Proceedings of the International Conference on Internet-of-Things Design and Implementation最新文献

筛选
英文 中文
Energy Efficiency and Timeliness in Model Training for Internet-of-Things Applications: Poster Abstract 物联网应用模型训练的能效与时效性:海报摘要
Chih-Shuo Mei, Chao Wang
{"title":"Energy Efficiency and Timeliness in Model Training for Internet-of-Things Applications: Poster Abstract","authors":"Chih-Shuo Mei, Chao Wang","doi":"10.1145/3450268.3453507","DOIUrl":"https://doi.org/10.1145/3450268.3453507","url":null,"abstract":"Neural network model training is indispensable for domain-specific Artificial Intelligent Internet-of-Things (AIoT) applications. Typically, a GPU graphics card may take several hundreds watts in average during model training, while an embedded GPU device may take only couple watts for the same purpose at the cost of a longer training time. In this paper, we report our empirical study on the model training using NVIDIA RTX 2080 Ti graphics card and NVIDIA Jetson Nano embedded device. We show that, surprisingly, while the training time using the Jetson Nano is 30 times slower than that using the graphics card, the total energy consumption by Jetson Nano is actually only half. The result suggests that when the response time is less critical, one may choose to do model training on GPU embedded devices instead.","PeriodicalId":130134,"journal":{"name":"Proceedings of the International Conference on Internet-of-Things Design and Implementation","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116802426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vibration-based Indoor Occupant Gait Monitoring with Robot Vacuum Cleaners: Poster Abstract 基于振动的室内乘员步态监测与机器人真空吸尘器:海报摘要
Zhizhang Hu, Yue Zhang, Shijia Pan
{"title":"Vibration-based Indoor Occupant Gait Monitoring with Robot Vacuum Cleaners: Poster Abstract","authors":"Zhizhang Hu, Yue Zhang, Shijia Pan","doi":"10.1145/3450268.3453504","DOIUrl":"https://doi.org/10.1145/3450268.3453504","url":null,"abstract":"","PeriodicalId":130134,"journal":{"name":"Proceedings of the International Conference on Internet-of-Things Design and Implementation","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125562321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of an Energy-Efficient End-to-End Messaging Protocol for Smart Cities: Poster Abstract 面向智慧城市的节能端到端消息传递协议设计:海报摘要
Shang Chih Chung, Chao Wang
{"title":"Design of an Energy-Efficient End-to-End Messaging Protocol for Smart Cities: Poster Abstract","authors":"Shang Chih Chung, Chao Wang","doi":"10.1145/3450268.3453508","DOIUrl":"https://doi.org/10.1145/3450268.3453508","url":null,"abstract":"Internet-of-Things (IoT) applications at the city scale require a reliable and energy-efficient messaging service. In order to save energy consumption at each embedded IoT instrument, thus to prolong the application lifetime, it is best that the service be free of redundant messages. In this paper, we analyze the MQTT messaging protocol and show that there are three problems that may either cause message losses or produce redundant messages. For each problem we propose a solution, and we show that our design as a whole may be implemented efficiently. We have been implementing the design, and it is our hope that the messaging protocol as a result would be a good support to many smart-city applications.","PeriodicalId":130134,"journal":{"name":"Proceedings of the International Conference on Internet-of-Things Design and Implementation","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116456402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Benefits of GPU-CPU Task Replacement for Edge Device and Platform: Poster Abstract 边缘设备和平台GPU-CPU任务替换的好处:海报摘要
Cheng-You Lin, Chao Wang
{"title":"Benefits of GPU-CPU Task Replacement for Edge Device and Platform: Poster Abstract","authors":"Cheng-You Lin, Chao Wang","doi":"10.1145/3450268.3453505","DOIUrl":"https://doi.org/10.1145/3450268.3453505","url":null,"abstract":"Contemporary cyber-physical systems (CPS) applications are deployed on a networked platform with embedded devices and, like conventional workstations, each embedded device is now equipped with both CPU and GPU. In this paper, we present our on-going effort of synergizing CPU and GPU computing resources to improve application response time. We experimented on NVIDIA's Jetson Nano embedded device and RTX 2080 Ti graphics card and show that, in particular, with multiple GPU-intensive tasks running, it is possible to improve the application response time by replacing a GPU-intensive task by a corresponding CPU-intensive task. We studied several configurations of CPU-GPU task allocation and replacement, and accordingly we outlined a set of principles in leveraging such heterogeneous resources as a whole.","PeriodicalId":130134,"journal":{"name":"Proceedings of the International Conference on Internet-of-Things Design and Implementation","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127832693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RespWatch: Robust Measurement of Respiratory Rate on Smartwatches with Photoplethysmography RespWatch:基于光电脉搏波描记术的智能手表呼吸速率稳健测量
R. Dai, Chenyang Lu, M. Avidan, T. Kannampallil
{"title":"RespWatch: Robust Measurement of Respiratory Rate on Smartwatches with Photoplethysmography","authors":"R. Dai, Chenyang Lu, M. Avidan, T. Kannampallil","doi":"10.1145/3450268.3453531","DOIUrl":"https://doi.org/10.1145/3450268.3453531","url":null,"abstract":"Respiratory rate (RR) is a physiological signal that is vital for many health and clinical applications. This paper presents RespWatch, a wearable sensing system for robust RR monitoring on smartwatches with Photoplethysmography (PPG). We designed two novel RR estimators based on signal processing and deep learning. The signal processing estimator achieved high accuracy and efficiency in the presence of moderate noise. In comparison, the deep learning estimator, based on a convolutional neural network (CNN), was more robust against noise artifacts at a higher processing cost. To exploit their complementary strengths, we further developed a hybrid estimator that dynamically switches between the signal processing and deep learning estimators based on a new Estimation Quality Index (EQI). We evaluated and compared these approaches on a dataset collected from 30 participants. The hybrid estimator achieved the lowest overall mean absolute error, balancing robustness and efficiency. Furthermore, we implemented RespWatch on commercial Wear OS smartwatches. Empirical evaluation demonstrated the feasibility and efficiency of RespWatch for RR monitoring on smartwatch platforms.","PeriodicalId":130134,"journal":{"name":"Proceedings of the International Conference on Internet-of-Things Design and Implementation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128980512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Indoor Height Recovery by Cellular Signal Data: Poster Abstract 利用蜂窝信号数据恢复室内高度:海报摘要
Jinhua Lv, Yige Zhang, Weixiong Rao, Erwu Liu, Rui Wang, Zhaoyang Dong, Zhiren Fu, Yanfen Chen
{"title":"Indoor Height Recovery by Cellular Signal Data: Poster Abstract","authors":"Jinhua Lv, Yige Zhang, Weixiong Rao, Erwu Liu, Rui Wang, Zhaoyang Dong, Zhiren Fu, Yanfen Chen","doi":"10.1145/3450268.3453511","DOIUrl":"https://doi.org/10.1145/3450268.3453511","url":null,"abstract":"Understanding fine-grained distribution of telecommunication (Telco) indoor signals within high buildings is important for Telco operators to optimize wireless communication quality. A key task is to tag Telco indoor signals with associated height labels, i.e., the so-called indoor height recovery problem. Unlike existing works requiring sufficient training data within a single building, it is rather hard to generalize the problem across city-scale buildings, especially for those target buildings with scarce training data. To this end, we consider how to perform the height recovery problem for such target buildings with help of source buildings having sufficient labelled Telco signal data. We present a deep neural network (DNN)-based framework which involves three key steps (Telco signal parametrization, spatial image construction and DNN-based height estimation) to fill the gap between the buildings. Our preliminary evaluation demonstrates the potential of our work.","PeriodicalId":130134,"journal":{"name":"Proceedings of the International Conference on Internet-of-Things Design and Implementation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129197508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Energy Costs of Post-Quantum KEMs in TLS-based Low-Power Secure IoT 基于tls的低功耗安全物联网中后量子kem的能源成本研究
Maximilian Schöffel, F. Lauer, C. Rheinländer, N. Wehn
{"title":"On the Energy Costs of Post-Quantum KEMs in TLS-based Low-Power Secure IoT","authors":"Maximilian Schöffel, F. Lauer, C. Rheinländer, N. Wehn","doi":"10.1145/3450268.3453528","DOIUrl":"https://doi.org/10.1145/3450268.3453528","url":null,"abstract":"Recent achievements in designing quantum computers place a serious threat on the security of state-of-the-art public key cryptography and on all communication that relies on it. Meanwhile, security is seen as one of the most critical issues of low-power IoT devices even with pre-quantum public key cryptography since IoT devices have strict energy constraints and limited computational power. Thus, state-of-the-art dedicated hardware accelerators have been deployed to facilitate secure and confidential communication with well established protocols on such devices. It is common belief that the complexity of the cryptographic computations are also the bottleneck of the new, quantum-resistant algorithms and that hardware accelerators are necessary to use them efficiently on energy constrained embedded devices. In this paper, we carried out an in-depth investigation of the application of potential Post-Quantum Cryptography algorithms, which were proposed in the associated US NIST process, to a representative TLS-based low-power IoT infrastructure. First, we show that the main contributor to the TLS handshake latency are the higher bandwidth requirements of post-quantum Key-Encapsulation Mechanisms rather than the cryptographic computations itself. Second, from the perspective of crypto-agility we show that edge devices with code-based, isogeny-based as well as lattice-based algorithms have low energy consumption, which enables long battery run times in typical IoT scenarios without dedicated hardware accelerators. Third, we increase the level of security further by combining pre-quantum and post-quantum algorithms to a hybrid key exchange, and quantify the overhead in energy consumption and latency of it.","PeriodicalId":130134,"journal":{"name":"Proceedings of the International Conference on Internet-of-Things Design and Implementation","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134038249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and Optimization of Traffic-Aware TSCH Scheduling for Mobile 6TiSCH Networks 移动6TiSCH网络流量感知TSCH调度的设计与优化
Omid Tavallaie, J. Taheri, Albert Y. Zomaya
{"title":"Design and Optimization of Traffic-Aware TSCH Scheduling for Mobile 6TiSCH Networks","authors":"Omid Tavallaie, J. Taheri, Albert Y. Zomaya","doi":"10.1145/3450268.3453523","DOIUrl":"https://doi.org/10.1145/3450268.3453523","url":null,"abstract":"Time-Slotted Channel Hopping (TSCH) is a medium access control technology defined by the IEEE 802.15.4e standard to address reliability and timeliness requirements of low-power Internet of Things (IoT) applications. Based on a communication schedule, TSCH exploits time-synchronization combined with frequency channel hopping to cope with wireless interference and multi-path fading. While standards define mechanisms for the basic configuration and communication of TSCH nodes, computing and adapting a schedule to the network and traffic dynamics are left as open research problems. In this paper, we propose a novel Distributed Traffic-aware Scheduling Function (DT-SF) for mobile IoT networks. DT-SF dynamically adapts the TSCH schedule to the changes of the traffic and the network topology. It estimates the node mobility by using a new lightweight approach and monitors the queue backlog to balance the traffic loads of children nodes. We model allocating TSCH timeslots to one-hop neighbors as a Mixed-Integer Convex Programming (MICP) problem which is solved by using the method of Lagrange multipliers and the Branch-and-Bound algorithm. We implement DT-SF on Zolerita Firefly IoT motes and the Contiki operating system to evaluate its performance on the testbed with 18 nodes. Evaluation results show that DT-SF improves the packet delivery ratio by up to 52% compared to the state-of-the-art method.","PeriodicalId":130134,"journal":{"name":"Proceedings of the International Conference on Internet-of-Things Design and Implementation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129952777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Improving Security Performance of Dual UAVs System with Unknown Eavesdropper Location: Poster Abstract 改进未知窃听者位置的双无人机系统安全性能:海报摘要
Jianwei Sun, Heng Zhang, Weiwei Xu, Hongran Li, Jian Zhang, Jiacheng Ke, Hao Yan
{"title":"Improving Security Performance of Dual UAVs System with Unknown Eavesdropper Location: Poster Abstract","authors":"Jianwei Sun, Heng Zhang, Weiwei Xu, Hongran Li, Jian Zhang, Jiacheng Ke, Hao Yan","doi":"10.1145/3450268.3453509","DOIUrl":"https://doi.org/10.1145/3450268.3453509","url":null,"abstract":"Unmanned aerial vehicles (UAVs) are widely used in wireless communication. We take a novel scenario into consideration where a friendly jammer UAV is utilized to interfere with the eavesdropper whose actual position is unknown and the other UAV is used as a transmitter. We propose an algorithm to find optimal trajectory of the friendly jammer UAV under the consideration that the transmitter is mobile. We evaluate the extent of safe region (SR) through optimizing jammer UAV's trajectory. Numerical simulations demonstrate that the method we proposed is effective.","PeriodicalId":130134,"journal":{"name":"Proceedings of the International Conference on Internet-of-Things Design and Implementation","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127303244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lux: Enabling Ephemeral Authorization for Display-Limited IoT Devices Lux:为显示受限的物联网设备启用临时授权
Logan Blue, Samuel Marchal, Patrick Traynor, N. Asokan
{"title":"Lux: Enabling Ephemeral Authorization for Display-Limited IoT Devices","authors":"Logan Blue, Samuel Marchal, Patrick Traynor, N. Asokan","doi":"10.1145/3450268.3453530","DOIUrl":"https://doi.org/10.1145/3450268.3453530","url":null,"abstract":"Smart speakers are increasingly appearing in homes, enterprises, and businesses including hotels. These systems serve as hubs for other IoT devices and deliver content from streaming media services. However, such an arrangement creates a number of security concerns. For instance, providing such devices with long-term secrets is problematic with regards to vulnerable devices and fails to capture the increasingly transient nature of the relationship between users and the devices (e.g., in hotel or airbnb settings, this device is not owned by the customer and may only be used for a single day). Moreover, the limited interfaces available to such speakers make entering such credentials in a safe manner difficult. We address these problems with Lux, a system to provide ephemeral, fine-grained authorization to smart speakers which can be automatically revoked when the user and hub are no longer in the same location. We develop protocols using the LED/light channel available to many smart speaker devices to help users properly identify the device with which they are communicating, and demonstrate through a formally validated protocol that such authorization takes only a few seconds in practice. Through this effort, we demonstrate that Lux can safely authorize devices to access user accounts while limiting any long-term exposure to compromise.","PeriodicalId":130134,"journal":{"name":"Proceedings of the International Conference on Internet-of-Things Design and Implementation","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131786780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信