85,538 research outputs found
Reconfiguration of Distributed Information Fusion System ? A case study
Information Fusion Systems are now widely used in different fusion contexts,
like scientific processing, sensor networks, video and image processing. One of
the current trends in this area is to cope with distributed systems. In this
context, we have defined and implemented a Dynamic Distributed Information
Fusion System runtime model. It allows us to cope with dynamic execution
supports while trying to maintain the functionalities of a given Dynamic
Distributed Information Fusion System. The paper presents our system, the
reconfiguration problems we are faced with and our solutions.Comment: 6 pages - Preprint versio
When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing
Defense strategies have been well studied to combat Byzantine attacks that
aim to disrupt cooperative spectrum sensing by sending falsified versions of
spectrum sensing data to a fusion center. However, existing studies usually
assume network or attackers as passive entities, e.g., assuming the prior
knowledge of attacks is known or fixed. In practice, attackers can actively
adopt arbitrary behaviors and avoid pre-assumed patterns or assumptions used by
defense strategies. In this paper, we revisit this security vulnerability as an
adversarial machine learning problem and propose a novel learning-empowered
attack framework named Learning-Evaluation-Beating (LEB) to mislead the fusion
center. Based on the black-box nature of the fusion center in cooperative
spectrum sensing, our new perspective is to make the adversarial use of machine
learning to construct a surrogate model of the fusion center's decision model.
We propose a generic algorithm to create malicious sensing data using this
surrogate model. Our real-world experiments show that the LEB attack is
effective to beat a wide range of existing defense strategies with an up to 82%
of success ratio. Given the gap between the proposed LEB attack and existing
defenses, we introduce a non-invasive method named as influence-limiting
defense, which can coexist with existing defenses to defend against LEB attack
or other similar attacks. We show that this defense is highly effective and
reduces the overall disruption ratio of LEB attack by up to 80%
City Data Fusion: Sensor Data Fusion in the Internet of Things
Internet of Things (IoT) has gained substantial attention recently and play a
significant role in smart city application deployments. A number of such smart
city applications depend on sensor fusion capabilities in the cloud from
diverse data sources. We introduce the concept of IoT and present in detail ten
different parameters that govern our sensor data fusion evaluation framework.
We then evaluate the current state-of-the art in sensor data fusion against our
sensor data fusion framework. Our main goal is to examine and survey different
sensor data fusion research efforts based on our evaluation framework. The
major open research issues related to sensor data fusion are also presented.Comment: Accepted to be published in International Journal of Distributed
Systems and Technologies (IJDST), 201
- …