Ändra sökning
Länk till posten
Permanent länk

Direktlänk
Alternativa namn
Publikationer (10 of 270) Visa alla publikationer
Li, S., Ngai, E.-H. C. & Voigt, T. (2024). An Experimental Study of Byzantine-Robust Aggregation Schemes in Federated Learning. IEEE Transactions on Big Data, 10(6), Article ID 975.
Öppna denna publikation i ny flik eller fönster >>An Experimental Study of Byzantine-Robust Aggregation Schemes in Federated Learning
2024 (Engelska)Ingår i: IEEE Transactions on Big Data, E-ISSN 2332-7790, Vol. 10, nr 6, artikel-id 975Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

Byzantine-robust federated learning aims at mitigating Byzantine failures during the federated training process, where malicious participants (known as Byzantine clients) may upload arbitrary local updates to the central server in order to degrade the performance of the global model. In recent years, several robust aggregation schemes have been proposed to defend against malicious updates from Byzantine clients and improve the robustness of federated learning. These solutions were claimed to be Byzantine-robust, under certain assumptions. Other than that, new attack strategies are emerging, striving to circumvent the defense schemes. However, there is a lack of systematical comparison and empirical study thereof. In this paper, we conduct an experimental study of Byzantine-robust aggregation schemes under different attacks using two popular algorithms in federated learning, FedSGD and FedAvg. We first survey existing Byzantine attack strategies, as well as Byzantine-robust aggregation schemes that aim to defend against Byzantine attacks. We also propose a new scheme, ClippedClustering, to enhance the robustness of a clustering-based scheme by automatically clipping the updates. Then we provide an experimental evaluation of eight aggregation schemes in the scenario of five different Byzantine attacks. Our experimental results show that these aggregation schemes sustain relatively high accuracy in some cases, but they are not effective in all cases. In particular, our proposed ClippedClustering successfully defends against most attacks under independent and identically distributed (IID) local datasets. However, when the local datasets are Non-IID, the performance of all the aggregation schemes significantly decreases. With Non-IID data, some of these aggregation schemes fail even in the complete absence of Byzantine clients. Based on our experimental study, we conclude that the robustness of all the aggregation schemes is limited, highlighting the need for new defense strategies, in particular for Non-IID datasets.

Nationell ämneskategori
Teknik och teknologier
Identifikatorer
urn:nbn:se:ri:diva-66173 (URN)10.1109/tbdata.2023.3237397 (DOI)
Tillgänglig från: 2023-09-11 Skapad: 2023-09-11 Senast uppdaterad: 2025-02-18Bibliografiskt granskad
Li, S., Ngai, E.-H. C. H., Ye, F., Ju, L., Zhang, T. & Voigt, T. (2024). Blades: A Unified Benchmark Suite for Byzantine Attacks and Defenses in Federated Learning. In: Proceedings - 9th ACM/IEEE Conference on Internet-of-Things Design and Implementation, IoTDI 2024Open AccessPages 158 - 169: . Paper presented at 9th ACM/IEEE Conference on Internet-of-Things Design and Implementation, IoTDI 2024 (pp. 158-169). Institute of Electrical and Electronics Engineers Inc.
Öppna denna publikation i ny flik eller fönster >>Blades: A Unified Benchmark Suite for Byzantine Attacks and Defenses in Federated Learning
Visa övriga...
2024 (Engelska)Ingår i: Proceedings - 9th ACM/IEEE Conference on Internet-of-Things Design and Implementation, IoTDI 2024Open AccessPages 158 - 169, Institute of Electrical and Electronics Engineers Inc. , 2024, s. 158-169Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Federated learning (FL) facilitates distributed training across different IoT and edge devices, safeguarding the privacy of their data. The inherent distributed structure of FL introduces vulnerabilities, especially from adversarial devices aiming to skew local updates to their advantage. Despite the plethora of research focusing on Byzantine-resilient FL, the academic community has yet to establish a comprehensive benchmark suite, pivotal for impartial assessment and comparison of different techniques. This paper presents Blades, a scalable, extensible, and easily configurable benchmark suite that supports researchers and developers in efficiently implementing and validating novel strategies against baseline algorithms in Byzantine-resilient FL. Blades contains built-in implementations of representative attack and defense strategies and offers a user-friendly interface that seamlessly integrates new ideas. Using Blades, we re-evaluate representative attacks and defenses on wide-ranging experimental configurations (approximately 1,500 trials in total). Through our extensive experiments, we gained new insights into FL robustness and highlighted previously overlooked limitations due to the absence of thorough evaluations and comparisons of baselines under various attack settings. We maintain the source code and documents at https://github.com/lishenghui/blades. 

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers Inc., 2024
Nyckelord
Academic community; Benchmark suites; Byzantine attacks; Distributed learning; Distributed structures; Federated learning; IoT; Neural-networks; Novel strategies; Robustness; Internet of things
Nationell ämneskategori
Data- och informationsvetenskap
Identifikatorer
urn:nbn:se:ri:diva-74878 (URN)10.1109/IoTDI61053.2024.00018 (DOI)2-s2.0-85196568437 (Scopus ID)9798350370256 (ISBN)
Konferens
9th ACM/IEEE Conference on Internet-of-Things Design and Implementation, IoTDI 2024
Anmärkning

This research was supported by the RGC General ResearchFunds No. 17203320 and No. 17209822 from Hong Kong, theSwedish Research Council project grant No. 2017-04543, andHKU-TCL joint research centre for artificial intelligence seedfunding.

Tillgänglig från: 2024-08-19 Skapad: 2024-08-19 Senast uppdaterad: 2024-08-19Bibliografiskt granskad
Li, S., Ngai, E.-H. C. H., Ye, F., Ju, L., Zhang, T. & Voigt, T. (2024). Demo Abstract: Blades: A Unified Benchmark Suite for Byzantine-Resilient in Federated Learning. In: Proceedings - 9th ACM/IEEE Conference on Internet-of-Things Design and Implementation, IoTDI 2024: . Paper presented at 9th ACM/IEEE Conference on Internet-of-Things Design and Implementation, IoTDI 2024. Hong Kong. 13 May 2024 through 16 May 2024 (pp. 229-230). Institute of Electrical and Electronics Engineers Inc.
Öppna denna publikation i ny flik eller fönster >>Demo Abstract: Blades: A Unified Benchmark Suite for Byzantine-Resilient in Federated Learning
Visa övriga...
2024 (Engelska)Ingår i: Proceedings - 9th ACM/IEEE Conference on Internet-of-Things Design and Implementation, IoTDI 2024, Institute of Electrical and Electronics Engineers Inc. , 2024, s. 229-230Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Federated learning (FL) facilitates distributed training across different IoT and edge devices, safeguarding the privacy of their data. The inherently distributed nature of FL introduces vulnerabilities, especially from adversarial devices aiming to skew local updates to their desire. Despite the plethora of research focusing on Byzantine-resilient FL, the academic community has yet to establish a comprehensive benchmark suite, pivotal for the assessment and comparison of different techniques. This demonstration presents Blades, a scalable, extensible, and easily configurable benchmark suite that supports researchers and developers in efficiently implementing and validating strategies against baseline algorithms in Byzantine-resilient FL. 

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers Inc., 2024
Nyckelord
Academic community; Benchmark suites; Byzantine attacks; Distributed learning; Federated learning; IoT; Neural-networks; Robustness; Internet of things
Nationell ämneskategori
Data- och informationsvetenskap
Identifikatorer
urn:nbn:se:ri:diva-74870 (URN)10.1109/IoTDI61053.2024.00030 (DOI)2-s2.0-85197801556 (Scopus ID)
Konferens
9th ACM/IEEE Conference on Internet-of-Things Design and Implementation, IoTDI 2024. Hong Kong. 13 May 2024 through 16 May 2024
Tillgänglig från: 2024-08-27 Skapad: 2024-08-27 Senast uppdaterad: 2024-08-27Bibliografiskt granskad
Bull, V., Finne, N., Agiollo, A., Kaliyar, P., Pajola, L., Voigt, T. & Conti, M. (2024). DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network. Paper presented at International Workshops which were held in conjunction with 28th European Symposium on Research in Computer Security, ESORICS 2023. The Hague, Neherlands. 25 September 2023 through 29 September 2023. Lecture Notes in Computer Science, 14399 LNCS, 198-213
Öppna denna publikation i ny flik eller fönster >>DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network
Visa övriga...
2024 (Engelska)Ingår i: Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349, Vol. 14399 LNCS, s. 198-213Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

The Internet of Things is expanding and since IoT devices and IoT networks are used in many crucial areas in modern societies, ranging from security and military applications to healthcare monitoring and production efficiency, the need to secure these devices is of great importance. Intrusion detection systems (IDS) play a significant role in securing IoT networks as their goal is to detect intruders that have gained access to one or several IoT nodes. While most IDS have been designed to detect a specific or at most a few attacks, the DETONAR framework detects multiple attacks. However, it is run on a designated sniffer network which adds additional cost in terms of hardware and maintenance. In this paper, we propose DETONAR-Light, adapting DETONAR to run using data collected at a border router rather than on sniffer logs. Our experiments show that this is possible almost without any decrease of detection and attack classification rate for many attacks

Ort, förlag, år, upplaga, sidor
Springer Science and Business Media Deutschland GmbH, 2024
Nyckelord
Internet of things; Intrusion detection; Network security; Production efficiency; Additional costs; Attack classifications; Border routers; Classification rates; Healthcare monitoring; Intrusion Detection Systems; Network intrusion detection; Production efficiency; Military applications
Nationell ämneskategori
Data- och informationsvetenskap
Identifikatorer
urn:nbn:se:ri:diva-72877 (URN)10.1007/978-3-031-54129-2_12 (DOI)2-s2.0-85188663361 (Scopus ID)
Konferens
International Workshops which were held in conjunction with 28th European Symposium on Research in Computer Security, ESORICS 2023. The Hague, Neherlands. 25 September 2023 through 29 September 2023
Tillgänglig från: 2024-04-26 Skapad: 2024-04-26 Senast uppdaterad: 2024-07-28Bibliografiskt granskad
Zhu, S., Voigt, T., Rahimian, F. & Ko, J. (2024). On-device Training: A First Overview on Existing Systems. ACM transactions on sensor networks, 20(6), Article ID 118.
Öppna denna publikation i ny flik eller fönster >>On-device Training: A First Overview on Existing Systems
2024 (Engelska)Ingår i: ACM transactions on sensor networks, ISSN 1550-4867, E-ISSN 1550-4859, Vol. 20, nr 6, artikel-id 118Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

The recent breakthroughs in machine learning (ML) and deep learning (DL) have catalyzed the design and development of various intelligent systems over wide application domains. While most existing machine learning models require large memory and computing power, efforts have been made to deploy some models on resource-constrained devices as well. A majority of the early application systems focused on exploiting the inference capabilities of ML and DL models, where data captured from different mobile and embedded sensing components are processed through these models for application goals such as classification and segmentation. More recently, the concept of exploiting the mobile and embedded computing resources for ML/DL model training has gained attention, as such capabilities allow the training of models via local data without the need to share data over wireless links, thus enabling privacy-preserving computation by design, model personalization and environment adaptation, and deployment of accurate models in remote and hardly accessible locations without stable internet connectivity. This work summarizes and analyzes state-of-the-art systems research that allows such on-device model training capabilities and provides a survey of on-device training from a systems perspective.

Ort, förlag, år, upplaga, sidor
ASSOC COMPUTING MACHINERY, 2024
Nyckelord
Machine learning; IoT devices; on-device training
Nationell ämneskategori
Data- och informationsvetenskap
Identifikatorer
urn:nbn:se:ri:diva-77079 (URN)10.1145/3696003 (DOI)
Tillgänglig från: 2025-02-13 Skapad: 2025-02-13 Senast uppdaterad: 2025-04-22Bibliografiskt granskad
Krentz, K.-F. & Voigt, T. (2024). Secure opportunistic routing in 2-hop IEEE 802.15.4 networks with SMOR. Computer Communications, 217, 57-69
Öppna denna publikation i ny flik eller fönster >>Secure opportunistic routing in 2-hop IEEE 802.15.4 networks with SMOR
2024 (Engelska)Ingår i: Computer Communications, ISSN 0140-3664, E-ISSN 1873-703X, Vol. 217, s. 57-69Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

The IEEE 802.15.4 radio standard features the possibility for IEEE 802.15.4 nodes to run on batteries for several years. This is made possible by duty-cycling medium access control (MAC) protocols, which allow IEEE 802.15.4 nodes to leave their radios in energy-saving sleep modes most of the time. Yet, duty-cycling MAC protocols usually incur long routing delays since it may take a while until a particular forwarder becomes available for forwarding a packet. Opportunistic routing alleviates this problem by opportunistically using a currently available forwarder, rather than waiting for a particular forwarder. Among all opportunistic routing schemes, so-called dynamic switch-based forwarding (DSF) schemes are most promising from a security and practical perspective, but some security and reliability issues with them persist. In this paper, we propose secure multipath opportunistic routing (SMOR), a DSF scheme that improves on current DSF schemes in three regards. First, SMOR builds on a denial-of-sleep-resilient MAC layer. Current DSF schemes, by comparison, rest on MAC protocols that put the limited energy reserves of battery-powered IEEE 802.15.4 nodes at risk. Second, SMOR operates in a distributed fashion and efficiently supports point-to-point traffic. All current DSF schemes, by contrast, suffer from a single point of failure and focus on convergecast traffic. Third, SMOR duplicates packets on purpose and routes them along disjoint paths. This makes SMOR tolerant of compromises of single IEEE 802.15.4 nodes, whereas current DSF schemes lack intrusion tolerance. We integrated SMOR into the network stack of the Contiki-NG operating system and benchmarked SMOR against the Routing Protocol for Low-Power and Lossy Networks (RPL) with the Cooja network simulator. Indeed, SMOR turns out to improve on RPL’s delays by between 33.51% and 39.84%, depending on the exact configurations and network dynamics. Furthermore, SMOR achieves between 0.16% and 2.03% higher mean packet delivery ratios (PDRs), thereby attaining mean PDRs of 99.999% in all simulated scenarios. Beyond that, SMOR has only a fraction of RPL’s memory requirements. SMOR’s intrusion tolerance, on the other hand, increases the mean energy consumption per IEEE 802.15.4 node by between 1.55% and 2.74% compared to RPL in our simulations. SMOR specifically targets IEEE 802.15.4 networks with a network diameter of 2, such as body area networks. © 2024 The Authors

Ort, förlag, år, upplaga, sidor
Elsevier B.V., 2024
Nyckelord
Energy conservation; Fault tolerance; IEEE Standards; Low power electronics; Medium access control; Network security; Power management (telecommunication); Routing protocols; Current dynamics; Duty-cycling; IEEE 802.15.4 networks; Ieee 802.15.4/zigbee; Intrusion tolerance; Medium access control protocols; Multipath; Opportunistic routing; Packet delivery ratio; Secure routing; Internet of things
Nationell ämneskategori
Elektroteknik och elektronik
Identifikatorer
urn:nbn:se:ri:diva-72822 (URN)10.1016/j.comcom.2024.01.024 (DOI)2-s2.0-85185186272 (Scopus ID)
Anmärkning

This work was supported by the Swedish Foundation for Strategic Research [grant number 2017-045989 ].

Tillgänglig från: 2024-05-14 Skapad: 2024-05-14 Senast uppdaterad: 2024-05-14Bibliografiskt granskad
Engstrand, J., Krentz, K.-F., Asan, N. B., Padmal, M., Yan, W., Joseph, L., . . . Voigt, T. (2024). Security and Privacy for Fat Intra-Body Communication: Mechanisms and Protocol Stack. In: Proceedings - Conference on Local Computer Networks, LCN: . Paper presented at 49th IEEE Conference on Local Computer Networks, LCN 2024. Caen. 8 October 2024 through 10 October 2024. IEEE Computer Society
Öppna denna publikation i ny flik eller fönster >>Security and Privacy for Fat Intra-Body Communication: Mechanisms and Protocol Stack
Visa övriga...
2024 (Engelska)Ingår i: Proceedings - Conference on Local Computer Networks, LCN, IEEE Computer Society , 2024Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Innovative medical applications based on networked implants foster the development of in-body communication technologies. Among the in-body communication technologies that are being considered, fat intra-body communication (Fat-IBC) is a very recent approach. Its main advantage lies in its higher data rate compared to earlier approaches based on capacitive and galvanic coupling. However, Fat-IBC faces privacy-, security-, as well as safety-related attacks. In this paper, we discuss security and privacy concerns about Fat-IBC, as well as corresponding countermeasures. Furthermore, we present our secure protocol stack for Fat-IBC and suggest directions for future research. 

Ort, förlag, år, upplaga, sidor
IEEE Computer Society, 2024
Nyckelord
Capacitive couplings; Communication mechanisms; Communications protocols; Communicationtechnology; High data rate; High data-rates; In-body communications; Intra-body communications; Protocol stack; Security and privacy; Differential privacy
Nationell ämneskategori
Elektroteknik och elektronik
Identifikatorer
urn:nbn:se:ri:diva-76456 (URN)10.1109/LCN60385.2024.10639677 (DOI)2-s2.0-85214941362 (Scopus ID)
Konferens
49th IEEE Conference on Local Computer Networks, LCN 2024. Caen. 8 October 2024 through 10 October 2024
Anmärkning

This work has been financially supported the SwedishFoundation for Strategic Research.

Tillgänglig från: 2025-01-29 Skapad: 2025-01-29 Senast uppdaterad: 2025-01-29Bibliografiskt granskad
Song, W., Kaxiras, S., Voigt, T., Yao, Y. & Mottola, L. (2024). TaDA: Task Decoupling Architecture for the Battery-less Internet of Things. Paper presented at 22nd ACM Conference on Embedded Networked Sensor Systems, SenSys 2024. Hangzhou. 4 November 2024 through 7 November 2024. SenSys 2024 - Proceedings of the 2024 ACM Conference on Embedded Networked Sensor Systems, 409-421
Öppna denna publikation i ny flik eller fönster >>TaDA: Task Decoupling Architecture for the Battery-less Internet of Things
Visa övriga...
2024 (Engelska)Ingår i: SenSys 2024 - Proceedings of the 2024 ACM Conference on Embedded Networked Sensor Systems, s. 409-421Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

We present TaDA, a system architecture enabling efficient execution of Internet of Things (IoT) applications across multiple computing units, powered by ambient energy harvesting. Low-power microcontroller units (MCUs) are increasingly specialized; for example, custom designs feature hardware acceleration of neural network inference, next to designs providing energy-efficient input/output. As application requirements are growingly diverse, we argue that no single MCU can efficiently fulfill them. TaDA allows programmers to assign the execution of different slices of the application logic to the most efficient MCU for the job. We achieve this by decoupling task executions in time and space, using a special-purpose hardware interconnect we design, while providing persistent storage to cross periods of energy unavailability. We compare our prototype performance against the single most efficient computing unit for a given workload. We show that our prototype saves up to 96.7% energy per application round. Given the same energy budget, this yields up to a 68.7x throughput improvement. 

Ort, förlag, år, upplaga, sidor
Association for Computing Machinery, Inc, 2024
Nyckelord
Microcontrollers; Ambients; Battery-less; Computing units; Decouplings; Energy; Intermittent computing; Internet of thing; Microcontroller unit; Systems architecture; Task decoupling; Budget control
Nationell ämneskategori
Elektroteknik och elektronik
Identifikatorer
urn:nbn:se:ri:diva-76474 (URN)10.1145/3666025.3699347 (DOI)2-s2.0-85211759485 (Scopus ID)
Konferens
22nd ACM Conference on Embedded Networked Sensor Systems, SenSys 2024. Hangzhou. 4 November 2024 through 7 November 2024
Anmärkning

This work is supported by the Swedish Foundation for Strategic Research (SSF) and by the National Recoveryand Resilience Plan (NRRP), Mission 4 Component 2 Investment 1.3 - Call for tender No. 1561 of 11.10.2022 of the Italian Ministero dell’Università e della Ricerca (MUR); funded by the EuropeanUnion - NextGenerationEU.

Tillgänglig från: 2025-01-28 Skapad: 2025-01-28 Senast uppdaterad: 2025-01-28Bibliografiskt granskad
Piumwardane, D., Padmal, M., Ranganathan, V., Hewage, K., Rohner, C. & Voigt, T. (2024). Unlocking the Potential of Low-Cost High-Resolution Sensing with Analog Backscatter. In: : . Paper presented at 2024 IEEE International Conference on RFID, RFID 2024. Cambridge. 4 June 2024 through 6 June 2024 (pp. 95-100). Institute of Electrical and Electronics Engineers Inc.
Öppna denna publikation i ny flik eller fönster >>Unlocking the Potential of Low-Cost High-Resolution Sensing with Analog Backscatter
Visa övriga...
2024 (Engelska)Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Analog backscatter enables sensing and communication while consuming significantly lower power than digital backscatter. An analog backscatter tag maps sensor readings directly to backscatter transmissions avoiding power hungry blocks such as ADCs. The sensor value variations are backseat-tered atop a carrier as changes in frequency and amplitude. Frequency variations are commonly used in backscatter, to avoid the strong self-interference from the carrier. The range of the sensor output linearly maps to the range of base-band frequency variation. Hence a sensor with a wider output range requires a larger base-band frequency range to encode sensor data. This increases the tag oscillator’s switching frequency and hence the tag’s power consumption. We propose to use higher order harmonic frequencies which allows us to reduce the tag switching frequency and read sensor data even when the carrier masks the fundamental frequency. Our system design lowers the cost and power consumption of the analog backscatter system making it suitable for mobile-based sensing applications. We present experimental results demonstrating the viability of our approach and implement a complete system that includes a low-cost radio receiver. Using a carrier with 0 dBm power, we detect the 15th harmonic up to three meters resulting in 15 times more frequency resolution than the fundamental while reducing the tag oscillator’s power consumption by more than 43%. The 7th harmonic is visible up to 18 meters. Increasing the carrier power enables the detection of additional harmonic frequencies. 

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers Inc., 2024
Nyckelord
Backscattering; Costs; Harmonic analysis; Analog backscatter; Band frequencies; Base bands; Frequency resolutions; Frequency variation; Harmonic; Low-costs; Power; Sensing; Sensors data; Electric power utilization
Nationell ämneskategori
Elektroteknik och elektronik
Identifikatorer
urn:nbn:se:ri:diva-74621 (URN)10.1109/RFID62091.2024.10582681 (DOI)2-s2.0-85199886254 (Scopus ID)
Konferens
2024 IEEE International Conference on RFID, RFID 2024. Cambridge. 4 June 2024 through 6 June 2024
Anmärkning

This work has been financially supported by the Swedish Research Council (Grants 2018-05480 and 2021-04968) and the Swedish Foundation for Strategic Research.

Tillgänglig från: 2024-08-07 Skapad: 2024-08-07 Senast uppdaterad: 2024-08-07Bibliografiskt granskad
Sathi, V. N., Rohner, C. & Voigt, T. (2023). A PUF-Based Indirect Authentication and Key Establishment Protocol for Wearable Devices. In: IEEE International Conference on Communications (ICC): . Paper presented at IEEE International Conference on Communications (ICC) (pp. 615-621). Institute of Electrical and Electronics Engineers Inc., 2023-May, Article ID 193943.
Öppna denna publikation i ny flik eller fönster >>A PUF-Based Indirect Authentication and Key Establishment Protocol for Wearable Devices
2023 (Engelska)Ingår i: IEEE International Conference on Communications (ICC), Institute of Electrical and Electronics Engineers Inc. , 2023, Vol. 2023-May, s. 615-621, artikel-id 193943Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Microwave communication through the fat tissue in the human body enables a new channel for wearable devices to communicate with each other. The wearable devices can communicate to the external world through a powerful device in their network called central control unit (CU); for example, a smartphone. Some wearable devices may be out of the range of the CU temporarily due to body movements or permanently due to low signal strength, in a fat channel communication network. Such devices can connect to the CU with the help of their neighbor device in the same network. In this paper, we propose a protocol to ensure secure indirect authentication and key establishment between the out-of-range device and the CU in a fat channel communication network, via an untrusted intermediate device in the network. The proposed protocol is lightweight and resistant to denial-of-sleep attacks on the intermediate device. We analyze the security and the computation overhead of the proposed protocol. 

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers Inc., 2023
Nyckelord
Cryptography; Network security; Wearable technology; Channel communication; Communications networks; Control unit; Denial-of-sleep attack; Fat channel communication; Key establishment protocol; Key establishments; Microwave communications; PUF-based authentication; Wearable devices; Authentication
Nationell ämneskategori
Kommunikationssystem Annan medicinteknik
Identifikatorer
urn:nbn:se:ri:diva-68777 (URN)10.1109/ICC45041.2023.10278883 (DOI)2-s2.0-85178295514 (Scopus ID)
Konferens
IEEE International Conference on Communications (ICC)
Forskningsfinansiär
Stiftelsen för strategisk forskning (SSF)
Anmärkning

This project is financed by the Swedish Foundation for Strategic Research. 

Tillgänglig från: 2024-01-15 Skapad: 2024-01-15 Senast uppdaterad: 2024-02-06Bibliografiskt granskad
Projekt
Säker och tillförlitlig backscatter i kroppen [2021-04968_VR]; Uppsala universitet
Organisationer
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0002-2586-8573

Sök vidare i DiVA

Visa alla publikationer