語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
FindBook
Google Book
Amazon
博客來
Machine Learning for Wireless Cyber-Physical Systems Security.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Machine Learning for Wireless Cyber-Physical Systems Security./
作者:
Alipour-Fanid, Amir.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2021,
面頁冊數:
183 p.
附註:
Source: Dissertations Abstracts International, Volume: 83-03, Section: B.
Contained By:
Dissertations Abstracts International83-03B.
標題:
Electrical engineering. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28546462
ISBN:
9798538126385
Machine Learning for Wireless Cyber-Physical Systems Security.
Alipour-Fanid, Amir.
Machine Learning for Wireless Cyber-Physical Systems Security.
- Ann Arbor : ProQuest Dissertations & Theses, 2021 - 183 p.
Source: Dissertations Abstracts International, Volume: 83-03, Section: B.
Thesis (Ph.D.)--George Mason University, 2021.
This item must not be sold to any third party vendors.
Wireless cyber-physical systems (CPS) have been progressively adopted in many applications such as smart industrial control systems, intelligent vehicular transportation, unmanned aerial vehicles (UAV), etc. Despite the CPS huge potential benefits in paving the path to develop new applications, the open and broadcast nature of the wireless communication medium has made these systems vulnerable to cyber attacks. In this thesis, we propose a family of novel online machine learning algorithms which can be employed to defend against jamming attacks in wireless CPS, and wireless communication systems in general. In addition, we study the problem of fast detection and identification of intruding consumer UAVs and propose a new method which exploits wireless network traffic information and utilizes machine learning techniques to identify the UAVs in a timely manner. More specifically, in this thesis, we discuss four research projects which briefly are summarized as follows. 1) We study security of remote state estimation in wireless CPS where a sensor sends its measurements to the remote state estimator over a multi-channel wireless link in presence of a jamming attacker. We propose a novel online learning-based policy which can be employed by the sensor to jointly choose the transmission channel and power to defend against the attack. We theoretically prove that the proposed algorithm achieves a sublinear order-optimal learning regret bound in time. 2) We focus on the security of multi-channel wireless communication systems with a scenario in which the jammer always successfully attacks on the acknowledgment link and the transmitter loses throughput due to dynamic channel switching latency. We model this problem as self-unaware bandits with arm switching costs problem and propose two novel online learning algorithms with theoretical performance guarantees. We prove a sublinear regret upper bound for both algorithms and bound the switching costs such that it can improve the regret bound. 3) We study the security of cooperative adaptive cruise control (CACC) system under jamming attacks. We propose a novel time domain approach to analyze the mean string stability and impact of the jammer's location on the string stability. We derive a condition for the packet successful delivery probability which indicates that the jammer has a higher probability to destabilize the string when it is closer to the first vehicle following the lead vehicle. As a defense strategy for the setting of multi-channel wireless communication among the vehicles, we derive the mean string stability condition with respect to the minimum packet loss probability and number of channels, when both the vehicles and jammer employ online learning-based channel access policies for data transmission and attack, respectively. 4) Finally, we study detecting and identifying intruding consumer UAVs as an urgent need for both invasion detection and forensics purposes. We propose a machine learning-based framework for fast UAV identification over encrypted Wi-Fi traffic. The framework jointly optimizes feature selection and prediction performance in a unified objective function. Furthermore, we identify the UAVs' operation mode through data traffic analysis which implies that there is a strong correlation or coupling between cyber information (data traffic) and physical information (operation mode) of UAVs. This finding is expected to motivate new cyber-physical defense and forensics mechanisms that leverage this cyber-physical coupling. We believe the proposed methodology can be applied to other CPS and motivate more in-depth study on cyber-physical attack co-detection or co-defense for many Internet-of-Things (IoT) applications, such as smart home, smart healthcare, and smart manufacturing.
ISBN: 9798538126385Subjects--Topical Terms:
649834
Electrical engineering.
Subjects--Index Terms:
Machine Learning
Machine Learning for Wireless Cyber-Physical Systems Security.
LDR
:05082nmm a2200421 4500
001
2352139
005
20221118093820.5
008
241004s2021 ||||||||||||||||| ||eng d
020
$a
9798538126385
035
$a
(MiAaPQ)AAI28546462
035
$a
AAI28546462
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Alipour-Fanid, Amir.
$0
(orcid)0000-0002-9578-9969
$3
3691761
245
1 0
$a
Machine Learning for Wireless Cyber-Physical Systems Security.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2021
300
$a
183 p.
500
$a
Source: Dissertations Abstracts International, Volume: 83-03, Section: B.
500
$a
Advisor: Zeng, Kai.
502
$a
Thesis (Ph.D.)--George Mason University, 2021.
506
$a
This item must not be sold to any third party vendors.
520
$a
Wireless cyber-physical systems (CPS) have been progressively adopted in many applications such as smart industrial control systems, intelligent vehicular transportation, unmanned aerial vehicles (UAV), etc. Despite the CPS huge potential benefits in paving the path to develop new applications, the open and broadcast nature of the wireless communication medium has made these systems vulnerable to cyber attacks. In this thesis, we propose a family of novel online machine learning algorithms which can be employed to defend against jamming attacks in wireless CPS, and wireless communication systems in general. In addition, we study the problem of fast detection and identification of intruding consumer UAVs and propose a new method which exploits wireless network traffic information and utilizes machine learning techniques to identify the UAVs in a timely manner. More specifically, in this thesis, we discuss four research projects which briefly are summarized as follows. 1) We study security of remote state estimation in wireless CPS where a sensor sends its measurements to the remote state estimator over a multi-channel wireless link in presence of a jamming attacker. We propose a novel online learning-based policy which can be employed by the sensor to jointly choose the transmission channel and power to defend against the attack. We theoretically prove that the proposed algorithm achieves a sublinear order-optimal learning regret bound in time. 2) We focus on the security of multi-channel wireless communication systems with a scenario in which the jammer always successfully attacks on the acknowledgment link and the transmitter loses throughput due to dynamic channel switching latency. We model this problem as self-unaware bandits with arm switching costs problem and propose two novel online learning algorithms with theoretical performance guarantees. We prove a sublinear regret upper bound for both algorithms and bound the switching costs such that it can improve the regret bound. 3) We study the security of cooperative adaptive cruise control (CACC) system under jamming attacks. We propose a novel time domain approach to analyze the mean string stability and impact of the jammer's location on the string stability. We derive a condition for the packet successful delivery probability which indicates that the jammer has a higher probability to destabilize the string when it is closer to the first vehicle following the lead vehicle. As a defense strategy for the setting of multi-channel wireless communication among the vehicles, we derive the mean string stability condition with respect to the minimum packet loss probability and number of channels, when both the vehicles and jammer employ online learning-based channel access policies for data transmission and attack, respectively. 4) Finally, we study detecting and identifying intruding consumer UAVs as an urgent need for both invasion detection and forensics purposes. We propose a machine learning-based framework for fast UAV identification over encrypted Wi-Fi traffic. The framework jointly optimizes feature selection and prediction performance in a unified objective function. Furthermore, we identify the UAVs' operation mode through data traffic analysis which implies that there is a strong correlation or coupling between cyber information (data traffic) and physical information (operation mode) of UAVs. This finding is expected to motivate new cyber-physical defense and forensics mechanisms that leverage this cyber-physical coupling. We believe the proposed methodology can be applied to other CPS and motivate more in-depth study on cyber-physical attack co-detection or co-defense for many Internet-of-Things (IoT) applications, such as smart home, smart healthcare, and smart manufacturing.
590
$a
School code: 0883.
650
4
$a
Electrical engineering.
$3
649834
650
4
$a
Computer engineering.
$3
621879
650
4
$a
Computer science.
$3
523869
650
4
$a
Artificial intelligence.
$3
516317
650
4
$a
Multimedia communications.
$3
590562
653
$a
Machine Learning
653
$a
Wireless communication
653
$a
Cyber-Physical Systems
653
$a
Cybersecurity
653
$a
Unmanned Aerial Vehicles
653
$a
Wireless networks
653
$a
Internet-of-Things
690
$a
0544
690
$a
0984
690
$a
0464
690
$a
0558
690
$a
0800
710
2
$a
George Mason University.
$b
Electrical and Computer Engineering.
$3
3193956
773
0
$t
Dissertations Abstracts International
$g
83-03B.
790
$a
0883
791
$a
Ph.D.
792
$a
2021
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28546462
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9474577
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入