2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)最新文献

筛选
英文 中文
A System Design of Tight Physical Integration for Large-Scale Vehicular Network Emulation 面向大规模车辆网络仿真的紧密物理集成系统设计
Arata Kato, M. Takai, S. Ishihara
{"title":"A System Design of Tight Physical Integration for Large-Scale Vehicular Network Emulation","authors":"Arata Kato, M. Takai, S. Ishihara","doi":"10.1109/PERCOMW.2019.8730791","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730791","url":null,"abstract":"Network emulation techniques are helpful to evaluate the operation and the performance of applications and protocols on network systems including vehicular ad-hoc network (VANET). We have proposed a wireless network emulation environment using a wireless network tap device (wtap80211), a virtual wireless network device and provides interfaces that enables a network simulator to capture real IEEE 802.11 frames, transmission control information such as transmission power and frequency, and reception status information such as Receive Signal Strength Indicator (RSSI) and Basic Service Set (BSS). Therefore, with the emulation framework, a network simulator can imitate radio propagation and the mobility of network nodes. On the other hand, to fully exploit the emulation framework, monitoring and controlling a network system is important. Since the topology of VANET always change due to the mobility of vehicles, we need to oversee all network nodes to grasp the reachability of beacons sent by vehicles. In this paper, we design a network monitoring interface for a large-scale wireless network system focusing on V2V wireless networks. using wtap80211-based wireless network emulation framework and introduce mechanisms that improve the performance of network monitoring.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114448811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Abnormal Behaviour Detection for Dementia Sufferers via Transfer Learning and Recursive Auto-Encoders 基于迁移学习和递归自编码器的痴呆患者异常行为检测
Damla Arifoglu, A. Bouchachia
{"title":"Abnormal Behaviour Detection for Dementia Sufferers via Transfer Learning and Recursive Auto-Encoders","authors":"Damla Arifoglu, A. Bouchachia","doi":"10.1109/PERCOMW.2019.8730744","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730744","url":null,"abstract":"Cognitive impairment is one of the crucial problems elderly people face. Tracking their daily life activities and detecting early indicators of cognitive decline would be necessary for further diagnosis. Depending on the decline magnitude, monitoring may need to be done over long periods of time to detect abnormal behaviour. In the absence of training data, it would be helpful to learn the normal behaviour and daily life patterns of a (cognitively) healthy person and use them as a basis for tracking other patients. In this paper, we propose to investigate Recursive Auto-Encoders (RAE)-based transfer learning to cope with the problem of scarcity of data in the context of abnormal behaviour detection. We present a method for generating synthetic data to reflect on some behavior of people with dementia. An RAE model is trained on data of a healthy person in a source household. Then, the resulting RAE is used to detect abnormal behavior in a target house. To evaluate the proposed approach, we compare the results with the-state-of-the-art supervised methods. The results indicate that transfer learning is promising when there is lack of training data.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131949109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Emotion Aware Robot by Emotion Estimation Using Biological Sensors 基于生物传感器的情感感知机器人
Midori Sugaya
{"title":"Emotion Aware Robot by Emotion Estimation Using Biological Sensors","authors":"Midori Sugaya","doi":"10.1109/PERCOMW.2019.8730714","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730714","url":null,"abstract":"Emotion aware technologies have been very attractive topic these days to understand the internal state of the human through some methods and sensors. We consider if we apply the human's emotional state for nursing/care and communication robots, it would be possible to increases QoL through emotion satisfactory communications through these artificial devices. There are various technologies that required for achieving the purpose. In this discussion, we will introduce an approach that collects biological information using EEG, and heartbeat sensors and estimates emotion with some models to apply it for the robot. There are challenging topics to decide the behavior responsively. The works would be one of the new fields of the emotion aware computing applications.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115649436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards a Runtime Devices Adaptation in a Multi-Device Environment Based on People's Needs 基于人的需求的多设备环境下的运行时设备适配
Daniel Flores-Martín, J. Berrocal, J. García-Alonso, J. M. Murillo
{"title":"Towards a Runtime Devices Adaptation in a Multi-Device Environment Based on People's Needs","authors":"Daniel Flores-Martín, J. Berrocal, J. García-Alonso, J. M. Murillo","doi":"10.1109/PERCOMW.2019.8730859","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730859","url":null,"abstract":"Internet of Things devices are becoming more and more intelligent. Their ultimate purpose is to perform tasks that help people. In order for these devices to perform their function, they must be configured by users, which implies a considerable investment of effort and time. This configuration also has to also consider that the user's contextual information is constantly changing. Each change in contextual information may require devices to be reconfigured so that their behavior and collaborations with other devices can meet the user's needs. Although this adaptability has already been achieved, it is still a too manual process, which involves a great deal of effort by people. This paper presents the Situational-Context as a proposal to achieve a context adaptation of IoT devices at runtime avoiding human intervention. Thanks to our work we achieve a multi-device collaborative environment that facilitates collaboration between people and devices automatically and with less effort from people.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125842333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Development of a Psychological-Behavioral Model of Behavioral Change 行为改变的心理-行为模型的发展
Takanobu Matsuura, Keita Sato
{"title":"Development of a Psychological-Behavioral Model of Behavioral Change","authors":"Takanobu Matsuura, Keita Sato","doi":"10.1109/PERCOMW.2019.8730722","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730722","url":null,"abstract":"Behavior is influenced by context and personality. To change habitual behavior, we need to clarify its underlying mechanism and the factors affecting it. To achieve behavioral change, the factors affecting it must be changed. We classified anxiety, developed a psychological-behavioral model, and performed an experiment to verify this model. In this paper, we present a specific example of the psychological-behavioral model and the results of the experiment. We also present the approaches that could be considered to achieve behavioral change.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123400107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Out-of-Hospital Body Movement Data Collection Using E-Skin Sensors 利用电子皮肤传感器收集院外身体运动数据
Yuxin Zhang, P. D. Haghighi, F. Burstein, Lim Wei Yap, Wenlong Cheng, F. Cicuttini
{"title":"Out-of-Hospital Body Movement Data Collection Using E-Skin Sensors","authors":"Yuxin Zhang, P. D. Haghighi, F. Burstein, Lim Wei Yap, Wenlong Cheng, F. Cicuttini","doi":"10.1109/PERCOMW.2019.8730591","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730591","url":null,"abstract":"Out-of-hospital care plays an important role in improving the quality of chronic pain management. It could assist with early diagnosis, intervention and treatment and prevent unnecessary admission to hospitals, enabling efficient medical and healthcare resources. Recent advances in wearable sensors and mobile computing technology can considerably transform and benefit out-of-hospital care. In this work, we demonstrate an out-of-hospital body movement data collection mobile application which utilizes the cutting-edge nanotechnology-based E-Skin sensors. We also describe and demonstrate the real-world application of the E-Skin sensors to continuously detect, measure and analyze body movements.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126602643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
WristSense'19: WristSense'19 - Workshop on Sensing Systems and Applications using Wrist Worn Smart Devices - Program 腕戴式智能设备的传感系统和应用研讨会-程序
{"title":"WristSense'19: WristSense'19 - Workshop on Sensing Systems and Applications using Wrist Worn Smart Devices - Program","authors":"","doi":"10.1109/percomw.2019.8730875","DOIUrl":"https://doi.org/10.1109/percomw.2019.8730875","url":null,"abstract":"","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126745460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Analysis of Device Binding for IP-based IoT Devices 基于ip的物联网设备绑定安全性分析
Jiongyi Chen, Menghan Sun, Kehuan Zhang
{"title":"Security Analysis of Device Binding for IP-based IoT Devices","authors":"Jiongyi Chen, Menghan Sun, Kehuan Zhang","doi":"10.1109/PERCOMW.2019.8730580","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730580","url":null,"abstract":"As one of the fastest growing technologies today, the Internet of Things has profoundly changed the ways people interact with the physical world. With a mobile application on a smartphone, a user can conveniently control an IoT device and acquire the sensor data of the external environment. To enable such convenience, a critical step is to bind the user's smartphone with the IoT device and then establish a secure communication channel between them. Although various techniques have already been adopted, however, little has been done so far to systematically evaluate the security implications of those binding mechanisms in IoT. In this paper, we report the first systematic study on device binding mechanisms of IoT, in an attempt to understand the security implications. For this purpose, we defined a practical adversary model and systematically investigated 24 popular IoT products on the consumer market. Our investigation reveals the fact that IoT developers often mistrust the environment and do not follow best practices in device binding. As a result, we were able to launch several types of real-world attacks against the device binding process. Our research brings the insecure designs of device binding to the spotlight and shows that the threat to IoT device binding is realistic and serious.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115181021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Know Thy Quality: Assessment of Device Detection by WiFi Signals 了解自己的质量:通过WiFi信号检测设备的评估
Tim Rutermann, Aboubakr Benabbas, D. Nicklas
{"title":"Know Thy Quality: Assessment of Device Detection by WiFi Signals","authors":"Tim Rutermann, Aboubakr Benabbas, D. Nicklas","doi":"10.1109/PERCOMW.2019.8730828","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730828","url":null,"abstract":"Broadcasted WiFi traffic of mobile devices is the foundation of several estimation techniques like location tracking or crowd counting. Many pervasive applications use these techniques to infer the current state of an environment allowing better planning of resources. A vast majority of techniques use WiFi probe request frames, which contain the unique MAC address of a mobile device. This MAC address allows counting of unique devices and thus, their carriers. To ensure privacy, device manufacturers introduced MAC randomization as anonymization technique. This causes a considerable impact on the data quality of many pervasive applications as randomizing devices create fake MAC addresses. Previous works show that randomized MAC addresses can be linked to their origin device using different derandomization techniques. However, these approaches are not feasible in practice as novel randomization techniques are designed to prevent derandomization. Moreover, the frequency of WiFi probe request frames varies significantly on several factors making it difficult to estimate device presence in a timely manner. This paper assesses the challenges with probe request frames using a new data quality framework for device detection. Additionally, alternative detection methods that do not rely on probe request frames are presented. This includes a recently publicized WiFi device detection technique and a new way of detecting devices associated with a third-party network using a feature of the 802.11 protocol.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124727467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication 一种用于无线传感器网络通信的轻量级量子安全安全概念
M. Heigl, M. Schramm, Dalibor Fiala
{"title":"A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication","authors":"M. Heigl, M. Schramm, Dalibor Fiala","doi":"10.1109/PERCOMW.2019.8730749","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730749","url":null,"abstract":"The ubiquitous internetworking of devices in all areas of life is boosted by various trends for instance the Internet of Things. Promising technologies that can be used for such future environments come from Wireless Sensor Networks. It ensures connectivity between distributed, tiny and simple sensor nodes as well as sensor nodes and base stations in order to monitor physical or environmental conditions such as vibrations, temperature or motion. Security plays an increasingly important role in the coming decades in which attacking strategies are becoming more and more sophisticated. Contemporary cryptographic mechanisms face a great threat from quantum computers in the near future and together with Intrusion Detection Systems are hardly applicable on sensors due to strict resource constraints. Thus, in this work a future-proof lightweight and resource-aware security concept for sensor networks with a processing stage permeated filtering mechanism is proposed. A special focus in the concepts evaluation lies on the novel Magic Number filter to mitigate a special kind of Denial-of-Service attack performed on CC1350 LaunchPad ARM Cortex-M3 microcontroller boards.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121159341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信