-
MESSENGER observations of Mercury's planetary ion escape rates and their dependence on true anomaly angle
Authors:
Weijie Sun,
Ryan M. Dewey,
Xianzhe Jia,
Jim M. Raines,
James A. Slavin,
Yuxi Chen,
Tai Phan,
Gangkai Poh,
Shaosui Xu,
Anna Milillo,
Robert Lillis,
Yoshifumi Saito,
Stefano Livi,
Stefano Orsini
Abstract:
This study investigates the escape of Mercury's sodium-group ions (Na+-group, including ions with m/q from 21 to 30 amu/e) and their dependence on true anomaly angle (TAA), i.e., Mercury's orbital phase around the Sun, using measurements from MESSENGER. The measurements are categorized into solar wind, magnetosheath, and magnetosphere, and further divided into four TAA intervals. Na+-group ions fo…
▽ More
This study investigates the escape of Mercury's sodium-group ions (Na+-group, including ions with m/q from 21 to 30 amu/e) and their dependence on true anomaly angle (TAA), i.e., Mercury's orbital phase around the Sun, using measurements from MESSENGER. The measurements are categorized into solar wind, magnetosheath, and magnetosphere, and further divided into four TAA intervals. Na+-group ions form escape plumes in the solar wind and magnetosheath, with higher fluxes along the solar wind's motional electric field. The total escape rates vary from 0.2 to 1 times 10^{25} atoms/s with the magnetosheath being the main esca** region. These rates exhibit a TAA dependence, peaking near the perihelion and similar during Mercury's remaining orbit. Despite Mercury's tenuous exosphere, Na+-group ions escape rate is comparable to other inner planets. This can be attributed to several processes, including that Na+-group ions may include several ion species, efficient photoionization frequency for elements within Na+-group, etc.
△ Less
Submitted 20 April, 2024;
originally announced April 2024.
-
Fluent: Round-efficient Secure Aggregation for Private Federated Learning
Authors:
Xincheng Li,
Jianting Ning,
Geong Sen Poh,
Leo Yu Zhang,
Xinchun Yin,
Tianwei Zhang
Abstract:
Federated learning (FL) facilitates collaborative training of machine learning models among a large number of clients while safeguarding the privacy of their local datasets. However, FL remains susceptible to vulnerabilities such as privacy inference and inversion attacks. Single-server secure aggregation schemes were proposed to address these threats. Nonetheless, they encounter practical constra…
▽ More
Federated learning (FL) facilitates collaborative training of machine learning models among a large number of clients while safeguarding the privacy of their local datasets. However, FL remains susceptible to vulnerabilities such as privacy inference and inversion attacks. Single-server secure aggregation schemes were proposed to address these threats. Nonetheless, they encounter practical constraints due to their round and communication complexities. This work introduces Fluent, a round and communication-efficient secure aggregation scheme for private FL. Fluent has several improvements compared to state-of-the-art solutions like Bell et al. (CCS 2020) and Ma et al. (SP 2023): (1) it eliminates frequent handshakes and secret sharing operations by efficiently reusing the shares across multiple training iterations without leaking any private information; (2) it accomplishes both the consistency check and gradient unmasking in one logical step, thereby reducing another round of communication. With these innovations, Fluent achieves the fewest communication rounds (i.e., two in the collection phase) in the malicious server setting, in contrast to at least three rounds in existing schemes. This significantly minimizes the latency for geographically distributed clients; (3) Fluent also introduces Fluent-Dynamic with a participant selection algorithm and an alternative secret sharing scheme. This can facilitate dynamic client joining and enhance the system flexibility and scalability. We implemented Fluent and compared it with existing solutions. Experimental results show that Fluent improves the computational cost by at least 75% and communication overhead by at least 25% for normal clients. Fluent also reduces the communication overhead for the server at the expense of a marginal increase in computational cost.
△ Less
Submitted 10 March, 2024;
originally announced March 2024.
-
A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes
Authors:
Geong Sen Poh,
Dinil Mon Divakaran,
Hoon Wei Lim,
Jianting Ning,
Achintya Desai
Abstract:
Middleboxes in a computer network system inspect and analyse network traffic to detect malicious communications, monitor system performance and provide operational services. However, encrypted traffic hinders the ability of middleboxes to perform such services. A common practice in addressing this issue is by employing a "Man-in-the-Middle" (MitM) approach, wherein an encrypted traffic flow betwee…
▽ More
Middleboxes in a computer network system inspect and analyse network traffic to detect malicious communications, monitor system performance and provide operational services. However, encrypted traffic hinders the ability of middleboxes to perform such services. A common practice in addressing this issue is by employing a "Man-in-the-Middle" (MitM) approach, wherein an encrypted traffic flow between two endpoints is interrupted, decrypted and analysed by the middleboxes. The MitM approach is straightforward and is used by many organisations, but there are both practical and privacy concerns. Due to the cost of the MitM appliances and the latency incurred in the encrypt-decrypt processes, enterprises continue to seek solutions that are less costly. There were discussion on the many efforts required to configure MitM. Besides, MitM violates end-to-end privacy guarantee, raising privacy concerns and issues on compliance especially with the rising awareness on user privacy. Furthermore, some of the MitM implementations were found to be flawed. Consequently, new practical and privacy-preserving techniques for inspection over encrypted traffic were proposed. We examine them to compare their advantages, limitations and challenges. We categorise them into four main categories by defining a framework that consist of system architectures, use cases, trust and threat models. These are searchable encryption, access control, machine learning and trusted hardware. We first discuss the man-in-the-middle approach as a baseline, then discuss in details each of them, and provide an in-depth comparisons of their advantages and limitations. By doing so we describe practical constraints, advantages and pitfalls towards adopting the techniques. We also give insights on the gaps between research work and industrial deployment, which leads us to the discussion on the challenges and research directions.
△ Less
Submitted 12 January, 2021;
originally announced January 2021.
-
Cassini in situ observations of long-duration magnetic reconnection in Saturn's magnetotail
Authors:
Christopher S. Arridge,
Jonathan P. Eastwood,
Caitriona M. Jackman,
Gang-Kai Poh,
James A. Slavin,
Michelle F. Thomsen,
Nicolas André,
Xianzhe Jia,
Ariah Kidder,
Laurent Lamy,
Aikaterina Radioti,
Dan B. Reisenfeld,
Nick Sergis,
Martin Volwerk,
Andrew P. Walsh,
Philippe Zarka,
Andrew J. Coates,
Michele K. Dougherty
Abstract:
Magnetic reconnection is a fundamental process in solar system and astrophysical plasmas, through which stored magnetic energy associated with current sheets is converted into thermal, kinetic and wave energy. Magnetic reconnection is also thought to be a key process involved in shedding internally produced plasma from the giant magnetospheres at Jupiter and Saturn through topological reconfigurat…
▽ More
Magnetic reconnection is a fundamental process in solar system and astrophysical plasmas, through which stored magnetic energy associated with current sheets is converted into thermal, kinetic and wave energy. Magnetic reconnection is also thought to be a key process involved in shedding internally produced plasma from the giant magnetospheres at Jupiter and Saturn through topological reconfiguration of the magnetic field. The region where magnetic fields reconnect is known as the diffusion region and in this letter we report on the first encounter of the Cassini spacecraft with a diffusion region in Saturn's magnetotail. The data also show evidence of magnetic reconnection over a period of 19 h revealing that reconnection can, in fact, act for prolonged intervals in a rapidly rotating magnetosphere. We show that reconnection can be a significant pathway for internal plasma loss at Saturn. This counters the view of reconnection as a transient method of internal plasma loss at Saturn. These results, although directly relating to the magnetosphere of Saturn, have applications in the understanding of other rapidly rotating magnetospheres, including that of Jupiter and other astrophysical bodies.
△ Less
Submitted 22 December, 2015;
originally announced December 2015.