702 research outputs found

    Supply Chain Threats and Countermeasures: From Elicitation through Optimization

    Get PDF
    There are many checklists for improving supply chain resilience under different threats, but a lack of concrete procedures to rigorously assess and select among countermeasures (CMs). We present a novel process and method to elicit the needed information to identify CMs and assess their ability to reduce risk. We report on the fine-grained analysis underlying an effective simulation developed to model both the impact of threats and the impact of alternative CMs in the information and communication technology supply chain subject to disruptions due to natural hazards. We also describe the coarse-grained descriptions needed to elicit risk reduction estimates from subject matter experts, and the problems of integrating these two approaches, bottom up, and top down, to support management decisions to choose an optimal set of CMs given a limited budget

    Separability of State Trajectories and its Applications to Security of Cyber-Physical Systems

    Full text link
    This article studies a fundamental problem of security of cyber-physical systems (CPSs). We focus on a class of attacks where some of the actuators could be malicious while all the sensors are considered to be honest. We introduce a novel idea of separability of state trajectories that are generated by the honest and corrupt actuators, and establish its connection to the security of CPSs in the context of detecting the presence of malicious actuators (if any,) in the system. As a defense strategy to guard the CPS against malicious attacks, we focus on the mechanism of perturbing the pre-determined control action by injecting a certain class of random process by the honest actuators called private excitation, which is assumed to have a known distribution. As primary contributions we give sufficient conditions for the existence and non-existence of a separator for linear time-invariant stochastic systems, under the assumption that the policies are randomized-Markovian and randomized history dependent. Several technical aspects of the established results are discussed extensively.Comment: 26 page

    Publicly Detectable Watermarking for Language Models

    Full text link
    We construct the first provable watermarking scheme for language models with public detectability or verifiability: we use a private key for watermarking and a public key for watermark detection. Our protocol is the first watermarking scheme that does not embed a statistical signal in generated text. Rather, we directly embed a publicly-verifiable cryptographic signature using a form of rejection sampling. We show that our construction meets strong formal security guarantees and preserves many desirable properties found in schemes in the private-key watermarking setting. In particular, our watermarking scheme retains distortion-freeness and model agnosticity. We implement our scheme and make empirical measurements over open models in the 7B parameter range. Our experiments suggest that our watermarking scheme meets our formal claims while preserving text quality

    2007 Annual Report of the Graduate School of Engineering and Management, Air Force Institute of Technology

    Get PDF
    The Graduate School\u27s Annual Report highlights research focus areas, new academic programs, faculty accomplishments and news, and provides top-level sponsor-funded research data and information

    SciTech News Volume 71, No. 1 (2017)

    Get PDF
    Columns and Reports From the Editor 3 Division News Science-Technology Division 5 Chemistry Division 8 Engineering Division Aerospace Section of the Engineering Division 9 Architecture, Building Engineering, Construction and Design Section of the Engineering Division 11 Reviews Sci-Tech Book News Reviews 12 Advertisements IEEE

    A Property Rights Enforcement and Pricing Model for IIoT Data Marketplaces

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :๊ณต๊ณผ๋Œ€ํ•™ ํ˜‘๋™๊ณผ์ • ๊ธฐ์ˆ ๊ฒฝ์˜ยท๊ฒฝ์ œยท์ •์ฑ…์ „๊ณต,2019. 8. Jรถrn Altmann.The Industrial Internet of Things (IIoT) has become a valuable data source for products and services based on advanced data analytics. However, evidence suggests that industries are suffering a significant loss of value creation from insufficient IIoT data sharing. We argue that the limited utilization of the Sensing as a Service business model is caused by the economic and technological characteristics of sensor data, and the corresponding absence of applicable digital rights management models. Therefore, we propose a combined property rights enforcement and pricing model to solve the IIoT data sharing incentive problem.์‚ฐ์—…์šฉ ์‚ฌ๋ฌผ ์ธํ„ฐ๋„ท (IIoT) ๋ฐ์ดํ„ฐ๊ฐ€ ์ œํ’ˆ๊ณผ ์„œ๋น„์Šค๋ฅผ ์œ„ํ•œ ์ค‘์š”ํ•œ ๊ณ ๊ธ‰ ๋ฐ์ดํ„ฐ ์†Œ์Šค๋กœ ์—ฌ๊ฒจ์ง€๊ณ  ์žˆ์ง€๋งŒ, ์—ฌ์ „ํžˆ ์ˆ˜ ๋งŽ์€ ๊ธฐ์—…๋“ค์€ ๋ถˆ์ถฉ๋ถ„ํ•œ ์‚ฐ์—…์šฉ ์‚ฌ๋ฌผ ์ธํ„ฐ๋„ท ๋ฐ์ดํ„ฐ ๊ณต์œ  ์‹œ์Šคํ…œ์œผ๋กœ ์ธํ•˜์—ฌ ๊ณ ์ถฉ์„ ๊ฒช๊ณ  ์žˆ๋‹ค. ๋ฐฉ๋Œ€ํ•œ ๋ถ„๋Ÿ‰์˜ ์‚ฐ์—…์šฉ ๋ฐ์ดํ„ฐ๊ฐ€ ์ œ๋Œ€๋กœ ๊ฑฐ๋ž˜๋˜์ง€ ๋ชปํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, ์ด๋Š” ๋ฐ์ดํ„ฐ์˜ ์ปค๋‹ค๋ž€ ๊ฐ€์น˜ ์†์‹ค๋กœ ์ด์–ด์ง€๊ณ  ์žˆ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ์„œ๋น„์Šค๋กœ์„œ์˜ ์„ผ์‹ฑ (Sensing as a Service) ๋น„์ง€๋‹ˆ์Šค ๋ชจ๋ธ์ด ํ•œ์ •์ ์œผ๋กœ ์ ์šฉ๋˜๊ณ  ์žˆ๋Š” ์›์ธ์ด ํ•ด๋‹น ์ •๋ณด์˜ ๊ฒฝ์ œ์ , ๊ธฐ์ˆ ์  ํŠน์ง•๋“ค์„ ๋ฐ˜์˜ํ•˜๋Š” ๋””์ง€ํ„ธ ๊ถŒ๋ฆฌ ์‹œ์Šคํ…œ์˜ ๋ถ€์žฌ์— ๊ธฐ์ธํ•œ๋‹ค๊ณ  ๋ณด๊ณ  ์žˆ๋‹ค. ๋”ฐ๋ผ์„œ ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ์‚ฐ์—…์šฉ ์‚ฌ๋ฌผ ์ธํ„ฐ๋„ท ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•œ ์ง€์ ์žฌ์‚ฐ๊ถŒ ์ง‘ํ–‰ ์‹œ์Šคํ…œ๊ณผ ๋ฐ์ดํ„ฐ ๊ฐ€๊ฒฉ์‚ฐ์ • ๋ชจ๋ธ์„ ์ œ์•ˆํ•˜์—ฌ ์‚ฐ์—…์šฉ ์‚ฌ๋ฌผ ์ธํ„ฐ๋„ท ๋ฐ์ดํ„ฐ ๊ณต์œ  ์ธ์„ผํ‹ฐ๋ธŒ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ณ ์ž ํ•œ๋‹ค.1 Introduction 1 1.1 Background 1 1.2 Problem Description 6 1.3 Research Objective and Question 8 1.4 Methodology 8 1.5 Contributions 9 1.6 Structure 10 2 Literature Review 11 2.1 Sensing as a Service 11 2.2 Economic Characteristics of IIoT Data 14 2.2.1 Property Rights of Data 18 2.2.2 Licensing of IIoT Data 23 2.3 IIoT Data Marketplaces 25 2.3.1 Use-cases and Value Propositions 30 2.3.2 Market Structures and Pricing Models 34 2.4 Digital Rights Management for IIoT 36 3 Model 44 3.1 Assumptions 45 3.2 Watermarking Technique 47 3.2.1 Function 48 3.2.2 Example 50 3.2.3 Robustness 51 3.3 Economic Reasoning 54 3.3.1 The Quality Gap 55 3.3.2 Cost of Watermarking (CoW) 57 3.3.3 Cost of Attacking (CoA) 58 4 Analytical Analysis 60 4.1 Equilibrium Between CoW and CoA 60 4.2 Determining the Optimal Quality Gap 62 4.3 Applicability of the Quality Gap Function 64 5 Conclusion 66 5.1 Summary 66 5.2 Discussion 66 6 Limitations and Future Research 68 References 70 Abstract (Korean) 79Maste

    On an Information and Control Architecture for Future Electric Energy Systems

    Full text link
    This paper presents considerations towards an information and control architecture for future electric energy systems driven by massive changes resulting from the societal goals of decarbonization and electrification. This paper describes the new requirements and challenges of an extended information and control architecture that need to be addressed for continued reliable delivery of electricity. It identifies several new actionable information and control loops, along with their spatial and temporal scales of operation, which can together meet the needs of future grids and enable deep decarbonization of the electricity sector. The present architecture of electric power grids designed in a different era is thereby extensible to allow the incorporation of increased renewables and other emerging electric loads.Comment: This paper is accepted, to appear in the Proceedings of the IEE

    Book Reviews

    Get PDF
    • โ€ฆ
    corecore