2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)最新文献

筛选
英文 中文
EcoLoc: Toward Universal Location Sensing by Encounter-Based Collaborative Indoor Localization EcoLoc:基于相遇的协同室内定位的通用位置感知
Hsinchung Chen, Yi-Lin Chen, Chia Hsun Wu, M. A. Faruque, P. Chou
{"title":"EcoLoc: Toward Universal Location Sensing by Encounter-Based Collaborative Indoor Localization","authors":"Hsinchung Chen, Yi-Lin Chen, Chia Hsun Wu, M. A. Faruque, P. Chou","doi":"10.1145/3054977.3055000","DOIUrl":"https://doi.org/10.1145/3054977.3055000","url":null,"abstract":"Indoor localization techniques proposed to date have assumed costly resources in terms of computation, power, or sensing modality for many wearable end-devices in the Internet of .ings (IoT). To make localization a universal feature for IoT devices, we propose EcoLoc, an indoor localization system using collaborative version of Conditional Random Fields (CCRF) integrated with our encounter model to generate the most probable locations. We have implemented EcoLoc on the Android tablet and the Broadcom WICED Sense IoT platform with a lower-power MCU, miniature inertial sensors, and Bluetooth Low-Energy (BLE) radio. Experimental results show that while operating without the aid of beacons, compared to the non-collaborative CRF, EcoLoc can shorten the convergence distance by up to 40% on tablet, and up to 50% on the WICED-Sense while incurring an extra current consumption of 15 mA.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124271817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Demo Abstract: Smart Piggy Bank: In-Home Banking System for Children 摘要:智能储钱罐:儿童家庭银行系统
Yong-jae Lee, Koan Seok Kim, Ho-Joon Lee
{"title":"Demo Abstract: Smart Piggy Bank: In-Home Banking System for Children","authors":"Yong-jae Lee, Koan Seok Kim, Ho-Joon Lee","doi":"10.1145/3054977.3057318","DOIUrl":"https://doi.org/10.1145/3054977.3057318","url":null,"abstract":"In this paper, we present a smart piggy bank that connects a traditional piggy bank to on-line bank account. In order to detect saving behavioral patterns, we used a simple needle switch that transfers information of inserted coins to the smart phone application through Bluetooth. The application helps the parents make a decision to transfer pocket money to the bank account linked to the smart piggy bank. We expect the proposed system to be able to collect financial big data related to saving behavior and to provide new financial services.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123546649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MobiT: A Distributed and Congestion-Resilient Trajectory Based Routing Algorithm for Vehicular Delay Tolerant Networks MobiT:一种基于分布式和拥塞弹性轨迹的车辆容忍延迟网络路由算法
Li Yan, Haiying Shen, Kang-Peng Chen
{"title":"MobiT: A Distributed and Congestion-Resilient Trajectory Based Routing Algorithm for Vehicular Delay Tolerant Networks","authors":"Li Yan, Haiying Shen, Kang-Peng Chen","doi":"10.1145/3054977.3054996","DOIUrl":"https://doi.org/10.1145/3054977.3054996","url":null,"abstract":"Packet routing is important for Vehicular Delay Tolerant Networks (VDTNs).Opportunistic routing algorithms based on historical records are insuciently accurate in forwarder selection due to movement randomness of vehicles. Trajectory-based routing algo- rithms tackle vehicle movement randomness but cannot be directly used in VDTNs due to the dependence on APs. In this paper, we develop a distributed trajectory-based routing algorithm (called MobiT) for VDTNs.is non-trivial task faces three challenges. First, vehicle trajectories must be suciently collected. Second, the trajectories cannot be updated frequently due to limited resources of the repository nodes. ird, achieving high routing performance even with partially collected trajectories. Our real trace study lays the foundation of the design of MobiT. Taking advantage of dier- ent roles of vehicles, MobiT uses service vehicles that move in wide areas to collect vehicle trajectories, and rely on the service vehicles and roadside units (called schedulers) for routing scheduling. By using regular temporal congestion state of road segments, MobiT schedules the packet to arrive at a roadside unit prior to the des- tination vehicle to improve routing performance. Further, MobiT leverages vehicles’ long-term mobility paerns to assist routing. Extensive trace-driven and real experiments show the eectiveness and eciency of MobiT.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"2013 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114125985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
DaRe: Data Recovery through Application Layer Coding for LoRaWAN DaRe:通过应用层编码实现LoRaWAN的数据恢复
P. Marcelis, V. Rao, R. V. Prasad
{"title":"DaRe: Data Recovery through Application Layer Coding for LoRaWAN","authors":"P. Marcelis, V. Rao, R. V. Prasad","doi":"10.1145/3054977.3054978","DOIUrl":"https://doi.org/10.1145/3054977.3054978","url":null,"abstract":"Internet of Things (IoT) solutions are increasingly being deployed for smart applications. To provide good communication for the increasing number of smart applications, there is a need for low cost and long range Low Power Wide Area Network (LPWAN) technologies. LoRaWAN is an energy efficient and inexpensive LPWAN solution that is rapidly being adopted all around the world. However, LoRaWAN does not guarantee reliable communication in its basic configuration. Transmitted frames can be lost due to the channel effects and mobility of the end-devices. In this study, we perform extensive measurements on a new LoRaWAN network to characterise spatial and temporal properties of the LoRaWAN channel. The empirical outage probability for the farthest measured distance from the closest gateway of 7.5km in our deployment is as low as 0.004, but the frame loss measured at this distance was up to 70%. Furthermore, we show that burstiness in frame loss can be expected for both mobile and stationary scenarios. Frame loss results in data loss, since in the basic configuration frames are only transmitted once. To reduce data loss in LoRaWAN, we design a novel coding scheme for data recovery called DaRe, which extends frames with redundant information that is calculated from the data from previous frames. DaRe combines techniques from convolutional codes and fountain codes. We develop an implementation for DaRe and show that 99% of the data can be recovered with a code rate of 1/2 for up to 40% frame loss. Compared to repetition coding DaRe provides 21% more data recovery, and can save up to 42% energy consumption on transmission for 10 byte data units. DaRe also provides better resilience to bursty frame loss. This study provides useful results to both LoRaWAN network operators as well as developers of LoRaWAN applications. Network operators can use the characterisation results to identify possible weaknesses in the network, and application developers are offered a tool to prevent possible data loss.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121114689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
A Game of Things: Strategic Allocation of Security Resources for IoT 物联网游戏:物联网安全资源的战略分配
Antonino Rullo, Daniele Midi, Edoardo Serra, E. Bertino
{"title":"A Game of Things: Strategic Allocation of Security Resources for IoT","authors":"Antonino Rullo, Daniele Midi, Edoardo Serra, E. Bertino","doi":"10.1145/3054977.3055001","DOIUrl":"https://doi.org/10.1145/3054977.3055001","url":null,"abstract":"In many Internet of ing (IoT) application domains security is a critical requirement, because malicious parties can undermine the eectiveness of IoT-based systems by compromising single components and/or communication channels. us, a security infrastructure is needed to ensure the proper functioning of such systems even under aack. However, it is also critical that security be at a reasonable resource and energy cost, as many IoT devices may not have sucient resources to host expensive security tools. In this paper, we focus on the problem of eciently and eectively securing IoT networks by carefully allocating security tools. We model our problem according to game theory, and provide a Paretooptimal solution, in which the cost of the security infrastructure, its energy consumption, and the probability of a successful aack, are minimized. Our experimental evaluation shows that our technique improves the system robustness in terms of packet delivery rate for dierent network topologies.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121751327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
ADN: An Information-Centric Networking Architecture for the Internet of Things 面向物联网的以信息为中心的网络架构
J. Garcia-Luna-Aceves
{"title":"ADN: An Information-Centric Networking Architecture for the Internet of Things","authors":"J. Garcia-Luna-Aceves","doi":"10.1145/3054977.3054995","DOIUrl":"https://doi.org/10.1145/3054977.3054995","url":null,"abstract":"Forwarding data by name has been assumed to be a necessary aspect of an information-centric redesign of the current Internet architecture that makes content access, dissemination, and storage more efficient. The Named Data Networking (NDN) and Content-Centric Networking (CCNx) architectures are the leading examples of such an approach. However, forwarding data by name incurs storage and communication complexities that are orders of magnitude larger than solutions based on forwarding data using addresses. Furthermore, the specific algorithms used in NDN and CCNx have been shown to have a number of limitations. The Addressable Data Networking (ADN) architecture is introduced as an alternative to NDN and CCNx. ADN is particularly attractive for large-scale deployments of the Internet of Things (IoT), because it requires far less storage and processing in relaying nodes than NDN. ADN allows things and data to be denoted by names, just like NDN and CCNx do. However, instead of replacing the waist of the Internet with named-data forwarding, ADN uses an address-based forwarding plane and introduces an information plane that seamlessly maps names to addresses without the involvement of end-user applications. Simulation results illustrate the order of magnitude savings in complexity that can be attained with ADN compared to NDN.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122518349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Toolkit for Construction of Authorization Service Infrastructure for the Internet of Things 物联网授权服务基础设施构建工具箱
Hokeun Kim, Eunsuk Kang, Edward A. Lee, David Broman
{"title":"A Toolkit for Construction of Authorization Service Infrastructure for the Internet of Things","authors":"Hokeun Kim, Eunsuk Kang, Edward A. Lee, David Broman","doi":"10.1145/3054977.3054980","DOIUrl":"https://doi.org/10.1145/3054977.3054980","url":null,"abstract":"The challenges posed by the Internet of Things (IoT) render existing security measures ineffective against emerging networks and devices. These challenges include heterogeneity, operation in open environments, and scalability. In this paper, we propose SST (Secure Swarm Toolkit), an open-source toolkit for construction and deployment of an authorization service infrastructure for the IoT. The infrastructure uses distributed local authorization entities, which provide authorization services that can address heterogeneous security requirements and resource constraints in the IoT. The authorization services can be accessed by network entities through software interfaces provided by SST, called accessors. The accessors enable IoT developers to readily integrate their devices with authorization services without needing to manage cryptographic keys and operations. To rigorously show that SST provides necessary security guarantees, we have performed a formal security analysis using an automated verification tool. In addition, we demonstrate the scalability of our approach with a mathematical analysis, as well as experiments to evaluate security overhead of network entities under different security profiles supported by SST.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126517985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Gait-Watch: A Context-Aware Authentication System for Smart Watch Based on Gait Recognition 步态-手表:基于步态识别的智能手表环境感知认证系统
Weitao Xu, Yiran Shen, Yongtuo Zhang, N. Bergmann, Wen Hu
{"title":"Gait-Watch: A Context-Aware Authentication System for Smart Watch Based on Gait Recognition","authors":"Weitao Xu, Yiran Shen, Yongtuo Zhang, N. Bergmann, Wen Hu","doi":"10.1145/3054977.3054991","DOIUrl":"https://doi.org/10.1145/3054977.3054991","url":null,"abstract":"With recent advances in mobile computing and sensing technology, smart wearable devices have pervaded our everyday lives. The security of these wearable devices is becoming a hot research topic because they store various private information. Existing approaches either only rely on a secret PIN number or require an explicit user authentication process. In this paper, we present Gait-watch, a context-aware authentication system for smart watch based on gait recognition. We address the problem of recognizing the user under various walking activities (e.g., walking normally, walking with calling the phone), and propose a sparse fusion method to improve recognition accuracy. Extensive evaluations show that Gait-watch improves recognition accuracy by up to 20% by leveraging the activity information, and the proposed sparse fusion method is 10% better than several state-of-the-art gait recognition methods. We also report a user study to demonstrate that Gait-watch can accurately authenticate the user in real world scenarios and require low system cost.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126131605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Towards an Optimized BlockChain for IoT 面向物联网优化区块链
A. Dorri, S. Kanhere, R. Jurdak
{"title":"Towards an Optimized BlockChain for IoT","authors":"A. Dorri, S. Kanhere, R. Jurdak","doi":"10.1145/3054977.3055003","DOIUrl":"https://doi.org/10.1145/3054977.3055003","url":null,"abstract":"There has been increasing interest in adopting BlockChain (BC), that underpins the crypto-currency Bitcoin, in Internet of Things (IoT) for security and privacy. However, BCs are computationally expensive and involve high bandwidth overhead and delays, which are not suitable for most IoT devices. This paper proposes a lightweight BC-based architecture for IoT that virtually eliminates the overheads of classic BC, while maintaining most of its security and privacy benefits. IoT devices benefit from a private immutable ledger, that acts similar to BC but is managed centrally, to optimize energy consumption. High resource devices create an overlay network to implement a publicly accessible distributed BC that ensures end-to-end security and privacy. The proposed architecture uses distributed trust to reduce the block validation processing time. We explore our approach in a smart home setting as a representative case study for broader IoT applications. Qualitative evaluation of the architecture under common threat models highlights its effectiveness in providing security and privacy for IoT applications. Simulations demonstrate that our method decreases packet and processing overhead significantly compared to the BC implementation used in Bitcoin.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131424853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 589
Demo Abstract: On-Demand Information Retrieval from Videos Using Deep Learning in Wireless Networks 摘要:无线网络中基于深度学习的视频信息按需检索
Zongqing Lu, Noor Felemban, K. Chan, T. L. La Porta
{"title":"Demo Abstract: On-Demand Information Retrieval from Videos Using Deep Learning in Wireless Networks","authors":"Zongqing Lu, Noor Felemban, K. Chan, T. L. La Porta","doi":"10.1145/3054977.3057296","DOIUrl":"https://doi.org/10.1145/3054977.3057296","url":null,"abstract":"Mobile devices with cameras have greatly assisted in the prevalence of online videos. Valuable information may be retrieved from videos for various purposes. While deep learning enables automatic information retrieval from videos, it is a demanding task for mobile devices despite recent advances in their computational capability. Given a network consisting of mobile devices and a video-cloud, mobile devices may be able to upload videos to the video-cloud, a platform more computationally capable to process videos. However, due to network constraints, once a query initiates a video processing task of a specific interest, most videos will not likely have been uploaded to the video-cloud, especially when the query is about a recent event. We designed and implemented a distributed system for video processing using deep learning across a wireless network, where network devices answer queries by retrieving information from videos stored across the network and reduce query response time by computation offload from mobile devices to the video-cloud.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130844348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信