{"title":"SLICE","authors":"Young-Ho Suh, Sungpil Woo, Dong-Hwan Park","doi":"10.1145/3277593.3277603","DOIUrl":"https://doi.org/10.1145/3277593.3277603","url":null,"abstract":"From the perspective of IoT, AmI is one of the promising application areas combining AI and IoT. Existing edge-based IoT platforms provide a centralized AmI intelligence such as perception, reasoning and learning. Recently, advances of technologies on intelligent IoT devices accelerate moving intelligence to the edge device, which enables edge devices to behave as agents. Though agent-based IoT is more suitable for developing AmI applications than edge-based IoT, application developers should design collaborations among individual agents in the agent-based IoT, which is not easy and cumbersome enough to be an obstacle to development. In order to solve the problem, in this paper, we propose a novel agent-based IoT platform called SLICE for developing and managing AmI applications. Our contribution is threefold. First, we propose a new system model for abstracting each individual agent and designing collaboration among those agents. Second, we design and implement a software framework to support developing AmI applications based on the proposed system model. Third, we design and implement a runtime engine and management tools to provide an efficient and robust execution environment for an agent participating in collaborations to perform AmI applications. As a proof of concept, we present complete lifecycles of developing a smart car based on the SLICE platform. From the experiment, we evaluate and verify how the proposed platform efficiently and effectively supports entire development phases, i.e. design, implement, deploy, and execute.","PeriodicalId":129822,"journal":{"name":"Proceedings of the 8th International Conference on the Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122273619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linked data techniques for the web of things: tutorial","authors":"A. Harth, Tobias Käfer","doi":"10.1145/3277593.3277641","DOIUrl":"https://doi.org/10.1145/3277593.3277641","url":null,"abstract":"The tutorial covers web technologies for specifying and executing applications involving networked sensors and actuators based on a logical representation of world state and application behaviour.","PeriodicalId":129822,"journal":{"name":"Proceedings of the 8th International Conference on the Internet of Things","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125644808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimating outdoor temperature from CPU temperature for IoT applications in agriculture","authors":"C. Krintz, R. Wolski, Nevena Golubovic, F. Bakir","doi":"10.1145/3277593.3277607","DOIUrl":"https://doi.org/10.1145/3277593.3277607","url":null,"abstract":"In the paper, we investigate using CPU temperature from small, low cost, single-board computers to predict out-door temperature in IoT-based precision agricultural settings. Temperature is a key metric in these settings that is used to inform and actuate farm operations such as irrigation scheduling, frost damage mitigation, and greenhouse management. Using cheap single-board computers as temperature sensors can drive down the cost of sensing in these applications and make it possible to monitor a large number of micro-climates concurrently. We have developed a system in which devices communicate their CPU measurements to an on-farm edge cloud. The edge cloud uses a combination of calibration, smoothing (noise removal), and linear regression to make predictions of the outdoor temperature at each device. We evaluate the accuracy of this approach for different temperature sensors, devices, and locations, as well as different training and calibration durations.","PeriodicalId":129822,"journal":{"name":"Proceedings of the 8th International Conference on the Internet of Things","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125678481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An attack tree based risk evaluation approach for the internet of things","authors":"Waqar Asif, I. G. Ray, M. Rajarajan","doi":"10.1145/3277593.3277596","DOIUrl":"https://doi.org/10.1145/3277593.3277596","url":null,"abstract":"Internet of Things (IoTs) are being widely used for a large number of use case scenarios, where a wide range of devices, with different computational resources, are marshalled for the purpose of a certain mission goal. The unique combination of these devices and the nature of sensitive information that they hold poses a large number of risks where the risks are highly dependant upon the type of devices and the type of attacks that an adversary can launch. In this work, we propose an attack tree model to evaluate the user's privacy risks associated with an IoT eco system. We evaluate the potential risks based on varying attack attributes, the probable considerations/preferences of an adversary and the varying computational resources available on a device. The proposed model identifies the probability of risk associated with each attack scenario and thus benefits an analyst in identifying which attack is more likely of the use case scenario.","PeriodicalId":129822,"journal":{"name":"Proceedings of the 8th International Conference on the Internet of Things","volume":"317 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131496655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cognitive correlates of EEG spectral power indicate human-swarm task performance","authors":"Gregory Bales, Z. Kong","doi":"10.1145/3277593.3277613","DOIUrl":"https://doi.org/10.1145/3277593.3277613","url":null,"abstract":"In this paper, we examine whether the geometric complexity of a robotic group affects performance in a human-swarm target acquisition task, and if these changes are reflected in average neurophysiological and behavioral characteristics. This is one of the first studies to utilize both the distribution of EEG spectral power and external behaviors to paint a more complex interaction between cognitive processes, behaviors, and task performance. Our results show that increasing the geometric complexity of the robotic group reduced task performance by 48.5%. Furthermore, the decrease in performance is accompanied by an increase in neurological measures that indicate more internal processing and suppression of visual stimuli. Accompanying changes in gaze and control activity enforce these differences.","PeriodicalId":129822,"journal":{"name":"Proceedings of the 8th International Conference on the Internet of Things","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131029259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sapphire","authors":"P. Giura, T. Jim","doi":"10.1145/3277593.3277611","DOIUrl":"https://doi.org/10.1145/3277593.3277611","url":null,"abstract":"The increasing popularity of IoT devices in both residences and enterprises has widened the attack surface for network connected devices. Many popular IoT devices have unpatched vulnerabilities or default passwords and lack basic security mechanisms, making them easy prey for malware and botnets. In this paper, we share our experience of designing and using an experimental deployment of network gateways to provide IoT security, to both the IoT devices and the gateways themselves. We propose three approaches for framework design and collecting the network data, each providing different levels of visibility into IoT device behavior. Finally we present our methodology and experimental evaluation of a small-scale deployment of gateways and IoT devices for volumetric anomaly detection and IoT device identification using the data collected by the gateways behind the NAT, or in the cloud, outside the NAT. We believe that securing IoT devices can be more efficient and effective when there is more visibility into device activity and security capabilities are deployed close to the devices, in the gateway. However, a hybrid approach in which data is collected on the gateways and analyzed in the cloud can be more practical; special considerations regarding sensitive data storage and privacy guarantees have to be taken into account.","PeriodicalId":129822,"journal":{"name":"Proceedings of the 8th International Conference on the Internet of Things","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114184208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic IoT data, protocol, and middleware interoperability with resource slice concepts and tools: tutorial","authors":"Hong Linh Truong","doi":"10.1145/3277593.3277642","DOIUrl":"https://doi.org/10.1145/3277593.3277642","url":null,"abstract":"Dealing with interoperability in the IoT domain is a complex matter that requires various techniques for tackling data, protocol and middleware interoperability. We cannot solve IoT interoperability problems by just developing (new) software components and (semantic) data models. In this tutorial, we will present interoperability techniques for complex IoT Cloud applications by leveraging dynamic solutions of provisioning and reconfiguring of IoT data processing pipelines, protocol bridges, IoT middleware and cloud services. First, the tutorial will examine cross-layered, cross-system inter-operability issues and present a DevOps IoT Interoperability approach for defining metadata, selecting resources and software artifacts, and provisioning and connecting resources to create various potential solutions for IoT Cloud interoperability using resource slice concepts. Second, the tutorial will present techniques for dynamically provisioning data pipelines, middleware services, protocol adapters and custom solutions to address cross-layered, cross-system interoperability for IoT Cloud applications. Such solutions also allow dynamic reconfiguration of resources to add/remove interoperability support. We will present the concepts and techniques with hands-on examples using our research tools rsiHub and IoTCloudSamples.","PeriodicalId":129822,"journal":{"name":"Proceedings of the 8th International Conference on the Internet of Things","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126620858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontology-based virtual IoT devices for edge computing","authors":"Kristina Sahlmann, T. Schwotzer","doi":"10.1145/3277593.3277597","DOIUrl":"https://doi.org/10.1145/3277593.3277597","url":null,"abstract":"An IoT network may consist of hundreds heterogeneous devices. Some of them may be constrained in terms of memory, power, processing and network capacity. Manual network and service management of IoT devices are challenging. We propose a usage of an ontology for the IoT device descriptions enabling automatic network management as well as service discovery and aggregation. Our IoT architecture approach ensures interoperability using existing standards, i.e. MQTT protocol and Semantic Web technologies. We herein introduce virtual IoT devices and their semantic framework deployed at the edge of network. As a result, virtual devices are enabled to aggregate capabilities of IoT devices, derive new services by inference, delegate requests/responses and generate events. Furthermore, they can collect and pre-process sensor data. These tasks on the edge computing overcome the shortcomings of the cloud usage regarding siloization, network bandwidth, latency and speed. We validate our proposition by implementing a virtual device on a Raspberry Pi.","PeriodicalId":129822,"journal":{"name":"Proceedings of the 8th International Conference on the Internet of Things","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130112792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Occupancy detection technology in the building based on IoT environment sensors","authors":"Youngmin Ji, Kisu Ok, Woo Suk Choi","doi":"10.1145/3277593.3277633","DOIUrl":"https://doi.org/10.1145/3277593.3277633","url":null,"abstract":"The phenomenon of abnormal climate caused by global warming is a serious problem in the world. Most of the countries around the world have signed the Paris Climate Agreement in response to climate change in 2015. Because of Agreement, countries around the world are making every effort to fulfill Paris obligation. Korea government is also trying to reduce the energy consumption. Among the methods to achieve the goal, commercial building is an important field. Because commercial buildings are energy intensive, we should find the way to save energy in this area to meet reduction target. In the case of commercial buildings, the correlation between occupants and energy consumption is very high. Therefore, the purpose of our study is to detect the occupancy of spaces using IoT environment sensors to save energy on buildings. Some spaces waste the energy to meet the thermal comfort level even when there are no people. In this paper, we show the practical results of our occupancy detection technology using IoT environment sensors to find the wasted space on the building.","PeriodicalId":129822,"journal":{"name":"Proceedings of the 8th International Conference on the Internet of Things","volume":"486 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115952576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The case for ambient sensing for human activity detection","authors":"Neha Belapurkar, S. Shelke, Baris Aksanli","doi":"10.1145/3277593.3277628","DOIUrl":"https://doi.org/10.1145/3277593.3277628","url":null,"abstract":"Human activity detection using various sources of data is an important problem due to its application in various domains, such as health-care, elderly care, security/safety, etc. Traditionally, this activity detection is carried out using multimedia data, including audio and video resources. Recently, the Internet of Things (IoT) has led to highly-improved computation and communication capabilities even within the smallest devices, giving rise to wearable devices. These devices can collect useful data about movements and thus enable detecting human activities. However, both traditional methods (multimedia) and wearable device-based methods completely expose users, resulting in severe privacy issues. Thus, it is crucial to be able to still detect these activities without compromising the user's privacy. In this paper, we make a case where ambient sensing (sensors that collect data representing only environmental changes, such as temperature, lighting, etc.) can be used to detect human activities. Since the available data corresponds to only the status of the surrounding environment, the user privacy can be preserved. We demonstrate which aspects of ambient sensing methods are desirable and what types of applications can benefit from them.","PeriodicalId":129822,"journal":{"name":"Proceedings of the 8th International Conference on the Internet of Things","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126582584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}