2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)最新文献

筛选
英文 中文
Secure Information Sharing among Autonomous Vehicles in NDN NDN中自动驾驶车辆间信息共享的安全
Muktadir Chowdhury, Ashlesh Gawande, Lan Wang
{"title":"Secure Information Sharing among Autonomous Vehicles in NDN","authors":"Muktadir Chowdhury, Ashlesh Gawande, Lan Wang","doi":"10.1145/3054977.3054994","DOIUrl":"https://doi.org/10.1145/3054977.3054994","url":null,"abstract":"Autonomous vehicles must communicate with each other effectively and securely to make robust decisions. However, today's Internet falls short in supporting efficient data delivery and strong data security, especially in a mobile ad-hoc environment. Named Data Networking (NDN), a new data-centric Internet architecture, provides a better foundation for secure data sharing among autonomous vehicles. We examine two potential threats, false data dissemination and vehicle tracking, in an NDN-based autonomous vehicular network. To detect false data, we propose a four-level hierarchical trust model and the associated naming scheme for vehicular data authentication. Moreover, we address vehicle tracking concerns using a pseudonym scheme to anonymize vehicle names and certificate issuing proxies to further protect vehicle identity. Finally, we implemented and evaluated our AutoNDN application on Raspberry Pi-based mini cars in a wireless environment.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116993180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
ImageBeacon: Broadcasting Color Images over Connectionless Bluetooth LE Packets ImageBeacon:通过无连接蓝牙LE数据包广播彩色图像
Chong Shao, S. Nirjon
{"title":"ImageBeacon: Broadcasting Color Images over Connectionless Bluetooth LE Packets","authors":"Chong Shao, S. Nirjon","doi":"10.1145/3054977.3054985","DOIUrl":"https://doi.org/10.1145/3054977.3054985","url":null,"abstract":"This paper describes the first ‘image beacon’ system that is capable of broadcasting color images over a very long period (years, as opposed to days or weeks) using a set of cheap, low-power, memory-constrained Bluetooth Low Energy (BLE) beacon devices. We design an image processing pipeline that takes into account the background and foreground information of an image and then applies an adaptive encoding method which priorities more important regions of an image during encoding, in order to achieve the best quality image under a very strict size limit. We test our system with different types of RGB images that contain indoor and outdoor objects, buildings, and road signs. We empirically determine the tradeoffs between the system lifetime and the quality of broadcasted images, and determine an optimal set of parameters for our system, under user-specified constraints such as the number of available beacon devices, maximum latency, and life expectancy. We develop a smartphone application that takes an image and user requirements as inputs, shows previews of different quality output images, writes the encoded image into a set of beacons, and reads the broadcasted image back. Our evaluation shows that a set of 2–3 beacons is capable of broadcasting high-quality images (70% structurally similar to original images) for a year-long continuous broadcasting, and both the lifetime and the image quality improve when more beacons are used.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128369475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Where's the Bear? - Automating Wildlife Image Processing Using IoT and Edge Cloud Systems 熊在哪里?-使用物联网和边缘云系统自动化野生动物图像处理
Andy Rosales Elias, Nevena Golubovic, C. Krintz, R. Wolski
{"title":"Where's the Bear? - Automating Wildlife Image Processing Using IoT and Edge Cloud Systems","authors":"Andy Rosales Elias, Nevena Golubovic, C. Krintz, R. Wolski","doi":"10.1145/3054977.3054986","DOIUrl":"https://doi.org/10.1145/3054977.3054986","url":null,"abstract":"We investigate the design and implementation of Where's The Bear (WTB), an end-to-end, distributed, IoT system for wildlife monitoring.WTB implements a multi-tier (cloud, edge, sensing) system that integrates recent advances in machine learning based image processing to automatically classify animals in images from remote, motion-triggered camera traps.We use non-local, resource-rich, public/private cloud systems to train the machine learning models, and ``in-the-field,'' resource-constrained edge systems to perform classification near the IoT sensing devices (cameras).We deploy WTB at the UCSB Sedgwick Reserve, a 6000 acre site for environmental research and use it to aggregate, manage, and analyze over 1.12M images.WTB integrates Google TensorFlow and OpenCV applications to perform automatic classification and tagging for a subset of these images.To avoid transferring large numbers of training images for TensorFlow over a low-bandwidth network linking Sedgwick to the public/private clouds, we devise a technique that uses stock Google Images to construct a synthetic training set using only a small number of empty, background images from Sedgwick.Our system is able to accurately identify bears, deer, coyotes, and empty images and significantly reduces the time and bandwidth requirements for image transfer, as well as end-user analysis time, since WTB automatically filters the images on-site.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133637194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 94
Quick and Autonomous Platoon Maintenance in Vehicle Dynamics For Distributed Vehicle Platoon Networks 分布式车辆排网络车辆动力学中的快速自主排维护
Ankur Sarker, Chenxi Qiu, Haiying Shen
{"title":"Quick and Autonomous Platoon Maintenance in Vehicle Dynamics For Distributed Vehicle Platoon Networks","authors":"Ankur Sarker, Chenxi Qiu, Haiying Shen","doi":"10.1145/3054977.3054998","DOIUrl":"https://doi.org/10.1145/3054977.3054998","url":null,"abstract":"Platoon systems, as a type of adaptive cruise control systems,will play a significant role to improve travel experience androadway safety. The stability of a platoon system is crucialso that each vehicle maintains a safety distance from itsproceeding vehicle and can take necessary actions to avoidcollisions. However, current centralized platoon maintenancemethod cannot meet this requirement. We suggest to use adecentralized platoon maintenance method, in which eachvehicle communicates with its neighbor vehicles and self-determines its own velocity. However, a vehicle needs toknow its distance from its preceding vehicle to determineits velocity, which is unavailable in vehicle communicationdisconnection caused by vehicle dynamics (i.e., node joinsand departures). Thus, a formidable challenge is: how torecover the platoon quickly in vehicle dynamics even when thedistance information is unavailable? To handle this challenge,we first profile a succeeding vehicle’s velocity to minimizethe time to recover the connectivity hole with its precedingvehicle and find that the profiles are almost the same at thebeginning regardless of its current velocity and distance to itspreceding vehicle. Accordingly, we devise a strategy, in whicha succeeding vehicle uses its stored common velocity profilewhen it is disconnected from its preceding vehicle and thenadjusts its velocity once the connection is built. Experimentalresults from simulation show the efficiency and effectivenessof our decentralized platoon maintenance method.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117253632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Adaptive Software-Defined Visible Light Communication Networks 自适应软件定义可见光通信网络
Stefan Schmid, B. V. Deschwanden, S. Mangold, T. Gross
{"title":"Adaptive Software-Defined Visible Light Communication Networks","authors":"Stefan Schmid, B. V. Deschwanden, S. Mangold, T. Gross","doi":"10.1145/3054977.3054983","DOIUrl":"https://doi.org/10.1145/3054977.3054983","url":null,"abstract":"A platform for software-based Visible Light Communication (VLC) can be built with simple hardware components and VLC can be integrated into a room's lighting system. VLC is therefore a good match for indoor setups that need to support a large number of nodes with moderate bandwidth requirements. But designing a VLC system for worst-case operating conditions is more restrictive than necessary. This paper presents a software-based VLC system that adapts link sensitivity and capacity to match environment constraints. Compared to a fixed sensing scheme, an adaptive scheme increases channel capacity by almost an order of magnitude under favorable conditions or significantly extends the communication range. This adaptive link sensitivity allows communication even without a direct line of sight between two devices, opening new opportunities to use VLC systems in novel scenarios involving different types of embedded devices -- ranging from network nodes that only include a single Light Emitting Diode (LED), such as consumer electronics, toys, and wearables, to LED light bulbs that run Linux and provide an indoor VLC communication fabric.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"29 17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125791321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An IoT Data Communication Framework for Authenticity and Integrity 面向真实性和完整性的物联网数据通信框架
Xin Li, Huazhe Wang, Ye Yu, Chen Qian
{"title":"An IoT Data Communication Framework for Authenticity and Integrity","authors":"Xin Li, Huazhe Wang, Ye Yu, Chen Qian","doi":"10.1145/3054977.3054982","DOIUrl":"https://doi.org/10.1145/3054977.3054982","url":null,"abstract":"Internet of Things has been widely applied in everyday life, ranging from transportation, healthcare, to smart homes. As most IoT devices carry constrained resources and limited storage capacity, sensing data need to be transmitted to and stored at resource-rich platforms, such as a cloud. IoT applications retrieve sensing data from the cloud for analysis and decision-making purposes. Ensuring the authenticity and integrity of the sensing data is essential for the correctness and safety of IoT applications. We summarizethe new challenges of the IoT data communication framework with authenticity and integrity and argue that existing solutions cannot be easily adopted. We present two solutions, called Dynamic Tree Chaining (DTC) and Geometric Star Chaining (GSC) that provide authenticity, integrity, sampling uniformity, system efficiency, and application flexibility to IoT data communication. Extensive simulations and prototype emulation experiments driven by real IoT data show that the proposed system is more efficient than alternative solutions in terms of time and space.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127787163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
StoryLine: Unsupervised Geo-event Demultiplexing in Social Spaces without Location Information 故事情节:在没有位置信息的社交空间中进行无监督的地理事件解复用
Shiguang Wang, P. Giridhar, Hongwei Wang, Lance M. Kaplan, T. Pham, A. Yener, T. Abdelzaher
{"title":"StoryLine: Unsupervised Geo-event Demultiplexing in Social Spaces without Location Information","authors":"Shiguang Wang, P. Giridhar, Hongwei Wang, Lance M. Kaplan, T. Pham, A. Yener, T. Abdelzaher","doi":"10.1145/3054977.3054992","DOIUrl":"https://doi.org/10.1145/3054977.3054992","url":null,"abstract":"Some of the most widely deployed IoT devices in urban areas are smartphones in the possession of urban individuals. Their proliferation has led to the emergence of crowdsensing/crowdsourcing services, where humans collect data about their environment (using phones), and servers aggregate the data for various application purposes of interest. With the emergence of social media, a common alternative form of human data entry has become media posts (e.g., on Twitter). This leads to the prospect of building crowdsensing services on top of social media content, exploiting humans as ``sensors\". In this paper, we develop one such service, called {em StoryLine}. The service detects and tracks physical urban events of interest to the user, such as car accidents, infrastructure damage (in the aftermath of a natural disaster), or instances of civil unrest. It offers an interface to client-side software that allows browsing such events in real time, as well as an interface for software applications to a structured representation of the events and their related statistics. The service embodies novel algorithms for real-time detection, demultiplexing, and tracking of physical events using social media data. In our evaluation with Twitter feeds, we show that our service outperforms two state-of-the-art baselines in event detection and demultiplexing. We also conduct two case-studies to show the effectiveness of the real-time event detection capability and event tracking performance of our system.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121305089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
CoMPES: A Command Messaging Service for IoT Policy Enforcement in a Heterogeneous Network CoMPES:异构网络中物联网策略实施的命令消息服务
Jared Hall, Razib Iqbal
{"title":"CoMPES: A Command Messaging Service for IoT Policy Enforcement in a Heterogeneous Network","authors":"Jared Hall, Razib Iqbal","doi":"10.1145/3054977.3054988","DOIUrl":"https://doi.org/10.1145/3054977.3054988","url":null,"abstract":"In this paper, we present a scalable and adaptive model which efficiently and quickly enforces control schemas for the Internet of Things (IoT) via a novel command messaging service. This is achieved by utilizing the n-tier scalability of the cloud to generate vast networks of virtual machines. Within each of these virtual machines exists a cluster of “compute pages”. Each cluster of compute pages contains an instance of our policy enforcement algorithm. This algorithm processes device-level telemetry into device-level policies. Our proposed model is built with a particular focus on the efficiency and scalability of the service. We demonstrate the performance of the service with a small-scale real world experiment and provide some analysis of the results.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129343390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
CityGuard: A Watchdog for Safety-Aware Conflict Detection in Smart Cities CityGuard:智能城市中安全意识冲突检测的看门狗
Meiyi Ma, S. Preum, J. Stankovic
{"title":"CityGuard: A Watchdog for Safety-Aware Conflict Detection in Smart Cities","authors":"Meiyi Ma, S. Preum, J. Stankovic","doi":"10.1145/3054977.3054989","DOIUrl":"https://doi.org/10.1145/3054977.3054989","url":null,"abstract":"Nowadays, increasing number of smart services are being developed and deployed in cities around the world. IoT platforms have emerged to integrate smart city services and city resources, and thus improve city performance in the domains of transportation, emergency, environment, public safety, etc. Despite the increasing intelligence of smart services and the sophistication of platforms, the safety issues in smart cities are not addressed adequately, especially the safety issues arising from the integration of smart services. Therefore, CityGuard, a safety-aware watchdog architecture is developed. To the best of our knowledge, it is the first architecture that detects and resolves conflicts among actions of different services considering both safety and performance requirements. Prior to developing CityGuard, safety and performance requirements and a spectrum of conflicts are specified. Sophisticated models are used to analyze secondary effects, and detect device and environmental conflicts. A simulation based on New York City is used for the evaluation. The results show that CityGuard (i) identifies unsafe actions and thus helps to prevent the city from safety hazards, (ii) detects and resolves two major types of conflicts, i.e., device and environmental conflicts, and (iii) improves the overall city performance.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117248408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Empowering End Users for Social Internet of Things 增强终端用户的社交物联网能力
Ji Eun Kim, Xiangmin Fan, D. Mossé
{"title":"Empowering End Users for Social Internet of Things","authors":"Ji Eun Kim, Xiangmin Fan, D. Mossé","doi":"10.1145/3054977.3054987","DOIUrl":"https://doi.org/10.1145/3054977.3054987","url":null,"abstract":"We present Socialite, a novel end user programming tool for the Social Internet of Things (SIoT). SIoT is a new paradigm where IoT merges with social networks, allowing people and connected devices as well as the devices themselves to interact within a social network framework. Through an online survey with 60 potential users, we identified eight desired features for the SIoT, which were then clustered into four rule categories that can be programmed by end users and/or imposed by systems. The rules created by end users are used to reason about both devices and people in their social relationships to support automated decisions during runtime. Socialite uses ontology/semantic models for basic/low-level knowledge representation (e.g., device and user) to encapsulate the heterogeneity in devices from various manufacturers, and uses production rules (trigger-action programming) for high-level reasoning. With the ontology model, our reasoning supports both device type automation (e.g., current temperature from a thermostat) and capability-based automation (e.g., current temperature from any devices with the same capability). Furthermore, the Socialite rules leverage social relationships and device capabilities to facilitate collaboration by efficiently sharing configuration and information among users/friends and even with devices from people unknown to a user. In a 24-participant user study (12 with no programming experience), we found that Socialite was easy to learn and use, for both programmers and non-programmers. Participants were able to create automation based rules, social relationship involved rules, as well rules they created during the study.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122013819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信