{"title":"Avoid attacks: A Federated Data Sanitization Defense in IoMT Systems","authors":"Chong Chen, Ying Gao, Siquan Huang, Xingfu Yan","doi":"10.1109/INFOCOMWKSHPS57453.2023.10225791","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225791","url":null,"abstract":"Malicious falsification of medical data destroys the training process of the medical-aided diagnosis models and causes serious damage to Healthcare IoMT Systems. To solve this unsupervised problem, this paper finds a robust data filtering method for various data poisoning attacks. First, we adapt the federated learning framework to project all of the clients' data features into the public subspace domain, allowing unified feature mapping to be established while their data remains stored locally. Then we adopt the federated clustering to re-group their features to clarify the poisoned data. The federated clustering is based on the consistent association of data and its semantics. Finally, we do the data sanitization with a simple yet efficient strategy. Extensive experiments are conducted to evaluate the accuracy and efficacy of the proposed defense method against data poisoning attacks.","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134125500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yin-Chi Li, Ping Liu, Yi-An Tai, Che-Hung Liu, Man-Hsin Chen, Chi-Yu Li, Guan-Hua Tu
{"title":"A Runtime Anomaly Detector via Service Communication Proxy for 5G Mobile Networks","authors":"Yin-Chi Li, Ping Liu, Yi-An Tai, Che-Hung Liu, Man-Hsin Chen, Chi-Yu Li, Guan-Hua Tu","doi":"10.1109/INFOCOMWKSHPS57453.2023.10226155","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10226155","url":null,"abstract":"With the growing popularity of the 5G mobile network, its security is becoming important. Although the newly introduced 5G security mechanisms have addressed many legacy security issues, there may be still vulnerabilities in the 5G network due to newly deployed components and used technologies. To detect security threats, we develop a runtime anomaly detector (RAD) platform, designated as 5G-RAD, to cooperate with the operational 5G core network via the service communication proxy (SCP). It validates the core network operation in terms of state machine and message content by analyzing control-plane messages. We demonstrate its effectiveness by building a 5G mobile network architecture with SCP based on the open-source free5GC and UERANSIM. The 5G-RAD is tested with three attacks, including DoS, authentication bypass, and invalid message injection; it can successfully detect them at run time.","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116065441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AR-Span: A Multi-Screen Adaptive Displaying System Using Smart Handheld Devices Based on Mobile Networks","authors":"Lien-Wu Chen, Ai-Ni Li, Yu Shi","doi":"10.1109/INFOCOMWKSHPS57453.2023.10226038","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10226038","url":null,"abstract":"In this paper, we design and implement a multi-screen adaptive displaying system, called AR-Span, which can enable the assembling of heterogeneous mobile devices into one multi-screen displaying equipment. The AR-Span system consists of multiple mobile devices with various screen sizes and a dedicated server communicating and coordinating among these mobile devices. AR-Span can cooperatively display a complete image on multiple mobile devices. In addition, AR-Span can precisely partition a video and synchronically play the video on multiple mobile devices. Furthermore, AR-Span can arbitrarily customize an electronic marquee on multiple mobile devices. In particular, AR-Span can immediately adjust and control the displayed content in an augmented reality based manipulation manner. Experimental results show that AR-Span manipulates the desired content much faster than existing methods/systems and can significantly reduce the total operating time. Moreover, AR-Span can improve the displaying time inconsistency and unsynchronized content gap on heterogeneous mobile devices.","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116077636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Workshop on Deep Learning for Wireless Communications, Sensing, and Security (DeepWireless)","authors":"","doi":"10.1109/infocomwkshps57453.2023.10225898","DOIUrl":"https://doi.org/10.1109/infocomwkshps57453.2023.10225898","url":null,"abstract":"","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125745159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xutong Yang, Li Wang, Lianming Xu, Yuming Zhang, Aiguo Fei
{"title":"Boids Swarm-based UAV Networking and Adaptive Routing Schemes for Emergency Communication","authors":"Xutong Yang, Li Wang, Lianming Xu, Yuming Zhang, Aiguo Fei","doi":"10.1109/INFOCOMWKSHPS57453.2023.10225900","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225900","url":null,"abstract":"Communications in disaster scenarios face critical challenges because of damage to ground communication facilities. A promising solution for emergency response is establishing self-organizing networks with flexible unmanned aerial vehicles (UAVs) swarms to provide a communication guarantee for rescue mission execution. However, the server environment of the disaster area and the highly dynamic characteristic of UAV networks place strict requirements on swarm mobility control and data transmission. To this end, this work proposes a Boids mobility model-based adaptive routing scheme to achieve efficient UAV swarm networking. Specifically, we develop a biological-inspired Boids-based Social Force Model (BSFM) to implement swarm mobility control with location information and link states to improve the communication performance of UAV networks. Then, we design an adaptive routing scheme to adjust the Hello message sending interval based on the relative velocity and distance between the UAV s for neighbor discovery and topology maintenance. We conduct experiments with Network Simulator 3 (NS-3) for performance evaluation, and simulation results show that our method outperforms conventional approaches regarding the average delay, packet loss ratio, and network throughput.","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123946896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Priyesh Ranjan, Ashish Gupta, Federico Coró, Sajal Kumar Das
{"title":"Robust Federated Learning against Backdoor Attackers","authors":"Priyesh Ranjan, Ashish Gupta, Federico Coró, Sajal Kumar Das","doi":"10.1109/INFOCOMWKSHPS57453.2023.10225922","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225922","url":null,"abstract":"Federated learning is a privacy-preserving alter-native for distributed learning with no involvement of data transfer. As the server does not have any control on clients' actions, some adversaries may participate in learning to introduce corruption into the underlying model. Backdoor attacker is one such adversary who injects a trigger pattern into the data to manipulate the model outcomes on a specific sub-task. This work aims to identify backdoor attackers and to mitigate their effects by isolating their weight updates. Leveraging the correlation between clients' gradients, we propose two graph theoretic algorithms to separate out attackers from the benign clients. Under a classification task, the experimental results show that our algorithms are effective and robust to the attackers who add backdoor trigger patterns at different location in targeted images. The results also evident that our algorithms are superior than existing methods especially when numbers of attackers are more than the normal clients.","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123183396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}