{"title":"Reversible Attack Trees","authors":"Aliyu Tanko Ali, Damas P. Gruska","doi":"10.1109/UEMCON53757.2021.9666564","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666564","url":null,"abstract":"Attack trees are threat modeling formalism for identifying potential ways a system may be compromised. The underlying idea of this formalism is that possible attack points of a system are modeled as a set of nodes, together with the set of atomic actions which an attacker may execute to compromise the system. However, as attack trees are not designed from the administrator’s point of view, they are not equipped with sets of protection actions which can be used to stop an ongoing attack. In this paper we introduce reversible attack trees, as a variant of attack trees for which an ongoing attack can be fully or partially reset to the original state of the system. Then, we investigate whether the system administrator can detect whether a possible attack has reached some critical point in which his or her action is needed to prevent the attack by bringing the system to its initial state. Later, we show how this can be modeled by Timed Automata and checked by software tool UPPAAL.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122114872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Villanueva, Danitza Yalli Villa, Angel Bello Merlo, Deyby Huamanchahua, Carlos Coaquira Rojo
{"title":"Development of an IoT system using ESP8266 for the detection of asthma triggering allergens in children","authors":"J. Villanueva, Danitza Yalli Villa, Angel Bello Merlo, Deyby Huamanchahua, Carlos Coaquira Rojo","doi":"10.1109/uemcon53757.2021.9666568","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666568","url":null,"abstract":"Asthma is one of the diseases that are present in all parts of the world and a serious problem in countries with low and medium resources, causing 80% of deaths of patients with symptoms of not being treated correctly. Previous studies have shown that children with asthma are highly affected by environmental pollution and in Peru, the city with the highest presence of pollutants is Lima, with PM2.5 and PM10 being the most worrisome as they are the most frequently detected triggers in the city; For this reason, the aim is to create a system capable of detecting asthma triggers for the prevention of attacks. The system presented in this article seeks to measure air quality both inside the home of children with asthma and when it goes out, to avoid concerns on the part of parents or guardians in charge and to alert them in case of inconvenience. any. The system is responsible for uploading the reading of each of the sensors to a database in the cloud so that they are later published in a PWA and comparison and/or monitoring of the data can be carried out; so that a study of the environment in which the child is found can be carried out, to take the corresponding precautions. In this way, the system alerted those in charge through the IFTTT application that sent a message after detecting an anomaly.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130423840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leaving the Lights On? Exploring Cloud ERP Migrations and IS Discontinuance","authors":"J. Kinnunen","doi":"10.1109/uemcon53757.2021.9666669","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666669","url":null,"abstract":"As the paradigm shift from on-premise systems to cloud computing progresses, even core business systems such as ERP are being migrated to the cloud. Simultaneously, academia is showing an ever-increasing interest in researching IS discontinuance. However, little attention has been given to the combination of these two: how IS discontinuance is present with cloud ERP migrations. Based on a multiple-case study of six large companies, this study focuses on exploring the distinct factors behind the phenomenon and specifically on the replacement form of IS discontinuance. We conclude that there are specific characteristics which affect the continued use of the legacy system, but also demonstrate how the replacement process differs in this context. The results indicated that replacement through cloud ERP migration is not a sequential process, but rather parallel by nature, which may require maintaining two separate systems side-by-side for a certain period of time. The factors behind this are missing functionality in cloud ERP, voluntary legacy system continuance, data challenges and licensing lock-in, which in turn support the continued use of the legacy system.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121092020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain Framework for Secured On-Demand Patient Health Records Sharing","authors":"Meryem Abouali, K. Sharma, O. Ajayi, T. Saadawi","doi":"10.1109/UEMCON53757.2021.9666482","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666482","url":null,"abstract":"The healthcare sector is constantly improving patient health record systems. However, these systems face a significant challenge when confronted with patient health record (PHR) data due to its sensitivity. In addition, patient’s data is stored and spread generally across various healthcare facilities and among providers. This arrangement of distributed data becomes problematic whenever patients want to access their health records and then share them with their care provider, which yields a lack of interoperability among various healthcare systems. Moreover, most patient health record systems adopt a centralized management structure and deploy PHRs to the cloud, which raises privacy concerns when sharing patient information over a network. Therefore, it is vital to design a framework that considers patient privacy and data security when sharing sensitive information with healthcare facilities and providers. This paper proposes a blockchain framework for secured patient health records sharing that allows patients to have full access and control over their health records. With this novel approach, our framework applies the Ethereum blockchain smart contracts, the Inter-Planetary File System (IPFS) as an off-chain storage system, and the NuCypher protocol, which functions as key management and blockchain-based proxy re-encryption to create a secured on-demand patient health records sharing system effectively. Results show that the proposed framework is more secure than other schemes, and the PHRs will not be accessible to unauthorized providers or users. In addition, all encrypted data will only be accessible to and readable by verified entities set by the patient.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133984385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Neuromarketing Study Using Machine Learning for Predicting Purchase Decision","authors":"Maria Ramirez, Shima Kaheh, K. George","doi":"10.1109/uemcon53757.2021.9666539","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666539","url":null,"abstract":"Neuromarketing research has evolved as a new and novel way of gathering reliable consumer data to understand consumer decisions better and increase marketing effectiveness. Physiological and neural signals are measured in neuromarketing to get insight into customers' motivations and preferences, which can help create new marketing materials, product development, pricing, and other marketing sectors. The most prevalent methods of measuring are brain scanning, which measures neural activity, and physiological tracking, which measures eye movement, heart rate, and skin conductivity. As part of this study, electroencephalogram (EEG) and functional near-infrared spectroscopy (fNIRS) are used together with galvanic skin response (GSR) and heart rate variability (HRV) to see how different colors of one product affects consumers' preferences. Machine learning algorithms such as the k-nearest neighbor (kNN) and support vector machine (SVM) are adopted to ascertain consumer preferences.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133191636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Benjamin Lea, Debaditya Shome, Omer Waqar, J. Tomal
{"title":"Sum rate maximization of D2D networks with energy constrained UAVs through deep unsupervised learning","authors":"Benjamin Lea, Debaditya Shome, Omer Waqar, J. Tomal","doi":"10.1109/uemcon53757.2021.9666500","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666500","url":null,"abstract":"We consider a system model in which several energy harvesting (EH) unmanned aerial vehicles (UAVs), often known as drones, are deployed with device-to-device (D2D) communication networks. For the considered system model, we formulate an optimization problem that aims to find an optimal transmit power vector which maximizes the sum rate of the D2D network while also meets the minimum energy requirements of the UAVs. Because of the nature of the system model, it is necessary to deliver solutions in real time i.e., within a channel coherence time. As a result, conventional non-data-driven optimization methods are inapplicable, as either their run-time overheads are prohibitively expensive or their solutions are significantly suboptimal. In this paper, we address this problem by proposing a deep unsupervised learning (DUL) based hybrid scheme in which a deep neural network (DNN) is complemented by the full power scheme. It is shown through simulations that our proposed hybrid scheme provides up to 91% higher sum rate than an existing fully non-data driven scheme and our scheme is able to obtain solutions quite efficiently, i.e., within a channel coherence time.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133717927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Devin Heng, Ethan Santos, Timothy Kheang, Kevin Nguyen, Hariharan Duraisamy, S. Raju, K. George
{"title":"Internet of Things (IoT) Based Patient Fall Prediction and Monitoring System","authors":"Devin Heng, Ethan Santos, Timothy Kheang, Kevin Nguyen, Hariharan Duraisamy, S. Raju, K. George","doi":"10.1109/uemcon53757.2021.9666561","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666561","url":null,"abstract":"A large portion of death from an external cause in a hospital setting or care facility is caused by patient getting injured or hurt by falling down due to either disability or medication or by accident. A fall could lead to sustaining severe injuries and fatalities in some rare cases. It is highly unfortunate to get a call from the hospital stating that their family member has been injured by falling down. Elderly people are prone to fall more when compared to others and are also more likely to be fatal. In case of a fall, first aid should be provided immediately so that the fall does not cause fatal consequences. There are very few existing hospitals that can treat elderly people with intensive care and be proactive in tending to the patients. There are also limited technology that can help with detecting the fall. In most cases they turn out to be tardy as there would already have been consequences from the fall. In order to overcome this scenario, we may need special devices and gadgets. Instead of fall detection, determining the fall before it occurs and preventing it, will reduce the cost of treatment, the repercussions involved from the fall and also not make the fall lethal. This paper suggests the techniques of fall prevention that can abate the fall significantly in advance.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131983357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manzar E Hassin, Adnan Al Neon, Sal Sabila, R. Rahman
{"title":"Smart Fire Detection and Security System","authors":"Manzar E Hassin, Adnan Al Neon, Sal Sabila, R. Rahman","doi":"10.1109/uemcon53757.2021.9666623","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666623","url":null,"abstract":"The goal of our research is to design and implement a microcontroller-based smart fire detection and security system with real-time web integration. Most of the available fire alarms depend on the gas sensor only, which is not efficient enough to secure life and property. To minimize the issue, we bring a multi-sensor fire detection and notification technology. The significance of our study is to detect fire at an early stage with the help of multiple sensors like temperature, gas, and flame. We also use a motion sensor for detecting movement during a fire event. It can be used for security purposes as well. We have developed the system based on a custom algorithm that was written in C programming language. The entire system runs on an AVR microcontroller. The study has two major parts: the first part gets raw data from multiple sensors. After that, it processes the data and saves the data to the MySQL database; and the second part generates a graph on the web portal based on the saved data from the database. By integration of these two parts, this system can detect intruders more efficiently as well.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"648 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131987567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low-Cost Open Source IoT-Based SCADA System for a BTS Site Using ESP32 and Arduino IoT Cloud","authors":"Cyprian Oton, M. Iqbal","doi":"10.1109/UEMCON53757.2021.9666691","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666691","url":null,"abstract":"A low-cost open source IoT-based SCADA system for a rural BTS site using ESP32 and Arduino IoT Cloud is presented in this work. Current, voltage, temperature, and humidity sensors are programmed to measure relevant parameters of interest, and the measured Data is processed and parsed to the Arduino IoT Cloud via a Wi-Fi network communication channel. A widget-based dashboard is created on the Arduino IoT Cloud to monitor and control the system. A mobile application is also deployed to aid remote monitoring and control as well. LEDs are used to implement a high temperature and low voltage control logic. A prototype is used to demonstrate this as an illustration of what is obtainable in a Base Transceiver Station (BTS), where the voltage must be within a specific value (48 V) and the temperature within an acceptable value too.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"425 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132303049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cameron Woolfries, Martin Van Laethem, Nolan Crooks, Tushya Iyer, Michal Aibin
{"title":"Slot Based Round Robin Algorithm for RMCSA Problem in a Spatially-Spectrally FONs","authors":"Cameron Woolfries, Martin Van Laethem, Nolan Crooks, Tushya Iyer, Michal Aibin","doi":"10.1109/uemcon53757.2021.9666681","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666681","url":null,"abstract":"This short paper introduces a new approach for solving the Routing, Modulation, Core and Spectrum Assignment problem in Spatially-Spectrally Flexible Optical Networks called Slot Based Round Robin. We compare it with other approaches available in the literature by evaluating their performance under dynamic routing using two real-life networks. Our approach balances requests allocation, resulting in a more than 25% reduction of Bandwidth Blocking Probability.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132823840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}