首页 > 最新文献

Hospital security and safety management最新文献

英文 中文
Protection Architecture of Endogenous Safety and Security for Industrial Control Systems 工业控制系统内生性安全防护体系结构研究
Pub Date : 2023-03-14 DOI: 10.1051/sands/2023001
Yaozhong Xin
According to the essential characteristic of industrial control system (ICS), the endogenous safety and security (ESS) can be achieved by merging cyber security (CS) into functional safety (FS), the basic principles and functional requirements as well as protection architecture (TEMt) of ESS are proposed, the successful experience of electric power control system is introduced.
根据工业控制系统(ICS)的本质特点,将网络安全(CS)与功能安全(FS)相融合,实现了工业控制系统的内生性安全与保障(ESS),提出了工业控制系统内生性安全与保障(ESS)的基本原理、功能要求和保护体系结构(TEMt),介绍了电力控制系统的成功经验。
{"title":"Protection Architecture of Endogenous Safety and Security for Industrial Control Systems","authors":"Yaozhong Xin","doi":"10.1051/sands/2023001","DOIUrl":"https://doi.org/10.1051/sands/2023001","url":null,"abstract":"According to the essential characteristic of industrial control system (ICS), the endogenous safety and security (ESS) can be achieved by merging cyber security (CS) into functional safety (FS), the basic principles and functional requirements as well as protection architecture (TEMt) of ESS are proposed, the successful experience of electric power control system is introduced.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"135 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79500138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on Security Issues and Solutions for Precision Health in Internet-of-Medical-Things Systems 医疗物联网系统中精准健康安全问题及解决方案综述
Pub Date : 2022-12-05 DOI: 10.1051/sands/2022010
Nan Li, Minxian Xu, Qimeng Li, Jikui Liu, Shudi Bao, Ye Li, Jianzhong Li, Hairong Zheng
Precision medicine provides a holistic view of a person’s health that combines genes, environment and lifestyle, aiming at realizing the individualized therapy. With the developing of Internet of Things (IOT) devices, widespread emergence of Electronic Medical Records (EMR), booming of cloud computing and artificial intelligence, it provides an opportunity to collect the healthcare big data throughout the lifespan and analyze the disease risk at all stages of life. Thus, precision medicine is shifting to the focus from treatment to prediction and prevention, namely precision health. To achieve this goal, different types of data, such as omics, imaging, EMR, continuous physiological monitoring, lifestyle, and environmental information need to be collected, tracked, managed and shared. For this purpose, Internet-of-Medical Things (IoMT) is playing a vital role in bringing together the health systems, applications, services and devices, that can improve the speed and accuracy of diagnosis and treatments, and monitor and modify patient behaviour and health status in real time. However, due to the proliferation of IoMT devices, security has become a growing concern. The increasing interconnectivity of IoMT-enabled devices with the health data reception, transmission, and processing significantly increases the number of potential vulnerabilities within a system. To address the security issues for precision health in IoMT systems, in this article, we review the state-of-the-art techniques and schemes from the perspective of a hierarchical system architecture. We present an IoMT system model consisting of three layers: the sensing layer, the network layer and the cloud infrastructure layer. In each layer, we discuss the security vulnerabilities and threats, and review the existing security techniques and schemes corresponding to the system components and their functionalities. Due to the unique nature of biometric features in medical and health services, we highlight the biometrics-based technologies applied in IoMT systems, which makes a great difference from the security solutions in other existing IoT systems. Finally, we summarize the challenges and future research directions in IoMT systems for a better and more secure future of precision health.
精准医学结合基因、环境和生活方式,对人的健康进行整体观察,旨在实现个体化治疗。随着物联网(IOT)设备的发展,电子病历(EMR)的广泛出现,云计算和人工智能的蓬勃发展,为收集整个生命周期的医疗大数据,分析生命各个阶段的疾病风险提供了机会。因此,精准医疗的重点正在从治疗转向预测和预防,即精准健康。为了实现这一目标,需要收集、跟踪、管理和共享不同类型的数据,如组学、成像、EMR、连续生理监测、生活方式和环境信息。为此,医疗物联网(IoMT)在汇集卫生系统、应用程序、服务和设备方面发挥着至关重要的作用,可以提高诊断和治疗的速度和准确性,并实时监测和修改患者的行为和健康状况。然而,由于IoMT设备的激增,安全性已成为人们日益关注的问题。支持iomt的设备与健康数据接收、传输和处理的互连性日益增强,这大大增加了系统中潜在漏洞的数量。为了解决IoMT系统中精确健康的安全问题,在本文中,我们从分层系统架构的角度回顾了最先进的技术和方案。我们提出了一个由三层组成的IoMT系统模型:感知层、网络层和云基础设施层。在每一层中,我们讨论了安全漏洞和威胁,并回顾了与系统组件及其功能相对应的现有安全技术和方案。由于生物特征在医疗卫生服务中的独特性,我们重点介绍了物联网系统中应用的基于生物特征的技术,这与其他现有物联网系统的安全解决方案有很大不同。最后,我们总结了IoMT系统面临的挑战和未来的研究方向,以实现更美好、更安全的未来精准健康。
{"title":"A Review on Security Issues and Solutions for Precision Health in Internet-of-Medical-Things Systems","authors":"Nan Li, Minxian Xu, Qimeng Li, Jikui Liu, Shudi Bao, Ye Li, Jianzhong Li, Hairong Zheng","doi":"10.1051/sands/2022010","DOIUrl":"https://doi.org/10.1051/sands/2022010","url":null,"abstract":"Precision medicine provides a holistic view of a person’s health that combines genes, environment and lifestyle, aiming at realizing the individualized therapy. With the developing of Internet of Things (IOT) devices, widespread emergence of Electronic Medical Records (EMR), booming of cloud computing and artificial intelligence, it provides an opportunity to collect the healthcare big data throughout the lifespan and analyze the disease risk at all stages of life. Thus, precision medicine is shifting to the focus from treatment to prediction and prevention, namely precision health. To achieve this goal, different types of data, such as omics, imaging, EMR, continuous physiological monitoring, lifestyle, and environmental information need to be collected, tracked, managed and shared. For this purpose, Internet-of-Medical Things (IoMT) is playing a vital role in bringing together the health systems, applications, services and devices, that can improve the speed and accuracy of diagnosis and treatments, and monitor and modify patient behaviour and health status in real time. However, due to the proliferation of IoMT devices, security has become a growing concern. The increasing interconnectivity of IoMT-enabled devices with the health data reception, transmission, and processing significantly increases the number of potential vulnerabilities within a system. \u0000To address the security issues for precision health in IoMT systems, in this article, we review the state-of-the-art techniques and schemes from the perspective of a hierarchical system architecture. We present an IoMT system model consisting of three layers: the sensing layer, the network layer and the cloud infrastructure layer. In each layer, we discuss the security vulnerabilities and threats, and review the existing security techniques and schemes corresponding to the system components and their functionalities. Due to the unique nature of biometric features in medical and health services, we highlight the biometrics-based technologies applied in IoMT systems, which makes a great difference from the security solutions in other existing IoT systems. Finally, we summarize the challenges and future research directions in IoMT systems for a better and more secure future of precision health.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90094805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrated Safety and Security Enhancement of Connected Automated Vehicles Using DHR Architecture 基于DHR架构的互联自动驾驶汽车集成安全和安保增强
Pub Date : 2022-11-30 DOI: 10.1051/sands/2022009
Qi Liu, Yufeng Li, Xuehong Chen, Chenhong Cao
Safety and security are interrelated and both essential for connected automated vehicles (CAVs). They are usually investigated independently, followed in standards ISO 26262 and ISO/SAE 21434 respectively. However, more functional safety and security features of in-vehicle components making existing safety mechanisms weaken security mechanisms and vice versa. This results in a dilemma that the safety-critical and security-critical in-vehicle components can not be protected. In this paper, we propose a dynamic heterogeneous redundancy (DHR) architecture to enhance safety and security of CAVs simultaneously. We first investigate the current status of integrated safety and security analysis and explore the relationship between safety and security. Then, we propose a new taxonomy of in-vehicle components based on safety and security features. Finally, a dynamic heterogeneous redundancy (DHR) architecture is proposed to guarantee integrated functional safety and cyber security of connected vehicles for the first time. A case study on an automated bus shows that DHR architecture can not only detect unknown failures and ensure functional safety, but also detect unknown attacks to protect cyber security. Furthermore, we provide an in-depth analysis of quantification for CAVs performance using DHR architecture, and identify challenges and future research directions. Overall, the integrated safety and security enhancement is an emerging research.
安全和安保是相互关联的,对于联网自动驾驶汽车(cav)来说都是必不可少的。它们通常是独立调查,分别遵循ISO 26262和ISO/SAE 21434标准。然而,车载部件的功能安全和安全特性越来越多,使得现有的安全机制削弱了安全机制,反之亦然。这就造成了安全关键部件和安全关键部件无法得到保护的困境。本文提出了一种动态异构冗余(DHR)架构,以同时提高自动驾驶汽车的安全性和安全性。我们首先调查了综合安全与安全分析的现状,并探讨了安全与安全之间的关系。在此基础上,提出了一种基于安全特性的车载部件分类方法。最后,首次提出了一种动态异构冗余(DHR)架构,以保证车联网的综合功能安全和网络安全。通过对自动化总线的实例研究表明,DHR架构不仅可以检测未知故障,保证功能安全,还可以检测未知攻击,保护网络安全。此外,我们还深入分析了使用DHR架构对自动驾驶汽车性能的量化,并指出了挑战和未来的研究方向。总体而言,综合安全与安保增强是一项新兴的研究。
{"title":"Integrated Safety and Security Enhancement of Connected Automated Vehicles Using DHR Architecture","authors":"Qi Liu, Yufeng Li, Xuehong Chen, Chenhong Cao","doi":"10.1051/sands/2022009","DOIUrl":"https://doi.org/10.1051/sands/2022009","url":null,"abstract":"Safety and security are interrelated and both essential for connected automated vehicles (CAVs). They are usually investigated independently, followed in standards ISO 26262 and ISO/SAE 21434 respectively. However, more functional safety and security features of in-vehicle components making existing safety mechanisms weaken security mechanisms and vice versa. This results in a dilemma that the safety-critical and security-critical in-vehicle components can not be protected. In this paper, we propose a dynamic heterogeneous redundancy (DHR) architecture to enhance safety and security of CAVs simultaneously. We first investigate the current status of integrated safety and security analysis and explore the relationship between safety and security. Then, we propose a new taxonomy of in-vehicle components based on safety and security features. Finally, a dynamic heterogeneous redundancy (DHR) architecture is proposed to guarantee integrated functional safety and cyber security of connected vehicles for the first time. A case study on an automated bus shows that DHR architecture can not only detect unknown failures and ensure functional safety, but also detect unknown attacks to protect cyber security. Furthermore, we provide an in-depth analysis of quantification for CAVs performance using DHR architecture, and identify challenges and future research directions. Overall, the integrated safety and security enhancement is an emerging research.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77499389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implicit privacy preservation: a framework based on data generation 隐式隐私保护:基于数据生成的框架
Pub Date : 2022-01-01 DOI: 10.1051/sands/2022008
Qing Yang, Cheng Wang, Teng Hu, Xue Chen, Changjun Jiang
This paper addresses a special and imperceptible class of privacy, called implicit privacy. In contrast to traditional (explicit) privacy, implicit privacy has two essential properties: (1) It is not initially defined as a privacy attribute; (2) it is strongly associated with privacy attributes. In other words, attackers could utilize it to infer privacy attributes with a certain probability, indirectly resulting in the disclosure of private information. To deal with the implicit privacy disclosure problem, we give a measurable definition of implicit privacy, and propose an ex-ante implicit privacy-preserving framework based on data generation, called IMPOSTER. The framework consists of an implicit privacy detection module and an implicit privacy protection module. The former uses normalized mutual information to detect implicit privacy attributes that are strongly related to traditional privacy attributes. Based on the idea of data generation, the latter equips the Generative Adversarial Network (GAN) framework with an additional discriminator, which is used to eliminate the association between traditional privacy attributes and implicit ones. We elaborate a theoretical analysis for the convergence of the framework. Experiments demonstrate that with the learned generator, IMPOSTER can alleviate the disclosure of implicit privacy while maintaining good data utility.
本文讨论了一种特殊的、不易察觉的隐私,称为隐性隐私。与传统的(显式)隐私相比,隐式隐私具有两个基本属性:(1)它最初不被定义为隐私属性;(2)与隐私属性强关联。也就是说,攻击者可以利用它以一定的概率推断出隐私属性,间接导致隐私信息的泄露。为了解决隐式隐私泄露问题,我们给出了隐式隐私的可测量定义,并提出了一种基于数据生成的事前隐式隐私保护框架——IMPOSTER。该框架由隐式隐私检测模块和隐式隐私保护模块组成。前者使用规范化互信息检测与传统隐私属性密切相关的隐式隐私属性。基于数据生成的思想,后者为生成对抗网络(GAN)框架提供了一个额外的鉴别器,用于消除传统隐私属性与隐式隐私属性之间的关联。对该框架的收敛性进行了理论分析。实验表明,利用学习生成器,IMPOSTER可以在保持良好数据效用的同时减轻隐式隐私的泄露。
{"title":"Implicit privacy preservation: a framework based on data generation","authors":"Qing Yang, Cheng Wang, Teng Hu, Xue Chen, Changjun Jiang","doi":"10.1051/sands/2022008","DOIUrl":"https://doi.org/10.1051/sands/2022008","url":null,"abstract":"This paper addresses a special and imperceptible class of privacy, called implicit privacy. In contrast to traditional (explicit) privacy, implicit privacy has two essential properties: (1) It is not initially defined as a privacy attribute; (2) it is strongly associated with privacy attributes. In other words, attackers could utilize it to infer privacy attributes with a certain probability, indirectly resulting in the disclosure of private information. To deal with the implicit privacy disclosure problem, we give a measurable definition of implicit privacy, and propose an ex-ante implicit privacy-preserving framework based on data generation, called IMPOSTER. The framework consists of an implicit privacy detection module and an implicit privacy protection module. The former uses normalized mutual information to detect implicit privacy attributes that are strongly related to traditional privacy attributes. Based on the idea of data generation, the latter equips the Generative Adversarial Network (GAN) framework with an additional discriminator, which is used to eliminate the association between traditional privacy attributes and implicit ones. We elaborate a theoretical analysis for the convergence of the framework. Experiments demonstrate that with the learned generator, IMPOSTER can alleviate the disclosure of implicit privacy while maintaining good data utility.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84796803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A note on diagnosis and performance degradation detection in automatic control systems towards functional safety and cyber security 面向功能安全和网络安全的自动控制系统的诊断和性能退化检测
Pub Date : 2022-01-01 DOI: 10.1051/sands/2022004
S. Ding
This note addresses diagnosis and performance degradation detection issues from an integrated viewpoint of functionality maintenance and cyber security of automatic control systems. It calls for more research attention on three aspects: (i) application of control and detection unified framework to enhancing the diagnosis capability of feedback control systems, (ii) projection-based fault detection, and complementary and explainable applications of projection- and machine learning-based techniques, and (iii) system performance degradation detection that is of elemental importance for today’s automatic control systems. Some ideas and conceptual schemes are presented and illustrated by means of examples, serving as convincing arguments for research efforts in these aspects. They would contribute to the future development of capable diagnosis systems for functionality safe and cyber secure automatic control systems.
本文从自动控制系统的功能维护和网络安全的综合角度阐述了诊断和性能退化检测问题。它要求更多地关注三个方面的研究:(i)应用控制和检测统一框架来增强反馈控制系统的诊断能力,(ii)基于投影的故障检测,以及基于投影和机器学习技术的互补和可解释的应用,以及(iii)对当今自动控制系统至关重要的系统性能退化检测。本文提出了一些观点和概念方案,并通过实例加以说明,为这些方面的研究工作提供了令人信服的论据。它们将有助于功能安全和网络安全自动控制系统的诊断系统的未来发展。
{"title":"A note on diagnosis and performance degradation detection in automatic control systems towards functional safety and cyber security","authors":"S. Ding","doi":"10.1051/sands/2022004","DOIUrl":"https://doi.org/10.1051/sands/2022004","url":null,"abstract":"This note addresses diagnosis and performance degradation detection issues from an integrated viewpoint of functionality maintenance and cyber security of automatic control systems. It calls for more research attention on three aspects: (i) application of control and detection unified framework to enhancing the diagnosis capability of feedback control systems, (ii) projection-based fault detection, and complementary and explainable applications of projection- and machine learning-based techniques, and (iii) system performance degradation detection that is of elemental importance for today’s automatic control systems. Some ideas and conceptual schemes are presented and illustrated by means of examples, serving as convincing arguments for research efforts in these aspects. They would contribute to the future development of capable diagnosis systems for functionality safe and cyber secure automatic control systems.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77793419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Physical layer security techniques for data transmission for future wireless networks 未来无线网络数据传输的物理层安全技术
Pub Date : 2022-01-01 DOI: 10.1051/sands/2022007
Weiping Shi, Xinyi Jiang, Jinsong Hu, A. M. Abdelgader, Yin Teng, Yang Wang, Hangjia He, Rongen Dong, F. Shu, Jiangzhou Wang
The broadcast nature of wireless communication systems makes wireless transmission extremely susceptible to eavesdropping and even malicious interference. Physical layer security technology can effectively protect the private information sent by the transmitter from being listened to by illegal eavesdroppers, thus ensuring the privacy and security of communication between the transmitter and legitimate users. Thus, the main design goal of physical layer security is to increase the performance difference between the link of the legitimate receiver and that of the eavesdropper using well-designed transmission schemes. The development of mobile communication presents new challenges to physical layer security research. This paper provides a survey of the physical layer security research on various promising mobile technologies from secure key generation and keyless techniques, including secure key generation, directional modulation (DM), spatial modulation (SM), covert communication, and intelligent reflecting surface (IRS)-aided communication. Finally, the future topics and the unresolved technical challenges are presented in physical layer security for mobile communications.
无线通信系统的广播性质使得无线传输极易受到窃听甚至恶意干扰。物理层安全技术可以有效保护发送方发送的私有信息不被非法窃听者窃听,从而保证发送方与合法用户之间通信的私密性和安全性。因此,物理层安全的主要设计目标是通过设计良好的传输方案来增加合法接收方链路与窃听方链路之间的性能差异。移动通信的发展对物理层安全研究提出了新的挑战。本文从安全密钥生成和无密钥技术,包括安全密钥生成、方向调制(DM)、空间调制(SM)、隐蔽通信和智能反射面(IRS)辅助通信,综述了各种有前途的移动技术的物理层安全研究。最后,提出了移动通信物理层安全的未来主题和尚未解决的技术挑战。
{"title":"Physical layer security techniques for data transmission for future wireless networks","authors":"Weiping Shi, Xinyi Jiang, Jinsong Hu, A. M. Abdelgader, Yin Teng, Yang Wang, Hangjia He, Rongen Dong, F. Shu, Jiangzhou Wang","doi":"10.1051/sands/2022007","DOIUrl":"https://doi.org/10.1051/sands/2022007","url":null,"abstract":"The broadcast nature of wireless communication systems makes wireless transmission extremely susceptible to eavesdropping and even malicious interference. Physical layer security technology can effectively protect the private information sent by the transmitter from being listened to by illegal eavesdroppers, thus ensuring the privacy and security of communication between the transmitter and legitimate users. Thus, the main design goal of physical layer security is to increase the performance difference between the link of the legitimate receiver and that of the eavesdropper using well-designed transmission schemes. The development of mobile communication presents new challenges to physical layer security research. This paper provides a survey of the physical layer security research on various promising mobile technologies from secure key generation and keyless techniques, including secure key generation, directional modulation (DM), spatial modulation (SM), covert communication, and intelligent reflecting surface (IRS)-aided communication. Finally, the future topics and the unresolved technical challenges are presented in physical layer security for mobile communications.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"108 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75826652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On integrated security and safety 论综合安保与安全
Pub Date : 2022-01-01 DOI: 10.1051/sands/2022002
Jiangxing Wu
With the ubiquitous application of digital, intelligent, and network technologies, the connotation and denotation of functional safety have gone beyond the conventional reliability scope of dealing with functional or system failures caused by random ineffectiveness in the mechanical and electric age. In order to guarantee the functional safety for cyber physical systems (CPS) in cyberspace in the information age, it is impossible to avoid challenges of cyber security, especially “unknown unknown” network threats and attack events aimed at CPS systems, software/hardware facility vulnerabilities or loopholes and backdoors. Such challenges have a terrible ghost-haunted nature and attributes that cannot be expressed through mathematical models. They have gone beyond the random hypothetical premises of classical functional safety theories and mathematical nature to be expressed through probability, as well as shaken the foundations of conventional reliability theories, technological methodologies, and practice norms. Now the cyber security and functional safety in the key infrastructure of digital society are inter-twined or intermingled and are becoming more and more difficult to separate. There exist “double-skin” functional safety and cyber security governance modes, the functional failures of which are of completely different nature. They cannot be expected to acquire quantitative-design and verifiable “generalized functional safety” [1] features through “divide-and-rule” governance structures and mechanisms due to the incompatible logical problems and paradoxes in prerequisites and hypothetical premises. Therefore, it is urgent to develop integrated scientific theories, technological methodologies, and practice norms to deal with generalized functional safety problems. The scientific and technological community needs a high-level academic exchange platform focusing on theoretical research and technological developments in the interdisciplinary fields of cyber security and functional safety. We
随着数字化、智能化和网络化技术的普遍应用,功能安全的内涵和外延已经超越了机械和电气时代处理随机失效引起的功能或系统故障的传统可靠性范围。在信息时代,为了保障网络空间中网络物理系统(CPS)的功能安全,无法避免网络安全的挑战,特别是针对CPS系统的“未知未知”网络威胁和攻击事件、软硬件设施漏洞或漏洞和后门。这样的挑战具有可怕的鬼影性质和无法通过数学模型表达的属性。它们超越了经典功能安全理论和数学本质的随机假设前提,通过概率来表达,也动摇了传统可靠性理论、技术方法和实践规范的基础。当前,数字社会关键基础设施中的网络安全和功能安全相互交织或交织,越来越难以割裂。存在“双层皮”功能安全和网络安全治理模式,其功能失效性质完全不同。由于先决条件和假设前提的逻辑问题和悖论不相容,它们无法通过“分而治之”的治理结构和机制获得定量设计和可验证的“广义功能安全”[1]特征。因此,迫切需要制定综合的科学理论、技术方法和实践规范来处理广义功能安全问题。科技界需要一个注重网络安全和功能安全跨学科领域理论研究和技术发展的高水平学术交流平台。我们
{"title":"On integrated security and safety","authors":"Jiangxing Wu","doi":"10.1051/sands/2022002","DOIUrl":"https://doi.org/10.1051/sands/2022002","url":null,"abstract":"With the ubiquitous application of digital, intelligent, and network technologies, the connotation and denotation of functional safety have gone beyond the conventional reliability scope of dealing with functional or system failures caused by random ineffectiveness in the mechanical and electric age. In order to guarantee the functional safety for cyber physical systems (CPS) in cyberspace in the information age, it is impossible to avoid challenges of cyber security, especially “unknown unknown” network threats and attack events aimed at CPS systems, software/hardware facility vulnerabilities or loopholes and backdoors. Such challenges have a terrible ghost-haunted nature and attributes that cannot be expressed through mathematical models. They have gone beyond the random hypothetical premises of classical functional safety theories and mathematical nature to be expressed through probability, as well as shaken the foundations of conventional reliability theories, technological methodologies, and practice norms. Now the cyber security and functional safety in the key infrastructure of digital society are inter-twined or intermingled and are becoming more and more difficult to separate. There exist “double-skin” functional safety and cyber security governance modes, the functional failures of which are of completely different nature. They cannot be expected to acquire quantitative-design and verifiable “generalized functional safety” [1] features through “divide-and-rule” governance structures and mechanisms due to the incompatible logical problems and paradoxes in prerequisites and hypothetical premises. Therefore, it is urgent to develop integrated scientific theories, technological methodologies, and practice norms to deal with generalized functional safety problems. The scientific and technological community needs a high-level academic exchange platform focusing on theoretical research and technological developments in the interdisciplinary fields of cyber security and functional safety. We","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85738806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure transmission technology based on direct modulation with random channel characteristics 基于随机信道直接调制的安全传输技术
Pub Date : 2022-01-01 DOI: 10.1051/sands/2022006
Ronggeng Yang, A. Hu
Aiming at the problem of insufficient security in the existing wireless data transmission, a security transmission technology based on direct modulation with random channel characteristics is proposed. The method first estimates channel characteristics using the preamble in the communication frame, and then embeds channel characteristics into the I/Q modulator. After that, the modulated constellation diagram undergoes random hopping of the constellation position compared with the original constellation diagram, thus achieving the effect of secure transmission. Due to the reciprocity of the uplink and downlink channels, channel characteristics estimated by the downlink receiver are almost the same as those estimated by the uplink receiver, and the correct plaintext data can be recovered by performing corresponding demodulation with them. Compared with the existing scheme of quantizing channel characteristics and then encrypting data, the method reduces the performance loss caused by quantization. In addition, its bit error rate is lower than that of the quantization method. In general, it has higher security and convenience.
针对现有无线数据传输中存在的安全性不足的问题,提出了一种基于随机信道特性的直接调制安全传输技术。该方法首先利用通信帧中的序言估计信道特性,然后将信道特性嵌入到I/Q调制器中。之后,调制后的星座图相对于原星座图进行星座位置的随机跳变,从而达到安全传输的效果。由于上行信道和下行信道的互易性,下行接收机估计的信道特性与上行接收机估计的信道特性几乎相同,对其进行相应的解调即可恢复正确的明文数据。与现有的信道特征量化后进行加密的方案相比,该方法减少了量化带来的性能损失。此外,它的误码率比量化方法低。总的来说,它具有更高的安全性和方便性。
{"title":"Secure transmission technology based on direct modulation with random channel characteristics","authors":"Ronggeng Yang, A. Hu","doi":"10.1051/sands/2022006","DOIUrl":"https://doi.org/10.1051/sands/2022006","url":null,"abstract":"Aiming at the problem of insufficient security in the existing wireless data transmission, a security transmission technology based on direct modulation with random channel characteristics is proposed. The method first estimates channel characteristics using the preamble in the communication frame, and then embeds channel characteristics into the I/Q modulator. After that, the modulated constellation diagram undergoes random hopping of the constellation position compared with the original constellation diagram, thus achieving the effect of secure transmission. Due to the reciprocity of the uplink and downlink channels, channel characteristics estimated by the downlink receiver are almost the same as those estimated by the uplink receiver, and the correct plaintext data can be recovered by performing corresponding demodulation with them. Compared with the existing scheme of quantizing channel characteristics and then encrypting data, the method reduces the performance loss caused by quantization. In addition, its bit error rate is lower than that of the quantization method. In general, it has higher security and convenience.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74509080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Problems and solutions regarding generalized functional safety in cyberspace 网络空间广义功能安全的问题与对策
Pub Date : 2022-01-01 DOI: 10.1051/sands/2022001
Jiangxing Wu
The common endogenous security problems in cyberspace and related attack threats have posed subversive challenges to conventional theories and methods of functional safety. In the current design of the cyber physical system (CPS), functional safety and cyber security are increasingly intertwined and inseparable, which evolve into the generalized functional safety (S&S) problem. The conventional reliability and cybersecurity technologies are unable to provide security assurance with quantifiable design and verification metrics in response to the cyberattacks in hardware and software with common endogenous security problems, and the functional safety of CPS facilities or device has become a frightening ghost. The dynamic heterogeneity redundancy (DHR) architecture and coding channel theory (CCT) proposed by the cyberspace endogenous security paradigm could handle random failures and uncertain network attacks in an integrated manner, and its generalized robust control mechanism can solve the universal problem of quantitative design for functional safety under probability or improbability perturbation. As a generalized functional safety enabling structure, DHR opens up a new direction to solve the common endogenous security problems in the cross-disciplinary fields of cyberspace.
网络空间普遍存在的内生安全问题和攻击威胁对传统的功能安全理论和方法提出了颠覆性挑战。在当前的网络物理系统(CPS)设计中,功能安全和网络安全日益相互交织、不可分割,演变为广义功能安全(S&S)问题。传统的可靠性和网络安全技术无法为硬件和软件的网络攻击提供可量化的设计和验证指标,这些攻击具有普遍的内生安全问题,CPS设施或设备的功能安全已成为一个可怕的幽灵。网络空间内生安全范式提出的动态异构冗余(DHR)体系结构和编码信道理论(CCT)可以综合处理随机故障和不确定网络攻击,其广义鲁棒控制机制可以解决概率或非概率扰动下功能安全定量设计的普遍问题。DHR作为一种广义的功能安全使能结构,为解决网络空间跨学科领域常见的内生安全问题开辟了新的方向。
{"title":"Problems and solutions regarding generalized functional safety in cyberspace","authors":"Jiangxing Wu","doi":"10.1051/sands/2022001","DOIUrl":"https://doi.org/10.1051/sands/2022001","url":null,"abstract":"The common endogenous security problems in cyberspace and related attack threats have posed subversive challenges to conventional theories and methods of functional safety. In the current design of the cyber physical system (CPS), functional safety and cyber security are increasingly intertwined and inseparable, which evolve into the generalized functional safety (S&S) problem. The conventional reliability and cybersecurity technologies are unable to provide security assurance with quantifiable design and verification metrics in response to the cyberattacks in hardware and software with common endogenous security problems, and the functional safety of CPS facilities or device has become a frightening ghost. The dynamic heterogeneity redundancy (DHR) architecture and coding channel theory (CCT) proposed by the cyberspace endogenous security paradigm could handle random failures and uncertain network attacks in an integrated manner, and its generalized robust control mechanism can solve the universal problem of quantitative design for functional safety under probability or improbability perturbation. As a generalized functional safety enabling structure, DHR opens up a new direction to solve the common endogenous security problems in the cross-disciplinary fields of cyberspace.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86961391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Concretely efficient secure multi-party computation protocols: survey and more 具体有效的安全多方计算协议:调查和更多
Pub Date : 2022-01-01 DOI: 10.1051/sands/2021001
D. Feng, Kang Yang
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their private inputs, and reveals nothing but the output of the function. In the last decade, MPC has rapidly moved from a purely theoretical study to an object of practical interest, with a growing interest in practical applications such as privacy-preserving machine learning (PPML). In this paper, we comprehensively survey existing work on concretely efficient MPC protocols with both semi-honest and malicious security, in both dishonest-majority and honest-majority settings. We focus on considering the notion of security with abort, meaning that corrupted parties could prevent honest parties from receiving output after they receive output. We present high-level ideas of the basic and key approaches for designing different styles of MPC protocols and the crucial building blocks of MPC. For MPC applications, we compare the known PPML protocols built on MPC, and describe the efficiency of private inference and training for the state-of-the-art PPML protocols. Furthermore, we summarize several challenges and open problems to break though the efficiency of MPC protocols as well as some interesting future work that is worth being addressed. This survey aims to provide the recent development and key approaches of MPC to researchers, who are interested in knowing, improving, and applying concretely efficient MPC protocols.
安全多方计算(MPC)允许一组各方在他们的私有输入上共同计算一个函数,并且只显示函数的输出。在过去的十年中,MPC已经迅速从纯粹的理论研究转变为实际兴趣的对象,对隐私保护机器学习(PPML)等实际应用的兴趣越来越大。在本文中,我们全面地调查了在半诚实和恶意安全、非诚实多数和诚实多数设置下具体有效的MPC协议的现有工作。我们将重点考虑带有abort的安全概念,这意味着腐败方可能会阻止诚实方在收到输出后接收输出。我们提出了设计不同风格的MPC协议的基本方法和关键方法的高级思想,以及MPC的关键构建块。对于MPC应用,我们比较了建立在MPC上的已知PPML协议,并描述了最先进的PPML协议的私有推理和训练的效率。此外,我们总结了突破MPC协议效率的几个挑战和开放问题,以及一些值得解决的有趣的未来工作。本文旨在为有兴趣了解、改进和应用具体有效的MPC协议的研究人员提供MPC的最新发展和关键方法。
{"title":"Concretely efficient secure multi-party computation protocols: survey and more","authors":"D. Feng, Kang Yang","doi":"10.1051/sands/2021001","DOIUrl":"https://doi.org/10.1051/sands/2021001","url":null,"abstract":"Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their private inputs, and reveals nothing but the output of the function. In the last decade, MPC has rapidly moved from a purely theoretical study to an object of practical interest, with a growing interest in practical applications such as privacy-preserving machine learning (PPML). In this paper, we comprehensively survey existing work on concretely efficient MPC protocols with both semi-honest and malicious security, in both dishonest-majority and honest-majority settings. We focus on considering the notion of security with abort, meaning that corrupted parties could prevent honest parties from receiving output after they receive output. We present high-level ideas of the basic and key approaches for designing different styles of MPC protocols and the crucial building blocks of MPC. For MPC applications, we compare the known PPML protocols built on MPC, and describe the efficiency of private inference and training for the state-of-the-art PPML protocols. Furthermore, we summarize several challenges and open problems to break though the efficiency of MPC protocols as well as some interesting future work that is worth being addressed. This survey aims to provide the recent development and key approaches of MPC to researchers, who are interested in knowing, improving, and applying concretely efficient MPC protocols.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80814972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Hospital security and safety management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1