{"title":"Minimum data sampling requirements for accurate detection of terrain-induced gait alterations change with mobile sensor position","authors":"Arshad Sher , Otar Akanyeti","doi":"10.1016/j.pmcj.2024.101994","DOIUrl":"10.1016/j.pmcj.2024.101994","url":null,"abstract":"<div><div>Human gait is a key biomarker for health, independence and quality of life. Advances in wearable inertial sensor technologies have paved the way for out-of-the-lab human gait analysis, which is important for the assessment of mobility and balance in natural environments and has applications in multiple fields from healthcare to urban planning. Automatic recognition of the environment where walking takes place is a prerequisite for successful characterisation of terrain-induced gait alterations. A key question which remains unexplored in the field is how minimum data requirements for high terrain classification accuracy change depending on the sensor placement on the body. To address this question, we evaluate the changes in performance of five canonical machine learning classifiers by varying several data sampling parameters including sampling rate, segment length, and sensor configuration. Our analysis on two independent datasets clearly demonstrate that a single inertial measurement unit is sufficient to recognise terrain-induced gait alterations, accuracy and minimum data requirements vary with the device position on the body, and choosing correct data sampling parameters for each position can improve classification accuracy up to 40% or reduce data size by 16 times. Our findings highlight the need for adaptive data collection and processing algorithms for resource-efficient computing on mobile devices.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142531089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tingxuan Fu , Sijia Hao , Qiming Chen , Zihan Yan , Huawei Liu , Amin Rezaeipanah
{"title":"An energy-aware secure routing scheme in internet of things networks via two-way trust evaluation","authors":"Tingxuan Fu , Sijia Hao , Qiming Chen , Zihan Yan , Huawei Liu , Amin Rezaeipanah","doi":"10.1016/j.pmcj.2024.101995","DOIUrl":"10.1016/j.pmcj.2024.101995","url":null,"abstract":"<div><div>The rapid advancement of technology has led to the proliferation of devices connected to the Internet of Things (IoT) networks, bringing forth challenges in both energy management and secure data communication. In addition to energy constraints, IoT networks face threats from malicious nodes, which jeopardize the security of communications. To address these challenges, we propose an Energy-aware secure Routing scheme via Two-Way Trust evaluation (ERTWT) for IoT networks. This scheme enhances network protection against various attacks by calculating trust values based on energy trust, direct trust, and indirect trust. The scheme aims to enhance the efficiency of data transmission by dynamically selecting routes based on both energy availability and trustworthiness metrics of fog nodes. Since trust management can guarantee privacy and security, ERTWT allows the service requester and the service provider to check each other's safety and reliability at the same time. In addition, we implement Generative Flow Networks (GFlowNets) to predict the energy levels available in nodes in order to use them optimally. The proposed scheme has been compared with several advanced energy-aware and trust-based routing protocols. Evaluation results show that ERTWT more effectively detects malicious nodes while achieving better energy efficiency and data transmission rates.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142531088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust-aware and improved density peaks clustering algorithm for fast and secure models in wireless sensor networks","authors":"Youjia Han, Huibin Wang, Yueheng Li, Lili Zhang","doi":"10.1016/j.pmcj.2024.101993","DOIUrl":"10.1016/j.pmcj.2024.101993","url":null,"abstract":"<div><div>Many trust-based models for wireless sensor networks do not account for trust attacks, which are destructive phenomena that undermine the security and reliability of these models. Therefore, a trust-based fast security model fused with an improved density peaks clustering algorithm (TFSM-DPC) is proposed to quickly identify trust attacks in this paper. First, when calculating direct trust values, TFSM-DPC designs the adaptive penalty factors based on the state of received and sent packets and behaviors, and introduces the volatilization factors to reduce the effect of historical trust values. Second, TFSM-DPC improved density peaks clustering (DPC) algorithm to evaluate the trustworthiness of each recommendation value, thus filtering malicious recommendations before calculating the indirect trust values. Moreover, to filter two types of recommendations, the improved DPC algorithm incorporates artificial benchmark data along with trust values recommended by neighbors as input data. Finally, based on the relationship between direct trust and indirect trust, a secure formula for calculate the comprehensive trust is designed. Therefore, the proposed TFSM-DPC can improve the accuracy of trust evaluation and speed up the identification of malicious nodes. Simulation results show that TFSM-DPC can effectively identify on-off, bad-mouth and collusion attacks, and improve the speed of excluding malicious nodes from the network, compared to other trust-based algorithms.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142531086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A controllability method on the social Internet of Things (SIoT) network","authors":"Zahra Aghaee , Afsaneh Fatemi , Peyman Arebi","doi":"10.1016/j.pmcj.2024.101992","DOIUrl":"10.1016/j.pmcj.2024.101992","url":null,"abstract":"<div><div>In recent years, one type of complex network called the Social Internet of Things (SIoT) has attracted the attention of researchers. Controllability is one of the important problems in complex networks and it has essential applications in social, biological, and technical networks. Applying this problem can also play an important role in the control of social smart cities, but it has not yet been defined as a specific problem on SIoT, and no solution has been provided for it. This paper addresses the controllability problem of the temporal SIoT network. In this regard, first, a definition for the temporal SIoT network is provided. Then, the unique relationships of this network are defined and modeled formally. In the following, the Controllability problem is applied to the temporal SIoT network (CSIoT) to identify the Minimum Driver nodes Set (MDS). Then proposed CSIoT is compared with the state-of-the-art methods for performance analysis. In the obtained results, the heterogeneity (different types, brands, and models) has been investigated. Also, 69.80 % of the SIoT sub-graphs nodes have been identified as critical driver nodes in 152 different sets. The proposed controllability deals with network control in a distributed manner.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142359679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"INLEC: An involutive and low energy lightweight block cipher for internet of things","authors":"JiaYi Feng, Lang Li, LiuYan Yan, ChuTian Deng","doi":"10.1016/j.pmcj.2024.101991","DOIUrl":"10.1016/j.pmcj.2024.101991","url":null,"abstract":"<div><div>The Internet of Things (IoT) has emerged as a pivotal force in the global technological revolution and industrial transformation. Despite its advancements, IoT devices continue to face significant security challenges, particularly during data transmission, and are often constrained by limited battery life and energy resources. To address these challenges, a low energy lightweight block cipher (INLEC) is proposed to mitigate data leakage in IoT devices. In addition, the Structure and Components INvolution (SCIN) design is introduced. It is constructed using two similar round functions to achieve front–back symmetry. This design ensures coherence throughout the INLEC encryption and decryption processes and addresses the increased resource consumption during the decryption phase in Substitution Permutation Networks (SPN). Furthermore, a low area S-box is generated through a hardware gate-level circuit search method combined with Genetic Programming (GP). This optimization leads to a 47.02% reduction in area compared to the <span><math><msub><mrow><mi>S</mi></mrow><mrow><mn>0</mn></mrow></msub></math></span> of Midori, using UMC <span><math><mrow><mn>0</mn><mo>.</mo><mn>18</mn><mspace></mspace><mi>μ</mi><mi>m</mi></mrow></math></span> technology. Moreover, a chaotic function is used to generate the optimal nibble-based involutive permutation, further enhancing its efficiency. In terms of performs, the energy consumption for both encryption and decryption with INLEC is 6.88 <span><math><mi>μ</mi></math></span>J/bit, representing 25.21% reduction compared to Midori. Finally, INLEC is implemented using STM32L475 PanDuoLa and Nexys A7 FPGA development boards, establishing an encryption platform for IoT devices. This platform provides functions for data acquisition, transmission, and encryption.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142318676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yi Ke, Quan Wan, Fangting Xie, Zhen Liang, Ziyu Wu, Xiaohui Cai
{"title":"Pressure distribution based 2D in-bed keypoint prediction under interfered scenes","authors":"Yi Ke, Quan Wan, Fangting Xie, Zhen Liang, Ziyu Wu, Xiaohui Cai","doi":"10.1016/j.pmcj.2024.101979","DOIUrl":"10.1016/j.pmcj.2024.101979","url":null,"abstract":"<div><div>In-bed pose estimation holds significant potential in various domains, including healthcare, sleep studies, and smart homes. Pressure-sensitive bed sheets have emerged as a promising solution for addressing this task considering the advantages of convenience, comfort, and privacy protection. However, existing studies primarily rely on ideal datasets that do not consider the presence of common daily objects such as pillows and quilts referred to as interference, which can significantly impact the pressure distribution. As a result, there is still a gap between the models trained with ideal data and the real-life application. Besides the end-to-end training approach, one potential solution is to recognize the interference and fuse the interference information to the model during training. In this study, we created a well-annotated dataset, consisting of eight in-bed scenes and four common types of interference: pillows, quilts, a laptop, and a package. To facilitate the analysis, the pixels in the pressure image were categorized into five classes based on the relative position between the interference and the human. We then evaluated the performance of five neural network models for pixel-level interference recognition. The best-performing model achieved an accuracy of 80.0% in recognizing the five categories. Subsequently, we validated the utility of interference recognition in improving pose estimation accuracy. The ideal model initially shows an average joint position error of up to 30.59 cm and a Percentage of Correct Keypoints (PCK) of 0.332 on data from scenes with interferences. After retraining on data including interference, the error is reduced to 13.54 cm and the PCK increases to 0.747. By integrating interference recognition information, either by excluding the parts of the interference or using the recognition results as input, the error can be further minimized to 12.44 cm and the PCK can be maximized up to 0.777. Our findings represent an initial step towards the practical deployment of pressure-sensitive bed sheets in everyday life.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142314386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-enhanced efficient and anonymous certificateless signature scheme and its application","authors":"Tao Feng, Jie Wang, Lu Zheng","doi":"10.1016/j.pmcj.2024.101990","DOIUrl":"10.1016/j.pmcj.2024.101990","url":null,"abstract":"<div><div>Although the Internet of Things (IoT) brings efficiency and convenience to various aspects of people’s lives, security and privacy concerns persist as significant challenges. Certificateless Signatures eliminate digital certificate management and key escrow issues and can be well embedded in resource-constrained IoT devices for secure access control. Recently, Ma et al. designed an efficient and pair-free certificateless signature (CLS) scheme for IoT deployment. Unfortunately, We demonstrate that the scheme proposed by Ma et al. is susceptible to signature forgery attacks by Type-II adversaries. That is, a malicious-and-passive key generation center (KGC) can forge a legitimate signature for any message by modifying the system parameters without the user’s secret value. Therefore, their identity authentication scheme designed based on vehicular ad-hoc networks also cannot guarantee the claimed security. To address the security vulnerabilities, we designed a blockchain-enhanced and anonymous CLS scheme and proved its security under the Elliptic curve discrete logarithm (ECDL) hardness assumption. Compared to similar schemes, our enhanced scheme offers notable advantages in computational efficiency and communication overhead, as well as stronger security. In addition, a mutual authentication scheme that satisfies the cross-domain scenario is proposed to facilitate efficient mutual authentication and negotiated session key generation between smart devices and edge servers in different edge networks. Performance evaluation shows that our protocol achieves an effective trade-off between security and compute performance, with better applicability in IoT scenarios.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142318677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Salem Garfan , Bilal Bahaa Zaidan , Aws Alaa Zaidan , Sarah Qahtan , Hassan Abdulsattar Ibrahim , Muhammet Deveci , Seifedine Kadry , Sarbast Moslem , Weiping Ding
{"title":"Can smartphones serve as an instrument for driver behavior of intelligent transportation systems research? A systematic review: Challenges, motivations, and recommendations","authors":"Salem Garfan , Bilal Bahaa Zaidan , Aws Alaa Zaidan , Sarah Qahtan , Hassan Abdulsattar Ibrahim , Muhammet Deveci , Seifedine Kadry , Sarbast Moslem , Weiping Ding","doi":"10.1016/j.pmcj.2024.101978","DOIUrl":"10.1016/j.pmcj.2024.101978","url":null,"abstract":"<div><div>The increasing number of road accidents is a major issue in many countries. Studying drivers’ behaviour is essential to identify the key factors of these accidents. As improving sustainability can be reached by improving driving behaviour, this study aimed to review and thoroughly analyse current driver behaviour literature that focuses on smartphones and attempted to provide an understanding of various contextual fields in published studies through different open challenges encountered and recommendations to enhance this vital area. All articles about driver behaviour with the scope of using smartphone were searched systematically in four main databases, namely, IEEE Xplore, ScienceDirect, Scopus and Web of Science, from 2013 to 2023. The final set of 207 articles matched our inclusion and exclusion criteria. The basic characteristics of this emerging field are identified from the aspects of motivations, open challenges that impede the technology's utility, authors’ recommendations and substantial analysis of the previous studies are discussed based on five aspects (sample size, developed software, techniques used, smartphone sensor based and, available datasets). A proposed research methodology as new direction is provided to solve the gaps identified in the analysis. As a case study of the proposed methodology, the area of eco-driving behaviour is selected to address the current gaps in this area and assist in advancing it. This systematic review is expected to open opportunities for researchers and encourage them to work on the identified gaps.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142312552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep reinforcement learning based mobility management in a MEC-Enabled cellular IoT network","authors":"Homayun Kabir , Mau-Luen Tham , Yoong Choon Chang , Chee-Onn Chow","doi":"10.1016/j.pmcj.2024.101987","DOIUrl":"10.1016/j.pmcj.2024.101987","url":null,"abstract":"<div><div>Mobile Edge Computing (MEC) has paved the way for new Cellular Internet of Things (CIoT) paradigm, where resource constrained CIoT Devices (CDs) can offload tasks to a computing server located at either a Base Station (BS) or an edge node. For CDs moving in high speed, seamless mobility is crucial during the MEC service migration from one base station (BS) to another. In this paper, we investigate the problem of joint power allocation and Handover (HO) management in a MEC network with a Deep Reinforcement Learning (DRL) approach. To handle the hybrid action space (continuous: power allocation and discrete: HO decision), we leverage Parameterized Deep Q-Network (P-DQN) to learn the near-optimal solution. Simulation results illustrate that the proposed algorithm (P-DQN) outperforms the conventional approaches, such as the nearest BS +random power and random BS +random power, in terms of reward, HO cost, and total power consumption. According to simulation results, HO occurs almost in the edge point of two BS, which means the HO is almost perfectly managed. In addition, the total power consumption is around 0.151 watts in P-DQN while it is about 0.75 watts in nearest BS +random power and random BS +random power.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142312699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service placement strategies in mobile edge computing based on an improved genetic algorithm","authors":"Ruijuan Zheng, Junwei Xu, Xueqi Wang, Muhua Liu, Junlong Zhu","doi":"10.1016/j.pmcj.2024.101986","DOIUrl":"10.1016/j.pmcj.2024.101986","url":null,"abstract":"<div><div>In mobile edge computing (MEC), quality of service (QoS) is closely related to optimizing service placement strategies, which is crucial to providing efficient services that meet user needs. However, due to the mobility of users and the energy consumption limit of edge servers, the existing policies make it difficult to ensure the QoS level of users. In this paper, a novel genetic algorithm based on a simulated annealing algorithm is proposed to balance the QoS of users and the energy consumption of edge servers. Finally, the effectiveness of the algorithm is verified by experiments. The results show that the QoS value obtained by the proposed algorithm is closer to the maximum value, which has significant advantages in improving QoS value and resource utilization. In addition, in software development related to mobile edge computing, our algorithm helps improve the program’s running speed.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142531087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}