\n \n \n
\n
\n\n \n \n Y. Shoukry; S. Mishra; Z. Luo; and S. Diggavi.\n\n\n \n \n \n \n Sybil Attack Resilient Traffic Networks: A Physics-Based Trust Propagation Approach.\n \n \n \n\n\n \n\n\n\n In
2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS), pages 43-54, April 2018. \n
\n\n
\n\n
\n\n
\n\n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@inproceedings{8443720,\n abstract = {We study a crowdsourcing aided road traffic estimation setup, where a fraction of users (vehicles) are malicious, and report wrong sensory information, or even worse, report the presence of Sybil (ghost) vehicles that do not physically exist. The motivation for such attacks lies in the possibility of creating a "virtual" congestion that can influence routing algorithms, leading to "actual" congestion and chaos. We propose a Sybil attack-resilient traffic estimation and routing algorithm that is resilient against such attacks. In particular, our algorithm leverages noisy information from legacy sensing infrastructure, along with the dynamics and proximity graph of vehicles inferred from crowdsourced data. Furthermore, the scalability of our algorithm is based on efficient Boolean Satisfiability (SAT) solvers. We validated our algorithm using real traffic data from the Italian city of Bologna. Our algorithm led to a significant reduction in average travel time in the presence of Sybil attacks, including cases where the travel time was reduced from about an hour to a few minutes.},\n author = {Y. {Shoukry} and S. {Mishra} and Z. {Luo} and S. {Diggavi}},\n booktitle = {2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)},\n doi = {10.1109/ICCPS.2018.00013},\n issn = {},\n keywords = {computability;graph theory;road traffic;telecommunication network routing;telecommunication security;crowdsourced data;traffic data;Sybil attack resilient traffic networks;physics-based trust propagation approach;crowdsourcing aided road traffic estimation setup;Sybil vehicles;virtual congestion;routing algorithms;chaos;routing algorithm;sensory information;noisy information;real traffic data;proximity graph;Automobiles;Routing;Roads;Heuristic algorithms;Estimation;Intelligent sensors;Secure Smart transportation systems;Sybil attacks;resilient routing},\n month = {April},\n number = {},\n pages = {43-54},\n tags = {conf,CPS},\n title = {Sybil Attack Resilient Traffic Networks: A Physics-Based Trust Propagation Approach},\n type = {4},\n volume = {},\n year = {2018}\n}\n\n
\n
\n\n\n
\n We study a crowdsourcing aided road traffic estimation setup, where a fraction of users (vehicles) are malicious, and report wrong sensory information, or even worse, report the presence of Sybil (ghost) vehicles that do not physically exist. The motivation for such attacks lies in the possibility of creating a \"virtual\" congestion that can influence routing algorithms, leading to \"actual\" congestion and chaos. We propose a Sybil attack-resilient traffic estimation and routing algorithm that is resilient against such attacks. In particular, our algorithm leverages noisy information from legacy sensing infrastructure, along with the dynamics and proximity graph of vehicles inferred from crowdsourced data. Furthermore, the scalability of our algorithm is based on efficient Boolean Satisfiability (SAT) solvers. We validated our algorithm using real traffic data from the Italian city of Bologna. Our algorithm led to a significant reduction in average travel time in the presence of Sybil attacks, including cases where the travel time was reduced from about an hour to a few minutes.\n
\n\n\n
\n\n\n
\n
\n\n \n \n Tarek Abdelzaher; Nora Ayanian; Tamer Basar; Suhas Diggavi; Jana Diesner; Deepak Ganesan; Ramesh Govindan; Susmit Jha; Tancrede Lepoint; Ben Marlin; and others.\n\n\n \n \n \n \n Will distributed computing revolutionize peace? the emergence of battlefield iot.\n \n \n \n\n\n \n\n\n\n In
2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pages 1129–1138, 2018. IEEE\n
\n\n
\n\n
\n\n
\n\n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{abdelzaher2018will,\n abstract = {An upcoming frontier for distributed computing might literally save lives in future military operations. In civilian scenarios, significant efficiencies were gained from interconnecting devices into networked services and applications that automate much of everyday life from smart homes to intelligent transportation. The ecosystem of such applications and services is collectively called the Internet of Things (IoT). Can similar benefits be gained in a military context by developing an IoT for the battlefield? This paper describes unique challenges in such a context as well as potential risks, mitigation strategies, and benefits.},\n author = {Abdelzaher, Tarek and Ayanian, Nora and Basar, Tamer and Diggavi, Suhas and Diesner, Jana and Ganesan, Deepak and Govindan, Ramesh and Jha, Susmit and Lepoint, Tancrede and Marlin, Ben and others},\n booktitle = {2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)},\n organization = {IEEE},\n pages = {1129--1138},\n tags = {conf,CPS,DML},\n title = {Will distributed computing revolutionize peace? the emergence of battlefield iot},\n type = {4},\n doi = {10.1109/ICDCS.2018.00112},\n year = {2018}\n}\n\n
\n
\n\n\n
\n An upcoming frontier for distributed computing might literally save lives in future military operations. In civilian scenarios, significant efficiencies were gained from interconnecting devices into networked services and applications that automate much of everyday life from smart homes to intelligent transportation. The ecosystem of such applications and services is collectively called the Internet of Things (IoT). Can similar benefits be gained in a military context by developing an IoT for the battlefield? This paper describes unique challenges in such a context as well as potential risks, mitigation strategies, and benefits.\n
\n\n\n
\n\n\n
\n
\n\n \n \n Gaurav Kumar Agarwal; Mohammed Karmoose; Suhas Diggavi; Christina Fragouli; and Paulo Tabuada.\n\n\n \n \n \n \n \n Distorting an adversary's view in cyber-physical systems.\n \n \n \n \n\n\n \n\n\n\n In
2018 IEEE Conference on Decision and Control (CDC), pages 1476–1481, 2018. IEEE\n
\n\n
\n\n
\n\n
\n\n \n \n arxiv\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{agarwal2018distorting,\n abstract = {In Cyber- Physical Systems (CPSs), inference based on communicated data is of critical significance as it can be used to manipulate or damage the control operations by adversaries. This calls for efficient mechanisms for secure transmission of data since control systems are becoming increasingly distributed over larger geographical areas. Distortion based security, recently proposed as one candidate for CPSs security, is not only more appropriate for these applications but also quite frugal in terms of prior requirements on shared keys. In this paper, we propose distortion-based metrics to protect CPSs communication and show that it is possible to confuse adversaries with just a few bits of pre-shared keys.},\n author = {Agarwal, Gaurav Kumar and Karmoose, Mohammed and Diggavi, Suhas and Fragouli, Christina and Tabuada, Paulo},\n booktitle = {2018 IEEE Conference on Decision and Control (CDC)},\n organization = {IEEE},\n pages = {1476--1481},\n tags = {conf,CPS},\n title = {Distorting an adversary's view in cyber-physical systems},\n type = {4},\n url_arxiv = {https://arxiv.org/abs/1809.04580},\n doi = {10.1109/CDC.2018.8619457},\n year = {2018}\n}\n\n
\n
\n\n\n
\n In Cyber- Physical Systems (CPSs), inference based on communicated data is of critical significance as it can be used to manipulate or damage the control operations by adversaries. This calls for efficient mechanisms for secure transmission of data since control systems are becoming increasingly distributed over larger geographical areas. Distortion based security, recently proposed as one candidate for CPSs security, is not only more appropriate for these applications but also quite frugal in terms of prior requirements on shared keys. In this paper, we propose distortion-based metrics to protect CPSs communication and show that it is possible to confuse adversaries with just a few bits of pre-shared keys.\n
\n\n\n
\n\n\n
\n
\n\n \n \n Alimzhan Sultangazin; Suhas Diggavi; and Paulo Tabuada.\n\n\n \n \n \n \n Protecting the privacy of networked multi-agent systems controlled over the cloud.\n \n \n \n\n\n \n\n\n\n In
2018 27th International Conference on Computer Communication and Networks (ICCCN), pages 1–7, 2018. IEEE\n
\n\n
\n\n
\n\n
\n\n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{sultangazin2018protecting,\n abstract = {The vision of an Internet-of-Things calls for combining the increasing connectivity of devices at the edge with the ability to compute either at the edge or on more powerful servers in the network. There is great interest in exploring the feasibility of these ideas when devices such as quadcopters or ground robots at the edge are controlled over the cloud, i.e., by leveraging computational power available elsewhere in the network. One of the main difficulties, especially in the context of the Internet-of-Battlefield- Things is the need to keep the data private. In this paper we propose a solution to this problem by extending previous results by the authors from a single system controlled over the cloud to networks of systems that are controlled and coordinated over the cloud. We propose a noncryptographic lightweight encoding scheme that ensures the privacy of the data exchanged by all the participating parties.},\n author = {Sultangazin, Alimzhan and Diggavi, Suhas and Tabuada, Paulo},\n booktitle = {2018 27th International Conference on Computer Communication and Networks (ICCCN)},\n organization = {IEEE},\n pages = {1--7},\n tags = {conf,CPS},\n title = {Protecting the privacy of networked multi-agent systems controlled over the cloud},\n type = {4},\n doi = {10.1109/ICCCN.2018.8487355},\n year = {2018}\n}\n\n
\n
\n\n\n
\n The vision of an Internet-of-Things calls for combining the increasing connectivity of devices at the edge with the ability to compute either at the edge or on more powerful servers in the network. There is great interest in exploring the feasibility of these ideas when devices such as quadcopters or ground robots at the edge are controlled over the cloud, i.e., by leveraging computational power available elsewhere in the network. One of the main difficulties, especially in the context of the Internet-of-Battlefield- Things is the need to keep the data private. In this paper we propose a solution to this problem by extending previous results by the authors from a single system controlled over the cloud to networks of systems that are controlled and coordinated over the cloud. We propose a noncryptographic lightweight encoding scheme that ensures the privacy of the data exchanged by all the participating parties.\n
\n\n\n
\n\n\n\n\n\n