As a newly emerging distributed machine learning technology, federated learning has unique advantages in the era of big data. We explore how to motivate participants to experience auctions more ...actively and safely. It is also essential to ensure that the final participant who wins the right to participate can guarantee relatively high-quality data or computational performance. Therefore, a secure, necessary and effective mechanism is needed through strict theoretical proof and experimental verification. The traditional auction theory is mainly oriented to price, not giving quality issues as much consideration. Hence, it is challenging to discover the optimal mechanism and solve the privacy problem when considering multi-dimensional auctions. Therefore, we (1) propose a multi-dimensional information security mechanism, (2) propose an optimal mechanism that satisfies the Pareto optimality and incentive compatibility named the SecMDGM and (3) verify that for the aggregation model based on vertical data, this mechanism can improve the performance by 2.73 times compared to that of random selection. These are all important, and they complement each other instead of being independent or in tandem. Due to security issues, it can be ensured that the optimal multi-dimensional auction has practical significance and can be used in verification experiments.
Real-time capability is a key factor which affects the practicality of an indoor positioning system significantly. While visible light positioning (VLP) is widely studied since it can provide indoor ...positioning functionality with LED illumination, the existing VLP systems still suffer from the high positioning latency and are not practical for mobile units with high moving speed. In this paper, a real-time VLP system with low positioning latency and high positioning accuracy is proposed. With the lightweight image processing algorithm, the proposed system can be implemented on low-cost embedded system and support real-time accurate indoor positioning for mobile units with a fast moving speed. Experimental results show that the proposed system implemented on a Raspberry Pi can achieve a positioning accuracy of 3.93 cm and support the moving speed up to 38.5 km/h.
Visible light positioning (VLP) is widely believed to be a cost-effective answer to the growing demand for real-time indoor positioning. However, due to the high computational cost of image ...processing, most existing VLC-based systems fail to deliver satisfactory performance in terms of positioning speed and accuracy, both of which are crucial for the performance of indoor navigation. This paper proposes a novel VLP solution that provides accurate and high-speed indoor navigation via the designs of an elaborate flicker-free line coding scheme and a lightweight image processing algorithm. In addition, this solution has the advantage of supporting flicker mitigation and dimming, which are important for illumination. An Android-based system prototype has been developed for field tests on an off-the-shelf smartphone. Experimental results show that it supports indoor positioning for users moving at a speed of up to 18 km/h. In addition, it can achieve a high accuracy of 7.5 cm, and the computational time is reduced to 22.7 ms for single-luminaire and to 35.7 ms for dual-luminaries, respectively.
Abstract
Combined with one-time pad encryption scheme, quantum key distribution guarantees the unconditional security of communication in theory. However, error correction and privacy amplification ...in the post-processing phase of quantum key distribution result in high time delay, which limits the final secret key generation rate and the practicability of quantum key distribution systems. To alleviate this limitation, this paper proposes an efficient post-processing algorithm based on polar codes for quantum key distribution. In this algorithm, by analyzing the channel capacity of the main channel and the wiretap channel respectively under the Wyner’s wiretap channel model, we design a codeword structure of polar codes, so that the error correction and privacy amplification could be completed synchronously in a single step. Through combining error correction and privacy amplification into one single step, this efficient post-processing algorithm reduces complexity of the system and lower the post-processing delay. Besides, the reliable and secure communicaiton conditions for this algorithm has been given in this paper. Simulation results show that this post-processing algorithm satisfies the reliable and secure communication conditions well.
Compared to conventional wireless body area networks (WBANs), the amount of data processed and the analytical capabilities offered by cloud-based WBANs are significantly more extensive. Nevertheless, ...the paramount consideration in such contexts remains the security and privacy ramifications. Concurrently, the process where medical cloud server (MCS) computes the response aggregation data may be opaque and there is a risk that (partially) invalid aggregation results may be presented to the task requester, either intentionally (e.g., malicious or cost-saving) or unintentionally (e.g., corruption or processing error). Furthermore, with the different roles played by each data requester, relying solely on a single data aggregation type is no longer sufficient to satisfy the diverse data aggregation requests from these requesters. To this end, this article proposes a novel verifiable multidimensional encrypted medical data aggregation scheme (VMEMDA) for cloud-based WBANs, where we integrate an extended super-increasing sequence with a modified Paillier cryptosystem. Doing so allows us to ensure that each dimensional medical data collected by wireless sensor devices and corresponding square values can be encrypted into a single ciphertext with the chronological time series. This enables MCS to select various aggregation types, such as spatial/temporal data aggregation, to aggregate the multisource encrypted medical data into a single ciphertext. Then, the task requester can conduct diverse privacy-preserving statistical analyses, including sum, average, and variance. Moreover, we utilize a homomorphic hash function to guarantee the encrypted data integrity in a highly efficient way, and we design an unpredictable random sequence and integrate it into the provable data possession mechanism to achieve aggregated data correctness guarantee. Performance evaluation demonstrates that VMEMDA exhibits considerably lower computation and communication overhead compared to other existing multidimensional data aggregation schemes.
Visible light communication (VLC) can provide short-range optical wireless communication, together with illumination using light-emitting diode (LED) lightings. Since conventional forward error ...correction (FEC) codes cannot provide two lighting related features, dimming support, and flicker mitigation, the existing coding schemes for reliable VLC usually rely on auxiliary coding techniques, which cause a complicated structure and a low transmission efficiency. In this paper, based on polar codes, an efficient and flicker-free FEC coding scheme for dimmable VLC is proposed to increase the transmission efficiency and simplify the coding structure. Taking advantage of polar codes' recursive encoding structure, the proposed scheme can guarantee the equal probability and the short runs of 1 s and 0 s for arbitrary code rate without extra coding components. Numerical results show that the proposed scheme can have twice higher transmission efficiency than the existing schemes. Furthermore, at a dimming ratio of 25% or 75%, the coding gain of the proposed scheme is about 4.6 dB and 1.4 dB higher than that of the Reed-Solomon (RS) codes based scheme and the low-density parity check code based scheme, respectively.
A growing number of mobile social network applications are taking advantage of cloud computing to store profiles of end users and run protocols which are compute-intensive. We focus on an application ...scenario of similarity computation between two users. To protect data security and privacy, mobile users encrypt their sensitive profiles before outsourcing to the cloud and different users choose different encryption keys. Three challenges need attention - how to compute on encrypted profiles under different keys, how to allow mobile users to stay offline during execution of the protocol, and how to select similarity metric. Existing schemes either rely on multi-key fully homomorphic encryption with one server or partially homomorphic encryption with two non-colluding servers. To balance computational complexity on one server and communication overhead between two servers, we put forward a privacy-preserving similarity computation protocol which supports both homomorphic additions and one homomorphic multiplication. We conduct security analysis and experimental evaluation of our scheme. The results show that our protocol is provably secure and runs reasonably fast, and thus can be applied in practice.
To improve the efficiency of QKD systems, a new QKD protocol based on classical–quantum polarized channels is proposed in this article. By precoding the raw key with polar codes before communication, ...this protocol has higher code rate and lower time cost compared with the traditional ones. According to the attack strategies that eavesdroppers might employ, we have analyzed the protocol’s security under ideal and practical channel models. We prove that under proper channel parameter setting, the security of this protocol is not lower than BB84 under intercept strategy.
Visible light communication (VLC) can provide short-range optical wireless communication together with illumination using LED lightings. Since VLC channel is an open wireless channel, physical-layer ...security is desirable in order to hide secret information from unauthorized receivers, without reliance on upper-layer cryptographic techniques. In this paper, a secure coding scheme based on polar codes is proposed to simultaneously achieve physical-layer security and transmission reliability for indoor VLC systems under Wyner's wiretap model. An indoor VLC degraded wiretap channel model and an indoor VLC undegraded wiretap model are analyzed to estimate the corresponding secrecy capacity with typical indoor VLC scenarios considering the requirements of illumination and reliable transmission. Then, a physical-layer secure coding scheme and an enhanced scheme are designed to provide securely reliable communication without sacrificing the illumination functionality. Numerical results show that for VLC degraded wiretap channel, the proposed coding scheme can reduce the bit error rate (BER) of main channel to nearly 0 and increase that of wiretap channel to 0.5. Therefore, the mutual information between the sender and the eavesdropper and the BER of the legitimate receiver are both decreased to nearly 0. Both the security and reliability of VLC are guaranteed by the proposed coding scheme. And the practical secrecy rate reaches 85.96% at some positions when codeword length is 2 048 bits. Furthermore, an enhanced coding scheme with a feedback channel is proposed to handle the case that the wiretap channel is not degraded with respect to the main channel. With the feedback channel, the wiretap channel can be equivalently degraded and the security can be increased gradually with the increment of the degradation level of the wiretap channel. Meanwhile, the secrecy capacities can be asymptotically achieved for indoor VLC systems.
Robustness is a key factor for real-time positioning and navigation, especially for high-speed vehicles. While visible light positioning (VLP) based on LED illumination and image sensors is widely ...studied, most of the VLP systems still suffer from the high positioning latency and the image blurs caused by high-speed movements. In this paper, a robust VLP system for high-speed vehicles is proposed based on a deep learning and data-driven approach. The proposed system can significantly increase the success rate of decoding VLP-LED user identifications (UID) from blurred images and reduce the computational latency for detecting and extracting VLP-LED stripe image regions from captured images. Experimental results show that the success rate of UID decoding using the proposed BN-CNN model could be higher than 98% when that of the traditional Zbar-based decoder falls to 0, while the computational time for positioning is decreased to 9.19 ms and the supported moving speed of our scheme can achieve 38.5 km/h. Therefore, the proposed VLP system can enhance the robustness against high-speed movement and guarantee the real-time response for positioning and navigation for high-speed vehicles.