Hospital security and safety management最新文献

筛选
英文 中文
Preface: Security and Safety in Unmanned Systems 前言:无人系统中的安保与安全
Hospital security and safety management Pub Date : 2023-10-05 DOI: 10.1051/sands/2023032
Jian Sun, Youmin Zhang, Hong CHEN, Mou CHEN, Qinglei Hu
{"title":"Preface: Security and Safety in Unmanned Systems","authors":"Jian Sun, Youmin Zhang, Hong CHEN, Mou CHEN, Qinglei Hu","doi":"10.1051/sands/2023032","DOIUrl":"https://doi.org/10.1051/sands/2023032","url":null,"abstract":"An unmanned system is defined as an electro-mechanical system capable of exerting its power to perform designated missions with no human operator aboard. Thanks to the development of digital design (artifi-cial intelligence, control, etc .) and robotics in recent years, unmanned systems are making a revolution as an emerging technology with many different applications in the military, civilian","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134946946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization for UAV-Assisted Simultaneous Transmission and Reception Communications in the Existence of Malicious Jammers 存在恶意干扰时无人机辅助同步收发通信优化
Hospital security and safety management Pub Date : 2023-09-27 DOI: 10.1051/sands/2023031
Zhiyu Huang, Shuzhen Liu, Zhichao Sheng, Hongwen Yu, Antonino Masaracchia
{"title":"Optimization for UAV-Assisted Simultaneous Transmission and Reception Communications in the Existence of Malicious Jammers","authors":"Zhiyu Huang, Shuzhen Liu, Zhichao Sheng, Hongwen Yu, Antonino Masaracchia","doi":"10.1051/sands/2023031","DOIUrl":"https://doi.org/10.1051/sands/2023031","url":null,"abstract":"In this paper, we study an unmanned aerial vehicle (UAV)-assisted communication system, where the UAV is dispatched to implement simultaneous transmission and reception (STR) in the existence of multiple malicious jammers. Two schemes are investigated, namely frequency band-division-duplex (FDD) and time-fraction (TF). Based on FDD scheme, the UAV can transmit information by using the portion of the bandwidth and receive information within the remaining portion of the bandwidth simultaneously. To perform the STR within the whole bandwidth, the TF-based scheme is considered by using a fraction of a time slot for the downlink, while the remaining fraction of the time slot is allocated for the uplink. We aim to maximize the worst-case throughput by optimizing the UAV three dimensional (3D) trajectory and resource allocation for each scheme. The optimization problem is non-convex and thus computationally intractable. To handle the nonlinear problem, we use the block coordinate decomposition method to disaggregate the optimization problem into four subproblems and adopt the successive convex approximation technique to tackle non-convex problems. The simulation results demonstrate the performance of TF-based scheme over the benchmark schemes.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135477060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling Space-Air Integration: A Satellite-UAV Networking Authentication Scheme 实现天空融合:一种卫星-无人机组网认证方案
Hospital security and safety management Pub Date : 2023-09-25 DOI: 10.1051/sands/2023030
Sheng Li, Jin Cao, Xiaoping Shi, Hui Li
{"title":"Enabling Space-Air Integration: A Satellite-UAV Networking Authentication Scheme","authors":"Sheng Li, Jin Cao, Xiaoping Shi, Hui Li","doi":"10.1051/sands/2023030","DOIUrl":"https://doi.org/10.1051/sands/2023030","url":null,"abstract":"One of the goals of the sixth generation mobile networks (6G) is to achieve a larger network coverage area. Satellite networks enable global coverage, and aerial nodes such as Unmanned Aerial Vehicle (UAV) can serve as a supplement to ground networks in remote environments. Therefore, 6G networks are gradually evolving towards a Space-Air-Ground integrated networks. The combination of UAV networks and satellite networks is a research hotspot in the field of Space-Air integrated networks. However, the combination of UAV networks and satellite networks currently faces many challenges in terms of security. The characteristics of large propagation delay and unstable communication links in satellite networks make them vulnerable to various attacks, including eavesdropping, tampering, and impersonation. Meanwhile, existing research on UAV networks mainly focuses on UAV-Ground networking authentication mechanisms, which are not suitable for resource-constrained nodes in the Space-Air integration scenario. Therefore, based on elliptic curve public key cryptography and Chebyshev polynomial, we propose a secure networking authentication scheme for satellite nodes and UAV nodes in the Space-Air integration scenario. The security analysis indicates that our scheme possesses the security attributes such as mutual authentication, key agreement, identity anonymity, unlinkability, perfect forward-backward security and resistance against various protocol attacks, among other security properties. Performance analysis also indicates certain advantages of our scheme over existing schemes in terms of signaling, bandwidth, and computational overhead.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135769636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Cooperative Secure Control of Networked Multiple Unmanned Systems under FDI Attacks FDI攻击下网络化多无人系统的自适应协同安全控制
Hospital security and safety management Pub Date : 2023-09-14 DOI: 10.1051/sands/2023029
Yanhui Zhang, Di Mei, Yong Xu, Lihua Dou
{"title":"Adaptive Cooperative Secure Control of Networked Multiple Unmanned Systems under FDI Attacks","authors":"Yanhui Zhang, Di Mei, Yong Xu, Lihua Dou","doi":"10.1051/sands/2023029","DOIUrl":"https://doi.org/10.1051/sands/2023029","url":null,"abstract":"With the expanding applications of multiple unmanned systems in various fields, more and more research attention has been paid to their security. The aim is to enhance the anti-interference ability, ensure their reliability and stability, and better serve human society. This article conducts adaptive cooperative secure tracking consensus of networked multiple unmanned systems subjected to false data injection attacks. From a practical perspective, each unmanned system is modeled using high-order unknown nonlinear discrete-time systems. To reduce the communication bandwidth between agents, a quantizer-based codec mechanism is constructed. This quantizer uses a uniform logarithmic quantizer, combining the advantages of both quantizers. Because the transmission information attached with the false data can affect the accuracy of the decoder, a new adaptive law is added to the decoder to overcome this difficulty. A distributed controller is devised in the backstepping framework. Rigorous mathematical analysis shows that our proposed control algorithms ensure that all signals of the resultant systems remain bounded. Finally, simulation examples reveal the practical utility of the theoretical analysis.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135489864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal DoS Attack on Multi-Channel Cyber-Physical Systems: A Stackelberg Game Analysis 多通道网络物理系统的最优DoS攻击:一个Stackelberg博弈分析
Hospital security and safety management Pub Date : 2023-09-11 DOI: 10.1051/sands/2023028
H. Zhang, Haoyu Shen, Zhuping Wang, Sheng Gao, Huaicheng Yan
{"title":"Optimal DoS Attack on Multi-Channel Cyber-Physical Systems: A Stackelberg Game Analysis","authors":"H. Zhang, Haoyu Shen, Zhuping Wang, Sheng Gao, Huaicheng Yan","doi":"10.1051/sands/2023028","DOIUrl":"https://doi.org/10.1051/sands/2023028","url":null,"abstract":"In this commentary, optimal denial-of-service (DoS) attack strategies on multi-channel cyber-physical systems (CPSs) are considered, which focus on energy allocation on communication channels. For simplicity, a Stackelberg game between one defender and one attacker is constructed. Compared with the existing literature, which mainly pay attention to static equilibrium, the dynamic process of the game is also exhibited in this paper, which fills the gap in the demonstration of dynamic decision-making between both players of the game. In the solution of Stackelberg equilibrium, a self-adaptive particle swarm optimization (PSO) algorithm with Sigmoid-like update function is applied to cope with the nonlinearity of the reward function with faster convergence and wider adaptability. Besides, to acquire better performance of both sides to allocate energy, an online computation algorithm is proposed for dynamic Stackelberg game. Finally, numerical examples are provided to illustrate similarities between theoretic static equilibrium and optimal strategies obtained by Monte Carlo simulations.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91371254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematic Assessment of Cyber-Physical Security of Lane Keeping Control System for Autonomous Vehicles 自动驾驶汽车车道保持控制系统的网络物理安全系统评估
Hospital security and safety management Pub Date : 2023-09-05 DOI: 10.1051/sands/2023027
Yulei Wang, An Huang, Fan Yang, Ning Bian, Jiazhi Zhang, Lulu Guo
{"title":"Systematic Assessment of Cyber-Physical Security of Lane Keeping Control System for Autonomous Vehicles","authors":"Yulei Wang, An Huang, Fan Yang, Ning Bian, Jiazhi Zhang, Lulu Guo","doi":"10.1051/sands/2023027","DOIUrl":"https://doi.org/10.1051/sands/2023027","url":null,"abstract":"In this article, a systematic assessment of cyber-physical security is proposed for the lane keeping control (LKC) system of autonomous vehicles, which, to our knowledge, has not been attempted before. The generalized methodology of impact analysis of typical cyber-attacks is developed, including novel evaluation metrics from the perspectives of safety and performance of the LKC system and innovative index-based resilience and security criteria. Specifically, we propose a security criterion in terms of tracking performance, comfort and vehicle stability, which are the most critical metrics to evaluate the safety and security of an LKC system. Hardware-in-the-Loop (HiL) experimental results show that the proposed evaluation metrics is effective to analyze the impact of the cyber-attacks on commercial LKC system of Dongfeng Motor comprehensively. The conclusions can serve as guidelines for attack detection, diagnosis, and countermeasures.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74798010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The technology of radio frequency fingerprint identification based on deep learning for 5G application 5G应用中基于深度学习的射频指纹识别技术
Hospital security and safety management Pub Date : 2023-09-05 DOI: 10.1051/sands/2023026
Hanhong Wang, Yun Lin, Haoran Zha
{"title":"The technology of radio frequency fingerprint identification based on deep learning for 5G application","authors":"Hanhong Wang, Yun Lin, Haoran Zha","doi":"10.1051/sands/2023026","DOIUrl":"https://doi.org/10.1051/sands/2023026","url":null,"abstract":"User Equipment (UE) authentication holds paramount importance in upholding the security of wireless networks. A nascent technology, Radio Frequency Fingerprint Identification (RFFI), is gaining prominence as a means to bolster network security authentication. To expedite the integration of RFFI within fifth generation (5G) networks, this research undertakes the creation of a comprehensive link-level simulation platform tailored for 5G scenarios. The devised platform emulates various device impairments, including oscillator, IQ modulator, and power amplifier (PA) nonlinearities, alongside simulating channel distortions. Consequent to this, a plausibility analysis is executed, intertwining transmitter device impairments with 3rd Generation Partnership Project (3GPP) new radio (NR) protocols. Subsequently, an exhaustive exploration is conducted to assess the impact of transmitter impairments, deep neural networks (DNNs), and channel effects on RF fingerprinting performance. Notably, under a signal-to-noise ratio (SNR) of 15dB, the deep learning approach demonstrates the capability to accurately classify 100 UEs with a commendable 91% accuracy rate. Through a multifaceted evaluation, it is ascertained that the Attention-based network architecture emerges as the optimal choice for the RFFI task, serving as the new benchmark model for RFFI applications.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77588839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topology-based Multi-jammer Localization in Wireless Networks 无线网络中基于拓扑的多干扰器定位
Hospital security and safety management Pub Date : 2023-08-30 DOI: 10.1051/sands/2023025
Hongbo Liu, Yingying Chen, Wenyuan Xu, Zhenhua Liu, Yuchen Su
{"title":"Topology-based Multi-jammer Localization in Wireless Networks","authors":"Hongbo Liu, Yingying Chen, Wenyuan Xu, Zhenhua Liu, Yuchen Su","doi":"10.1051/sands/2023025","DOIUrl":"https://doi.org/10.1051/sands/2023025","url":null,"abstract":"Jamming attacks and unintentional radio interference are one of the most urgent threats harming the dependability of wireless communication and endangering the successful deployment of pervasive applications built on top of wireless networks. Unlike the traditional approaches focusing on developing jamming defense techniques without considering the location of jammers, we take a different viewpoint that the jammers' position should be identified and exploited for building a wide range of defense strategies to alleviate jamming. In this paper, we address the problem of localizing multiple jamming attackers coexisting in wireless networks by leveraging the network topology changes caused by jamming. We systematically analyze the jamming effects and develop a framework that can partition network topology into clusters and can successfully estimate the positions of multiple jammers even when their jamming areas are overlapping. Our experiments on a multi-hop network setup using MicaZ sensor nodes validate the feasibility of real-time collection of network topology changes under jamming and our extensive simulation results demonstrate that our approach is highly effective in localizing multiple attackers with or without the prior knowledge of the order that the jammers are turned on.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89747124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic event-triggered-based human-in-the-loop formation control for stochastic nonlinear MASs 随机非线性质量的动态事件触发人在环编队控制
Hospital security and safety management Pub Date : 2023-08-23 DOI: 10.1051/sands/2023024
Yonghua Peng, Guohuai Lin, Guangdeng Chen, Hongyi Li
{"title":"Dynamic event-triggered-based human-in-the-loop formation control for stochastic nonlinear MASs","authors":"Yonghua Peng, Guohuai Lin, Guangdeng Chen, Hongyi Li","doi":"10.1051/sands/2023024","DOIUrl":"https://doi.org/10.1051/sands/2023024","url":null,"abstract":"The dynamic event-triggered (DET) formation control problem of a class of stochastic nonlinear multi-agent systems (MASs) with full state constraints is investigated in this article. Supposing that the human operator sends commands to the leader as control input signals, all followers keep formation through network topology communication. Under the command-filter-based backstepping technique, the radial basis function neural networks (RBF NNs) and the barrier Lyapunov function (BLF) are utilized to resolve the problems of unknown nonlinear terms and full state constraints, respectively. Furthermore, a DET control mechanism is proposed to reduce the occupation of communication bandwidth. The presented distributed formation control strategy guarantees that all signals of the MASs are semi-globally uniformly ultimately bounded (SGUUB) in probability. Finally, the feasibility of the theoretical research result is demonstrated by a simulation example.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79434416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-path exploration guided by taint and probability against evasive malware 基于污点和概率的多路径探索
Hospital security and safety management Pub Date : 2023-08-14 DOI: 10.1051/sands/2023023
Weizhong Qiang, Fangzhou Xu, Wang Zhang, Hai Jin
{"title":"Multi-path exploration guided by taint and probability against evasive malware","authors":"Weizhong Qiang, Fangzhou Xu, Wang Zhang, Hai Jin","doi":"10.1051/sands/2023023","DOIUrl":"https://doi.org/10.1051/sands/2023023","url":null,"abstract":"Static analysis is often impeded by malware obfuscation techniques, such as encryption and packing, whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution information. Unfortunately, malware can employ evasive techniques to detect the analysis environment and alter its behavior accordingly. While known evasive techniques can be explicitly dismantled, the challenge lies in generically dismantling evasions without full knowledge, such as logic bombs that rely on uncertain conditions, let alone unsupported evasive techniques, which contain evasions without corresponding dismantling strategies and those leveraging unknown implementations. \u0000In this paper, we present Antitoxin, a prototype for automatically exploring evasive malware. Antitoxin utilizes multi-path exploration guided by taint analysis and probability calculations to effectively dismantle evasive techniques. The probabilities of branch execution are derived from dynamic coverage, while taint analysis helps identify paths associated with evasive techniques that rely on uncertain conditions. Subsequently, Antitoxin prioritizes branches with lower execution probabilities and those influenced by taint analysis for multi-path exploration. This is achieved through forced execution, which forcefully sets the outcomes of branches on selected paths. Additionally, Antitoxin employs active anti-evasion countermeasures to dismantle known evasive techniques, thereby reducing exploration overhead. Furthermore, Antitoxin provides valuable insights into sensitive behaviors, facilitating deeper manual analysis. \u0000Our experiments on a set of highly evasive samples demonstrate that Antitoxin can effectively dismantle evasive techniques in a generic manner. The probability calculations guide the multi-path exploration of evasions without requiring prior knowledge, enabling the dismantling of unsupported techniques such as C2 and significantly improving efficiency compared to linear exploration when dealing with complex control flows. Additionally, taint analysis can accurately identify branches related to logic bombs, facilitating preferential exploration.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77025335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信