1,617 research outputs found

    Social learning against data falsification in sensor networks

    Get PDF
    Sensor networks generate large amounts of geographically-distributed data. The conventional approach to exploit this data is to first gather it in a special node that then performs processing and inference. However, what happens if this node is destroyed, or even worst, if it is hijacked? To explore this problem, in this work we consider a smart attacker who can take control of critical nodes within the network and use them to inject false information. In order to face this critical security thread, we propose a novel scheme that enables data aggregation and decision-making over networks based on social learning, where the sensor nodes act resembling how agents make decisions in social networks. Our results suggest that social learning enables high network resilience, even when a significant portion of the nodes have been compromised by the attacker

    Byzantine Attack and Defense in Cognitive Radio Networks: A Survey

    Full text link
    The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the success of cognitive radio networks (CRNs). In the past couple of years, the research on the Byzantine attack and defense strategies has gained worldwide increasing attention. In this paper, we provide a comprehensive survey and tutorial on the recent advances in the Byzantine attack and defense for CSS in CRNs. Specifically, we first briefly present the preliminaries of CSS for general readers, including signal detection techniques, hypothesis testing, and data fusion. Second, we analyze the spear and shield relation between Byzantine attack and defense from three aspects: the vulnerability of CSS to attack, the obstacles in CSS to defense, and the games between attack and defense. Then, we propose a taxonomy of the existing Byzantine attack behaviors and elaborate on the corresponding attack parameters, which determine where, who, how, and when to launch attacks. Next, from the perspectives of homogeneous or heterogeneous scenarios, we classify the existing defense algorithms, and provide an in-depth tutorial on the state-of-the-art Byzantine defense schemes, commonly known as robust or secure CSS in the literature. Furthermore, we highlight the unsolved research challenges and depict the future research directions.Comment: Accepted by IEEE Communications Surveys and Tutoiral

    Compositional Verification for Autonomous Systems with Deep Learning Components

    Full text link
    As autonomy becomes prevalent in many applications, ranging from recommendation systems to fully autonomous vehicles, there is an increased need to provide safety guarantees for such systems. The problem is difficult, as these are large, complex systems which operate in uncertain environments, requiring data-driven machine-learning components. However, learning techniques such as Deep Neural Networks, widely used today, are inherently unpredictable and lack the theoretical foundations to provide strong assurance guarantees. We present a compositional approach for the scalable, formal verification of autonomous systems that contain Deep Neural Network components. The approach uses assume-guarantee reasoning whereby {\em contracts}, encoding the input-output behavior of individual components, allow the designer to model and incorporate the behavior of the learning-enabled components working side-by-side with the other components. We illustrate the approach on an example taken from the autonomous vehicles domain

    Affirmed Crowd Sensor Selection based Cooperative Spectrum Sensing

    Get PDF
    The Cooperative Spectrum sensing model is gaining importance among the cognitive radio network sharing groups. While the crowd-sensing model (technically the cooperative spectrum sensing) model has positive developments, one of the critical challenges plaguing the model is the false or manipulated crowd sensor data, which results in implications for the secondary user’s network. Considering the efficacy of the spectrum sensing by crowd-sensing model, it is vital to address the issues of falsifications and manipulations, by focusing on the conditions of more accurate determination models. Concerning this, a method of avoiding falsified crowd sensors from the process of crowd sensors centric cooperative spectrum sensing has portrayed in this article. The proposal is a protocol that selects affirmed crowd sensor under diversified factors of the decision credibility about spectrum availability. An experimental study is a simulation approach that evincing the competency of the proposal compared to the other contemporary models available in recent literature

    Studies of Sensor Data Interpretation for Asset Management of the Built Environment

    Get PDF
    Sensing in the built environment has the potential to reduce asset management expenditure and contribute to extending useful service life. In the built environment, measurements are usually performed indirectly; effects are measured remote from their causes. Modelling approximations from many sources, such as boundary conditions, geometrical simplifications and numerical assumptions result in important systematic uncertainties that modify correlation values between measurement points. In addition, conservative behavior models that were employed - justifiably during the design stage, prior to construction - are generally inadequate when explaining measurements of real behavior. This paper summarizes the special context of sensor data interpretation for asset management in the built environment. Nearly twenty years of research results from several doctoral thesis and fourteen full-scale case studies in four countries are summarized. Originally inspired from research into model based diagnosis, work on multiple model identification evolved into a methodology for probabilistic model falsification. Throughout the research, parallel studies developed strategies for measurement system design. Recent comparisons with Bayesian model updating have shown that while traditional applications Bayesian methods are precise and accurate when all is known, they are not robust in the presence of approximate models. Finally, details of the full-scale case studies that have been used to develop model falsification are briefly described. The model-falsification strategy for data interpretation provides engineers with an easy-to-understand tool that is compatible with the context of the built environment

    Narcissus to a Man: Lifelogging, Technology and the Normativity of Truth

    No full text
    The growth of the practice of lifelogging, exploiting the capabilities provided by the exponential increase in computer storage, and using technologies such as SenseCam as well as location-based services, Web 2.0, social networking and photo-sharing sites, has led to a growing sense of unease, articulated in books such as Mayer-Schönberger's Delete, that the semi-permanent storage of memories could lead to problematic social consequences. This talk examines the arguments against lifelogging and storage, and argues that they seem less worrying when placed in the context of a wider debate about the nature of mind and memory and their relationship to our environment and the technology we use
    • …
    corecore