Device authentication is an important element of any strong defense-in-depth strategy for securing cyber-physical, industrial control, and other critical infrastructure systems. However, the current stable of solution...
详细信息
ISBN:
(纸本)9781665476119
Device authentication is an important element of any strong defense-in-depth strategy for securing cyber-physical, industrial control, and other critical infrastructure systems. However, the current stable of solutions available to perform device authentication are not suitable for deployment on many operational technology networks due to the power and processing limitations of legacy and state-of-the-art internet-of-Things devices. In this paper, we propose a machine learning method for passively and non-invasively authenticating or fingerprinting Ethernet devices, at the physical layer (PHY), using their transmitted signals. This technique exploits the unique, intrinsic physical features of a device that are created by the operational characteristics of its discrete physical components. These characteristics are imprinted on a device's communication signal, can be externally monitored to authenticate/authorize registered devices, and can quickly detect the introduction of unknown and/or unauthorized devices. We assess the performance of our proposed technique based on the discrimination power in a device classification scenario.
Unmanned aerial vehicles (UAVs) serve as aerial base stations to provide controlled wireless connections for ground users. Due to their constraints on both mobility and energy consumption, a key problem is how to depl...
详细信息
Unmanned aerial vehicles (UAVs) serve as aerial base stations to provide controlled wireless connections for ground users. Due to their constraints on both mobility and energy consumption, a key problem is how to deploy UAVs adaptively in a geographic area with changing traffic demand of mobile users, while meeting the aforementioned constraints. In this article, we propose a quality of Experience (QoE)-driven and energy-efficient adaptive deployment strategy for multi-UAV networks based on hybrid deep reinforcement learning (DRL) to solve the problem of incomplete information game, where the UAVs can adjust their moving directions and distance to serve users who move randomly in the target area. Through the hybrid DRL with centralized training and distributed testing, UAVs can be trained offline to obtain the global state information and learn a completely distributed control strategy, with which each UAV only needs to take actions based on its observed state in the real deployment to be fully adaptive. Moreover, in order to improve the speed and effect of learning, we improve hybrid reinforcement learning, by adding genetic algorithms and temporal difference error-based resampling optimization mechanism. The simulation results show that the hybrid DRL algorithm has better efficiency and robustness in multi-UAV control, and has better performance in terms of QoE, energy consumption, and average throughput, by which average throughput can be increased by 20%-60%.
IoT smart devices play a pivotal role in power grid systems, contributing to efficient monitoring and control. However, the diverse range of IoT device types and the scarcity of samples pose challenges for accurate de...
详细信息
Digital networked controlsystems are of growing importance in safety-critical systems and perform indispensable function in most complex systems today. networked degradation such as transmission delay cause such syst...
详细信息
Indoor air quality (IAQ) is an important yet often overlooked aspect of public health, with poor IAQ contributing to a significant number of diverse health problems worldwide. Existing air quality standards have faile...
详细信息
In order to solve the problem that IEEE802.15.3c protocol is designed without considering the characteristics oflarge traffic network environment in terahertz wireless local area network, a multi priority MAQMP-MAC) p...
详细信息
ISBN:
(纸本)9781665478960
In order to solve the problem that IEEE802.15.3c protocol is designed without considering the characteristics oflarge traffic network environment in terahertz wireless local area network, a multi priority MAQMP-MAC) protocol is proposed. The MO-MAC protocol uses a backoff algorithm to determine data priority based on nodes and services, dynamically divides Channel Time Allocation (CTA), and uses a backpack algorithm to allocate time slot resources in a competitive access period (CAP). Simulation results show that under the condition of high load, compared with other protocols, this protocol can reasonably allocate time slot resources, has better networkperformance, and ensures the quality of service of high priority services.
The preliminary work of power transmission and transformation engineering design tasks relies on the precise survey of terrain to ensure the high-quality completion of design tasks. Therefore, developing a technology ...
详细信息
The number of internet-based devices is increasing exponentially in day-to-day life. Higher levels of usage results in increased network traffic. It affects the networkperformance rate and quality, thereby leaving a ...
详细信息
ISBN:
(数字)9798350372748
ISBN:
(纸本)9798350372755
The number of internet-based devices is increasing exponentially in day-to-day life. Higher levels of usage results in increased network traffic. It affects the networkperformance rate and quality, thereby leaving a threat to security. network traffic classification is the process that classifies different types of network traffic and identifies solutions to overcome these issues. Efficient classification of Quick UDP internet Connections (QUIC) traffic is crucial for network management. This study focuses on optimizing classification accuracy through ensemble techniques and hyperparameter tuning. Ensemble methods, like bagging and boosting, combine multiple base models to enhance the performance. Hyperparameter optimization fine-tunes these models, controlling their behavior and improving classification accuracy. The research contributes insights into effective ensemble modeling for network protocols, offering practical guidance for QUIC traffic management and optimization. It underscores the significance of hyperparameter optimization in advancing QUIC network classification accuracy, which is crucial for modern internet communication.
With 5G a reality, communication is not only getting faster and better, but also the new verticals, which were so far not serviced by the cellular industry, are supported. One of the areas where 5 G has promising impa...
详细信息
Traditional access control schemes in internet of things (IoT) systems have long been faced with security problems such as single point of failure, data tampering and cross-domain access. In this paper, we study the a...
详细信息
ISBN:
(纸本)9781665454681
Traditional access control schemes in internet of things (IoT) systems have long been faced with security problems such as single point of failure, data tampering and cross-domain access. In this paper, we study the access control problem in an IoT system composed of multiple domains. Applying blockchain technology, we propose a hierarchical blockchain-based access control architecture which consists of two layers of blockchain networks, i.e., global blockchain network and local blockchain network. Based on the proposed architecture, the processes of inter-domain and intra-domain access control are examined, respectively. In order to achieve the secure access of user data in the proposed architecture, we further present a trust-value based access control strategy. To examine the performance of proposed architecture and strategy, we set up an access control simulation platform based on Hyperledger Fabric and verify the feasibility of the proposed architecture and strategy.
暂无评论