期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A Probabilistic Trust Model and Control Algorithm to Protect 6G Networks against Malicious Data Injection Attacks in Edge Computing Environments
1
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期631-654,共24页
Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control l... Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control loops critical for managing Industry 5.0 deployments,digital agriculture systems,and essential infrastructures.The provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and unsupervised.While full automation will enhance industrial efficiency significantly,it concurrently introduces new cyber risks and vulnerabilities.In particular,unattended systems are highly susceptible to trust issues:malicious nodes and false information can be easily introduced into control loops.Additionally,Denialof-Service attacks can be executed by inundating the network with valueless noise.Current anomaly detection schemes require the entire transformation of the control software to integrate new steps and can only mitigate anomalies that conform to predefined mathematical models.Solutions based on an exhaustive data collection to detect anomalies are precise but extremely slow.Standard models,with their limited understanding of mobile networks,can achieve precision rates no higher than 75%.Therefore,more general and transversal protection mechanisms are needed to detect malicious behaviors transparently.This paper introduces a probabilistic trust model and control algorithm designed to address this gap.The model determines the probability of any node to be trustworthy.Communication channels are pruned for those nodes whose probability is below a given threshold.The trust control algorithmcomprises three primary phases,which feed themodel with three different probabilities,which are weighted and combined.Initially,anomalous nodes are identified using Gaussian mixture models and clustering technologies.Next,traffic patterns are studied using digital Bessel functions and the functional scalar product.Finally,the information coherence and content are analyzed.The noise content and abnormal information sequences are detected using a Volterra filter and a bank of Finite Impulse Response filters.An experimental validation based on simulation tools and environments was carried out.Results show the proposed solution can successfully detect up to 92%of malicious data injection attacks. 展开更多
关键词 6G networks noise injection attacks Gaussian mixture model Bessel function traffic filter Volterra filter
下载PDF
Novel distributed passive vehicle tracking technology using phase sensitive optical time domain reflectometer 被引量:3
2
作者 王照勇 潘政清 +4 位作者 叶青 卢斌 方祖捷 蔡海文 瞿荣辉 《Chinese Optics Letters》 SCIE EI CAS CSCD 2015年第10期30-34,共5页
A novel distributed passive vehicle tracking technology is proposed and demonstrated. This technology is based on a phase-sensitive optical time domain reflectometer(Φ-OTDR) that can sense and locate vibrations. Tw... A novel distributed passive vehicle tracking technology is proposed and demonstrated. This technology is based on a phase-sensitive optical time domain reflectometer(Φ-OTDR) that can sense and locate vibrations. Two algorithms, dynamic frequency-space image and 2D digital sliding filtering, are proposed to distinguish a car's moving signals from severe environmental noises and disturbances. This technology is proved effective by field experiments for tracking a single car and multiple cars. This work provides a new distributed passive way for real-time vehicle tracking and this technology will be extremely important for traffic controlling and public safety in modern society. 展开更多
关键词 distinguish sliding OTDR extremely filtering traffic locate processed fluctuation running
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部