{"title":"Towards a Threat Model and Security Analysis for Contact Tracing Applications","authors":"Raiful Hasan, Mohammad Aminul Hoque, Ragib Hasan","doi":"10.1109/WF-IoT54382.2022.10152080","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152080","url":null,"abstract":"Pandemics have caused millions of infections and hundreds of thousands of deaths in recent years. To combat the spread of infection, researchers have explored contact tracing via smartphones. In contact tracing, the smartphones of the users exchange information with nearby smartphones via Bluetooth. If it is needed to explore the list of people someone has come into contact with, the contact tracing logs can be used to identify such people. However, such contact tracing apps have many security and privacy concerns. In this paper, we discuss the security and privacy issues of Contract Tracing Applications and analyze the threat model of such applications using the STRIDE model. We also use the model to assess the vulnerabilities in eight actual contact tracing apps from different regions.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124396268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing LwM2M for Operational Cybersecurity and Situational Awareness in Industrial IoT","authors":"Hanning Zhao, B. Silverajan","doi":"10.1109/WF-IoT54382.2022.10152151","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152151","url":null,"abstract":"IoT devices and IT systems have increasingly become integrated into industrial, manufacturing and operational networks, to give rise to the Industrial IoT. However, operational device cybersecurity management, in industrial environments, is very challenging. Some of these challenges are the need for high availability, low downtimes, and especially, co-ordination of cybersecurity incident information among different stakeholders. However existing IoT device management solutions do not address these needs. Our paper presents a solution to meet these challenges in the Industrial IoT, with enhancements of the well-known Lightweight M2M device management standard. The approach is aligned towards well-known networking and IoT standards as well as industrial scenarios in existence today. The results have been evaluated and validated with prototypes demonstrating the effectiveness of our approach for operational cybersecurity management as well as incident exchange in multi-stakeholder environments.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"523 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123072676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Timely Anomalous Behavior Detection in Fog-IoT Systems using Unsupervised Federated Learning","authors":"Franklin Magalhães Ribeiro Junior, C. Kamienski","doi":"10.1109/WF-IoT54382.2022.10152055","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152055","url":null,"abstract":"In an Internet of Things (IoT) system, fog computing can analyze data faster than the cloud because it is closer to the sensors. However, fog nodes can suffer attacks and vulnerabilities, needing to monitor their abnormal behaviors. Machine learning (ML) enables the fog to identify its behaviors, but processing ML can delay its time-sensitive tasks. Federated learning (FL) can provide a fog-based IoT system to learn every fog node behavior faster and accurately. Therefore, we propose an unsupervised FL system to detect fog anomalies, and we simulate different performance behaviors for two fog nodes (A and B) during seven rounds of 4-minutes each. When a round starts, the fog nodes perform k-means and send local centroids to the cloud, which merges them into global new centroids sending them back to the fog. We evaluate the time that Fog B needs to predict a behavior already identified by Fog A correctly and verify that it amounts to 30 milliseconds using our system. In contrast, a non-federated approach must wait for the current round to end, which can take minutes.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126084219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Moratelli, R. Tiburski, S. J. Filho, Emanuel Moura, Everton de Matos, Fabiano Hessel
{"title":"MIPS and RISC-V: Evaluating Virtualization Trade-off for Edge Devices","authors":"C. Moratelli, R. Tiburski, S. J. Filho, Emanuel Moura, Everton de Matos, Fabiano Hessel","doi":"10.1109/WF-IoT54382.2022.10152084","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152084","url":null,"abstract":"In the run to improve security on Edge Devices, separation by software appears as a well-known technique that can be achieved by different means. In this work, we consider virtualization as a solution for separation. A virtualization layer has an intrinsic relationship with the underline hardware, where the processor's architecture plays an essential role in the achieved security and software complexity. In this way, we discuss the architectural differences between MIPS and RISC- V processor families regarding virtualization support, showing how the archi-tectural differences may affect a hypervisor's implementation in terms of performance and security. Finally, we expect that this study clarifies the existing trade-offs for virtualization and helps choose the hardware and software stacks for edge devices.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123267189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Brzozowski, Peter Langendoerfer, A. Casaca, A. Grilo, Manuel Díaz, Cristian Martín, Jose Camacho, G. Landi
{"title":"UNITE: Integrated IoT-Edge-Cloud Continuum","authors":"M. Brzozowski, Peter Langendoerfer, A. Casaca, A. Grilo, Manuel Díaz, Cristian Martín, Jose Camacho, G. Landi","doi":"10.1109/WF-IoT54382.2022.10152292","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152292","url":null,"abstract":"Although current edge and cloud systems offer amazing services that we could not even dream of a few years ago, end users cannot really benefit from them due to their high complexity: there are so many heterogeneous devices, protocols and development frameworks across the IoT-edge-cloud continuum. This complexity also prevents solving performance problems (such as server congestion or network congestion), as the main ideas only focus on a small part of the problem, e.g. how to solve a network problem without considering computing resources. This paper introduces the UNITE framework: a set of virtualization layers (computing, networking, and storage) that integrate a complete IoT-edge-cloud architecture and provides a simple interface for end users. UNITE also addresses performance issues by finding holistic solutions that look at the architecture as a whole. In addition, our framework also predicts emerging problems and proactively addresses them in advance before they occur.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116124502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Proposal for Standardization of Internet of Musical Things (IoMusT) Environments","authors":"Rômulo Vieira, F. Schiavoni, D. Muchaluat-Saade","doi":"10.1109/WF-IoT54382.2022.10152123","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152123","url":null,"abstract":"The Internet of Musical Things is an interdisciplinary area of knowledge that aims to improve the relationship between musicians, as well as between musicians and audience members, favoring concerts, studio productions, and music learning. Although emerging, this field already faces some challenges, such as lack of privacy and security, and mainly, lack of standardization and interoperability between its devices. Therefore, the present paper presents an environment design, called Sunflower, highlighting its architecture, protocols, and sound features that can contribute to solving the most recurrent problems in this area.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"336 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114401190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thanh Trung Nguyen, Minh Hai Vu, Phi-Le Nguyen, Phan-Thuan Do, Kien Nguyen
{"title":"A Reinforcement Learning-based Multipath Scheduling for Heterogeneous Wireless Networks","authors":"Thanh Trung Nguyen, Minh Hai Vu, Phi-Le Nguyen, Phan-Thuan Do, Kien Nguyen","doi":"10.1109/WF-IoT54382.2022.10152217","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152217","url":null,"abstract":"With the development and commercialization of new mobile network generations such as 5G and beyond, future communications are shifting from the traditional single-path paradigm to multipath transport protocols such as MPTCP and MPQUIC. One of the most critical issues in dealing with the multipath transmission is appropriately scheduling the pathways in order to guarantee QoS. Despite the fact that tremendous effort has been put into developing multipath scheduling algorithms, existing approaches suffer from several limitations when dealing with the network's dynamicity, including congestion and packet loss. In this paper, we propose a novel Reinforcement learning-based multipath transport protocol named SATO, which efficiently schedules multipath communication in heterogeneous wireless networks. By leveraging the self-learning ability of reinforcement learning, a node equipped with SATO can capture the environmental changes and select transmission paths based on an appropriate policy to optimize QoS. Our evaluation results show that SATO improves the QoS by 10%-15% in simulation and 12% in a real deployment compared to the state-of-the-art algorithm.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122122516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantifying the Trade-off Between Latency and Power Consumption in Bluetooth Low Energy and Its Mitigation by Using a Wake-Up Receiver","authors":"Maryam Dodangeh, M. S. O. Alink, B. Nauta","doi":"10.1109/WF-IoT54382.2022.10152115","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152115","url":null,"abstract":"Bluetooth Low Energy (BLE) is one of the primary wireless communication protocols for Internet of Things (IoT) devices due to its inherently low energy consumption. BLE's duty-cycled scheme reduces energy consumption, but at the cost of latency. Wake-Up Receivers (WuRXs) have been proposed to mitigate this trade-off, but most attention seems to have been paid to the circuit design rather than assessing exactly how beneficial a WuRX could be. In this paper, we analyze the power consumption and latency impact of a $boldsymbol{200mu text{W WuRX}}$ added to a state-of-the-art commercial BLE transceiver for relevant IoT scenarios. The results show that the latency/power trade-off can be significantly relaxed for both peripheral and central devices in initiating a connection. Furthermore, if the role of central and peripherals can be changed (peripherals scan instead of advertise), the power consumption of the most energy-constrained devices can be further reduced in scenarios that require less than 200ms latency to initiate a connection. Also, for a maximum latency of 4s, a duty-cycled WuRX enables equal $boldsymbol{60}mu mathbf{W}$ average power consumption for both the central and peripheral devices. This is extremely useful when both ends of the link face similar battery constraints, as would be the case in many IoT scenarios.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117282792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aditya Singh, Rahul Rustagi, Surender Redhu, R. Hegde
{"title":"Mobile Energy Transmitter Scheduling in Energy Harvesting IoT Networks using Deep Reinforcement Learning","authors":"Aditya Singh, Rahul Rustagi, Surender Redhu, R. Hegde","doi":"10.1109/WF-IoT54382.2022.10152078","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152078","url":null,"abstract":"Maintaining adequate energy in low-powered Internet of Things (IoT) nodes is crucial for the development of several applications like smart homes, autonomous industries, etc. These IoT nodes exploit adaptive duty cycling techniques for the efficient utilization of energy resources. However, such adaptive duty cycling of IoT nodes results in their asynchronous operations thereby inducing energy holes in the network. These energy holes lead to information loss and poor quality of services of IoT networks. In this regard, energy harvesting using Mobile Energy Transmitters (MET) can improve the lifetime of an IoT network. In this work, we are introducing a metric named Age of Charging (AoC) metric to quantify the repetitive charging of power deficit IoT nodes. Energy-efficient scheduling of MET is proposed to minimize the expected average AoC such that the energy harvested by IoT nodes is maximized. In this regard, the optimization problem is first remodeled into a Markov decision process. Subsequently, a deep reinforcement learning algorithm is developed based upon the twin delayed deep deterministic policy gradient scheme for energy-efficient scheduling of MET in asynchronous IoT networks. The simulation results indicate that the proposed algorithm outperforms the conventional Deep Q-networks and soft-actor-critic algorithms. These results motivate the usage of MET-aided energy harvesting in self-sustaining IoT networks.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128742549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decentralized Identifier and Access Control Based Architecture for Privacy-Sensitive Data Distribution Service","authors":"Reiya Oku, K. Shiomoto, Y. Ohba","doi":"10.1109/WF-IoT54382.2022.10152128","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152128","url":null,"abstract":"In today's world, users' privacy-sensitive information is collected and managed by organizations and businesses. However, users do not have the option to choose the information that can be shared, nor can they track the sharing process. To address this limitation, we propose a privacy-sensitive information protection and management architecture that incorporates two emerging technologies: (1) Self-Sovereign Decentralized Identifier (DID), and (2) a policy description language to implement an automated access policy control. The proposed architecture defines a schema for privacy-sensitive information and leverages a policy description language to describe policies for handling the privacy-sensitive information to implement automated distribution of information. Users can prove the authenticity of their personal information without the need for centralized control, such as a public key infrastructure. The transaction records of accessing privacy-sensitive information can be tracked while keeping anonymization; no one can identify the real entity of the transacting party. We implemented a prototype system using Hyperledger Aries, Indy, and Sawtooth Projects for the DID management mechanisms, and Open Policy Agent for an automated access policy control.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123813968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}