A. Lall, A. Khandelwal, N. Nilesh, Sachin Chaudhari
{"title":"Improving IoT-based Smart Retrofit Model for Analog Water Meters using DL based Algorithm","authors":"A. Lall, A. Khandelwal, N. Nilesh, Sachin Chaudhari","doi":"10.1109/FiCloud57274.2022.00035","DOIUrl":"https://doi.org/10.1109/FiCloud57274.2022.00035","url":null,"abstract":"This paper proposes a deep learning (DL)-based algorithm which is used for improving the performance of digit detection from internet-of-things (IoT)-based analog water meters. The DL algorithm is trained on a rich dataset of over 160,000 images collected from six water nodes deployed at locations with different environmental conditions. A detailed comparison between the proposed DL and machine learning (ML) algorithm is made based on detection accuracy, feature analysis, error analysis, and computational complexity analysis. It is observed that compared to the ML model, the proposed DL model maintained a higher detection accuracy and is more generalized in terms of feature extraction, which makes the algorithm robust.","PeriodicalId":349690,"journal":{"name":"2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"388 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124802126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Robust Fog/Edge Computing Infrastructure with Risk Adjusted Multi-Connectivity","authors":"V. Marbukh","doi":"10.1109/FiCloud57274.2022.00029","DOIUrl":"https://doi.org/10.1109/FiCloud57274.2022.00029","url":null,"abstract":"Emerging communication infrastructures, including Fog/Edge computing, are expected to carry users/applications with wide range of Quality of Service (QoS) requirements. For missioncritical applications, in addition to the expected performance, these requirements also include limitations on risk of the performance deterioration below certain level. Since risk mitigation is possible at the cost of either reduced expected performance or expenditure of additional resources, e.g., transmission power in wireless networks, efficient risk mitigation should consider these inherent tradeoffs. However, even evaluation of the corresponding tradeoffs in large-scale networks is a challenging problem, let alone efficient managing them. In this paper we suggest that diverse user risk tolerance levels can be incorporated into conventional network optimization frameworks by replacing user rate/throughput with the Entropic Rate at Risk (ERaR). We consider risk due to scenario-based uncertainty, where different scenarios include a “normal” scenario without jamming as well as feasible jamming scenarios. We demonstrate that ERaR user maximization results in user multi-connectivity to several Base Stations (BSs) when benefits of connectivity diversification out weight the “inefficiencies” due to connectivity to “distant” BSs. We propose an approximate solution to ERaR maximization for risk averse users, which is based on linear interpolation between the corresponding solutions for risk neutral and extremely risk averse users. Future work should incorporate this user risk adjusted optimization into the overall system optimization for users with diverse risk tolerance levels through risk pricing.","PeriodicalId":349690,"journal":{"name":"2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129513781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Imène El-Taani, M. C. Boukala, S. Bouzefrane, Anissa Imen Amrous
{"title":"Robust approach for host-overload detection based on dynamic safety parameter","authors":"Imène El-Taani, M. C. Boukala, S. Bouzefrane, Anissa Imen Amrous","doi":"10.1109/FiCloud57274.2022.00044","DOIUrl":"https://doi.org/10.1109/FiCloud57274.2022.00044","url":null,"abstract":"Host-overloading detection is an important phase in the dynamic Virtual Machines (VMs) consolidation process. Using machine learning to predict the future workload on a host, is a very promising technique to avoid the overload host situation. In this work, we propose a novel approach for overloaded hosts detection, based on neural network and Markov model. The neural network is trained on a workload data set composed of VMs CPU-utilization history. The trained model is then used to predict the future usage for a given Physical Machine(PM), by summing up the predicted utilization of all its VMs. The confidence of this prediction is measured through a dynamic safety parameter, based on Markov model. The obtained results show that our approach outperforms the state of the art algorithms such as: MAD, IQR and LRR.","PeriodicalId":349690,"journal":{"name":"2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134011479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing and Hardening Embedded Linux Devices - case study based on NXP i.MX6 Platform","authors":"Marcin Bajer","doi":"10.1109/FiCloud57274.2022.00032","DOIUrl":"https://doi.org/10.1109/FiCloud57274.2022.00032","url":null,"abstract":"We have already gotten used to the fact software has become an integral part of almost every device we use. We are slowly getting used to our devices being interconnected with each other, controlling and monitoring crucial elements of our daily life and exchanging our private data. We are putting more and more trust in the embedded devices that are designed to help us out. Securing embedded devices was always a challenging task, but ubiquitous connectivity made it even much more important and difficult. As devices become smarter and highly interconnected there is more room for cybercriminals to exploit the system’s vulnerabilities to issue malicious control commands or create data breaches. The purpose of this paper is to describe the main security measures for protecting embedded Linux-based systems. It describes details of the implementation of a secure boot and a secure storage mechanism using embedded hardware features of NXP i.MX6 platform. In addition, the paper discusses methods for secure connection to the cloud and device provisioning with the support of TPM module. Overall, it provides practical guidelines on how to develop an embedded Linux device having security considerations in mind and summarizes the current state of knowledge on the topic.","PeriodicalId":349690,"journal":{"name":"2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133194248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ingrid Palma Araújo, Ronaldo C. R. de Araújo, Michel A. Ribeiro, E. Ishikawa, Ana C. B. Reis, Christiano A. M. Rodopoulos
{"title":"Design and Evaluation of IoT Gateway for Data Prioritization based on Van Emde Boas Tree","authors":"Ingrid Palma Araújo, Ronaldo C. R. de Araújo, Michel A. Ribeiro, E. Ishikawa, Ana C. B. Reis, Christiano A. M. Rodopoulos","doi":"10.1109/FiCloud57274.2022.00040","DOIUrl":"https://doi.org/10.1109/FiCloud57274.2022.00040","url":null,"abstract":"Critical data can require actions immediate (rate appropriate to the context) as well as priority in routing the device to the Cloud. In this sense, one of the contributions of this work is to show that the prioritization of packets originating from IoT devices, which travel between Local Gateway and Cloud Gateway, via HTTPS protocols, using data structures such as Heap (Fibonacci and Binominal) and Van Emde Ems (vEB tree) are more effective than commonly used FIFO queues. Another contribution of this work is the adaptation of the mentioned data structures to the IoT. The results showed the huge advantage of vEB tree over Heaps implemented primarily in a context with the large quantity of data.","PeriodicalId":349690,"journal":{"name":"2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114639105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cluster based Indoor Localization for Energy Consumption Enhancement","authors":"Celine Serbouh, Iness Ahriz, Wafa Njima, Amina Lammari","doi":"10.1109/FiCloud57274.2022.00046","DOIUrl":"https://doi.org/10.1109/FiCloud57274.2022.00046","url":null,"abstract":"To perform indoor localization in Internet of Things networks, mobile devices transmit an extra information. This extra communication increases the energy consumed. In this paper, we aim to overcome the problem of energy consumption inherent to localization process in such networks. Thus, we propose a clustering strategy that will be able to reduce the size of measurement vector that will be transmitted and the traveling distance. The preliminary simulation results show the efficiency of the proposed method in terms of transmitted power and computational complexity without degrading the localization accuracy compared to a conventional localization scheme.","PeriodicalId":349690,"journal":{"name":"2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121967502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HolonCraft – An Architecture for Dynamic Construction of Smart Home Workflows","authors":"Zhuo Wang, Yehia El-khatib, Abdessalam Elhabbash","doi":"10.1109/FiCloud57274.2022.00036","DOIUrl":"https://doi.org/10.1109/FiCloud57274.2022.00036","url":null,"abstract":"Smart home systems have developed rapidly and entered the daily lives of many people. However, it is difficult for products from different manufacturers to work together due to the interoperability barriers posed by divergent hardware, communication protocols and APIs. In this paper, we introduce HolonCraft as a tool to help the regular IoT user in building complex systems. HolonCraft builds on the Holon ontology which enables systems to share their descriptions so that devices can recognize and understand each other and their respective functions, and work together through composing a system of systems (SoS) at runtime to fulfill a given user workflow. HolonCraft extends the machine-readable information provided by the Holon ontology and uses open-source editors (namely Google Blockly and Microsoft Monaco) to implement a cross-platform graphical programming editor for smart home automation. HolonCraft automatically transforms device capabilities into visual programming elements, enabling users without programming backgrounds to design smart home automation through simple drag-and-drop operations while also supporting advanced programming features such as branches, loops and functions. It then type-checks the composed workflow and, accordingly, generates code to actualize it. In consequence, HolonCraft dramatically improves the abstraction and expressiveness of automation as indicated by our user experiments.","PeriodicalId":349690,"journal":{"name":"2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122140700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Khelifi, Aveen Muhamad, H. Ehtesham, Muhammed Ghazal
{"title":"A Reliable Handless System for Elevators Using Touchless Technology","authors":"A. Khelifi, Aveen Muhamad, H. Ehtesham, Muhammed Ghazal","doi":"10.1109/FiCloud57274.2022.00052","DOIUrl":"https://doi.org/10.1109/FiCloud57274.2022.00052","url":null,"abstract":"Building lifts are among the most-touched surfaces in a multi-tenant office.Covid-19 pandemic forces certain types of buildings to be provided with a level of health and safety protection measures which can avoid spread of the contagious diseases. Touchless technologies may be beneficial in the case of virus transmission through surfaces that regularly come into contact with infected people. People would be able to prevent unwanted interaction with polluted surfaces using keycard swiping, voice control, or face recognition technologies. The work herein is called a “Handless Elevator”, where it is considering a touchless elevator controlling system.The study has been implemented with mobile application part and microcontroller as the core of the hardware part. Users are expected to operate the elevator without any special training, and its functioning must be comparable to that of regular elevators.","PeriodicalId":349690,"journal":{"name":"2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128667327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verifying Timed Commitment Specifications for IoT-Cloud Systems with Uncertainty","authors":"Ghalya Alwhishi, J. Bentahar, Ahmed Elwhishi","doi":"10.1109/FiCloud57274.2022.00031","DOIUrl":"https://doi.org/10.1109/FiCloud57274.2022.00031","url":null,"abstract":"Cloud Computing plays an essential role in meeting the increasing demand for large data storage and infrastructures in IoT applications. The applications of IoT-Cloud are in an exponential rise in the number of interacting components with different interaction protocols within open and uncertain environments. The main challenge that faces these applications is ensuring their reliability and efficiency. This paper proposes a scalable verification approach for IoT-Cloud applications in uncertainty-characterised settings with timed commitments using three-valued model checking. Timed commitments are powerful artifacts that capture flexible and rich interaction protocols. We use a new logic for reasoning about uncertainty in commitment protocols, model a smart contract-based IoT mortgage system with commitments under uncertain settings, introduce a set of specifications, and implement a verification framework of our model against its specifications using a transformation algorithm and the ${MCMAS}_{+}$ model checker. Finally, we report and discuss our experimental results.","PeriodicalId":349690,"journal":{"name":"2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130766118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FiCloud-2022 Program Committee","authors":"","doi":"10.1109/ficloud57274.2022.00007","DOIUrl":"https://doi.org/10.1109/ficloud57274.2022.00007","url":null,"abstract":"","PeriodicalId":349690,"journal":{"name":"2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"2 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132444466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}