951 research outputs found
LLMSense: Harnessing LLMs for High-level Reasoning Over Spatiotemporal Sensor Traces
Most studies on machine learning in sensing systems focus on low-level
perception tasks that process raw sensory data within a short time window.
However, many practical applications, such as human routine modeling and
occupancy tracking, require high-level reasoning abilities to comprehend
concepts and make inferences based on long-term sensor traces. Existing machine
learning-based approaches for handling such complex tasks struggle to
generalize due to the limited training samples and the high dimensionality of
sensor traces, necessitating the integration of human knowledge for designing
first-principle models or logic reasoning methods. We pose a fundamental
question: Can we harness the reasoning capabilities and world knowledge of
Large Language Models (LLMs) to recognize complex events from long-term
spatiotemporal sensor traces? To answer this question, we design an effective
prompting framework for LLMs on high-level reasoning tasks, which can handle
traces from the raw sensor data as well as the low-level perception results. We
also design two strategies to enhance performance with long sensor traces,
including summarization before reasoning and selective inclusion of historical
traces. Our framework can be implemented in an edge-cloud setup, running small
LLMs on the edge for data summarization and performing high-level reasoning on
the cloud for privacy preservation. The results show that LLMSense can achieve
over 80\% accuracy on two high-level reasoning tasks such as dementia diagnosis
with behavior traces and occupancy tracking with environmental sensor traces.
This paper provides a few insights and guidelines for leveraging LLM for
high-level reasoning on sensor traces and highlights several directions for
future work.Comment: 6 page
Trust and obfuscation principles for quality of information in emerging pervasive environments
Non peer reviewedPostprin
Attack Resilience and Recovery using Physical Challenge Response Authentication for Active Sensors Under Integrity Attacks
Embedded sensing systems are pervasively used in life- and security-critical
systems such as those found in airplanes, automobiles, and healthcare.
Traditional security mechanisms for these sensors focus on data encryption and
other post-processing techniques, but the sensors themselves often remain
vulnerable to attacks in the physical/analog domain. If an adversary
manipulates a physical/analog signal prior to digitization, no amount of
digital security mechanisms after the fact can help. Fortunately, nature
imposes fundamental constraints on how these analog signals can behave. This
work presents PyCRA, a physical challenge-response authentication scheme
designed to protect active sensing systems against physical attacks occurring
in the analog domain. PyCRA provides security for active sensors by continually
challenging the surrounding environment via random but deliberate physical
probes. By analyzing the responses to these probes, and by using the fact that
the adversary cannot change the underlying laws of physics, we provide an
authentication mechanism that not only detects malicious attacks but provides
resilience against them. We demonstrate the effectiveness of PyCRA through
several case studies using two sensing systems: (1) magnetic sensors like those
found wheel speed sensors in robotics and automotive, and (2) commercial RFID
tags used in many security-critical applications. Finally, we outline methods
and theoretical proofs for further enhancing the resilience of PyCRA to active
attacks by means of a confusion phase---a period of low signal to noise ratio
that makes it more difficult for an attacker to correctly identify and respond
to PyCRA's physical challenges. In doing so, we evaluate both the robustness
and the limitations of PyCRA, concluding by outlining practical considerations
as well as further applications for the proposed authentication mechanism.Comment: Shorter version appeared in ACM ACM Conference on Computer and
Communications (CCS) 201
Truth Discovery in Crowdsourced Detection of Spatial Events
ACKNOWLEDGMENTS This research is based upon work supported in part by the US ARL and UK Ministry of Defense under Agreement Number W911NF-06-3-0001, and by the NSF under award CNS-1213140. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views or represent the official policies of the NSF, the US ARL, the US Government, the UK Ministry of Defense or the UK Government. The US and UK Governments are authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation hereon.Peer reviewedPostprin
Effect of Population Structures on Quantum-Inspired Evolutionary Algorithm
Quantum-inspired evolutionary algorithm (QEA) has been designed by integrating some quantum mechanical principles in the framework of evolutionary algorithms. They have been successfully employed as a computational technique in solving difficult optimization problems. It is well known that QEAs provide better balance between exploration and exploitation as compared to the conventional evolutionary algorithms. The population in QEA is evolved by variation operators, which move the Q-bit towards an attractor. A modification for improving the performance of QEA was proposed by changing the selection of attractors, namely, versatile QEA. The improvement attained by versatile QEA over QEA indicates the impact of population structure on the performance of QEA and motivates further investigation into employing fine-grained model. The QEA with fine-grained population model (FQEA) is similar to QEA with the exception that every individual is located in a unique position on a two-dimensional toroidal grid and has four neighbors amongst which it selects its attractor. Further, FQEA does not use migrations, which is employed by QEAs. This paper empirically investigates the effect of the three different population structures on the performance of QEA by solving well-known discrete benchmark optimization problems
Securing Localization With Hidden and Mobile Base Stations
Abstract â Until recently, the problem of localization in wireless networks has been mainly studied in a non-adversarial setting. Only recently, a number of solutions have been proposed that aim to detect and prevent attacks on localization systems. In this work, we propose a new approach to secure localization based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received signal strength or signal time of flight. Through several examples we show how this approach can be used to secure node-centric and infrastructurecentric localization schemes. We further show how this approach can be applied to secure localization in sensor networks. I
- âŠ