar, Adwait Nadkarni, D. Poshyvanyk","doi":"10.1145/3418286","DOIUrl":"https://doi.org/10.1145/3418286","url":null,"abstract":"Home automation platforms enable consumers to conveniently automate various physical aspects of their homes. However, the security flaws in the platforms or integrated third-party products can have serious security and safety implications for the user’s physical environment. This article describes our systematic security evaluation of two popular smart home platforms, Google’s Nest platform and Philips Hue, which implement home automation “routines” (i.e., trigger-action programs involving apps and devices) via manipulation of state variables in a centralized data store. Our semi-automated analysis examines, among other things, platform access control enforcement, the rigor of non-system enforcement procedures, and the potential for misuse of routines, and it leads to 11 key findings with serious security implications. We combine several of the vulnerabilities we find to demonstrate the first end-to-end instance of lateral privilege escalation in the smart home, wherein we remotely disable the Nest Security Camera via a compromised light switch app. Finally, we discuss potential defenses, and the impact of the continuous evolution of smart home platforms on the practicality of security analysis. Our findings draw attention to the unique security challenges of smart home platforms and highlight the importance of enforcing security by design.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":" ","pages":"1 - 27"},"PeriodicalIF":2.3,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3418286","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45931072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
From Trustworthy Data to Trustworthy IoT 从值得信赖的数据到值得信赖的物联网
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-12-30 DOI: 10.1145/3418686
C. Ardagna, Rasool Asal, E. Damiani, Nabil El Ioini, Mehdi Elahi, C. Pahl
Internet of Things (IoT) is composed of physical devices, communication networks, and services provided by edge systems and over-the-top applications. IoT connects billions of devices that collect data from the physical environment, which are pre-processed at the edge and then forwarded to processing services at the core of the infrastructure, on top of which cloud-based applications are built and provided to mobile end users. IoT comes with important advantages in terms of applications and added value for its users, making their world smarter and simpler. These advantages, however, are mitigated by the difficulty of guaranteeing IoT trustworthiness, which is still in its infancy. IoT trustworthiness is a must especially in critical domains (e.g., health, transportation) where humans become new components of an IoT system and their life is put at risk by system malfunctioning or breaches. In this article, we put forward the idea that trust in IoT can be boosted if and only if its automation and adaptation processes are based on trustworthy data. We therefore depart from a scenario that considers the quality of a single decision as the main goal of an IoT system and consider the trustworthiness of collected data as a fundamental requirement at the basis of a trustworthy IoT environment. We therefore define a methodology for data collection that filters untrusted data out according to trust rules evaluating the status of the devices collecting data and the collected data themselves. Our approach is based on blockchain and smart contracts and collects data whose trustworthiness and integrity are proven over time. The methodology balances trustworthiness and privacy and is experimentally evaluated in real-world and simulated scenarios using Hyperledger fabric blockchain.
物联网(Internet of Things, IoT)是由物理设备、通信网络以及边缘系统和顶级应用提供的服务组成的。物联网连接了数十亿个设备,这些设备从物理环境中收集数据,这些数据在边缘进行预处理,然后转发到基础设施核心的处理服务,在此基础上构建基于云的应用程序并提供给移动终端用户。物联网在应用和用户附加值方面具有重要优势,使他们的世界更智能、更简单。然而,这些优势因保证物联网可信度的困难而减弱,物联网仍处于起步阶段。物联网的可信度是必须的,特别是在关键领域(例如,健康,运输),在这些领域,人类成为物联网系统的新组成部分,他们的生命因系统故障或漏洞而面临风险。在本文中,我们提出了这样一种观点,即当且仅当物联网的自动化和适应过程基于可信数据时,才能提高对物联网的信任。因此,我们脱离了将单个决策的质量视为物联网系统主要目标的场景,并将收集数据的可信度视为可信赖物联网环境基础上的基本要求。因此,我们定义了一种数据收集方法,根据评估收集数据的设备和收集的数据本身的状态的信任规则过滤掉不受信任的数据。我们的方法是基于区块链和智能合约,并收集数据,这些数据的可信度和完整性随着时间的推移而得到证明。该方法平衡了可信度和隐私性,并使用Hyperledger fabric区块链在真实世界和模拟场景中进行了实验评估。
{"title":"From Trustworthy Data to Trustworthy IoT","authors":"C. Ardagna, Rasool Asal, E. Damiani, Nabil El Ioini, Mehdi Elahi, C. Pahl","doi":"10.1145/3418686","DOIUrl":"https://doi.org/10.1145/3418686","url":null,"abstract":"Internet of Things (IoT) is composed of physical devices, communication networks, and services provided by edge systems and over-the-top applications. IoT connects billions of devices that collect data from the physical environment, which are pre-processed at the edge and then forwarded to processing services at the core of the infrastructure, on top of which cloud-based applications are built and provided to mobile end users. IoT comes with important advantages in terms of applications and added value for its users, making their world smarter and simpler. These advantages, however, are mitigated by the difficulty of guaranteeing IoT trustworthiness, which is still in its infancy. IoT trustworthiness is a must especially in critical domains (e.g., health, transportation) where humans become new components of an IoT system and their life is put at risk by system malfunctioning or breaches. In this article, we put forward the idea that trust in IoT can be boosted if and only if its automation and adaptation processes are based on trustworthy data. We therefore depart from a scenario that considers the quality of a single decision as the main goal of an IoT system and consider the trustworthiness of collected data as a fundamental requirement at the basis of a trustworthy IoT environment. We therefore define a methodology for data collection that filters untrusted data out according to trust rules evaluating the status of the devices collecting data and the collected data themselves. Our approach is based on blockchain and smart contracts and collects data whose trustworthiness and integrity are proven over time. The methodology balances trustworthiness and privacy and is experimentally evaluated in real-world and simulated scenarios using Hyperledger fabric blockchain.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"5 1","pages":"1 - 26"},"PeriodicalIF":2.3,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3418686","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41546292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Preserving Secrecy in Mobile Social Networks 在移动社交网络中保护隐私
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-12-30 DOI: 10.1145/3396071
Gabriela Suntaxi, A. A. E. Ghazi, Klemens Böhm
Location-based services are one of the most important services offered by mobile social networks. Offering this kind of service requires accessing the physical position of users together with the access authorizations, i.e., who is authorized to access what information. However, these physical positions and authorizations are sensitive information that have to be kept secret from any adversary, including the service providers. As far as we know, the problem of offering location-based services in mobile social networks with a revocation feature under collusion assumption, i.e., an adversary colludes with the service provider, has not been studied. In this article, we show how to solve this problem in the example of range queries. Specifically, we guarantee any adversary, including the service provider, is not able to learn (1) the physical position of the users, (2) the distance between his position and that of the users, and (3) whether two users are allowed to learn the distance between them. We propose two approaches, namely, two-layer symmetric encryption and two-layer attribute-based encryption. The main difference between them is that they use, among other encryption schemes, symmetric and attribute-based encryption, respectively. Next, we prove the secrecy guarantees of both approaches, analyze their complexity, and provide experiments to evaluate their performance in practice.
基于位置的服务是移动社交网络提供的最重要的服务之一。提供此类服务需要访问用户的物理位置以及访问授权,即谁被授权访问哪些信息。然而,这些物理位置和授权都是敏感信息,必须对任何对手(包括服务提供商)保密。据我们所知,移动社交网络中提供具有撤销功能的位置服务的问题,在共谋假设下,即对手与服务提供商勾结,尚未研究过。在本文中,我们将展示如何在范围查询示例中解决此问题。具体来说,我们保证包括服务提供商在内的任何对手都无法了解(1)用户的物理位置,(2)他的位置与用户的位置之间的距离,以及(3)是否允许两个用户了解他们之间的距离。我们提出了两种方法,即两层对称加密和两层基于属性的加密。它们之间的主要区别在于,在其他加密方案中,它们分别使用对称和基于属性的加密。其次,我们证明了这两种方法的保密性,分析了它们的复杂性,并提供了实验来评估它们在实践中的性能。
{"title":"Preserving Secrecy in Mobile Social Networks","authors":"Gabriela Suntaxi, A. A. E. Ghazi, Klemens Böhm","doi":"10.1145/3396071","DOIUrl":"https://doi.org/10.1145/3396071","url":null,"abstract":"Location-based services are one of the most important services offered by mobile social networks. Offering this kind of service requires accessing the physical position of users together with the access authorizations, i.e., who is authorized to access what information. However, these physical positions and authorizations are sensitive information that have to be kept secret from any adversary, including the service providers. As far as we know, the problem of offering location-based services in mobile social networks with a revocation feature under collusion assumption, i.e., an adversary colludes with the service provider, has not been studied. In this article, we show how to solve this problem in the example of range queries. Specifically, we guarantee any adversary, including the service provider, is not able to learn (1) the physical position of the users, (2) the distance between his position and that of the users, and (3) whether two users are allowed to learn the distance between them. We propose two approaches, namely, two-layer symmetric encryption and two-layer attribute-based encryption. The main difference between them is that they use, among other encryption schemes, symmetric and attribute-based encryption, respectively. Next, we prove the secrecy guarantees of both approaches, analyze their complexity, and provide experiments to evaluate their performance in practice.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"5 1","pages":"1 - 29"},"PeriodicalIF":2.3,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3396071","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47817053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Cyber-Physical Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1