-
摘要:
目前,物联网(Internet of things, IoT)设备已广泛应用于人们的日常生活,其安全性与个人、企业甚至国家密切相关. IoT设备重要性提高的同时也招致越来越多的攻击. 为应对IoT设备所面临的安全挑战,各国各地区已制定众多和IoT设备安全相关的法律法规、安全测评及认证标准. 对该领域现有的研究状况进行了归纳与整理,首先从IoT设备面临的安全威胁出发,按照层次逻辑划分探讨针对IoT设备的不同攻击面,并在此基础上对现有的安全法律法规、安全测评及认证现状进行分析、总结,重点从芯片木马检测、接口安全风险检测、无线协议安全风险检测、固件风险检测及应用与服务安全风险检测5个方面对IoT安全风险检测前沿技术进行研究,并在最后对该领域未来可能的发展方向进行了总结和展望,以期为我国未来IoT设备产品的安全发展提供参考和帮助.
Abstract:At present, IoT (Internet of things) devices have been widely used in people’s daily life, and their security is closely related to individuals, enterprises and even countries. The increasing importance of IoT devices has also attracted a growing number of attacks. To address the security challenges IoT devices faced, various countries and regions have formulated numerous laws and regulations, security evaluation and certification standards related to IoT device security. We summarize and organize the existing research status in this field. We firse discuss the security threats IoT devices faced and explore the different attack surfaces for IoT devices based on a hierarchical logic division. Furthermore, we analyze and summarize the existing security laws, regulations, security evaluation, and certification status, while focusing on the research on IoT security risk detection cutting-edge technologies from five aspects: chip Trojan horse detection, Interface security risk detection, wireless protocol security, firmware risk detection and application, and service security risk detection. Finally, the possible future development direction of this field is summarized and prospected, in order to provide reference and help for the security development of our country’s future IoT device products.
-
天际线(Skyline)查询[1]作为多目标决策、兴趣点发现、推荐系统等领域关键问题的一种解决途径,在2001年被提出,自此受到研究学者的广泛关注与研究. 近些年,Skyline查询研究拓展到不确定数据Skyline查询[2]﹑数据流Skyline查询[3]﹑动态Skyline查询[4]﹑反Skyline查询[5] 、偏好Skyline查询等方面,其中偏好Skyline查询可以返回满足用户偏好需求的结果集. 针对因用户偏好不同导致属性的重要性不同问题,研究者们提出了新的支配关系与算法. 但已有研究主要集中在非道路网的用户偏好Skyline查询或者道路网单用户偏好Skyline查询方面,没有考虑道路网多用户偏好和权重的Top-k Skyline查询.
传统偏好Skyline查询算法主要存在3点局限性:1)偏好Skyline查询需要确定属性的重要程度,由于不同用户权重与偏好不同,因此不同属性的重要程度也不一致,而已有研究中较少有提出将用户偏好和权重综合考虑,得到对用户群统一的属性重要程度次序处理方法;2)传统偏好Skyline查询算法大多未考虑道路网环境下的距离维度,只考虑静态维度;3)传统偏好Skyline查询算法返回的结果集过大、无序,不能给用户提供有效的决策支持.
因此,针对道路网多用户偏好Top-k Skyline查询问题,本文提出满足多用户不同权重和偏好需求的查询方法.
本文的主要贡献有3点:
1)针对道路网存在大量数据点以及多查询用户场景,需要计算数据点到各个查询用户的道路网距离,从而产生的很大距离计算开销,为了提升距离计算效率,本文根据所提的Vor-R*-DHash索引结构以及数据点与查询用户群的空间位置关系,提前剪枝在距离维度被支配的大量数据点.
2)针对在道路网Top-k Skyline查询处理时未综合考虑多用户不同权重和偏好以及返回的结果集数量不可控的问题,本文首先提出整体属性权重值的概念,综合考虑用户权重和偏好;并进一步提出用户群权重偏好次序,并基于此次序提出一种新的支配,即K-准放松支配;接着根据偏好次序进行逐次放松支配,使返回结果集大小可控;同时当k值改变时,动态调整放松轮次即可获取候选结果集CS,而无需重新计算距离、偏好次序等,减少了查询计算开销.
3)针对Skyline查询返回结果集无序的问题,本文基于z-整体属性权重值,提出了选取Top-k个结果集的打分函数,对候选结果集CS打分排序,返回有序结果集.
1. 相关工作
Skyline查询主要分为集中式查询和分布式查询. 其中集中式查询主要分为使用索引结构和不使用索引结构. 使用索引结构的算法常用R-tree等索引结构,例如文献[6]利用最近邻(nearest neighbor,NN)算法和R-tree索引查找Skyline点,基于R-tree可以快速判断数据点是否为Skyline点,接着利用数据点进行子集合的划分,递归查找Skyline点. 不使用索引结构的Skyline查询算法主要有基于排序的SFS(sort-filter Skyline)算法[7]. 而Skyline查询在不断发展过程中又产生了许多变种问题,例如K-支配空间Skyline查询[8]﹑连续Skyline查询[9]﹑针对推荐系统的范围障碍空间连续Skyline查询[10]﹑概率Skyline查询[11]以及Top-k Skyline查询等[12-13].
在集中式计算环境下,文献[14]根据用户不同偏好提出了维度不确定的定义,根据维度特征划分数据,进行Skyline概率支配测试,同时利用阈值处理大规模数据集Skyline查询问题. 文献[15]提出一种高效偏序域Skyline查询处理方法,利用倒排索引进行Skyline查询. 在并行计算环境下,文献[16]提出了不完全数据集的偏好Skyline查询算法SPQ(Skyline preference query). 文献[17]根据用户的偏好,基于Voronoi图将数据对象划分到不同网格中,并行计算所有对象组合,获取动态Skyline结果. 文献[18]提出了MapReduce下Top-k Skyline偏好查询.
道路网Skyline查询近些年来也受到越来越多的关注. 道路网Skyline查询既考虑数据点的路网空间属性,又考虑非空间属性. 文献[19]提出了基于范围的移动对象连续Skyline查询处理方法,利用Voronoi图组织道路网中的数据点,通过所提的3种算法减少道路网产生的相交节点数和距离计算开销. 文献[20]提出了道路网环境下综合考虑空间距离和社交距离的Skyline组用户查询方法.
Top-k Skyline查询在多目标决策中往往更具优势,因为它可以控制返回的结果集数量. 文献[21]提出基于安全区域技术解决连续Top-k Skyline查询结果更新问题,提出了结合Top-k查询和Skyline查询的安全区域构建算法. 文献[22]提出了MapReduce环境下Top-k Skyline处理方法. 文献[23]将K-Skyband查询与Top-k Skyline查询结合处理大数据集的Top-k Skyline查询.
目前道路网环境下Top-k Skyline查询研究大多集中在单用户场景,较少考虑多用户偏好和权重不同的场景. 针对已有方法的不足,本文利用查询点与数据点的位置关系剪枝数据集,利用所提的K-准放松支配控制结果集数量;利用所提的打分函数返回有序结果集,在理论论证和分析基础上提出了道路网多用户偏好Top-k Skyline查询方法.
2. 主要定义
设道路网环境下数据集P={p1, p2,…, pn},查询用户群G={q1, q2,…, qm}.
定义1. 道路网距离支配. 给定查询用户群G、数据点p1、数据点p2,数据点之间的距离为Dist,当且仅当Dist(p1, qi)≤Dist(p2, qi),1≤i≤m;且存在Dist(p1,qi)<Dist(p2, qi),1≤i≤m,称p1道路网距离支配p2,记作p1►p2. 本文距离如不特殊说明,则为道路网距离.
定义2. 整体属性权重. 给定查询用户群G,用户权重w={w1,w2,…,wm},用户qi的查询关键字keys={C1,C2},C1为优先考虑的属性集合,C2为一般偏好的属性集合,任意维度dj的整体属性权重Wj如式(1):
Wj=m∑i=1si⋅wi, (1) 其中si代表属性dj对于用户qi的重要性得分.
在属性的重要性程度计分时,将属性偏好分为3类:优先考虑﹑一般偏好和未考虑. 不同类别分数不同,例如C1中的属性被赋予2分,C2中的属性被赋予1分,未考虑的属性被赋予0分.
定义3. 用户群权重偏好次序. 指针对查询用户群属性的有序集合 GP={d1, d2, …, di},其中di代表任意属性,GP中属性对用户群的重要性程度呈非递增排列. 用户群权重偏好次序综合考虑用户的偏好和权重.
定义4. K-准放松支配(KPRD). 设P为数据集,数据维度空间为D,dj为任意维度,总维度数为r,θ=(θ1,θ2,…,θK)是D上K个维度的无差异阈值. 数据点pi,pt∈P,pi K-准放松支配pt,记作piϾpt,当且仅当:
{|{j|pi[dj]−pt[dj]>θj}|=0,|{j|pt[dj]−pi[dj]>0}|<|{j|pi[dj]−pt[dj]>0}|, (2) 其中1≤j≤K.
定义5. 道路网多用户偏好Top-k Skyline查询. 给定道路网路段集R、查询用户群G、数据集P、用户的查询关键字集合keys和用户权重集合w,道路网多用户偏好Top-k Skyline查询返回P的一个子集. 该子集中数据点在道路网的距离维度和静态维度都不能被P中任意其他数据点支配,并且是根据用户群偏好和权重排序的Top-k个数据点. 本文将道路网多用户偏好Top-k Skyline查询方法记作MUP-TKS.
3. 道路网多用户偏好Top-k Skyline查询
本文提出的道路网多用户偏好Top-k Skyline查询方法主要分为3个部分:距离较优集选取﹑K-准放松支配和Top-k个数据点选取.
3.1 道路网距离较优集选取方法
定义6. Mindist距离[24]. r维欧氏空间中,点p到同一空间内某矩形N的最小距离为Mindist(N, p).
定义7.Edist距离. 设查询用户群的最小外接矩形(minimum bounding rectangle,MBR)为Q,数据点p的MBR为N,则min{Mindist(p, Q)}为(Q, N)最小欧氏距离,记作Edistmin;max{Mindist(p, Q)}为(Q, N)最大欧氏距离,记作Edistmax.
定义8.Ndist距离. 设查询用户群的MBR为Q,数据点p的MBR为N,有min{Ndist(p, Q)}为(Q, N)最小网络距离,记作Ndistmin;max{Ndist(p, Q)}为(Q, N)最大网络距离,记作Ndistmax,其中p为N中的任意数据点,Ndist(p,Q)为p到Q的网络距离.
定理1. 设查询用户群的MBR为Q,道路网中数据点构成的2个中间节点分别为N1,N2,若DE1=Edistmin(Q, N2),DE2=Edistmax(Q, N1),DN1=Ndistmax(Q, N1),并且DE1>DE2,DE1>DN1,则N1►N2,且N2中任意数据点都被N1中数据点距离支配.
证明. 假设DN2=Ndistmin(Q, N2),因为欧氏距离值一定小于等于道路网距离值,所以当DE1>DE2且DE1>DN1时一定有DN2≥DE1,可得DN2>DN1,即N2中数据点到Q的最小网络距离大于N1中数据点到Q的最大网络距离,进而可得N2中任意数据点到Q的网络距离都大于N1中任意数据点到Q的网络距离. 因此N1►N2,且N2中任意数据点被N1中任意数据点道路网距离支配.证毕.
剪枝规则1. 设数据点构成的MBR分别为N1,N2,查询用户群的MBR为Q,如果满足:Edistmax(Q, N1)≤Edistmin(Q, N2),并且Ndistmax(Q, N1)<Edistmin(Q, N2),则节点N2可被剪枝.
定义9. 道路网最大距离的最小值. 给定数据点p1,p2,查询用户群G,数据点p到查询点q的道路网距离为Ndist(p, q). 若有DN1=max{Ndist(p1, qi)},DN2=max{Ndist(p2, qi)}(1≤i≤m),并且DN1<DN2,则当前道路网最大距离的最小值为DN1,记作DN_MaxMin.对应的数据点为p1.
定理2. 若节点N的Edistmin(Q, N)>DN_MaxMin,则节点N可被剪枝.
证明. 因为Edistmin(Q, N)>max{Ndist(p, qi)}(1≤i≤m),所以Ndistmin(Q, N)>max{Ndist(p, qi)},即p►N,且N中数据点也被p距离支配.证毕.
剪枝规则2. 若Edistmin(Q, N)≥DN_MaxMin,则节点N被支配,即N和N中数据点{p1, p2,···, pi}被剪枝.
如图1所示,数据点p1,p2到查询用户群{q1, q2, q3}的最大网络距离分别为DN1,DN2,有DN1>DN2,则DN_MaxMin=DN2. 数据点{p3,p4,p5,p6,p7,p8}构成的MBR为N1;若Edistmin(Q, N1)>DN_MaxMin,可得N1中数据点到各查询用户的网络距离大于DN_MaxMin,因为Edistmin(Q, N1)>DN_MaxMin,且有min{Ndist(p2, qi)}≥Edistmin(Q,N1)(1≤i≤3),所以p2►N1,N1可被剪枝.
定理3. 设DE为数据点pi到查询用户qj的欧氏距离,若min{DE(pi, qj)}>DN_MaxMin(1≤j≤m),则pi被剪枝.
证明. 假设p1为DN_MaxMin对应的数据点,若min{DE(pi,qj)}>DN_MaxMin,则有Ndist(p,qj)>DN_MaxMin(1≤j≤m),即数据点p1►p,p可被剪枝.证毕.
剪枝规则3. 假设数据点p1为DN_MaxMin对应的数据点,若存在DN_MaxMin<min{DE(pi, qj)}(1≤j≤m),则p1►pi,可将pi从候选集中删除,其中pi为任意不为p1的数据点.
为了减少计算,在剪枝前基于路网数据点的网络Voronoi图构建Vor-R*-DHash索引结构,如图2所示.
Vor-R*-DHash索引结构构造过程有3步:
1)构建路网所有数据点的网络Voronoi图.
2)创建R*-tree.从R*-tree的根部开始,从上至下、从左至右给每个节点编号,从0开始编号.
3)构建2级HashMap结构,第1级HashMap为first_hash、key为R*-tree中每个节点编号;第2级HashMap为sec_hash、key为后续剪枝处理需要的值,包括isNode(非数据点的节点)、MinE(节点到Q的最小欧氏距离值)、MaxE(节点到Q的最大欧氏距离值 )、MinN(节点到Q的最小网络距离值)、MaxN(节点到Q的最大网络距离值)、{DN1, DN2,…, DNi}(数据点到各查询用户的网络距离)、{DE1, DE2,…, DEi}(数据点到各查询用户的欧氏距离).
2级key对应的value值初始都为空,若数据点根据剪枝规则提前被剪枝,则这些值无需计算.DEi,DNi的值也是后续需要使用才被计算,并存入sec_hash.
基于剪枝规则1~3和Vor-R*-DHash索引结构,进一步给出距离较优集选取方法,如算法1所示.
算法1. 距离较优集选取方法 G_DBC.
输入:查询用户群G,道路网路段集R,数据集P;
输出:距离维度不被支配的距离较优集DBC.
① 以P中数据点、道路网路段集R构建 Vor- R*-DHash索引;
② 构建查询用户群的最小外包矩形Q;
③ 初始化DBC←∅;
④ 根据索引找到距离查询用户最近的点point;
⑤ 将point加入DBC中;
⑥ 计算数据点到各查询用户的网络距离 Ndist(p, qi)、欧氏距离DE(p, qi);
⑦ 将数据点网络距离、欧氏距离存入sec_hash;
⑧ 找到数据点到查询用户的网络距离最大值 的最小值;
⑨ DN_MaxMin←min{Ndist(p,qi)}; /*将最小值 赋给DN_MaxMin*/
⑩ 将数据点父节点Ni加入队列queue中;
⑪ 计算Ni到Q的最小、最大欧氏距离和最 小、 最大网络距离,存至sec_hash;
⑫ N1←min{MaxN}; /*将当前支配能力最强的 节点赋值给N1*/
⑬ for node in queue do
⑭ if node的孩子节点都被访问过 then
⑮ 将node的父节点加入queue中;/*向上 一层访问*/
⑯ end if
⑰ if node的孩子节点N为非叶子节点 then
⑱ 计算N到Q的欧氏距离DE1;
⑲ if DE1 > DN_MaxMin then
⑳ Cut N;/*将N剪枝,剪枝规则2*/
㉑ else if MaxE(N1) < MinE(N) 且 MaxN(N1)<MinE(N) then
㉒ Cut N;/*剪枝规则1*/
㉓ else
㉔ 将N加入队列queue;
㉕ 计算N到Q的最小、最大网络距离, 并 存至sec_hash;
㉖ 更新N1←min{MaxN};/*当前支配能力强 的节点赋给N1*/
㉗ end if
㉘ end if
㉙ if node的孩子节点N为叶子节点 then
㉚ 计算数据点到各查询用户欧氏距离 DE(p,qi);
㉛ if min{DE(p,qi)} > DN_MaxMin then
㉜ Cut N;/*剪枝规则3*/
㉝ else
㉞ 计算N到各查询用户网络距离DN;
㉟ if min{DN} > DN_MaxMin then
㊱ Cut N;
㊲ else
㊳ 将N与DBC中数据点支配比较;
㊴ if N被支配 then
㊵ Delete N;
㊶ else
㊷ 将N加入DBC中;
㊸ 更新DN_MaxMin←min{DN};
㊹ end if
㊺ end if
㊻ end if
㊼ end if
㊽ end for
㊾ return DBC.
算法1首先构建Vor-R*-DHash索引和查询用户群最小外接矩形Q,可快速得到距离查询点最近的数据点point,计算并保存sec_hash所需数据. 将point加入距离较优集DBC,并初始化DN_MaxMin. 接着将point父节点加入队列queue中,计算并保存sec_hash所需数据,并初始化N1. 每次取出队头节点处理,依据剪枝规则1~3进行节点的剪枝或者将节点加入DBC,并判断是否需要更新N1,DN_MaxMin等值,直至队列为空,循环结束. 最后返回距离较优集DBC.
3.2 数据集的放松支配过程
3.2.1 获取用户群权重偏好次序
首先初始化整体属性权重集合.W={W1,W2,…,Wi}={0,0,…,0};接着计算每个属性的整体属性权重值得到W;最后对整体属性权重值不为0的属性降序排列,得到属性的重要性次序,即用户群权重偏好次序.
在获取用户群权重偏好次序时,为了减小计算开销,利用HMap1,HMap2分别保存优先考虑的属性和一般偏好的属性. 当用户发起查询时,将C1中属性作为键,对应的用户权重作为值保存到HMap1;将C2中属性作为键,对应的用户权重作为值保存到HMap2.
进一步给出获取用户群权重偏好次序算法CDW,如算法2所示.
算法2. 获取用户群权重偏好次序算法 CDW.
输入:用户群G,用户查询关键字keys,用户权重w,维度空间D;
输出:用户群权重偏好次序GP.
① 初始化W为0; /*大小为数据集维度数*/
② 根据keys,w创建HMap1,HMap2;
③ for dj ∈D do
④ 基于HMap1、HMap2和式(1)得到Wj ;
⑤ end for
⑥ 根据W降序得到用户群权重偏好次序GP;
⑦ return GP. /*返回用户群权重偏好次序*/
3.2.2 基于用户群权重偏好次序的K-准放松支配
获取用户群偏好次序后,基于该次序进行放松支配处理. 本文中K为整体属性权重值不为0的维度数. 放松支配过程的处理对象为DBC与静态Skyline集取并集后的集合S. 经K-准放松支配后得到数量可控的候选结果集CS.
定理4. 任意2个数据点pi,pj∈P,若第i(i>0)轮在K个维度上piϾpj,则数据点pi必定在前K–i维支配数据点pj.
证明. 若在第i轮piϾpj,可知该轮的无差异阈值为(0,0,…,0,θK−i+1,…,θK),进而可得前K–i维使用的无差异阈值为(0,0,…,0),所以前K–i维为严格支配比较,即数据点pi必定在前K–i维支配数据点pj.证毕.
定理5. 数据集P经过第i(i>1)轮放松支配后所得结果集Si一定是第i–1轮放松支配后所得结果集Si−1的子集.
证明. 设第i轮放松的维度为第(K–i+1)~K维,第i–1轮放松的维度为第(K–i+2)~K维,其余维度使用严格支配. 可知第i轮的无差异阈值为(0,0,…,0,θK−i+1,θK−i+2,…,θK),第i–1轮的无差异阈值为(0,0,…,0,θK−i+2,…,θK),进而可知第i–1轮在前K–i+1个维度为严格支配比较,即在前K–i+1个维度的无差异阈值为(0,0,…,0). 第i轮不同于第i–1轮之处在于对第K–i+1维进行了放松支配,即在前K–i+1个维度无差异阈值为(0,0,…,0,θK−i+1),所以有Si⊆Si−1.证毕.
由定理4、定理5可直接得出定理6.
定理6. 给定数据集S,结果集数量随着每一轮放松而呈单调非递增趋势,即
|KPRD(i−1,D,S)|⩽ (3) 为使返回的结果集更符合用户群偏好,并保证数量可控,基于定理4~6进行逐次放松支配. 逐次放松支配过程中,θ是D上K个维度的无差异阈值,θ =(θ1, θ2, …, θK). 假定当前放松轮次为第i轮(1≤i≤K),无差异阈值θ =(0,0,…,0,θK−i+1,…,θK). 位于di前面的维度重要性都要高于di,因此该轮放松支配维度d1~di−1都使用严格支配比较. 放松支配从对用户群而言最不重要的属性开始,并预先将数据点按照用户群权重偏好次序非递增排序,距离维度值用数据点到查询用户群网络距离的最大值表示.
基于以上讨论,进一步给出基于用户群权重偏好次序的K-准放松支配算法KPRD,如算法3所示.
算法3. 基于用户群权重偏好次序的K-准放松支配算法KPRD.
输入:用户群G,无差异阈值θ,并集S,数据维度空间D,k值,用户查询关键字keys,用户权重w;
输出:候选结果集CS.
① GP←call CDW(G, keys, w, D);/*调用算法2 获取用户群权重偏好次序GP*/
② K←|GP|; /*整体属性权重值大于0的 维度数*/
③ 根据GP调整S中数据点;
④ 初始化CurS←S; /*CurS为每轮放松支配后 的结果集*/
⑤ 初始化oldCount←|S|; /*保存上一轮结果集 个数*/
⑥ 初始化curCount ←|CurS|;/*保存本轮结果集 个数*/
⑦ for j = K to 1 do /*进行最多K轮放松支配*/
⑧ for every pi,pj ∈ CurS do
⑨ if piϾpj then
⑩ 将pj从CurS删除;
⑪ curCount = curCount −1;
⑫ end if
⑬ end for
⑭ if oldCount ≥ k 且 curCount < k then
⑮ CS←S;
⑯ return CS;/*返回上一轮的结果集*/
⑰ else
⑱ 将CurS结果集保存至文件;
⑲ S←CurS;/*更新S*/
⑳ oldCount←|S|;/*更新oldCount*/
㉑ end if
㉒ end for
㉓ CS←CurS;
㉔ return CS.
3.3 Top-k个数据点选取方法
通过放松支配处理后可有效控制返回用户群的结果集大小,本节进一步给出Top-k个数据点选取策略,使返回结果集有序. 利用z-整体属性权重值的打分函数选取Top-k个数据点,处理对象为候选结果集CS.
定义10. 单调打分函数F[25]. 数据集中数据点作为输入域将数据点映射到实数范围.F由r个单调函数构成,F={f1, f2, …, fr}. 对于数据集中任意数据点,有F = \displaystyle\sum\limits_{j = 1}^r {{f_j}(p[{d_j}])},其中fj(p[dj])为数据点在dj维度的单调函数.
定理7. 假设数据集P的单调打分函数为F,若数据集中任意一个元组有最高的分数,那么它一定是Skyline点.
证明. 以反证法进行证明. 假设有p1,p2∈P,p1的得分F(p1)为数据集的最高得分,F(p1)>F(p2),p1不是Skyline点,p2支配p1,p1[dj]≤p2[dj](1≤j≤r),则可得\displaystyle\sum\limits_{j = 1}^r {{f_j}({p_1}[{d_j}]) \leqslant \displaystyle\sum\limits_{j = 1}^r {{f_j}({p_2}[{d_j}])} },即F(p1)≤F(p2),与假设矛盾.证毕.
定理8. 数据集P根据任意单调打分函数所得数据点顺序是Skyline支配的拓扑顺序.
证明. 以反证法进行证明. 假设存在2个数据点p1,p2∈P,单调打分函数为F,p1支配p2,F(p1)<F(p2),根据定理7可知,p1支配p2,则有F(p1)≥F(p2),与假设矛盾. 所以如果F(p2)>F(p1),可能有p2支配p1,但可以确定p1不可能支配p2. 如果F(p1)=F(p2),则p1支配p2或p2支配p1(这两者是等价的,会根据属性的映射关系排序),或者p1和p2之间不具备支配关系. 因此依据打分函数F所得数据点顺序是按照Skyline支配关系的一个拓扑顺序.证毕.
定义11. 线性打分函数[25]. 给定线性打分函数L,一般化形式为L(p) = \displaystyle\sum\limits_{j = 1}^r {{\omega _j} \cdot p[{d_j}]},其中ωj为实常数,p[dj]为数据点在dj维度的取值.
定义12. z-整体属性权重值. 给定数据集P,数据点 {p_i}\in P,pi在dj维度的z-整体属性权重值为
{\varphi }_{i,j}=\frac{({V}_{i,j}-\mu )}{\sigma }\cdot {W}_{j}\cdot {\zeta }_{j}\text{,} (4) 其中,\dfrac{{({V_{i,j}} - \mu )}}{\sigma }为数据点pi在维度dj的z值,Wj为dj的整体属性权重值,ζj为dj的维度优劣值,ζj=1或ζj=−1. 由定义10~12可知,fj(p[dj])=φi,j=ωjz,ωj=Wjζj.
定理9. 数据点任意维度的fj(p[dj])是单调的.
证明. 因为ωj=Wjζj,在打分阶段Wj为实常数,所以可得ωj为实常数,且随着数据点维度值变大,它的z值也变大,因此数据点的任意维度fj(p[dj])是单调的.证毕.
定义13. 基于z-整体属性权重值的打分函数. 数据点pi各维度z-整体属性值之和为它的得分,记作F(pi):
F({p_i}) = \sum\limits_{j = 1}^r {{\varphi _{i,j}}} . (5) 定理10. F(pi)是单调打分函数.
证明. 因为有F({p_i}) = \displaystyle\sum\limits_{j = 1}^r {{f_j}(p[{d_j}])},根据定理9可知数据点的任意维度fj(p[dj]) 随着维度值变大单调递增,它们具备相同的单调性,因此F(pi)也是单调的.证毕.
进一步给出Top-k个数据点选取方法,如算法4所示.
算法4.Top-k个数据点选取方法TK_DC.
输入:候选结果集CS,整体属性权重集合W,维度优劣集合ζ;
输出:Top-k Skyline结果集.
① for pi∈CS do
② 计算数据点的z-整体属性权重值;/*根据 式(4)*/
③ 计算数据点得分;/*根据式(5) */
④ end for
⑤ 根据F(pi)降序排序;
⑥ return Top-k个数据点.
算法4主要对经过算法3处理后的候选结果集CS打分,并对行②③计算CS中各个数据点的得分,基于行⑤⑥数据点的得分排序,输出Top-k Skyline结果集给用户群.
综合距离较优集选取﹑K-准放松支配和Top-k个数据点选取的处理过程,进一步给出算法5 MUP-TKS的算法.
算法5. 道路网多用户偏好Top-k Skyline查询算法MUP-TKS.
输入:数据集P,道路网路段集R,用户群G,用户查询关键字keys,用户权重w,无差异阈值θ,k,维度优劣集合ζ;
输出:Top-k Skyline结果集.
① 预先计算保存数据集的静态Skyline 集;
② 距离较优集选取方法G_DBC;/*调用算法1*/
③ 对距离较优集与静态Skyline集求并集S;
④ K-准放松支配算法KPRD; /*调用算法 3*/
⑤ Top-k 个数据点选取方法TK_DC. /*调用算 法4*/
4. 实验比较与分析
本节主要对MUP-TKS进行实验以及性能评估. 实验对比算法为道路网单用户偏好Skyline算法UP-BPA[26]、K支配空间偏好Skyline算法KSJQ[23]以及基于时间道路网多用户偏好Skyline算法DSAS[27].UP-BPA算法适用于道路网单用户,为了更好地与本文所提MUP-TKS进行对比,将其扩展,对查询用户群的每个用户分别运行该算法;再对子结果集取并集,得到候选结果集CS;最后对候选结果集基于z-值的打分函数打分,得到Top-k个数据点,扩展后的算法称为EUP-BPA.将KSJQ算法扩展,对每个用户单独执行该算法,用户偏好对应它的K个子空间;对每个用户的结果集取并集后得到候选结果集;对候选结果集CS基于z-值的打分函数打分,得到Top-k个Skyline结果集,扩展后的算法称为EKSJQ.将DSAS算法扩展,对满足不同用户需求的数据点基于z-值打分函数打分,按照数据点得分从高至低返回Top-k个Skyline结果集,扩展后的算法称为EDSAS.
4.1 数据集及实验环境设置
实验使用真实道路网数据集. 道路网数据集
1 是北美2.5×107 km2范围内的路段信息,它包含175813个节点和179179条边. 兴趣点数据集2 来自北美酒店及登记信息. 查询用户采用随机生成的方式. 本文使用Vor-R*-DHash索引结构组织数据集. 实验参数取值范围如表1所示,每个用户最大关注维度为4.每个实验采取单一变量原则,其余变量为默认值,实验结果取30次实验运行的平均值.表 1 实验参数设置Table 1. Experimental Parameter Setting参数 取值范围 用户数量 5,10,15,20,25,30,35 数据集规模 1×104,2×104,3×104,4×104,5×104 数据维度 5,7,9,11,13,15,17 无差异阈值(标准差) 0.1倍,0.5倍,1倍,2倍,10倍 获取数据点数量k 2,4,6,8,10 注:加粗数值表示参数默认取值. 实验环境为:Windows 10(64b),CoreTM i6-5200U CPU @2.20 GHz 2.19 GHz处理器,12 GB运行内存. 在IntelliJ IDEA开发平台上使用Java实现本文所提的算法MUP-TKS和对比算法EUP-BPA,EKSJQ,EDSAS.
4.2 算法对比实验
1)用户数量对算法性能的影响
为了分析用户数量对算法性能的影响,本实验对不同用户数量下的MUP-TKS,EKSJQ,EDSAS,EUP-BPA算法进行测试,观察算法在不同用户数量下的CPU运行时间、候选结果集CS数量的变化情况.
图3展示了4种算法在不同用户数量下CPU运行时间变化情况.由图3可知,随着用户数量的增加,4种算法的CPU运行时间都在增加. 因为用户数量增加导致不同用户的偏好情况增加,从而需要更多时间处理用户偏好. MUP-TKS的CPU运行时间增长趋势没有其他3种算法的增长趋势大,主要原因是MUP-TKS将多用户的偏好转换成用户群权重偏好次序,对数据集按照该次序预排序,再进行K-准放松支配,使用户数量增加对CPU运行时间的影响减小.
图4展示了4种算法随着用户数量的变化,候选结果集CS数量的变化情况. 由图4可知随着用户数量的增加,CS的数量变大. 但MUP-TKS,EKSJQ,EDSAS算法的变化趋势远没有EUP-BPA算法的变化趋势大,主要因为EUP-BPA算法需要对每个用户进行偏好Skyline查询,再合并各用户的偏好Skyline结果集.
2)数据规模对算法性能的影响
为了分析数据规模对MUP-TKS性能的影响,本实验对不同数据规模下的MUP-TKS,EKSJQ,EDSAS,EUP-BPA算法进行测试,观察4种算法在不同数据规模下CPU运行时间、CS数量的对比情况.
由图5可知,随着数据集规模变大,CPU运行时间不断增加,因为当数据集规模变大时,需要比较的元组数量增加. 而MUP-TKS的增长趋势比其他3种算法小,主要因为MUP-TKS利用剪枝策略和Vor-R*-DHash索引提前剪枝大量不可能成为Skyline的数据点,减少了元组比较次数.
3)k值对算法性能的影响
图6展示了4种算法随着k值变化CPU运行时间变化的情况. 随着k值变化,MUP-TKS的CPU运行时间没有太大变化,因为MUP-TKS在每一轮放松支配后会保存结果集,当k值变化时,可直接找到对应符合大小要求轮次的CS打分,即可得到Top-k Skyline结果集,该过程时间消耗很小. 而EKSJQ,EUP-BPA算法都需要重新计算,时间消耗较大.
图7展示了4种算法随着k值变化元组比较次数的变化情况. 可以发现MUP-TKS随着k值增大,元组比较次数减少,因为当k值增大时,放松支配的轮次减少. 而随着k值增大,EKSJQ,EUP-BPA算法的元组比较次数增多,因为需要进行更多的支配比较找到Top-k个数据点. 随着k值增大,EDSAS算法的元组比较次数基本没有变化.
4)无差异阈值对算法性能的影响
本实验分析无差异阈值对MUP-TKS性能的影响. 图8展示了MUP-TKS在不同无差异阈值下CPU运行时间的变化情况. 由图8可知,若只考虑第1轮放松时间,无差异阈值变化对第1轮放松的CPU响应时间影响不大,因为不同无差异阈值的初始数据集大小都是相同的,处理相同数据集规模的时间差异不大. 而算法总运行时间随着阈值增大而减小,因为无差异阈值增大后,放松支配时会删减更多被支配的元组.
5. 总 结
本文针对现实生活中道路网多用户场景的偏好Top-k Skyline 查询问题,进行深入分析与研究. 作为道路网上单用户偏好Skyline查询问题的补充,提出了一种基于道路网环境下多用户偏好Top-k Skyline查询方法. 该方法利用剪枝规则和索引减少了距离计算开销,并利用用户群权重偏好次序进行放松支配,使结果集可控. 实验结果表明,本文方法能有效解决道路网多用户偏好查询问题,返回的结果集可以满足多用户偏好与权重需求,可以提供有效参考价值. 下一步研究重点主要集中在对多查询用户移动情况下偏好 Top-k Skyline 查询问题的处理.
作者贡献声明:李松提出了方法思路和技术方案;宾婷亮和郝晓红负责算法优化、完成部分实验并撰写论文;张丽平完成部分实验;郝忠孝提出指导意见并修改论文.
-
表 1 2021—2023年不同IoT设备的固件漏洞案例
Table 1 Examples of Firmware Vulnerabilities for Different IoT Devices in 2021-2023
类型 漏洞编号 设备类型 设备型号 固件漏洞描述 硬编码凭据漏洞 CVE-2022-28371 微波通信设备 Verizon 5G
Home LVSKIHP远程RPC访问的静态证书嵌入固件在设备群中共享,攻击者提取证书私有组件能获得访问权限. CVE-2021-46008 无线路由器 Totolink a3100r 固件中硬编码Telnet密码. 缓冲区溢出 CVE-2022-22570 门禁读卡器 UniFi 允许已获得网络访问权限的攻击者控制所有连接的UA设备. CNVD-2021-18376 Snapdragon产品
无线路由器FiberHome HG6245D devices(China) 在分析GTK帧时,由于整数溢出到缓冲区溢出而导致WLAN内存损坏. CNVD-2021-29152 AP管理路由器
无线路由器Tenda100路由器
D-Link DIR-816 A2存在一个栈溢出漏洞,该漏洞可能允许未经身份验证的远程攻击者在受影响的设备上执行任意代码. 固件更新 CVE-2021-3166 无线路由器 华硕DSL-N14U-81 攻击者可将任意文件内容命名为Settings_DSL-N14U-B1.trx作为固件更新上传. CVE-2022-3789 智能相机 摩托罗拉
Binatone Hubble允许具有物理访问权限的攻击者获取用于解密固件更新包的密钥. CNVD-2020-15984 无线路由器 D-Link DSL-2640B 管理界面未对固件更新POST请求执行身份验证检查,攻击者可利用该漏洞安装其选择的固件. 信息泄露 CVE-2022-30563 摄像头 太华IPC-HX2XXX 捕获通过WS-UsernameToken模式进行身份验证的未加密ONVIF请求,诱骗设备创建管理员账户,获得最高权限可实时观看、重放摄像头视频. CVE-2022-33175 配电单元设备 Powertek 可通过特定API访问user.token字段,导致泄露当前登录管理员的活动会话ID. CVE-2023-23575 CONPROSYS物联网网关产品 M2M网关固件版本
3.7.10及更早版本远程认证攻击者可绕过访问限制,访问网络维护页面,获取该产品网络信息. 命令注入 CVE-2022-30105 无线路由器 贝尔金N300 ASP页面脚本存在远程命令注入漏洞,使用特制参数提交POST请求,可以Root权限执行OS命令. CVE-2023-27917 CONPROSYS物联网网关产品 M2M网关固件版本
3.7.10及更早版本产品中的操作系统命令注入漏洞允许经过身份验证的远程攻击者访问网络维护页面,以Root权限执行任意操作系统命令. CNVD-2023-43930 无线路由器 锐捷RG-AP850-A 存在命令注入漏洞,具有Web用户权限的攻击者可利用该漏洞以Root权限执行任意命令. 表 2 IoT设备安全风险检测技术前沿研究热点
Table 2 Frontier Research Hotspots of IoT Device Security Risk Detection Technology
检测类别 涉及文献篇数 检测技术 芯片木马检测分析技术 11 逻辑测试 测信道分析 接口风险检测 5 放串口检测 JTAG编程接口检测 总线/接口交互平台研制 无线协议风险检测 14 被动检测 信号监听 信号分析 主动检测 模糊测试 中间人攻击 固件风险检测 26 静态分析 逆向分析 传统程序静态分析 动态分析 仿真运行 模糊测试 应用与服务风险检测 30 静态分析 基于规则的分析 可达路径分析 静态符号执行 静态污点分析 动态分析 模糊测试 动态符号执行 动态污点分析 其他分析 基于AI的分析 信息流分析 流量分析 入侵检测 -
[1] Xenofontos C, Zografopoulos I, Konstantinou C, et al. Consumer, commercial, and industrial IoT (in) security: Attack taxonomy and case studies[J]. IEEE Internet of Things Journal, 2021, 9(1): 199−221
[2] 李柏松,常安琪,张家兴. 物联网僵尸网络严重威胁网络基础设施安全——对Dyn公司遭僵尸网络攻击的分析[J]. 信息安全研究,2016,2(11):1042−1048 Li Bosong, Chang Anqi, Zhang Jiaxing. Internet of things botNet seriously threatens network infrastructure security——Analysis of Dyn company's botNet attack[J]. Information Security Research, 2016, 2(11): 1042−1048 (in Chinese)
[3] Catalin Cimpanu. Ukraine says it stopped a VPNFilter attack on a Chlorine distillation station[EB/OL]. (2018-07-12) [2023-08-25]. https://www.bleepingcomputer.com/news/security/ukraine-says-it-stopped-a-vpnfilter-attack-on-a-chlorine-distillation-station/
[4] Alpha_h4ck. Vpnfilter恶意软件突袭了乌克兰的关键基础设施[EB/OL]. (2018-07-16) [2023-08-25]. https://www.freebuf.com/news/177669.html Alpha_h4ck. Vpnfilter malware attacked critical infrastructure in Ukraine[EB/OL]. (2018-07-16) [2023-08-25]. https://www.freebuf.com/news/177669.html(in Chinese)
[5] 唐哲的猫. APT28针对IoT设备(网络)的攻击和控制方式[EB/OL]. (2020-10-28) [2023-08-25]. https://www.freebuf.com/news/253332.html Tang Zhe’s cat. APT28 attack and control methods fot IoT devices (networks)[EB/OL]. (2020-10-28) [2023-08-25]. https://www.freebuf.com/news/253332.html(in Chinese)
[6] Evan. Roomba扫地机器人资料泄露[EB/OL]. (2022-12-23) [2023-08-25]. https://technews.tw/2022/12/23/robot-vacuum-took-photo-of-woman-on-toilet-that-was-shared-on-facebook/ Evan. Data on Roomba vacuum cleaner leaked[EB/OL]. (2022-12-23) [2023-08-25]. https://technews.tw/2022/12/23/robot-vacuum-took-photo-of-woman-on-toilet-that-was-shared-on-facebook/(in Chinese)
[7] ThroughTek. ThroughTek p2p sdk. [EB/OL]. (2021-06-15) [2023-08-25].https://www.cisa.gov/news-events/ics-advisories/icsa-21−166-01
[8] Labumbard J. Enterprise vulnerability management: US08789192B2[P]. 2014−07-22
[9] Tanner D A, Hinchliffe A, Santos D. Threat assessment: Blackcat ransomware[EB/OL]. (2022-01-27) [2023-08-25]. https://unit42 Paloaltonetworks com/blackcatransomware/
[10] Abdulsattar K, Al-omary A. A survey: Security issues in IoT environment and IoT architecture[C] //Proc of the 3rd Smart Cities Symp. New York: Curran Associates, Inc, 2020: 298−304
[11] Veluvarthi R, Rameswarapu A, KalyanA K V S, et al. Security and privacy threats of IoT devices: A & short review[C] //Proc of the 2023 4th Int Conf on Signal Processing and Communication (ICSPC). Piscataway, NJ: IEEE, 2023: 32−37
[12] Murzaeva A, Kepceoglu B, Demirc S. Survey of network security Issues and solutions for the IoT[C] //Proc of the 2019 3rd Int Symp on Multidisciplinary Studies and Innovative Technologies (ISMSIT). Piscataway, NJ: IEEE, 2019: 511−516
[13] 张骞,倪林,吴波. 基于IoT设备漏洞检测的安全防护技术研究[J]. 网络安全技术与应用,2023(5):24−26 Zhang Qian, Ni Lin, Wu Bo. Research on security protection technology based on IoT device vulnerability detection[J]. Network Security Technology and Application, 2023(5): 24−26 (in Chinese)
[14] Bettayeb M, Nasir Q, Talib M A. Firmware update attacks and security for IoT devices: Survey[C] //Proc of the ArabWIC 6th Annual Int Conf Research Track. New York: ACM, 2019: 1−6
[15] Kawakani, Claudio, Toshio, et al. A survey of intrusion detection in internet of things[J]. Journal of Network & Computer Applications, 2017, 84: 25−37
[16] Noor M B, Hassan W H. Current research on internet of things (IoT) security: A survey[J]. Computer Networks, 2019, 148(15): 283−294
[17] Nugroho E P, Djatna T, Sitanggang I S, et al. A review of intrusion detection system in IoT with machine learning approach: Current and future research[C] //Proc of the 2020 6th Int Conf on Science in Information Technology (ICSITech). Piscataway, NJ: IEEE, 2020: 138−143
[18] Khan A R, Kashif M, Jhaveri R H, et al. Deep learning for intrusion detection and security of Internet of things (IoT): Current analysis, challenges, and possible solutions[J/OL]. Security and Communication Networks. [2023-08-25]. https://doi.org/10.1155/2022/4016073
[19] Miessler D, Guzman A, Rudresh V, et al. Open web application security project[EB/OL]. [2023-08-25]. https://owasp.org/www-project-internet-of-things/#tab=IoT_Attack_Surface_Areas
[20] Felt A P, Wang H J, Moshchuk A, et al. Permission re-delegation: Attacks and defenses[C] //Proc of the 20th USENIX Security Symp. Berkeley, CA: USENIX Association, 2011: 19−34
[21] Meneghello F, Calore M, Zucchetto D, et al. IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices[J]. IEEE Internet of Things Journal, 2019, 6(5): 8182−8201 doi: 10.1109/JIOT.2019.2935189
[22] Musleh A S, Chen G, Dong Z Y. A survey on the detection algorithms for false data injection attacks in smart grids[J]. IEEE Transactions on Smart Grid, 2020, 11(3): 2218−2234 doi: 10.1109/TSG.2019.2949998
[23] Sun Mingshen, Wei Tao, Lui J C. Taintart: A practical multi-level information-flow tracking system for Android runtime[C] //Proc of the 2016 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2016: 331−342
[24] Liu Ting, Liu Pengfei, Wang Jiazhou, et al. Method for detecting physical intrusion attack in industrial control system based on analysis of signals on serial communication bus: US20200302054A1[P]. 2020-09-24
[25] IFTTT. Over 800 APPs, services, and devices (and millions of their users) rely on IFTTT for their most important integrations[EB/OL]. [2023-08-25]. https://ifttt.com
[26] 王雷,杨照金,黎高平,et al. 大口径高能量激光测量中后向散射能量研究[J]. 激光技术,2006,30(1):43−46 Wang Lei, Yang Zhaojin, Li Gaoping, et al. Research on backscattering energy in large aperture high energy laser measurement[J]. Laser Technology, 2006, 30(1): 43−46 (in Chinese)
[27] Grover K, Lim A, Yang Q. Jamming and anti–jamming techniques in wireless networks: A survey[J]. International Journal of Ad Hoc and Ubiquitous Computing, 2014, 17(4): 197−215 doi: 10.1504/IJAHUC.2014.066419
[28] Wikipedia. BadUSB[EB/OL]. [2023-08-25]. https://en.wikipedia.org/wiki/BadUSB
[29] Liu Y, Li L. Testing and analysis of the security of WLAN based on WEP[J]. Journal of Wuhan University of Technology (Transportation Science & Engineering), 2006, 30(1): 60−62
[30] Vanhoef M. Fragment and forge: Breaking wi-fi through frame aggregation and fragmentation[C] //Proc of the 30th USENIX Security Symp (USENIX Security’21). Berkeley, CA: USENIX Association, 2021: 161−178
[31] KU Leuven. FragAttacks[EB/OL]. [2023-08-25]. https://www.fragattacks.com/
[32] 刘桄序,陈杜宇. 基于特斯拉汽车网络安全的规范探讨[J]. 产城,2021(4):56−57 Liu Guangxu, Chen Duyu. Discussion on Tesla auto network security specifications[J]. Chancheng, 2021(4): 56−57 (in Chinese)
[33] 王影. 基于NFC的移动支付安全技术研究 [D]. 广州: 广东工业大学, 2016 Wang Ying. Research on NFC-based mobile payment security technology [D]. Guangzhou: Guangdong University of Technology, 2016 (in Chinese)
[34] Marksteiner S, Jiménez V J E, Vallant H, et al. An overview of wireless IoT protocol security in the smart home domain[C] //Proc of the 2017 Int of Things Business Models, Users, and Networks. Piscataway, NJ: IEEE, 2017: 1−8
[35] Thread group. Thread[EB/OL]. [2023-08-25]. https://www.threadgroup.org/
[36] 微步在线研究响应中心. “海莲花”组织运营的物联网僵尸网络[EB/OL]. [2023-08-25]. https://mp.weixin.qq.com/s/v2wiJe-YPG0ng87ffBB9FQ Microstep online Research Response Center. An IoT botNet operated by the Sea Lotus Organization[EB/OL]. [2023-08-25]. https://mp.weixin.qq.com/s/v2wiJe-YPG0ng87ffBB9FQ(in Chinese)
[37] GA/T 1390.5-2017. 信息安全技术网络安全等级保护基本要求第5部分: 工业控制安全扩展耍求 [S]. 国内-行业标准-行业标准-公共安全标准 CN-GA, 2017 GA/T 1390.5-2017. Information security technology basic requirements for network security level protection part 5: Industrial control security expansion requirements [S]. Domestic-Industry Standard-Industry Standard-Public Safety Standard CN-GA, 2017 (in Chinese)
[38] 王振东,张林,李大海. 基于机器学习的物联网入侵检测系统综述[J]. 计算机工程与应用,2021,57(4):18−27 Wang Zhendong, Zhang Lin, Li Dahai. A survey of machine learning-based intrusion detection systems for the Internet of things[J]. Computer Engineering and Applications, 2021, 57(4): 18−27 (in Chinese)
[39] Li Rui, Diao Wenrui, Li Zhou, et al. Android custom permissions demystified: From privilege escalation to design shortcomings[C] //Proc of the 2021 IEEE S&P. Piscataway, NJ: IEEE, 2021: 70−86
[40] Yang Zhemin, Yang Min, Zhang Yuan, et al. AppIntent: Analyzing sensitive data transmission in Android for privacy leakage detection[C] //Proc of the 2013 ACM SIGSAC Conf on Computer & Communications Security. New York: ACM, 2013: 1043−1054
[41] Zhon Wei, Jia Yan, Yao Yao, et al. Discovering and understanding the security hazards in the interactions between IoT devices, mobile apps, and clouds on smart home platforms[C]// Proc of the 28th USENIX conf on Security Symp. Berkeley, CA: USENIX Association, 2019:1133-1150. DOI: 10.48550/arXiv.1811.03241.
[42] Chen Jiongyi, Zuo Chaoshun, Diao Wenrui, et al. Your IoTs are (not) mine: On the remote binding between IoT devices and users[C] //Proc of the 2019 49th Annual IEEE/IFIP Int Conf on Dependable Systems and Networks (DSN). Piscataway, NJ: IEEE, 2019: 222−233
[43] Intersoft consulting. General Data Protection Regulation[EB/OL]. (2016-05-04)[2023-08-25]. https://gdpr-info.eu
[44] Bainbiridge D, Pearce G. The UK data protection act 1998 — Data subjects’ rights[J]. Computer Law & Security’ Review, 1998, 14(6): 401−406
[45] UK Gov. Data Protection Act 2018[EB/OL]. (2018-05-23)[2023-08-25]. https://www.gov.uk/government/collections/data-protection-act-2018
[46] India Internets. California Consumer Privacy Act[EB/OL]. [2023-08-25]. https://www.coralesecure.com/california-consumer-privacy-act.php
[47] GC. Personal Information Protection and Electronic Documents Act (S. C. 2000, c. 5)[EB/OL]. (2000-05-21)[2023-08-25]. https://laws-lois.justice.gc.ca/eng/acts/P-8.6
[48] Entrust. South Africa Protection of Personal Information Act[EB/OL]. (2013-11-03)[2023-08-25]. https://www.entrust.com/digital-security/hsm/solutions/compliance/emea/complying-south-africas-protection-personal-information-act
[49] JPn Gov. Amended Act on the Protection of Personal Information[EB/OL]. (2015-12-09)[2023-08-25]. https://www.ppc.go.jp/files/pdf/280222_amendedlaw.pdf
[50] 余晨. 中华人民共和国数据安全法[EB/OL]. (2021-06-10)[2023-08-25]. http://www.npc.gov.cn/npc/c30834/202106/7c9af12f51334a73b56d7938f99a788a.shtml Yu Chen. Data Security Law of the People’s Repulic of China[EB/OL]. (2021-06-10)[2023-08-25]. http://www.npc.gov.cn/npc/c30834/202106/7c9af12f51334a73b56d7938f99a788a.shtml(in Chinese)
[51] Parvin S, Goli M, Torres F S, et al. Trojan-D2: Post-layout design and detection of stealthy hardware trojans-a risc-v case study[C] //Proc of the 28th Asia and South Pacific Design Automation Conf. Piscataway, NJ: IEEE, 2023: 683−689
[52] U. S. Department of Homeland Security. Strategic Principles for Securing the Internet of Things [EB/OL]. (2016-11-15)[2023-08-25]. https://www.dhs.gov/sites/default/files/publications/Strategic_Principles_for_Securing_the_Internet_of_Things-2016−1115-FINAL_v2-dg11.pdf
[53] Choo K-K R, Gai K, Chiaraviglio L, et al. A multidisciplinary approach to Internet of things (IoT) cybersecurity and risk management [Z]. Amsterdam: Elsevier, 2021: 102136
[54] Tech target. Common Criteria (CC) for Information Technology Security Evaluation[EB/OL]. (2005-05-04)[2023-08-25]. https://www.techtarget.com/whatis/definition/Common-Criteria-CC-for-Information-Technology-Security-Evaluation
[55] Cad. Common evaluation methodology[EB/OL]. (2020-11-23)[2023-08-25]. https://www.connectedautomateddriving.eu/gaps-to-be-addressed-in-the-common-evaluation-methodology/
[56] 中国网络安全审查技术与认证中心[EB/OL]. [2023-06-23]. https: //www.isccc.gov.cn/ China Cybersecurity Review Technology and Certification Center[EB/OL]. [2023-06-23]. https://www.isccc.gov.cn/
[57] Bieker F, Friedewald M, Hansen M, et al. A process for data protection impact assessment under the European general data protection regulation[C] //Proc of the Privacy Technologies and Policy: 4th Annual Privacy Forum (APF 2016). Berlin: Springer, 2016: 21−37
[58] Edpb. European Data Protection Board[EB/OL]. [2023-08-25].https://edpb.europa.eu/edpb_en
[59] Commission E. Guidelines on data protection impact assessment (DPIA)(wp248rev. 01) [Z]. 2017. http://iapp.org/media/pdf/resource_center/wp29-GDPR-DPIA-guidance_final.pdf
[60] Edpb. Guidelines 01/2020 on processing personal data in the context of connected vehicles and mobility related applications[EB/OL]. (2020-01-26)[2023-08-25]. https://edpb.europa.eu/our-work-tools/our-documents/guidelines/guidelines-012020-processing-personal-data-context_en
[61] GB/T 39335-2020. 信息安全技术 个人信息安全影响评估指南[S]. 国内-国家标准-国家市场监督管理总局 CN-GB GB/T 39335-2020. Information Security Technology Personal Information Security Impact assessment Guidelines[S]. Domestic-National Standards-State Administration for Market Regulation CN-GB (in Chinese)
[62] 吴沈括. GB/T 35273-2017《信息安全技术 个人信息安全规范》[J]. 标准生活,2018(3):30−33 Wu Shenkuo. GB/T 35273-2017 “Information security technology personal information security specifications”[J]. Standard Life, 2018(3): 30−33 (in Chinese)
[63] Wikipedia. European telecommunications Standards Institute, ETSI. [EB/OL]. [2023-08-25]. https://en.wikipedia.org/wiki/ETSI
[64] CYBER - Cyber security for consumer Internet of things: Baseline requirements (Endorsement of the English version EN 303 645 V2.1. 1 (2020−06) as a German standard)[S]. Berlin: DE-DIN, 2021
[65] USA Gov. National Institute of Standards and Technology, NIST[EB/OL]. [2023-08-25]. https://www.nist.gov/
[66] USA Gov. Foundational cybersecurity activities for IoT device manufacturers, NISTIR 8259[EB/OL]. [2023-08-25]. https://csrc.nist.gov/publications/detail/nistir/8259/final
[67] CTIA. Cellular telecommunications industry association, CTIA[EB/OL]. [2023-08-25]. https://www.ctia.org/
[68] UL. UL solutions[EB/OL]. [2023-04-16].https://www.ul.com
[69] Advanced RISC machines. PSA certified: Building trust in IoT[EB/OL]. (2019-02-25)[2023-08-25]. https://www.arm.com/company/news/2019/02/psa-certified-building-trust-in-iot
[70] 施明明,谢宗晓. GB/T 37931-2019《信息安全技术 Web应用安全检测系统安全技术要求和测试评价方法》浅析[J]. 中国质量与标准导报,2020,270(4):14−15, 34 Shi mingming, Xie Zongxiao. Analysis of GB/T 37931—2019 “Information security technology web application security detection system security technical requirements and test evaluation methods”[J]. China Quality and Standard Herald, 2020, 270(4): 14−15, 34 (in Chinese)
[71] 全国标准信息公共服务平台. 信息安全技术物联网安全参考模型及通用要求[EB/OL]. (2019-07-01)[2023-08-25]. https://std.samr.gov.cn/gb/search/gbDetailed?id=7E2903B0D5475A63E05397BE0A0AF660 National Public Service Platform for Standards Information. Information security technology IoT security reference model and general requirements, Information security technology—Security reference model and generic requirements for internet of things[EB/OL]. (2019-07-01)[2023-08-25]. https://std.samr.gov.cn/gb/search/gbDetailed?id=7E2903B0D5475A63E05397BE0A0AF660 (in Chinese)
[72] YDB 173-2017. 物联网终端嵌入式操作系统安全技术要求[S]. 国内-行业标准-行业标准-邮电通信 CN-YD YDB 173-2017. Internet of things terminal embedded operating system security technical requirements[S]. Domestic-Industry Standard-Industry Standard-Post and Telecommunications CN-YD (in Chinese)
[73] Marinissen E J, Vermeulen H G H, Hollmann H D L. Automatic test pattern generation: W02004104609ALL[P]. 2001-12-02
[74] Mondel A, Karmakar S, Mahalat M H, et al. Hardware Trojan detection using transition probability with minimal test vectors[J]. ACM Transactions on Embedded Computing Systems, 2022, 22(1): 1−21
[75] Alkabani Y. Trojan immune circuits using duality[C] //Proc of the 2012 15th Euromicro Conf on Digital System Design. Piscataway, NJ: IEEE, 2012: 177−184
[76] Chakraborty R S, Paul S, Bhunia S. On-demand transparency for improving hardware Trojan detectability[C] //Proc of the 2008 IEEE Int Workshop on Hardware-Oriented Security and Trust. Piscataway, NJ: IEEE, 2008: 48−50
[77] Sakmani H, Tehranipoor M, Plusquellic J. A novel technique for improving hardware Trojan detection and reducing Trojan activation time[J]. IEEE Transactions on Very Large Scale Integration Systems, 2011, 20(1): 112−125
[78] Shende R , Ambawade D D . A side channel based power analysis technique for hardware Trojan detection using statistical learning approach[C] // Proc of 2016 13th Int Conf on Wireless and Optical Communications Networks. Piscataway, NJ: IEEE, 2016: 1−4
[79] Gunti N B, Lingasubramanian K. Efficient static power based side channel analysis for hardware Trojan detection using controllable sleep transistors[C] //Proc of the IEEE SoutheastCon. Piscataway, NJ: IEEE, 2015: 920−925
[80] Jin Y, Makris Y. Hardware Trojan detection using path delay fingerprint[C] //Proc of the 2008 IEEE Int Workshop on Hardware-oriented Security and Trust. Piscataway, NJ: IEEE, 2008: 51−57
[81] Mohammed H, Odetola T A, Hasan S R, et al. (HIADIoT): Hardware intrinsic attack detection in Internet of things; leveraging power profiling[C] //Proc of the 2019 IEEE 62nd Int Midwest Symp on Circuits and Systems. Piscataway, NJ: IEEE, 2019: 852−855
[82] Mohammed H, Hasan S R, Awwad F. FusIon-on-field security and privacy preservation for IoT edge devices: Concurrent defense against multiple types of hardware Trojan attacks[J]. IEEE Access, 2020, 8(99): 36847−36862
[83] Chen Zhe, Guo Shize, Wang Jian, et al. Toward FPGA security in IoT: A new detection technique for hardware Trojans[J]. IEEE Internet of Things Journal, 2019, 6(4): 7061−7068 doi: 10.1109/JIOT.2019.2914079
[84] Gohil V, Guo H, Patnaik S, et al. Attrition: Attacking static hardware Trojan detection techniques using reinforcement learning[C] //Proc of the 2022 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2022: 1275−1289
[85] 胡涛,佃松宜,蒋荣华. 基于长短时记忆神经网络的硬件木马检测[J]. 计算机工程,2020,46(7):110−115 Hu Tao, Tsukune Songyi, Jiang Ronghua. Hardware Trojan horse detection based on long short-term memory neural network[J]. Computer Engineering, 2020, 46(7): 110−115 (in Chinese)
[86] Serma group. Hardsploit[EB/OL]. (2017-09-08)[2023-08-25]. https://hardsploit.io
[87] Xipiter. Using the shikra to attack embedded systems getting started[Z]. 2016
[88] Bus Pirate. The Bus Pirate is an open source hacker multi-tool[EB/OL]. (2022-06-03)[2023-08-25]. http://dangerousprototypes.com/docs/Bus_Pirate
[89] Antonioli D, Tippenhauer N O, Rasmussen K B. The knob is broken: Exploiting low entropy in the encryption key negotiation of bluetooth bR/edr[C] //Proc of the 28th USENIX Security Symp. Berkeley, CA: USENIX Association, 2019: 1047–1061
[90] Zhang Yue, Weng Jian, Dey R, et al. Breaking secure pairing of bluetooth low energy using downgrade attacks[C] //Proc of the 29th Usenix Security Symp. Berkeley, CA: USENIX Association, 2020: 37−54
[91] 汤永利,赵文静,梁博,等. 基于随机性检测的ZigBee协议安全传输测试方法研究[J]. 南京理工大学学报:自然科学版,2015,39(1):78−83 Tang Yongli, Zhao Wenjing, Liang Bo, et al. Secure transmission test method of ZigBee protocol based on randomness detection[J]. Journal of Nanjing University of Science and Technology (Natural Science Edition), 2015, 39(1): 78−83 (in Chinese)
[92] Takanen A, Demott J D, Miller C, et al. Fuzzing for Software Security Testing and Quality Assurance[M]. Canton St. Norwood, MA: Artech House, Inc, 2018
[93] 梁姝瑞. 基于FSM的Zigbee协议模糊测试算法 [D]. 北京: 北京邮电大学, 2014 Liang Shurui. Zigbee protocol fuzz testing algorithm based on FSM[D]. Beijing University of Posts and Telecommunications, 2014(in Chinese)
[94] Wiedemann N, Pfanner N. Mitochondrial machineries for protein import and assembly[J]. Annual Review of Biochemistry, 2017, 86(1): 685−714 doi: 10.1146/annurev-biochem-060815-014352
[95] Stute M, Heinrich A, Lorenz J, et al. Disrupting continuity of Apple’s wireless ecosystem security: New tracking, DOS, and MITM attacks on IOS and MACOS through bluetooth low energy, AWDL, and WI-FI[C] //Proc of the 30th USENIX Security Symp. Berkeley, CA: USENIX Association, 2021: 1−18
[96] Akter S, Chellappan S, Chakraborty T, et al. Man-in-the-middle attack on contactless payment over NFC communications: Design, implementation, experiments and detection[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 18(6): 3012−3023
[97] WimsettI B T. Europay/MasterCard/Visa Migration Status [J/OL]. [2023-04-15]. http://insidepatientcare.com/issues/2014/october-2014-vol-2-no-5/81-europay-mastercard-visa-migration-status
[98] Mera A, Feng Bo, Lu Long, et al. Dice: Automatic emulation of DMA input channels for dynamic firmware analysis[C] //Proc of the 2021 IEEE Symp on Security and Privacy (SP). Piscataway, NJ: IEEE, 2021: 1938−1954
[99] Wang H E, Tsai T L, Lin C H, et al. String analysis via automata manipulation with logic circuit representation[C] //Proc of the Computer Aided Verification: 28th Int Conf. Berlin: Springer, 2016, 241−260
[100] Palavicini JR G, Bryan J, Sheets E, et al. Towards firmware analysis of industrial Internet of things (IIoT) - Applying Symbolic Analysis to IIoT Firmware Vetting[C] //Proc of the 2nd Int Conf on Internet of Things, Big Data and Security: IoTBDS, 2017. S. L. : SciTePress, 2017: 470−477
[101] Nadir I, Mahmood H, Asadullah G. A taxonomy of IoT firmware security and principal firmware analysis techniques[J]. International Journal of Critical Infrastructure Protection, 2022, 38: 100552
[102] Costin A, Zaddach J, Francillon A, et al. A large-scale analysis of the security of embedded firmwares[C] //Proc of the 23rd USENIX Security Symp (USENIX Security 14). Berkeley, CA: USENIX Association, 2014: 95−110
[103] Thomas S L, Garcia F D, Chothia T. Humidify: A tool for hidden functionality detection in firmware[C] //Proc of the Detection of Intrusions and Malware, and Vulnerability Assessment: 14th Int Conf. Berlin: Springer, 2017: 279−300
[104] Schuster F, Holz T. Towards reducing the attack surface of software backdoors[C] //Proc of the 2013 ACM SIGSAC Conf on Computer & Communications Security. New York: ACM, 2013: 851−862
[105] Shoshitaishvili Y, Wang R, Hauser C, et al. Firmalice-automatic detection of authentication bypass vulnerabilities in binary firmware[C/OL] //Proc of the 22nd Annual Network and Distributed System Security Symp. [2015-02-11]. https://www.ndss-symposium.org/wp-content/uploads/2017/09/11_1_2.pdf.
[106] Chen D D, Woo M, Brumley D, et al. Towards automated dynamic analysis for Linux-based embedded firmware[C/OL] //Proc of the 23rd Annual Network and Distributed System Security Symp. 2016. https://www.ndss-symposium.org/wp-content/uploads/2017/09/towards-automated-dynamic-analysis-linux-based-embedded-firmware.pdf
[107] Zheng Y, Davanian A, Yin H, et al. Firm-AFL: High-throughput greybox fuzzing of IoT firmware via augmented process emulation[C] //Proc of the 28th USENIX Security Symp. Berkeley, CA: USENIX Association, 2019: 1099−1114
[108] Chen Jiongyi, Diao Wenrui, Zhao Qingchuan, et al. IoTfuzzer: Discovering memory corruptions in IoT through app-based fuzzing[C/OL] //Proc of the 25th Annual Network and Distributed System Security Symp. 2018. https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018_01A-1_Chen_paper.pdf
[109] Muench M, Stijohann J, Kargl F, et al. What you corrupt is not what you crash: Challenges in fuzzing embedded devices[C/OL]//Proc of the 25th Annual Network and Distributed System Security Symp. 2018 [2023-08-25]. https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018_01A-4_Muench_paper.pdf
[110] Zhu Lipeng, Fu Xiaotong, Yao Yao, et al. FIot: Detecting the memory corruption in lightweight IoT device firmware[C] //Proc of the 2019 18th IEEE Int Conf On Trust, Security And Privacy In Computing and Communications/13th IEEE Int Conf on Big Data Science and Engineering (TrustCom/BigDataSE). Piscataway, NJ: IEEE, 2019: 248−255
[111] Kim M, Kim D, Kim E, et al. Firmae: Towards large-scale emulation of IoT firmware for dynamic analysis[C] //Proc of the Annual Computer Security Applications Conf. New York: ACM, 2020: 733−745
[112] Clements A, Gustafson E, Scharnowski T, et al. Halucinator: Firmware re-hosting through abstraction layer emulation[C] //Proc of the 29th USENIX Security Symp. Berkeley, CA: USENIX Association, 2020: 1201−1218
[113] Redini N, Continella A, Das D, et al. Diane: Identifying fuzzing triggers in apps to generate under-constrained inputs for IoT devices[C] //Proc of the 2021 IEEE Symp on Security and Privacy (SP). Piscataway, NJ: IEEE, 2021: 484−500
[114] Costion A, Zarras A, Francillon A. Automated dynamic firmware analysis at scale: A case study on embedded web interfaces[C] //Proc of the 11th ACM on Asia Conf on Computer and Communications Security. New York: ACM, 2016: 437−448
[115] Falas S, Konstantionou C, Michael M K. A hardware-based framework for secure firmware updates on embedded systems[C] //Proc of the 2019 IFIP/IEEE 27th Int Conf on Very Large Scale Integration (VLSI-SoC). Piscataway, NJ: IEEE, 2019: 198−203
[116] Schmeidl F, Nazzal B, Alafi M H. Security analysis for smartthings IoT applications[C] //Proc of the 2019 IEEE/ACM 6th Int Conf on Mobile Software Engineering and Systems (MOBILESoft). Piscataway, NJ: IEEE, 2019: 25−29
[117] Wang Huan, Chen Jianping, Zhao Jianping, et al. A vulnerability assessment method in Industrial Internet of things based on attack graph and maximum flow[J]. IEEE Access, 2018, 6: 8599−8609 doi: 10.1109/ACCESS.2018.2805690
[118] He Daojing, Gu Hongjie, Li Tinghui, et al. Toward hybrid static-dynamic detection of vulnerabilities in IoT firmware[J]. IEEE Network, 2020, 35(2): 202−207
[119] Yavuz T, Brant C. Security analysis of IoT frameworks using static taint analysis[C] //Proc of the 12th ACM Conf on Data and Application Security and Privacy. New York: ACM, 2022: 203−213
[120] Luo Lannan, Zeng Qiang, Yang Bokai, et al. Westworld: Fuzzing-assisted remote dynamic symbolic execution of smart apps on IoT cloud platforms[C] //Proc of the Annual Computer Security Applications Conf. New York: ACM, 2021: 982−995
[121] Chen Lu, Liu Xing, Ma Yuanyuan, et al. Research on static analysis technology of Android application security defects[C] //Proc of the Int Conf on Electrical Engineering and Automation. Lancaster, PA: Destech Publications, 2016: 525−532
[122] Wu Bolun, Zou Futai. Code vulnerability detection based on deep sequence and graph models: A survey[J/OL]. Security and Communication Networks, 2022 [2023-08-25]. https://doi.org/10.1155/2022/1176898
[123] Feng Hantao, Fu Xiaotong, Sun Hongyu, et al. Efficient vulnerability detection based on abstract syntax tree and deep learning[C] //Proc of the IEEE Infocom 2020-IEEE Conf on Computer Communications Workshops (INFOCOM WKSHPS). Piscataway, NJ: IEEE, 2020: 722−727
[124] Song Zihua, Wang Junfeng, Liu Shengli, et al. Hgvul: A code vulnerability detection method based on heterogeneous source-level intermediate representation[J/OL]. Security and Communication Networks, 2022 [2023-08-25]. https://doi.org/10.1155/2022/1919907
[125] Napier K, Bhowmik T, Wang S. An empirical study of text-based machine learning models for vulnerability detection[J]. Empirical Software Engineering, 2023, 28(2): Article No.38 doi: 10.1007/s10664-022-10276-6
[126] Smartthing. SmartTHING[EB/OL]. [2023-08-25]. https://www.smartthing.org
[127] IFTTT. IFTTT[EB/OL]. [2023-08-25]. https://ifttt.com
[128] Amazon. Get started with the free Alexa App[EB/OL]. [2023-08-25]. https://www.amazon.com/b?ie=UTF8&node=18354642011
[129] Fernandes E, Jung J, Prakash A. Security analysis of emerging smart home applications[C] //Proc of the 2016 IEEE Symp on Security and Privacy (SP). Piscataway, NJ: IEEE, 2016: 636−654
[130] Fernandes E, Rahmati A, Jung J, et al. Decentralized action integrity for trigger-action IoT platforms[C/OL] //Proc of the 25th Annual Network and Distributed System Security Symp.2018 [2023-08-25]. https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018_01A-3_Fernandes_paper.pdf
[131] Wang Xinyu, Sun Jun, Chen Zhenbang, et al. Towards optimal concolic testing[C]//Proc of the 40th Int Conf on Software Engineering. New York: ACM, 2018: 291−302
[132] Celik Z B, Babun L, Sikder A K, et al. Sensitive information tracking in commodity IoT[C] //Proc of the 27th Security Symp. Berkeley, CA: USENIX Association, 2018: 1687−1704
[133] Surbatovich M, Aliuraidan J, Bauer L, et al. Some recipes can do more than spoil your appetite: Analyzing the security and privacy risks of IFTTT recipes[C] //Proc of the 26th Int Conf on World Wide Web. New York: ACM, 2017: 1501−1510
[134] Zhang Nan, Mi Xianghang, Fengxuan, et al. Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems[C] //Proc of the 2019 IEEE Symp on Security and Privacy (SP). Piscataway, NJ: IEEE, 2019: 1381−1396
[135] Andeson J P. Computer security threat monitoring and surveillance[R]. Washington, Pa: James P Anderson Company, 1980
[136] Denning D E. An intrusion-detection model[J]. IEEE Transactions on Software Engineering, 1987(2): 222−232
[137] 王展鹏,吴红光,马蓓娇,等. 基于机器学习的工业物联网入侵检测技术研究[J]. 智能物联技术,2018,1(2):13−17 Wang Zhanpeng, Wu Hongguang, Ma Beijiao, et al. Research on intrusion detection technology of industrial Internet of things based on machine learning[J]. Intelligent IoT Technology, 2018, 1(2): 13−17 (in Chinese)
[138] 潘桐,陈伟,吴礼发. 面向不平衡样本的物联网入侵检测方法[J]. 网络与信息安全学报,2023,9(1):130−139 Pan Tong, Chen Wei, Wu Lifa. IoT intrusion detection method for unbalanced samples[J]. Journal of Network and Information Security, 2023, 9(1): 130−139 (in Chinese)
[139] 胡向东,熊文韬. 面向智能家居的入侵检测方法研究[J]. 广东通信技术,2016,36(5):10−16 Hu Xiangdong, Xiong Wentao. Research on intrusion detection method for smart home[J]. Guangdong Communication Technology, 2016, 36(5): 10−16 (in Chinese)
[140] Dong Feng, Wang Junfeng, Li Qi, et al. Defect prediction in Android binary executables using deep neural network[J]. Wireless Personal Communications, 2018, 102: 2261−2285 doi: 10.1007/s11277-017-5069-3
[141] Cui Jianfeng, Wang Lixin, Zhao Xin, et al. Towards predictive analysis of Android vulnerability using statistical codes and machine learning for IoT applications[J]. Computer Communications, 2020, 155: 125−131 doi: 10.1016/j.comcom.2020.02.078
[142] Aghaei E , Niu Xi, Shadid W , et al. SecureBERT: A domain-specific language model for cybersecurity[J]. ArXiv preprint, arXiv. 2204.02685, 2022
[143] Kereopa-yopke B. Building resilient SMEs: Harnessing large language models for cyber security in Australia[J]. ArXiv preprint, arXiv: 2306.02612, 2023
[144] Cintas-canto A, Kaur J, Mozaffari-kermani M, et al. ChatGPT vs lightweight security: First work implementing the nist cryptographic standard ascon[J]. ArXiv preprint, arXiv: 2306.08178, 2023
[145] Zhang Yangyong, Xu Lei, Menaoza A, et al. Life after speech recognition: Fuzzing semantic misinterpretation for voice assistant applications[C/OL]// Proc of the Network and Distributed System Security Symp (NDSS’19). 2019 [2023-08-25]. https://www.ndss-symposium.org/wp-content/uploads/2019/02/ndss2019_08−4_Zhang_paper.pdf
[146] Cui Lei, Qu Youyang, Xie Gang, et al. Security and privacy-enhanced federated learning for anomaly detection in IoT infrastructures[J]. IEEE Transactions on Industrial Informatics, 2022, 5(18): 3492−3500
[147] Mothukuri V, Khare P, Parizi R M, et al. Federated-learning-based anomaly detection for IoT Security attacks[J]. IEEE Internet of Things Journal, 2021, 9(4): 2545−2554
-
期刊类型引用(12)
1. 徐享希,李炯彬,郭志远. 车联网网络安全挑战与评估技术分析. 质量与认证. 2025(02): 83-86+91 . 百度学术
2. 郭健忠,王灿,谢斌,闵锐. 面向车联网DoS攻击的混合入侵检测系统. 计算机系统应用. 2025(03): 85-93 . 百度学术
3. 赵建斌,杜彦辉. 浅析车联网漏洞挖掘技术. 警察技术. 2025(02): 25-29 . 百度学术
4. 李俊吉,张佳琦,高改梅,杨莉. 基于信誉机制的车联网共识算法. 计算机工程. 2025(04): 217-226 . 百度学术
5. 黄金洲,杭波,王峰,徐德刚. 车联网技术在襄阳智慧交通建设中的应用. 智能城市. 2024(01): 20-23 . 百度学术
6. 李昱. 容许风险与自动驾驶场景中的注意义务. 现代法学. 2024(04): 161-174 . 百度学术
7. 谢勇,胡秋燕,李仁发,谢国琪,肖甫. 基于Uptane的汽车软件在线升级优化框架. 计算机研究与发展. 2024(09): 2145-2155 . 本站查看
8. 洪榛,冯王磊,温震宇,吴迪,李涛涛,伍一鸣,王聪,纪守领. 基于梯度回溯的联邦学习搭便车攻击检测. 计算机研究与发展. 2024(09): 2185-2198 . 本站查看
9. 李可,马赛,戴朋林,任婧,范平志. 基于多目标深度强化学习的车车通信无线资源分配算法. 计算机研究与发展. 2024(09): 2229-2245 . 本站查看
10. 顾芳铭,况博裕,许亚倩,付安民. 面向自动驾驶感知系统的对抗样本攻击研究综述. 信息安全研究. 2024(09): 786-794 . 百度学术
11. 刘雪娇,赵祥,夏莹杰,曹天聪. 空地协同场景下具有隐私保护的高效异构认证方案. 浙江大学学报(工学版). 2024(10): 1981-1991 . 百度学术
12. 权仕鑫,孙溶辰,刘留,孙志国. 车联网融合通信技术的场景仿真与分析. 应用科技. 2024(05): 190-196 . 百度学术
其他类型引用(11)