ACM Transactions on Internet of Things最新文献

筛选
英文 中文
A Survey on IoT Profiling, Fingerprinting, and Identification 物联网分析、指纹和身份识别研究综述
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-05-31 DOI: 10.1145/3539736
Miraqa Safi, S. Dadkhah, Farzaneh Shoeleh, Hassan Mahdikhani, Heather Molyneaux, A. Ghorbani
{"title":"A Survey on IoT Profiling, Fingerprinting, and Identification","authors":"Miraqa Safi, S. Dadkhah, Farzaneh Shoeleh, Hassan Mahdikhani, Heather Molyneaux, A. Ghorbani","doi":"10.1145/3539736","DOIUrl":"https://doi.org/10.1145/3539736","url":null,"abstract":"The proliferation of heterogeneous Internet of things (IoT) devices connected to the Internet produces several operational and security challenges, such as monitoring, detecting, and recognizing millions of interconnected IoT devices. Network and system administrators must correctly identify which devices are functional, need security updates, or are vulnerable to specific attacks. IoT profiling is an emerging technique to identify and validate the connected devices’ specific behaviour and isolate the suspected and vulnerable devices within the network for further monitoring. This article provides a comprehensive review of various IoT device profiling methods and provides a clear taxonomy for IoT profiling techniques based on different security perspectives. We first investigate several current IoT device profiling techniques and their applications. Next, we analyzed various IoT device vulnerabilities, outlined multiple features, and provided detailed information to implement profiling algorithms’ risk assessment/mitigation stage. By reviewing approaches for profiling IoT devices, we identify various state-of-the-art methods that organizations of different domains can implement to satisfy profiling needs. Furthermore, this article also discusses several machine learning and deep learning algorithms utilized for IoT device profiling. Finally, we discuss challenges and future research possibilities in this domain.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90803755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
6TiSCH – IPv6 Enabled Open Stack IoT Network Formation: A Review 6TiSCH -支持IPv6的开放堆栈物联网网络形成:综述
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-05-10 DOI: 10.1145/3536166
Alakesh Kalita, M. Khatua
{"title":"6TiSCH – IPv6 Enabled Open Stack IoT Network Formation: A Review","authors":"Alakesh Kalita, M. Khatua","doi":"10.1145/3536166","DOIUrl":"https://doi.org/10.1145/3536166","url":null,"abstract":"The IPv6 over IEEE 802.15.4e TSCH mode (6TiSCH) network is intended to provide reliable and delay bounded communication in multi-hop and scalable Industrial Internet of Things (IIoT). The IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) link layer protocol allows the nodes to change their physical channel after each transmission to eliminate interference and multi-path fading on the channels. However, due to this feature, new nodes (aka pledges) take more time to join the 6TiSCH network, resulting in significant energy consumption and inefficient data transmission, which makes the communication unreliable. Therefore, the formation of 6TiSCH network has gained immense interest among the researchers. To date, numerous solutions have been offered by various researchers in order to speed up the formation of 6TiSCH networks. This article briefly discusses about the 6TiSCH network and its formation process, followed by a detailed survey on the works that considered 6TiSCH network formation. We also perform theoretical analysis and real testbed experiments for a better understanding of the existing works related to 6TiSCH network formation. This article is concluded after summarizing the research challenges in 6TiSCH network formation and providing a few open issues in this domain of work.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83734341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IoTRepair: Flexible Fault Handling in Diverse IoT Deployments iorepair:灵活处理各种物联网部署中的故障
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-05-09 DOI: 10.1145/3532194
Michael Norris, Z. Berkay Celik, P. Venkatesh, Shulin Zhao, P. Mcdaniel, A. Sivasubramaniam, Gang Tan
{"title":"IoTRepair: Flexible Fault Handling in Diverse IoT Deployments","authors":"Michael Norris, Z. Berkay Celik, P. Venkatesh, Shulin Zhao, P. Mcdaniel, A. Sivasubramaniam, Gang Tan","doi":"10.1145/3532194","DOIUrl":"https://doi.org/10.1145/3532194","url":null,"abstract":"IoT devices can be used to complete a wide array of physical tasks, but due to factors such as low computational resources and distributed physical deployment, they are susceptible to a wide array of faulty behaviors. Many devices deployed in homes, vehicles, industrial sites, and hospitals carry a great risk of damage to property, harm to a person, or breach of security if they behave faultily. We propose a general fault handling system named IoTRepair, which shows promising results for effectiveness with limited latency and power overhead in an IoT environment. IoTRepair dynamically organizes and customizes fault-handling techniques to address the unique problems associated with heterogeneous IoT deployments. We evaluate IoTRepair by creating a physical implementation mirroring a typical home environment to motivate the effectiveness of this system. Our evaluation showed that each of our fault-handling functions could be completed within 100 milliseconds after fault identification, which is a fraction of the time that state-of-the-art fault-identification methods take (measured in minutes). The power overhead is equally small, with the computation and device action consuming less than 30 milliwatts. This evaluation shows that IoTRepair not only can be deployed in a physical system, but offers significant benefits at a low overhead.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86952542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Classification Strategy for Internet of Things Data Based on the Class Separability Analysis of Time Series Dynamics 基于时间序列动态类可分性分析的物联网数据分类策略
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-05-09 DOI: 10.1145/3533049
J. B. Borges, Heitor S. Ramos, A. Loureiro
{"title":"A Classification Strategy for Internet of Things Data Based on the Class Separability Analysis of Time Series Dynamics","authors":"J. B. Borges, Heitor S. Ramos, A. Loureiro","doi":"10.1145/3533049","DOIUrl":"https://doi.org/10.1145/3533049","url":null,"abstract":"This article proposes TSCLAS, a time series classification strategy for the Internet of Things (IoT) data, based on the class separability analysis of their temporal dynamics. Given the large number and incompleteness of IoT data, the use of traditional classification algorithms is not possible. Thus, we claim that solutions for IoT scenarios should avoid using raw data directly, preferring their transformation to a new domain. In the ordinal patterns domain, it is possible to capture the temporal dynamics of raw data to distinguish them. However, to be applied to this challenging scenario, TSCLAS follows a strategy for selecting the best parameters for the ordinal patterns transformation based on maximizing the class separability of the time series dynamics. We show that our method is competitive compared to other classification algorithms from the literature. Furthermore, TSCLAS is scalable concerning the length of time series and robust to the presence of missing data gaps on them. By simulating missing data gaps as long as 50% of the data, our method could beat the accuracy of the compared classification algorithms. Besides, even when losing in accuracy, TSCLAS presents lower computation times for both training and testing phases.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84637334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Unsupervised Dynamic Sensor Selection for IoT-Based Predictive Maintenance of a Fleet of Public Transport Buses 基于物联网的公交车队预测性维护的无监督动态传感器选择
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-04-20 DOI: 10.1145/3530991
P. Killeen, I. Kiringa, T. Yeap
{"title":"Unsupervised Dynamic Sensor Selection for IoT-Based Predictive Maintenance of a Fleet of Public Transport Buses","authors":"P. Killeen, I. Kiringa, T. Yeap","doi":"10.1145/3530991","DOIUrl":"https://doi.org/10.1145/3530991","url":null,"abstract":"In recent years, big data produced by the Internet of Things has enabled new kinds of useful applications. One such application is monitoring a fleet of vehicles in real time to predict their remaining useful life. The consensus self-organized models (COSMO) approach is an example of a predictive maintenance system. The present work proposes a novel Internet of Things based architecture for predictive maintenance that consists of three primary nodes: the vehicle node, the server leader node, and the root node, which enable on-board vehicle data processing, heavy-duty data processing, and fleet administration, respectively. A minimally viable prototype of the proposed architecture was implemented and deployed to a local bus garage in Gatineau, Canada. The present work proposes improved consensus self-organized models (ICOSMO), a fleet-wide unsupervised dynamic sensor selection algorithm. To analyze the performance of ICOSMO, a fleet simulation was implemented. The J1939 data gathered from a hybrid bus was used to generate synthetic data in the simulations. Simulation results that compared the performance of the COSMO and ICOSMO approaches revealed that in general ICOSMO improves the average area under the curve of COSMO by approximately 1.5% when using the Cosine distance and 0.6% when using Hellinger distance.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85588113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
LA-MQTT: Location-aware Publish-subscribe Communications for the Internet of Things LA-MQTT:物联网的位置感知发布-订阅通信
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-04-20 DOI: 10.1145/3529978
Federico Montori, Lorenzo Gigli, L. Sciullo, M. D. Felice
{"title":"LA-MQTT: Location-aware Publish-subscribe Communications for the Internet of Things","authors":"Federico Montori, Lorenzo Gigli, L. Sciullo, M. D. Felice","doi":"10.1145/3529978","DOIUrl":"https://doi.org/10.1145/3529978","url":null,"abstract":"Nowadays, several Internet of Things (IoT) deployments use publish-subscribe paradigms to disseminate IoT data to a pool of interested consumers. At the moment, the most widespread standard for such scenarios is MQTT. We also register an increasing interest in IoT-enabled Location-Based Services, where data must be disseminated over a target area and its spatial relevance and the current positions of the consumers must be taken into account. Unfortunately, the MQTT protocol does not support location awareness, and hence it may result in notifying consumers that are geographically far from the data source, causing increased network overhead and poor Quality of Service (QoS). We address the issue by proposing LA-MQTT, an extension to standard MQTT supporting spatial-aware publish-subscribe communications on IoT scenarios. LA-MQTT is broker-agnostic and fully backward compatible with standard MQTT. As monitoring the position of subscribers over time may cause privacy concerns, LA-MQTT carefully supports location privacy preservation, for which the optimal tradeoff with the QoS of the spatial notifications is addressed via a learning-based algorithm. We demonstrate the effectiveness of LA-MQTT by experimentally evaluating its features via large-scale hybrid simulations, including real and virtual components. Finally, we provide a Proof of Concept real implementation of an LA-MQTT scenario.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77596971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Haunted House: Physical Smart Home Event Verification in the Presence of Compromised Sensors 鬼屋:存在受损传感器的物理智能家居事件验证
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-04-11 DOI: 10.1145/3506859
S. Birnbach, Simon Eberz, I. Martinovic
{"title":"Haunted House: Physical Smart Home Event Verification in the Presence of Compromised Sensors","authors":"S. Birnbach, Simon Eberz, I. Martinovic","doi":"10.1145/3506859","DOIUrl":"https://doi.org/10.1145/3506859","url":null,"abstract":"In this article, we verify physical events using data from an ensemble of smart home sensors. This approach both protects against event sensor faults and sophisticated attackers. To validate our system’s performance, we set up a “smart home” in an office environment. We recognize 22 event types using 48 sensors over the course of two weeks. Using data from the physical sensors, we verify the event stream supplied by the event sensors to detect both masking and spoofing attacks. We consider three threat models: a zero-effort attacker, an opportunistic attacker, and a sensor-compromise attacker who can arbitrarily modify live sensor data. For spoofed events, we achieve perfect classification for 9 out of 22 events and achieve a 0% false alarm rate at a detection rate exceeding 99.9% for 15 events. For 11 events the majority of masking attacks can be detected without causing any false alarms. We also show that even a strong opportunistic attacker is inherently limited to spoofing few select events and that doing so involves lengthy waiting periods. Finally, we demonstrate the vulnerability of a single-classifier system to compromised sensor data and introduce a more secure approach based on sensor fusion.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74137814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Runtime Resource Management and Provisioning Middleware for Fog Computing Infrastructures 面向雾计算基础设施的运行时资源管理和供应中间件
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-04-11 DOI: 10.1145/3506718
A. Miele, Henry Zárate, Luca Cassano, C. Bolchini, Jorge E. Ortiz
{"title":"A Runtime Resource Management and Provisioning Middleware for Fog Computing Infrastructures","authors":"A. Miele, Henry Zárate, Luca Cassano, C. Bolchini, Jorge E. Ortiz","doi":"10.1145/3506718","DOIUrl":"https://doi.org/10.1145/3506718","url":null,"abstract":"The pervasiveness and growing processing capabilities of mobile and embedded systems have enabled the widespread diffusion of the Fog Computing paradigm in the Internet of Things scenario, where computing is directly performed at the edges of the networked infrastructure in distributed cyber-physical systems. This scenario is characterized by a highly dynamic workload and architecture in which applications enter and leave the system, as well as nodes and connections. This article proposes a runtime resource management and provisioning middleware for the dynamic distribution of the applications on the processing resources. The proposed middleware consists of a two-level hierarchy: (i) a global Fog Orchestrator monitoring the architecture status and (ii) a Local Agent on each node, performing a fine-grain tuning of its resources. The co-operation between these components allows one to dynamically adapt and exploit the fine-grain nodes view for fulfilling the defined system-level goals, for example, minimizing power consumption while meeting Quality of Service requirements such as application throughput. This hierarchical architecture and the adopted policies offer a unified optimization strategy that is unique with regard to existing approaches that typically focus on a single aspect of resource management at runtime. A middleware prototype is presented and experimentally evaluated in a Smart Building case study.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88500311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Evaluation of Group OSCORE for Secure Group Communication in the Internet of Things 面向物联网安全群组通信的群组OSCORE性能评价
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-03-26 DOI: 10.1145/3523064
M. Gunnarsson, Krzysztof Mateusz Malarski, Rikard Höglund, Marco Tiloca
{"title":"Performance Evaluation of Group OSCORE for Secure Group Communication in the Internet of Things","authors":"M. Gunnarsson, Krzysztof Mateusz Malarski, Rikard Höglund, Marco Tiloca","doi":"10.1145/3523064","DOIUrl":"https://doi.org/10.1145/3523064","url":null,"abstract":"The Constrained Application Protocol (CoAP) is a major application-layer protocol for the Internet of Things (IoT). The recently standardized security protocol Object Security for Constrained RESTful Environments (OSCORE) efficiently provides end-to-end security of CoAP messages at the application layer, also in the presence of untrusted intermediaries. At the same time, CoAP supports one-to-many communication, targeting use cases such as smart lighting and building automation, firmware update, or emergency broadcast. Securing group communication for CoAP has additional challenges. It can be done using the novel Group Object Security for Constrained RESTful Environments (Group OSCORE) security protocol, which fulfills the same security requirements of OSCORE in group communication environments. While evaluations of OSCORE are available, no studies exist on the performance of Group OSCORE on resource-constrained IoT devices. This article presents the results of our extensive performance evaluation of Group OSCORE over two popular constrained IoT platforms, namely Zolertia Zoul and TI Simplelink. We have implemented Group OSCORE for the Contiki-NG operating system and made our implementation available as open source software. We compared Group OSCORE against unprotected CoAP as well as OSCORE. To the best of our knowledge, this is the first comprehensive and experimental evaluation of Group OSCORE over real constrained IoT devices.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85206956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QID: Robust Mobile Device Recognition via a Multi-Coil Qi-Wireless Charging System QID:基于多线圈qi无线充电系统的稳健移动设备识别
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-03-17 DOI: 10.1145/3498904
Deliang Yang, Guoliang Xing, Jun Huang, Xiangmao Chang, Xiaofan Jiang
{"title":"QID: Robust Mobile Device Recognition via a Multi-Coil Qi-Wireless Charging System","authors":"Deliang Yang, Guoliang Xing, Jun Huang, Xiangmao Chang, Xiaofan Jiang","doi":"10.1145/3498904","DOIUrl":"https://doi.org/10.1145/3498904","url":null,"abstract":"Recent years have witnessed the increasing penetration of wireless charging base stations in the workplace and public areas, such as airports and cafeterias. Such an emerging wireless charging infrastructure has presented opportunities for new indoor localization and identification services for mobile users. In this paper, we present QID, the first system that can identify a Qi-compliant mobile device during wireless charging in real-time. QID extracts features from the clock oscillator and control scheme of the power receiver and employs light-weight algorithms to classify the device. QID adopts a 2-dimensional motion unit to emulate a variety of multi-coil designs of Qi, which allows for fine-grained device fingerprinting. Our results show that QID achieves high recognition accuracy. With the prevalence of public wireless charging stations, our results also have important implications for mobile user privacy.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90193759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信