skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Design and Implementation of Medium Access Control Protocol for Magneto-Inductive Wireless Sensor Networks Using Low Power Sensor Nodes
Award ID(s):
2322490 2228539
PAR ID:
10533465
Author(s) / Creator(s):
; ; ;
Publisher / Repository:
IEEE Journal of Oceanic Engineering
Date Published:
Journal Name:
IEEE Journal of Oceanic Engineering
Volume:
49
Issue:
2
ISSN:
0364-9059
Page Range / eLocation ID:
572 to 582
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Analysis of imaging sensors is one of the most reliable photo forensic techniques, but it is increasingly chal- lenged by complex image processing in modern cameras. The underlying photo response non-uniformity (PRNU) is distilled into a static sensor fingerprint unique for each device. This makes it easy to estimate and spoof and limits its reliability in face of sophisticated attackers. We propose to exploit computa- tional capabilities of emerging intelligent vision sensors to design next-generation computational sensor fingerprints. Such sensors allow for running neural network inference directly on raw pixels, which enables end-to-end optimization of the entire photo acquisition and distribution pipeline. Control over fingerprint generation allows for adaptation to various requirements and threat models. In this study we provide a detailed assessment of security properties and evaluate two approaches to prevent spoofing: fingerprint generation based on local image content and adversarial training. We found that adversarial training is currently impractical, but content fingerprints deliver good per- formance in the considered cross-domain (RAW-RGB) setting and could provide robust best-effort protection against photo manip- ulation. Moreover, computational fingerprints can alleviate other limitations of PRNU, e.g., its limited reliability for dark/texture content and expensive fingerprint storage that hinders scalability. To enable this line of work, we developed a novel open-source and high-fidelity simulation environment for modeling photo acquisi- tion and distribution pipelines (https://github.com/pkorus/neural- imaging). 
    more » « less