{"title":"A Context-Based Strategy for SLA Negotiation in the IoT Environment","authors":"Fan Li, S. Clarke","doi":"10.1109/PERCOMW.2019.8730752","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730752","url":null,"abstract":"In the Internet of Things (IoT), billions of physical devices are connected and provide a near real-time state of the world. By adopting a service-oriented computing paradigm, the capabilities of these devices (whether mobile or static) can be abstracted as IoT services and delivered to users in a demand-driven way. Service providers can have a comprehensive competitive edge by tailoring their services to match users' requests through a negotiation process, with the particular service provisioning specified in a service level agreement (SLA), which can be further used to monitor and guarantee the quality of service (QoS). The challenges for SLA negotiation in the IoT include the scale and the dynamics of the environment. Existing SLA negotiation approaches are focused on cloud computing, which do not consider the domain-specific properties of IoT services. In this paper, we designed a context-based negotiation strategy to evaluate offers and generate counteroffers, and integrate it with the WS-Agreement Negotiation standard. The evaluation results demonstrate that our proposal can produce a higher utility and maintain a good success rate compared to other negotiation strategies.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132288208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Surrounding Users by Reverberation Analysis with a Smart Speaker and Microphone Array","authors":"Naoki Yoneoka, Yutaka Arakawa, K. Yasumoto","doi":"10.1109/PERCOMW.2019.8730674","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730674","url":null,"abstract":"Recently, smart speakers like Amazon Echo and Google Home have been spread widely. Those devices support users' life through voice interface by receiving voice commands to operate appliances and order goods to online shops. Meanwhile, it is reported that smart speakers are vulnerable to some malicious attacks which steal personal information and/or order unnecessary goods by uttering voice from a device nearby the speaker, abusing the fact that the smart speakers cannot distinguish human voice from machine voice. A new type of attack called DolphinAttack which utters ultrasonic voice inaudible to human is also reported. Therefore, a method to identify which of human or machine is sending voice commands to a smart speaker is desired. In this paper, to prevent such machine-voice based attacks to a smart speaker in absence of residents, we propose a system consisting of a speaker and a microphone array to detect the existence of a human nearby, supposing it can be incorporated in a smart speaker in the future. In our proposed system, the speaker emits sonar sound generated based on Orthogonal Frequency Division Multiplexing (OFDM) in all directions, the microphone array with 8 channels attached on top of the speaker receives the reflected sound, and the human existence is judged by comparing the reflected sound with that measured in the same environment without human. Through experiments with a prototype system, we confirmed that our proposed system can detect the human existence by measuring the reflected signal of 0.5 second.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115609491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Permission-free Keylogging through Touch Events Eavesdropping on Mobile Devices","authors":"L. Bedogni, Andrea Alcaras, L. Bononi","doi":"10.1109/PERCOMW.2019.8730731","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730731","url":null,"abstract":"Mobile devices are carried by many individuals in the world, which use them to communicate with friends, browse the web, and use different applications depending on their objectives. Normally the devices are equipped with integrated sensors such as accelerometers and magnetometers, through which application developers can obtain the inertial values of the dynamics of the device, and infer different behaviors about what the user is performing. As users type on the touch keyboard with one hand, they also tilt the smartphone to reach the area to be pressed. In this paper, we show that using these zero-permissions sensors it is possible to obtain the area pressed by the user with more than 80% of accuracy in some scenarios. Moreover, correlating subsequent areas related to keyboard keys together, it is also possible to determine the words typed by the user, even for long words. This would help understanding what user are doing, though raising privacy concerns.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123643198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combining Secure System Design with Risk Assessment for IoT Healthcare Systems","authors":"F. Kammüller","doi":"10.1109/PERCOMW.2019.8730776","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730776","url":null,"abstract":"In this paper, we show how to derive formal specifications of secure IoT systems by a process that uses the risk assessment strategy of attack trees on infrastructure models. The models of the infrastructure are logical models in the Isabelle Infrastructure framework. It comprises actors, policies and a state transition of the dynamic evolution of the system. This logical framework also provides attack trees. The process we propose in this paper incrementally uses those two features to refine a system specification until expected security and privacy properties can be proved. Infrastructures allow modeling logical as well as physical elements which makes them well suited for IoT applications. We illustrate the stepwise application of the proposed process in the Isabelle Insider framework on the case study of an IoT healthcare system.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121718991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Making Wearable Sensing Less Obtrusive","authors":"Vu H. Tran, Archan Misra","doi":"10.1109/PERCOMW.2019.8730740","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730740","url":null,"abstract":"Sensing is a crucial part of any cyber-physical system. Wearable device has its huge potential for sensing applications because it is worn on the user body. However, wearable sensing can cause obtrusiveness to the user. Obtrusiveness can be seen as a perception of a lack of usefulness [1] such as a lag in user interaction channel. In addition, being worn by a user, it is not connected to a power supply, and thus needs to be removed to be charged regularly. This can cause a nuisance to elderly or disabled people. However, there are also opportunities for wearable devices to be used to assist users in daily life activities. In my proposal, I propose three directions to make wearable sensing less obtrusive: (1) Reduce obtrusiveness in user interaction with the device, (2) reduce the obtrusiveness in powering the device, and (3) using wearable to reduce obtrusiveness in user interaction with the surrounding environment.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122648908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Offset Correction for Smartphone Thermal Cameras Using a Wristband Sensor","authors":"Hiroki Yoshikawa, A. Uchiyama, T. Higashino","doi":"10.1109/PERCOMW.2019.8730732","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730732","url":null,"abstract":"Thermal images are widely used to various healthcare applications. However, thermal images captured by smart-phone thermal cameras have insufficient accuracy to monitor human body temperature. In this paper, we propose an offset correction method for thermal images captured by smartphone thermal cameras. We fully utilize the characteristic which is specific to thermal cameras: the relative temperatures in a single thermal image are highly reliable although the absolute temperatures fluctuate frequently. Our method combines thermal images with a reliable absolute temperature obtained by a wristband sensor based on the above characteristic. The evaluation result shows that the mean absolute error and the standard deviation of face temperature decrease by 26.2% and 70.1%, respectively, highlighting the effectiveness of the proposed method.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"386 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122739206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preliminary analysis of the foraging strategy of seabirds on the basis of their behavior and physiological cost","authors":"S. Koyama, Y. Mizutani, K. Yoda","doi":"10.1109/PERCOMW.2019.8730585","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730585","url":null,"abstract":"Streaked shearwaters (Calonectris leucomelas) are pelagic seabirds that breed on isolated islands in East Asia. Sometimes, they fly long distances to search and forage for food over several hundred kilometers. During the chick-rearing period, efficient foraging is one of the most important tasks for parents because they have to obtain food not only for themselves but also for their chicks. To understand their foraging strategy of streaked shearwaters, their behavior and physiological cost should be quantified. In 2018, we attached GPS and acceleration loggers on breeding shearwaters (15 males and 11 females, including eight pairs) and collected blood samples from them at the deployment and recovery of the loggers. We confirmed that blood drawing from Streaked shearwaters did not have significant adverse effect on their foraging behaviors. We found oxidative and anti-oxidative markers via blood can be useful for assessing the physiological cost of their foraging behaviors. Our finding suggests that females were suffered from heavier stress than males, because females often conducted short trips and increased oxidative stress. To reveal how they perform foraging with minimal cost, we are going to analyze the relationship between foraging behavior and the associated physiological cost in detail.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"312 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122814708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ARDUOUS'19: ARDUOUS'19 – 3rd International Workshop on Annotation of user Data for Ubiquitous Systems - Program","authors":"","doi":"10.1109/percomw.2019.8730868","DOIUrl":"https://doi.org/10.1109/percomw.2019.8730868","url":null,"abstract":"","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124168889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EmotionAware'19: EmotionAware'19 – 3rd International Workshop on Emotion Awareness for Pervasive Computing with Mobile and Wearable Devices - Program","authors":"","doi":"10.1109/percomw.2019.8730839","DOIUrl":"https://doi.org/10.1109/percomw.2019.8730839","url":null,"abstract":"","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124269117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Niklas Rach, Klaus Weber, Annalena Aicher, F. Lingenfelser, E. André, W. Minker
{"title":"Emotion Recognition Based Preference Modelling in Argumentative Dialogue Systems","authors":"Niklas Rach, Klaus Weber, Annalena Aicher, F. Lingenfelser, E. André, W. Minker","doi":"10.1109/PERCOMW.2019.8730650","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730650","url":null,"abstract":"Within this work, we present an approach to model the opinion of a human towards a specific topic in a fine-grained way by using weighted bipolar argumentation graphs. In addition, we discuss how the therefore required rating of related aspects can be collected by means of emotion recognition techniques and discuss an application scenario based on the state-of-the-art Argumentative Dialogue System EVA in which the proposed techniques can be applied.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130065965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}