2019 Global IoT Summit (GIoTS)最新文献

筛选
英文 中文
GIoTS 2019 Copyright Page GIoTS 2019版权页面
2019 Global IoT Summit (GIoTS) Pub Date : 2019-06-01 DOI: 10.1109/giots.2019.8766381
{"title":"GIoTS 2019 Copyright Page","authors":"","doi":"10.1109/giots.2019.8766381","DOIUrl":"https://doi.org/10.1109/giots.2019.8766381","url":null,"abstract":"","PeriodicalId":149504,"journal":{"name":"2019 Global IoT Summit (GIoTS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129454155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Issues in Internet of Things: Vulnerability Analysis of LoRaWAN, Sigfox and NB-IoT 物联网中的安全问题:LoRaWAN、Sigfox和NB-IoT漏洞分析
2019 Global IoT Summit (GIoTS) Pub Date : 2019-06-01 DOI: 10.1109/GIOTS.2019.8766430
Florian Laurentiu Coman, Krzysztof Mateusz Malarski, M.N. Petersen, S. Ruepp
{"title":"Security Issues in Internet of Things: Vulnerability Analysis of LoRaWAN, Sigfox and NB-IoT","authors":"Florian Laurentiu Coman, Krzysztof Mateusz Malarski, M.N. Petersen, S. Ruepp","doi":"10.1109/GIOTS.2019.8766430","DOIUrl":"https://doi.org/10.1109/GIOTS.2019.8766430","url":null,"abstract":"One of the key enablers of an increased Internet of Things (IoT) roll-out is Low-Power Wide Area Network (LP-WAN) - a family of technologies tailored for resilient and energy-efficient communication of thousands of devices over large distances (even up to 100km). Under the pressure from both the business and the society to provide ubiquitous connectivity as soon as possible, new IoT deployments are conducted with haste and often by inexperienced people. Consequently, the aspect of communication security traditionally remains a secondary matter, even though the potential harm of a successful hacker attack can be enormous. Therefore, this paper presents an analysis of LP-WAN vulnerabilities, as well as several Proof-of-Concept (PoC) attacks toward LoRaWAN (packet forging), Sigfox (replay with DoS) and NB-IoT (attack using malicious UE), that confirm the existence of the vulnerabilities in both the standards and off-the-shelf hardware and services.","PeriodicalId":149504,"journal":{"name":"2019 Global IoT Summit (GIoTS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123351366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Modelling Data For A Sustainable Aquaculture 可持续水产养殖建模数据
2019 Global IoT Summit (GIoTS) Pub Date : 2019-06-01 DOI: 10.1109/GIOTS.2019.8766376
Ahmed Abid, C. Dupont, F. Gall, Allan Third, Frank Kane
{"title":"Modelling Data For A Sustainable Aquaculture","authors":"Ahmed Abid, C. Dupont, F. Gall, Allan Third, Frank Kane","doi":"10.1109/GIOTS.2019.8766376","DOIUrl":"https://doi.org/10.1109/GIOTS.2019.8766376","url":null,"abstract":"Combining aquaculture and Internet of Things (IoT) technologies still poses several challenges. IoT technologies are exploited to enhance productivity in aquaculture sites by maintaining precise operating conditions and to avoid undesirable situations. Currently, human intervention is still needed to make good decisions, dependant on the values of parameters detected by sensors, often captured at one point in time in a day. This is not only a time-consuming task but also an inaccurate one since parameters, such as water quality, evolves continuously and affects the whole aquaculture system. This is mainly caused by the lack of information collection, exchange and process automation between different actors in aquaculture farms. To overcome these problems, technologies such as semantic Web technologies and Artificial Intelligence (AI), are bringing new capabilities to organise data in an inter-operable way to then be processed and used for monitoring and decision-making. In this context, we are proposing in this paper a fully semantic based-reference data model for Integrated Multi-Trophic Aquaculture (IMTA) that involves the collection, processing, and sharing of data both between components and between the platform and external aqua-systems by supporting IoT and data information standards. It is based on analysis of the current data models and covers the core concepts required for aquaculture management and has been validated against several business scenarios.","PeriodicalId":149504,"journal":{"name":"2019 Global IoT Summit (GIoTS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121107357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Policy-based Framework in Fog enabled Internet of Things for Cooperative ITS 雾中基于策略的物联网协作ITS框架
2019 Global IoT Summit (GIoTS) Pub Date : 2019-06-01 DOI: 10.1109/GIOTS.2019.8766360
José Luis Hernández Ramos, G. Baldini, R. Neisse, M. Al-Naday, M. Reed
{"title":"A Policy-based Framework in Fog enabled Internet of Things for Cooperative ITS","authors":"José Luis Hernández Ramos, G. Baldini, R. Neisse, M. Al-Naday, M. Reed","doi":"10.1109/GIOTS.2019.8766360","DOIUrl":"https://doi.org/10.1109/GIOTS.2019.8766360","url":null,"abstract":"In recent years, Fog computing has been proposed to complement well-known Cloud components, in order to realize delay-sensitive and location-aware services. In a future digital landscape with billions of IoT devices interconnected, this emerging paradigm will enable a more decentralized and flexible management by bringing data processing and distribution closer to end devices. One of the main challenges in fog scenarios is the need for automating the orchestration of end devices and components through scalable approaches. In this direction, this work represents an ongoing effort related to the potential application of policy-based approaches to mitigate the issues associated to fog orchestration. In particular, we propose the use of Seckit as a model-based and technology-independent toolkit to ease the management of IoT devices through the use of policy specification. Additionally, we considered a Cooperative Intelligent Transport Systems (C-ITS) use case to give some insights about the advantages of using the proposed approach.","PeriodicalId":149504,"journal":{"name":"2019 Global IoT Summit (GIoTS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123745460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Development of an Efficient System to Monitor the Honeybee Colonies Depopulations 一种有效的监测蜂群减少系统的开发
2019 Global IoT Summit (GIoTS) Pub Date : 2019-06-01 DOI: 10.1109/GIOTS.2019.8766435
Philippe Cousin, Eliza Căuia, A. Siceanu, Julien de Cledat
{"title":"The Development of an Efficient System to Monitor the Honeybee Colonies Depopulations","authors":"Philippe Cousin, Eliza Căuia, A. Siceanu, Julien de Cledat","doi":"10.1109/GIOTS.2019.8766435","DOIUrl":"https://doi.org/10.1109/GIOTS.2019.8766435","url":null,"abstract":"The world of honeybees (A. mellifera) are facing dramatic changes. Since the late 1990s, beekeepers around the world have observed mysterious and sudden disappearance of bees, and reported unusually high rates of decline in honeybee colonies. In the same time, the numerous studies show also a decline of other pollinators’ populations. The main causes seldom incriminated are climate change, pesticide use, habitat loss, parasites, but looking at real issues leading to honeybees’ populations reduction, but some french studies show that major problems are pesticides (52%), Asian hornet (Vespa velutina), other diseases and pests (i.e. Varroa destructor) (32%), weather (16%), thief (10%). Taking into account that honeybees are a very good environmental biosensor, the development of an advanced electronic system that assess the development of population status at any moment of the season is very important for environmental quality evaluation and for beekeeping management, to evaluate the risks and prevent depopulation phenomenon. Therefore, the present study aims to develop a unique connected advanced solution for beehives to give direct information to beekeepers on pesticide contamination suspicion, hornet attack detector, swarming signals and thief alarm. Two major features, as compared to market competitors, were developed on the new system: a device to count forager bees, therefore get many information about the entrance traffic of honeybees and an advanced sound analysis to detect hornet, but also other signals connected with specific physiological status of honeybee colonies.","PeriodicalId":149504,"journal":{"name":"2019 Global IoT Summit (GIoTS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126559917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Precision Crop Monitoring with Affordable IoT: Experiences with Okra 使用经济实惠的物联网进行精确作物监测:秋葵的经验
2019 Global IoT Summit (GIoTS) Pub Date : 2019-06-01 DOI: 10.1109/GIOTS.2019.8766417
Swagatam Bose Choudhury, Prachin Jain, Sujal Kallamkuth, Saranya Ramanath, Prakruti V. Bhatt, Sanat Sarangi, P. Srinivasu
{"title":"Precision Crop Monitoring with Affordable IoT: Experiences with Okra","authors":"Swagatam Bose Choudhury, Prachin Jain, Sujal Kallamkuth, Saranya Ramanath, Prakruti V. Bhatt, Sanat Sarangi, P. Srinivasu","doi":"10.1109/GIOTS.2019.8766417","DOIUrl":"https://doi.org/10.1109/GIOTS.2019.8766417","url":null,"abstract":"With the growing population and rapidly increasing demand for food production, delivering greater yields with finite and often small cultivable lands is a demanding ask from farmers. Precision crop monitoring with Internet of Things (IoT) has the potential to dramatically impact and digitally revolutionize the farming ecosystem. Especially keeping the needs of developing regions in view, we have developed a reliable and affordable IoT framework to cater to pressing needs of the farmer. A deployment based on the framework was used to monitor Okra during the Kharif (July–October) season of 2018–19. We present our experiences, learnings and results from the season which significantly enriched our decision support system while bringing over 10% improvement in yields.","PeriodicalId":149504,"journal":{"name":"2019 Global IoT Summit (GIoTS)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124610515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Decentralized Beacons: Attesting the Ground Truth of Blockchain State for Constrained IoT Devices 去中心化信标:为受限物联网设备证明区块链状态的基本真相
2019 Global IoT Summit (GIoTS) Pub Date : 2019-06-01 DOI: 10.1109/GIOTS.2019.8766432
Santeri Paavolainen, P. Nikander
{"title":"Decentralized Beacons: Attesting the Ground Truth of Blockchain State for Constrained IoT Devices","authors":"Santeri Paavolainen, P. Nikander","doi":"10.1109/GIOTS.2019.8766432","DOIUrl":"https://doi.org/10.1109/GIOTS.2019.8766432","url":null,"abstract":"Internet of Thing devices (IoT devices) are often constrained in terms of computing, memory, storage, power, and network resources. This makes them ill-suited to operate as first-class citizens on a blockchain, such as Ethereum, preventing the IoT devices from attaining the security guarantees that are available to better resourced nodes that are able to operate as full, validating nodes on the blockchain. IoT devices may use so-called light protocols to interact with the blockchain with minimal resource requirements, but these protocols provide only probabilistic security guarantees. In this position paper, we propose a new mechanism where an operator of IoT devices is able to send a “ground truth state” to the devices via a new mechanism, which we call “decentralized beacons”, enabling them to gain full security guarantees of the blockchain state.","PeriodicalId":149504,"journal":{"name":"2019 Global IoT Summit (GIoTS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131142212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Runtime and Routing Security Policy Verification for Enhanced Quality of Service of IoT Networks 面向提升物联网网络服务质量的运行时和路由安全策略验证
2019 Global IoT Summit (GIoTS) Pub Date : 2019-06-01 DOI: 10.1109/GIOTS.2019.8766404
K. Papachristou, Traianos-Ioannis Theodorou, Stavros Papadopoulos, Aikaterini Protogerou, A. Drosou, D. Tzovaras
{"title":"Runtime and Routing Security Policy Verification for Enhanced Quality of Service of IoT Networks","authors":"K. Papachristou, Traianos-Ioannis Theodorou, Stavros Papadopoulos, Aikaterini Protogerou, A. Drosou, D. Tzovaras","doi":"10.1109/GIOTS.2019.8766404","DOIUrl":"https://doi.org/10.1109/GIOTS.2019.8766404","url":null,"abstract":"The Internet of Things (IoT) is growing rapidly controlling and connecting thousands of devices every day. The increased number of interconnected devices increase the network traffic leading to energy and Quality of Service efficiency problems of the IoT network. Therefore, IoT platforms and networks are susceptible to failures and attacks that have significant economic and security consequences. In this regard, implementing effective secure IoT platforms and networks are valuable for both the industry and society. In this paper, we propose two frameworks that aim to verify a number of security policies related to runtime information of the network and dynamic flow routing paths, respectively. The underlying rationale is to allow the operator of an IoT network in order to have an overall control of the network and to define different policies based on the demands of the network and the use cases (e.g., achieving more secure or faster network).","PeriodicalId":149504,"journal":{"name":"2019 Global IoT Summit (GIoTS)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116593622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Vehicle-Approach Alert System Based on the Neighbor Discovery Protocol for Pedestrian Safety 基于邻居发现协议的行人安全车辆接近报警系统
2019 Global IoT Summit (GIoTS) Pub Date : 2019-06-01 DOI: 10.1109/GIOTS.2019.8766405
Yoshito Watanabe, Y. Shoji
{"title":"A Vehicle-Approach Alert System Based on the Neighbor Discovery Protocol for Pedestrian Safety","authors":"Yoshito Watanabe, Y. Shoji","doi":"10.1109/GIOTS.2019.8766405","DOIUrl":"https://doi.org/10.1109/GIOTS.2019.8766405","url":null,"abstract":"This paper proposes a system that alerts a pedestrian about an approaching vehicle to be cautioned based on the neighbor discovery protocol, in which the pedestrian’s device repeatedly broadcasts a specific beacon, called the advertising beacon, triggered by a pedestrian’s action and the moving vehicle in the vicinity sends the response beacon when it receives the advertising beacon. The pedestrian’s device emits an alert, e.g., with sound, as a consequence of receiving the response beacon. The feasibility of the proposed system is demonstrated by a field experiment with the prototype device using IEEE 802.15.4g as the communication standard of the physical layer for the beacon packet. In addition, the current consumption of the prototype pedestrian’s device is measured, and the proposed system is compared to two other types of methods from the viewpoint of the device battery life. The results show that the neighbor discovery protocol contributes to prolonging the battery life of the pedestrian’s device since the receiver can open the receiver window only while it waits for the response beacon, compared to the full-listening method, in which the pedestrian’s device must open the receiver window all the time.","PeriodicalId":149504,"journal":{"name":"2019 Global IoT Summit (GIoTS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116466852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Asset Authentication Scheme for Cyber Physical Systems 一种新的网络物理系统资产认证方案
2019 Global IoT Summit (GIoTS) Pub Date : 2019-06-01 DOI: 10.1109/GIOTS.2019.8766413
Satyanarayana Vuppala, A. Mady, Deepak Mehta
{"title":"A Novel Asset Authentication Scheme for Cyber Physical Systems","authors":"Satyanarayana Vuppala, A. Mady, Deepak Mehta","doi":"10.1109/GIOTS.2019.8766413","DOIUrl":"https://doi.org/10.1109/GIOTS.2019.8766413","url":null,"abstract":"Cyber physical assets are being widely deployed. An asset could be a device or object in Cyber physical system (CPS). Many of them are subjected to compromise due to insecure implementations and configuration. Existing authentication techniques are not effective in detecting compromised assets given the massive scale of deployment. In this paper, we present a system for detecting compromised CPS assets effectively. In contrast to prior work, we propose an asset authentication framework that uses device-specific and network information with weight vectors, called slanted fingerprints, to validate assets. In particular, we perform asset fingerprinting with environmental effects to detect the cyber-physical emulation attacks on authentication. The framework tracks the effect of changes in the physical environment on fingerprints and uses unique CPS environmental effects features to detect both cyber-physical emulation and advanced stealthy attacks.","PeriodicalId":149504,"journal":{"name":"2019 Global IoT Summit (GIoTS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128732456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信