Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, dif...Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, different sensor nodes can cooperate and compose with each other to complete more complicated tasks for user. However, because of the regional characteristic of sensor nodes, merging data with different sensitivities become a primary requirement to the composite services, and information flow security should be intensively considered during service composition. In order to mitigate the great cost caused by the complexity of modeling and the heavy load of single-node verification to the energy-limited sensor node, in this paper, we propose a new distributed verification framework to enforce information flow security on composite services of smart sensor network. We analyze the information flows in composite services and specify security constraints for each service participant. Then we propose an algorithm over the distributed verification framework involving each sensor node to participate in the composite service verification based on the security constraints. The experimental results indicate that our approach can reduce the cost of verification and provide a better load balance.展开更多
With the large-scale application of 5G technology in smart distribution networks,the operation effects of distribution networks are not clear.Herein,we propose a comprehensive evaluation model of a 5G+smart distributi...With the large-scale application of 5G technology in smart distribution networks,the operation effects of distribution networks are not clear.Herein,we propose a comprehensive evaluation model of a 5G+smart distribution network based on the combination weighting and cloud model of the improved Fuzzy Analytic Hierarchy-Entropy Weight Method(FAHP-EWM).First,we establish comprehensive evaluation indexes of a 5G+smart distribution network from five dimensions:reliable operation,economic operation,efficient interaction,technological intelligence,and green emission reduction.Second,by introducing the principle of variance minimization,we propose a combined weighting method based on the improved FAHP-EWM to calculate the comprehensive weight,so as to reduce the defects of subjective arbitrariness and promote objectivity.Finally,a comprehensive evaluation model of 5G+smart distribution network based on cloud model is proposed by considering the uncertainty of distribution network node information and equipment status information.The example analysis indicates that the overall operation of the 5G+smart distribution network project is decent,and the weight value calculated by the combined weighting method is more reasonable and accurate than that calculated by the single weighting method,which verifies the effectiveness and rationality of the proposed evaluation method.Moreover,the proposed evaluation method has a certain guiding role for the large-scale application of 5G communication technology in smart distribution networks.展开更多
Previous work puts forward a random edge rewiring method which is capable of improving the network robustness noticeably, while it lacks further discussions about how to improve the robustness faster. In this study, t...Previous work puts forward a random edge rewiring method which is capable of improving the network robustness noticeably, while it lacks further discussions about how to improve the robustness faster. In this study, the detailed analysis of the structures of improved networks show that regenerating the edges between high-degree nodes can enhance the robustness against a targeted attack. Therefore, we propose a novel rewiring strategy based on regenerating more edges between high-degree nodes, called smart rewiring, which could speed up the increase of the robustness index effectively. The smart rewiring method also explains why positive degree-degree correlation could enhance network robustness.展开更多
The concept of smart city gives an excellent resolution to construct and develop modern cities, and also demands infrastructure construction. How to build a safe, stable, and highly efficient public transportation sys...The concept of smart city gives an excellent resolution to construct and develop modern cities, and also demands infrastructure construction. How to build a safe, stable, and highly efficient public transportation system becomes an important topic in the process of city construction. In this work, we study the structural and robustness properties of transportation networks and their sub-networks. We introduce a complementary network model to study the relevance and complementarity between bus network and subway network. Our numerical results show that the mutual supplement of networks can improve the network robustness. This conclusion provides a theoretical basis for the construction of public traffic networks, and it also supports reasonable operation of managing smart cities.展开更多
Wireless body area networks (WBANs) use RF communication for interconnection of tiny sensor nodes located in, on, or in close prox- imity to the human body. A WBAN enables physiological signals, physical activity, a...Wireless body area networks (WBANs) use RF communication for interconnection of tiny sensor nodes located in, on, or in close prox- imity to the human body. A WBAN enables physiological signals, physical activity, and body position to be continuously monitored.展开更多
In The Wireless Multimedia Sensor Network(WNSMs)have achieved popularity among diverse communities as a result of technological breakthroughs in sensor and current gadgets.By utilising portable technologies,it achieve...In The Wireless Multimedia Sensor Network(WNSMs)have achieved popularity among diverse communities as a result of technological breakthroughs in sensor and current gadgets.By utilising portable technologies,it achieves solid and significant results in wireless communication,media transfer,and digital transmission.Sensor nodes have been used in agriculture and industry to detect characteristics such as temperature,moisture content,and other environmental conditions in recent decades.WNSMs have also made apps easier to use by giving devices self-governing access to send and process data connected with appro-priate audio and video information.Many video sensor network studies focus on lowering power consumption and increasing transmission capacity,but the main demand is data reliability.Because of the obstacles in the sensor nodes,WMSN is subjected to a variety of attacks,including Denial of Service(DoS)attacks.Deep Convolutional Neural Network is designed with the stateaction relationship mapping which is used to identify the DDOS Attackers present in the Wireless Sensor Networks for Smart Agriculture.The Proposed work it performs the data collection about the traffic conditions and identifies the deviation between the network conditions such as packet loss due to network congestion and the presence of attackers in the network.It reduces the attacker detection delay and improves the detection accuracy.In order to protect the network against DoS assaults,an improved machine learning technique must be offered.An efficient Deep Neural Network approach is provided for detecting DoS in WMSN.The required parameters are selected using an adaptive particle swarm optimization technique.The ratio of packet transmission,energy consumption,latency,network length,and throughput will be used to evaluate the approach’s efficiency.展开更多
The smart distribution network(SDN)is integrat ing increasing distributed generation(DG)and energy storage(ES).Hosting capacity evaluation is important for SDN plan ning with DG.DG and ES are usually invested by users...The smart distribution network(SDN)is integrat ing increasing distributed generation(DG)and energy storage(ES).Hosting capacity evaluation is important for SDN plan ning with DG.DG and ES are usually invested by users or a third party,and they may form friendly microgrids(MGs)and operate independently.Traditional centralized dispatching meth od no longer suits for hosting capacity evaluation of SDN.A quick hosting capacity evaluation method based on distributed optimal dispatching is proposed.Firstly,a multi-objective DG hosting capacity evaluation model is established,and the host ing capacity for DG is determined by the optimal DG planning schemes.The steady-state security region method is applied to speed up the solving process of the DG hosting capacity evalua tion model.Then,the optimal dispatching models are estab lished for MG and SDN respectively to realize the operating simulation.Under the distributed dispatching strategy,the dual-side optimal operation of SDN-MGs can be realized by several iterations of power exchange requirement.Finally,an SDN with four MGs is conducted considering multiple flexible resources.It shows that the DG hosting capacity of SDN oversteps the sum of the maximum active power demand and the rated branch capacity.Besides,the annual DG electricity oversteps the maximum active power demand value.展开更多
A major problem in networking has always been energy consumption.Battery life is one parameter which could help improve Energy Efficiency.Existing research on wireless networking stresses on reducing signaling message...A major problem in networking has always been energy consumption.Battery life is one parameter which could help improve Energy Efficiency.Existing research on wireless networking stresses on reducing signaling messages or time required for data transfer for addressing energy consumption issues.Routing or Forwarding packets in a network between the network elements like routers,switches,wireless access points,etc.,is complex in conventional networks.With the advent of Software Defined Networking(SDN)for 5G network architectures,the distributed networking has embarked onto centralized networking,wherein the SDN Controller is responsible for decision making.The controller pushes its decision onto the network elements with the help of a control plane protocol termed OpenFlow.Decentralized networks have been largely in use because of their ease in physical and logically setting the administrative hierarchies.The centralized controller deals with the policy funding and the protocols used for routing procedures are designated by the decentralized controller.Ambience Awake is a location centered routing protocol deployed in the 5G network architecture with OpenFlow model.The Ambience Awake mechanism relies on the power consumption of the network elements during the packet transmission for unicast and multicast scenarios.The signalling load and the routing overhead witnessed an improvement of 30%during the routing procedure.The proposed routing mechanism run on the top of the decentralized SDN controller proves to be 19.59%more efficient than the existing routing solutions.展开更多
Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of t...Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of terminals in the assignment and inadequate network server management. Thus, in this paper, we propose an Overall-transparent Dynamic Identifier-mapping Mechanism(ODIM) to manage the identifier of network nodes to defend against scanning and worm propagation in the Smart Identifier NETwork(SINET). We establish the selection and allocation constraints, and present selection and allocation algorithms to determine the constraints. The non-repetition probability and cover cycle allow us to evaluate the defense efficiency against scanning. We propose the probability for routing identifiers and derive the defense efficiency of ODIM against worm propagation. Simulation results and theoretical analysis show that the proposed method effectively reduces the detection probability of Routing IDentifiers(RIDs) and thus improves defense capabilities against worm propagation.展开更多
Emergence of new hardware,including persistent memory and smart network interface card(SmartNIC),has brought new opportunities to file system design.In this paper,we design and implement a new file system named NICFS ...Emergence of new hardware,including persistent memory and smart network interface card(SmartNIC),has brought new opportunities to file system design.In this paper,we design and implement a new file system named NICFS based on persistent memory and SmartNIC.We divide the file system into two parts:the front end and the back end.In the front end,data writes are appended to the persistent memory in a log-structured way,leveraging the fast persistence advantage of persistent memory.In the back end,the data in logs are fetched,processed,and patched to files in the background,leveraging the processing capacity of SmartNIC.Evaluation results show that NICFS outperforms Ext4 by about 21%/10%and about 19%/50%on large and small reads/writes,respectively.展开更多
Trends toward the globalization of the manufacturing industry and the increasing demands for small-batch,short-cycle,and highly customized products result in complexities and fluctuations in both external and internal...Trends toward the globalization of the manufacturing industry and the increasing demands for small-batch,short-cycle,and highly customized products result in complexities and fluctuations in both external and internal manufacturing environments,which poses great challenges to manufacturing enterprises.Fortunately,recent advances in the Industrial Internet of Things(IIoT)and the widespread use of embedded processors and sensors in factories enable collecting real-time manufacturing status data and building cyber–physical systems for smart,flexible,and resilient manufacturing systems.In this context,this paper investigates the mechanisms and methodology of self-organization and self-adaption to tackle exceptions and disturbances in discrete manufacturing processes.Specifically,a general model of smart manufacturing complex networks is constructed using scale-free networks to interconnect heterogeneous manufacturing resources represented by network vertices at multiple levels.Moreover,the capabilities of physical manufacturing resources are encapsulated into virtual manufacturing services using cloud technology,which can be added to or removed from the networks in a plug-and-play manner.Materials,information,and financial assets are passed through interactive links across the networks.Subsequently,analytical target cascading is used to formulate the processes of self-organizing optimal configuration and self-adaptive collaborative control for multilevel key manufacturing resources while particle swarm optimization is used to solve local problems on network vertices.Consequently,an industrial case based on a Chinese engine factory demonstrates the feasibility and efficiency of the proposed model and method in handling typical exceptions.The simulation results show that the proposed mechanism and method outperform the event-triggered rescheduling method,reducing manufacturing cost,manufacturing time,waiting time,and energy consumption,with reasonable computational time.This work potentially enables managers and practitioners to implement active perception,active response,self-organization,and self-adaption solutions in discrete manufacturing enterprises.展开更多
The massive integration of communication and information technology with the large-scale power grid has enhanced the efficiency, safety, and economical operation of cyber-physical systems. However, the open and divers...The massive integration of communication and information technology with the large-scale power grid has enhanced the efficiency, safety, and economical operation of cyber-physical systems. However, the open and diversified communication environment of the smart grid is exposed to cyber-attacks. Data integrity attacks that can bypass conventional security techniques have been considered critical threats to the operation of the grid. Current detection techniques cannot learn the dynamic and heterogeneous characteristics of the smart grid and are unable to deal with non-euclidean data types. To address the issue, we propose a novel Deep-Q-Network scheme empowered with a graph convolutional network (GCN) framework to detect data integrity attacks in cyber-physical systems. The simulation results show that the proposed framework is scalable and achieves higher detection accuracy, unlike other benchmark techniques.展开更多
The popularization of intelligent healthcare devices and big data analytics significantly boosts the development of Smart Healthcare Networks(SHNs).To enhance the precision of diagnosis,different participants in SHNs ...The popularization of intelligent healthcare devices and big data analytics significantly boosts the development of Smart Healthcare Networks(SHNs).To enhance the precision of diagnosis,different participants in SHNs share health data that contain sensitive information.Therefore,the data exchange process raises privacy concerns,especially when the integration of health data from multiple sources(linkage attack)results in further leakage.Linkage attack is a type of dominant attack in the privacy domain,which can leverage various data sources for private data mining.Furthermore,adversaries launch poisoning attacks to falsify the health data,which leads to misdiagnosing or even physical damage.To protect private health data,we propose a personalized differential privacy model based on the trust levels among users.The trust is evaluated by a defined community density,while the corresponding privacy protection level is mapped to controllable randomized noise constrained by differential privacy.To avoid linkage attacks in personalized differential privacy,we design a noise correlation decoupling mechanism using a Markov stochastic process.In addition,we build the community model on a blockchain,which can mitigate the risk of poisoning attacks during differentially private data transmission over SHNs.Extensive experiments and analysis on real-world datasets have testified the proposed model,and achieved better performance compared with existing research from perspectives of privacy protection and effectiveness.展开更多
基金supported in part by National Natural Science Foundation of China(61502368,61303033,U1135002 and U1405255)the National High Technology Research and Development Program(863 Program)of China(No.2015AA017203)+1 种基金the Fundamental Research Funds for the Central Universities(XJS14072,JB150308)the Aviation Science Foundation of China(No.2013ZC31003,20141931001)
文摘Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, different sensor nodes can cooperate and compose with each other to complete more complicated tasks for user. However, because of the regional characteristic of sensor nodes, merging data with different sensitivities become a primary requirement to the composite services, and information flow security should be intensively considered during service composition. In order to mitigate the great cost caused by the complexity of modeling and the heavy load of single-node verification to the energy-limited sensor node, in this paper, we propose a new distributed verification framework to enforce information flow security on composite services of smart sensor network. We analyze the information flows in composite services and specify security constraints for each service participant. Then we propose an algorithm over the distributed verification framework involving each sensor node to participate in the composite service verification based on the security constraints. The experimental results indicate that our approach can reduce the cost of verification and provide a better load balance.
基金supported by the State Grid Corporation of China(KJ21-1-56).
文摘With the large-scale application of 5G technology in smart distribution networks,the operation effects of distribution networks are not clear.Herein,we propose a comprehensive evaluation model of a 5G+smart distribution network based on the combination weighting and cloud model of the improved Fuzzy Analytic Hierarchy-Entropy Weight Method(FAHP-EWM).First,we establish comprehensive evaluation indexes of a 5G+smart distribution network from five dimensions:reliable operation,economic operation,efficient interaction,technological intelligence,and green emission reduction.Second,by introducing the principle of variance minimization,we propose a combined weighting method based on the improved FAHP-EWM to calculate the comprehensive weight,so as to reduce the defects of subjective arbitrariness and promote objectivity.Finally,a comprehensive evaluation model of 5G+smart distribution network based on cloud model is proposed by considering the uncertainty of distribution network node information and equipment status information.The example analysis indicates that the overall operation of the 5G+smart distribution network project is decent,and the weight value calculated by the combined weighting method is more reasonable and accurate than that calculated by the single weighting method,which verifies the effectiveness and rationality of the proposed evaluation method.Moreover,the proposed evaluation method has a certain guiding role for the large-scale application of 5G communication technology in smart distribution networks.
基金Supported by the Open Cooperation Research in National University of Defense Technology(NUDT)under Grant No 2014021the Graduate Innovation Fund of NUDT under Grant No B150501
文摘Previous work puts forward a random edge rewiring method which is capable of improving the network robustness noticeably, while it lacks further discussions about how to improve the robustness faster. In this study, the detailed analysis of the structures of improved networks show that regenerating the edges between high-degree nodes can enhance the robustness against a targeted attack. Therefore, we propose a novel rewiring strategy based on regenerating more edges between high-degree nodes, called smart rewiring, which could speed up the increase of the robustness index effectively. The smart rewiring method also explains why positive degree-degree correlation could enhance network robustness.
基金Project supported by the Major Projects of the China National Social Science Fund(Grant No.11&ZD154)
文摘The concept of smart city gives an excellent resolution to construct and develop modern cities, and also demands infrastructure construction. How to build a safe, stable, and highly efficient public transportation system becomes an important topic in the process of city construction. In this work, we study the structural and robustness properties of transportation networks and their sub-networks. We introduce a complementary network model to study the relevance and complementarity between bus network and subway network. Our numerical results show that the mutual supplement of networks can improve the network robustness. This conclusion provides a theoretical basis for the construction of public traffic networks, and it also supports reasonable operation of managing smart cities.
文摘Wireless body area networks (WBANs) use RF communication for interconnection of tiny sensor nodes located in, on, or in close prox- imity to the human body. A WBAN enables physiological signals, physical activity, and body position to be continuously monitored.
文摘In The Wireless Multimedia Sensor Network(WNSMs)have achieved popularity among diverse communities as a result of technological breakthroughs in sensor and current gadgets.By utilising portable technologies,it achieves solid and significant results in wireless communication,media transfer,and digital transmission.Sensor nodes have been used in agriculture and industry to detect characteristics such as temperature,moisture content,and other environmental conditions in recent decades.WNSMs have also made apps easier to use by giving devices self-governing access to send and process data connected with appro-priate audio and video information.Many video sensor network studies focus on lowering power consumption and increasing transmission capacity,but the main demand is data reliability.Because of the obstacles in the sensor nodes,WMSN is subjected to a variety of attacks,including Denial of Service(DoS)attacks.Deep Convolutional Neural Network is designed with the stateaction relationship mapping which is used to identify the DDOS Attackers present in the Wireless Sensor Networks for Smart Agriculture.The Proposed work it performs the data collection about the traffic conditions and identifies the deviation between the network conditions such as packet loss due to network congestion and the presence of attackers in the network.It reduces the attacker detection delay and improves the detection accuracy.In order to protect the network against DoS assaults,an improved machine learning technique must be offered.An efficient Deep Neural Network approach is provided for detecting DoS in WMSN.The required parameters are selected using an adaptive particle swarm optimization technique.The ratio of packet transmission,energy consumption,latency,network length,and throughput will be used to evaluate the approach’s efficiency.
基金supported in part by the State Grid Scientific and Technological Projects of China(No.SGTYHT/21-JS-223)in part by the National Natural Science Foundation of China(No.52277118),in part by the Tianjin Science and Technology Planning Project(No.22ZLGCGX00050)in part by the 67th Postdoctoral Fund and Independent Innovation Fund of Tianjin University in 2021.
文摘The smart distribution network(SDN)is integrat ing increasing distributed generation(DG)and energy storage(ES).Hosting capacity evaluation is important for SDN plan ning with DG.DG and ES are usually invested by users or a third party,and they may form friendly microgrids(MGs)and operate independently.Traditional centralized dispatching meth od no longer suits for hosting capacity evaluation of SDN.A quick hosting capacity evaluation method based on distributed optimal dispatching is proposed.Firstly,a multi-objective DG hosting capacity evaluation model is established,and the host ing capacity for DG is determined by the optimal DG planning schemes.The steady-state security region method is applied to speed up the solving process of the DG hosting capacity evalua tion model.Then,the optimal dispatching models are estab lished for MG and SDN respectively to realize the operating simulation.Under the distributed dispatching strategy,the dual-side optimal operation of SDN-MGs can be realized by several iterations of power exchange requirement.Finally,an SDN with four MGs is conducted considering multiple flexible resources.It shows that the DG hosting capacity of SDN oversteps the sum of the maximum active power demand and the rated branch capacity.Besides,the annual DG electricity oversteps the maximum active power demand value.
文摘A major problem in networking has always been energy consumption.Battery life is one parameter which could help improve Energy Efficiency.Existing research on wireless networking stresses on reducing signaling messages or time required for data transfer for addressing energy consumption issues.Routing or Forwarding packets in a network between the network elements like routers,switches,wireless access points,etc.,is complex in conventional networks.With the advent of Software Defined Networking(SDN)for 5G network architectures,the distributed networking has embarked onto centralized networking,wherein the SDN Controller is responsible for decision making.The controller pushes its decision onto the network elements with the help of a control plane protocol termed OpenFlow.Decentralized networks have been largely in use because of their ease in physical and logically setting the administrative hierarchies.The centralized controller deals with the policy funding and the protocols used for routing procedures are designated by the decentralized controller.Ambience Awake is a location centered routing protocol deployed in the 5G network architecture with OpenFlow model.The Ambience Awake mechanism relies on the power consumption of the network elements during the packet transmission for unicast and multicast scenarios.The signalling load and the routing overhead witnessed an improvement of 30%during the routing procedure.The proposed routing mechanism run on the top of the decentralized SDN controller proves to be 19.59%more efficient than the existing routing solutions.
文摘Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of terminals in the assignment and inadequate network server management. Thus, in this paper, we propose an Overall-transparent Dynamic Identifier-mapping Mechanism(ODIM) to manage the identifier of network nodes to defend against scanning and worm propagation in the Smart Identifier NETwork(SINET). We establish the selection and allocation constraints, and present selection and allocation algorithms to determine the constraints. The non-repetition probability and cover cycle allow us to evaluate the defense efficiency against scanning. We propose the probability for routing identifiers and derive the defense efficiency of ODIM against worm propagation. Simulation results and theoretical analysis show that the proposed method effectively reduces the detection probability of Routing IDentifiers(RIDs) and thus improves defense capabilities against worm propagation.
基金Project supported by the National Key R&D Program of China(No.2021YFB0300500)the National Natural Science Foundation of China(No.62022051)。
文摘Emergence of new hardware,including persistent memory and smart network interface card(SmartNIC),has brought new opportunities to file system design.In this paper,we design and implement a new file system named NICFS based on persistent memory and SmartNIC.We divide the file system into two parts:the front end and the back end.In the front end,data writes are appended to the persistent memory in a log-structured way,leveraging the fast persistence advantage of persistent memory.In the back end,the data in logs are fetched,processed,and patched to files in the background,leveraging the processing capacity of SmartNIC.Evaluation results show that NICFS outperforms Ext4 by about 21%/10%and about 19%/50%on large and small reads/writes,respectively.
基金This paper was funded by the Key Program of the National Natural Science Foundation of China(Grant No.U2001201)the Project funded by China Postdoctoral Science Foundation(Grant No.2022M712591)the Fundamental Research Funds for the Central Universities.
文摘Trends toward the globalization of the manufacturing industry and the increasing demands for small-batch,short-cycle,and highly customized products result in complexities and fluctuations in both external and internal manufacturing environments,which poses great challenges to manufacturing enterprises.Fortunately,recent advances in the Industrial Internet of Things(IIoT)and the widespread use of embedded processors and sensors in factories enable collecting real-time manufacturing status data and building cyber–physical systems for smart,flexible,and resilient manufacturing systems.In this context,this paper investigates the mechanisms and methodology of self-organization and self-adaption to tackle exceptions and disturbances in discrete manufacturing processes.Specifically,a general model of smart manufacturing complex networks is constructed using scale-free networks to interconnect heterogeneous manufacturing resources represented by network vertices at multiple levels.Moreover,the capabilities of physical manufacturing resources are encapsulated into virtual manufacturing services using cloud technology,which can be added to or removed from the networks in a plug-and-play manner.Materials,information,and financial assets are passed through interactive links across the networks.Subsequently,analytical target cascading is used to formulate the processes of self-organizing optimal configuration and self-adaptive collaborative control for multilevel key manufacturing resources while particle swarm optimization is used to solve local problems on network vertices.Consequently,an industrial case based on a Chinese engine factory demonstrates the feasibility and efficiency of the proposed model and method in handling typical exceptions.The simulation results show that the proposed mechanism and method outperform the event-triggered rescheduling method,reducing manufacturing cost,manufacturing time,waiting time,and energy consumption,with reasonable computational time.This work potentially enables managers and practitioners to implement active perception,active response,self-organization,and self-adaption solutions in discrete manufacturing enterprises.
文摘The massive integration of communication and information technology with the large-scale power grid has enhanced the efficiency, safety, and economical operation of cyber-physical systems. However, the open and diversified communication environment of the smart grid is exposed to cyber-attacks. Data integrity attacks that can bypass conventional security techniques have been considered critical threats to the operation of the grid. Current detection techniques cannot learn the dynamic and heterogeneous characteristics of the smart grid and are unable to deal with non-euclidean data types. To address the issue, we propose a novel Deep-Q-Network scheme empowered with a graph convolutional network (GCN) framework to detect data integrity attacks in cyber-physical systems. The simulation results show that the proposed framework is scalable and achieves higher detection accuracy, unlike other benchmark techniques.
基金supported by the National Key Research and Development Program of China(No.2021YFF0900400).
文摘The popularization of intelligent healthcare devices and big data analytics significantly boosts the development of Smart Healthcare Networks(SHNs).To enhance the precision of diagnosis,different participants in SHNs share health data that contain sensitive information.Therefore,the data exchange process raises privacy concerns,especially when the integration of health data from multiple sources(linkage attack)results in further leakage.Linkage attack is a type of dominant attack in the privacy domain,which can leverage various data sources for private data mining.Furthermore,adversaries launch poisoning attacks to falsify the health data,which leads to misdiagnosing or even physical damage.To protect private health data,we propose a personalized differential privacy model based on the trust levels among users.The trust is evaluated by a defined community density,while the corresponding privacy protection level is mapped to controllable randomized noise constrained by differential privacy.To avoid linkage attacks in personalized differential privacy,we design a noise correlation decoupling mechanism using a Markov stochastic process.In addition,we build the community model on a blockchain,which can mitigate the risk of poisoning attacks during differentially private data transmission over SHNs.Extensive experiments and analysis on real-world datasets have testified the proposed model,and achieved better performance compared with existing research from perspectives of privacy protection and effectiveness.