{"title":"A Trust Model Focusing on Node Usage in Mobile Ad Hoc Networks","authors":"Nanaka Asai, Sonoko Goka, H. Shigeno","doi":"10.1109/PERCOMW.2019.8730676","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730676","url":null,"abstract":"Mobile ad hoc networks (MANETs), where nodes can communicate without an infrastructure, require all nodes to be cooperative enough to transfer packets for other nodes. MANETs have been studied for decades, due to its characteristics which are infrastructureless and distributed. However, the existence of malicious nodes that drop packets for their resource protection is one of the important issues of the present research. Reputation systems using trust model have been proposed to detect malicious nodes in MANETs. Here, the trust value indicates the degree of reliance. One of the attacks in MANETs is On-Off attack on which attack nodes keep trust above a certain level by repeating forwarding and dropping packets. In this paper, we propose a trust model focusing on node usage against MANETs On-Off attack (TMUMO). In this study, we detect On-Off attack nodes by considering the characteristics of On-Off attack. Through simulation experiments, we improve detection rate of attack nodes and packet delivery rate in MANETs, and show feasibility of our trust model.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116460232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anastasia Mishakova, François Portet, Thierry Desot, Michel Vacher
{"title":"Learning Natural Language Understanding Systems from Unaligned Labels for Voice Command in Smart Homes","authors":"Anastasia Mishakova, François Portet, Thierry Desot, Michel Vacher","doi":"10.1109/PERCOMW.2019.8730721","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730721","url":null,"abstract":"Voice command smart home systems have become a target for the industry to provide more natural human computer interaction. To interpret voice command, systems must be able to extract the meaning from natural language; this task is called Natural Language Understanding (NLU). Modern NLU is based on statistical models which are trained on data. However, a current limitation of most NLU statistical models is the dependence on large amount of textual data aligned with target semantic labels. This is highly time-consuming. Moreover, they require training several separate models for predicting intents, slot-labels and slot-values. In this paper, we propose to use a sequence-to-sequence neural architecture to train NLU models which do not need aligned data and can jointly learn the intent, slot-label and slot-value prediction tasks. This approach has been evaluated both on a voice command dataset we acquired for the purpose of the study as well as on a publicly available dataset. The experiments show that a single model learned on unaligned data is competitive with state-of-the-art models which depend on aligned data.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114759087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Asad Javed, Narges Yousefnezhad, J. Robert, Keijo Heljanko, Kary Främling
{"title":"Access Time Improvement Framework for Standardized IoT Gateways","authors":"Asad Javed, Narges Yousefnezhad, J. Robert, Keijo Heljanko, Kary Främling","doi":"10.1109/PERCOMW.2019.8730867","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730867","url":null,"abstract":"Internet of Things (IoT) is a computing infrastructure underlying powerful systems and applications, enabling autonomous interconnection of people, vehicles, devices, and information systems. Many IoT sectors such as smart grid or smart mobility will benefit from the recent evolutions of the smart city initiatives for building more advanced IoT services, from the collection of human- and machine-generated data to their storage and analysis. It is therefore of utmost importance to manage the volume, velocity, and variety of the data, in particular at the IoT gateways level, where data are published and consumed. This paper proposes an access time improvement framework to optimize the publication and consumption steps, the storage and retrieval of data at the gateways level to be more precise. This new distributed framework relies on a consistent hashing mechanism and modular characteristics of microservices to ensure a flexible and scalable solution. Applied and assessed on a real case study, experimental results show how the proposed framework improves data access time for standardized IoT gateways.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"226 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133941060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PerIoT'19: PerIoT'19 - Third International Workshop on Mobile and Pervasive Internet of Things - Program","authors":"","doi":"10.1109/percomw.2019.8730804","DOIUrl":"https://doi.org/10.1109/percomw.2019.8730804","url":null,"abstract":"","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130701617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"APREP-DM: a Framework for Automating the Pre-Processing of a Sensor Data Analysis based on CRISP-DM","authors":"Hiroko Nagashima, Yuka Kato","doi":"10.1109/PERCOMW.2019.8730785","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730785","url":null,"abstract":"The need for analyzing data is increasing at an unprecedented rate. Well-known examples include customer behavioral patterns in shops, the autonomous motion of robots, and fault prediction. Pre-processing of data is essential for achieving accurate results. This includes detecting outliers, handling missing data, and data formatting, integration, and normalization. Pre-processing is necessary for eliminating ambiguities and inconsistencies. We here propose a framework called APREP-DM (for the Automated PRE-Processing for Data Mining) applicable to data analysis, including using sensor data. We evaluate two types of perspectives: (1) considering pre-processing in a test-case scenario involving pedestrian trajectory tracking, and (2) comparing APREP-DM with the outcomes of other existing frameworks from four different perspectives. We conclude that APREP-DM is suitable for analyzing sensor data.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114459846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Janick Edinger, A. Hofmann, Anton Wachner, C. Becker, V. Raychoudhury, Christian Krupitzer
{"title":"WheelShare: Crowd-Sensed Surface Classification for Accessible Routing","authors":"Janick Edinger, A. Hofmann, Anton Wachner, C. Becker, V. Raychoudhury, Christian Krupitzer","doi":"10.1109/PERCOMW.2019.8730849","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730849","url":null,"abstract":"Accessible path routing for wheeled mobility is an important problem given the permanent and temporary obstacles in the built environment. Existing research works have focused on identifying several obstacles as well as facilities such as crosswalks with traffic signals using smartphone based sensing or crowd-sourcing and used those knowledge to generate accessible routes. In this work, we propose WheelShare which generates an accessible route through the best possible surface depending on user and wheelchair requirements. It is 1) scalable, as it uses crowd-sensing to collect voluminous data, 2) dynamic, as the data gets constantly updated, and 3) objective, as it uses an empirical and data-centric approach.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116391842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Fedotov, Yuki Matsuda, Yuta Takahashi, Yutaka Arakawa, K. Yasumoto, W. Minker
{"title":"Towards Real-Time Contextual Touristic Emotion and Satisfaction Estimation with Wearable Devices","authors":"D. Fedotov, Yuki Matsuda, Yuta Takahashi, Yutaka Arakawa, K. Yasumoto, W. Minker","doi":"10.1109/PERCOMW.2019.8730864","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730864","url":null,"abstract":"Following the technical progress and growing touristic market, demand on guidance systems is constantly increasing. Current systems are not personalized, they usually provide only a general information on sightseeing spot and do not concern about the tourist's perception of it. To design more adjustable and context-aware system, we focus on collecting and estimating emotions and satisfaction level, those tourists experience during the sightseeing tour. We reducing changes in their behaviour by collecting two types of information: conscious (short videos with impressions) and unconscious (behavioural pattern recorded with wearable devices) continuously during the whole tour. We have conducted experiments and collected initial data to build the prototype system. For each sight of the tour, participants provided an emotion and satisfaction labels. We use them to train unimodal neural network based models, fuse them together and get the final prediction for each recording. As tourist himself is the only source of labels for such system, we introduce an approach of post-experimental label correction, based on paired comparison. Such system built together allows us to use different modalities or their combination to perform real-time tourist emotion recognition and satisfaction estimation in-the-wild, bringing touristic guidance systems to the new level.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129390645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Road Surface Condition Inspection Using a Laser Scanner Mounted on an Autonomous Driving Car","authors":"Kenta Urano, Kei Hiroi, Shinpei Kato, Nozomi Komagata, Nobuo Kawaguchi","doi":"10.1109/PERCOMW.2019.8730820","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730820","url":null,"abstract":"Inspection and repair of road infrastructures are important for safety. While highways and motorways are periodically inspected with specialized vehicles, the roads which are maintained by local governments are not inspected because of lack of budget and workforce. In the future, however, a large number of autonomous driving cars will run everywhere. They are equipped with laser scanners to recognize the surroundings. If we utilize these sensors to inspect the road surface condition automatically, the cost of inspection will be reduced dramatically. In this paper, we extract transverse profiles of a road using point clouds which are recorded by a laser scanner mounted on an autonomous driving car. Point clouds are converted to the same format of special vehicle. We compared the data recorded by a specialized vehicle and a car with a laser scanner in Ichinomiya, Aichi prefecture, Japan and found that proposed method can be used as a preliminary survey to find where needs the detailed inspection.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128325243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Mahmood, B. Butler, W. Zhang, Quan Z. Sheng, S. A. Siddiqui
{"title":"A Hybrid Trust Management Heuristic for VANETs","authors":"A. Mahmood, B. Butler, W. Zhang, Quan Z. Sheng, S. A. Siddiqui","doi":"10.1109/PERCOMW.2019.8730675","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730675","url":null,"abstract":"State-of-the-art advances in vehicular communication have fostered the development of smart mobility platforms, where moving vehicles exchange safety-critical information with minimal latency, to improve passenger and pedestrian safety. It is, therefore, of paramount importance that the information that is exchanged is not only authentic, but its sender should be trustworthy. Consequently, incorrect information needs to be detected as such, and its source needs to be flagged as untrustworthy if it consistently sends incorrect information. In the case of highly dynamic vehicular networks, ignoring trustworthiness poses a serious threat to vehicular communications, especially if there is a chance that the malicious vehicle could be elected as the cluster head of other vehicles within a group. We propose a hybrid trust management scheme to identify such malicious vehicles and to inhibit them from being elected as the cluster head. The scheme encompasses a composite metric (i.e., trust values assigned to the vehicles coupled with their resource availability) for cluster head and proxy cluster head selection via intermittent elections. This approach helps to form trustworthy and resource efficient vehicular networks. Simulations of the proposed scheme have been conducted using MATLAB and are also presented in this manuscript.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128410268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Martinelli, C. Michailidou, P. Mori, A. Saracino
{"title":"Managing QoS in Smart Buildings Through Software Defined Network and Usage Control","authors":"F. Martinelli, C. Michailidou, P. Mori, A. Saracino","doi":"10.1109/PERCOMW.2019.8730751","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730751","url":null,"abstract":"This work presents a framework for applying QoS in a network of a Smart Building environment, exploiting Software Defined Networks (SDN) and Usage Control (UCON) policy enforcement. The proposed framework will be presented in a plausible use case of a Smart Building where the available Internet connection provided by an Internet Service Provider will be distributed both to tenants and the devices responsible for the management and the safety of the building, taking into account different levels of QoS. Network traffic and bandwidth are thus managed by dynamically exploiting Usage Control framework to enforce a set of management, security and safety policies, aimed at ensuring the appropriate QoS for the provided services according to both tenants Service Level Agreements (SLAs) and current context. A set of performance experiments is reported to demonstrate the viability of the proposed approach.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128729980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}