Peer-to-peer(P2P)spectrum sharing and energy trading are promising solutions to locally satisfy spectrum and energy demands in power Internet of Things(IoT).However,implementation of largescale P2P spectrum sharing an...Peer-to-peer(P2P)spectrum sharing and energy trading are promising solutions to locally satisfy spectrum and energy demands in power Internet of Things(IoT).However,implementation of largescale P2P spectrum sharing and energy trading confronts security and privacy challenges.In this paper,we exploit consortium blockchain and Directed Acyclic Graph(DAG)to propose a new secure and distributed spectrum sharing and energy trading framework in power IoT,named spectrum-energy chain,where a set of local aggregators(LAGs)cooperatively confirm the identity of the power devices by utilizing consortium blockchain,so as to form a main chain.Then,the local power devices verify spectrum and energy micro-transactions simultaneously but asynchronously to form local spectrum tangle and local energy tangle,respectively.Moreover,an iterative double auction based micro transactions scheme is designed to solve the spectrum and energy pricing and the amount of shared spectrum and energy among power devices.Security analysis and numerical results illustrate that the developed spectrum-energy chain and the designed iterative double auction based microtransactions scheme are secure and efficient for spectrum sharing and energy trading in power IoT.展开更多
Machine learning has a powerful potential for performing the template attack(TA) of cryptographic device. To improve the accuracy and time consuming of electromagnetic template attack(ETA), a multi-class directed acyc...Machine learning has a powerful potential for performing the template attack(TA) of cryptographic device. To improve the accuracy and time consuming of electromagnetic template attack(ETA), a multi-class directed acyclic graph support vector machine(DAGSVM) method is proposed to predict the Hamming weight of the key. The method needs to generate K(K ? 1)/2 binary support vector machine(SVM) classifiers and realizes the K-class prediction using a rooted binary directed acyclic graph(DAG) testing model. Further, particle swarm optimization(PSO) is used for optimal selection of DAGSVM model parameters to improve the performance of DAGSVM. By exploiting the electromagnetic emanations captured while a chip was implementing the RC4 algorithm in software, the computation complexity and performance of several multi-class machine learning methods, such as DAGSVM, one-versus-one(OVO)SVM, one-versus-all(OVA)SVM, Probabilistic neural networks(PNN), K-means clustering and fuzzy neural network(FNN) are investigated. In the same scenario, the highest classification accuracy of Hamming weight for the key reached 100%, 95.33%, 85%, 74%, 49.67% and 38% for DAGSVM, OVOSVM, OVASVM, PNN, K-means and FNN, respectively. The experiment results demonstrate the proposed model performs higher predictive accuracy and faster convergence speed.展开更多
In view of the fact that current data delivery methods are not enough to meet the security requirements of today’s distributed crowd sensing,and the data delivery methods are not flexible enough,this paper proposes a...In view of the fact that current data delivery methods are not enough to meet the security requirements of today’s distributed crowd sensing,and the data delivery methods are not flexible enough,this paper proposes a crowd sensing data interaction method based on tangle directed acyclic graph(DAG)network.In this method,users and platforms are regarded as nodes of the network in the process of performing crowd sensing tasks.First,the heaviest chain is generated through the main chain strategy to ensure the stability of the network.Then,the hidden Markov model(HMM)prediction model is used to improve the correlation of the perceived data to improve the performance.Then,the confidential transaction and commitment algorithm is used to ensure the reliability of the transaction,overcome the security risks faced by the trusted third party,and simplify the group intelligence aware transaction mode.Finally,through simulation experiments,the security and feasibility of the group intelligence aware data delivery method based on tangle DAG network are verified.展开更多
Internet of things(IoT) can provide the function of product traceability for industrial systems. Emerging blockchain technology can solve the problem that the current industrial Internet of things(IIoT) system lacks u...Internet of things(IoT) can provide the function of product traceability for industrial systems. Emerging blockchain technology can solve the problem that the current industrial Internet of things(IIoT) system lacks unified product data sharing services. Blockchain technology based on the directed acyclic graph(DAG) structure is more suitable for high concurrency environments. But due to its distributed architecture foundation, direct storage of product data will cause authentication problems in data management. In response, IIoT based on DAG blockchain is proposed in this paper, which can provide efficient data management for product data stored on DAG blockchain, and an authentication scheme suitable for this structure is given. The security of the scheme is based on a discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai and Wolf(LRSW) who also show that it holds for generic groups. The sequential aggregation signature scheme is more secure and efficient, and the new scheme is safe in theory and it is more efficient in engineering.展开更多
Advanced Persistent Threat (APT) attack, an attack option in recent years, poses serious threats to the security of governments and enterprises data due to its advanced and persistent attacking characteristics. To a...Advanced Persistent Threat (APT) attack, an attack option in recent years, poses serious threats to the security of governments and enterprises data due to its advanced and persistent attacking characteristics. To address this issue, a security policy of big data analysis has been proposed based on the analysis of log data of servers and terminals in Spark. However, in practical applications, Spark cannot suitably analyze very huge amounts of log data. To address this problem, we propose a scheduling optimization technique based on the reuse of datasets to improve Spark performance. In this technique, we define and formulate the reuse degree of Directed Acyclic Graphs (DAGs) in Spark based on Resilient Distributed Datasets (RDDs). Then, we define a global optimization function to obtain the optimal DAG sequence, that is, the sequence with the least execution time. To implement the global optimization function, we further propose a novel cost optimization algorithm based on the traditional Genetic Algorithm (GA). Our experiments demonstrate that this scheduling optimization technique in Spark can greatly decrease the time overhead of analyzing log data for detecting APT attacks.展开更多
基金supported by the National Key R&D Program of China(2020YFB1807801,2020YFB1807800)in part by Project Supported by Engineering Research Center of Mobile Communications,Ministry of Education(cqupt-mct-202003)+2 种基金in part by Key Lab of Information Network Security,Ministry of Public Security under Grant C19603in part by National Natural Science Foundation of China(Grant No.61901067 and 61901013)in part by Chongqing Municipal Natural Science Foundation(Grant No.cstc2020jcyj-msxmX0339).
文摘Peer-to-peer(P2P)spectrum sharing and energy trading are promising solutions to locally satisfy spectrum and energy demands in power Internet of Things(IoT).However,implementation of largescale P2P spectrum sharing and energy trading confronts security and privacy challenges.In this paper,we exploit consortium blockchain and Directed Acyclic Graph(DAG)to propose a new secure and distributed spectrum sharing and energy trading framework in power IoT,named spectrum-energy chain,where a set of local aggregators(LAGs)cooperatively confirm the identity of the power devices by utilizing consortium blockchain,so as to form a main chain.Then,the local power devices verify spectrum and energy micro-transactions simultaneously but asynchronously to form local spectrum tangle and local energy tangle,respectively.Moreover,an iterative double auction based micro transactions scheme is designed to solve the spectrum and energy pricing and the amount of shared spectrum and energy among power devices.Security analysis and numerical results illustrate that the developed spectrum-energy chain and the designed iterative double auction based microtransactions scheme are secure and efficient for spectrum sharing and energy trading in power IoT.
基金supported by the National Natural Science Foundation of China(61571063,61202399,61171051)
文摘Machine learning has a powerful potential for performing the template attack(TA) of cryptographic device. To improve the accuracy and time consuming of electromagnetic template attack(ETA), a multi-class directed acyclic graph support vector machine(DAGSVM) method is proposed to predict the Hamming weight of the key. The method needs to generate K(K ? 1)/2 binary support vector machine(SVM) classifiers and realizes the K-class prediction using a rooted binary directed acyclic graph(DAG) testing model. Further, particle swarm optimization(PSO) is used for optimal selection of DAGSVM model parameters to improve the performance of DAGSVM. By exploiting the electromagnetic emanations captured while a chip was implementing the RC4 algorithm in software, the computation complexity and performance of several multi-class machine learning methods, such as DAGSVM, one-versus-one(OVO)SVM, one-versus-all(OVA)SVM, Probabilistic neural networks(PNN), K-means clustering and fuzzy neural network(FNN) are investigated. In the same scenario, the highest classification accuracy of Hamming weight for the key reached 100%, 95.33%, 85%, 74%, 49.67% and 38% for DAGSVM, OVOSVM, OVASVM, PNN, K-means and FNN, respectively. The experiment results demonstrate the proposed model performs higher predictive accuracy and faster convergence speed.
文摘In view of the fact that current data delivery methods are not enough to meet the security requirements of today’s distributed crowd sensing,and the data delivery methods are not flexible enough,this paper proposes a crowd sensing data interaction method based on tangle directed acyclic graph(DAG)network.In this method,users and platforms are regarded as nodes of the network in the process of performing crowd sensing tasks.First,the heaviest chain is generated through the main chain strategy to ensure the stability of the network.Then,the hidden Markov model(HMM)prediction model is used to improve the correlation of the perceived data to improve the performance.Then,the confidential transaction and commitment algorithm is used to ensure the reliability of the transaction,overcome the security risks faced by the trusted third party,and simplify the group intelligence aware transaction mode.Finally,through simulation experiments,the security and feasibility of the group intelligence aware data delivery method based on tangle DAG network are verified.
基金supported in part by the Natural Science Foundation of Chongqing (cstc2020jcyj-msxmX0343)in part by the National Defense Basic Scientific Research Program(JCKY2020205C013)。
文摘Internet of things(IoT) can provide the function of product traceability for industrial systems. Emerging blockchain technology can solve the problem that the current industrial Internet of things(IIoT) system lacks unified product data sharing services. Blockchain technology based on the directed acyclic graph(DAG) structure is more suitable for high concurrency environments. But due to its distributed architecture foundation, direct storage of product data will cause authentication problems in data management. In response, IIoT based on DAG blockchain is proposed in this paper, which can provide efficient data management for product data stored on DAG blockchain, and an authentication scheme suitable for this structure is given. The security of the scheme is based on a discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai and Wolf(LRSW) who also show that it holds for generic groups. The sequential aggregation signature scheme is more secure and efficient, and the new scheme is safe in theory and it is more efficient in engineering.
基金supported by the National Natural Science Foundation of China (Nos. 61379144, 61572026, 61672195, and 61501482)the Open Foundation of State Key Laboratory of Cryptology
文摘Advanced Persistent Threat (APT) attack, an attack option in recent years, poses serious threats to the security of governments and enterprises data due to its advanced and persistent attacking characteristics. To address this issue, a security policy of big data analysis has been proposed based on the analysis of log data of servers and terminals in Spark. However, in practical applications, Spark cannot suitably analyze very huge amounts of log data. To address this problem, we propose a scheduling optimization technique based on the reuse of datasets to improve Spark performance. In this technique, we define and formulate the reuse degree of Directed Acyclic Graphs (DAGs) in Spark based on Resilient Distributed Datasets (RDDs). Then, we define a global optimization function to obtain the optimal DAG sequence, that is, the sequence with the least execution time. To implement the global optimization function, we further propose a novel cost optimization algorithm based on the traditional Genetic Algorithm (GA). Our experiments demonstrate that this scheduling optimization technique in Spark can greatly decrease the time overhead of analyzing log data for detecting APT attacks.