2022 IEEE 8th World Forum on Internet of Things (WF-IoT)最新文献

筛选
英文 中文
Towards a Threat Model and Security Analysis for Contact Tracing Applications 接触追踪应用的威胁模型与安全性分析
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) Pub Date : 2022-10-26 DOI: 10.1109/WF-IoT54382.2022.10152080
Raiful Hasan, Mohammad Aminul Hoque, Ragib Hasan
{"title":"Towards a Threat Model and Security Analysis for Contact Tracing Applications","authors":"Raiful Hasan, Mohammad Aminul Hoque, Ragib Hasan","doi":"10.1109/WF-IoT54382.2022.10152080","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152080","url":null,"abstract":"Pandemics have caused millions of infections and hundreds of thousands of deaths in recent years. To combat the spread of infection, researchers have explored contact tracing via smartphones. In contact tracing, the smartphones of the users exchange information with nearby smartphones via Bluetooth. If it is needed to explore the list of people someone has come into contact with, the contact tracing logs can be used to identify such people. However, such contact tracing apps have many security and privacy concerns. In this paper, we discuss the security and privacy issues of Contract Tracing Applications and analyze the threat model of such applications using the STRIDE model. We also use the model to assess the vulnerabilities in eight actual contact tracing apps from different regions.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124396268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing LwM2M for Operational Cybersecurity and Situational Awareness in Industrial IoT 增强LwM2M在工业物联网中的运营网络安全和态势感知
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) Pub Date : 2022-10-26 DOI: 10.1109/WF-IoT54382.2022.10152151
Hanning Zhao, B. Silverajan
{"title":"Enhancing LwM2M for Operational Cybersecurity and Situational Awareness in Industrial IoT","authors":"Hanning Zhao, B. Silverajan","doi":"10.1109/WF-IoT54382.2022.10152151","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152151","url":null,"abstract":"IoT devices and IT systems have increasingly become integrated into industrial, manufacturing and operational networks, to give rise to the Industrial IoT. However, operational device cybersecurity management, in industrial environments, is very challenging. Some of these challenges are the need for high availability, low downtimes, and especially, co-ordination of cybersecurity incident information among different stakeholders. However existing IoT device management solutions do not address these needs. Our paper presents a solution to meet these challenges in the Industrial IoT, with enhancements of the well-known Lightweight M2M device management standard. The approach is aligned towards well-known networking and IoT standards as well as industrial scenarios in existence today. The results have been evaluated and validated with prototypes demonstrating the effectiveness of our approach for operational cybersecurity management as well as incident exchange in multi-stakeholder environments.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"523 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123072676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Timely Anomalous Behavior Detection in Fog-IoT Systems using Unsupervised Federated Learning 使用无监督联邦学习的Fog-IoT系统中的及时异常行为检测
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) Pub Date : 2022-10-26 DOI: 10.1109/WF-IoT54382.2022.10152055
Franklin Magalhães Ribeiro Junior, C. Kamienski
{"title":"Timely Anomalous Behavior Detection in Fog-IoT Systems using Unsupervised Federated Learning","authors":"Franklin Magalhães Ribeiro Junior, C. Kamienski","doi":"10.1109/WF-IoT54382.2022.10152055","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152055","url":null,"abstract":"In an Internet of Things (IoT) system, fog computing can analyze data faster than the cloud because it is closer to the sensors. However, fog nodes can suffer attacks and vulnerabilities, needing to monitor their abnormal behaviors. Machine learning (ML) enables the fog to identify its behaviors, but processing ML can delay its time-sensitive tasks. Federated learning (FL) can provide a fog-based IoT system to learn every fog node behavior faster and accurately. Therefore, we propose an unsupervised FL system to detect fog anomalies, and we simulate different performance behaviors for two fog nodes (A and B) during seven rounds of 4-minutes each. When a round starts, the fog nodes perform k-means and send local centroids to the cloud, which merges them into global new centroids sending them back to the fog. We evaluate the time that Fog B needs to predict a behavior already identified by Fog A correctly and verify that it amounts to 30 milliseconds using our system. In contrast, a non-federated approach must wait for the current round to end, which can take minutes.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126084219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MIPS and RISC-V: Evaluating Virtualization Trade-off for Edge Devices MIPS和RISC-V:评估边缘设备的虚拟化权衡
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) Pub Date : 2022-10-26 DOI: 10.1109/WF-IoT54382.2022.10152084
C. Moratelli, R. Tiburski, S. J. Filho, Emanuel Moura, Everton de Matos, Fabiano Hessel
{"title":"MIPS and RISC-V: Evaluating Virtualization Trade-off for Edge Devices","authors":"C. Moratelli, R. Tiburski, S. J. Filho, Emanuel Moura, Everton de Matos, Fabiano Hessel","doi":"10.1109/WF-IoT54382.2022.10152084","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152084","url":null,"abstract":"In the run to improve security on Edge Devices, separation by software appears as a well-known technique that can be achieved by different means. In this work, we consider virtualization as a solution for separation. A virtualization layer has an intrinsic relationship with the underline hardware, where the processor's architecture plays an essential role in the achieved security and software complexity. In this way, we discuss the architectural differences between MIPS and RISC- V processor families regarding virtualization support, showing how the archi-tectural differences may affect a hypervisor's implementation in terms of performance and security. Finally, we expect that this study clarifies the existing trade-offs for virtualization and helps choose the hardware and software stacks for edge devices.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123267189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UNITE: Integrated IoT-Edge-Cloud Continuum UNITE:集成物联网边缘云连续体
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) Pub Date : 2022-10-26 DOI: 10.1109/WF-IoT54382.2022.10152292
M. Brzozowski, Peter Langendoerfer, A. Casaca, A. Grilo, Manuel Díaz, Cristian Martín, Jose Camacho, G. Landi
{"title":"UNITE: Integrated IoT-Edge-Cloud Continuum","authors":"M. Brzozowski, Peter Langendoerfer, A. Casaca, A. Grilo, Manuel Díaz, Cristian Martín, Jose Camacho, G. Landi","doi":"10.1109/WF-IoT54382.2022.10152292","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152292","url":null,"abstract":"Although current edge and cloud systems offer amazing services that we could not even dream of a few years ago, end users cannot really benefit from them due to their high complexity: there are so many heterogeneous devices, protocols and development frameworks across the IoT-edge-cloud continuum. This complexity also prevents solving performance problems (such as server congestion or network congestion), as the main ideas only focus on a small part of the problem, e.g. how to solve a network problem without considering computing resources. This paper introduces the UNITE framework: a set of virtualization layers (computing, networking, and storage) that integrate a complete IoT-edge-cloud architecture and provides a simple interface for end users. UNITE also addresses performance issues by finding holistic solutions that look at the architecture as a whole. In addition, our framework also predicts emerging problems and proactively addresses them in advance before they occur.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116124502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Proposal for Standardization of Internet of Musical Things (IoMusT) Environments 音乐物联网环境标准化的建议
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) Pub Date : 2022-10-26 DOI: 10.1109/WF-IoT54382.2022.10152123
Rômulo Vieira, F. Schiavoni, D. Muchaluat-Saade
{"title":"A Proposal for Standardization of Internet of Musical Things (IoMusT) Environments","authors":"Rômulo Vieira, F. Schiavoni, D. Muchaluat-Saade","doi":"10.1109/WF-IoT54382.2022.10152123","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152123","url":null,"abstract":"The Internet of Musical Things is an interdisciplinary area of knowledge that aims to improve the relationship between musicians, as well as between musicians and audience members, favoring concerts, studio productions, and music learning. Although emerging, this field already faces some challenges, such as lack of privacy and security, and mainly, lack of standardization and interoperability between its devices. Therefore, the present paper presents an environment design, called Sunflower, highlighting its architecture, protocols, and sound features that can contribute to solving the most recurrent problems in this area.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"336 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114401190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Reinforcement Learning-based Multipath Scheduling for Heterogeneous Wireless Networks 基于强化学习的异构无线网络多路径调度
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) Pub Date : 2022-10-26 DOI: 10.1109/WF-IoT54382.2022.10152217
Thanh Trung Nguyen, Minh Hai Vu, Phi-Le Nguyen, Phan-Thuan Do, Kien Nguyen
{"title":"A Reinforcement Learning-based Multipath Scheduling for Heterogeneous Wireless Networks","authors":"Thanh Trung Nguyen, Minh Hai Vu, Phi-Le Nguyen, Phan-Thuan Do, Kien Nguyen","doi":"10.1109/WF-IoT54382.2022.10152217","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152217","url":null,"abstract":"With the development and commercialization of new mobile network generations such as 5G and beyond, future communications are shifting from the traditional single-path paradigm to multipath transport protocols such as MPTCP and MPQUIC. One of the most critical issues in dealing with the multipath transmission is appropriately scheduling the pathways in order to guarantee QoS. Despite the fact that tremendous effort has been put into developing multipath scheduling algorithms, existing approaches suffer from several limitations when dealing with the network's dynamicity, including congestion and packet loss. In this paper, we propose a novel Reinforcement learning-based multipath transport protocol named SATO, which efficiently schedules multipath communication in heterogeneous wireless networks. By leveraging the self-learning ability of reinforcement learning, a node equipped with SATO can capture the environmental changes and select transmission paths based on an appropriate policy to optimize QoS. Our evaluation results show that SATO improves the QoS by 10%-15% in simulation and 12% in a real deployment compared to the state-of-the-art algorithm.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122122516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantifying the Trade-off Between Latency and Power Consumption in Bluetooth Low Energy and Its Mitigation by Using a Wake-Up Receiver 使用唤醒接收器量化低功耗蓝牙延迟与功耗之间的权衡
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) Pub Date : 2022-10-26 DOI: 10.1109/WF-IoT54382.2022.10152115
Maryam Dodangeh, M. S. O. Alink, B. Nauta
{"title":"Quantifying the Trade-off Between Latency and Power Consumption in Bluetooth Low Energy and Its Mitigation by Using a Wake-Up Receiver","authors":"Maryam Dodangeh, M. S. O. Alink, B. Nauta","doi":"10.1109/WF-IoT54382.2022.10152115","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152115","url":null,"abstract":"Bluetooth Low Energy (BLE) is one of the primary wireless communication protocols for Internet of Things (IoT) devices due to its inherently low energy consumption. BLE's duty-cycled scheme reduces energy consumption, but at the cost of latency. Wake-Up Receivers (WuRXs) have been proposed to mitigate this trade-off, but most attention seems to have been paid to the circuit design rather than assessing exactly how beneficial a WuRX could be. In this paper, we analyze the power consumption and latency impact of a $boldsymbol{200mu text{W WuRX}}$ added to a state-of-the-art commercial BLE transceiver for relevant IoT scenarios. The results show that the latency/power trade-off can be significantly relaxed for both peripheral and central devices in initiating a connection. Furthermore, if the role of central and peripherals can be changed (peripherals scan instead of advertise), the power consumption of the most energy-constrained devices can be further reduced in scenarios that require less than 200ms latency to initiate a connection. Also, for a maximum latency of 4s, a duty-cycled WuRX enables equal $boldsymbol{60}mu mathbf{W}$ average power consumption for both the central and peripheral devices. This is extremely useful when both ends of the link face similar battery constraints, as would be the case in many IoT scenarios.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117282792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Energy Transmitter Scheduling in Energy Harvesting IoT Networks using Deep Reinforcement Learning 使用深度强化学习的能量收集物联网网络中的移动能量发射器调度
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) Pub Date : 2022-10-26 DOI: 10.1109/WF-IoT54382.2022.10152078
Aditya Singh, Rahul Rustagi, Surender Redhu, R. Hegde
{"title":"Mobile Energy Transmitter Scheduling in Energy Harvesting IoT Networks using Deep Reinforcement Learning","authors":"Aditya Singh, Rahul Rustagi, Surender Redhu, R. Hegde","doi":"10.1109/WF-IoT54382.2022.10152078","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152078","url":null,"abstract":"Maintaining adequate energy in low-powered Internet of Things (IoT) nodes is crucial for the development of several applications like smart homes, autonomous industries, etc. These IoT nodes exploit adaptive duty cycling techniques for the efficient utilization of energy resources. However, such adaptive duty cycling of IoT nodes results in their asynchronous operations thereby inducing energy holes in the network. These energy holes lead to information loss and poor quality of services of IoT networks. In this regard, energy harvesting using Mobile Energy Transmitters (MET) can improve the lifetime of an IoT network. In this work, we are introducing a metric named Age of Charging (AoC) metric to quantify the repetitive charging of power deficit IoT nodes. Energy-efficient scheduling of MET is proposed to minimize the expected average AoC such that the energy harvested by IoT nodes is maximized. In this regard, the optimization problem is first remodeled into a Markov decision process. Subsequently, a deep reinforcement learning algorithm is developed based upon the twin delayed deep deterministic policy gradient scheme for energy-efficient scheduling of MET in asynchronous IoT networks. The simulation results indicate that the proposed algorithm outperforms the conventional Deep Q-networks and soft-actor-critic algorithms. These results motivate the usage of MET-aided energy harvesting in self-sustaining IoT networks.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128742549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized Identifier and Access Control Based Architecture for Privacy-Sensitive Data Distribution Service 基于分散标识符和访问控制的隐私敏感数据分发服务体系结构
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) Pub Date : 2022-10-26 DOI: 10.1109/WF-IoT54382.2022.10152128
Reiya Oku, K. Shiomoto, Y. Ohba
{"title":"Decentralized Identifier and Access Control Based Architecture for Privacy-Sensitive Data Distribution Service","authors":"Reiya Oku, K. Shiomoto, Y. Ohba","doi":"10.1109/WF-IoT54382.2022.10152128","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152128","url":null,"abstract":"In today's world, users' privacy-sensitive information is collected and managed by organizations and businesses. However, users do not have the option to choose the information that can be shared, nor can they track the sharing process. To address this limitation, we propose a privacy-sensitive information protection and management architecture that incorporates two emerging technologies: (1) Self-Sovereign Decentralized Identifier (DID), and (2) a policy description language to implement an automated access policy control. The proposed architecture defines a schema for privacy-sensitive information and leverages a policy description language to describe policies for handling the privacy-sensitive information to implement automated distribution of information. Users can prove the authenticity of their personal information without the need for centralized control, such as a public key infrastructure. The transaction records of accessing privacy-sensitive information can be tracked while keeping anonymization; no one can identify the real entity of the transacting party. We implemented a prototype system using Hyperledger Aries, Indy, and Sawtooth Projects for the DID management mechanisms, and Open Policy Agent for an automated access policy control.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123813968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信