2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)最新文献

筛选
英文 中文
Design and verification of IEEE 802.11ah for IoT and M2M applications 针对IoT和M2M应用的IEEE 802.11ah的设计和验证
Rami Akeela, Yacoub Elziq
{"title":"Design and verification of IEEE 802.11ah for IoT and M2M applications","authors":"Rami Akeela, Yacoub Elziq","doi":"10.1109/PERCOMW.2017.7917612","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917612","url":null,"abstract":"In order to efficiently support the Machine-to-Machine (M2M) and Internet of Things (IoT) applications, a new amendment for the Wi-Fi standard known as IEEE 802.11ah is introduced. In 802.11ah (or Wi-Fi HaLow), several enhanced MAC features are added in order to provide scalability for a large number of stations, increase the range of operation, while at the same time reduce the energy consumption compared to the existing Wi-Fi standards. In this paper, a Verilog RTL implementation of the new standard is presented. It is suitable for IoT, M2M, V2V (Vehicle-to-Vehicle) applications, and smart grids that require long battery life and long range reliability. Software simulations using Xilinx Vivado are also provided to verify the design. The design is then synthesized using the same tool, and performance, power, and area are reported.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117346564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
EyeAssist: A communication aid through gaze tracking for patients with neuro-motor disabilities EyeAssist:通过注视跟踪为神经运动障碍患者提供的交流辅助
A. Khasnobish, R. Gavas, D. Chatterjee, Ved Raj, S. Naitam
{"title":"EyeAssist: A communication aid through gaze tracking for patients with neuro-motor disabilities","authors":"A. Khasnobish, R. Gavas, D. Chatterjee, Ved Raj, S. Naitam","doi":"10.1109/PERCOMW.2017.7917593","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917593","url":null,"abstract":"The paper presents EyeAssist, a low cost, user friendly communication aid developed specifically for individuals suffering from neuro-motor problems. Existing gaze based typing systems encounter problems of unintentional key presses, extensive calibration process and inbuilt noise of eye trackers. We tried to solve these problems in the EyeAssist system by employing accurate gaze tracking. Fixation information are derived from the acquired gaze data. The systematic and variable noises of the eye tracker are being removed by graph signal processing based filters, Kalman filter and linear transformation. A unique one-time calibration which is subject and session independent has made the system easy to use without compromising its efficacy. The system has provision for setting variable dwell time according to users' preferences. EyeAssist also provides some unique features like text to speech conversion of typed sentences, predictive word and sentence entry etc. Results show that the average typing rate is 11.8 words per minute with an average error rate of 6.6%. Moreover the error rate reduces drastically with some practice. The system is user friendly, easy to use which makes it a perfect choice for patients suffering with neuro-motor disabilities.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129515119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Establishing trust in heterogeneous networks 在异构网络中建立信任
Dominik Schürmann
{"title":"Establishing trust in heterogeneous networks","authors":"Dominik Schürmann","doi":"10.1109/PERCOMW.2017.7917540","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917540","url":null,"abstract":"Many scenarios require confidential communication and protection against active attackers. The way to establish trust between devices and authenticate these networks depends completely on the scenario. In Body Area Networks human biometrics can serve as a shared secret among devices. In real-time voice communication, the ZRTP protocol allows for interactive trust establishment by recognizing the peer's voice. In asynchronous networks, such as email, other interactive mechanisms have been deployed, such as key fingerprint verification. In our research, we are analyzing the security and usability of existing trust mechanisms for heterogeneous networks. Furthermore, we are proposing protocol changes and new mechanisms to establish trust between devices. In this paper an overview is given over existing and upcoming research in this area. For synchronous networks, human biometrics, such as human gait or a peer's voice, are used as trust anchors. For asynchronous networks, the usability of interactive public-key verification mechanism are analyzed as trust anchors.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122380221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Good pervasive computing studies require laborious data labeling efforts: Our experience in activity recognition and indoor positioning studies 良好的普适计算研究需要艰苦的数据标记工作:我们在活动识别和室内定位研究方面的经验
T. Maekawa
{"title":"Good pervasive computing studies require laborious data labeling efforts: Our experience in activity recognition and indoor positioning studies","authors":"T. Maekawa","doi":"10.1109/PERCOMW.2017.7917506","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917506","url":null,"abstract":"Preparing and labeling sensing data are necessary when we develop state-of-the-art sensing devices or methods in our studies. Since developing and proposing new sensing devices or modalities are important in the pervasive computing and ubicomp research communities, we need to provide high quality labeled data by making use of our limited time whenever we develop a new sensing device. In this keynote talk, we first introduce our recent studies on activity recognition and indoor positioning based on machine learning. Later, we discuss important aspects of producing labeled data and share our experiences gathered during our research activities.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130158890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Practical Visible Light Communication system utilizing LED sensing 利用LED传感的实用可见光通信系统
Yanbing Yang
{"title":"Practical Visible Light Communication system utilizing LED sensing","authors":"Yanbing Yang","doi":"10.1109/PERCOMW.2017.7917541","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917541","url":null,"abstract":"While the traditional Visible Light Communication (VLC) system has attracted a lot of research attentions on boosting throughput, using Commercial Off-The-Shelf (COTS) devices, e.g. existing cameras on the smartphones, is a recent trend to implement readily deployable VLC systems. In particular, since LED-Camera VLC systems have shown a promising potential in large indoor communication due to the growing deployment of LED lighting infrastructure, a comprehensive VLC system with cooperative transmission and roaming support has become an impending need. To this end, we propose a novel VLC and visible light sensing (VLS) system to address that by leveraging LED sensing and effective encoding/decoding schemes. It is achieved first by utilizing LED sensing via converting parts of LED luminaire into light sensors to detect diffuse reflection change caused by presence of the user. After the users are detected and located, the system employs rateless codes and newly designed code assignment scheme to collaboratively transmit to detected users in their communication cells. We believe the proposed system has the potential to a roaming support VLC system in the whole building or indoor areas.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130899307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Size does matter - positioning on the wrist a comparative study: SmartWatch vs. SmartPhone 尺寸很重要——在手腕上的定位是一个比较研究:智能手表和智能手机
Gerold Hölzl, M. Kranz, A. Schmid, P. Halbmayer, A. Ferscha
{"title":"Size does matter - positioning on the wrist a comparative study: SmartWatch vs. SmartPhone","authors":"Gerold Hölzl, M. Kranz, A. Schmid, P. Halbmayer, A. Ferscha","doi":"10.1109/PERCOMW.2017.7917649","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917649","url":null,"abstract":"Indoor Positioning is a crucial topic to provide autonomous services to people based on their location. Nowadays dominating positioning systems, like GPS (Global Positioning System), are designed for outdoor use not applicable for indoor scenarios as they depend on a direct line of sight to reference stations. Recent progress in wearable computing peaked in the promising development of SmartWatches. They are seen as a successor of the SmartPhone evoking a new era of an always on, large scale, planet spanning, body sensor network. This work investigates in the question if SmartWatches are an accurate and suitable approach for an out of the lab, 24/7, real world Indoor Positioning System. In utilising Wi-Fi fingerprinting methodologies in combination with machine learning techniques, it is shown that state of the art consumer hardware in form of SmartWatches can be used to shape a cost effective, unobtrusive, and accurate indoor positioning system.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131773984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PassFrame: Generating image-based passwords from egocentric videos PassFrame:从以自我为中心的视频生成基于图像的密码
Ngu Nguyen, S. Sigg
{"title":"PassFrame: Generating image-based passwords from egocentric videos","authors":"Ngu Nguyen, S. Sigg","doi":"10.1109/PERCOMW.2017.7917518","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917518","url":null,"abstract":"In this paper, we analyse first-person-view videos to develop a personalized user authentication mechanism. Our proposed algorithm generates provisional image-based passwords which benefit a variety of purposes such as unlocking a mobile device or fallback authentication. First, representative frames are extracted from the egocentric videos. Then, they are split into distinguishable segments before a clustering procedure is applied to discard repetitive scenes. The whole process aims to retain memorable images to form the authentication challenges. We integrate eye tracking data to select informative sequences of video frames and suggest another alternative method if an eye-facing camera is not available. To evaluate our system, we perform experiments in different settings including object-interaction activities and traveling contexts. Even though our mechanism produces variable graphical passwords, the log-in effort for the user is comparable with approaches based on static challenges. We verified the authentication scheme in the presence of an informed attacker and observed that the effort is significantly higher than that of the legitimate user.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131912887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Understanding passenger reaction to dynamic prices in ride-on-demand service 了解乘客对随叫随到服务动态价格的反应
Suiming Guo, Yaxiao Liu, Ke Xu, D. Chiu
{"title":"Understanding passenger reaction to dynamic prices in ride-on-demand service","authors":"Suiming Guo, Yaxiao Liu, Ke Xu, D. Chiu","doi":"10.1109/PERCOMW.2017.7917517","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917517","url":null,"abstract":"In recent years emerging ride-on-demand services (eg., Uber or Didi) are penetrating into the market of traditional taxi service. In these new services mobile devices are a key enabler: they serve as the intermediary between passengers/drivers and the service provider, tracking the locations and behavior of both passengers and drivers. On the other hand, the use of mobile devices also help us to capture huge amount of data for analysis. Through collaboration with a leading service provider in China, we collect vast amount of accurate data and analyze, in this paper, passenger reaction to dynamic prices in such a service. We consider the analysis as an important step towards making the service more efficient and more attractive to the passengers. We present the patterns of passengers' reaction, and discuss if it is useful to estimate the trip fare for multiple times in order to get a lower price. Our findings pave the way for future study on system optimization and policy considerations.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134163093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A novel key generation algorithm from twitter data stream for secure communication in IoT 一种基于微博数据流的物联网安全通信密钥生成算法
P. Majumder, K. Sinha
{"title":"A novel key generation algorithm from twitter data stream for secure communication in IoT","authors":"P. Majumder, K. Sinha","doi":"10.1109/PERCOMW.2017.7917638","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917638","url":null,"abstract":"Secure wireless communication based applications in IoT typically require very short sessions. Stream ciphers constitute a popular choice for ensuring security of data communications in such applications. To keep the cost, complexity and energy expenditure in the implementation of such stream cipher algorithms low, the short duration of the wireless communication sessions are often exploited by using a lightweight cryptographic (LWC) algorithm. Such an LWC algorithm will provide the desired security during the short session at the required speed, and a new key will be used for the next session so that an adversary would not have enough time to decipher the key of any session. In this paper, we propose a technique based on generating stream of random keys from streaming twitter data. The sequence of random keys generated by the proposed tweet-based key generation (TBKG) algorithm has been tested by the NIST statistical test suite for randomness. The test results show that TBKG algorithm passes all the fifteen tests for randomness. Also, the period of the key values is quite high, thus making it suitable for use over short sessions involving communication of 350 MB data through the wireless network. The unpredictability of the generated random key values is governed by the unpredictable nature of the tweets from thousands of individuals. The algorithm is very simple to implement with low computational and energy overhead.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132659634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design and implementation of IoT-based HVAC system for future zero energy building 基于物联网的未来零能耗建筑暖通空调系统设计与实现
Myeong-in Choi, Keon-hee Cho, Junyeon Hwang, L. Park, Kyuhee Jang, Sunghwan Park, Sehyun Park
{"title":"Design and implementation of IoT-based HVAC system for future zero energy building","authors":"Myeong-in Choi, Keon-hee Cho, Junyeon Hwang, L. Park, Kyuhee Jang, Sunghwan Park, Sehyun Park","doi":"10.1109/PERCOMW.2017.7917631","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917631","url":null,"abstract":"Zero energy building (ZEB) technologies are under investigation as a solution to problems of greenhouse gas emissions and energy depletion. Not only to solving energy problems, but also future ZEB needs to provide a comfortable environment for building occupants. A HVAC systems are significant parts of ZEB technologies. However, the existing HVAC systems have several problems. To solve the problem, in this paper, we propose a IoT-based HVAC system (I-HVACS) for indoor air quality (IAQ) management and reduction of building energy consumption. The I-HVACS is implemented and demonstrated in a real building which is a senior care center in Republic of Korea. The power consumption in the building is reduced by about 13.7% compared with the existing system.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121995565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信