2022 IEEE 8th World Forum on Internet of Things (WF-IoT)最新文献

筛选
英文 中文
Masters/PhD Forum and Student Paper Contest 硕士/博士论坛及学生论文比赛
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) Pub Date : 2022-10-26 DOI: 10.1109/WF-IoT54382.2022.10152038
Y. Ohsita, V. Piuri
{"title":"Masters/PhD Forum and Student Paper Contest","authors":"Y. Ohsita, V. Piuri","doi":"10.1109/WF-IoT54382.2022.10152038","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152038","url":null,"abstract":"Masters/PhD Forum and Student Paper Contest.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134146899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Women in Engineering Forum 工程界女性论坛
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) Pub Date : 2022-10-26 DOI: 10.1109/WF-IoT54382.2022.10152035
Aijun Pang
{"title":"Women in Engineering Forum","authors":"Aijun Pang","doi":"10.1109/WF-IoT54382.2022.10152035","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152035","url":null,"abstract":"Women in Engineering Forum.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121157055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recognitions of Tele-Homecare and Self-Medication against a Pandemic Outbreak 认识到远程家庭护理和自我药疗应对大流行的爆发
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) Pub Date : 2022-10-26 DOI: 10.1109/WF-IoT54382.2022.10152295
Isao Nakajima, M. Tsuji, Y. Yagi
{"title":"Recognitions of Tele-Homecare and Self-Medication against a Pandemic Outbreak","authors":"Isao Nakajima, M. Tsuji, Y. Yagi","doi":"10.1109/WF-IoT54382.2022.10152295","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152295","url":null,"abstract":"After experiencing a global pandemic caused by a novel coronavirus and investigating homecare using information and communications technology (ICT) from inside and outside Japan, issues could be roughly classified into three types. First (case 1), in a social environment in which a pandemic has broken out, it was difficult for visiting nurses to provide tele-homecare support from specialists at the patient's home because of a lack of human resources. Second (case 2), apps such as mobile phone chat-style interviews were very useful for determining if individuals were infected and incorporating their electronic medical record questionnaires. Third (case 3), it was found that having patients take antipyretics and oral antivirals at home at their own discretion was extrajudicial. This paper summarizes the benefits, risks, and value of ICT when providing tele-homecare and self-medication during a pandemic outbreak.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121314517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Edge Autonomous Lamp Control with Camera Feedback 带有摄像头反馈的边缘自动灯控制
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) Pub Date : 2022-10-26 DOI: 10.1109/WF-IoT54382.2022.10152281
Satoshi Matsushita, Teruo Tanimoto, Satoshi Kawakami, Takatsugu Ono, Koji Inoue
{"title":"An Edge Autonomous Lamp Control with Camera Feedback","authors":"Satoshi Matsushita, Teruo Tanimoto, Satoshi Kawakami, Takatsugu Ono, Koji Inoue","doi":"10.1109/WF-IoT54382.2022.10152281","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152281","url":null,"abstract":"Recently IoT edge devices have become more diverse and lower cost. In addition, small low-power single-board computers' computing performance has significantly increased. These conditions make it possible to process locally without communicating to the cloud. Since the advantages of in-edge processing are security and privacy, we applied in-edge IoT to smart homes with rich private information to be secured. In in-edge processing, conventional cloud-managed abnormality monitoring and system maintenance cannot be involved. We developed a lamp control system with in-edge processing. It detects failures using camera image processing and recovers from the failure. The abnormalities of the image processing are detected by monitoring cyclic outdoor brightness change observed on windows captured with the same camera. We have developed a prototype system with Python with OpenCV and FastAPI, etc., over PHP-based lamp timer control while keeping source code size small and considering validation easiness. The camera detectors work at 10 FPS on Python with as small as 1607 total source code lines (three times of code lines against the original lamp control timer).","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115852414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Drone Mission Continuity in Rescue Operations with Secure and Efficient Task Migration 通过安全有效的任务迁移提高无人机在救援行动中的任务连续性
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) Pub Date : 2022-10-26 DOI: 10.1109/WF-IoT54382.2022.10152279
Kyusuk Han, Shamma Al Blooshi, N. Alnuaimi, Eiman Al Nuaimi, Everton de Matos, Rafail Psiakis
{"title":"Improving Drone Mission Continuity in Rescue Operations with Secure and Efficient Task Migration","authors":"Kyusuk Han, Shamma Al Blooshi, N. Alnuaimi, Eiman Al Nuaimi, Everton de Matos, Rafail Psiakis","doi":"10.1109/WF-IoT54382.2022.10152279","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152279","url":null,"abstract":"Nowadays first responders are assisted in rescue operations by several modern technologies in the disposal of humanity such as Unmanned Aerial Vehicles (UAVs). However, the success of the missions of the UAVs is affected by several factors such as their limited battery lifetime, security breaches, or faults. Thus, the concept of drone replacement has been introduced, which is the migration of a drone's data to another drone. However, most research works on drone replacement only focus on the battery management for the task migration, with a lack of consideration of the task migration from a security perspective. In this paper, we propose a secure system architecture based on isolation, which reduces the blast radius in case of attack prior to the migration, and enables security during migration. We also propose a method to migrate drone data preventing malicious attacks. In addition, we demonstrate the efficiency of the design by showing that the security overhead is not affected by the type of data.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116918778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Things Data Interoperability: Linking Annotated Entities in oneM2M 物数据互操作性:在oneM2M中链接注释实体
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) Pub Date : 2022-10-26 DOI: 10.1109/WF-IoT54382.2022.10152120
Sunil Kumar, Seungmyeong Jeong, Seongyun Kim
{"title":"Things Data Interoperability: Linking Annotated Entities in oneM2M","authors":"Sunil Kumar, Seungmyeong Jeong, Seongyun Kim","doi":"10.1109/WF-IoT54382.2022.10152120","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152120","url":null,"abstract":"The semantic graphs have been subject to promising research for representing and enhancing Internet of Things data, in which RDF triples and LPG have been widely considered each with its own features and usages. Different Internet of Things standards have supported semantic graphs in their specifications, however large amount of Internet of Things data is utilized and exchanged in their conventional formats, which needs to be annotated in order to utilize the full potential of semantic graphs in such environments. This paper proposes a mapping protocol for interpreting and translating the non-semantic oneM2M resources to NGSI-LD format with an emphasis on creating relationships among the annotated NGSI-LD Entities. As proof of concept, an annotation example has been illustrated based on the public parking use case scenario.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126875904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deep Analysis of Hybrid-Multikey-PUF 混合-多键puf的深入分析
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) Pub Date : 2022-10-26 DOI: 10.1109/WF-IoT54382.2022.10152176
Md Ishtyaq Mahmud, A. Abdelgawad, V. P. Yanambaka
{"title":"A Deep Analysis of Hybrid-Multikey-PUF","authors":"Md Ishtyaq Mahmud, A. Abdelgawad, V. P. Yanambaka","doi":"10.1109/WF-IoT54382.2022.10152176","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152176","url":null,"abstract":"Unique key generation is essential for encryption purposes between Internet of Things (IoT) devices. To produce a unique key for this encryption, Physical Unclonable Functions (PUFs) might be employed. Also, the Random Number Generator (RNG) is used in many different domains; nonetheless, security is one of the most important areas that require the best RNG. In this article, We investigate the quality of random numbers generated by Physical Unclonable Functions (PUFs). We have analyzed three Figures of Merit (FoMs), Uniqueness, Randomness, and Reliability of PUFs implemented on different FPGAs. In our experiments, we have operated the test devices at different temperatures (20°F, 40°F, 60°F, 80°F, 120°F, 140°F). In the PUF that we have analyzed, the key is generated in 1 second on average. We also have analyzed and described the essential properties of random number generator that is most vital considering things to secure our Internet of Things(IoT) devices.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126967456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Code-based Cryptography in IoT: A HW/SW Co-Design of HQC 物联网中基于代码的加密:HQC的硬件/软件协同设计
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) Pub Date : 2022-10-26 DOI: 10.1109/WF-IoT54382.2022.10152031
Maximilian Schöffel, Johannes Feldmann, N. Wehn
{"title":"Code-based Cryptography in IoT: A HW/SW Co-Design of HQC","authors":"Maximilian Schöffel, Johannes Feldmann, N. Wehn","doi":"10.1109/WF-IoT54382.2022.10152031","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152031","url":null,"abstract":"Recent advances in quantum computing pose a serious threat on the security of widely used public-key cryp-tosystems. Thus, new post-quantum cryptographic algorithms have been proposed as part of the associated US NIST process to enable secure, encrypted communication in the age of quantum computing. Many hardware accelerators for structured lattice-based algorithms have already been published to meet the strict power, area and latency requirements of low-power IoT edge de-vices. However, the security of these algorithms is still uncertain. Currently, many new attacks against the lattice structure are investigated to judge on their security. In contrast, code-based algorithms, which rely on deeply explored security metrics and are appealing candidates in the NIST process, have not yet been investigated to the same depth in the context of IoT due to the computational complexity and memory footprint of state-of-the-art software implementations. In this paper, we present to the best of our knowledge the first HW /SW co-design based implementation of the code-based Hamming Quasi Cyclic Key-Encapsulation Mechanism. We profile and evaluate this algorithm in order to explore the trade-off between software optimizations, tightly coupled hardware acceleration by instruction set extension and modular, loosely coupled accelerators. We provide detailed results on the energy consumption and performance of our design and compare it to existing implementations of lattice- and code-based algorithms. The design was implemented in two technologies: FPGA and ASIC. Our results show that code-based algorithms are valid alternatives in low-power IoT from an implementation perspective.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127481432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Can We Put the “S” Into IoT? 我们能把“S”放进物联网吗?
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) Pub Date : 2022-10-26 DOI: 10.1109/WF-IoT54382.2022.10152198
G. Heiser, Lucy Parker, P. Chubb, Ivan Velickovic, Ben Leslie
{"title":"Can We Put the “S” Into IoT?","authors":"G. Heiser, Lucy Parker, P. Chubb, Ivan Velickovic, Ben Leslie","doi":"10.1109/WF-IoT54382.2022.10152198","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152198","url":null,"abstract":"Security of IoT systems is often weak or absent, resulting in systems being compromised. We present the seL4 Core Platform, an operating-system framework that leverages the formally verified security enforcement of the seL4 microkernel to enable the construction of secure-by-design IoT systems, and even enables an incremental cyber retrofit of existing systems. The framework is designed to make its formal verification tractable. An initial evaluation shows that for performance-sensitive highthroughput networking, the platform significantly outperforms Linux.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122678795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Averting Human-Elephant Conflict using IoT and Machine Learning of Elephant Vocalizations 利用物联网和大象发声的机器学习避免人象冲突
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) Pub Date : 2022-10-26 DOI: 10.1109/WF-IoT54382.2022.10152220
C. Ramasubramanian, Suresh Lokiah, Yashaswini Viswanath, Sudha Jamthe
{"title":"Averting Human-Elephant Conflict using IoT and Machine Learning of Elephant Vocalizations","authors":"C. Ramasubramanian, Suresh Lokiah, Yashaswini Viswanath, Sudha Jamthe","doi":"10.1109/WF-IoT54382.2022.10152220","DOIUrl":"https://doi.org/10.1109/WF-IoT54382.2022.10152220","url":null,"abstract":"Human-Elephant conflict causes harm to life and property and has contributed to endangering elephants. Elephant deterrent systems have been built using electric wire fences [1], improving the fences with chili [2], and sound deterrents to scare the elephants [3] and all have limited success [4]. The elephants are hunted and killed making them endangered [5]. The elephants help the ecosystem [6]. This paper outlines the approach we took toward a more sustainable world where humans can co-exist with elephants by building an elephant alertness system to predict when they are dangerously close and to alert humans. We built an IoT device using bio-acoustics and machine-learning as an early warning system to determine the proximity and behavior of elephants by classifying elephant vocalizations. We built this early warning device using a Raspberry Pi along with a microphone and an alarm system. The device identifies the presence of elephants nearby using sound sensors. We built an AI machine learning model that identifies the type of vocalization as a Chirp, Roar, Rumble, or Trumpet and predicts whether the elephants are likely to raid even when they are not visible from darkness or thick foliage. In this paper, we share the challenges we solved in building this outdoor weather-friendly Artificial Intelligence IoT (AIoT) device hosting the artificial intelligence predictive model.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123165012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信