{"title":"Masters/PhD Forum and Student Paper Contest","authors":"Y. Ohsita, V. Piuri","doi":"10.1109/WF-IoT54382.2022.10152038","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152038","url":null,"abstract":"Masters/PhD Forum and Student Paper Contest.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134146899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Women in Engineering Forum","authors":"Aijun Pang","doi":"10.1109/WF-IoT54382.2022.10152035","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152035","url":null,"abstract":"Women in Engineering Forum.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121157055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recognitions of Tele-Homecare and Self-Medication against a Pandemic Outbreak","authors":"Isao Nakajima, M. Tsuji, Y. Yagi","doi":"10.1109/WF-IoT54382.2022.10152295","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152295","url":null,"abstract":"After experiencing a global pandemic caused by a novel coronavirus and investigating homecare using information and communications technology (ICT) from inside and outside Japan, issues could be roughly classified into three types. First (case 1), in a social environment in which a pandemic has broken out, it was difficult for visiting nurses to provide tele-homecare support from specialists at the patient's home because of a lack of human resources. Second (case 2), apps such as mobile phone chat-style interviews were very useful for determining if individuals were infected and incorporating their electronic medical record questionnaires. Third (case 3), it was found that having patients take antipyretics and oral antivirals at home at their own discretion was extrajudicial. This paper summarizes the benefits, risks, and value of ICT when providing tele-homecare and self-medication during a pandemic outbreak.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121314517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Satoshi Matsushita, Teruo Tanimoto, Satoshi Kawakami, Takatsugu Ono, Koji Inoue
{"title":"An Edge Autonomous Lamp Control with Camera Feedback","authors":"Satoshi Matsushita, Teruo Tanimoto, Satoshi Kawakami, Takatsugu Ono, Koji Inoue","doi":"10.1109/WF-IoT54382.2022.10152281","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152281","url":null,"abstract":"Recently IoT edge devices have become more diverse and lower cost. In addition, small low-power single-board computers' computing performance has significantly increased. These conditions make it possible to process locally without communicating to the cloud. Since the advantages of in-edge processing are security and privacy, we applied in-edge IoT to smart homes with rich private information to be secured. In in-edge processing, conventional cloud-managed abnormality monitoring and system maintenance cannot be involved. We developed a lamp control system with in-edge processing. It detects failures using camera image processing and recovers from the failure. The abnormalities of the image processing are detected by monitoring cyclic outdoor brightness change observed on windows captured with the same camera. We have developed a prototype system with Python with OpenCV and FastAPI, etc., over PHP-based lamp timer control while keeping source code size small and considering validation easiness. The camera detectors work at 10 FPS on Python with as small as 1607 total source code lines (three times of code lines against the original lamp control timer).","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115852414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kyusuk Han, Shamma Al Blooshi, N. Alnuaimi, Eiman Al Nuaimi, Everton de Matos, Rafail Psiakis
{"title":"Improving Drone Mission Continuity in Rescue Operations with Secure and Efficient Task Migration","authors":"Kyusuk Han, Shamma Al Blooshi, N. Alnuaimi, Eiman Al Nuaimi, Everton de Matos, Rafail Psiakis","doi":"10.1109/WF-IoT54382.2022.10152279","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152279","url":null,"abstract":"Nowadays first responders are assisted in rescue operations by several modern technologies in the disposal of humanity such as Unmanned Aerial Vehicles (UAVs). However, the success of the missions of the UAVs is affected by several factors such as their limited battery lifetime, security breaches, or faults. Thus, the concept of drone replacement has been introduced, which is the migration of a drone's data to another drone. However, most research works on drone replacement only focus on the battery management for the task migration, with a lack of consideration of the task migration from a security perspective. In this paper, we propose a secure system architecture based on isolation, which reduces the blast radius in case of attack prior to the migration, and enables security during migration. We also propose a method to migrate drone data preventing malicious attacks. In addition, we demonstrate the efficiency of the design by showing that the security overhead is not affected by the type of data.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116918778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Things Data Interoperability: Linking Annotated Entities in oneM2M","authors":"Sunil Kumar, Seungmyeong Jeong, Seongyun Kim","doi":"10.1109/WF-IoT54382.2022.10152120","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152120","url":null,"abstract":"The semantic graphs have been subject to promising research for representing and enhancing Internet of Things data, in which RDF triples and LPG have been widely considered each with its own features and usages. Different Internet of Things standards have supported semantic graphs in their specifications, however large amount of Internet of Things data is utilized and exchanged in their conventional formats, which needs to be annotated in order to utilize the full potential of semantic graphs in such environments. This paper proposes a mapping protocol for interpreting and translating the non-semantic oneM2M resources to NGSI-LD format with an emphasis on creating relationships among the annotated NGSI-LD Entities. As proof of concept, an annotation example has been illustrated based on the public parking use case scenario.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126875904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Deep Analysis of Hybrid-Multikey-PUF","authors":"Md Ishtyaq Mahmud, A. Abdelgawad, V. P. Yanambaka","doi":"10.1109/WF-IoT54382.2022.10152176","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152176","url":null,"abstract":"Unique key generation is essential for encryption purposes between Internet of Things (IoT) devices. To produce a unique key for this encryption, Physical Unclonable Functions (PUFs) might be employed. Also, the Random Number Generator (RNG) is used in many different domains; nonetheless, security is one of the most important areas that require the best RNG. In this article, We investigate the quality of random numbers generated by Physical Unclonable Functions (PUFs). We have analyzed three Figures of Merit (FoMs), Uniqueness, Randomness, and Reliability of PUFs implemented on different FPGAs. In our experiments, we have operated the test devices at different temperatures (20°F, 40°F, 60°F, 80°F, 120°F, 140°F). In the PUF that we have analyzed, the key is generated in 1 second on average. We also have analyzed and described the essential properties of random number generator that is most vital considering things to secure our Internet of Things(IoT) devices.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126967456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Code-based Cryptography in IoT: A HW/SW Co-Design of HQC","authors":"Maximilian Schöffel, Johannes Feldmann, N. Wehn","doi":"10.1109/WF-IoT54382.2022.10152031","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152031","url":null,"abstract":"Recent advances in quantum computing pose a serious threat on the security of widely used public-key cryp-tosystems. Thus, new post-quantum cryptographic algorithms have been proposed as part of the associated US NIST process to enable secure, encrypted communication in the age of quantum computing. Many hardware accelerators for structured lattice-based algorithms have already been published to meet the strict power, area and latency requirements of low-power IoT edge de-vices. However, the security of these algorithms is still uncertain. Currently, many new attacks against the lattice structure are investigated to judge on their security. In contrast, code-based algorithms, which rely on deeply explored security metrics and are appealing candidates in the NIST process, have not yet been investigated to the same depth in the context of IoT due to the computational complexity and memory footprint of state-of-the-art software implementations. In this paper, we present to the best of our knowledge the first HW /SW co-design based implementation of the code-based Hamming Quasi Cyclic Key-Encapsulation Mechanism. We profile and evaluate this algorithm in order to explore the trade-off between software optimizations, tightly coupled hardware acceleration by instruction set extension and modular, loosely coupled accelerators. We provide detailed results on the energy consumption and performance of our design and compare it to existing implementations of lattice- and code-based algorithms. The design was implemented in two technologies: FPGA and ASIC. Our results show that code-based algorithms are valid alternatives in low-power IoT from an implementation perspective.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127481432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Heiser, Lucy Parker, P. Chubb, Ivan Velickovic, Ben Leslie
{"title":"Can We Put the “S” Into IoT?","authors":"G. Heiser, Lucy Parker, P. Chubb, Ivan Velickovic, Ben Leslie","doi":"10.1109/WF-IoT54382.2022.10152198","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152198","url":null,"abstract":"Security of IoT systems is often weak or absent, resulting in systems being compromised. We present the seL4 Core Platform, an operating-system framework that leverages the formally verified security enforcement of the seL4 microkernel to enable the construction of secure-by-design IoT systems, and even enables an incremental cyber retrofit of existing systems. The framework is designed to make its formal verification tractable. An initial evaluation shows that for performance-sensitive highthroughput networking, the platform significantly outperforms Linux.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122678795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Ramasubramanian, Suresh Lokiah, Yashaswini Viswanath, Sudha Jamthe
{"title":"Averting Human-Elephant Conflict using IoT and Machine Learning of Elephant Vocalizations","authors":"C. Ramasubramanian, Suresh Lokiah, Yashaswini Viswanath, Sudha Jamthe","doi":"10.1109/WF-IoT54382.2022.10152220","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152220","url":null,"abstract":"Human-Elephant conflict causes harm to life and property and has contributed to endangering elephants. Elephant deterrent systems have been built using electric wire fences [1], improving the fences with chili [2], and sound deterrents to scare the elephants [3] and all have limited success [4]. The elephants are hunted and killed making them endangered [5]. The elephants help the ecosystem [6]. This paper outlines the approach we took toward a more sustainable world where humans can co-exist with elephants by building an elephant alertness system to predict when they are dangerously close and to alert humans. We built an IoT device using bio-acoustics and machine-learning as an early warning system to determine the proximity and behavior of elephants by classifying elephant vocalizations. We built this early warning device using a Raspberry Pi along with a microphone and an alarm system. The device identifies the presence of elephants nearby using sound sensors. We built an AI machine learning model that identifies the type of vocalization as a Chirp, Roar, Rumble, or Trumpet and predicts whether the elephants are likely to raid even when they are not visible from darkness or thick foliage. In this paper, we share the challenges we solved in building this outdoor weather-friendly Artificial Intelligence IoT (AIoT) device hosting the artificial intelligence predictive model.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123165012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}