首页 > 最新文献

Hospital security and safety management最新文献

英文 中文
Radio Frequency Fingerprint Identification for Internet of Things: A Survey 面向物联网的射频指纹识别技术综述
Pub Date : 2023-08-03 DOI: 10.1051/sands/2023022
Lingnan Xie, Linning Peng, Junqing Zhang, Aiqun Hu
Radio frequency fingerprint (RFF) identification is a promising technique for identifying Internet of Things (IoT) devices. This paper presents a comprehensive survey on RFF identification, which covers various aspects ranging from related definitions to details of each stage in the identification process, namely signal preprocessing, RFF feature extraction, further processing and RFF identification. Specifically, three main steps of preprocessing are summarized, including carrier frequency offset estimation, noise elimination and channel cancellation. Besides, three kinds of RFFs are categorized, comprising I/Q signal-based, parameter-based and transformation-based features. Meanwhile, feature fusion and feature dimension reduction are elaborated as two main further processing methods. Furthermore, a novel framework is established from the perspective of closed set and open set problems, and the related state-of-the-art methodologies are investigated, including approaches based on traditional machine learning, deep learning and generative models. Additionally, we highlight the challenges faced by RFF identification and point out future research trends in this field.
射频指纹(RFF)识别是一种很有前途的识别物联网(IoT)设备的技术。本文对RFF识别进行了全面的综述,从相关定义到识别过程中各个阶段的细节,即信号预处理、RFF特征提取、进一步处理和RFF识别。具体来说,总结了三个主要的预处理步骤:载波频偏估计、噪声消除和信道消除。并将rff分为基于I/Q信号的特征、基于参数的特征和基于变换的特征三种。同时阐述了特征融合和特征降维作为两种主要的进一步处理方法。此外,从闭集和开集问题的角度建立了一个新的框架,并研究了相关的最新方法,包括基于传统机器学习、深度学习和生成模型的方法。此外,我们强调了RFF识别面临的挑战,并指出了该领域未来的研究趋势。
{"title":"Radio Frequency Fingerprint Identification for Internet of Things: A Survey","authors":"Lingnan Xie, Linning Peng, Junqing Zhang, Aiqun Hu","doi":"10.1051/sands/2023022","DOIUrl":"https://doi.org/10.1051/sands/2023022","url":null,"abstract":"Radio frequency fingerprint (RFF) identification is a promising technique for identifying Internet of Things (IoT) devices. This paper presents a comprehensive survey on RFF identification, which covers various aspects ranging from related definitions to details of each stage in the identification process, namely signal preprocessing, RFF feature extraction, further processing and RFF identification. Specifically, three main steps of preprocessing are summarized, including carrier frequency offset estimation, noise elimination and channel cancellation. Besides, three kinds of RFFs are categorized, comprising I/Q signal-based, parameter-based and transformation-based features. Meanwhile, feature fusion and feature dimension reduction are elaborated as two main further processing methods. Furthermore, a novel framework is established from the perspective of closed set and open set problems, and the related state-of-the-art methodologies are investigated, including approaches based on traditional machine learning, deep learning and generative models. Additionally, we highlight the challenges faced by RFF identification and point out future research trends in this field.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"95 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80956490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing NextG Networks with Physical-Layer Key Generation: A Survey 使用物理层密钥生成保护下一代网络:综述
Pub Date : 2023-07-14 DOI: 10.1051/sands/2023021
Qingjiang Xiao, J. Zhao, Sheng Feng, Guyue Li, A. Hu
As the development of next-generation (NextG) communication networks continues, tremendous devices are accessing the network and the amount of information is exploding. However, with the increase of sensitive data that requires confidentiality to be transmitted and stored in the network, wireless network security risks are further amplified. Physical-layer key generation (PKG) has received extensive attention in security research due to its solid information-theoretic security proof, ease of implementation, and low cost. Nevertheless, the applications of PKG in the NextG networks are still in the preliminary exploration stage. Therefore, we survey existing research and discuss (1) the performance advantages of PKG compared to cryptography schemes, (2) the principles and processes of PKG, as well as research progresses in previous network environments, and (3) new application scenarios and development potential for PKG in NextG communication networks, particularly analyzing the effect and prospects of PKG in massive multiple-input multiple-output (MIMO), reconfigurable intelligent surfaces (RISs), artificial intelligence (AI) enabled networks, integrated space-air-ground network, and quantum communication. Moreover, we summarize open issues and provide new insights into the development trends of PKG in NextG networks.
随着下一代通信网络(nexg)的发展,接入网络的设备越来越多,信息量也在爆炸式增长。然而,随着需要保密传输和存储在网络中的敏感数据的增加,无线网络的安全风险进一步放大。物理层密钥生成(physical layer key generation, PKG)以其可靠的信息论安全性证明、易于实现和成本低等优点在安全研究中受到了广泛的关注。然而,PKG在NextG网络中的应用仍处于初步探索阶段。因此,我们对现有的研究进行了综述,并讨论了(1)PKG相对于加密方案的性能优势;(2)PKG的原理和过程,以及在以往网络环境下的研究进展;(3)PKG在NextG通信网络中的新应用场景和发展潜力,特别是分析了PKG在大规模多输入多输出(MIMO)、可重构智能表面(RISs)、人工智能(AI)网络、综合空-地网络和量子通信。此外,我们还总结了存在的问题,并对PKG在NextG网络中的发展趋势提供了新的见解。
{"title":"Securing NextG Networks with Physical-Layer Key Generation: A Survey","authors":"Qingjiang Xiao, J. Zhao, Sheng Feng, Guyue Li, A. Hu","doi":"10.1051/sands/2023021","DOIUrl":"https://doi.org/10.1051/sands/2023021","url":null,"abstract":"As the development of next-generation (NextG) communication networks continues, tremendous devices are accessing the network and the amount of information is exploding. However, with the increase of sensitive data that requires confidentiality to be transmitted and stored in the network, wireless network security risks are further amplified. Physical-layer key generation (PKG) has received extensive attention in security research due to its solid information-theoretic security proof, ease of implementation, and low cost. Nevertheless, the applications of PKG in the NextG networks are still in the preliminary exploration stage. Therefore, we survey existing research and discuss (1) the performance advantages of PKG compared to cryptography schemes, (2) the principles and processes of PKG, as well as research progresses in previous network environments, and (3) new application scenarios and development potential for PKG in NextG communication networks, particularly analyzing the effect and prospects of PKG in massive multiple-input multiple-output (MIMO), reconfigurable intelligent surfaces (RISs), artificial intelligence (AI) enabled networks, integrated space-air-ground network, and quantum communication. Moreover, we summarize open issues and provide new insights into the development trends of PKG in NextG networks.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"82 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83547877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Event-Triggered Resilient Consensus Control of Multiple Unmanned Systems Against Periodic DoS Attacks Based on State Predictor 基于状态预测器的多无人系统周期性DoS攻击事件触发弹性共识控制
Pub Date : 2023-06-29 DOI: 10.1051/sands/2023017
You-min Zhang, Haichuan Yang, Ziquan Yu
This paper develops an event-triggered resilient consensus control method for the nonlinear multiple unmanned systems with a data-based autoregressive integrated moving average (ARIMA) agent state prediction mechanism against periodic denial-of-service (DoS) attacks. The state predictor is used to predict the state of neighbor agents during periodic DoS attacks and maintain consistent control of multiple unmanned systems under DoS attacks. Considering the existing prediction error between the actual state and the predicted state, the estimated error is regarded as the uncertainty system disturbance, which is dealt with by the designed disturbance observer. The estimated result is used in the design of the consistent controller to compensate for the system uncertainty error term. Furthermore, this paper investigates dynamic event-triggered consensus controllers to improve resilience and consensus under periodic DoS attacks and reduce the frequency of actuator output changes. It is proved that the Zeno behavior can be excluded. Finally, the resilience and consensus capability of the proposed controller and the superiority of introducing a state predictor are demonstrated through numerical simulations.
基于基于数据的自回归综合移动平均(ARIMA)智能体状态预测机制,提出了一种针对周期性拒绝服务攻击的非线性多无人系统事件触发弹性共识控制方法。状态预测器用于在周期性DoS攻击时预测相邻agent的状态,以保持多个无人系统在DoS攻击下的一致性控制。考虑到实际状态与预测状态之间存在的预测误差,将估计误差视为不确定性系统扰动,由所设计的扰动观测器进行处理。将估计结果用于一致性控制器的设计,以补偿系统的不确定性误差项。此外,本文还研究了动态事件触发一致性控制器,以提高周期性DoS攻击下的弹性和一致性,并降低执行器输出变化的频率。证明了可以排除芝诺行为。最后,通过数值仿真验证了所提控制器的弹性和一致性能力,以及引入状态预测器的优越性。
{"title":"Event-Triggered Resilient Consensus Control of Multiple Unmanned Systems Against Periodic DoS Attacks Based on State Predictor","authors":"You-min Zhang, Haichuan Yang, Ziquan Yu","doi":"10.1051/sands/2023017","DOIUrl":"https://doi.org/10.1051/sands/2023017","url":null,"abstract":"This paper develops an event-triggered resilient consensus control method for the nonlinear multiple unmanned systems with a data-based autoregressive integrated moving average (ARIMA) agent state prediction mechanism against periodic denial-of-service (DoS) attacks. The state predictor is used to predict the state of neighbor agents during periodic DoS attacks and maintain consistent control of multiple unmanned systems under DoS attacks. Considering the existing prediction error between the actual state and the predicted state, the estimated error is regarded as the uncertainty system disturbance, which is dealt with by the designed disturbance observer. The estimated result is used in the design of the consistent controller to compensate for the system uncertainty error term. Furthermore, this paper investigates dynamic event-triggered consensus controllers to improve resilience and consensus under periodic DoS attacks and reduce the frequency of actuator output changes. It is proved that the Zeno behavior can be excluded. Finally, the resilience and consensus capability of the proposed controller and the superiority of introducing a state predictor are demonstrated through numerical simulations.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82150862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Motion Control of Micro-Spacecraft Using Semi-Homomorphic Encryption 基于半同态加密的微型航天器安全运动控制
Pub Date : 2023-06-29 DOI: 10.1051/sands/2023018
Q. Hu, Yongxia Shi, Ehsan Nekouei
This paper studies the secure motion control problem for micro-spacecraft systems. A novel semi-homomorphic encrypted control framework, consisting of a logarithmic quantizer, two uniform quantizers, and an encrypted control law based on the Paillier cryptosystem is developed. More specifically, a logarithmic quantizer is adopted as a digitizer to convert the continuous relative motion information to digital signals. Two uniform quantizers with different quantization sensitivities are designed to encode the control gain matrix and digitized motion information to integer values. Then, we develop an encrypted state-feedback control law based on the Paillier cryptosystem, which allows the controller to compute the control input using only encrypted data. Using the Lyapunov stability theory and the homomorphic property of the Paillier cryptosystem, we prove that all signals in the closed-loop system are uniformly ultimately bounded. Different from the traditional motion control laws of spacecraft, the proposed encrypted control framework ensures the security of the exchanged data over the communication network of the spacecraft, even when communication channels are eavesdropped by malicious adversaries. Finally, we verify the effectiveness of the proposed encrypted control framework using numerical simulations.
研究了微型航天器系统的安全运动控制问题。提出了一种基于Paillier密码系统的半同态加密控制框架,该框架由一个对数量化器、两个均匀量化器和一个加密控制律组成。更具体地说,采用对数量化器作为数字化器,将连续的相对运动信息转换为数字信号。设计了两个具有不同量化灵敏度的均匀量化器,将控制增益矩阵和数字化运动信息编码为整数值。然后,我们开发了一种基于Paillier密码系统的加密状态反馈控制律,该律允许控制器仅使用加密数据来计算控制输入。利用Lyapunov稳定性理论和Paillier密码系统的同态性质,证明了闭环系统中的所有信号是一致最终有界的。与传统航天器运动控制规律不同,所提出的加密控制框架能够保证航天器通信网络中交换数据的安全性,即使通信通道被恶意攻击者窃听。最后,通过数值仿真验证了所提出的加密控制框架的有效性。
{"title":"Secure Motion Control of Micro-Spacecraft Using Semi-Homomorphic Encryption","authors":"Q. Hu, Yongxia Shi, Ehsan Nekouei","doi":"10.1051/sands/2023018","DOIUrl":"https://doi.org/10.1051/sands/2023018","url":null,"abstract":"This paper studies the secure motion control problem for micro-spacecraft systems. A novel semi-homomorphic encrypted control framework, consisting of a logarithmic quantizer, two uniform quantizers, and an encrypted control law based on the Paillier cryptosystem is developed. \u0000 More specifically, a logarithmic quantizer is adopted as a digitizer to convert the continuous relative motion information to digital signals. Two uniform quantizers with different quantization sensitivities are designed to encode the control gain matrix and digitized motion information to integer values. Then, we develop an encrypted state-feedback control law based on the Paillier cryptosystem, which allows the controller to compute the control input using only encrypted data. Using the Lyapunov stability theory and the homomorphic property of the Paillier cryptosystem, we prove that all signals in the closed-loop system are uniformly ultimately bounded. Different from the traditional motion control laws of spacecraft, the proposed encrypted control framework ensures the security of the exchanged data over the communication network of the spacecraft, even when communication channels are eavesdropped by malicious adversaries. Finally, we verify the effectiveness of the proposed encrypted control framework using numerical simulations.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83195906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploration of Transferable Deep Learning-Aided Radio Frequency Fingerprint Identification Systems 可转移深度学习辅助射频指纹识别系统的探索
Pub Date : 2023-06-29 DOI: 10.1051/sands/2023019
Junqing Zhang, Guanxiong Shen
Radio frequency fingerprint identification (RFFI) shows great potential as a means for authenticating wireless devices. As RFFI can be addressed as a classification problem, deep learning techniques are widely utilized in modern RFFI systems for their outstanding performance. RFFI is suitable for securing the legacy existing Internet of Things (IoT) networks since it does not require any modifications to the existing end-node hardware and communication protocols. However, most deep learning-based RFFI systems require the collection of a great number of labelled signals for training, which is time-consuming and not ideal, especially for the IoT end nodes that are already deployed and configured with long transmission intervals. Moreover, the long time required to train a neural network from scratch also limits rapid deployment on legacy IoT networks. To address the above issues, two transferable RFFI protocols are proposed in this paper leveraging the concept of transfer learning. More specifically, they rely on fine-tuning and distance metric learning, respectively, and only require only a small amount of signals from the legacy IoT network. As the dataset used for transfer is small, we propose to apply augmentation in the transfer process to generate more training signals to improve performance. A LoRa-RFFI testbed consisting of 40 commercial-off-the-shelf (COTS) LoRa IoT devices and a software-defined radio (SDR) receiver is built to experimentally evaluate the proposed approaches. The experimental results demonstrate that both the fine-tuning and distance metric learning-based RFFI approaches can be rapidly transferred to another IoT network with less than ten signals from each LoRa device. The classification accuracy is over 90%, and the augmentation technique can improve the accuracy by up to 20%.
射频指纹识别(RFFI)作为一种验证无线设备的手段显示出巨大的潜力。由于RFFI可以作为一个分类问题来解决,深度学习技术因其优异的性能被广泛应用于现代RFFI系统中。RFFI适用于保护现有的传统物联网(IoT)网络,因为它不需要对现有的终端节点硬件和通信协议进行任何修改。然而,大多数基于深度学习的RFFI系统需要收集大量标记信号进行训练,这既耗时又不理想,特别是对于已经部署并配置了较长传输间隔的物联网终端节点。此外,从头开始训练神经网络所需的长时间也限制了在传统物联网网络上的快速部署。为了解决上述问题,本文利用迁移学习的概念提出了两个可转移的RFFI协议。更具体地说,它们分别依赖于微调和距离度量学习,并且只需要来自传统物联网网络的少量信号。由于用于传输的数据集较小,我们建议在传输过程中应用增强来产生更多的训练信号以提高性能。建立了一个由40个商用现货(COTS) LoRa物联网设备和一个软件定义无线电(SDR)接收器组成的LoRa- rffi测试平台,以实验评估所提出的方法。实验结果表明,微调和基于距离度量学习的RFFI方法都可以快速转移到另一个物联网网络,每个LoRa设备的信号少于10个。分类准确率在90%以上,增强技术可使分类准确率提高20%以上。
{"title":"Exploration of Transferable Deep Learning-Aided Radio Frequency Fingerprint Identification Systems","authors":"Junqing Zhang, Guanxiong Shen","doi":"10.1051/sands/2023019","DOIUrl":"https://doi.org/10.1051/sands/2023019","url":null,"abstract":"Radio frequency fingerprint identification (RFFI) shows great potential as a means for authenticating wireless devices. As RFFI can be addressed as a classification problem, deep learning techniques are widely utilized in modern RFFI systems for their outstanding performance. RFFI is suitable for securing the legacy existing Internet of Things (IoT) networks since it does not require any modifications to the existing end-node hardware and communication protocols. However, most deep learning-based RFFI systems require the collection of a great number of labelled signals for training, which is time-consuming and not ideal, especially for the IoT end nodes that are already deployed and configured with long transmission intervals. Moreover, the long time required to train a neural network from scratch also limits rapid deployment on legacy IoT networks. To address the above issues, two transferable RFFI protocols are proposed in this paper leveraging the concept of transfer learning. More specifically, they rely on fine-tuning and distance metric learning, respectively, and only require only a small amount of signals from the legacy IoT network. As the dataset used for transfer is small, we propose to apply augmentation in the transfer process to generate more training signals to improve performance. A LoRa-RFFI testbed consisting of 40 commercial-off-the-shelf (COTS) LoRa IoT devices and a software-defined radio (SDR) receiver is built to experimentally evaluate the proposed approaches. The experimental results demonstrate that both the fine-tuning and distance metric learning-based RFFI approaches can be rapidly transferred to another IoT network with less than ten signals from each LoRa device. The classification accuracy is over 90%, and the augmentation technique can improve the accuracy by up to 20%.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80334030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safety Flight Envelope Calculation and Protection Control of UAV Based on Disturbance Observer 基于扰动观测器的无人机安全飞行包线计算与保护控制
Pub Date : 2023-06-29 DOI: 10.1051/sands/2023020
Biao Ma, Mou Chen
In this paper, an attainable-equilibrium-set-based safety flight envelope (SFE) calculation method and a prescribed-performance-control-based SFE protection scheme are proposed for the attitude dynamic of a unmanned air vehicle (UAV) in the presence of external disturbances. To estimate the unknown external disturbances and their derivatives, a higher order disturbance observer (HODO) is developed. The definition and calculation of the SFE based on attainable equilibrium set (AES) under disturbances are studied. A safety desired trajectory based on the time-varying safety margin function and the first-order filter is developed to ensure the flight safety of UAV. A SFE protection controller is proposed based on the safety desired trajectory, backstepping method, HODO, and prescribed performance (PP) control technique. The stability of the closed-loop system is proved by the Lyapunov function method and the effectiveness of the SFE protection control law is verified by simulation.
针对存在外部干扰的无人机姿态动力学问题,提出了一种基于可达平衡集的安全飞行包线(SFE)计算方法和基于规定性能控制的安全飞行包线保护方案。为了估计未知外部扰动及其导数,提出了一种高阶扰动观测器(HODO)。研究了扰动下基于可达平衡集的稳态稳态方程的定义和计算。为了保证无人机的飞行安全,提出了一种基于时变安全裕度函数和一阶滤波器的安全期望轨迹。提出了一种基于安全期望轨迹、后退法、HODO和规定性能(PP)控制技术的SFE保护控制器。利用Lyapunov函数法证明了闭环系统的稳定性,并通过仿真验证了SFE保护控制律的有效性。
{"title":"Safety Flight Envelope Calculation and Protection Control of UAV Based on Disturbance Observer","authors":"Biao Ma, Mou Chen","doi":"10.1051/sands/2023020","DOIUrl":"https://doi.org/10.1051/sands/2023020","url":null,"abstract":"In this paper, an attainable-equilibrium-set-based safety flight envelope (SFE) calculation method and a prescribed-performance-control-based SFE protection scheme are proposed for the attitude dynamic of a unmanned air vehicle (UAV) in the presence of external disturbances. To estimate the unknown external disturbances and their derivatives, a higher order disturbance observer (HODO) is developed. The definition and calculation of the SFE based on attainable equilibrium set (AES) under disturbances are studied. A safety desired trajectory based on the time-varying safety margin function and the first-order filter is developed to ensure the flight safety of UAV. A SFE protection controller is proposed based on the safety desired trajectory, backstepping method, HODO, and prescribed performance (PP) control technique. The stability of the closed-loop system is proved by the Lyapunov function method and the effectiveness of the SFE protection control law is verified by simulation.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86928515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Communication Security of Autonomous Ground Vehicles Based on Networked Control Systems: The Optimized LMI Approach 基于网络化控制系统的自主地面车辆通信安全:优化LMI方法
Pub Date : 2023-06-20 DOI: 10.1051/sands/2023016
Kaibo Shi, Xiao Cai, Kun She, S. Zhong, Shixian Wen, Yuanlun Xie
This study focuses on the networked control systems (NCSs) under Denial of Service (DoS) attacks with periodicity and attack intensity. A DoS attack with attack strength is studied, which has important research significance for establishing a suitable defense mechanism. First, the construction of appropriate Lyapunov-Krasovskii functionals (LKFs) can reduce the constraints of the basic conditions and help lower the criterion's conservatism. Then, the selection problem of the trigger threshold is transformed into an optimization problem with constraints, and the gradient descent algorithm (GDA) is used to select the trigger threshold to save sampling resources better. Next, an intelligent event-triggered controller (IETC) is designed to ensure the safe operation of the system under DoS attacks. Finally, the correctness of the method is verified through the experiment of the autonomous ground vehicle (AGV) system based on the Simulink platform.
研究了具有周期性和攻击强度的网络控制系统在DoS攻击下的性能。研究了一种具有攻击强度的DoS攻击,这对于建立合适的防御机制具有重要的研究意义。首先,适当的Lyapunov-Krasovskii泛函(LKFs)的构造可以减少基本条件的约束,降低准则的保守性。然后,将触发阈值的选择问题转化为带约束的优化问题,利用梯度下降算法(GDA)选择触发阈值,以更好地节省采样资源;其次,设计了智能事件触发控制器(intelligent event-triggered controller, IETC),保证系统在DoS攻击下的安全运行。最后,通过基于Simulink平台的自主地面车辆(AGV)系统的实验验证了该方法的正确性。
{"title":"Communication Security of Autonomous Ground Vehicles Based on Networked Control Systems: The Optimized LMI Approach","authors":"Kaibo Shi, Xiao Cai, Kun She, S. Zhong, Shixian Wen, Yuanlun Xie","doi":"10.1051/sands/2023016","DOIUrl":"https://doi.org/10.1051/sands/2023016","url":null,"abstract":"This study focuses on the networked control systems (NCSs) under Denial of Service (DoS) attacks with periodicity and attack intensity. A DoS attack with attack strength is studied, which has important research significance for establishing a suitable defense mechanism. First, the construction of appropriate Lyapunov-Krasovskii functionals (LKFs) can reduce the constraints of the basic conditions and help lower the criterion's conservatism. Then, the selection problem of the trigger threshold is transformed into an optimization problem with constraints, and the gradient descent algorithm (GDA) is used to select the trigger threshold to save sampling resources better. Next, an intelligent event-triggered controller (IETC) is designed to ensure the safe operation of the system under DoS attacks. Finally, the correctness of the method is verified through the experiment of the autonomous ground vehicle (AGV) system based on the Simulink platform.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"55 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74708694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Preface: Security and Safety in the “Metaverse” 前言:“虚拟世界”中的安全与保障
Pub Date : 2023-05-15 DOI: 10.1051/sands/2023014
Shiya Liu, Hong Zou, Xing Zhao, Chunhui Wang, Yang Fan
In recent years, as the flow dividend peaking and supervision tend to be rigorous due to industrial monopolization, mobile internet has suffered from a development bottleneck at the top. Liu illustrates this issue in her article and gives a general overview of the security issues of the metaverse [1]. As she says, the essence of mobile internet is platform economy. Such “movement of enclosures” based on the user resource reaches the top with the advent of the mobile terminal era and also steps into the dilemma with the enhancement of closure and monopoly, it is more urgent to transform new development pattern. As a new generation of information technology becomes clear in the development path, the “Metaverse” concept based on composite new information technology has been proposed and is highly concerned. Such a new model with the attribute of “being owned by users” and “decentralization” complies with the underlying demands of industry breakthrough and becomes the next generation of network solutions which is put into practice by more and more leading companies. However, the “Metaverse” develops at the initial phase, because the technology ecology, business ecology, and public cognition are not perfect, and confront multi-dimensional and coupled safety issues. We hereby have organized the “Metaverse security” topic in the Security and Safety (S&S) for such an emerging and hot field, covering the contribution of seven groups of research personnel in every field. We have been devoted to covering the safety issue of “Metaverse” from the perspective of construction, operation, recognition, etc., providing the corresponding solution and offering wisdom and direction for its steady development. The “Metaverse” needs to be achieved by compounding various technologies, including Virtual Reality, Artificial Intelligence, Cloud computing, Blockchain, etc., so, it is necessary to construct lots of infrastructure facilities accordingly to support its operation. In this topic, there is a review from Li et al. [2], which expounds on the main components of “Metaverse” infrastructure facilities and systematically summarizes the inherent security risks in “Metaverse” infrastructure facilities. Then Li et al., guided by the system security technology philosophy, propose to construct the safety defense system of “Metaverse” in terms of computing, cloud, network, digital assets, terminal, etc. from different perspectives, which lays a solid foundation for coping with “Metaverse” security risk and challenges. Except for the support of infrastructure facilities, the generalized function security issue, including functional safety and network safety exists in the operation of “Metaverse”. The traditional system reliability technology and network defense technology cannot provide the quantifiable design implementation theory and method. The operating system as the footstone of the software system needs an efficient security guarantee. Here is an article from Song et al.
近年来,随着流量红利达到峰值,行业垄断导致监管趋严,移动互联网在顶层遭遇发展瓶颈。Liu在她的文章中阐述了这个问题,并概述了元空间的安全问题[1]。正如她所说,移动互联网的本质是平台经济。这种基于用户资源的“圈地运动”随着移动终端时代的到来而达到顶峰,也随着封闭性和垄断性的增强而步入困境,转变新的发展模式更为迫切。随着新一代信息技术发展路径的明晰,基于复合新信息技术的“元宇宙”概念被提出并备受关注。这种具有“由用户所有”和“去中心化”属性的新模式符合行业突破的潜在需求,成为被越来越多的领先企业付诸实践的下一代网络解决方案。然而,“元宇宙”在发展初期,由于技术生态、商业生态、公众认知不完善,面临多维度、耦合性的安全问题。针对安全与安全(S&S)这一新兴而热门的领域,我们在此组织了“元宇宙安全”主题,涵盖了各个领域七组研究人员的贡献。我们一直致力于从建设、运营、认可等角度报道“元宇宙”的安全问题,提供相应的解决方案,为其稳步发展提供智慧和方向。“虚拟世界”需要通过虚拟现实、人工智能、云计算、区块链等多种技术的结合来实现,因此需要相应地建设大量的基础设施来支持其运行。在本课题中,Li等人[2]对“元域”基础设施的主要组成部分进行了阐述,系统总结了“元域”基础设施固有的安全风险。随后,Li等人以系统安全技术理念为指导,从计算、云、网络、数字资产、终端等不同角度提出构建“元宇宙”安全防御体系,为应对“元宇宙”安全风险与挑战奠定了坚实的基础。除了基础设施的支持外,“元宇宙”的运行还存在广义的功能安全问题,包括功能安全和网络安全。传统的系统可靠性技术和网络防御技术无法提供可量化的设计实现理论和方法。操作系统作为软件系统的基石,需要一个高效的安全保障。这里是Song等人[3]的一篇文章,介绍了以多内核操作系统为载体的os级DHR架构。多内核操作系统采用内核
{"title":"Preface: Security and Safety in the “Metaverse”","authors":"Shiya Liu, Hong Zou, Xing Zhao, Chunhui Wang, Yang Fan","doi":"10.1051/sands/2023014","DOIUrl":"https://doi.org/10.1051/sands/2023014","url":null,"abstract":"In recent years, as the flow dividend peaking and supervision tend to be rigorous due to industrial monopolization, mobile internet has suffered from a development bottleneck at the top. Liu illustrates this issue in her article and gives a general overview of the security issues of the metaverse [1]. As she says, the essence of mobile internet is platform economy. Such “movement of enclosures” based on the user resource reaches the top with the advent of the mobile terminal era and also steps into the dilemma with the enhancement of closure and monopoly, it is more urgent to transform new development pattern. As a new generation of information technology becomes clear in the development path, the “Metaverse” concept based on composite new information technology has been proposed and is highly concerned. Such a new model with the attribute of “being owned by users” and “decentralization” complies with the underlying demands of industry breakthrough and becomes the next generation of network solutions which is put into practice by more and more leading companies. However, the “Metaverse” develops at the initial phase, because the technology ecology, business ecology, and public cognition are not perfect, and confront multi-dimensional and coupled safety issues. We hereby have organized the “Metaverse security” topic in the Security and Safety (S&S) for such an emerging and hot field, covering the contribution of seven groups of research personnel in every field. We have been devoted to covering the safety issue of “Metaverse” from the perspective of construction, operation, recognition, etc., providing the corresponding solution and offering wisdom and direction for its steady development. The “Metaverse” needs to be achieved by compounding various technologies, including Virtual Reality, Artificial Intelligence, Cloud computing, Blockchain, etc., so, it is necessary to construct lots of infrastructure facilities accordingly to support its operation. In this topic, there is a review from Li et al. [2], which expounds on the main components of “Metaverse” infrastructure facilities and systematically summarizes the inherent security risks in “Metaverse” infrastructure facilities. Then Li et al., guided by the system security technology philosophy, propose to construct the safety defense system of “Metaverse” in terms of computing, cloud, network, digital assets, terminal, etc. from different perspectives, which lays a solid foundation for coping with “Metaverse” security risk and challenges. Except for the support of infrastructure facilities, the generalized function security issue, including functional safety and network safety exists in the operation of “Metaverse”. The traditional system reliability technology and network defense technology cannot provide the quantifiable design implementation theory and method. The operating system as the footstone of the software system needs an efficient security guarantee. Here is an article from Song et al.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78906619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multikernel: Operating System Solution to Generalized Functional Safety 多内核:通用功能安全的操作系统解决方案
Pub Date : 2023-05-15 DOI: 10.1051/sands/2023007
Yi Song, Huasheng Dai, Jinhu Jiang, Weihua Zhang
With the trend of digitalization, intelligence, and networking sweeping the world, functional safety and cyber security are increasingly intertwined and overlapped, evolving into the issue of generalized functional safety. Traditional system reliability technology and network defense technology cannot provide quantifiable design implementation theories and methods. As the cornerstone of software systems, operating systems in particular are in need of efficient safety assurance. The DHR architecture is a mature and comprehensive solution, and it is necessary to implement an OS-level DHR architecture, for which the multi-kernel operating system is a good carrier. The multi-kernel operating system takes the kernel as the processing scenario element and constructs redundancy, heterogeneity, and dynamism on the kernel, so it has the generalized robustness of the DHR architecture. This article analyzes the significance and requirements of OS-level DHR architecture, and systematically explains how the multi-kernel operating system responds to the requirements of OS-level DHR architecture by analyzing the technical routes of multi-kernel operating systems and develops an operating system solution idea for the generalized functionally safety.
随着数字化、智能化、网络化的趋势席卷全球,功能安全与网络安全日益交织、重叠,演变为广义功能安全问题。传统的系统可靠性技术和网络防御技术无法提供可量化的设计实现理论和方法。操作系统作为软件系统的基石,尤其需要有效的安全保障。DHR体系结构是一种成熟、全面的解决方案,需要实现os级DHR体系结构,而多内核操作系统是实现DHR体系结构的良好载体。多内核操作系统以内核为处理场景元素,在内核上构建冗余性、异构性和动态性,具有DHR体系结构的广义鲁棒性。本文分析了操作系统级DHR体系结构的意义和要求,通过分析多内核操作系统的技术路线,系统地阐述了多内核操作系统如何响应操作系统级DHR体系结构的要求,并提出了广义功能安全的操作系统解决思路。
{"title":"Multikernel: Operating System Solution to Generalized Functional Safety","authors":"Yi Song, Huasheng Dai, Jinhu Jiang, Weihua Zhang","doi":"10.1051/sands/2023007","DOIUrl":"https://doi.org/10.1051/sands/2023007","url":null,"abstract":"With the trend of digitalization, intelligence, and networking sweeping the world, functional safety and cyber security are increasingly intertwined and overlapped, evolving into the issue of generalized functional safety. Traditional system reliability technology and network defense technology cannot provide quantifiable design implementation theories and methods. As the cornerstone of software systems, operating systems in particular are in need of efficient safety assurance. The DHR architecture is a mature and comprehensive solution, and it is necessary to implement an OS-level DHR architecture, for which the multi-kernel operating system is a good carrier. The multi-kernel operating system takes the kernel as the processing scenario element and constructs redundancy, heterogeneity, and dynamism on the kernel, so it has the generalized robustness of the DHR architecture. This article analyzes the significance and requirements of OS-level DHR architecture, and systematically explains how the multi-kernel operating system responds to the requirements of OS-level DHR architecture by analyzing the technical routes of multi-kernel operating systems and develops an operating system solution idea for the generalized functionally safety.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86018394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MPHM: Model Poisoning Attacks on Federal Learning Using Historical Information Momentum MPHM:利用历史信息动量对联邦学习的模型中毒攻击
Pub Date : 2023-05-15 DOI: 10.1051/sands/2023006
Lei Shi, Zhen Chen, Yucheng Shi, Lin Wei, Yongcai Tao, Mengyang He, Qingxian Wang, Yuan Zhou, Yufei Gao
.
{"title":"MPHM: Model Poisoning Attacks on Federal Learning Using Historical Information Momentum","authors":"Lei Shi, Zhen Chen, Yucheng Shi, Lin Wei, Yongcai Tao, Mengyang He, Qingxian Wang, Yuan Zhou, Yufei Gao","doi":"10.1051/sands/2023006","DOIUrl":"https://doi.org/10.1051/sands/2023006","url":null,"abstract":".","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89254169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Hospital security and safety management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1