2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)最新文献

筛选
英文 中文
Device to Device Collaboration for Mobile Clouds in Drop Computing Drop计算中移动云的设备到设备协作
Radu-Corneliu Marin, Alexandru Gherghina-Pestrea, Alexandru Florin Robert Timisica, Radu-Ioan Ciobanu, C. Dobre
{"title":"Device to Device Collaboration for Mobile Clouds in Drop Computing","authors":"Radu-Corneliu Marin, Alexandru Gherghina-Pestrea, Alexandru Florin Robert Timisica, Radu-Ioan Ciobanu, C. Dobre","doi":"10.1109/PERCOMW.2019.8730788","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730788","url":null,"abstract":"The large number of mobile devices existing nowadays has led to the evolution of mobile cloud computing towards bringing data and computations closer to the nodes. This has manifested first in the shape of fog and edge computing, where an additional communication and processing layer is added at the edge of the network. However, the fast adoption of the Internet of Things has shown the limitations of even this model, so the focus now is moving towards another layer that is one level below: the ad hoc network composed of the mobile devices themselves. One paradigm based on this model is Drop Computing, where nodes that need to do some computations first attempt to process them through the help of neighbor devices using close-range communication (such as Wi-Fi Direct or Bluetooth), and only then do they attempt to contact the fog/edge nodes or the cloud itself. In this paper, we propose an Android implementation of the device-to-device layer of Drop Computing. On top of this implementation, we present an application that creates a video collage from multiple photos using ffmpeg with the help of neighboring nodes through close-range communication using the HYCCUPS and Google Nearby frameworks. Through experiments on four Android devices, we show that our implementation can drastically decrease CPU usage per device, which in turn increases the overall quality of experience for Android users. Furthermore, the total battery consumption is lowered, since nodes have less computations to perform and the CPU cores spend less time in higher frequencies.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130914085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IoTSM: An End-to-end Security Model for IoT Ecosystems IoTSM:物联网生态系统的端到端安全模型
Joseph Bugeja, Bahtijar Vogel, A. Jacobsson, Rimpu Varshney
{"title":"IoTSM: An End-to-end Security Model for IoT Ecosystems","authors":"Joseph Bugeja, Bahtijar Vogel, A. Jacobsson, Rimpu Varshney","doi":"10.1109/PERCOMW.2019.8730672","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730672","url":null,"abstract":"The Internet of Things (IoT) market is growing rapidly, allowing continuous evolution of new technologies. Alongside this development, most IoT devices are easy to compromise, as security is often not a prioritized characteristic. This paper proposes a novel IoT Security Model (IoTSM) that can be used by organizations to formulate and implement a strategy for developing end-to-end IoT security. IoTSM is grounded by the Software Assurance Maturity Model (SAMM) framework, however it expands it with new security practices and empirical data gathered from IoT practitioners. Moreover, we generalize the model into a conceptual framework. This approach allows the formal analysis for security in general and evaluates an organization's security practices. Overall, our proposed approach can help researchers, practitioners, and IoT organizations, to discourse about IoT security from an end-to-end perspective.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127274423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
IoT-NetSec: Policy-Based IoT Network Security Using OpenFlow IoT- netsec:使用OpenFlow的基于策略的IoT网络安全
Mehdi Nobakht, Craig Russell, Wen Hu, A. Seneviratne
{"title":"IoT-NetSec: Policy-Based IoT Network Security Using OpenFlow","authors":"Mehdi Nobakht, Craig Russell, Wen Hu, A. Seneviratne","doi":"10.1109/PERCOMW.2019.8730724","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730724","url":null,"abstract":"The increasingly widespread adoption of the Internet of Things (IoT) has resulted in concerns about IoT security. Recently, there have been proposals to leverage software-defined networking (SDN) to augment IoT device security with network-level measurements. We argue that existing general-purpose security solutions using SDN are impractical for supporting today's home and corporate networks due to the high volume and rates of network traffic, differences in characteristics of IoT systems and computer networks, and limited resources in underlying network switches. To this end we propose IoT-NetSec, a framework that enables policy-based and fine-grained traffic monitoring of the network segments that include only IoT devices. We describe a prototype implementation and its integration with an SDN controller. The prototype implementation and simulations with three network service attacks (port scanning, SYN DoS Flooding and smurf DDoS) demonstrate IoT-NetSec feasibility in a network of real IoT devices.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125423917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Emergency Service for Smart Home System Using Ethereum Blockchain: System and Architecture 基于以太坊区块链的智能家居系统应急服务:系统与架构
T. Tantidham, Yu Nandar Aung
{"title":"Emergency Service for Smart Home System Using Ethereum Blockchain: System and Architecture","authors":"T. Tantidham, Yu Nandar Aung","doi":"10.1109/PERCOMW.2019.8730816","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730816","url":null,"abstract":"Due to emerging disruptive technologies, Internet of Things (IoT) play a vital role for smart living domains, for examples, elderly and disabilities healthcare services and home safety and security monitoring and automation control services. These systems will send automatically an emergency call with home user information and location as a privacy data to public services like hospitals, police offices, or fire departments. This paper introduces emergency service for a Smart Home System (SHS) based on Ethereum blockchain with smart contract for decentralized handling access control among untrusted public services so called Home Service Providers (HSPs) and smart home IoT devices. Our SHS testbed consists of (1) smart home sensor manger equipped with Raspberry Pi (RPi) represented as an edge IoT gateway for gathering environmental sensor data, (2) HSP miners deployed Meteor and Ethereum platform, and (3) web-based applications for home users and HSP staffs. Furthermore, our contribution includes the integration of digital signature for the IoT device authentication, the One Time Passcode with QR code for HSP staff access control, and IPFS for manipulating emergency call from SHS in peers. Our implementation results focusing on HSP miners will be presented and analysed.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128348695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
On the Combination of IMU and Optical Flow for Action Recognition 结合IMU和光流进行动作识别
Taha Alhersh, H. Stuckenschmidt
{"title":"On the Combination of IMU and Optical Flow for Action Recognition","authors":"Taha Alhersh, H. Stuckenschmidt","doi":"10.1109/PERCOMW.2019.8730743","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730743","url":null,"abstract":"Different Action recognition methods use Inertial Measurement Unit (IMU) and optical flow independently. This research aims to explore the usefulness of combining IMU and Optical flow for action recognition. We are investigating the effectiveness of using statistical features to build an expandable feature vector space.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123908998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Blockchain-Based Architecture for Integrated Smart Parking Systems 基于区块链的集成智能停车系统架构
Sabbir Ahmed, Soaibuzzaman, Mohammad Saidur Rahman, M. Rahaman
{"title":"A Blockchain-Based Architecture for Integrated Smart Parking Systems","authors":"Sabbir Ahmed, Soaibuzzaman, Mohammad Saidur Rahman, M. Rahaman","doi":"10.1109/PERCOMW.2019.8730772","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730772","url":null,"abstract":"In this paper, we introduce an integrated smart parking system. The proposed integrated smart parking system brings multiple parking service providers together under a unified platform aiming to provide one-stop parking information services to the commuters in a smart city. However, the adaptation of such a system is prone to tempering while a massive amount of data is shared among different parties which raise concerns related to trust and performance. To address this challenge, we propose a blockchain-based architecture specific to the integrated smart parking systems. Finally, we present a set of design principles which shows the applicability of our proposed blockchain-based integrated parking system.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114178310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Everyday Life ToDo Display on Ceiling for Smart Living Space 日常生活待办事项吊顶显示,打造智能生活空间
Shigeyuki Hirai, Michi Takamura
{"title":"Everyday Life ToDo Display on Ceiling for Smart Living Space","authors":"Shigeyuki Hirai, Michi Takamura","doi":"10.1109/PERCOMW.2019.8730584","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730584","url":null,"abstract":"Many commonly used household appliances and equipment include refrigerators, washing machines, intercoms, telephones, air conditioners, microwaves, and ovens; they communicate various information to the users by providing notifications using auditory displays. However, an occupied user may not pay attention to the notifications and/or cannot recognize simultaneous auditory alerts. Therefore, in this study, we propose a ceiling display system that displays information depending on the location of the users. This display system utilizes house ceilings as overhead visual displays that can update the users with various information simultaneously. This paper describes the different situations where appliances notify the users on completing a task; subsequently, we propose a concept for the ceiling display system in a smart house that will be introduced in the near future. In addition, the expected effectiveness of this system, some useful scenarios, and initial verifications of the visual notifications on the ceiling are described.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115290962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
LoRaIn: Making a Case for LoRa in Indoor Localization LoRaIn: LoRa在室内定位中的应用
Bashima Islam, Md Tamzeed Islam, J. Kaur, S. Nirjon
{"title":"LoRaIn: Making a Case for LoRa in Indoor Localization","authors":"Bashima Islam, Md Tamzeed Islam, J. Kaur, S. Nirjon","doi":"10.1109/PERCOMW.2019.8730767","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730767","url":null,"abstract":"In this paper, we analyze the feasibility of using LoRa, an emerging low-power wide-area networking technology, in indoor localization. We define seven criteria upon which a wireless technology's prospect as an indoor localization system depends largely. For comparison, we take two other popular wireless technologies (BLE and WiFi) that have been previously proposed in many modern indoor localization systems. We deploy these three technologies in multiple line-of-sight and non-line-of-sight indoor scenarios including corridors, open spaces, spaces with a varying number of walls, and across floors of multi-storied buildings. Considering the coverage, stability and regularity of signals, accuracy of localization, responsiveness, power, and cost–we conclude that LoRa is a feasible choice for indoor localization solution, especially in wide and tall indoor environments like warehouses and multi-storied buildings.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125549928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Combining Numerical and Visual Approaches in Validating Sleep Data Quality of Consumer Wearable Wristbands 结合数值和视觉方法验证消费者可穿戴腕带的睡眠数据质量
Zilu Liang, Mario Alberto Chapa Martell
{"title":"Combining Numerical and Visual Approaches in Validating Sleep Data Quality of Consumer Wearable Wristbands","authors":"Zilu Liang, Mario Alberto Chapa Martell","doi":"10.1109/PERCOMW.2019.8730805","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730805","url":null,"abstract":"The recent rise of the Quantified Self movement has witnessed a significant increase in the adoption of consumer wearable wristbands for sleep tracking. Nevertheless, data quality of these devices has been a main concern. This study aimed to validate a most popular consumer wristband, i.e. Fitbit Charge 2™, against medical devices. We proposed a new validation approach that combines numerical technique with visual aid for epoch-by-epoch comparison on sleep stages. We found that Fitbit Charge 2™ had low accuracy in detecting wake and reasonable accuracy in detecting light, deep, and REM sleep stages. The visual aid of scatter plots showed that Fitbit was more accurate in detecting deep sleep stage in the first half of a night and more accurate in detecting REM sleep stage in the second half of a night. Our results indicate that consumer wearable wristbands are not able to produce high quality data of sleep stages in ecological settings. Future studies should consider the effect of time on device accuracy and may resort to segmented modelling techniques to improve data quality.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126628324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Requirements for a Reference Dataset for Multimodal Human Stress Detection 对多模态人体应力检测参考数据集的要求
Bhargav Mahesh, E. Prassler, Teena Hassan, Jens-Uwe Garbas
{"title":"Requirements for a Reference Dataset for Multimodal Human Stress Detection","authors":"Bhargav Mahesh, E. Prassler, Teena Hassan, Jens-Uwe Garbas","doi":"10.1109/PERCOMW.2019.8730884","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730884","url":null,"abstract":"Stress is necessary for optimal performance and functioning in daily life. However, when stress exceeds person-specific coping levels, then it begins to negatively impact health and productivity. An automatic stress monitoring system that tracks stress levels based on physical and physiological parameters, can assist the user in maintaining stress within healthy limits. In order to build such a system, we need to develop and test various algorithms on a reference dataset consisting of multimodal stress responses. Such a reference dataset should fulfil requirements derived from results and practices of clinical and empirical research. This paper proposes a set of such requirements to support the establishment of a reference dataset for multimodal human stress detection. The requirements cover person-dependent and technical aspects such as selection of sample population, choice of stress stimuli, inclusion of multiple stress modalities, selection of annotation methods, and selection of data acquisition devices. Existing publicly available stress datasets were evaluated based on criteria derived from the proposed requirements. It was found that none of these datasets completely fulfilled the requirements. Therefore, efforts should be made in the future to establish a reference dataset, satisfying the specified requirements, in order to ensure comparability and reliability of results.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131824363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信