{"title":"Neighbor discovery algorithms for friendship establishment in the social Internet of Things","authors":"Roberto Girau, Salvatore Martis, L. Atzori","doi":"10.1109/WF-IoT.2016.7845484","DOIUrl":"https://doi.org/10.1109/WF-IoT.2016.7845484","url":null,"abstract":"In the Social Internet of Things (SIoT), objects establish social relationships to create a social network of devices that fosters inter-object communications by improving network navigability and trustworthiness evaluation. An important process of this model is the neighbors discover that should be implemented by each object to create new relationships. Differently from past neighbors discovery works, in the SIoT scenario, the devices need to discover each other when they are assumed to be already able to communicate to the Internet and additionally they do not have to set up direct device-to-device communications after the discovery. These aspects call for the definition of new algorithms, which are the major contribution of this paper. Specifically, three solutions are proposed: the first one relies on the channel scanning; the second one assumes that channel scanning is not possible and makes use of the device localization features; the third one is similar to the second one, but the already existing objects social network is exploited.","PeriodicalId":373932,"journal":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117018020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A trust-based scheme employing evidence reasoning for IoT architectures","authors":"Alexandros G. Fragkiadakis, E. Tragos","doi":"10.1109/WF-IoT.2016.7845509","DOIUrl":"https://doi.org/10.1109/WF-IoT.2016.7845509","url":null,"abstract":"IoT architectures heavily depend on wireless resource-constrained nodes that collect and transmit a plethora of information. The broadband wireless medium enables malicious nodes to perform a number of attacks. Cryptographic means along with trust-based schemes are often deployed to combat these attacks. We propose a centralised trust-based scheme where all nodes monitor their neighbors, and report their findings to a fusion center. Each report is followed by a reliability measure, computed using the Signal-to-Interference-plus-Noise-Ratio. Fusion is performed employing a belief distribution with reliability method. We consider malicious nodes that periodically drop packets based on some probability. The evaluation results show that the proposed scheme can accurately detect the malicious behavior.","PeriodicalId":373932,"journal":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124564661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pull support for IoT applications using mobile access framework WebMaDa","authors":"C. Schmitt, Claudio Anliker, B. Stiller","doi":"10.1109/WF-IoT.2016.7845426","DOIUrl":"https://doi.org/10.1109/WF-IoT.2016.7845426","url":null,"abstract":"While the application range of Internet-of-Things (IoT) is manifold, all applications have monitoring purposes in common, but they usually lack (a) data collection options independent of pre-defined timing intervals and (b) a mobile access. Both options are requested by user that what to be informed about events (e.g., accidents, noise) even when not at home offering quick reactions (e.g., calling the ambulance, police, fire department) in case of emergency. Therefore, this paper introduces WebMaDa — a mobile access framework with a fine-grained privilege management solution. It allows authorized users to monitor collected data and to request data immediately and location-independent. if the user's access for pulling data is granted, the request is forward to the collection point (node) in the network, which answers with a full data set including all data available. Since some of this data might not be relevant to the requestor, it is filtered to match the user's request and to respect his privileges. To reduce the workload of the network, consisting of constrained devices, the filtering process is delegated to the server side of the application. The prototype of WebMaDa with pull support was implemented in a modular manner in order to adapt it to user-specific requests.","PeriodicalId":373932,"journal":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124627605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A privacy framework for the Internet of Things","authors":"P. Corcoran","doi":"10.1109/WF-IoT.2016.7845505","DOIUrl":"https://doi.org/10.1109/WF-IoT.2016.7845505","url":null,"abstract":"Privacy is a concept that is intertwined with data security, but its scope is significantly broader. Often considerations of privacy in the context of connected devices are limited to a consideration of the security of the data stored in those devices. In this article a broader scope is introduced and defined in terms of different classes of privacy and the implications for IoT devices and systems is discussed. Finally some ideas for an improved privacy framework for IoT are outlined and explained in the context of the literature and current state-of-art.","PeriodicalId":373932,"journal":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","volume":"147 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120988594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile platform for threat monitoring in Wireless Sensor Networks","authors":"K. Lasota, Piotr Bazydlo, A. Kozakiewicz","doi":"10.1109/WF-IoT.2016.7845490","DOIUrl":"https://doi.org/10.1109/WF-IoT.2016.7845490","url":null,"abstract":"The article touches aspects of security in Wireless Sensor Networks. It begins with a review and classification of existing types of threats and protection methods. The main part of the paper presents the results obtained during development of a threat detection system for WSN network. The described approach is based on a mobile platform which allows separation of security mechanisms and the software controlling the nodes of the protected network. The article describes the architecture of the system, chosen detection methods and details of the prototype implementation.","PeriodicalId":373932,"journal":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121102974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Corici, M. Emmelmann, Jingjing Luo, Ranjan Shrestha, M. Corici, T. Magedanz
{"title":"IoT inter-security domain trust transfer and service dispatch solution","authors":"A. Corici, M. Emmelmann, Jingjing Luo, Ranjan Shrestha, M. Corici, T. Magedanz","doi":"10.1109/WF-IoT.2016.7845443","DOIUrl":"https://doi.org/10.1109/WF-IoT.2016.7845443","url":null,"abstract":"IoT is an evolving domain in which hardware and software components are modelling, sensing or influencing the properties of the physical world. In order to reach the full potential of an IoT service, security and flexibility are key requirements. For multiple service areas, such as supply chains or after-market services, access control and secure dispatch of information play a major role. Thus the need for secure service handover of smart devices from one security domain to another and dynamic management role association of parties to smart device resources. This article presents a solution for trust transfer between two security domains using Fraunhofer FOKUS Open5GMTC toolkit. In the presented work we describe the related work and addressed requirements, the design, implementation and results of Open5GMTC.","PeriodicalId":373932,"journal":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116044985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
X. Zhang, R. Adhikari, M. Pipattanasomporn, M. Kuzlu, S. Rahman
{"title":"Deploying IoT devices to make buildings smart: Performance evaluation and deployment experience","authors":"X. Zhang, R. Adhikari, M. Pipattanasomporn, M. Kuzlu, S. Rahman","doi":"10.1109/WF-IoT.2016.7845464","DOIUrl":"https://doi.org/10.1109/WF-IoT.2016.7845464","url":null,"abstract":"This paper summarizes the authors' work of deploying Internet of Things (IoT) to build a reliable, cost effective and versatile energy management system for small- and medium-sized commercial buildings. This paper addresses critical issues related to the choices and evaluation of embedded systems and software optimization to enable the deployment on a low-cost single board computer, and experience of integrating IoT devices to enable smart building operation. It then discusses three demonstration projects located in Virginia and summarizes deployment experience.","PeriodicalId":373932,"journal":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134453952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Junta Koyama, Yohei Murakami, Donghui Lin, T. Ishida
{"title":"Event-based sensor service composition: Extended abstract","authors":"Junta Koyama, Yohei Murakami, Donghui Lin, T. Ishida","doi":"10.1109/WF-IoT.2016.7845454","DOIUrl":"https://doi.org/10.1109/WF-IoT.2016.7845454","url":null,"abstract":"Nowadays, the demands for composite services with devices such as sensors/actuators and Web services have increased [1]. Many kinds of cloud services that can connect to real world, as typified by image recognition or speech recognition has come into widespread use to address the limitation in information processing on devices. In that situation, sensors are also provided as sensor services that senses the environment and provide its stream data by enterprises. In contrast to Web services, available sensor services and users' context vary with environmental changes (Fig. 1). Especially, when users move moment by moment, for instance in vehicles, the change is expected to become more dynamic.","PeriodicalId":373932,"journal":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133223552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anindya Dey, Xiao Ling, Adnan Syed, Yuewen Zheng, B. Landowski, David Anderson, Kim Stuart, Matthew E. Tolentino
{"title":"Namatad: Inferring occupancy from building sensors using machine learning","authors":"Anindya Dey, Xiao Ling, Adnan Syed, Yuewen Zheng, B. Landowski, David Anderson, Kim Stuart, Matthew E. Tolentino","doi":"10.1109/WF-IoT.2016.7845462","DOIUrl":"https://doi.org/10.1109/WF-IoT.2016.7845462","url":null,"abstract":"Driven by the need to improve efficiency, modern buildings are instrumented with numerous sensors to monitor utilization and regulate environmental conditions. While these sensor systems serve as valuable tools for managing the comfort and health of occupants, there is an increasing need to expand the deployment of sensors to provide additional insights. Because many of these desired insights have high temporal value, such as occupancy during emergency situations, such insights are needed in real time. However, augmenting buildings with new sensors is often expensive and requires a significant capital investment. In this paper, we propose and describe the real-time, streaming system called Namatad that we developed to infer insights from many sensors typical of Internet of Things (IoT) deployments. We evaluate the effectiveness of this platform by leveraging machine learning to infer new insights from environmental sensors within buildings. We describe how we built the components of our system leveraging several open source, streaming frameworks. We also describe how we ingest and aggregate from building sensors and sensing platforms, route data streams to appropriate models, and make predictions using machine learning techniques. Using our system, we have been able to predict the occupancy of rooms within a building on the University of Washington campus over the last three months, in real time, at accuracies of up to 95%.","PeriodicalId":373932,"journal":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131689909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Delsing, J. Eliasson, J. V. Deventer, Hasan Derhamy, P. Varga
{"title":"Enabling IoT automation using local clouds","authors":"J. Delsing, J. Eliasson, J. V. Deventer, Hasan Derhamy, P. Varga","doi":"10.1109/WF-IoT.2016.7845474","DOIUrl":"https://doi.org/10.1109/WF-IoT.2016.7845474","url":null,"abstract":"Various forms of cloud computing principles and technologies are becoming important recently. This paper addresses cloud computing for automation and control applications. It's argued that the open Internet cloud idea has such limitations that its not appropriate for automation. Since automation is physically and geographically local, it is inevitable to introduce the concept of local automation clouds. It's here proposed that local automation clouds should be self contained an be able to execute the intended automation functionalities without any external resources. Thus providing a fence at the rim of the local cloud preventing any inbound or outbound communication. Such a local cloud provides possibilities to address key requirements of both todays and future automation solutions. Adding mechanisms for secure inter-cloud administration and data tranfere enables local automation cloud to meet IoT automation system requirements as: 1) Interoperability of a wide range of IoT and legacy devices 2) Automation requirement on latency guarantee/prediction for communication and control computations. 3) Scalability of automation systems enabling very large integrated automation systems 4) Security and related safety of automation systems 5) Ease of application engineering 6) Multi stakeholder integration and operations agility. How these requirements can be met in such a local automation cloud is discussed with references to proposed solutions. The local automation cloud concept is further verified for a compartment climate control application. The control application included an IoT controller, four IoT sensors and actuators, and a physical layer communication gateway. The gateway acted as host for local cloud core functionalities. The climate control application has successfully been implemented using the open source Arrowhead Framework and its supports for design and implementation of self contained local automation clouds.","PeriodicalId":373932,"journal":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114219511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}