2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)最新文献

筛选
英文 中文
On the Use of Radio Frequency Identification for Continuous Biomedical Monitoring 射频识别在生物医学连续监测中的应用研究
W. Mongan, I. Rasheed, K. Ved, Shrenik A. Vora, K. Dandekar, G. Dion, T. Kurzweg, A. Fontecchio
{"title":"On the Use of Radio Frequency Identification for Continuous Biomedical Monitoring","authors":"W. Mongan, I. Rasheed, K. Ved, Shrenik A. Vora, K. Dandekar, G. Dion, T. Kurzweg, A. Fontecchio","doi":"10.1145/3054977.3055002","DOIUrl":"https://doi.org/10.1145/3054977.3055002","url":null,"abstract":"Radio Frequency Identification (RFID) technology is often deployed for inventory management scenarios. In inventory applications, a known or unknown number of RFID tags are queried in a discrete manner and for a single, short period of time, until each tag is recognized by the interrogator device. Passive RFID provides several benefits conducive to ubiquitous deployment, including RFID tags that are energized from the wireless RF interrogation signal itself that obviates the need for a battery or wired power, and antenna assemblies that can be integrated with the chip with only a small footprint.We have utilized these benefits to enable continuous biomedical sensing devices with minimal footprint and batteryless deployment.These devices are fabric-based smart garments with an embedded RFID tag and antenna assembly. However, traditional inventory-based RFID interrogation presents several challenges due to the RFID protocols and regulations that govern their use. In this paper, we discuss the considerations necessary to utilize RFID interrogation to enabling passive, continuous sensor monitoring, and the techniques we employed in developing software to do so.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128154398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
ATHOME: Automatic Tunable Wireless Charging for Smart Home ATHOME:智能家居的自动可调无线充电
Zheng Dong, Y. Gu, Lingkun Fu, Jiming Chen, T. He, Cong Liu
{"title":"ATHOME: Automatic Tunable Wireless Charging for Smart Home","authors":"Zheng Dong, Y. Gu, Lingkun Fu, Jiming Chen, T. He, Cong Liu","doi":"10.1145/3054977.3054990","DOIUrl":"https://doi.org/10.1145/3054977.3054990","url":null,"abstract":"We present ATHOME, an Automatic Tunable wireless charging framework for smart low-power devices in current and future HOME. ATHOME automatically tunes the charging power of multiple stationary wireless chargers to provide enough energy that can continuously power up smart devices with varying working power profiles, while minimizing the total charging power to reduce energy cost. To reach this goal, ATHOME first solves a hard open problem of calculating the minimum required charging power for powering up a device with limited energy storage size and varying power profile. Based on the minimum charging power obtained for each device, ATHOME then provides an optimal solution with polynomial-time complexity that automatically tunes the charging power of all chargers in a real-time fashion, which enables all devices to work continuously while minimizing total charging power. We implement ATHOME on a WISP platform with 8 rechargeable nodes. Experiments demonstrate that ATHOME provides sufficient and tight charging power that enables devices to work continuously.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116169654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Demo Abstract: Event Tracker Using Social Networks 摘要:基于社交网络的事件跟踪器
P. Giridhar, Shiguang Wang, T. Abdelzaher
{"title":"Demo Abstract: Event Tracker Using Social Networks","authors":"P. Giridhar, Shiguang Wang, T. Abdelzaher","doi":"10.1145/3054977.3057301","DOIUrl":"https://doi.org/10.1145/3054977.3057301","url":null,"abstract":"In this demo we present a tool that allows us to visualize the real world events on a map interface using the contents shared by users on Twitter and Instagram. We incorporate a novel algorithm thatanalyzes the data from both Twitter and Instagram for fusing the contents corresponding to the same event thereby enhancing the corroboration of the event detection techniques for the individualnetworks. Such a service enables tracking of events using explanation from both the social networks to give a rich experience to the users.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117330232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Learning Execution Contexts from System Call Distribution for Anomaly Detection in Smart Embedded System 从系统调用分布中学习执行上下文用于智能嵌入式系统异常检测
Man-Ki Yoon, Sibin Mohan, Jaesik Choi, Mihai Christodorescu, L. Sha
{"title":"Learning Execution Contexts from System Call Distribution for Anomaly Detection in Smart Embedded System","authors":"Man-Ki Yoon, Sibin Mohan, Jaesik Choi, Mihai Christodorescu, L. Sha","doi":"10.1145/3054977.3054999","DOIUrl":"https://doi.org/10.1145/3054977.3054999","url":null,"abstract":"Existing techniques used for anomaly detection do not fully utilize the intrinsic properties of embedded devices. In this paper, we propose a lightweight method for detecting anomalous executions using a distribution of system call frequencies. We use a cluster analysis to learn the legitimate execution contexts of embedded applications and then monitor them at run-time to capture abnormal executions. Our prototype applied to a real-world open-source embedded application shows that the proposed method can effectively detect anomalous executions without relying on sophisticated analyses or affecting the critical execution paths.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122624536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
SafeWatch: A Wearable Hand Motion Tracking System for Improving Driving Safety SafeWatch:一种可穿戴的手部运动跟踪系统,用于提高驾驶安全
Chongguang Bi, Jun Huang, G. Xing, Landu Jiang, Xue Liu, Minghua Chen
{"title":"SafeWatch: A Wearable Hand Motion Tracking System for Improving Driving Safety","authors":"Chongguang Bi, Jun Huang, G. Xing, Landu Jiang, Xue Liu, Minghua Chen","doi":"10.1145/3054977.3054979","DOIUrl":"https://doi.org/10.1145/3054977.3054979","url":null,"abstract":"Driving with distraction or losing alertness increases the risk of the traffic accident. The emerging Internet of Things (IoT) systems for smart driving hold the promise of significantly reducing road accidents. In particular, detecting the unsafe hand motions and warning the driver using smart sensors can improve the driver's self-alertness and the driving skill. However, due to the impact of the vehicle's movement and the significant variation across different driving environments, detecting the position of the driver's hand is challenging. This paper presents SafeWatch -- a system that employs commodity smartwatches and smartphones to detect the driver's unsafe behaviors in a real-time manner. SafeWatch infers driver's hand motions based on several important features such as the posture of the driver's forearm and the vibration of the smartwatch. SafeWatch employs a novel adaptive training algorithm which keeps updating the training dataset at runtime based on inferred hand positions in certain driving conditions. The evaluation with 75 real driving trips from 6 subjects shows that SafeWatch achieves over 97.0% recall and precision rates in detecting of the unsafe hand positions.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"128 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120865450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Breaking Out of the Cloud: Local Trust Management and Rendezvous in Named Data Networking of Things 突破云端:物联网命名数据中的本地信任管理与会合
Wentao Shang, Zhehao Wang, A. Afanasyev, J. Burke, Lixia Zhang
{"title":"Breaking Out of the Cloud: Local Trust Management and Rendezvous in Named Data Networking of Things","authors":"Wentao Shang, Zhehao Wang, A. Afanasyev, J. Burke, Lixia Zhang","doi":"10.1145/3054977.3054993","DOIUrl":"https://doi.org/10.1145/3054977.3054993","url":null,"abstract":"Many emerging IoT approaches depend on cloud services to facilitate interoperation of devices and services within them, even when all the communicating entities reside in the same local environment, as in many \"smart home\" applications. While such designs offer a straightforward way to implement IoT applications using today's TCP/IP protocol stack, they also introduce dependencies on external connectivity and services that are unnecessary and often brittle. This paper uses the design of an IoT-enabled home entertainment application, dubbed Flow, to demonstrate how the Named Data Networking (NDN) architecture enables cloud-independent IoT applications. NDN enables local trust management and rendezvous service, which play a foundational role in realizing other IoT services. By employing application-defined naming rather than host-based addressing at the network layer, and securing data directly, NDN enables straightforward and robust implementation of these two core functions for IoT networks without cloud connectivity. At the same time, NDN-based IoT designs can employ cloud services to complement local system capabilities. After describing the design and implementation of Flow, together with a discussion on preliminary generalization of the design, as an evaluation the paper conducts a brief thought exercise of how Flow could be realized using two popular IoT frameworks, Amazon's AWS IoT service and the Apple HomeKit framework, and compares that with the real implementation over NDN.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121230270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Designing a Micro-moving Target IPv6 Defense for the Internet of Things 面向物联网的微动目标IPv6防御设计
K. Zeitz, M. Cantrell, R. Marchany, J. Tront
{"title":"Designing a Micro-moving Target IPv6 Defense for the Internet of Things","authors":"K. Zeitz, M. Cantrell, R. Marchany, J. Tront","doi":"10.1145/3054977.3054997","DOIUrl":"https://doi.org/10.1145/3054977.3054997","url":null,"abstract":"As the use of low-power and low resource embedded devices continues to increase dramatically with the introduction of new Internet of Things (IoT) devices, security techniques are necessary which are compatible with these devices. This research advances the knowledge in the area of cyber security for the IoT through the exploration of a moving target defense to apply for limiting the time attackers may conduct reconnaissance on embedded systems while considering the challenges presented from IoT devices such as resource and performance constraints. We introduce the design and optimizations for a Micro-Moving Target IPv6 Defense including a description of the modes of operation, needed protocols, and use of lightweight hash algorithms. We also detail the testing and validation possibilities including a Cooja simulation configuration, and describe the direction to further enhance and validate the security technique through large scale simulations and hardware testing followed by providing information on other future considerations.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114934438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Demo Abstract: Enhanced Real-Time Machine Inspection with Mobile Augmented Reality for Maintenance and Repair 摘要:利用移动增强现实技术增强机器实时检测,用于维护和维修
Indika Wijesooriya, Damith Wijewardana, Tharindu De Silva, C. Gamage
{"title":"Demo Abstract: Enhanced Real-Time Machine Inspection with Mobile Augmented Reality for Maintenance and Repair","authors":"Indika Wijesooriya, Damith Wijewardana, Tharindu De Silva, C. Gamage","doi":"10.1145/3054977.3057302","DOIUrl":"https://doi.org/10.1145/3054977.3057302","url":null,"abstract":"We describe a system that we have built called ARIOT, an IoT (Internet of Things) enabled AR (Augmented Reality) wearable system to enhance the capabilities of machine operators and repairmen. ARIOT is a solution to the limited availability of highly capable and highly experienced machine inspectors in industrial environments.The outcome of this research and development project is an evaluation of the possibility of using a mobile Augmented Reality (AR)system, which communicates with various components of a machine to visualise real-time data pertaining to those components. For example, if there is an error or a potential error, the machine operator will be notified with a prompt to further instructions allowing a relatively inexperienced operator to learn on the job and for an expert to save valuable time.Also we focus on the modularity, extendability and security of communications within the system.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126822521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Enabling Micro-level Demand-Side Grid Flexiblity in Resource Constrained Environments 在资源受限的环境中实现微观层面的需求侧网格灵活性
D. P. D. L. Baridó, Javier Rosa, S. Suffian, E. Brewer, D. Kammen
{"title":"Enabling Micro-level Demand-Side Grid Flexiblity in Resource Constrained Environments","authors":"D. P. D. L. Baridó, Javier Rosa, S. Suffian, E. Brewer, D. Kammen","doi":"10.1145/3054977.3054984","DOIUrl":"https://doi.org/10.1145/3054977.3054984","url":null,"abstract":"The increased penetration of uncertain and variable renewable energy presents various resource and operational electric grid challenges 1 . Micro-level (household and small commercial) demand-side grid flexibility could be a cost-effective strategy to integrate high penetrations of wind and solar energy, but literature and field deployments exploring the necessary information and communication technologies (ICTs) are scant. This paper presents an exploratory framework for enabling information driven grid flexibility through the Internet of Things (IoT), and a proof-of-concept wireless sensor gateway (FlexBox) to collect the necessary parameters for adequately monitoring and actuating the micro-level demand-side. In the summer of 2015, thirty sensor gateways were deployed in the city of Managua (Nicaragua) to develop a baseline for a near future small-scale demand response pilot implementation. FlexBox field data has begun shedding light on relationships between ambient temperature and load energy consumption, load and building envelope energy efficiency challenges, latency communication network challenges, and opportunities to engage existing demand-side user behavioral patterns. Information driven grid flexibility strategies present great opportunity to develop new technologies, system architectures, and implementation approaches that can easily scale across regions, incomes, and levels of development.","PeriodicalId":179120,"journal":{"name":"2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121592322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信