Authenticating Edge Neural Network through Hardware Security Modules and Quantum-Safe Key Management

被引:0
|
作者
Vembu, Swathi Kumar [1 ]
Chattopadhyay, Anupam [1 ]
Saha, Sayandeep [2 ]
机构
[1] Nanyang Technol Univ, Singapore, Singapore
[2] Indian Inst Technol, Kharagpur, W Bengal, India
关键词
D O I
10.1109/VLSID60093.2024.00059
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the past decade, the usage and need for Deep Neural Networks (DNNs) have drastically risen across numerous application domains. In order to train these DNNs, a vast amount of data and effort is required, which naturally brings forth the question of Intellectual Property (IP) protection and privacy of the models. While this has been studied in the context of server-based Machine Learning (ML) inference tasks; in this paper, we draw attention to the deployment of a trained Neural Network (NN) in edge computing platforms. The primary challenges towards protecting edge NNs are first, to design a secure key management protocol between the model owner and an authenticated model user; second, to achieve low overhead while executing inference tasks even with security guarantees. We address both of these challenges and present an additional study by integrating post-quantum cryptographic primitives in the key management protocol. Our experimental studies with commercial edge computing platforms, and Hardware Security Modules (HSMs) present an efficient, practical, and robust scenario for the provisioning of ML tasks at the edge.
引用
收藏
页码:318 / 323
页数:6
相关论文
共 14 条
  • [1] Advancing Network Security with Quantum-Safe System Integration
    Mao, Jianzhou
    Xu, Guobin
    Sakk, Eric
    Wang, Shuangbao
    2024 33RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, ICCCN 2024, 2024,
  • [2] KeyShield: A Scalable and Quantum-Safe Key Management Scheme
    Al-darwbi, Mohammed Y.
    Ghorbani, Ali A.
    Lashkari, Arash Habibi
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2021, 2 : 87 - 101
  • [3] 5G network slicing with QKD and quantum-safe security
    Wright, Paul
    White, Catherine
    Parker, Ryan C.
    Pegon, Jean-Sebastien
    Menchetti, Marco
    Pearse, Joseph
    Bahrami, Arash
    Moroz, Anastasia
    Wonfor, Adrian
    Penty, Richard, V
    Spiller, Timothy P.
    Lord, Andrew
    JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2021, 13 (03) : 33 - 40
  • [4] A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication
    Heigl, Michael
    Schramm, Martin
    Fiala, Dalibor
    2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2019, : 906 - 911
  • [5] Quantum-Safe Metro Network With Low-Latency Reconfigurable Quantum Key Distribution
    Tang, Xinke
    Wonfor, Adrian
    Kumar, Rupesh
    Penty, Richard, V
    White, Ian H.
    JOURNAL OF LIGHTWAVE TECHNOLOGY, 2018, 36 (22) : 5230 - 5236
  • [6] Navigating quantum security risks in networked environments: A comprehensive study of quantum-safe network protocols
    Baseri, Yaser
    Chouhan, Vikas
    Hafid, Abdelhakim
    COMPUTERS & SECURITY, 2024, 142
  • [7] A Quantum-Safe Key Hierarchy and Dynamic Security Association for LTESAE in 5G Scenario
    Arul, Rajakumar
    Raja, Gunasekaran
    Almagrabi, Alaa Omran
    Alkatheiri, Mohammed Saeed
    Chauhdary, Sajjad Hussain
    Bashir, Ali Kashif
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (01) : 681 - 690
  • [8] Quantum Network: Security Assessment and Key Management
    Zhou, Hongyi
    Lv, Kefan
    Huang, Longbo
    Ma, Xiongfeng
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 30 (03) : 1328 - 1339
  • [9] A Quantum-Safe Software-Defined Deterministic Internet of Things (IoT) with Hardware-Enforced Cyber-Security for Critical Infrastructures
    Szymanski, Ted H.
    INFORMATION, 2024, 15 (04)
  • [10] Enhanced Security of Software-defined Network and Network Slice Through Hybrid Quantum Key Distribution Protocol
    Mahdi, Suadad S.
    Abdullah, Alharith A.
    INFOCOMMUNICATIONS JOURNAL, 2022, 14 (03): : 9 - 15