{"title":"TW-Fogginess: A Trustworthy IoT System based on Mist and Fog Computing","authors":"Franklin Magalhães Ribeiro Junior, C. Kamienski","doi":"10.1109/ISCC53001.2021.9631540","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631540","url":null,"abstract":"Fog and mist computing support the autonomy of distributed IoT devices, maintaining system execution temporally during the cloud network disconnection. However, fog and mist infrastructures should keep data flow continuity, especially if an IoT application requires real-time analysis. We introduce and assess the TW-Fogginess system, which deploys data filtering, resilience, and security mechanisms in a mist-fog-based IoT system. TW-Fogginess contains mist and fog agents, storing data during a network disconnection and reducing transmitted data volume when the communication returns. We use 5,000 simulated sensors in stable connection and during fog and cloud disconnection scenarios. We observe that mist and fog reduce the data size by 89.57% and 95.55%, respectively, in a network reconnection. We evidence that the mist reduces the encrypted data batch transfer time by 23.33% or by 97.11% in a specific situation. Fog reduces the same metric by 40% using RSA encryption and 63.7% with no data encryption.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122120746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Su, Fangyuan Yuan, Yulin Yuan, Li Zeng, Chi Chen
{"title":"VoFSQ: An Efficient File-Sharing Interactive Verification Protocol","authors":"S. Su, Fangyuan Yuan, Yulin Yuan, Li Zeng, Chi Chen","doi":"10.1109/ISCC53001.2021.9631478","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631478","url":null,"abstract":"This paper explores the possibility of improving the verification of file-sharing qualification in Blockchain-based File-Sharing system. Previous work, such as Filecoin, proposes an interactive protocol for file storage scenario. It enables file-holders to prove that the file is stored in independent storage without disclosing the content of the file. However, it uses a heavy cryptographic machinery zk-SNARKs and needs a trusted third party to generate public parameters. This paper proposes an efficient file-sharing verification protocol: Verifications of File-Sharing Qualification (VoFSQ). VoFSQ allows file-holders to verify with each other whether the shared-file has been preserved for a period of time. Users who compete for file-sharing qualification need to spend a certain amount of computing and storage resources to generate the shared-files based evidence files. Take into the cost into account, users will prefer using idle hard disk to preserve the evidence file continuously other than delete and regenerate it. Compared to the protocol of Filecoin, VoFSQ is more efficient in the prover and verifier proof phases. Meanwhile, VoFSQ does not disclose the private information of shared-file, and does not rely on trusted third parties. This paper also implements and tests VoFSQ, experimental results show that protocol can be executed efficiently.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126435885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anonymous Authentication Protocol for Efficient Communications in Vehicle to Grid Networks*","authors":"Abdallah Belkaaloul, B. A. Bensaber","doi":"10.1109/ISCC53001.2021.9631258","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631258","url":null,"abstract":"Rapid multiplication of electric vehicles requires the implementation of a new infrastructure to sustain their operations. For instance, charging these vehicles batteries necessitates a connection that allows information exchanges between vehicle and infrastructure. These exchanges are managed by a network called V2G (Vehicle to Grid), which is governed by the ISO 15118 standard. This last recommends the use of X.509 hierarchical PKI to protect the network communications against attacks. Although several authors have identified and criticized the shortcomings of this proposal, but no one provides a robust and effective remedial solution to alleviate them. This paper proposes an efficient protocol that addresses these shortcomings while respecting the concepts of the ISO 15118 standard. It fulfills the most important security requirements i.e. confidentiality, anonymity, integrity and non-repudiation. The validity and effectiveness of the proposed protocol were confirmed using the formal modeling tool Tamarin Prover and the RISE- V2G simulator.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129428457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain Address Transparency with DNS","authors":"M. Caldeira, M. Correia","doi":"10.1109/ISCC53001.2021.9631542","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631542","url":null,"abstract":"Blockchain systems have gained popularity in the last few years. The services they provide go from monetary transactions to digital forms of identification and many others. However, blockchain addresses are long numbers that are not adequate for human use, as they are hard to remember and manage. This work considers the use of the Domain Name System (DNS) as a means for users of any blockchain to use domain names to identify blockchain addresses. Similarly to the way DNS stores mappings of IP addresses to domain names, we offer a solution that allows it to also keep mappings of blockchain addresses to domain names. Our solution, Domain Name System for Blockchain-type Addresses (DNSBA), allows any blockchain address to be easily substituted by an associated domain name.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128269128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shili Hu, Jiangfeng Li, Qinpei Zhao, Chenxi Zhang, Zi-jian Zhang, Yang Shi
{"title":"BlockDL: Privacy-Preserving and Crowd-Sourced Deep Learning Through Blockchain","authors":"Shili Hu, Jiangfeng Li, Qinpei Zhao, Chenxi Zhang, Zi-jian Zhang, Yang Shi","doi":"10.1109/ISCC53001.2021.9631423","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631423","url":null,"abstract":"Deep learning has become a key technology on modeling large amounts of multi-sourced data. For privacy concerns, the data sharing among companies and organizations is increasingly difficult. In this paper, we present a crowd-sourced federated learning solution to train neural networks with a hybrid blockchain architecture. Smart contracts are used to share data authentications on the main chain, where the proxy re-encryption is for the privacy preserving. A consensus-based asynchronous practical byzantine federated learning (APBFL) algorithm is proposed on the side chains, to improve the model reliability and security. Experiments show that our solution is efficient, secure and robust.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128289439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of the reduction of NDT in WSN with asymmetric schedule-based asynchronous duty cycle mechanisms","authors":"Andre Saraiva, D. Passos, C. Albuquerque","doi":"10.1109/ISCC53001.2021.9631398","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631398","url":null,"abstract":"With the development of wireless technologies and the proliferation of sensors, Wireless Sensor Networks (WSNs) have been widely used in many applications. However, their energy constraints make energy reduction one of the main project concerns. Among the several solutions in the literature, schedule-based asynchronous duty cycle methods are the simplest because they do not require synchronization mechanisms, protocols nor specific hardware, while facilitating the entry of new nodes. However, scenarios with sporadic events can benefit from nodes operating on different schedules. This work evaluates asymmetric asynchronous duty cycle schedules for possible use in such scenarios. Using numerical simulations, we show that, for some asymmetrical pairs of schedules, the overlap of active slots is guaranteed which enables the communication between the nodes. Also, depending on the choice of the pairs of schedules, an asymmetric setup allows a reduction in the Neighbor Discovery Time in relation to the symmetric methods.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120901288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adverse Event Report Classification in Social and Medico-Social Sector","authors":"Yinuo Li, Touria Aït El Mekki, Jin-Kao Hao","doi":"10.1109/ISCC53001.2021.9631493","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631493","url":null,"abstract":"Adverse event (AE) analysis is one of the most important missions in French social and medico-social centers, which enables targeted prevention measures to avoid recurrences. However, social and medico-social centers are struggling to conduct an efficient analysis of AEs due to the abysmal quality of event reports. In this paper, we propose an automated classification solution to predict the fact of an AE from the event description to ease the decision-making task of center managers. This solution explores different text similarity methods based on a dedicated terminology of synonyms for the social and medico-social sector in being able to propose the most appropriate facts. The approach has the advantage of being fast with an accurate prediction since it achieved an accuracy up to 88%, when it is tested on 388 real AE reports.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121171854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guillaume Gingras, Mehdi Adda, A. Bouzouane, Hussein Ibrahim, C. Dallaire
{"title":"Forecasting Trends in an Ambient Assisted Living Environment Using Deep Learning","authors":"Guillaume Gingras, Mehdi Adda, A. Bouzouane, Hussein Ibrahim, C. Dallaire","doi":"10.1109/ISCC53001.2021.9631404","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631404","url":null,"abstract":"Ambient Assisted Living (AAL) aims at assisting people in their Activities of Daily Living (ADL). We have seen an increased interest in their applicability to the rural seniors who are slowly losing their autonomy due to aging and chronic diseases. By deploying intelligent devices in the environment of an individual performing their ADLs, we can gather data in the form of a time series. One research venue is to seek to use forecasting techniques to discover trends and predict future trends that could be used to analyze the health of these individuals. With the recent advances in computational power new deep learning forecasting algorithms have been developed. In this paper, we compare a univariate one-dimensional CNN model and a LSTM model that performs multi-step forecasting for one week ahead. The novel dataset used comes from a set of activity and health related sensors deployed in a small apartment that uses our previously designed analytics architecture. We compare these to a forecasting baseline strategy. Both deep learning approaches increase the forecasting accuracy significantly.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"590 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122361105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ashwin Kannoth, Cungang Yang, Manuel Angel Guanipa Larice
{"title":"Hand Gesture Recognition Using CNN & Publication of World's Largest ASL Database","authors":"Ashwin Kannoth, Cungang Yang, Manuel Angel Guanipa Larice","doi":"10.1109/ISCC53001.2021.9631255","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631255","url":null,"abstract":"Sign language is used throughout the world by the hearing impaired to communicate. Recent advancements in Computer Vision and Deep Learning has given rise to many machine learning based translators. In this research paper, a solution to recognize the English alphabet presented as static signs in the American Sign Language (ASL) is proposed. The classifications are achieved by a four layer CNN. The model is trained and tested on a dataset created for this paper. This dataset will be published as a contribution to the community and is currently the world's largest ASL database consisting of 624,000 images. Split into two sections, the database contains images in both the IR and RGB spectrum. Classifications on both sets of data achieve state-of-the-art results when compared to similar research. An accuracy of 99.89% and 99.91 % are achieved when classifying the IR and RGB datasets respectively.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126115787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Cardoso-Pereira, Gisele Lobo-Pappa, Heitor S. Ramos
{"title":"Neural Architecture Search for Resource-Constrained Internet of Things Devices","authors":"I. Cardoso-Pereira, Gisele Lobo-Pappa, Heitor S. Ramos","doi":"10.1109/ISCC53001.2021.9631535","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631535","url":null,"abstract":"The traditional process of extracting knowledge from the Internet of Things (IoT) happens through Cloud Computing by offloading the data generated in the IoT device to processing in the cloud. However, this regime significantly increases data transmission and monetary costs and may have privacy issues. Therefore, it is paramount to find solutions that achieve good results and can be processed as close as possible to an IoT object. In this scenario, we developed a Neural Architecture Search (NAS) solution to generate models small enough to be deployed to IoT devices without significantly losing inference performance. We based our approach on Evolutionary Algorithms, such as Grammatical Evolution and NSGA-II. Using model size and accuracy as fitness, our proposal generated a Convolutional Neural Network model with less than 2 MB, achieving an accuracy of about 81 % in the CIFAR-10 and 99 % in MNIST, with only 150 thousand parameters approximately.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128155206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}