首页 > 最新文献

Hospital security and safety management最新文献

英文 中文
Preface: Security and Safety in Unmanned Systems 前言:无人系统中的安保与安全
Pub Date : 2023-10-05 DOI: 10.1051/sands/2023032
Jian Sun, Youmin Zhang, Hong CHEN, Mou CHEN, Qinglei Hu
An unmanned system is defined as an electro-mechanical system capable of exerting its power to perform designated missions with no human operator aboard. Thanks to the development of digital design (artifi-cial intelligence, control, etc .) and robotics in recent years, unmanned systems are making a revolution as an emerging technology with many different applications in the military, civilian
{"title":"Preface: Security and Safety in Unmanned Systems","authors":"Jian Sun, Youmin Zhang, Hong CHEN, Mou CHEN, Qinglei Hu","doi":"10.1051/sands/2023032","DOIUrl":"https://doi.org/10.1051/sands/2023032","url":null,"abstract":"An unmanned system is defined as an electro-mechanical system capable of exerting its power to perform designated missions with no human operator aboard. Thanks to the development of digital design (artifi-cial intelligence, control, etc .) and robotics in recent years, unmanned systems are making a revolution as an emerging technology with many different applications in the military, civilian","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134946946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization for UAV-Assisted Simultaneous Transmission and Reception Communications in the Existence of Malicious Jammers 存在恶意干扰时无人机辅助同步收发通信优化
Pub Date : 2023-09-27 DOI: 10.1051/sands/2023031
Zhiyu Huang, Shuzhen Liu, Zhichao Sheng, Hongwen Yu, Antonino Masaracchia
In this paper, we study an unmanned aerial vehicle (UAV)-assisted communication system, where the UAV is dispatched to implement simultaneous transmission and reception (STR) in the existence of multiple malicious jammers. Two schemes are investigated, namely frequency band-division-duplex (FDD) and time-fraction (TF). Based on FDD scheme, the UAV can transmit information by using the portion of the bandwidth and receive information within the remaining portion of the bandwidth simultaneously. To perform the STR within the whole bandwidth, the TF-based scheme is considered by using a fraction of a time slot for the downlink, while the remaining fraction of the time slot is allocated for the uplink. We aim to maximize the worst-case throughput by optimizing the UAV three dimensional (3D) trajectory and resource allocation for each scheme. The optimization problem is non-convex and thus computationally intractable. To handle the nonlinear problem, we use the block coordinate decomposition method to disaggregate the optimization problem into four subproblems and adopt the successive convex approximation technique to tackle non-convex problems. The simulation results demonstrate the performance of TF-based scheme over the benchmark schemes.
本文研究了一种无人机辅助通信系统,在存在多个恶意干扰器的情况下,派遣无人机实现同时发送和接收(STR)。研究了两种方案,即频带分双工(FDD)和时间分数(TF)。基于FDD方案,无人机可以利用部分带宽发送信息,同时接收剩余部分带宽内的信息。为了在整个带宽内执行STR,考虑基于tf的方案,将一小部分时隙用于下行链路,而将剩余的时隙用于上行链路。我们的目标是通过优化无人机三维轨迹和每种方案的资源分配来最大化最坏情况下的吞吐量。优化问题是非凸的,因此难以计算。为了处理非线性问题,我们采用分块坐标分解法将优化问题分解为4个子问题,并采用逐次凸逼近技术处理非凸问题。仿真结果验证了基于tf的方案优于基准方案的性能。
{"title":"Optimization for UAV-Assisted Simultaneous Transmission and Reception Communications in the Existence of Malicious Jammers","authors":"Zhiyu Huang, Shuzhen Liu, Zhichao Sheng, Hongwen Yu, Antonino Masaracchia","doi":"10.1051/sands/2023031","DOIUrl":"https://doi.org/10.1051/sands/2023031","url":null,"abstract":"In this paper, we study an unmanned aerial vehicle (UAV)-assisted communication system, where the UAV is dispatched to implement simultaneous transmission and reception (STR) in the existence of multiple malicious jammers. Two schemes are investigated, namely frequency band-division-duplex (FDD) and time-fraction (TF). Based on FDD scheme, the UAV can transmit information by using the portion of the bandwidth and receive information within the remaining portion of the bandwidth simultaneously. To perform the STR within the whole bandwidth, the TF-based scheme is considered by using a fraction of a time slot for the downlink, while the remaining fraction of the time slot is allocated for the uplink. We aim to maximize the worst-case throughput by optimizing the UAV three dimensional (3D) trajectory and resource allocation for each scheme. The optimization problem is non-convex and thus computationally intractable. To handle the nonlinear problem, we use the block coordinate decomposition method to disaggregate the optimization problem into four subproblems and adopt the successive convex approximation technique to tackle non-convex problems. The simulation results demonstrate the performance of TF-based scheme over the benchmark schemes.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135477060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling Space-Air Integration: A Satellite-UAV Networking Authentication Scheme 实现天空融合:一种卫星-无人机组网认证方案
Pub Date : 2023-09-25 DOI: 10.1051/sands/2023030
Sheng Li, Jin Cao, Xiaoping Shi, Hui Li
One of the goals of the sixth generation mobile networks (6G) is to achieve a larger network coverage area. Satellite networks enable global coverage, and aerial nodes such as Unmanned Aerial Vehicle (UAV) can serve as a supplement to ground networks in remote environments. Therefore, 6G networks are gradually evolving towards a Space-Air-Ground integrated networks. The combination of UAV networks and satellite networks is a research hotspot in the field of Space-Air integrated networks. However, the combination of UAV networks and satellite networks currently faces many challenges in terms of security. The characteristics of large propagation delay and unstable communication links in satellite networks make them vulnerable to various attacks, including eavesdropping, tampering, and impersonation. Meanwhile, existing research on UAV networks mainly focuses on UAV-Ground networking authentication mechanisms, which are not suitable for resource-constrained nodes in the Space-Air integration scenario. Therefore, based on elliptic curve public key cryptography and Chebyshev polynomial, we propose a secure networking authentication scheme for satellite nodes and UAV nodes in the Space-Air integration scenario. The security analysis indicates that our scheme possesses the security attributes such as mutual authentication, key agreement, identity anonymity, unlinkability, perfect forward-backward security and resistance against various protocol attacks, among other security properties. Performance analysis also indicates certain advantages of our scheme over existing schemes in terms of signaling, bandwidth, and computational overhead.
第六代移动网络(6G)的目标之一是实现更大的网络覆盖面积。卫星网络实现全球覆盖,空中节点如无人机(UAV)可以作为远程环境中地面网络的补充。因此,6G网络正逐步向天空地一体化网络演进。无人机网络与卫星网络的结合是天空一体化网络领域的研究热点。然而,无人机网络与卫星网络的结合目前在安全方面面临着许多挑战。卫星网络具有传播时延大、通信链路不稳定等特点,容易受到窃听、篡改、冒充等多种攻击。同时,现有的无人机网络研究主要集中在UAV- ground组网认证机制上,不适合天空一体化场景下资源受限节点的认证。因此,基于椭圆曲线公钥加密和Chebyshev多项式,我们提出了一种天空融合场景下卫星节点和无人机节点的安全组网认证方案。安全性分析表明,该方案具有相互认证、密钥一致性、身份匿名性、不可链接性、完善的前向向后安全性和抗各种协议攻击等安全特性。性能分析还表明,我们的方案在信令、带宽和计算开销方面优于现有方案。
{"title":"Enabling Space-Air Integration: A Satellite-UAV Networking Authentication Scheme","authors":"Sheng Li, Jin Cao, Xiaoping Shi, Hui Li","doi":"10.1051/sands/2023030","DOIUrl":"https://doi.org/10.1051/sands/2023030","url":null,"abstract":"One of the goals of the sixth generation mobile networks (6G) is to achieve a larger network coverage area. Satellite networks enable global coverage, and aerial nodes such as Unmanned Aerial Vehicle (UAV) can serve as a supplement to ground networks in remote environments. Therefore, 6G networks are gradually evolving towards a Space-Air-Ground integrated networks. The combination of UAV networks and satellite networks is a research hotspot in the field of Space-Air integrated networks. However, the combination of UAV networks and satellite networks currently faces many challenges in terms of security. The characteristics of large propagation delay and unstable communication links in satellite networks make them vulnerable to various attacks, including eavesdropping, tampering, and impersonation. Meanwhile, existing research on UAV networks mainly focuses on UAV-Ground networking authentication mechanisms, which are not suitable for resource-constrained nodes in the Space-Air integration scenario. Therefore, based on elliptic curve public key cryptography and Chebyshev polynomial, we propose a secure networking authentication scheme for satellite nodes and UAV nodes in the Space-Air integration scenario. The security analysis indicates that our scheme possesses the security attributes such as mutual authentication, key agreement, identity anonymity, unlinkability, perfect forward-backward security and resistance against various protocol attacks, among other security properties. Performance analysis also indicates certain advantages of our scheme over existing schemes in terms of signaling, bandwidth, and computational overhead.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135769636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Cooperative Secure Control of Networked Multiple Unmanned Systems under FDI Attacks FDI攻击下网络化多无人系统的自适应协同安全控制
Pub Date : 2023-09-14 DOI: 10.1051/sands/2023029
Yanhui Zhang, Di Mei, Yong Xu, Lihua Dou
With the expanding applications of multiple unmanned systems in various fields, more and more research attention has been paid to their security. The aim is to enhance the anti-interference ability, ensure their reliability and stability, and better serve human society. This article conducts adaptive cooperative secure tracking consensus of networked multiple unmanned systems subjected to false data injection attacks. From a practical perspective, each unmanned system is modeled using high-order unknown nonlinear discrete-time systems. To reduce the communication bandwidth between agents, a quantizer-based codec mechanism is constructed. This quantizer uses a uniform logarithmic quantizer, combining the advantages of both quantizers. Because the transmission information attached with the false data can affect the accuracy of the decoder, a new adaptive law is added to the decoder to overcome this difficulty. A distributed controller is devised in the backstepping framework. Rigorous mathematical analysis shows that our proposed control algorithms ensure that all signals of the resultant systems remain bounded. Finally, simulation examples reveal the practical utility of the theoretical analysis.
随着多种无人系统在各个领域的应用不断扩大,其安全性问题越来越受到人们的关注。其目的是提高抗干扰能力,保证其可靠性和稳定性,更好地服务于人类社会。本文对受虚假数据注入攻击的网络化多无人系统进行了自适应协同安全跟踪共识。从实际应用的角度来看,每个无人系统都是用高阶未知非线性离散系统建模的。为了减少代理间的通信带宽,构造了一种基于量化器的编解码机制。该量化器使用均匀对数量化器,结合了两种量化器的优点。由于带有假数据的传输信息会影响解码器的精度,因此在解码器中加入了一种新的自适应律来克服这一困难。在回溯框架中设计了分布式控制器。严格的数学分析表明,我们所提出的控制算法保证了结果系统的所有信号保持有界。最后,通过仿真实例验证了理论分析的实用性。
{"title":"Adaptive Cooperative Secure Control of Networked Multiple Unmanned Systems under FDI Attacks","authors":"Yanhui Zhang, Di Mei, Yong Xu, Lihua Dou","doi":"10.1051/sands/2023029","DOIUrl":"https://doi.org/10.1051/sands/2023029","url":null,"abstract":"With the expanding applications of multiple unmanned systems in various fields, more and more research attention has been paid to their security. The aim is to enhance the anti-interference ability, ensure their reliability and stability, and better serve human society. This article conducts adaptive cooperative secure tracking consensus of networked multiple unmanned systems subjected to false data injection attacks. From a practical perspective, each unmanned system is modeled using high-order unknown nonlinear discrete-time systems. To reduce the communication bandwidth between agents, a quantizer-based codec mechanism is constructed. This quantizer uses a uniform logarithmic quantizer, combining the advantages of both quantizers. Because the transmission information attached with the false data can affect the accuracy of the decoder, a new adaptive law is added to the decoder to overcome this difficulty. A distributed controller is devised in the backstepping framework. Rigorous mathematical analysis shows that our proposed control algorithms ensure that all signals of the resultant systems remain bounded. Finally, simulation examples reveal the practical utility of the theoretical analysis.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135489864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal DoS Attack on Multi-Channel Cyber-Physical Systems: A Stackelberg Game Analysis 多通道网络物理系统的最优DoS攻击:一个Stackelberg博弈分析
Pub Date : 2023-09-11 DOI: 10.1051/sands/2023028
H. Zhang, Haoyu Shen, Zhuping Wang, Sheng Gao, Huaicheng Yan
In this commentary, optimal denial-of-service (DoS) attack strategies on multi-channel cyber-physical systems (CPSs) are considered, which focus on energy allocation on communication channels. For simplicity, a Stackelberg game between one defender and one attacker is constructed. Compared with the existing literature, which mainly pay attention to static equilibrium, the dynamic process of the game is also exhibited in this paper, which fills the gap in the demonstration of dynamic decision-making between both players of the game. In the solution of Stackelberg equilibrium, a self-adaptive particle swarm optimization (PSO) algorithm with Sigmoid-like update function is applied to cope with the nonlinearity of the reward function with faster convergence and wider adaptability. Besides, to acquire better performance of both sides to allocate energy, an online computation algorithm is proposed for dynamic Stackelberg game. Finally, numerical examples are provided to illustrate similarities between theoretic static equilibrium and optimal strategies obtained by Monte Carlo simulations.
本文研究了多通道网络物理系统(cps)的最优拒绝服务(DoS)攻击策略,该策略的重点是通信通道上的能量分配。为了简单起见,我们构造了一个防守者和攻击者之间的Stackelberg博弈。与现有文献主要关注静态均衡相比,本文还展示了博弈的动态过程,填补了博弈双方动态决策论证的空白。在Stackelberg均衡求解中,采用了一种具有sigmoid类更新函数的自适应粒子群优化算法(PSO)来解决奖励函数的非线性问题,具有更快的收敛速度和更广的适应性。此外,为了获得双方更好的能量分配性能,提出了一种动态Stackelberg博弈的在线计算算法。最后,通过数值算例说明了理论静态平衡与蒙特卡罗模拟得到的最优策略之间的相似性。
{"title":"Optimal DoS Attack on Multi-Channel Cyber-Physical Systems: A Stackelberg Game Analysis","authors":"H. Zhang, Haoyu Shen, Zhuping Wang, Sheng Gao, Huaicheng Yan","doi":"10.1051/sands/2023028","DOIUrl":"https://doi.org/10.1051/sands/2023028","url":null,"abstract":"In this commentary, optimal denial-of-service (DoS) attack strategies on multi-channel cyber-physical systems (CPSs) are considered, which focus on energy allocation on communication channels. For simplicity, a Stackelberg game between one defender and one attacker is constructed. Compared with the existing literature, which mainly pay attention to static equilibrium, the dynamic process of the game is also exhibited in this paper, which fills the gap in the demonstration of dynamic decision-making between both players of the game. In the solution of Stackelberg equilibrium, a self-adaptive particle swarm optimization (PSO) algorithm with Sigmoid-like update function is applied to cope with the nonlinearity of the reward function with faster convergence and wider adaptability. Besides, to acquire better performance of both sides to allocate energy, an online computation algorithm is proposed for dynamic Stackelberg game. Finally, numerical examples are provided to illustrate similarities between theoretic static equilibrium and optimal strategies obtained by Monte Carlo simulations.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91371254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematic Assessment of Cyber-Physical Security of Lane Keeping Control System for Autonomous Vehicles 自动驾驶汽车车道保持控制系统的网络物理安全系统评估
Pub Date : 2023-09-05 DOI: 10.1051/sands/2023027
Yulei Wang, An Huang, Fan Yang, Ning Bian, Jiazhi Zhang, Lulu Guo
In this article, a systematic assessment of cyber-physical security is proposed for the lane keeping control (LKC) system of autonomous vehicles, which, to our knowledge, has not been attempted before. The generalized methodology of impact analysis of typical cyber-attacks is developed, including novel evaluation metrics from the perspectives of safety and performance of the LKC system and innovative index-based resilience and security criteria. Specifically, we propose a security criterion in terms of tracking performance, comfort and vehicle stability, which are the most critical metrics to evaluate the safety and security of an LKC system. Hardware-in-the-Loop (HiL) experimental results show that the proposed evaluation metrics is effective to analyze the impact of the cyber-attacks on commercial LKC system of Dongfeng Motor comprehensively. The conclusions can serve as guidelines for attack detection, diagnosis, and countermeasures.
本文提出了一种针对自动驾驶车辆车道保持控制(LKC)系统的网络物理安全系统评估方法,据我们所知,这在之前还没有尝试过。开发了典型网络攻击影响分析的广义方法,包括从LKC系统的安全性和性能角度出发的新评估指标和创新的基于指数的弹性和安全标准。具体而言,我们提出了跟踪性能、舒适性和车辆稳定性方面的安全标准,这是评估LKC系统安全性和安全性的最关键指标。硬件在环(hardware -in- loop, HiL)实验结果表明,所提出的评估指标能够有效地全面分析网络攻击对东风汽车商用LKC系统的影响。这些结论可以作为攻击检测、诊断和对策的指导方针。
{"title":"Systematic Assessment of Cyber-Physical Security of Lane Keeping Control System for Autonomous Vehicles","authors":"Yulei Wang, An Huang, Fan Yang, Ning Bian, Jiazhi Zhang, Lulu Guo","doi":"10.1051/sands/2023027","DOIUrl":"https://doi.org/10.1051/sands/2023027","url":null,"abstract":"In this article, a systematic assessment of cyber-physical security is proposed for the lane keeping control (LKC) system of autonomous vehicles, which, to our knowledge, has not been attempted before. The generalized methodology of impact analysis of typical cyber-attacks is developed, including novel evaluation metrics from the perspectives of safety and performance of the LKC system and innovative index-based resilience and security criteria. Specifically, we propose a security criterion in terms of tracking performance, comfort and vehicle stability, which are the most critical metrics to evaluate the safety and security of an LKC system. Hardware-in-the-Loop (HiL) experimental results show that the proposed evaluation metrics is effective to analyze the impact of the cyber-attacks on commercial LKC system of Dongfeng Motor comprehensively. The conclusions can serve as guidelines for attack detection, diagnosis, and countermeasures.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74798010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The technology of radio frequency fingerprint identification based on deep learning for 5G application 5G应用中基于深度学习的射频指纹识别技术
Pub Date : 2023-09-05 DOI: 10.1051/sands/2023026
Hanhong Wang, Yun Lin, Haoran Zha
User Equipment (UE) authentication holds paramount importance in upholding the security of wireless networks. A nascent technology, Radio Frequency Fingerprint Identification (RFFI), is gaining prominence as a means to bolster network security authentication. To expedite the integration of RFFI within fifth generation (5G) networks, this research undertakes the creation of a comprehensive link-level simulation platform tailored for 5G scenarios. The devised platform emulates various device impairments, including oscillator, IQ modulator, and power amplifier (PA) nonlinearities, alongside simulating channel distortions. Consequent to this, a plausibility analysis is executed, intertwining transmitter device impairments with 3rd Generation Partnership Project (3GPP) new radio (NR) protocols. Subsequently, an exhaustive exploration is conducted to assess the impact of transmitter impairments, deep neural networks (DNNs), and channel effects on RF fingerprinting performance. Notably, under a signal-to-noise ratio (SNR) of 15dB, the deep learning approach demonstrates the capability to accurately classify 100 UEs with a commendable 91% accuracy rate. Through a multifaceted evaluation, it is ascertained that the Attention-based network architecture emerges as the optimal choice for the RFFI task, serving as the new benchmark model for RFFI applications.
用户设备(UE)认证对于维护无线网络的安全至关重要。射频指纹识别(RFFI)是一种新兴技术,作为加强网络安全认证的一种手段,它正日益受到重视。为了加快第五代(5G)网络中RFFI的集成,本研究承担了为5G场景量身定制的综合链路级仿真平台的创建。设计的平台模拟各种器件损伤,包括振荡器,IQ调制器和功率放大器(PA)非线性,以及模拟信道失真。在此基础上,进行了一项可行性分析,将发射机设备的缺陷与第三代合作伙伴计划(3GPP)新无线电(NR)协议交织在一起。随后,进行了详尽的探索,以评估发射机损伤、深度神经网络(dnn)和信道效应对射频指纹识别性能的影响。值得注意的是,在15dB的信噪比(SNR)下,深度学习方法能够准确地对100个ue进行分类,准确率高达91%。通过多方面的评估,确定了基于注意力的网络架构是RFFI任务的最佳选择,可以作为RFFI应用的新基准模型。
{"title":"The technology of radio frequency fingerprint identification based on deep learning for 5G application","authors":"Hanhong Wang, Yun Lin, Haoran Zha","doi":"10.1051/sands/2023026","DOIUrl":"https://doi.org/10.1051/sands/2023026","url":null,"abstract":"User Equipment (UE) authentication holds paramount importance in upholding the security of wireless networks. A nascent technology, Radio Frequency Fingerprint Identification (RFFI), is gaining prominence as a means to bolster network security authentication. To expedite the integration of RFFI within fifth generation (5G) networks, this research undertakes the creation of a comprehensive link-level simulation platform tailored for 5G scenarios. The devised platform emulates various device impairments, including oscillator, IQ modulator, and power amplifier (PA) nonlinearities, alongside simulating channel distortions. Consequent to this, a plausibility analysis is executed, intertwining transmitter device impairments with 3rd Generation Partnership Project (3GPP) new radio (NR) protocols. Subsequently, an exhaustive exploration is conducted to assess the impact of transmitter impairments, deep neural networks (DNNs), and channel effects on RF fingerprinting performance. Notably, under a signal-to-noise ratio (SNR) of 15dB, the deep learning approach demonstrates the capability to accurately classify 100 UEs with a commendable 91% accuracy rate. Through a multifaceted evaluation, it is ascertained that the Attention-based network architecture emerges as the optimal choice for the RFFI task, serving as the new benchmark model for RFFI applications.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77588839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topology-based Multi-jammer Localization in Wireless Networks 无线网络中基于拓扑的多干扰器定位
Pub Date : 2023-08-30 DOI: 10.1051/sands/2023025
Hongbo Liu, Yingying Chen, Wenyuan Xu, Zhenhua Liu, Yuchen Su
Jamming attacks and unintentional radio interference are one of the most urgent threats harming the dependability of wireless communication and endangering the successful deployment of pervasive applications built on top of wireless networks. Unlike the traditional approaches focusing on developing jamming defense techniques without considering the location of jammers, we take a different viewpoint that the jammers' position should be identified and exploited for building a wide range of defense strategies to alleviate jamming. In this paper, we address the problem of localizing multiple jamming attackers coexisting in wireless networks by leveraging the network topology changes caused by jamming. We systematically analyze the jamming effects and develop a framework that can partition network topology into clusters and can successfully estimate the positions of multiple jammers even when their jamming areas are overlapping. Our experiments on a multi-hop network setup using MicaZ sensor nodes validate the feasibility of real-time collection of network topology changes under jamming and our extensive simulation results demonstrate that our approach is highly effective in localizing multiple attackers with or without the prior knowledge of the order that the jammers are turned on.
干扰攻击和非故意无线电干扰是危害无线通信可靠性和危及基于无线网络的普及应用成功部署的最紧迫威胁之一。与传统方法侧重于开发干扰防御技术而不考虑干扰机的位置不同,我们采取了不同的观点,即应该识别和利用干扰机的位置来建立广泛的防御策略以减轻干扰。本文利用干扰引起的网络拓扑变化,解决了无线网络中共存的多个干扰攻击者的定位问题。我们系统地分析了干扰效应,并开发了一个框架,该框架可以将网络拓扑划分为簇,并且即使干扰区域重叠也可以成功地估计多个干扰器的位置。我们在使用MicaZ传感器节点的多跳网络设置上的实验验证了在干扰下实时收集网络拓扑变化的可行性,我们广泛的仿真结果表明,我们的方法在具有或不具有干扰器打开顺序的先验知识的情况下,在定位多个攻击者方面非常有效。
{"title":"Topology-based Multi-jammer Localization in Wireless Networks","authors":"Hongbo Liu, Yingying Chen, Wenyuan Xu, Zhenhua Liu, Yuchen Su","doi":"10.1051/sands/2023025","DOIUrl":"https://doi.org/10.1051/sands/2023025","url":null,"abstract":"Jamming attacks and unintentional radio interference are one of the most urgent threats harming the dependability of wireless communication and endangering the successful deployment of pervasive applications built on top of wireless networks. Unlike the traditional approaches focusing on developing jamming defense techniques without considering the location of jammers, we take a different viewpoint that the jammers' position should be identified and exploited for building a wide range of defense strategies to alleviate jamming. In this paper, we address the problem of localizing multiple jamming attackers coexisting in wireless networks by leveraging the network topology changes caused by jamming. We systematically analyze the jamming effects and develop a framework that can partition network topology into clusters and can successfully estimate the positions of multiple jammers even when their jamming areas are overlapping. Our experiments on a multi-hop network setup using MicaZ sensor nodes validate the feasibility of real-time collection of network topology changes under jamming and our extensive simulation results demonstrate that our approach is highly effective in localizing multiple attackers with or without the prior knowledge of the order that the jammers are turned on.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89747124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic event-triggered-based human-in-the-loop formation control for stochastic nonlinear MASs 随机非线性质量的动态事件触发人在环编队控制
Pub Date : 2023-08-23 DOI: 10.1051/sands/2023024
Yonghua Peng, Guohuai Lin, Guangdeng Chen, Hongyi Li
The dynamic event-triggered (DET) formation control problem of a class of stochastic nonlinear multi-agent systems (MASs) with full state constraints is investigated in this article. Supposing that the human operator sends commands to the leader as control input signals, all followers keep formation through network topology communication. Under the command-filter-based backstepping technique, the radial basis function neural networks (RBF NNs) and the barrier Lyapunov function (BLF) are utilized to resolve the problems of unknown nonlinear terms and full state constraints, respectively. Furthermore, a DET control mechanism is proposed to reduce the occupation of communication bandwidth. The presented distributed formation control strategy guarantees that all signals of the MASs are semi-globally uniformly ultimately bounded (SGUUB) in probability. Finally, the feasibility of the theoretical research result is demonstrated by a simulation example.
研究了一类具有全状态约束的随机非线性多智能体系统的动态事件触发(DET)编队控制问题。假设人类操作者向leader发送命令作为控制输入信号,所有follower通过网络拓扑通信保持队形。在基于命令滤波的反演技术下,分别利用径向基函数神经网络(RBF nn)和屏障李雅普诺夫函数(BLF)来解决未知非线性项和全状态约束问题。在此基础上,提出了一种DET控制机制,以减少对通信带宽的占用。所提出的分布式编队控制策略保证了群的所有信号在概率上是半全局一致最终有界的。最后,通过仿真算例验证了理论研究结果的可行性。
{"title":"Dynamic event-triggered-based human-in-the-loop formation control for stochastic nonlinear MASs","authors":"Yonghua Peng, Guohuai Lin, Guangdeng Chen, Hongyi Li","doi":"10.1051/sands/2023024","DOIUrl":"https://doi.org/10.1051/sands/2023024","url":null,"abstract":"The dynamic event-triggered (DET) formation control problem of a class of stochastic nonlinear multi-agent systems (MASs) with full state constraints is investigated in this article. Supposing that the human operator sends commands to the leader as control input signals, all followers keep formation through network topology communication. Under the command-filter-based backstepping technique, the radial basis function neural networks (RBF NNs) and the barrier Lyapunov function (BLF) are utilized to resolve the problems of unknown nonlinear terms and full state constraints, respectively. Furthermore, a DET control mechanism is proposed to reduce the occupation of communication bandwidth. The presented distributed formation control strategy guarantees that all signals of the MASs are semi-globally uniformly ultimately bounded (SGUUB) in probability. Finally, the feasibility of the theoretical research result is demonstrated by a simulation example.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79434416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-path exploration guided by taint and probability against evasive malware 基于污点和概率的多路径探索
Pub Date : 2023-08-14 DOI: 10.1051/sands/2023023
Weizhong Qiang, Fangzhou Xu, Wang Zhang, Hai Jin
Static analysis is often impeded by malware obfuscation techniques, such as encryption and packing, whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution information. Unfortunately, malware can employ evasive techniques to detect the analysis environment and alter its behavior accordingly. While known evasive techniques can be explicitly dismantled, the challenge lies in generically dismantling evasions without full knowledge, such as logic bombs that rely on uncertain conditions, let alone unsupported evasive techniques, which contain evasions without corresponding dismantling strategies and those leveraging unknown implementations. In this paper, we present Antitoxin, a prototype for automatically exploring evasive malware. Antitoxin utilizes multi-path exploration guided by taint analysis and probability calculations to effectively dismantle evasive techniques. The probabilities of branch execution are derived from dynamic coverage, while taint analysis helps identify paths associated with evasive techniques that rely on uncertain conditions. Subsequently, Antitoxin prioritizes branches with lower execution probabilities and those influenced by taint analysis for multi-path exploration. This is achieved through forced execution, which forcefully sets the outcomes of branches on selected paths. Additionally, Antitoxin employs active anti-evasion countermeasures to dismantle known evasive techniques, thereby reducing exploration overhead. Furthermore, Antitoxin provides valuable insights into sensitive behaviors, facilitating deeper manual analysis. Our experiments on a set of highly evasive samples demonstrate that Antitoxin can effectively dismantle evasive techniques in a generic manner. The probability calculations guide the multi-path exploration of evasions without requiring prior knowledge, enabling the dismantling of unsupported techniques such as C2 and significantly improving efficiency compared to linear exploration when dealing with complex control flows. Additionally, taint analysis can accurately identify branches related to logic bombs, facilitating preferential exploration.
静态分析经常受到恶意软件混淆技术(如加密和打包)的阻碍,而动态分析则倾向于通过利用具体的执行信息来抵抗混淆。不幸的是,恶意软件可以使用规避技术来检测分析环境并相应地改变其行为。虽然已知的规避技术可以明确地拆除,但挑战在于在没有完全知识的情况下一般拆除规避,例如依赖于不确定条件的逻辑炸弹,更不用说不受支持的规避技术,其中包含没有相应拆除策略的规避和利用未知实现的规避。在本文中,我们提出了一个自动探索规避恶意软件的原型——抗毒素。抗毒素利用多路径探索指导下的污染分析和概率计算,有效地拆除规避技术。分支执行的概率来自动态覆盖,而污染分析有助于识别与依赖于不确定条件的规避技术相关的路径。随后,抗毒素优先考虑执行概率较低的分支和受污染分析影响的分支进行多路径探索。这是通过强制执行实现的,强制将分支的结果设置在选定的路径上。此外,抗毒素还采用主动反规避措施来拆除已知的规避技术,从而减少勘探开销。此外,抗毒素为敏感行为提供了有价值的见解,促进了更深入的手工分析。我们在一组高度规避的样品上的实验表明,抗毒素可以有效地以通用的方式拆除规避技术。概率计算指导了逃避的多路径探索,而不需要先验知识,能够拆除不支持的技术,如C2,在处理复杂控制流时,与线性探索相比,显著提高了效率。此外,污点分析可以准确识别逻辑炸弹相关分支,便于优先探索。
{"title":"Multi-path exploration guided by taint and probability against evasive malware","authors":"Weizhong Qiang, Fangzhou Xu, Wang Zhang, Hai Jin","doi":"10.1051/sands/2023023","DOIUrl":"https://doi.org/10.1051/sands/2023023","url":null,"abstract":"Static analysis is often impeded by malware obfuscation techniques, such as encryption and packing, whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution information. Unfortunately, malware can employ evasive techniques to detect the analysis environment and alter its behavior accordingly. While known evasive techniques can be explicitly dismantled, the challenge lies in generically dismantling evasions without full knowledge, such as logic bombs that rely on uncertain conditions, let alone unsupported evasive techniques, which contain evasions without corresponding dismantling strategies and those leveraging unknown implementations. \u0000In this paper, we present Antitoxin, a prototype for automatically exploring evasive malware. Antitoxin utilizes multi-path exploration guided by taint analysis and probability calculations to effectively dismantle evasive techniques. The probabilities of branch execution are derived from dynamic coverage, while taint analysis helps identify paths associated with evasive techniques that rely on uncertain conditions. Subsequently, Antitoxin prioritizes branches with lower execution probabilities and those influenced by taint analysis for multi-path exploration. This is achieved through forced execution, which forcefully sets the outcomes of branches on selected paths. Additionally, Antitoxin employs active anti-evasion countermeasures to dismantle known evasive techniques, thereby reducing exploration overhead. Furthermore, Antitoxin provides valuable insights into sensitive behaviors, facilitating deeper manual analysis. \u0000Our experiments on a set of highly evasive samples demonstrate that Antitoxin can effectively dismantle evasive techniques in a generic manner. The probability calculations guide the multi-path exploration of evasions without requiring prior knowledge, enabling the dismantling of unsupported techniques such as C2 and significantly improving efficiency compared to linear exploration when dealing with complex control flows. Additionally, taint analysis can accurately identify branches related to logic bombs, facilitating preferential exploration.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77025335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Hospital security and safety management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1