Dabin Huang, Mengyu Ge, Kunlan Xiang, Xiaolei Zhang, Haomiao Yang
{"title":"Privacy Preservation of Large Language Models in the Metaverse Era: Research Frontiers, Categorical Comparisons, and Future Directions","authors":"Dabin Huang, Mengyu Ge, Kunlan Xiang, Xiaolei Zhang, Haomiao Yang","doi":"10.1002/nem.2292","DOIUrl":"10.1002/nem.2292","url":null,"abstract":"<div>\u0000 \u0000 <p>Large language models (LLMs), with their billions to trillions of parameters, excel in natural language processing, machine translation, dialog systems, and text summarization. These capabilities are increasingly pivotal in the metaverse, where they can enhance virtual interactions and environments. However, their extensive use, particularly in the metaverse's immersive platforms, raises significant privacy concerns. This paper analyzes existing privacy issues in LLMs, vital for both traditional and metaverse applications, and examines protection techniques across the entire life cycle of these models, from training to user deployment. We delve into cryptography, embedding layer encoding, differential privacy and its variants, and adversarial networks, highlighting their relevance in the metaverse context. Specifically, we explore technologies like homomorphic encryption and secure multiparty computation, which are essential for metaverse security. Our discussion on Gaussian differential privacy, Renyi differential privacy, Edgeworth accounting, and the generation of adversarial samples and loss functions emphasizes their importance in the metaverse's dynamic and interactive environments. Lastly, the paper discusses the current research status and future challenges in the security of LLMs within and beyond the metaverse, emphasizing urgent problems and potential areas for exploration.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141871662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diego Cardoso Nunes, Bruno Loureiro Coelho, Ricardo Parizotto, Alberto Egon Schaeffer-Filho
{"title":"No Worker Left (Too Far) Behind: Dynamic Hybrid Synchronization for In-Network ML Aggregation","authors":"Diego Cardoso Nunes, Bruno Loureiro Coelho, Ricardo Parizotto, Alberto Egon Schaeffer-Filho","doi":"10.1002/nem.2290","DOIUrl":"10.1002/nem.2290","url":null,"abstract":"<div>\u0000 \u0000 <p>Achieving high-performance aggregation is essential to scaling data-parallel distributed machine learning (ML) training. Recent research in in-network computing has shown that offloading the aggregation to the network data plane can accelerate the aggregation process compared to traditional server-only approaches, reducing the propagation delay and consequently speeding up distributed training. However, the existing literature on in-network aggregation does not provide ways to deal with slower workers (called stragglers). The presence of stragglers can negatively impact distributed training, increasing the time it takes to complete. In this paper, we present Serene, an in-network aggregation system capable of circumventing the effects of stragglers. Serene coordinates the ML workers to cooperate with a programmable switch using a hybrid synchronization approach where approaches can be changed dynamically. The synchronization can change dynamically through a control plane API that translates high-level code into switch rules. Serene switch employs an efficient data structure for managing synchronization and a hot-swapping mechanism to consistently change from one synchronization strategy to another. We implemented and evaluated a prototype using BMv2 and a Proof-of-Concept in a Tofino ASIC. We ran experiments with realistic ML workloads, including a neural network trained for image classification. Our results show that Serene can speed up training by up to 40% in emulation scenarios by reducing drastically the cumulative waiting time compared to a synchronous baseline.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141774195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Generalized Lightweight Intrusion Detection Model With Unified Feature Selection for Internet of Things Networks","authors":"Renya Nath N, Hiran V. Nath","doi":"10.1002/nem.2291","DOIUrl":"10.1002/nem.2291","url":null,"abstract":"<div>\u0000 \u0000 <p>The applicability of the Internet of Things (IoT) cutting across different domains has resulted in newer “things” acquiring IP connectivity. These things, technically known as IoT devices, are vulnerable to diverse security threats. Consequently, there has been an exponential increase in IoT malware over the past 5 years, and securing IoT devices from such attacks is a pressing concern in the current era. However, the traditional peripheral security measures do not comply with the lightweight security requirements of the IoT ecosystem. Considering this, we propose a lightweight intrusion detection model for IoT networks (LIDM-IoT) that demonstrates similar efficiency in exposing malicious activities compared with the existing computationally expensive methods. The crux of the proposed model is that it provides efficient attack detection with lower computational requirements in IoT networks. LIDM-IoT achieves the feat through a novel unified feature selection strategy that unifies filter-based and embedded feature selection methods. The proposed feature selection strategy reduces the feature space by 94%. Also, we use only the records of a single attack type to build the model using the XGBoost algorithm. We have tested LIDM-IoT with unseen attack types to ensure its generalized behavior. The results indicate that the proposed model exhibits efficient attack detection, with a reduced feature set, in IoT networks compared with the state-of-the-art models.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141774197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Domain-Adaptive Power Profiling Analysis Strategy for the Metaverse","authors":"Xiang Li, Ning Yang, Weifeng Liu, Aidong Chen, Yanlong Zhang, Shuo Wang, Jing Zhou","doi":"10.1002/nem.2288","DOIUrl":"10.1002/nem.2288","url":null,"abstract":"<div>\u0000 \u0000 <p>In the surge of the digital era, the metaverse, as a groundbreaking concept, has become a focal point in the technology sector. It is reshaping human work and life patterns, carving out a new realm of virtual and real interaction. However, the rapid development of the metaverse brings along novel challenges in security and privacy. In this multifaceted and complex technological environment, data protection is of paramount importance. The innovative capabilities of high-end devices and functions in the metaverse, owing to advanced integrated circuit technology, face unique threats from side-channel analysis (SCA), potentially leading to breaches in user privacy. Addressing the issue of domain differences caused by different hardware devices, which impact the generalizability of the analysis model and the accuracy of analysis, this paper proposes a strategy of portability power profiling analysis (PPPA). Combining domain adaptation and deep learning techniques, it models and calibrates the domain differences between the profiling and target devices, enhancing the model's adaptability in different device environments. Experiments show that our method can recover the correct key with as few as 389 power traces, effectively recovering keys across different devices. This paper underscores the effectiveness of cross-device SCA, focusing on the adaptability and robustness of analysis models in different hardware environments, thereby enhancing the security of user data privacy in the metaverse environment.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141612824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
James Won-Ki Hong, Andreas Veneris, Hongtaek Ju, Taeyeol Jeong, Changhoon Kang
{"title":"Innovations in Blockchain for Crypto Assets and Exchanges","authors":"James Won-Ki Hong, Andreas Veneris, Hongtaek Ju, Taeyeol Jeong, Changhoon Kang","doi":"10.1002/nem.2287","DOIUrl":"https://doi.org/10.1002/nem.2287","url":null,"abstract":"<p>This special issue contains extended versions of the best papers from the IEEE CryptoEx 2023 workshop (https://icbc2023.ieee-icbc.org/workshop/cryptoex-2023), which was held as a co-located workshop with 2023 IEEE International Conference on Blockchain and Cryptocurrency. The workshop was held on Friday, May 5, 2023, in Dubai, UAE. The papers in this special issue explore crucial advancements in fractional NFTs, stablecoins, and cryptocurrency exchanges, reflecting the diverse and innovative applications of blockchain technology.</p><p>The first paper, titled “Fractional Non-Fungible Tokens (NFTs): Overview, Evaluation, Marketplaces, and Challenges,” authored by Wonseok Choi, Jongsoo Woo, and James Won-Ki Hong, explores the innovative concept of fractional NFTs. By democratizing access to high-value digital assets, fractional NFTs merge tokenization, smart contracts, and ownership models to revolutionize the digital economy. The paper evaluates gas consumption and examines regulatory and security challenges, underscoring the importance of transparency and robust security measures in fostering trust within fractional NFT ecosystems.</p><p>The second paper, titled “Leveraging Ponzi-like Designs in Stablecoins,” by Shange Fu, Qin Wang, Jiangshan Yu, and Shiping Chen, provides a novel perspective on algorithmic stablecoins, which are often dismissed as Ponzi schemes. This study clarifies the fundamental nature of Ponzi schemes and introduces a rational model for evaluating the sustainability of algorithmic stablecoins. By applying historical data, the paper identifies conditions under which these stablecoins can function effectively as rational Ponzi games, offering a new understanding of their stability mechanisms.</p><p>The third paper, titled “Athena: Smart Order Routing on Centralized Crypto Exchanges using a Unified Order Book,” authored by Robert Henker, Daniel Atzberger, Jan Ole Vollmer, Willy Scheibel, Jürgen Döllner, and Markus Bick, describes the development and implementation of Athena. This system optimizes trading strategies by integrating order books from multiple centralized crypto exchanges into a unified order book. Athena's smart order routing algorithm significantly reduces implicit trading costs, making it particularly beneficial for institutional investors in illiquid crypto markets.</p><p>The fourth paper, titled “Deeper: A Shared Liquidity DEX Design for Low Trading Volume Tokens to Enhance Average Liquidity,” by Srisht Fateh Singh, Panagiotis Michalopoulos, and Andreas Veneris, introduces Deeper, a decentralized exchange design aimed at improving liquidity for low trading volume tokens. By enabling liquidity providers to share reserves of a common token, Deeper addresses issues like high slippage and sandwich attacks. The paper demonstrates the enhanced liquidity achieved through historical price experiments and highlights potential risks for liquidity providers.</p><p>We believe that these four papers make significant cont","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2287","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141624577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Screen-shooting resistant robust document watermarking in the Discrete Fourier Transform domain","authors":"Yazhou Zhang, Chaoyue Huang, Shaoteng Liu, Leichao Huang, Tianshu Yang, Xinpeng Zhang, Hanzhou Wu","doi":"10.1002/nem.2278","DOIUrl":"10.1002/nem.2278","url":null,"abstract":"<p>Metaverse's augmented reality (AR) function allows virtual information to be seamlessly superimposed onto real scenes through the camera of a head-mounted device. However, this raises concerns about privacy protection and copyright authentication when transmitting cross-media information. Additionally, there is a risk of secret information leakage due to screen candid shooting in the real world. Ensuring information security and copyright authentication in case of unauthorized screen capturing is crucial. To prevent information loss and interference from cross-media transfer between screens and cameras, we implement digital watermarking for copyright protection. We have proposed an innovative framework for automatic document watermarking that can resist screen-shooting. Our approach involves embedding a ring watermark in the document underlay. On the extraction side, the watermark extraction process is divided into three key steps: automatic location, automatic correction, and automatic extraction. First, the document image is located in the covert photography. Then, perspective correction is performed based on the text line features of the document. Finally, the watermark information is extracted by combining the ring watermark features. Our method is capable of automatically extracting watermarks from covert photography while considering aspects such as concealment, robustness, and visual quality. The watermark is embedded in the document underlay, which ensures good visual quality and does not affect the normal reading and editing. We also propose various embedding strength schemes that can adapt to different usage scenarios, providing resistance to screen-shooting or screenshot attacks, as well as various noise attacks. Through extensive experiments, we have demonstrated the feasibility of the proposed automated framework and the robustness of the watermarking algorithm, as well as the superiority and broad application prospects of our method.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141273737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A secure and light-weight patient survival prediction in Internet of Medical Things framework","authors":"Shubh Mittal, Tisha Chawla, Saifur Rahman, Shantanu Pal, Chandan Karmakar","doi":"10.1002/nem.2286","DOIUrl":"10.1002/nem.2286","url":null,"abstract":"<p>Thoracic surgeries in major lung resections for primary lung cancer are fraught with potential risks, emphasising the need to understand factors contributing to postoperative mortality. This study investigates the interplay of objective and subjective data in predicting postoperative outcomes to reduce data transmission costs in the Internet of Medical Things (IoMT). Objective metrics, such as forced vital capacity (FVC), offer consistent, quantifiable insights essential for predictive modelling. Conversely, subjective data derived from patient self-reports suggest that the patient's personal experiences are crucial for assessing the quality of life postsurgery. Utilising a dataset from the University of California, Irvine's Machine Learning Repository (UCI), 17 distinct attributes were examined. Using ensemble learning classifiers, the extra trees classifier is superior when utilising all features, achieving an accuracy of 0.92. Combining select subjective features, specifically PRE6, PRE8 and AGE (demographic), with objective data, yielded a comparable accuracy of 0.91. Feature importance analysis further highlights the significance of features like PRE5, PRE4 and AGE. This suggests potential redundancies in the full feature set, emphasising the importance of feature selection. Importantly, when compared with existing literature, this study's findings offer insights into the future of predictive modelling in thoracic surgeries, with implications for the rapidly evolving field of the IoMT.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2286","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141192052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure cross-chain transactions for medical data sharing in blockchain-based Internet of Medical Things","authors":"Bohao Jiang, Chaoyang Li, Yu Tang, Xiangjun Xin","doi":"10.1002/nem.2279","DOIUrl":"10.1002/nem.2279","url":null,"abstract":"<div>\u0000 \u0000 <p>Blockchain technology has greatly promoted the development of the Internet of Medical Things (IoMT) from a centralized form to a distributed form. However, with many independent blockchain-based IoMT (BIoMT) systems being established by different institutions, these heterogeneous blockchain systems have created a new “data islands” problem. This paper proposes a multi-chain fusion (MCF) multi-party governance model based on relay chain technology. The MCF model helps establish cross-chain interaction and communication among the multiple heterogeneous blockchain systems in different medical institutions through the cross-chain gateway. Meanwhile, by utilizing the inter-blockchain transfer protocol (IBTP), the MCF model takes responsibility for legitimacy verification and reliable routing of cross-chain transactions, thus addressing the “data islands problem” inherent in traditional blockchain-based medical systems. Then, an elliptic curve signature scheme is adopted to protect user privacy in cross-chain transactions, which helps establish transaction verification for the MCF model in BIoMT systems. Finally, several experiments are carried out to prove the feasibility of the cross-chain scheme and the security of the elliptic curve signature scheme, and the performance index of the cross-chain system is evaluated. The performance results show that the MCF model can provide secure and efficient cross-chain services for sharing medical data among heterogeneous BIoMT systems, thus addressing the “data islands problem” inherent in traditional blockchain-based medical systems.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141106809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jens Leth Hougaard, Mohsen Pourpouneh, Haiting Han
{"title":"Transaction fee mechanisms with farsighted miners","authors":"Jens Leth Hougaard, Mohsen Pourpouneh, Haiting Han","doi":"10.1002/nem.2275","DOIUrl":"10.1002/nem.2275","url":null,"abstract":"<p>We investigate the recent fee mechanism EIP1559 of the Ethereum network. Whereas previous studies have focused on myopic miners, we here focus on strategic miners in the sense of miners being able to reason about the future blocks. We derive expressions for optimal miner behavior (in terms of setting block sizes) in the case of two-block foresight and varying degrees of hashing power. Results indicate that a sufficiently large mining pool will have enough hashing power to gain by strategic foresight. We further use a simulation study to examine the impact of both two-block and three-block foresight. In particular, the simulation study indicates that for realistic levels of hashing power, mining pools do not gain from being able to reason more than two blocks ahead. Moreover, even though the presence of strategic miners increases the variation in block sizes and potentially empty blocks, overall system throughput tends to increase slightly compared with myopic mining. We further analyze the effect of varying the base fee updating rule.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141117411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leveraging Ponzi-like designs in stablecoins","authors":"Shange Fu, Qin Wang, Jiangshan Yu, Shiping Chen","doi":"10.1002/nem.2277","DOIUrl":"10.1002/nem.2277","url":null,"abstract":"<p>Stablecoin represents a unique subset of cryptocurrencies designed to offer price stability, achieved either through backing by specific assets or by employing algorithms that adjust their supply in response to market demand. In its landscape, algorithmic stablecoin is one special type that is not backed by any asset, and it stands to revolutionize the way a sovereign fiat operates. As implemented, algorithmic stablecoins are poorly stabilized in most cases; their prices easily deviate from the target or even fall into a catastrophic collapse and are as a result often dismissed as a Ponzi scheme. However, what is the essence of Ponzi? In this paper, we try to clarify such a deceptive concept and reveal how algorithmic stablecoin works from a higher level. We find that Ponzi is basically a financial protocol that pays existing investors with funds collected from new ones. Running a Ponzi, however, does not necessarily imply that any participant is in any sense losing out, as long as the game can be perpetually rolled over. Economists call such realization as a <i>rational Ponzi game</i>. We accordingly propose a rational model in the context of algorithmic stablecoin and draw its holding conditions. We apply the model and use historical data to examine if the major types of algorithmic stablecoins meet the criteria for being a rational Ponzi game.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2277","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141123335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}