{"title":"An Optimized Isomorphic Design for the SM4 Block Cipher Over the Tower Field","authors":"Chuang Wang, Y. Ding, Chenlin Huang, Liantao Song","doi":"10.1109/TrustCom56396.2022.00065","DOIUrl":"https://doi.org/10.1109/TrustCom56396.2022.00065","url":null,"abstract":"The SM4 block cipher is Chinese domestic cryptography widely used to secure data confidentiality. Its performance is a key indicator in measuring the efficiency of encryption and decryption in large-scale data scenarios. In traditional tower field optimization, the paired forward and backward linear filed transformations are sandwiched between S-boxes and L-boxes for every round of the encryption operation, which introduces heavily burdensome computation times and complexity. In this paper, we propose a novel isomorphic design for the SM4 round function, where all operations are remaining in the tower filed through multiple rounds, and the paired forward and backward field transformations in each round can be omitted. Based on the isomorphic design, we introduce a more flexible fine-grained bitsliced scheme for the SM4 block cipher with the SIMD instructions, requiring only 32 independent data blocks to be processed in parallel. The experiments show that the proposed isomorphic design for the round function is superior to the traditional design, and the fine-grained bitsliced SM4 implementation on the server device and terminal device achieved 6.4 and 17.2 cycles per byte respectively, showing a performance increase of 284.3% and 54.4% compared to OpenSSL implementation(24.7 and 26.6 cycles per byte respectively).","PeriodicalId":276379,"journal":{"name":"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134549470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid BCI system combining motor imagery and conceptual imagery in a smart home environment","authors":"Ruixuan Liu, Muyang Lyu, Jiangrong Yang","doi":"10.1109/TrustCom56396.2022.00146","DOIUrl":"https://doi.org/10.1109/TrustCom56396.2022.00146","url":null,"abstract":"In this study, we combined the advantages of two spontaneous brain-computer interface instruction paradigms, conceptual imagery and motor imagery, to develop a smart home control system with better semantics for device selection and more types of device operations. The BCI system allowed users to control three kinds of household equipment: lamps, water heaters, and electric fans. A Raspberry Pi was used to simulate the usage scenarios, where users issued instructions for home equipment selection through conceptual imagery and issued specific instructions for home equipment control through motor imagery. We used Emotiv Epoc to collect EEG data and sent the data to Raspberry Pi, and we built a deep learning-based model for data processing and classification, converting EEG signals into command signals that could control home equipment. Five subjects were recruited to test the performance of the smart home control system and completed a questionnaire to evaluate their willingness to use the system after the experiments. The average accuracy rate of the system operation was 68.9%, with the highest of 73.3%, which proved that the brain-computer interface control system combining the two instruction paradigms was feasible. Users generally showed acceptance of the ease of the system use, giving an average of 5.4 out of 6 ratings.","PeriodicalId":276379,"journal":{"name":"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134007767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MCFM: Discover Sensitive Behavior from Encrypted Traffic in Industrial Control System","authors":"Zhishen Zhu, Junzheng Shi, Chonghua Wang, G. Xiong, Zhiqiang Hao, Gaopeng Gou","doi":"10.1109/TrustCom56396.2022.00124","DOIUrl":"https://doi.org/10.1109/TrustCom56396.2022.00124","url":null,"abstract":"To tackle with advanced persistent threats against industrial control system, Siemens has developed S7CommPlus- TLS, a new version of the encrypted protocol challenging traditional DPI-based anomaly detection methods. However, the communication mode of industrial control system leads to the overlapping of periodic traffic and sensitive behavior traffic, and thus makes mainstream encrypted traffic classification methods exhibit a poor performance in S7CommPlus-TLS protocol. Therefore, we design a multiple clustering framework called MCFM, which can automatically extract sensitive behavior of S7CommPlus-TLS from network traffic. The first-clustering is used as a pre-processing model to separate and remove periodic traffic from overlapping flows according to the communication mode of industrial control system. Besides, we employ the second- clustering as a generator to extract the fingerprint of sensitive behaviors. Our comprehensive experiments on the simulation dataset covering six sensitive behaviors indicate that MCFM achieves an excellent performance, and outperforms present cutting-edge methods. To the best of our knowledge, this is the first work analyzing industrial control system from the perspective of encrypted traffic analysis.","PeriodicalId":276379,"journal":{"name":"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121777284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adversarial Attacks on Deep Learning-Based Methods for Network Traffic Classification","authors":"Meimei Li, Yi Tian Xu, Nan Li, Zhongfeng Jin","doi":"10.1109/TrustCom56396.2022.00154","DOIUrl":"https://doi.org/10.1109/TrustCom56396.2022.00154","url":null,"abstract":"The network traffic data is easily monitored and obtained by attackers. Attacks against different network traffic threaten the environment of the intranet. Deep learning methods have been widely used to classify network traffic for their high classification performance. The application of adversarial samples in computer vision confirms that deep learning methods are flawed, allowing existing methods to generate incorrect results with high confidence. In this paper, the adversarial samples are used on the network traffic classification model, causing the CNN model to produce incorrect classification results for network traffic. By training the classification model adversarially, we validate the training effect and improve the classification accuracy by means of the FGSM attack method. By using the adversarial samples to the network traffic data, our approach enables proactive defence against intranet eavesdropping before the attack occurs by influencing the attacker’s classification model to misclassify.","PeriodicalId":276379,"journal":{"name":"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125866123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User Analysis and Traffic Prediction Method based on Behavior Slicing","authors":"Xin He, Lijuan Cao, Yuwei Jia, Kun Chao, Miaoqiong Wang, Chao Wang, Yunyun Wang, Runsha Dong, Zhenqiao Zhao","doi":"10.1109/TrustCom56396.2022.00230","DOIUrl":"https://doi.org/10.1109/TrustCom56396.2022.00230","url":null,"abstract":"This paper mines user behavior characteristics based on big data technology. This paper proposes a method for behavior slicing based on historical activity data, and insights into the personalized behavior characteristics. Firstly, the data is processed, and the classification is expanded on the basis of the parsed APP label types. Secondly, a time slicing method is proposed to reduce information loss, which integrates time, location, business type, and behavior into individual users. Then, based on slices of a day and a week, the paper analyzes user behavior and construct a portrait of user’s interest and preference. Finally, the periodic factor method is utilized to predict the behavior changes, forming the feature labels for users. Based on real business behaviors, this paper provides insight into user personality and effectively improves the authenticity and accuracy of prediction.","PeriodicalId":276379,"journal":{"name":"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122302034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fenghua Li, Cao Chen, Yunchuan Guo, Liang Fang, Chao Guo, Zifu Li
{"title":"Efficiently Constructing Topology of Dynamic Networks","authors":"Fenghua Li, Cao Chen, Yunchuan Guo, Liang Fang, Chao Guo, Zifu Li","doi":"10.1109/TrustCom56396.2022.00017","DOIUrl":"https://doi.org/10.1109/TrustCom56396.2022.00017","url":null,"abstract":"Accurately constructing dynamic network topology is one of the core tasks to provide on-demand security services to the ubiquitous network. Existing schemes cannot accurately construct dynamic network topologies in time. In this paper, we propose a novel scheme to construct the ubiquitous network topology. Firstly, ubiquitous network nodes are divided into three categories: terminal node, sink node, and control node. On this basis, we propose two operation primitives (i.e., addition and subtraction) and three atomic operations (i.e., intersection, union, and fusion), and design a series of algorithms to describe the network change and construct the network topology. We further use our scheme to depict the specific time-varying network topologies, including Satellite Internet and Internet of things. It demonstrates that their communication and security protection modes can be efficiently and accurately constructed on our scheme. The simulation and theoretical analysis also prove that the efficiency of our scheme, and effectively support the orchestration of protection capabilities.","PeriodicalId":276379,"journal":{"name":"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124874944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Implementation of Fault Diagnosis of Switch Machine Based on Data Enhancement and CNN","authors":"Mingyue Li, Rong Fei","doi":"10.1109/TrustCom56396.2022.00208","DOIUrl":"https://doi.org/10.1109/TrustCom56396.2022.00208","url":null,"abstract":"Fault detection of point machine operations is discussed in this paper, which is critical for ensuring the safety of a running train.This paper adopts the method of data enhancement and convolutional neural network (CNN) to study and realize the fault diagnosis of power data of switch switch machine. Firstly, six typical fault types and possible fault causes are summarized by analyzing the working process of switch machine and its power curve characteristics. In view of the imbalance of switch data, the synthesized minority oversampling technique (SMOTE) is implemented to generate switch fault data and balance switch data set. In view of the low accuracy of turnout fault diagnosis, one-dimensional convolutional neural network is adopted to classify the turnout fault diagnosis model, which further improves the accuracy of turnout fault diagnosis model and provides theoretical support for railway field maintenance. To a certain extent, it overcomes the difficulties of instability and low efficiency of manual turnout fault detection method.","PeriodicalId":276379,"journal":{"name":"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127279381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GTMS: A Gated Linear Unit Based Trust Management System for Internet of Vehicles Using Blockchain Technology","authors":"Yong Kuang, Hongyun Xu, Rui Jiang, Zhikang Liu","doi":"10.1109/TrustCom56396.2022.00015","DOIUrl":"https://doi.org/10.1109/TrustCom56396.2022.00015","url":null,"abstract":"As an essential branch of the Internet of Things (IoT), the Internet of Vehicles (IoV) provides users with efficiency and convenience for travel and is gradually replacing vehicle ad hoc network (VANET) as an integral component of intelligent transportation systems. However, due to the rapidly changing network topology and various communication capabilities, the IoV is confronted with more complex network security risks than IoT, such as trust and reputation. To prevent dishonest or malicious nodes from interfering with the IoV communication, we have proposed a Gated Linear Unit (GLU) based trust management system (GTMS) with blockchain in this paper. In the GTMS, the trust level of the node is dynamically adjusted to each message sent, which utilizes the GLU network model with hybrid trust feature extraction to calculate the value instead of a fixed formula. In addition, we design a method based on the blockchain for storing the global trust value. Road Side Units (RSUs) record the trust level adjustment with the modified blockchain technology, which customizes mining difficulty according to the node’s condition. The experimental results demonstrate that the proposed GTMS can detect malicious nodes among the road simulation with greater accuracy than the state-of-the-art method.","PeriodicalId":276379,"journal":{"name":"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129114850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongjun Li, Fanyu Kong, Jia Yu, Hanlin Zhang, L. Diao, Yunting Tao
{"title":"Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT","authors":"Hongjun Li, Fanyu Kong, Jia Yu, Hanlin Zhang, L. Diao, Yunting Tao","doi":"10.1109/TrustCom56396.2022.00082","DOIUrl":"https://doi.org/10.1109/TrustCom56396.2022.00082","url":null,"abstract":"With the popularity of Internet of Things (IoT) and 5G, privacy-preserving message transmission and authentication have become an indispensable part in the field of data collection and analysis. There exist many protocols based on the public key cryptosystem, which allow the users to utilize their own identity as the public key to carry out data encryption and digital signature, which is very suitable for applying in the IoT environment with a large number of terminal devices. However, these protocols usually involve some complex cryptographic operations, which hinder their application on the resource-constrained IoT devices. In this paper, we design a privacy-preserving and verifiable outsourcing message transmission and authentication protocol, which allows the resource-constrained users to delegate some complex operations to the two untrusted edge servers and reduce the computational burden on the users side. The designed protocol contains several secure and novel outsourcing algorithms for modular exponentiation, bilinear pairing and scalar multiplication. For the different operations in the different situations, we design several different blinding techniques and verification methods, which not only protect the users’ private information, but also ensure the users can verify the correctness of results. Finally, we carry out some experiments to show that our proposed protocol is efficient.","PeriodicalId":276379,"journal":{"name":"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129261438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TPIPD: A Robust Model for Online VPN Traffic Classification","authors":"Yongwei Meng, Tao Qin, Haonian Wang, Zhouguo Chen","doi":"10.1109/TrustCom56396.2022.00025","DOIUrl":"https://doi.org/10.1109/TrustCom56396.2022.00025","url":null,"abstract":"VPN has posed many difficulties for network security management. In this paper, we develop a robust method to classify the VPN traffic. Firstly, we investigate the VPN transmission process and find the turning packet interval (Named as TPI) is a valuable feature for VPN traffic classification. Then we employ the probability distribution of TPI to improve the robustness of classification process, which is named as TPIPD. Secondly, we evaluate our method using the ISCXVPN2016 dataset and find our method has higher classification accuracy compared with other related methods. We also find the distribution of the first few TPIs can be used to represent that of the entire TPIs of specific flow, thus our method can be used for online traffic classification. As TPIPD is a kind of probability feature, it is more robust than other traditional features. Finally, the experiments verify our methods can be used for mice flow identification.","PeriodicalId":276379,"journal":{"name":"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127746670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}