1,617 research outputs found
Social learning against data falsification in sensor networks
Sensor networks generate large amounts of geographically-distributed data. The conventional approach to exploit this data is to first gather it in a special node that then performs processing and inference. However, what happens if this node is destroyed, or even worst, if it is hijacked? To explore this problem, in this work we consider a smart attacker who can take control of critical nodes within the network and use them to inject false information. In order to face this critical security thread, we propose a novel scheme that enables data aggregation and decision-making over networks based on social learning, where the sensor nodes act resembling how agents make decisions in social networks. Our results suggest that social learning enables high network resilience, even when a significant portion of the nodes have been compromised by the attacker
Byzantine Attack and Defense in Cognitive Radio Networks: A Survey
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the
spectrum sensing data falsification (SSDF) attack in the literature, is one of
the key adversaries to the success of cognitive radio networks (CRNs). In the
past couple of years, the research on the Byzantine attack and defense
strategies has gained worldwide increasing attention. In this paper, we provide
a comprehensive survey and tutorial on the recent advances in the Byzantine
attack and defense for CSS in CRNs. Specifically, we first briefly present the
preliminaries of CSS for general readers, including signal detection
techniques, hypothesis testing, and data fusion. Second, we analyze the spear
and shield relation between Byzantine attack and defense from three aspects:
the vulnerability of CSS to attack, the obstacles in CSS to defense, and the
games between attack and defense. Then, we propose a taxonomy of the existing
Byzantine attack behaviors and elaborate on the corresponding attack
parameters, which determine where, who, how, and when to launch attacks. Next,
from the perspectives of homogeneous or heterogeneous scenarios, we classify
the existing defense algorithms, and provide an in-depth tutorial on the
state-of-the-art Byzantine defense schemes, commonly known as robust or secure
CSS in the literature. Furthermore, we highlight the unsolved research
challenges and depict the future research directions.Comment: Accepted by IEEE Communications Surveys and Tutoiral
Compositional Verification for Autonomous Systems with Deep Learning Components
As autonomy becomes prevalent in many applications, ranging from
recommendation systems to fully autonomous vehicles, there is an increased need
to provide safety guarantees for such systems. The problem is difficult, as
these are large, complex systems which operate in uncertain environments,
requiring data-driven machine-learning components. However, learning techniques
such as Deep Neural Networks, widely used today, are inherently unpredictable
and lack the theoretical foundations to provide strong assurance guarantees. We
present a compositional approach for the scalable, formal verification of
autonomous systems that contain Deep Neural Network components. The approach
uses assume-guarantee reasoning whereby {\em contracts}, encoding the
input-output behavior of individual components, allow the designer to model and
incorporate the behavior of the learning-enabled components working
side-by-side with the other components. We illustrate the approach on an
example taken from the autonomous vehicles domain
Affirmed Crowd Sensor Selection based Cooperative Spectrum Sensing
The Cooperative Spectrum sensing model is gaining importance among the cognitive radio network sharing groups. While the crowd-sensing model (technically the cooperative spectrum sensing) model has positive developments, one of the critical challenges plaguing the model is the false or manipulated crowd sensor data, which results in implications for the secondary user’s network. Considering the efficacy of the spectrum sensing by crowd-sensing model, it is vital to address the issues of falsifications and manipulations, by focusing on the conditions of more accurate determination models. Concerning this, a method of avoiding falsified crowd sensors from the process of crowd sensors centric cooperative spectrum sensing has portrayed in this article. The proposal is a protocol that selects affirmed crowd sensor under diversified factors of the decision credibility about spectrum availability. An experimental study is a simulation approach that evincing the competency of the proposal compared to the other contemporary models available in recent literature
Studies of Sensor Data Interpretation for Asset Management of the Built Environment
Sensing in the built environment has the potential to reduce asset management expenditure and contribute to extending useful service life. In the built environment, measurements are usually performed indirectly; effects are measured remote from their causes. Modelling approximations from many sources, such as boundary conditions, geometrical simplifications and numerical assumptions result in important systematic uncertainties that modify correlation values between measurement points. In addition, conservative behavior models that were employed - justifiably during the design stage, prior to construction - are generally inadequate when explaining measurements of real behavior. This paper summarizes the special context of sensor data interpretation for asset management in the built environment. Nearly twenty years of research results from several doctoral thesis and fourteen full-scale case studies in four countries are summarized. Originally inspired from research into model based diagnosis, work on multiple model identification evolved into a methodology for probabilistic model falsification. Throughout the research, parallel studies developed strategies for measurement system design. Recent comparisons with Bayesian model updating have shown that while traditional applications Bayesian methods are precise and accurate when all is known, they are not robust in the presence of approximate models. Finally, details of the full-scale case studies that have been used to develop model falsification are briefly described. The model-falsification strategy for data interpretation provides engineers with an easy-to-understand tool that is compatible with the context of the built environment
Narcissus to a Man: Lifelogging, Technology and the Normativity of Truth
The growth of the practice of lifelogging, exploiting the capabilities provided by the exponential increase in computer storage, and using technologies such as SenseCam as well as location-based services, Web 2.0, social networking and photo-sharing sites, has led to a growing sense of unease, articulated in books such as Mayer-Schönberger's Delete, that the semi-permanent storage of memories could lead to problematic social consequences. This talk examines the arguments against lifelogging and storage, and argues that they seem less worrying when placed in the context of a wider debate about the nature of mind and memory and their relationship to our environment and the technology we use
- …