首页> 外文期刊>IEEE Signal Processing Magazine >Approaches to Secure Inference in the Internet of Things: Performance Bounds, Algorithms, and Effective Attacks on IoT Sensor Networks
【24h】

Approaches to Secure Inference in the Internet of Things: Performance Bounds, Algorithms, and Effective Attacks on IoT Sensor Networks

机译:物联网中的安全推理方法:性能范围,算法和对物联网传感器网络的有效攻击

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

The Internet of Things (IoT) improves pervasive sensing and control capabilities via the aid of modern digital communication, signal processing, and massive deployment of sensors but presents severe security challenges. Attackers can modify the data entering or communicated from the IoT sensors, which can have a serious impact on any algorithm using these data for inference. This article describes how to provide tight bounds (with sufficient data) on the performance of the best unbiased algorithms estimating a parameter from the attacked data and communications under any assumed statistical model describing how the sensor data depends on the parameter before attack. The results hold regardless of the unbiased estimation algorithm adopted, which could employ deep learning, machine learning, statistical signal processing, or any other approach. Example algorithms that achieve performance close to these bounds are illustrated. Attacks that make the attacked data useless for reducing these bounds are also described. These attacks provide a guaranteed attack performance in terms of the bounds regardless of the algorithms the unbiased estimation system employs. References are supplied that provide various extensions to all of the specific results presented in this article and a brief discussion of low-complexity encryption and physical layer security is provided.
机译:物联网(IoT)借助现代数字通信,信号处理和传感器的大规模部署,提高了普遍的传感和控制能力,但也带来了严峻的安全挑战。攻击者可以修改从IoT传感器输入或传递的数据,这会对使用这些数据进行推理的任何算法产生严重影响。本文介绍如何在最佳的无偏算法的性能上提供严格的界限(具有足够的数据),该算法在描述传感器数据如何在攻击前取决于参数的任何假定统计模型下,根据受攻击的数据和通信来估计参数。无论采用哪种无偏估计算法,结果都保持不变,该算法可以采用深度学习,机器学习,统计信号处理或任何其他方法。示出了实现接近这些界限的性能的示例算法。还描述了使受攻击的数据无益于缩小边界的攻击。无论采用无偏估计系统采用哪种算法,这些攻击都可以在范围上提供有保证的攻击性能。提供了对本文中提出的所有特定结果进行各种扩展的参考,并提供了对低复杂度加密和物理层安全性的简短讨论。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号