2021 IEEE Symposium on Computers and Communications (ISCC)最新文献

筛选
英文 中文
TW-Fogginess: A Trustworthy IoT System based on Mist and Fog Computing TW-Fogginess:基于雾和雾计算的可信赖物联网系统
2021 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2021-09-05 DOI: 10.1109/ISCC53001.2021.9631540
Franklin Magalhães Ribeiro Junior, C. Kamienski
{"title":"TW-Fogginess: A Trustworthy IoT System based on Mist and Fog Computing","authors":"Franklin Magalhães Ribeiro Junior, C. Kamienski","doi":"10.1109/ISCC53001.2021.9631540","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631540","url":null,"abstract":"Fog and mist computing support the autonomy of distributed IoT devices, maintaining system execution temporally during the cloud network disconnection. However, fog and mist infrastructures should keep data flow continuity, especially if an IoT application requires real-time analysis. We introduce and assess the TW-Fogginess system, which deploys data filtering, resilience, and security mechanisms in a mist-fog-based IoT system. TW-Fogginess contains mist and fog agents, storing data during a network disconnection and reducing transmitted data volume when the communication returns. We use 5,000 simulated sensors in stable connection and during fog and cloud disconnection scenarios. We observe that mist and fog reduce the data size by 89.57% and 95.55%, respectively, in a network reconnection. We evidence that the mist reduces the encrypted data batch transfer time by 23.33% or by 97.11% in a specific situation. Fog reduces the same metric by 40% using RSA encryption and 63.7% with no data encryption.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122120746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
VoFSQ: An Efficient File-Sharing Interactive Verification Protocol VoFSQ:一个高效的文件共享交互式验证协议
2021 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2021-09-05 DOI: 10.1109/ISCC53001.2021.9631478
S. Su, Fangyuan Yuan, Yulin Yuan, Li Zeng, Chi Chen
{"title":"VoFSQ: An Efficient File-Sharing Interactive Verification Protocol","authors":"S. Su, Fangyuan Yuan, Yulin Yuan, Li Zeng, Chi Chen","doi":"10.1109/ISCC53001.2021.9631478","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631478","url":null,"abstract":"This paper explores the possibility of improving the verification of file-sharing qualification in Blockchain-based File-Sharing system. Previous work, such as Filecoin, proposes an interactive protocol for file storage scenario. It enables file-holders to prove that the file is stored in independent storage without disclosing the content of the file. However, it uses a heavy cryptographic machinery zk-SNARKs and needs a trusted third party to generate public parameters. This paper proposes an efficient file-sharing verification protocol: Verifications of File-Sharing Qualification (VoFSQ). VoFSQ allows file-holders to verify with each other whether the shared-file has been preserved for a period of time. Users who compete for file-sharing qualification need to spend a certain amount of computing and storage resources to generate the shared-files based evidence files. Take into the cost into account, users will prefer using idle hard disk to preserve the evidence file continuously other than delete and regenerate it. Compared to the protocol of Filecoin, VoFSQ is more efficient in the prover and verifier proof phases. Meanwhile, VoFSQ does not disclose the private information of shared-file, and does not rely on trusted third parties. This paper also implements and tests VoFSQ, experimental results show that protocol can be executed efficiently.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126435885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anonymous Authentication Protocol for Efficient Communications in Vehicle to Grid Networks* 车辆与网格网络高效通信的匿名认证协议*
2021 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2021-09-05 DOI: 10.1109/ISCC53001.2021.9631258
Abdallah Belkaaloul, B. A. Bensaber
{"title":"Anonymous Authentication Protocol for Efficient Communications in Vehicle to Grid Networks*","authors":"Abdallah Belkaaloul, B. A. Bensaber","doi":"10.1109/ISCC53001.2021.9631258","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631258","url":null,"abstract":"Rapid multiplication of electric vehicles requires the implementation of a new infrastructure to sustain their operations. For instance, charging these vehicles batteries necessitates a connection that allows information exchanges between vehicle and infrastructure. These exchanges are managed by a network called V2G (Vehicle to Grid), which is governed by the ISO 15118 standard. This last recommends the use of X.509 hierarchical PKI to protect the network communications against attacks. Although several authors have identified and criticized the shortcomings of this proposal, but no one provides a robust and effective remedial solution to alleviate them. This paper proposes an efficient protocol that addresses these shortcomings while respecting the concepts of the ISO 15118 standard. It fulfills the most important security requirements i.e. confidentiality, anonymity, integrity and non-repudiation. The validity and effectiveness of the proposed protocol were confirmed using the formal modeling tool Tamarin Prover and the RISE- V2G simulator.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129428457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Blockchain Address Transparency with DNS 区块链DNS地址透明度
2021 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2021-09-05 DOI: 10.1109/ISCC53001.2021.9631542
M. Caldeira, M. Correia
{"title":"Blockchain Address Transparency with DNS","authors":"M. Caldeira, M. Correia","doi":"10.1109/ISCC53001.2021.9631542","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631542","url":null,"abstract":"Blockchain systems have gained popularity in the last few years. The services they provide go from monetary transactions to digital forms of identification and many others. However, blockchain addresses are long numbers that are not adequate for human use, as they are hard to remember and manage. This work considers the use of the Domain Name System (DNS) as a means for users of any blockchain to use domain names to identify blockchain addresses. Similarly to the way DNS stores mappings of IP addresses to domain names, we offer a solution that allows it to also keep mappings of blockchain addresses to domain names. Our solution, Domain Name System for Blockchain-type Addresses (DNSBA), allows any blockchain address to be easily substituted by an associated domain name.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128269128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BlockDL: Privacy-Preserving and Crowd-Sourced Deep Learning Through Blockchain BlockDL:通过区块链进行隐私保护和众包深度学习
2021 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2021-09-05 DOI: 10.1109/ISCC53001.2021.9631423
Shili Hu, Jiangfeng Li, Qinpei Zhao, Chenxi Zhang, Zi-jian Zhang, Yang Shi
{"title":"BlockDL: Privacy-Preserving and Crowd-Sourced Deep Learning Through Blockchain","authors":"Shili Hu, Jiangfeng Li, Qinpei Zhao, Chenxi Zhang, Zi-jian Zhang, Yang Shi","doi":"10.1109/ISCC53001.2021.9631423","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631423","url":null,"abstract":"Deep learning has become a key technology on modeling large amounts of multi-sourced data. For privacy concerns, the data sharing among companies and organizations is increasingly difficult. In this paper, we present a crowd-sourced federated learning solution to train neural networks with a hybrid blockchain architecture. Smart contracts are used to share data authentications on the main chain, where the proxy re-encryption is for the privacy preserving. A consensus-based asynchronous practical byzantine federated learning (APBFL) algorithm is proposed on the side chains, to improve the model reliability and security. Experiments show that our solution is efficient, secure and robust.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128289439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of the reduction of NDT in WSN with asymmetric schedule-based asynchronous duty cycle mechanisms 基于非对称调度的异步占空比WSN无损检测降低评估
2021 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2021-09-05 DOI: 10.1109/ISCC53001.2021.9631398
Andre Saraiva, D. Passos, C. Albuquerque
{"title":"Evaluation of the reduction of NDT in WSN with asymmetric schedule-based asynchronous duty cycle mechanisms","authors":"Andre Saraiva, D. Passos, C. Albuquerque","doi":"10.1109/ISCC53001.2021.9631398","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631398","url":null,"abstract":"With the development of wireless technologies and the proliferation of sensors, Wireless Sensor Networks (WSNs) have been widely used in many applications. However, their energy constraints make energy reduction one of the main project concerns. Among the several solutions in the literature, schedule-based asynchronous duty cycle methods are the simplest because they do not require synchronization mechanisms, protocols nor specific hardware, while facilitating the entry of new nodes. However, scenarios with sporadic events can benefit from nodes operating on different schedules. This work evaluates asymmetric asynchronous duty cycle schedules for possible use in such scenarios. Using numerical simulations, we show that, for some asymmetrical pairs of schedules, the overlap of active slots is guaranteed which enables the communication between the nodes. Also, depending on the choice of the pairs of schedules, an asymmetric setup allows a reduction in the Neighbor Discovery Time in relation to the symmetric methods.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120901288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adverse Event Report Classification in Social and Medico-Social Sector 社会和医疗-社会部门不良事件报告分类
2021 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2021-09-05 DOI: 10.1109/ISCC53001.2021.9631493
Yinuo Li, Touria Aït El Mekki, Jin-Kao Hao
{"title":"Adverse Event Report Classification in Social and Medico-Social Sector","authors":"Yinuo Li, Touria Aït El Mekki, Jin-Kao Hao","doi":"10.1109/ISCC53001.2021.9631493","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631493","url":null,"abstract":"Adverse event (AE) analysis is one of the most important missions in French social and medico-social centers, which enables targeted prevention measures to avoid recurrences. However, social and medico-social centers are struggling to conduct an efficient analysis of AEs due to the abysmal quality of event reports. In this paper, we propose an automated classification solution to predict the fact of an AE from the event description to ease the decision-making task of center managers. This solution explores different text similarity methods based on a dedicated terminology of synonyms for the social and medico-social sector in being able to propose the most appropriate facts. The approach has the advantage of being fast with an accurate prediction since it achieved an accuracy up to 88%, when it is tested on 388 real AE reports.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121171854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forecasting Trends in an Ambient Assisted Living Environment Using Deep Learning 使用深度学习预测环境辅助生活环境的趋势
2021 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2021-09-05 DOI: 10.1109/ISCC53001.2021.9631404
Guillaume Gingras, Mehdi Adda, A. Bouzouane, Hussein Ibrahim, C. Dallaire
{"title":"Forecasting Trends in an Ambient Assisted Living Environment Using Deep Learning","authors":"Guillaume Gingras, Mehdi Adda, A. Bouzouane, Hussein Ibrahim, C. Dallaire","doi":"10.1109/ISCC53001.2021.9631404","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631404","url":null,"abstract":"Ambient Assisted Living (AAL) aims at assisting people in their Activities of Daily Living (ADL). We have seen an increased interest in their applicability to the rural seniors who are slowly losing their autonomy due to aging and chronic diseases. By deploying intelligent devices in the environment of an individual performing their ADLs, we can gather data in the form of a time series. One research venue is to seek to use forecasting techniques to discover trends and predict future trends that could be used to analyze the health of these individuals. With the recent advances in computational power new deep learning forecasting algorithms have been developed. In this paper, we compare a univariate one-dimensional CNN model and a LSTM model that performs multi-step forecasting for one week ahead. The novel dataset used comes from a set of activity and health related sensors deployed in a small apartment that uses our previously designed analytics architecture. We compare these to a forecasting baseline strategy. Both deep learning approaches increase the forecasting accuracy significantly.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"590 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122361105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hand Gesture Recognition Using CNN & Publication of World's Largest ASL Database 使用CNN的手势识别和世界上最大的美国手语数据库的出版
2021 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2021-09-05 DOI: 10.1109/ISCC53001.2021.9631255
Ashwin Kannoth, Cungang Yang, Manuel Angel Guanipa Larice
{"title":"Hand Gesture Recognition Using CNN & Publication of World's Largest ASL Database","authors":"Ashwin Kannoth, Cungang Yang, Manuel Angel Guanipa Larice","doi":"10.1109/ISCC53001.2021.9631255","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631255","url":null,"abstract":"Sign language is used throughout the world by the hearing impaired to communicate. Recent advancements in Computer Vision and Deep Learning has given rise to many machine learning based translators. In this research paper, a solution to recognize the English alphabet presented as static signs in the American Sign Language (ASL) is proposed. The classifications are achieved by a four layer CNN. The model is trained and tested on a dataset created for this paper. This dataset will be published as a contribution to the community and is currently the world's largest ASL database consisting of 624,000 images. Split into two sections, the database contains images in both the IR and RGB spectrum. Classifications on both sets of data achieve state-of-the-art results when compared to similar research. An accuracy of 99.89% and 99.91 % are achieved when classifying the IR and RGB datasets respectively.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126115787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Neural Architecture Search for Resource-Constrained Internet of Things Devices 资源受限物联网设备的神经结构搜索
2021 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2021-09-05 DOI: 10.1109/ISCC53001.2021.9631535
I. Cardoso-Pereira, Gisele Lobo-Pappa, Heitor S. Ramos
{"title":"Neural Architecture Search for Resource-Constrained Internet of Things Devices","authors":"I. Cardoso-Pereira, Gisele Lobo-Pappa, Heitor S. Ramos","doi":"10.1109/ISCC53001.2021.9631535","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631535","url":null,"abstract":"The traditional process of extracting knowledge from the Internet of Things (IoT) happens through Cloud Computing by offloading the data generated in the IoT device to processing in the cloud. However, this regime significantly increases data transmission and monetary costs and may have privacy issues. Therefore, it is paramount to find solutions that achieve good results and can be processed as close as possible to an IoT object. In this scenario, we developed a Neural Architecture Search (NAS) solution to generate models small enough to be deployed to IoT devices without significantly losing inference performance. We based our approach on Evolutionary Algorithms, such as Grammatical Evolution and NSGA-II. Using model size and accuracy as fitness, our proposal generated a Convolutional Neural Network model with less than 2 MB, achieving an accuracy of about 81 % in the CIFAR-10 and 99 % in MNIST, with only 150 thousand parameters approximately.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128155206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信