{"title":"IOTSMS 2020 Copyright Page","authors":"","doi":"10.1109/iotsms52051.2020.9340198","DOIUrl":"https://doi.org/10.1109/iotsms52051.2020.9340198","url":null,"abstract":"","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125114406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Erick Alan Barlandas-Quintana, J. Martinez-Ledesma
{"title":"Detection of Carbapenems Resistant K-mer Sequences in Bacteria of Critical Priority by the World Health Organization (Pseudomonas aeruginosa and Acinetobacter baumannii)","authors":"Erick Alan Barlandas-Quintana, J. Martinez-Ledesma","doi":"10.1109/IOTSMS52051.2020.9340214","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340214","url":null,"abstract":"Antimicrobial resistance (AMR) (or drug resistance) is a natural phenomenon where microorganisms change their molecular, physical, or chemical structures to resist the drugs created by infections. The World Health Organization (WHO) had released for the first time a list of Multidrug-Resistant Bacteria (MRB) that pose the greatest threat to human health, and for which new antibiotics are desperately needed. Acinetobacter baumannii and Pseudomonas aeruginosa resistant to carbapenems are part of the Gramnegative group non-fermenting bacilli with critical priority according to the WHO. For this, the research final purpose was to create and train a bioinformatic study capable of finding critical k-mers that could differentiate those strains of P. aeruginosa and A. baumannii resistant to carbapenems. At the end, two sets of k-mers for both pathogens were obtained. Three Machine Learning algorithms were performed to prove the use of these k-mers in antimicrobial prediction Random Forest, Adaboost, and Xgboost. For Pseudomonas aeruginosa, an accuracy of 0.8 was obtained using Random Forest, an accuracy of 0.92 using Adaboost, and an accuracy of 0.84 when using Xgboost. In the case of Acinetobacter baumannii, an accuracy of 0.98 was obtained when using Random Forest and an accuracy of 0.99 when using Adaboost or Xgboost. To investigate the sequences of the k-mers obtained, the National Center for Biotechnology Information (NCBI) Basic Local Alignment Search Tool BLAST was used. Twenty sequences built with the k-mers were investigated for each bacteria. For A. baumannii, 18 out of 20 sequences represented a key sequence in antibiotic resistance. In the case of P. aeruginosa, 16 out of 20 sequences represented a key sequence. Further investigation over these sequences can be applied in creating new directed antibiotics or detecting easily resistant strains of Pseudomona aeruginosa or Acinetobacter baumannii resistant to carbapenems.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116846166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gérald Rocher, Thibaut Gonnin, Frank Dechavanne, S. Lavirotte, J. Tigli, L. Capocchi, J. Santucci
{"title":"An Actuation Conflicts Management Flow for Smart IoT-based Systems","authors":"Gérald Rocher, Thibaut Gonnin, Frank Dechavanne, S. Lavirotte, J. Tigli, L. Capocchi, J. Santucci","doi":"10.1109/IOTSMS52051.2020.9340196","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340196","url":null,"abstract":"IoT-based applications have long been limited to collecting field information; at the edge of their underlying infrastructure, IoT devices utilization is mainly motivated by their capacity at gathering environmental information from sensors as means to support users in decision making. However, in numerous domains like home automation, smart factory, intelligent transportation systems, etc., so-called ‘smart’ IoT-based applications also involve devices interacting with the physical environment through actuators. Throughout their life cycle, from the design, the deployment to operation, the ability to prevent conflicting actuation commands and antagonistic effects (possibly harmful), represents a new challenge in the realm of trustworthy smart IoT-based applications. In this paper, we introduce a complete flow for identifying and resolving actuation conflicts at design time. The proposed approach is part of the DevOps software development life cycle. It advocates the reuse of conflict management solutions through local resolution strategies, considering asynchronous timings of targeted hardware platforms they are deployed on. An illustration of the flow is provided on a use-case.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117185188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IOTSMS 2020 Organizers and Sponsors","authors":"","doi":"10.1109/iotsms52051.2020.9340225","DOIUrl":"https://doi.org/10.1109/iotsms52051.2020.9340225","url":null,"abstract":"","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116174237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Novi Azman, A. Syarif, Mohamed-el-Amine Brahmia, Jean-François Dollinger, Samir Ouchani, L. Idoumghar
{"title":"Performance Analysis of RPL Protocols in LLN Network Using Friedman’s Test","authors":"Novi Azman, A. Syarif, Mohamed-el-Amine Brahmia, Jean-François Dollinger, Samir Ouchani, L. Idoumghar","doi":"10.1109/IOTSMS52051.2020.9340203","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340203","url":null,"abstract":"This paper provides a comparison study of the quality services of RPL protocols in low-power and lossy net- works (LLN). We evaluate and compare our proposed protocol which is an extension of RPL based on Operator Calculus (OC), called RPL-OC, with the standard and other RPL variants. OC based approach is applied to extract the feasible end-to-end paths while assigning a rank to each one. The goal is to provide a tuple that containing the most efficient paths in end-to-end manner by considering more network metrics instead of one. Further, to address some significant issues of the performance analysis, a statistical test has been performed in order to determine whether the proposed protocol outperforms others or not by using Friedman test. The results show that there is a strong indication that four different protocols were analyzed and compared. It reveals that the proposed scheme outperforms others, especially in terms of end-to-end delay and energy consumption which allow ensuring quality of services requirements for Internet of Things (IoT) or smart city applications.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"304 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127485867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khaoula Zaimen, Mohamed-el-Amine Brahmia, Jean-François Dollinger, L. Moalic, A. Abouaissa, L. Idoumghar
{"title":"A Overview on WSN Deployment and a Novel Conceptual BIM-based Approach in Smart Buildings","authors":"Khaoula Zaimen, Mohamed-el-Amine Brahmia, Jean-François Dollinger, L. Moalic, A. Abouaissa, L. Idoumghar","doi":"10.1109/IOTSMS52051.2020.9340226","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340226","url":null,"abstract":"The rapid growing of Internet of things (IoT) is one of the most important factors of integrating WSN in smart buildings. Furthermore, the presence of these sensors and technologies allow improving the accuracy of the measured data while reducing buildings energy consumption and guaranteeing the comfort required by the indoor users. However, finding the optimal sensor nodes positions in an indoor environment with heterogeneous obstacles is the keystone to ensure a full sensing coverage with a full connectivity. To meet this challenge, various initiatives have been proposed in the literature. First, we summarize the main developed solutions to optimize WSN deployment in an indoor/outdoor environment. Then, we propose our conceptual approach that relies on exploiting BIM (Building information modeling) database to get real time and valid information about the target area. Indeed, the proposed solution can be integrated within BIM tools as a plugin in order to optimize sensors deployment in real time by taking into account nodes and obstacles heterogeneity at the same time.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129782229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marco Pomalo, V. T. Le, Nabil El Ioini, C. Pahl, H. Barzegar
{"title":"Service Migration in Multi-domain Cellular Networks based on Machine Learning Approaches","authors":"Marco Pomalo, V. T. Le, Nabil El Ioini, C. Pahl, H. Barzegar","doi":"10.1109/IOTSMS52051.2020.9340223","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340223","url":null,"abstract":"The number of mobile subscribers has increased drastically with the deployment of high-performance mobile cellular networks such as Long Term Evolution (4G) (LTE), and the upcoming 5th Generation Mobile Cellular Network (5G). Seamless connectivity is an important factor to provide better Quality-of-Service (QoS) as well as Quality-of-Experience (QoE) in cellular networks. In this regard, the utilization of Mobile Edge Computing (MEC) technology allows to bring required mobile services close to the end users to reduce latency, and increase service quality. However, switching between MECs nodes needs to be optimized in order to satisfy the expected quality of service as well as to guarantee service continuity SC. This paper addresses this problem by proposing a methodology and a prediction algorithm to boost SC in a MEC configuration.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121361444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Selection of Service Nodes in Edge Computing Environments","authors":"Efthymios Oikonomou, A. Rouskas","doi":"10.1109/IOTSMS52051.2020.9340201","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340201","url":null,"abstract":"Traditional centralized mobile cloud computing is encountering severe challenges, due to the ever-increasing growth of portable smart devices, which host numerous resource-hungry applications generating exponentially growing data traffic volumes. Edge computing technology promises an increased quality of service with low communication delays by bringing the cloud closer to the end-users, at the network edge. The approach of placing server capabilities at access nodes, yielding edge service nodes, seems to be a feasible solution. In this way, proximity to service is achieved and guaranteed QoS is provided. However, keeping operational edge service nodes at every access node is energy consuming and yields increased operational expenses to the application provider when the requests for services are at low levels. In this paper, we propose algorithms to select the most appropriate access nodes to host the edge service nodes and to determine the set of access nodes that will be served by each service node, given the number of required service nodes to satisfy service computational requests and the topology of the network. We study how algorithms behave in terms of service latency and balancing of the load among service nodes, at increasing computational loads. The evaluation is performed with simulation experiments and comparison against an exhaustive search algorithm whose main goal is to minimize the latency of offered services to the access nodes. The results validate the efficiency of the proposed schemes.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121834579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dries Van Bael, Shirin Kalantari, A. Put, B. Decker
{"title":"A Context-Aware Break Glass Access Control System for IoT Environments","authors":"Dries Van Bael, Shirin Kalantari, A. Put, B. Decker","doi":"10.1109/IOTSMS52051.2020.9340209","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340209","url":null,"abstract":"In Internet of Things (IoT) environments, sensors measure and quantify properties of physical locations, objects and even people. Context-aware access control systems include this data in the decision making process to improve their accuracy and precision. However, access control systems can fail when unexpected situations occur for which no access rules have been defined. One solution implemented by access control systems for critical infrastructure (e.g. a hospital, factory production line), is to break the glass in case of emergency to temporarily obtain the necessary privileges. During this process, sufficient non-repudiation evidence must be collected, which is audited at a later stage to verify whether the emergency access was justified. Shortcomings of existing Break Glass models are twofold: firstly, Break Glass is mostly considered as a static process for which the activation requirements and granted privileges are not adapted to the context of the emergency situation; secondly, a closed environment such as a hospital with authenticated caregivers is generally assumed, which is not realistic for open environments.In this paper, we present a context-aware Break Glass system architecture, which uses contextual information to detect ongoing emergencies, and allows the activation requirements and temporary privileges to be be adapted to the current situation or emergency. Furthermore, the system includes a fail-safe operation to disable the Break Glass activation if the emergency was wrongly detected. Our prototype shows the soundness of the design and its practical feasibility to be used in time-critical scenarios.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123839028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}