22 research outputs found
Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things
Securing the Internet of Things (IoT) is a necessary milestone toward
expediting the deployment of its applications and services. In particular, the
functionality of the IoT devices is extremely dependent on the reliability of
their message transmission. Cyber attacks such as data injection,
eavesdropping, and man-in-the-middle threats can lead to security challenges.
Securing IoT devices against such attacks requires accounting for their
stringent computational power and need for low-latency operations. In this
paper, a novel deep learning method is proposed for dynamic watermarking of IoT
signals to detect cyber attacks. The proposed learning framework, based on a
long short-term memory (LSTM) structure, enables the IoT devices to extract a
set of stochastic features from their generated signal and dynamically
watermark these features into the signal. This method enables the IoT's cloud
center, which collects signals from the IoT devices, to effectively
authenticate the reliability of the signals. Furthermore, the proposed method
prevents complicated attack scenarios such as eavesdropping in which the cyber
attacker collects the data from the IoT devices and aims to break the
watermarking algorithm. Simulation results show that, with an attack detection
delay of under 1 second the messages can be transmitted from IoT devices with
an almost 100% reliability.Comment: 6 pages, 9 figure
Brainstorming Generative Adversarial Networks (BGANs): Towards Multi-Agent Generative Models with Distributed Private Datasets
To achieve a high learning accuracy, generative adversarial networks (GANs)
must be fed by large datasets that adequately represent the data space.
However, in many scenarios, the available datasets may be limited and
distributed across multiple agents, each of which is seeking to learn the
distribution of the data on its own. In such scenarios, the local datasets are
inherently private and agents often do not wish to share them. In this paper,
to address this multi-agent GAN problem, a novel brainstorming GAN (BGAN)
architecture is proposed using which multiple agents can generate real-like
data samples while operating in a fully distributed manner and preserving their
data privacy. BGAN allows the agents to gain information from other agents
without sharing their real datasets but by "brainstorming" via the sharing of
their generated data samples. In contrast to existing distributed GAN
solutions, the proposed BGAN architecture is designed to be fully distributed,
and it does not need any centralized controller. Moreover, BGANs are shown to
be scalable and not dependent on the hyperparameters of the agents' deep neural
networks (DNNs) thus enabling the agents to have different DNN architectures.
Theoretically, the interactions between BGAN agents are analyzed as a game
whose unique Nash equilibrium is derived. Experimental results show that BGAN
can generate real-like data samples with higher quality and lower
Jensen-Shannon divergence (JSD) and Fr\'echet Inception distance (FID) compared
to other distributed GAN architectures.Comment: 13 pages, 16 figures, 3 table
A Colonel Blotto Game for Interdependence-Aware Cyber-Physical Systems Security in Smart Cities
Smart cities must integrate a number of interdependent cyber-physical systems
that operate in a coordinated manner to improve the well-being of the city's
residents. A cyber-physical system (CPS) is a system of computational elements
controlling physical entities. Large-scale CPSs are more vulnerable to attacks
due to the cyber-physical interdependencies that can lead to cascading failures
which can have a significant detrimental effect on a city. In this paper, a
novel approach is proposed for analyzing the problem of allocating security
resources, such as firewalls and anti-malware, over the various cyber
components of an interdependent CPS to protect the system against imminent
attacks. The problem is formulated as a Colonel Blotto game in which the
attacker seeks to allocate its resources to compromise the CPS, while the
defender chooses how to distribute its resources to defend against potential
attacks. To evaluate the effects of defense and attack, various CPS factors are
considered including human-CPS interactions as well as physical and topological
characteristics of a CPS such as flow and capacity of interconnections and
minimum path algorithms. Results show that, for the case in which the attacker
is not aware of the CPS interdependencies, the defender can have a higher
payoff, compared to the case in which the attacker has complete information.
The results also show that, in the case of more symmetric nodes, due to
interdependencies, the defender achieves its highest payoff at the equilibrium
compared to the case with independent, asymmetric nodes