2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)最新文献

筛选
英文 中文
A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes 智能家居中物联网应用的隐私保护通信协议
Tianyi Song, Ruinian Li, Bo Mei, Jiguo Yu, Xiaoshuang Xing, Xiuzhen Cheng
{"title":"A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes","authors":"Tianyi Song, Ruinian Li, Bo Mei, Jiguo Yu, Xiaoshuang Xing, Xiuzhen Cheng","doi":"10.1109/IIKI.2016.3","DOIUrl":"https://doi.org/10.1109/IIKI.2016.3","url":null,"abstract":"Internet of things is the trending direction when it comes to designing smart living environment. One of the popular applications of Internet of things is the smart home system. A smart home system usually consists of various types of connected sensors, actuators, appliances and a controller. The controller analyzes the data reported by the sensors and sends out messages to electric appliances and other sensors to ask them to behave accordingly. There are a lot of smart home designs proposed in the literature to make the systems smarter and more comfortable. However, little work has considered the security and privacy issues in smart home systems. In this paper, we analyze the differences of security and privacy issues that lie in the smart home systems, smart grid, and wireless sensor networks. Further, we propose our own solutions that achieves privacy preservation during the communications between end sensors and appliances and the controller.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122792076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 170
Optimization Coverage Control Algorithm Based on Square Monitoring Area in Wireless Sensor Networks 无线传感器网络中基于方形监控区域的优化覆盖控制算法
Zeyu Sun, Ben Yan, Mengluo Ji, Huihui Wang
{"title":"Optimization Coverage Control Algorithm Based on Square Monitoring Area in Wireless Sensor Networks","authors":"Zeyu Sun, Ben Yan, Mengluo Ji, Huihui Wang","doi":"10.1109/IIKI.2016.82","DOIUrl":"https://doi.org/10.1109/IIKI.2016.82","url":null,"abstract":"In the k-coverage process of the target area, the wireless sensor network is easy to generate a great number of redundant nodes, consume a great deal of nodes energy in the network and is restricted by environmental factors. Based on the above deficiencies, this paper puts forward an optimization connected coverage algorithm based on rule area (optimization coverage control algorithm, OCCA). By using the double squares, this algorithm puts target nodes into the inner square area and establishes the correlation model by the sensor nodes and target nodes. As for the whole coverage area, the minimum number of sensor nodes is calculated through the expected value. The simulation shows that this algorithm can effectively complete the coverage of the target area at a low cost. Thus the effectiveness of the algorithm is verified. By using the algorithm, the allocation of network resources is reduced and the covering and connecting performance of the network can be better evaluated.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116021821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SINR-Q-CSMA: Carrier Sense Multiple Access Based on Queue Length under SINR SINR- q - csma:基于SINR下队列长度的载波感知多址
Zhaofeng Niu, Jiguo Yu, Xiuzhen Cheng, Tianyi Song
{"title":"SINR-Q-CSMA: Carrier Sense Multiple Access Based on Queue Length under SINR","authors":"Zhaofeng Niu, Jiguo Yu, Xiuzhen Cheng, Tianyi Song","doi":"10.1109/IIKI.2016.100","DOIUrl":"https://doi.org/10.1109/IIKI.2016.100","url":null,"abstract":"With the development of the Internet of Things (IoT), wireless sensor networks (WSNs) play a more and more important issue. Energy efficiency, one of the crucial performance indices, is always considered for design of protocols and algorithms in WSNs. In this paper, we focus on data frame transmission under SINR (signal to interference plus noise ratio) model. An efficient mechanism, called as SINR-Q-CSMA, is proposed. SINR-Q-CSMA combines dual-channel with time slotted methods, and considers sink circle and regular circle according to different scenarios, which can avoid collision problem effectively. Further, SINR-Q-CSMA employs a solution based on queue length to solve the collision.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115459879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personal Information Prediction Based on Movie Rating Data 基于电影评分数据的个人信息预测
Bo Mei, Xiaolu Cheng, Xiaoshuang Xing, Bowu Zhang, Wei Cheng
{"title":"Personal Information Prediction Based on Movie Rating Data","authors":"Bo Mei, Xiaolu Cheng, Xiaoshuang Xing, Bowu Zhang, Wei Cheng","doi":"10.1109/IIKI.2016.84","DOIUrl":"https://doi.org/10.1109/IIKI.2016.84","url":null,"abstract":"Movies are a major form of entertainment in the US. There are a dozens of websites focusing on movie information. On most of the websites, ratings and reviews from the users play an important role. When a user gives a movie a certain score, the user not only reflects his taste toward that movie but also potentially exposes his personal information. In this paper, we investigated several movie genres. In each genre, movies were classified into different clusters by using expectationmaximization (EM) algorithm. The classification criteria were built upon audience movie rating scores and existing user information. As a result, a new or anonymous users personal information could be predicted when he rated movies on movie-related websites. Moreover, newly released movies could be easily classified into corresponding clusters to assistant user information discovery. The revealed personal information was very useful and could be utilized in different ways such as increasing the accuracy for delivering user-related ads.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114653428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Correctness of the Chord Protocol Chord协议的正确性
Bojan Marinkovic, Z. Ognjanovic, Paola Glavan, A. Umek
{"title":"Correctness of the Chord Protocol","authors":"Bojan Marinkovic, Z. Ognjanovic, Paola Glavan, A. Umek","doi":"10.1109/IIKI.2016.65","DOIUrl":"https://doi.org/10.1109/IIKI.2016.65","url":null,"abstract":"The Chord protocol is one of the first, simplest and most popular overlay protocol. This paper describes the Chord protocol using the logic of time and knowledge. The formalization concerns Chord actions that maintain ring topology. We consider the case when the nodes are not allowed to fail or leave and prove the correctness with respect to it.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122149278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security in Internet of Things: Opportunities and Challenges 物联网安全:机遇与挑战
Wei Wei, Andrew T. Yang, Weisong Shi
{"title":"Security in Internet of Things: Opportunities and Challenges","authors":"Wei Wei, Andrew T. Yang, Weisong Shi","doi":"10.1109/IIKI.2016.35","DOIUrl":"https://doi.org/10.1109/IIKI.2016.35","url":null,"abstract":"Internet of Things (IoT) have become the most pervasive and largest computing platform nowadays. Security plays a more and more important role because of the nature of IoT systems that deals with people's daily life. IoT systems are often composed of low capable devices, which are devices with low computational capability, limited energy supply, or small memory size, some traditional security solutions, such as asymmetric key based protocols and IP-based solutions, cannot be effectively applied to IoT systems. Other factors, such as the tight coupling between the cyber system and the physical world, the heterogeneity of IoT devices and IoT communication protocols, and the extremely large system scale, make it more challenging to secure IoT systems. Within the context of a general IoT system architecture, this paper investigates special security issues, identifies new challenges, and explores alternative designs of deploying security solutions.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125528538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Artificial Haze Immune Algorithm for Image Processing 图像处理中的人工雾免疫算法
Yanhui Guo, Lin Meng, Xiaobing Tang, Yufeng Shi, Han Cao, Y. Bai
{"title":"Artificial Haze Immune Algorithm for Image Processing","authors":"Yanhui Guo, Lin Meng, Xiaobing Tang, Yufeng Shi, Han Cao, Y. Bai","doi":"10.1109/IIKI.2016.14","DOIUrl":"https://doi.org/10.1109/IIKI.2016.14","url":null,"abstract":"The Intelligent Transportation Systems bring a safely and comfortable motorized society, which are based on image processing such as predicting/detecting the danger of vehicles collecting the transport information to control the traffic flow on traffic control systems etc. However, with the pollution of environment, the fog/haze becomes a serious problem, causing the image deterioration or degradation and the Intelligent Transportation Systems lose their functions. This paper proposed an immunological method of image processing for detecting the fog/haze in the image to support Intelligent Transportation Systems. This state-of-the-art method is based on the theory of biological defence system, which unites the reducing of fog/haze and edge detection. The experimental results show that our proposed haze immunized algorithm can remove effect of haze on image processing algorithm. Compared to conventional de-haze image processing algorithm, our proposed algorithm unitizes bio-inspired algorithm to achieve efficient hardware consumption. The results of FPGA implementation show less hardware usage than conventional method.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130319754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Evaluation of Product Quality Perceived Value Based on Text Mining and Fuzzy Comprehensive Evaluation 基于文本挖掘和模糊综合评价的产品质量感知价值评价研究
Lifeng He, Ning Zhang, Lemin Yin
{"title":"Research on the Evaluation of Product Quality Perceived Value Based on Text Mining and Fuzzy Comprehensive Evaluation","authors":"Lifeng He, Ning Zhang, Lemin Yin","doi":"10.1109/IIKI.2016.95","DOIUrl":"https://doi.org/10.1109/IIKI.2016.95","url":null,"abstract":"Over the past ten years, with the deepening and expansion of the application of Internet technology, more and more customers browse a lot of online reviews to understand the product and service reputation. Online reviews can provide decision support for consumers to purchase satisfactory product and the product customer satisfaction is mainly determined by product quality perceived value. This article will establish a new quality perceived value evaluation method by combining relatively mature test mining method with fuzzy comprehensive evaluation method. This evaluation model will be user oriented and more reflect the real needs of users. The new evaluation model will provide better decision support for consumers to buy satisfactory product.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"38 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114013069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Big-Data-Driven Credit Reporting Framework for SMEs in China 中国中小企业大数据驱动的信用报告框架
Yunchuan Sun, Chunlei Li, Xuegang Cui, Guangzhi Zhang, Xiaoping Zeng, Xueying Chang, Dengbiao Tu, Yongping Xiong
{"title":"A Novel Big-Data-Driven Credit Reporting Framework for SMEs in China","authors":"Yunchuan Sun, Chunlei Li, Xuegang Cui, Guangzhi Zhang, Xiaoping Zeng, Xueying Chang, Dengbiao Tu, Yongping Xiong","doi":"10.1109/IIKI.2016.46","DOIUrl":"https://doi.org/10.1109/IIKI.2016.46","url":null,"abstract":"SMEs (Small and Medium-size Enterprises) in China always face financing constraints and hardly obtain bank loans under unsound financing system. In external f Academic literature has shown that widespread information asymmetry may prevent the efficient allocation of lending, leading to credit rationing. Currently, most credit reporting, models for SMEs in China are primarily based on hard information about the enterprises and their owners but lack comprehensive evaluation based on the combination with soft information. To bridge the gap for SMEs, we propose a novel big-data-driven credit reporting framework which presents a new credit reporting system by including big data in business, finance, and social networks. The proposed approach features in capturing diversified data online, conducting evaluation and analysis in real-time, and automatically generating online credit reports for SMEs, banks, and government. It also provides an efficient interactive way for SMEs to check credit reports online.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131847015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Validity Analysis of Fractional Age Assumptions under Rational Interpolating Method 有理插值法下分数年龄假设的有效性分析
Xia Zhao, Shilong Li
{"title":"Validity Analysis of Fractional Age Assumptions under Rational Interpolating Method","authors":"Xia Zhao, Shilong Li","doi":"10.1109/IIKI.2016.118","DOIUrl":"https://doi.org/10.1109/IIKI.2016.118","url":null,"abstract":"Validity analysis plays important role in the study of fractional age assumptions (FAAs), which assures assumption methods be effective. This paper investigate the validity conditions of FAA under RIM introduced in Li et al. (2013). A new sufficient validity condition is obtained, which also revised one mistake in Theorem 1 of Li et al. (2013). And the necessary and sufficient condition is found, which gives the accurate range of the parameter, even a little complex in analytical form. Simulation shows a clear comparison between these two conditions. These results perfect FAA under RIM in theoretical viewpoint, and are helpful to choose appropriate parameter in actuarial practice of life insurance.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134144833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信