2019 IEEE International Conference on Smart Internet of Things (SmartIoT)最新文献

筛选
英文 中文
A New Method of Mobile Ad Hoc Network Routing Based on Improved GF Strategy 基于改进GF策略的移动Ad Hoc网络路由新方法
2019 IEEE International Conference on Smart Internet of Things (SmartIoT) Pub Date : 2019-08-01 DOI: 10.1109/SmartIoT.2019.00010
Ke Li, De-gan Zhang, J. Qiu, Lu Chen
{"title":"A New Method of Mobile Ad Hoc Network Routing Based on Improved GF Strategy","authors":"Ke Li, De-gan Zhang, J. Qiu, Lu Chen","doi":"10.1109/SmartIoT.2019.00010","DOIUrl":"https://doi.org/10.1109/SmartIoT.2019.00010","url":null,"abstract":"We propose a new mobile ad hoc network routing method based on improved GF (greedy forwarding) strategy in this paper. In the greedy forwarding phase, the reliable communication area is calculated, and then the quality of the link is evaluated according to the relative displacement between the nodes and the maintenance time of the link. Then, according to the quality of the link, the distance from the candidate node to the destination node, and the number of the neighbor nodes, the metric value is obtained, and the node with the large metric value is selected as the next hop. When a routing hole occurs, the waiting forwarding mode is used for a period of time. After a period of time, if the current node is still a routing hole node, the right-hand rule and the left-hand rule are used, and the bypass mode is performed simultaneously. By considering three factors of the deflection angle and the residual energy of the node and the maintenance time of the link, the forwarding node as the next hop with the highest priority value is selected in each direction. According to experiments, the method of this paper has achieved good experimental results.","PeriodicalId":240441,"journal":{"name":"2019 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133268441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vehicle Attribute Recognition Algorithm Based on Multi-task Learning 基于多任务学习的车辆属性识别算法
2019 IEEE International Conference on Smart Internet of Things (SmartIoT) Pub Date : 2019-08-01 DOI: 10.1109/SmartIoT.2019.00029
Jingying Sun, Chen Jia, Zhiguo Shi
{"title":"Vehicle Attribute Recognition Algorithm Based on Multi-task Learning","authors":"Jingying Sun, Chen Jia, Zhiguo Shi","doi":"10.1109/SmartIoT.2019.00029","DOIUrl":"https://doi.org/10.1109/SmartIoT.2019.00029","url":null,"abstract":"Vehicle attribute recognition in urban traffic monitoring is the core task in urban intelligent transportation system, Vehicle attribute recognition mainly includes sub-tasks such as vehicle type identification, vehicle color recognition, and vehicle brand recognition. Most of the current solutions are single-task learning based on a single attribute, and there are few studies on complex learning tasks with multiple attributes. This paper constructs a vehicle multi-attribute data set for the multi-attribute characteristics of vehicles, and based on the training mode of multitasking learning, Separate vehicle brand recognition network and vehicle color recognition network that are more suitable for their respective characteristics, and integrate vehicle multi-attribute identification network into the same model structure for training. By comparing the current popular neural network with several attributes, the final experiment shows that the vehicle multi-attribute recognition model trained by the algorithm can obtain better recognition results and higher accuracy.","PeriodicalId":240441,"journal":{"name":"2019 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"17 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132728207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dynamic Network Data Protection Algorithm Using Differential Privacy in Internet of Things 基于物联网差分隐私的动态网络数据保护算法
2019 IEEE International Conference on Smart Internet of Things (SmartIoT) Pub Date : 2019-08-01 DOI: 10.1109/SmartIoT.2019.00053
Songyan Li, Kang Dong, Zhaobin Liu, Zhiyang Li
{"title":"Dynamic Network Data Protection Algorithm Using Differential Privacy in Internet of Things","authors":"Songyan Li, Kang Dong, Zhaobin Liu, Zhiyang Li","doi":"10.1109/SmartIoT.2019.00053","DOIUrl":"https://doi.org/10.1109/SmartIoT.2019.00053","url":null,"abstract":"With the development of Internet of things, more and more personal information needs to be collected in the process of applying Internet of things technology, which brings about the problem of data privacy protection. The algorithm proposed in this paper uses the differential privacy model to process the information network collected by the wireless sensor network terminal in the perception layer of the Internet of things and transmits it to the network layer to achieve the purpose of information protection. In order to reduce the added differential privacy noise, this paper firstly makes dynamic community discovery of the network graph, and adds more noise to the edge of nodes within the community. Then the hierarchical random graph model is used to represent the network graph, and the noise is added to the connection probability between the nodes in the graph, instead of adding noise to the edge directly. Considering the dynamic change of the information collected by the wireless sensor network, this paper proposes a time window partition and dynamic network community discovery algorithm, and publishes a purification map for each time window. Through hierarchical sampling, the time cost is reduced and the cumulative error is reduced, while the network structure characteristics of the time window are maintained as far as possible. Theoretical analysis and experiments show that the algorithm proposed in this paper can preserve the important network structure characteristics of the original graph under the premise of satisfying the differential privacy protection model.","PeriodicalId":240441,"journal":{"name":"2019 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134644345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RetinaNet-Based Visual Inspection of Flexible Materials 基于retinanet的柔性材料视觉检测
2019 IEEE International Conference on Smart Internet of Things (SmartIoT) Pub Date : 2019-08-01 DOI: 10.1109/SmartIoT.2019.00077
Wenhao Wu, Liming Wu, Junchao Li, Shiman Wang, Gengzhe Zheng, Xinying He
{"title":"RetinaNet-Based Visual Inspection of Flexible Materials","authors":"Wenhao Wu, Liming Wu, Junchao Li, Shiman Wang, Gengzhe Zheng, Xinying He","doi":"10.1109/SmartIoT.2019.00077","DOIUrl":"https://doi.org/10.1109/SmartIoT.2019.00077","url":null,"abstract":"In the visual inspection of flexible materials such as textile surface, the amount of background information is too large, which leads to the problem that the key features need to be extracted is not obvious. The focal loss function is used to construct the RetinaNet and quickly filter out background information, so that the feature information is obtained faster, that is, the surface is flawed. RetinaNet using focal loss is a popular one-stage neural network model in recent years. Based on the feedforward residual network (ResNet), the feature pyramid network (FPN) is used to generate rich multi-scale convolution feature pyramids, which can quickly acquire The characteristics required are important for improving the detection speed of the surface of flexible materials.","PeriodicalId":240441,"journal":{"name":"2019 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130601230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A GIS-Based Optimize Routing Algorithm for VANET in Urban Scenarios 城市场景下基于gis的VANET优化路由算法
2019 IEEE International Conference on Smart Internet of Things (SmartIoT) Pub Date : 2019-08-01 DOI: 10.1109/SmartIoT.2019.00062
Weifeng Sun, Minghan Jia, Shumiao Yu, Guanghao Zhang, Tie Qiu
{"title":"A GIS-Based Optimize Routing Algorithm for VANET in Urban Scenarios","authors":"Weifeng Sun, Minghan Jia, Shumiao Yu, Guanghao Zhang, Tie Qiu","doi":"10.1109/SmartIoT.2019.00062","DOIUrl":"https://doi.org/10.1109/SmartIoT.2019.00062","url":null,"abstract":"The Vehicular ad-hoc network (VANET) is suitable for transmitting information in an intelligent transportation system in the smart city scenarios, but it requires real-time and accurate communications. To achieve effective data transferring, a geographic anchor constrained optimize routing algorithm (GACOR) is proposed, which introduces the global anchor. From a city scenario, relevant Geographic location factors were collected and processed by applying Geographic Information System (GIS) technology and GACOR plans the routing paths according to the global information and avoids the local optimum problem in the transmission processes. It also proposes the ideas of storing a local routing table and by which, some packets can be directly sent to the valid neighbor node without calculation. Simulation results show that GACOR can achieve lower packet loss rate and end-to-end delays compared to greedy perimeter stateless routing (GPSR) and Geographic Source Routing (GSR) for VANET in urban scenarios.","PeriodicalId":240441,"journal":{"name":"2019 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128524983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enabling Interoperability of Heterogeneous Identifiers of IoT via Semantic Code 通过语义代码实现物联网异构标识符的互操作性
2019 IEEE International Conference on Smart Internet of Things (SmartIoT) Pub Date : 2019-08-01 DOI: 10.1109/smartiot.2019.00056
Xiaotao Li, Shujuan You, Wai Chen
{"title":"Enabling Interoperability of Heterogeneous Identifiers of IoT via Semantic Code","authors":"Xiaotao Li, Shujuan You, Wai Chen","doi":"10.1109/smartiot.2019.00056","DOIUrl":"https://doi.org/10.1109/smartiot.2019.00056","url":null,"abstract":"In Internet of Things (IoT), a unique identifier is required for each object to serve as a digital identity and helps users to obtain detailed information about this object. However, due to the variety of IoT identifier frameworks used by different objects, IoT identifiers are heterogeneous from each other. Therefore, it is difficult for objects with heterogeneous identifiers to cooperate with each other without the human intervention. To address this issue, we propose a semantic-based identifier framework named Semantic Code (S-Code) to mediate between heterogeneous IoT identifiers. S-Code provides a semantic prefix for each legacy identifier and maps the identified objects to the IoT ontology. By S-Code, heterogeneous identifiers can be resolved in a uniform way, and objects can work together autonomously. To verify the effectiveness of S-Code, a self-service store use-case is presented, and the results confirm the capability of S-Code in supporting interoperability of heterogeneous identifiers of IoT.","PeriodicalId":240441,"journal":{"name":"2019 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129116738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Air Quality Monitoring Using IoT: A Survey 使用物联网进行空气质量监测:一项调查
2019 IEEE International Conference on Smart Internet of Things (SmartIoT) Pub Date : 2019-08-01 DOI: 10.1109/SmartIoT.2019.00028
Hocine Mokrani, Razika Lounas, M. Bennai, Dhai Eddine Salhi, Rachid Djerbi
{"title":"Air Quality Monitoring Using IoT: A Survey","authors":"Hocine Mokrani, Razika Lounas, M. Bennai, Dhai Eddine Salhi, Rachid Djerbi","doi":"10.1109/SmartIoT.2019.00028","DOIUrl":"https://doi.org/10.1109/SmartIoT.2019.00028","url":null,"abstract":"The increase in industrial activities and the rapid urbanization of human populations had a terrible effect on global air quality. Thousands of factories and billions of vehicles release enormous amounts of pollutants into the air every day; dangerously affecting human health. Many epidemiological studies pointed out the responsibility of air pollution in many health issues, the reason why monitoring air quality became an obligation to prevent or limit these issues. Conventional systems based on measuring stations are expensive and offer low data granularity. As a result, researchers are increasingly targeting IoT-based systems. However, elaborating a new system for air quality monitoring requires an awareness of the state of the art and the mastery of a certain amount of specific knowledge (pollutants, their health effects, the sensing equipment, the IoT possible configuration,...). This paper aims to answer these necessities by reviewing the existing works on air quality monitoring using IoT with the focus on lasted trends and challenges.","PeriodicalId":240441,"journal":{"name":"2019 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123182807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Enhanced Timestamp Scheme for Mitigating Replay Attacks in Secure ZigBee Networks 安全ZigBee网络中减轻重放攻击的增强时间戳方案
2019 IEEE International Conference on Smart Internet of Things (SmartIoT) Pub Date : 2019-08-01 DOI: 10.1109/SmartIoT.2019.00085
Fadi Farha, Huansheng Ning
{"title":"Enhanced Timestamp Scheme for Mitigating Replay Attacks in Secure ZigBee Networks","authors":"Fadi Farha, Huansheng Ning","doi":"10.1109/SmartIoT.2019.00085","DOIUrl":"https://doi.org/10.1109/SmartIoT.2019.00085","url":null,"abstract":"ZigBee stack has been introduced to satisfy the requirements for low-cost equipment and low-power consumption of the Internet of Things (IoT) infrastructure. To meet these requirements, many communication features are disabled or minimized, which affects the efficienty of the ZigBee network security. Previous work assumes that the deployment of frame counters is a good mechanism for blocking the replay attack in ZigBee networks. However, this paper proves that ZigBee networks, even with frame counters deployed, are still vulnerable to replay attacks. Moreover, we propose an enhanced timestamp scheme to block the replay attack permanently while maintaining low-power consumption. The proposed solution covers all ZigBee topologies and ZigBee End Devices (ZEDs) cases.","PeriodicalId":240441,"journal":{"name":"2019 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"303 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120975285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Floating-Point Multiplication Timing Attack on Deep Neural Network 基于深度神经网络的浮点乘法定时攻击
2019 IEEE International Conference on Smart Internet of Things (SmartIoT) Pub Date : 2019-08-01 DOI: 10.1109/SmartIoT.2019.00032
Gaofeng Dong, Ping Wang, Ping Chen, Ruizhe Gu, Honggang Hu
{"title":"Floating-Point Multiplication Timing Attack on Deep Neural Network","authors":"Gaofeng Dong, Ping Wang, Ping Chen, Ruizhe Gu, Honggang Hu","doi":"10.1109/SmartIoT.2019.00032","DOIUrl":"https://doi.org/10.1109/SmartIoT.2019.00032","url":null,"abstract":"Deep neural network (DNN) is being adopted in many security-critical and privacy-sensitive smart Internet of Things areas, such as smart city, smart home and intelligent transportation. Therefore, the data privacy of these DNN systems is of great concern. In this paper, we present a new timing side-channel attack, called FPMT attack, to recover the input images of a DNN implemented on microcontrollers. The proposed approach is the first to attack a DNN by exploiting the running time of floating-point multiplications. A passive attacker can obtain the running time from the power consumption trace and then use the time to infer the pixel values without knowing the detailed parameters of the network. Our results show that the FPMT attack can achieve 96.20% recognition accuracy for the MNIST dataset. When the inputs are handwritten digits or letters, attackers can even know what you write with the recovered images. This work puts forward a new direction of attacks on DNN and can be extended to more scenarios.","PeriodicalId":240441,"journal":{"name":"2019 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131245497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Local Differential Privacy Preserving Mechanism for Multi-attribute Data in Mobile Crowdsensing with Edge Computing 边缘计算移动众测中多属性数据的局部差分隐私保护机制
2019 IEEE International Conference on Smart Internet of Things (SmartIoT) Pub Date : 2019-08-01 DOI: 10.1109/SmartIoT.2019.00050
Zihui Song, Zhuo Li, Xin Chen
{"title":"Local Differential Privacy Preserving Mechanism for Multi-attribute Data in Mobile Crowdsensing with Edge Computing","authors":"Zihui Song, Zhuo Li, Xin Chen","doi":"10.1109/SmartIoT.2019.00050","DOIUrl":"https://doi.org/10.1109/SmartIoT.2019.00050","url":null,"abstract":"Preserving privacy of participants of sensing task and reducing the system consumption are two important problems in mobile crowdsensing (MCS). The privacy mechanism in MCS often takes complex computing and adds additional services. To reduce system cost while preserving privacy, we propose a new privatization mechanism based on edge computing in MCS. We introduce edge computing servers into the MCS network to protect the privacy of participants and reduce the load. Edge severs submit task results to the cloud platform instead of participants. To maximumize privatized data quality, we investigate the problem of maximizing availability under privacy budget constraints using the local differential privacy (LDP) theory. We design an algorithm CS-MDP to solve this problem, which preserves the privacy of multi-attribute data in mobile crowdsensing. The optimality of our algorithm is proved. Compared with PrivKV and LoPub, the efficiency of CS-MDP is proved through extensive experiments. Accuracy increased by an average of 40% and 20% respectively, compared to existing algorithms. The amount of data transmitted is reduced by 90% through the introduction of edge computing architecture.","PeriodicalId":240441,"journal":{"name":"2019 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133302842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信