{"title":"Design of smart ships for the IoT","authors":"J. A. Muñoz, R. Pérez","doi":"10.1145/3018896.3018930","DOIUrl":"https://doi.org/10.1145/3018896.3018930","url":null,"abstract":"Ships vessels are like small or not so small, cities or industries. These kind of artifacts can take advantage of the developments on IoT to deliver smart vessels to improve operation, usability and profitability for shipowners, users and workers. To introduce the different possibilities of IoT in vessels it is needed to start from the initial concept and the initial design. This paper presents some ideas on how to make a ship conceptual design from the very beginning by taking into account the necessities of the different components of a ship in order to be connected in the world of the IoT. For making this design it is necessary to use advanced tools capable of incorporating the latest achievements in the IoT and to manage all this complexity.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"4 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132815447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multiservice network for gas and water meters management","authors":"F. Colace, M. Ferro, F. Abate, A. Pietrosanto","doi":"10.1145/3018896.3018927","DOIUrl":"https://doi.org/10.1145/3018896.3018927","url":null,"abstract":"The increasing offer of connectivity and of mobile tools (mobile phones, PDA) has determined a new scenario of computation in which the users can access resources and services and interact with each other in any moment and place. This technological revolution has involved all the fields, included the one that involves the meters and their management. If the remote management of the meters of latest generation has at this point entered our everyday life, there is a considerable number of old meters that cannot be neglected, but that have to be remotely controlled for reasons of security and efficacy. In this paper, it is proposed a system to connect these devices creating a management environment in complete compliance with the paradigm of the Internet of Things. The entire environment has been tested in a real context giving satisfying results.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134253171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT powered portable aquaponics system","authors":"N. Jacob","doi":"10.1145/3018896.3018965","DOIUrl":"https://doi.org/10.1145/3018896.3018965","url":null,"abstract":"In this paper, a smart and portable indoor aquaponics system was designed and developed, with various electronic components and sensors, coupled with IoT technology. Features of this system include: remote control of the watering and lighting cycle, live visual updates of the system using a camera, water overflow detection and temperature monitoring of the aquarium. Such a system is aimed towards people in urban areas who neither have the time nor the physical space, to grow their own organic food.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133353719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Customization of virtual machine allocation policy using k-means clustering algorithm to minimize power consumption in data centers","authors":"Ulysse Rugwiro, C. Gu","doi":"10.1145/3018896.3018947","DOIUrl":"https://doi.org/10.1145/3018896.3018947","url":null,"abstract":"Cloud Computing provides rapid provision of computing resources like processing power, memory, network resources, storage, etc. Running computing resources for longer time, leads energy consumption, increase the emission of Carbon Dioxide (CO2) and increase the expenditure cost for the resources usage. Hence there is a necessity to minimize the execution time to reduce energy consumption in the cloud environment. One of the existing approaches to reducing energy consumption is based on Migration and Placement Policy for Virtual Machine, but still improving placement technique we can further minimize power consumption. In our proposed architecture for cloud resource allocation based on Clustering method, we do map a group of tasks to virtual machines. For clustering, we work on task usage of CPU, memory, and bandwidth. This proposed clustering technique further decreases energy consumption by efficient resource allocation.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"674 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116104804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-agent systems for scalable internet of things security","authors":"P. Kendrick, A. Hussain, N. Criado, M. Randles","doi":"10.1145/3018896.3065844","DOIUrl":"https://doi.org/10.1145/3018896.3065844","url":null,"abstract":"Providing effective and scalable real-time security to Internet of Things devices can be a challenging task given the limited computational capacity of portable devices and a significant volume of network traffic. Multi-Agent Systems have proven to be a valuable tool in the areas of cyber security, distributed networks and legacy systems because of their scalable and flexible architecture. In this paper, we present a novel implementation of a Multi-Agent System for use within, or to support, Internet of Things networks through the distributed processing of security events to offload the computational cost of processing data from Internet of Things devices. In particular, domain experts can add new agents to existing systems which can automatically work with preexisting agents without manual reconfiguration. The scalability of this deployment model makes it suitable for a broad range of environments including dynamic and large-area networks.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122168711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Din, Yifan Wu, Bo-Jun Guo, Ching Chen, Pei-Jung Wu
{"title":"Spectrum expansion/contraction problem for multipath routing with time-varying traffic on elastic optical networks","authors":"D. Din, Yifan Wu, Bo-Jun Guo, Ching Chen, Pei-Jung Wu","doi":"10.1145/3018896.3018946","DOIUrl":"https://doi.org/10.1145/3018896.3018946","url":null,"abstract":"The spectrum allocated to an end-to-end connection between source and destination nodes varies dynamically with time (denoted as time-varying traffic). For serving time-varying traffic in an Elastic optical network (EON), the spectrum allocated for the connection can be expanded or contracted to meet the traffic requirement. Moreover, multipath routing algorithms can more flexibly utilize spectrum resources than single-path routing algorithms in dynamic scenario, since it splits a traffic request into multiple small-size connections and individually transmitting them through several optical paths. In this paper, the spectrum expansion /contraction problem (SECP) for multipath routing on EONs is studied with time-varying traffic. The expansion and contraction algorithms are proposed to solve this problem and these algorithms are examined through simulations. Simulations show that the proposed algorithms can achieve good results.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124727114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach to secure cloud data storage and dynamic data auditing in a cloud","authors":"K. Brindha, N. Jeyanthi","doi":"10.1145/3018896.3018907","DOIUrl":"https://doi.org/10.1145/3018896.3018907","url":null,"abstract":"Cloud computing is a new emerging computing paradigm in which any individual or organization can remotely store the information and it also reduces the burden of the cost of its storage and maintenance. Even though the cloud provides tangible merits to cloud users, it suffers from various security flaws. Due to these grave concerns, data confidentiality and integrity has become a challenging task not only for the data owners but also to the trusted service providers. To overcome this problem, this article proposes a novel approach for protecting data using visual cryptography technique, dynamic data verification using algebraic signature and data dynamics using Cuckoo Hash Table (CHT).","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125085079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the path to cyber-peace: a robust 'diagnosis-filter' for safeguarding future systems and machines","authors":"N. Tantouris, D. Polemi, Kleanthis Dellios","doi":"10.1145/3018896.3065834","DOIUrl":"https://doi.org/10.1145/3018896.3065834","url":null,"abstract":"Nowadays, a lot of skepticism and generic apprehension is raising toward the neo-industrial (r)evolution regarding the healthiness and cyber-security of all types of cyber-physical systems and machines (including from critical infrastructures, satellites, (bio)mechatronics and IoT devices, robots and drones, exoskeleton wearables, implantables and more) that are all equipped with sensors and actuators. On the path to cyber-peace, robust 'diagnosis-filters' is only a proposed way to safeguard not only the cyber-physical state of systems and machines but also sustain/maintain their reliability and autonomy, setting them trustworthy.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125545051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ruhma Tahir, Hasan Tahir, Ali Sajjad, K. Mcdonald-Maier
{"title":"A secure cloud framework for ICMetric based IoT health devices","authors":"Ruhma Tahir, Hasan Tahir, Ali Sajjad, K. Mcdonald-Maier","doi":"10.1145/3018896.3056788","DOIUrl":"https://doi.org/10.1145/3018896.3056788","url":null,"abstract":"Wearable devices are an important part of internet of things (IoT)with many applications in healthcare. Prevalent security concerns create a compelling case for a renewed approach by incorporating the ICMetric technology in IoT healthcare. The ICMetric technology is a novel security approach and uses the features of a device to form the basis of cryptographic services like key generation, authentication and admission control. Cryptographic systems designed using ICMetric technology use unique measurable device features to form a root of trust. This paper uses the MEMS bias in a body wearable Shimmer sensor to create a device ICMetric. The ICMetric identity is used to generate cryptographic key to perform encryption and decryption of patients data which is being communicated to health professionals. The cloud based component of the proposed framework provides much needed distributed data processing and availability. The proposed schemes have been simulated and tested for conformance to high levels of security and performance.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129539909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Missing plane identification using doppler effect and distance method in satellite communication","authors":"P. Valliammai, K. Ganapathy","doi":"10.1145/3018896.3025143","DOIUrl":"https://doi.org/10.1145/3018896.3025143","url":null,"abstract":"The impact of missing planes causes serious issues worldwide. Existing search and rescue operations are carried out by Search and Rescue Satellite Aided Tracking (SARSAT). This paper explains the small module of satellite aided tracking operation to rescue the flight that goes missing. With the prior known information of the path of the respective flight and the deployment of camera and Global Positioning System (GPS) in satellite, facilitates the identification of missing flight. The proposed work identifies the missing plane using Doppler effect through satellite communication principles. With respect to time and path tracking, the plane missing is confirmed. To identify the missing plane exact location, the proposed work uses Doppler effect and distance calculation method. constellation of satellites is positioned in lower orbits, to locate and give the position of the missing vessels. Further the search and rescue operation is performed by search and rescue forces using the information downlinked by the satellite.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129664589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}