2019 Global IoT Summit (GIoTS)最新文献

筛选
英文 中文
Accelerating Industrial IoT Application Deployment through Reusable AI Components 通过可重用AI组件加速工业物联网应用部署
2019 Global IoT Summit (GIoTS) Pub Date : 2019-06-01 DOI: 10.1109/GIOTS.2019.8766398
S. S. Arumugam, R. Badrinath, Aitor Hernandez Herranz, J. Höller, Carlos R. B. Azevedo, Bin Xiao, Valentin Tudor
{"title":"Accelerating Industrial IoT Application Deployment through Reusable AI Components","authors":"S. S. Arumugam, R. Badrinath, Aitor Hernandez Herranz, J. Höller, Carlos R. B. Azevedo, Bin Xiao, Valentin Tudor","doi":"10.1109/GIOTS.2019.8766398","DOIUrl":"https://doi.org/10.1109/GIOTS.2019.8766398","url":null,"abstract":"The Internet of Things (IoT) is penetrating almost all sectors of the global economy, addressing a wide range of opportunities by applying different Artificial Intelligence (AI) tools to IoT data. Due to the diversity in challenges and applications, IoT solutions are often bespoke and highly domain specific. With the surge of IoT applications, this approach to solutions becomes very costly and time consuming if there is a lack of reusability and replicability across different IoT sectors. This work presents a step towards reusability of IoT solution components applied to Industrial IoT (IIoT). We start from the challenging position of two unique AI-driven applications stemming from two separate IIoT verticals - applications which may be realized using the same components. We identify a set of application independent reusable AI-centric components and show how they can be orchestrated into the unique IoT applications. Our approach shortens the time to market and reduces costs for developing IIoT solutions, and opens a path towards reusability and replicability of IIoT components, thus accelerating the IoT market uptake.","PeriodicalId":149504,"journal":{"name":"2019 Global IoT Summit (GIoTS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128541071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Runtime and Routing Security Policy Verification for Enhanced Quality of Service of IoT Networks 面向提升物联网网络服务质量的运行时和路由安全策略验证
2019 Global IoT Summit (GIoTS) Pub Date : 2019-06-01 DOI: 10.1109/GIOTS.2019.8766404
K. Papachristou, Traianos-Ioannis Theodorou, Stavros Papadopoulos, Aikaterini Protogerou, A. Drosou, D. Tzovaras
{"title":"Runtime and Routing Security Policy Verification for Enhanced Quality of Service of IoT Networks","authors":"K. Papachristou, Traianos-Ioannis Theodorou, Stavros Papadopoulos, Aikaterini Protogerou, A. Drosou, D. Tzovaras","doi":"10.1109/GIOTS.2019.8766404","DOIUrl":"https://doi.org/10.1109/GIOTS.2019.8766404","url":null,"abstract":"The Internet of Things (IoT) is growing rapidly controlling and connecting thousands of devices every day. The increased number of interconnected devices increase the network traffic leading to energy and Quality of Service efficiency problems of the IoT network. Therefore, IoT platforms and networks are susceptible to failures and attacks that have significant economic and security consequences. In this regard, implementing effective secure IoT platforms and networks are valuable for both the industry and society. In this paper, we propose two frameworks that aim to verify a number of security policies related to runtime information of the network and dynamic flow routing paths, respectively. The underlying rationale is to allow the operator of an IoT network in order to have an overall control of the network and to define different policies based on the demands of the network and the use cases (e.g., achieving more secure or faster network).","PeriodicalId":149504,"journal":{"name":"2019 Global IoT Summit (GIoTS)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116593622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Vehicle-Approach Alert System Based on the Neighbor Discovery Protocol for Pedestrian Safety 基于邻居发现协议的行人安全车辆接近报警系统
2019 Global IoT Summit (GIoTS) Pub Date : 2019-06-01 DOI: 10.1109/GIOTS.2019.8766405
Yoshito Watanabe, Y. Shoji
{"title":"A Vehicle-Approach Alert System Based on the Neighbor Discovery Protocol for Pedestrian Safety","authors":"Yoshito Watanabe, Y. Shoji","doi":"10.1109/GIOTS.2019.8766405","DOIUrl":"https://doi.org/10.1109/GIOTS.2019.8766405","url":null,"abstract":"This paper proposes a system that alerts a pedestrian about an approaching vehicle to be cautioned based on the neighbor discovery protocol, in which the pedestrian’s device repeatedly broadcasts a specific beacon, called the advertising beacon, triggered by a pedestrian’s action and the moving vehicle in the vicinity sends the response beacon when it receives the advertising beacon. The pedestrian’s device emits an alert, e.g., with sound, as a consequence of receiving the response beacon. The feasibility of the proposed system is demonstrated by a field experiment with the prototype device using IEEE 802.15.4g as the communication standard of the physical layer for the beacon packet. In addition, the current consumption of the prototype pedestrian’s device is measured, and the proposed system is compared to two other types of methods from the viewpoint of the device battery life. The results show that the neighbor discovery protocol contributes to prolonging the battery life of the pedestrian’s device since the receiver can open the receiver window only while it waits for the response beacon, compared to the full-listening method, in which the pedestrian’s device must open the receiver window all the time.","PeriodicalId":149504,"journal":{"name":"2019 Global IoT Summit (GIoTS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116466852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Asset Authentication Scheme for Cyber Physical Systems 一种新的网络物理系统资产认证方案
2019 Global IoT Summit (GIoTS) Pub Date : 2019-06-01 DOI: 10.1109/GIOTS.2019.8766413
Satyanarayana Vuppala, A. Mady, Deepak Mehta
{"title":"A Novel Asset Authentication Scheme for Cyber Physical Systems","authors":"Satyanarayana Vuppala, A. Mady, Deepak Mehta","doi":"10.1109/GIOTS.2019.8766413","DOIUrl":"https://doi.org/10.1109/GIOTS.2019.8766413","url":null,"abstract":"Cyber physical assets are being widely deployed. An asset could be a device or object in Cyber physical system (CPS). Many of them are subjected to compromise due to insecure implementations and configuration. Existing authentication techniques are not effective in detecting compromised assets given the massive scale of deployment. In this paper, we present a system for detecting compromised CPS assets effectively. In contrast to prior work, we propose an asset authentication framework that uses device-specific and network information with weight vectors, called slanted fingerprints, to validate assets. In particular, we perform asset fingerprinting with environmental effects to detect the cyber-physical emulation attacks on authentication. The framework tracks the effect of changes in the physical environment on fingerprints and uses unique CPS environmental effects features to detect both cyber-physical emulation and advanced stealthy attacks.","PeriodicalId":149504,"journal":{"name":"2019 Global IoT Summit (GIoTS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128732456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cognitive Packet Networks for the Secure Internet of Things 面向安全物联网的认知分组网络
2019 Global IoT Summit (GIoTS) Pub Date : 2018-08-14 DOI: 10.1109/GIOTS.2019.8766380
M. Nowak, S. Nowak, J. Domańska, T. Czachórski
{"title":"Cognitive Packet Networks for the Secure Internet of Things","authors":"M. Nowak, S. Nowak, J. Domańska, T. Czachórski","doi":"10.1109/GIOTS.2019.8766380","DOIUrl":"https://doi.org/10.1109/GIOTS.2019.8766380","url":null,"abstract":"The concept of Security Aware Routing is not widely adopted in current networks. However, the new IoT-centric core networks give possibilities to re-open that field of research. We consider routing to be an addition to existing network security methods, especially in IoT domain. Security-aware routing incorporates the security and safety metrics to the traditional set of metrics (bandwidth, network delay, hop count, path cost, load etc.). The paper shows a new approach in which, based on the Software Defined Networks (SDN) we estimate trust relationships between nodes and flows and use them to create SDN paths, based on the Cognitive Packet Network (CPN) principle. The Random Neural Networks (RNN) supported with cognitive packets are used for making routing decisions. The proposed solution was designed and is being implemented within the SerIoT project to demonstrate secure networks for the Internet of Things (IoT).","PeriodicalId":149504,"journal":{"name":"2019 Global IoT Summit (GIoTS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132432298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of the variables that affect the intention to adopt Precision Agriculture for smart water management in Agriculture 4.0 context 分析在农业4.0背景下影响采用精准农业进行智能水管理的变量
2019 Global IoT Summit (GIoTS) Pub Date : 1900-01-01 DOI: 10.1109/GIOTS.2019.8766384
S. Monteleone, Edmilson Alves de Moraes, R. Maia
{"title":"Analysis of the variables that affect the intention to adopt Precision Agriculture for smart water management in Agriculture 4.0 context","authors":"S. Monteleone, Edmilson Alves de Moraes, R. Maia","doi":"10.1109/GIOTS.2019.8766384","DOIUrl":"https://doi.org/10.1109/GIOTS.2019.8766384","url":null,"abstract":"This work, developed within SWAMP project, presents a conceptual model to analyze the variables that affect the adoption of Precision Agriculture technologies for smart water management in the context of Agriculture 4.0. Through the literature review a conceptual model is proposed that, based on the Internet of Things, Theory of Planned Behavior and Agriculture 4.0, allows predicting and explaining the studied behavior. The model allows analyzing the impact of several actions that can be implemented by the different actors operating in the farm ecosystem. From this model it is possible to define a data model that relates the measures associated to each identified variable, with focus on operations planning and irrigation scheduling. The proposed models show that IoT and Industry 4.0 methods can bring great improvements in planning, control and optimization of agricultural operations and smart water management","PeriodicalId":149504,"journal":{"name":"2019 Global IoT Summit (GIoTS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133794290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Benchmarking IoT Context Management Platforms: High-level Queries Matter 对标物联网上下文管理平台:高级查询很重要
2019 Global IoT Summit (GIoTS) Pub Date : 1900-01-01 DOI: 10.1109/GIOTS.2019.8766395
A. Medvedev, A. Hassani, A. Zaslavsky, P. D. Haghighi, Sea Ling, P. Jayaraman
{"title":"Benchmarking IoT Context Management Platforms: High-level Queries Matter","authors":"A. Medvedev, A. Hassani, A. Zaslavsky, P. D. Haghighi, Sea Ling, P. Jayaraman","doi":"10.1109/GIOTS.2019.8766395","DOIUrl":"https://doi.org/10.1109/GIOTS.2019.8766395","url":null,"abstract":"While IoT hardware and application silos achieved significant progress in recent years, the realization of full IoT potential is still limited by the lack of successful middleware platforms for horizontal IoT context sharing and integration, as well as by the lack of common standards on context access interfaces and APIs. In this paper, we propose and discuss the benefits of high-level context query languages over basic languages from performance and expressive power points of view. We argue why existing approaches to benchmarking of IoT middleware are not sufficient for emerging Context Management Platforms (CMP). We propose our benchmarking and reporting framework, which is based on queries’ richness as one of the main variables as well as the notation for a compact description of that variable, which can be used both as an input for the load generation and the final benchmarking report. We demonstrate and validate our proposals using Context Definition and Query Language (CDQL), which has been developed for the Context-as-a-Service (CoaaS) IoT platform as part of the EU Horizon-2020 project bIoTope.","PeriodicalId":149504,"journal":{"name":"2019 Global IoT Summit (GIoTS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115795163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信