-
Blessing or curse? A survey on the Impact of Generative AI on Fake News
Authors:
Alexander Loth,
Martin Kappes,
Marc-Oliver Pahl
Abstract:
Fake news significantly influence our society. They impact consumers, voters, and many other societal groups. While Fake News exist for a centuries, Generative AI brings fake news on a new level. It is now possible to automate the creation of masses of high-quality individually targeted Fake News. On the other end, Generative AI can also help detecting Fake News. Both fields are young but developi…
▽ More
Fake news significantly influence our society. They impact consumers, voters, and many other societal groups. While Fake News exist for a centuries, Generative AI brings fake news on a new level. It is now possible to automate the creation of masses of high-quality individually targeted Fake News. On the other end, Generative AI can also help detecting Fake News. Both fields are young but develo** fast.
This survey provides a comprehensive examination of the research and practical use of Generative AI for Fake News detection and creation in 2024. Following the Structured Literature Survey approach, the paper synthesizes current results in the following topic clusters 1) enabling technologies, 2) creation of Fake News, 3) case study social media as most relevant distribution channel, 4) detection of Fake News, and 5) deepfakes as upcoming technology.
The article also identifies current challenges and open issues.
△ Less
Submitted 3 April, 2024;
originally announced April 2024.
-
Collaborative Cybersecurity Using Blockchain: A Survey
Authors:
Loïc Miller,
Marc-Oliver Pahl
Abstract:
Collaborative cybersecurity relies on organizations sharing information to boost security, but trust management is a key concern. Decentralized solutions like distributed ledgers, particularly blockchain, are crucial for eliminating single points of failure. However, the existing literature on blockchain-based collaborative cybersecurity is limited, lacking comprehensive insights. This paper addre…
▽ More
Collaborative cybersecurity relies on organizations sharing information to boost security, but trust management is a key concern. Decentralized solutions like distributed ledgers, particularly blockchain, are crucial for eliminating single points of failure. However, the existing literature on blockchain-based collaborative cybersecurity is limited, lacking comprehensive insights. This paper addresses this gap by surveying blockchain's role in collaborative cybersecurity from 2016 to 2023. It explores various applications, trends, and the evolution of blockchain technology, focusing on access control, data validation policies, underlying tech, and consensus mechanisms. A key finding is the fragmentation of the field with no dominant research group or venue. Many recent projects poorly select consensus protocols for their blockchain. To aid researchers and practitioners, this paper offers guidelines for choosing the right blockchain for specific purposes and highlights open research areas and lessons learned from past blockchain applications in collaborative cybersecurity, encouraging further exploration in this field.
△ Less
Submitted 7 March, 2024;
originally announced March 2024.
-
Real-Time Performance of OPC UA
Authors:
Erkin Kirdan,
Filip Rezabek,
Nikolas Mülbauer,
Georg Carle,
Marc-Oliver Pahl
Abstract:
OPC UA is an industry-standard machine-to-machine communication protocol in the Industrial Internet of Things. It relies on time-sensitive networking to meet the real-time requirements of various applications. Time-sensitive networking is implemented through various queueing disciplines (qdiscs), including Time Aware Priority, Multiqueue Priority, Earliest TxTime First, and Credit-Based Shaper. De…
▽ More
OPC UA is an industry-standard machine-to-machine communication protocol in the Industrial Internet of Things. It relies on time-sensitive networking to meet the real-time requirements of various applications. Time-sensitive networking is implemented through various queueing disciplines (qdiscs), including Time Aware Priority, Multiqueue Priority, Earliest TxTime First, and Credit-Based Shaper. Despite their significance, prior studies on these qdiscs have been limited to a few. They have often been confined to point-to-point network topologies using proprietary software or specialized hardware. This study builds upon existing research by evaluating all these qdiscs in point-to-point and bridged topologies using open-source software on commercial off-the-shelf hardware. We first identify the optimal configuration for each qdisc and then compare their jitter, latency, and reliability through experiments. Our results show that open-source OPC UA on commercial off-the-shelf hardware can effectively meet the stringent real-time requirements of many industrial applications and provide a foundation for future research and practical deployments.
△ Less
Submitted 19 November, 2023; v1 submitted 25 October, 2023;
originally announced October 2023.
-
A Generalized TDoA/ToA Model for ToF Positioning
Authors:
Maximilian von Tschirschnitz,
Marcel Wagner,
Marc-Oliver Pahl,
Georg Carle
Abstract:
Many applications require positioning. Time of Flight (ToF) methods calculate distances by measuring the propagation time of signals. We present a novel ToF localization method. Our new approach works infrastructure-less, without pre-defined roles like Anchors or Tags. It generalizes existing synchronization-less Time Difference of Arrival (TDoA) and Time of Arrival (ToA) algorithms. We show how k…
▽ More
Many applications require positioning. Time of Flight (ToF) methods calculate distances by measuring the propagation time of signals. We present a novel ToF localization method. Our new approach works infrastructure-less, without pre-defined roles like Anchors or Tags. It generalizes existing synchronization-less Time Difference of Arrival (TDoA) and Time of Arrival (ToA) algorithms. We show how known algorithms can be derived from our new method. A major advantage of our approach is that it provides a comparable or better clock error robustness, i.e. the typical errors of crystal oscillators have negligible impact for TDoA and ToA measurements. We show that our channel usage is for most cases superior compared to the state-of-the art.
△ Less
Submitted 12 January, 2020; v1 submitted 20 September, 2019;
originally announced September 2019.
-
Clock Error Analysis of Common Time of Flight based Positioning Methods
Authors:
Maximilian von Tschirschnitz,
Marcel Wagner,
Marc-Oliver Pahl,
Georg Carle
Abstract:
Today, many applications such as production or rescue settings rely on highly accurate entity positioning. Advanced Time of Flight (ToF) based positioning methods provide highaccuracy localization of entities. A key challenge for ToF based positioning is to synchronize the clocks between the participating entities. This paper summarizes and analyzes ToA and TDoA methods with respect to clock error…
▽ More
Today, many applications such as production or rescue settings rely on highly accurate entity positioning. Advanced Time of Flight (ToF) based positioning methods provide highaccuracy localization of entities. A key challenge for ToF based positioning is to synchronize the clocks between the participating entities. This paper summarizes and analyzes ToA and TDoA methods with respect to clock error robustness. The focus is on synchronization-less methods, i.e. methods which reduce the infrastructure requirement significantly. We introduce a unified notation to survey and compare the relevant work from literature. Then we apply a clock error model and compute worst case location-accuracy errors. Our analysis reveals a superior error robustness against clock errors for so called Double-Pulse methods when applied to radio based ToF positioning
△ Less
Submitted 12 January, 2020; v1 submitted 20 September, 2019;
originally announced September 2019.
-
Rule-Based Translation of Application-Level QoS Constraints into SDN Configurations for the IoT
Authors:
Jan Seeger,
Arne Bröring,
Marc-Oliver Pahl,
Ermin Sakic
Abstract:
In this paper, we propose an approach for the automated translation of application-level requirements regarding the logical workflow and its QoS into a configuration of the underlying network substrate. Our goal is to facilitate the integration of QoS constraints in the development of industrial IoT applications to make them more reliable. We follow an approach based on two semantic models: The fi…
▽ More
In this paper, we propose an approach for the automated translation of application-level requirements regarding the logical workflow and its QoS into a configuration of the underlying network substrate. Our goal is to facilitate the integration of QoS constraints in the development of industrial IoT applications to make them more reliable. We follow an approach based on two semantic models: The first model allows to design the workflow of an IoT application and to express application-level QoS requirements on its interactions. The second model captures the configuration of a network and can be used as input to a north-bound interface of an SDN controller. Finally, we make use of rule-based semantic reasoning to automatically translate from the application requirements into SDN parameters.
△ Less
Submitted 22 March, 2019;
originally announced March 2019.
-
Deep Learning-aided Application Scheduler for Vehicular Safety Communication
Authors:
Mohammad Irfan Khan,
François-Xavier Aubet,
Marc-Oliver Pahl,
Jérôme Härri
Abstract:
802.11p based V2X communication uses stochastic medium access control, which cannot prevent broadcast packet collision, in particular during high channel load. Wireless congestion control has been designed to keep the channel load at an optimal point. However, vehicles' lack of precise and granular knowledge about true channel activity, in time and space, makes it impossible to fully avoid packet…
▽ More
802.11p based V2X communication uses stochastic medium access control, which cannot prevent broadcast packet collision, in particular during high channel load. Wireless congestion control has been designed to keep the channel load at an optimal point. However, vehicles' lack of precise and granular knowledge about true channel activity, in time and space, makes it impossible to fully avoid packet collisions. In this paper, we propose a machine learning approach using deep neural network for learning the vehicles' transmit patterns, and as such predicting future channel activity in space and time. We evaluate the performance of our proposal via simulation considering multiple safety-related V2X services involving heterogeneous transmit patterns. Our results show that predicting channel activity, and transmitting accordingly, reduces collisions and significantly improves communication performance.
△ Less
Submitted 25 January, 2019;
originally announced January 2019.