{"title":"Title Page I","authors":"","doi":"10.1109/mass50613.2020.00001","DOIUrl":"https://doi.org/10.1109/mass50613.2020.00001","url":null,"abstract":"","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126885685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DTLS based secure group communication scheme for Internet of Things","authors":"Bikramjit Choudhury, A. Nag, Sukumar Nandi","doi":"10.1109/MASS50613.2020.00029","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00029","url":null,"abstract":"Multicast communication in IoT is prevalent in many applications like smart lighting, firmware update etc. In such applications a single multicast message is sent to all the group members. The group members respond with unicast messages. Multicasting saves energy, decreases network traffic by reducing the number of messages in the network. Security in multicasting is of the utmost importance due to its deployment in many sensitive applications and inherent properties of IoT network. In the literature, various solutions have been proposed to secure group communication. However, there is still no suitable approach that satisfies the secure multicasting need of IoT. In this paper we propose a DTLS (Datagram Transport Layer Security) based secure group communication scheme. The proposed scheme is lightweight, scalable, and robust against member compromise. Moreover, the proposed scheme authenticates each group member and is also suitable for dynamic groups. The simulation results prove that the proposed scheme is more suitable for secure IoT framework in terms of energy and memory requirement than other related schemes.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126353943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Li Yan, Haiying Shen, Liuwang Kang, Juanjuan Zhao, Chengzhong Xu
{"title":"CD-Guide: A Reinforcement Learning based Dispatching and Charging Approach for Electric Taxicabs","authors":"Li Yan, Haiying Shen, Liuwang Kang, Juanjuan Zhao, Chengzhong Xu","doi":"10.1109/MASS50613.2020.00033","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00033","url":null,"abstract":"Previous passenger demand inference methods have insufficient accuracy because they fail to catch the influence of all random factors (e.g., weather, holiday). Also, existing taxicab dispatching methods are not directly applicable for electric taxicabs because they cannot optimize their charging. We present CD-Guide: an electric taxicab dispatching and charging approach based on customized training and Reinforcement Learning (RL). We studied a metropolitan-scale taxicab dataset, and found: histogram of passengers’ origin buildings (i.e., where they come from) is useful for selecting suitable training data for inference model, passenger demand in different regions may be influenced by various unpredictable random factors, and taxicabs’ charging time must be considered to avoid missing potential passengers. By saying suitable historical data, we mean the data that are under the influence of random factors similar as current time. Then, we develop a RL based method to guide a taxicab to maximize its probability of picking up a passenger, minimize the number of its missed passengers due to charging, and meanwhile avoid the taxicab from battery exhaustion. Our trace-driven experiments show that compared with previous methods, CD-Guide increases the total number of served passengers by 100%.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116688472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fine-grained Urban Prediction via Sparse Mobile CrowdSensing","authors":"Wenbin Liu, Yongjian Yang, E. Wang, Jie Wu","doi":"10.1109/MASS50613.2020.00041","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00041","url":null,"abstract":"Mobile CrowdSensing (MCS) has recently emerged as a practical paradigm for large-scale and fine-grained urban sensing systems. To reduce sensing cost, Sparse MCS only senses data from a few subareas instead of sensing the full map, while the other unsensed subareas could be inferred by the intradata correlations among the sensed data. In certain applications, users are not only interested in inferring the data of other unsensed subareas in the current sensing cycle, but also interested in predicting the full map data of the near future sensing cycles. However, the intradata correlations exploited from the historical sparse sensed data cannot be effectively used for predicting full data in the temporal-spatial domain. To address this problem, in this paper, we propose an urban prediction scheme via Sparse MCS consisting of the matrix completion and the near-future prediction. To effectively utilize the sparse sensed data for prediction, we first present a bipartite-graph-based matrix completion algorithm with temporal-spatial constraints to accurately recover the unsensed data and preserve the temporal-spatial correlations. Then, for predicting the fine-grained future sensing map, with the historical full sensing data, we further propose a neural-network-based continuous conditional random field, including a Long Short-Term Memory component to learn the non-linear temporal relationships, and a Stacked Denoising Auto-Encoder component to learn the pairwise spatial correlations. Extensive experiments have been conducted on three real-world urban sensing data sets consisting of five typical sensing tasks, which verify the effectiveness of our proposed algorithms in improving the prediction accuracy with the sparse sensed data.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123995118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sherlock: A Crowd-sourced System For Automatic Tagging Of Indoor Floor Plans","authors":"Muhammad A Shah, Khaled A. Harras, B. Raj","doi":"10.1109/MASS50613.2020.00078","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00078","url":null,"abstract":"Having knowledge of the users’ indoor location and the semantics of their environment can facilitate the development of many indoor context-aware applications. For such applications, an accurate indoor map is often needed. While current techniques are capable of producing such maps, these maps are not labeled and hence are of limited utility for many applications. To address this shortcoming, we propose Sherlock, a crowdsourced system for automatically tagging indoor floor plans. Sherlock leverages the myriad of sensors embedded in modern smartphones to intelligently gather audio and visual data, and upload it to the Sherlock Server. At the Sherlock Server, acoustic monitoring and object recognition techniques are used to classify these data samples. The classification scores of current and past samples are then aggregated in a probabilistic framework to determine the confidence with which we can apply as label to a given space. We evaluate Sherlock on a dataset of more than 11,000 audio recordings and 1,200 images, that we collected in three different university campuses. In our evaluation, the confidence for the true label generally outstripped the confidence for all other labels and, in some cases, even reached as high as 100% with as little as 30 data samples.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124213784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Armed-Bandit-based Shilling Attack on Collaborative Filtering Recommender Systems","authors":"A. Sundar, Feng Li, X. Zou, Qin Hu, Tianchong Gao","doi":"10.1109/MASS50613.2020.00050","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00050","url":null,"abstract":"Collaborative Filtering (CF) is a popular recommendation system that makes recommendations based on similar users’ preferences. Though it is widely used, CF is prone to Shilling/Profile Injection attacks, where fake profiles are injected into the CF system to alter its outcome. Most of the existing shilling attacks do not work on online systems and cannot be efficiently implemented in real-world applications. In this paper, we introduce an efficient Multi-Armed-Bandit-based reinforcement learning method to practically execute online shilling attacks. Our method works by reducing the uncertainty associated with the item selection process and finds the most optimal items to enhance attack reach. Such practical online attacks open new avenues for research in building more robust recommender systems. We treat the recommender system as a black box, making our method effective irrespective of the type of CF used. Finally, we also experimentally test our approach against popular state-of-the-art shilling attacks.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115721832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deployment Scalability in Exposed Buffer Processing","authors":"Micah Beck","doi":"10.1109/MASS50613.2020.00035","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00035","url":null,"abstract":"Deployment scalability was introduced to capture a very general notion that is often a goal of shared infrastructure. It refers to the ability of the infrastructure’s basic service to grow across many boundaries that might constrain it, through the acceptable application of resources, and while maintaining it at a standard level. In order to achieve deployment scalability the Internet architecture created a common infrastructure interface, or “spanning layer,” at the Network layer of the communication stack. This architecture was adopted to achieve two central goals: 1) The spanning layer virtualizes the variety of local services, enabling interoperability through the adoption of a common model; and 2) it provides an abstraction that hides the complex and dynamic topology and behavior of local infrastructure, thereby restricting the ability of clients to inspect or control local resources. The central design choice of the Internet Architecture is to make end-to-end datagram delivery the “bearer service” that defines its spanning layer. By contrast, Exposed Buffer Processing creates a more general platform by defining an underlay platform that provides the resources for implementing networking, storage, and computation. Exposed Buffer Processing implements a) a low-level “data plane” that provides fundamental persistence, transfer, and processing functionality and b) a higher-level programmable “control plane” that defines a variety of more global services.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127199839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Blockchain-based System for Secure Image Protection Using Zero-watermark","authors":"Baowei Wang, Jiawei Shi, Weishen Wang, Peng Zhao","doi":"10.1109/MASS50613.2020.00018","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00018","url":null,"abstract":"In the traditional image copyright protection system, watermarking technology is considered as an important technology to overcome the data protection problem and verify the data ownership relationship. However, the existing watermarking technology often needs a trusted third party to arbitrate in the implementation process, which may be difficult to find or costly. Meanwhile, the common image watermarking algorithm needs to operate the image data, which will inevitably lead to the image data loss. With the development of blockchain technology, the functions of de-trusted third parties and the fair and automatic processing characteristics of smart contracts attached to it have entered the public view. In this paper, we study the function of the zero-watermarking algorithm in image protection and its complete storage and authentication scheme, then propose a secure blockchain-based image copyright protection framework and build a system according to this framework. This framework combines blockchain and zero-watermark technology and uses interplanetary file system to solve the blockchain data expansion problem. Besides, the image owner can authenticate the image and realize the copyright traceability of the image. Furthermore, the keyword search function of the stored images in the system is realized based on a smart contract, which solves the problem of lack of trusted third parties. Experiment illustrates that the proposed scheme is feasible.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125331252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual Step PIN Pad: Towards Foot-input Authentication Using Geophones","authors":"Yan He, Hanyan Zhang, Edwin Yang, Song Fang","doi":"10.1109/MASS50613.2020.00084","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00084","url":null,"abstract":"The use of personal identification numbers (PINs) for authentication is ubiquitous due to their simplicity and flexibility. In this work, we present virtual step PIN pad, a novel and practical PIN entry scheme that allows a user to enter a PIN through foot tapping on the ground. The virtual step PIN pad utilizes geophones to collect structural vibration signals caused by foot tapping. When a user generates the activation signals by performing a predetermined sequence of foot taps within the target area, the virtual step PIN pad will be launched, and takes the foot tapping input by the user. The system then demodulates the corresponding structural vibration signals into a PIN. We have developed a prototype of the virtual step PIN pad and conduct a suite of experiments to evaluate its practicality and security. Experimental results show that the virtual step PIN pad can achieve an average success rate of 96.5% for inputting a human-chosen 4-digit PIN. Meanwhile, the success rate for an adversary at a distance of more than 2.5 meters away from the PIN pad to infer the target PIN decreases to below 3%.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128220759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vidyasagar Sadhu, Chuanneng Sun, Arman Karimian, Roberto Tron, D. Pompili
{"title":"Aerial-DeepSearch: Distributed Multi-Agent Deep Reinforcement Learning for Search Missions","authors":"Vidyasagar Sadhu, Chuanneng Sun, Arman Karimian, Roberto Tron, D. Pompili","doi":"10.1109/MASS50613.2020.00030","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00030","url":null,"abstract":"Search and Rescue (SAR) is an important part of several applications of national and social interest. Existing solutions for search missions in both terrestrial and aerial domains are mostly limited to single agent and specific environments; however, search missions can significantly benefit from the use of multiple agents that can quickly adapt to new environments. In this paper, we propose a framework based on Multi-Agent Deep Reinforcement Learning (MADRL) that realizes the actor-critic framework in a distributed manner for coordinating multiple Unmanned Aerial Vehicles (UAVs) in the exploration of unknown regions. One of the original aspects of our work is that the actors represent simulated or actual UAVs exploring the environment in parallel instead of traditional computer threads. Also, we propose addition of Long Short Term Memory (LSTM) neural network layers to the actor and critic architectures to handle imperfect communication and partial observability scenarios. The proposed approach has been evaluated in a grid world and has been compared against other competing algorithms such as Multi-Agent Q-Learning, Multi-Agent Deep Q-Learning to show its advantages. More generally, our approach could be extended to image-based/continuous action space environments as well.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130759953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}