首页 > 最新文献

2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)最新文献

英文 中文
Design and Implementation of a Wearable Device for Motivating Patients With Upper and/or Lower Limb Disability Via Gaming and Home Rehabilitation 一种可穿戴设备的设计和实现,用于通过游戏和家庭康复来激励上肢和/或下肢残疾患者
Pub Date : 2019-06-10 DOI: 10.1109/FMEC.2019.8795317
Michael Opoku Agyeman, Ali Al-Mahmood
Stroke survivors often suffer from a permanent or partial disability that restricts the movement of the hands, arms and/or legs. To help patients recover, rehabilitation should be at an earlier stage of the injury. Without motivation, it would be challenging for patients to successfully engage in the recovery process which can sometimes be painful of inconvenient. The application of wearable devices, games and Internet-of-Things (IoT) can create a motivating atmosphere to facilitate the rehabilitation process of patients while enabling remote monitoring of their health and progress. This paper presents the design and implementation of a rehabilitation system for aimed at helping stroke patients suffering from upper limb disability that exploits IoT by integrating gaming and wearable technology.
中风幸存者往往患有永久性或部分残疾,限制了手、手臂和/或腿的活动。为了帮助患者康复,康复应该在损伤的早期阶段进行。如果没有动力,对病人来说,成功地参与康复过程将是一项挑战,这有时会带来痛苦和不便。可穿戴设备、游戏和物联网(IoT)的应用可以创造一种激励氛围,促进患者的康复过程,同时实现对他们的健康和进展的远程监控。本文介绍了一种旨在帮助患有上肢残疾的中风患者的康复系统的设计和实现,该系统通过集成游戏和可穿戴技术来利用物联网。
{"title":"Design and Implementation of a Wearable Device for Motivating Patients With Upper and/or Lower Limb Disability Via Gaming and Home Rehabilitation","authors":"Michael Opoku Agyeman, Ali Al-Mahmood","doi":"10.1109/FMEC.2019.8795317","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795317","url":null,"abstract":"Stroke survivors often suffer from a permanent or partial disability that restricts the movement of the hands, arms and/or legs. To help patients recover, rehabilitation should be at an earlier stage of the injury. Without motivation, it would be challenging for patients to successfully engage in the recovery process which can sometimes be painful of inconvenient. The application of wearable devices, games and Internet-of-Things (IoT) can create a motivating atmosphere to facilitate the rehabilitation process of patients while enabling remote monitoring of their health and progress. This paper presents the design and implementation of a rehabilitation system for aimed at helping stroke patients suffering from upper limb disability that exploits IoT by integrating gaming and wearable technology.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116820368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Survey on LoRa for IoT: Integrating Edge Computing 物联网LoRa研究综述:集成边缘计算
Pub Date : 2019-06-10 DOI: 10.1109/FMEC.2019.8795313
V. Sarker, J. P. Queralta, Tuan Anh Nguyen Gia, H. Tenhunen, Tomi Westerlund
Increased automation and intelligence in computer systems have revealed limitations of Cloud-based computing such as unpredicted latency in safety-critical and performance-sensitive applications. The amount of data generated from ubiquitous sensors has reached a degree where it becomes impractical to always store and process in the Cloud. Edge computing brings computation and storage to the Edge of the network near to where the data originates yielding reduced network load and better performance of services. In parallel, new wireless communication technologies have appeared to facilitate the expansion of Internet of Things (IoT). Instead of seeking higher data rates, low-power wide-area network aims at battery-powered sensor nodes and devices which require reliable communication for a prolonged period of time. Recently, Long Range (LoRa) has become a popular choice for IoT-based solutions. In this paper, we explore and analyze different application fields and related works which use LoRa and investigate potential improvement opportunities and considerations. Furthermore, we propose a generic architecture to integrate Edge computation capability in IoT-based applications for enhanced performance.
计算机系统自动化和智能化程度的提高揭示了基于云计算的局限性,例如在安全关键型和性能敏感型应用程序中出现不可预测的延迟。无处不在的传感器产生的数据量已经达到了一定程度,因此始终在云中存储和处理变得不切实际。边缘计算将计算和存储带到靠近数据来源的网络边缘,从而减少网络负载并提高服务性能。与此同时,新的无线通信技术已经出现,以促进物联网(IoT)的扩展。低功耗广域网不是追求更高的数据速率,而是针对电池供电的传感器节点和需要长时间可靠通信的设备。最近,远程(LoRa)已成为基于物联网的解决方案的热门选择。本文对LoRa的不同应用领域和相关工作进行了探讨和分析,并探讨了潜在的改进机会和注意事项。此外,我们提出了一种通用架构来集成边缘计算能力,以增强基于物联网的应用程序的性能。
{"title":"A Survey on LoRa for IoT: Integrating Edge Computing","authors":"V. Sarker, J. P. Queralta, Tuan Anh Nguyen Gia, H. Tenhunen, Tomi Westerlund","doi":"10.1109/FMEC.2019.8795313","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795313","url":null,"abstract":"Increased automation and intelligence in computer systems have revealed limitations of Cloud-based computing such as unpredicted latency in safety-critical and performance-sensitive applications. The amount of data generated from ubiquitous sensors has reached a degree where it becomes impractical to always store and process in the Cloud. Edge computing brings computation and storage to the Edge of the network near to where the data originates yielding reduced network load and better performance of services. In parallel, new wireless communication technologies have appeared to facilitate the expansion of Internet of Things (IoT). Instead of seeking higher data rates, low-power wide-area network aims at battery-powered sensor nodes and devices which require reliable communication for a prolonged period of time. Recently, Long Range (LoRa) has become a popular choice for IoT-based solutions. In this paper, we explore and analyze different application fields and related works which use LoRa and investigate potential improvement opportunities and considerations. Furthermore, we propose a generic architecture to integrate Edge computation capability in IoT-based applications for enhanced performance.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129223792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Dynamic Routing Using Precipitation Data 使用降水数据的动态路由
Pub Date : 2019-06-10 DOI: 10.1109/FMEC.2019.8795347
Philipp Kisters, Dirk Bade, Julius Wulk
Smart mobility is one of the cornerstones of smart cities and in particular, smarter routing decisions are desired and required in order to optimize urban, intermodal transports for individuals as well as businesses. Smart routing comes as a multi-criterion optimization problem, not only dealing solely with efficiency anymore but also with ecologic and economic aspects, as well as comfort, safety, fun etc. In this paper, we propose two new routing algorithms that dynamically re-evaluate rainless routes using up-to-date, high-resolution precipitation information, that additionally take user preferences into account and also consider optimal temporal offsets for departure. Thereby, we not only focus on, e.g., cyclist and pedestrians, who would obviously benefit from such routing, but also on more visionary use cases including aerial or water-borne vehicles. We implemented a middle-tier and a mobile application in order to proof the feasibility of our precipitation-based routing algorithms and demonstrate the advantages by presenting preliminary results of an evaluation using real historical precipitation data.
智能交通是智慧城市的基石之一,特别是,为了优化城市、个人和企业的多式联运,需要更智能的路线决策。智能路线是一个多准则优化问题,不再仅仅是单纯的效率问题,还涉及到生态、经济、舒适性、安全性、趣味性等多个方面。在本文中,我们提出了两种新的路由算法,它们使用最新的高分辨率降水信息动态地重新评估无雨路线,这些算法还考虑了用户偏好,并考虑了出发的最佳时间偏移。因此,我们不仅关注骑自行车的人和行人,他们显然会从这种路线中受益,而且还关注更有远见的用例,包括空中或水上交通工具。我们实现了一个中间层和一个移动应用程序,以证明我们基于降水的路由算法的可行性,并通过使用真实的历史降水数据提供初步评估结果来展示其优势。
{"title":"Dynamic Routing Using Precipitation Data","authors":"Philipp Kisters, Dirk Bade, Julius Wulk","doi":"10.1109/FMEC.2019.8795347","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795347","url":null,"abstract":"Smart mobility is one of the cornerstones of smart cities and in particular, smarter routing decisions are desired and required in order to optimize urban, intermodal transports for individuals as well as businesses. Smart routing comes as a multi-criterion optimization problem, not only dealing solely with efficiency anymore but also with ecologic and economic aspects, as well as comfort, safety, fun etc. In this paper, we propose two new routing algorithms that dynamically re-evaluate rainless routes using up-to-date, high-resolution precipitation information, that additionally take user preferences into account and also consider optimal temporal offsets for departure. Thereby, we not only focus on, e.g., cyclist and pedestrians, who would obviously benefit from such routing, but also on more visionary use cases including aerial or water-borne vehicles. We implemented a middle-tier and a mobile application in order to proof the feasibility of our precipitation-based routing algorithms and demonstrate the advantages by presenting preliminary results of an evaluation using real historical precipitation data.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134491086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Autotree: Connecting Cheap IoT Nodes with an Auto-Configuring WiFi Tree Network Autotree:通过自动配置WiFi树网络连接廉价的物联网节点
Pub Date : 2019-06-10 DOI: 10.1109/FMEC.2019.8795311
M. Gergeleit
This paper describes a tree routing mechanism called “Autotree” that automatically establishes an IP-based multi-hop routing on a network of WiFi enabled IoT nodes. It uses NAT and a variation of distance vector routing to dynamically establish an efficient tree without any manual intervention. It automatically adapts to topology changes, thus it can react on node failures and (limited) node mobility. It uses standard IEEE 802.11 links with WPA2 security. Also, the mechanism is completely transparent for other connected WiFi devices. Autotree has been implemented and evaluated on ESP8266 boards.
本文描述了一种称为“Autotree”的树路由机制,该机制可以在支持WiFi的物联网节点网络上自动建立基于ip的多跳路由。它使用NAT和距离矢量路由的变化来动态地建立一个有效的树,而无需任何人工干预。它自动适应拓扑变化,因此可以对节点故障和(有限的)节点移动做出反应。它使用标准的IEEE 802.11链路,具有WPA2安全性。此外,该机制对其他连接的WiFi设备是完全透明的。Autotree已在ESP8266板上实现并进行了评估。
{"title":"Autotree: Connecting Cheap IoT Nodes with an Auto-Configuring WiFi Tree Network","authors":"M. Gergeleit","doi":"10.1109/FMEC.2019.8795311","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795311","url":null,"abstract":"This paper describes a tree routing mechanism called “Autotree” that automatically establishes an IP-based multi-hop routing on a network of WiFi enabled IoT nodes. It uses NAT and a variation of distance vector routing to dynamically establish an efficient tree without any manual intervention. It automatically adapts to topology changes, thus it can react on node failures and (limited) node mobility. It uses standard IEEE 802.11 links with WPA2 security. Also, the mechanism is completely transparent for other connected WiFi devices. Autotree has been implemented and evaluated on ESP8266 boards.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127972000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Authorizations in Cloud-Based Internet of Things: Current Trends and Use Cases 基于云的物联网中的授权:当前趋势和用例
Pub Date : 2019-06-10 DOI: 10.1109/FMEC.2019.8795309
Smriti Bhatt, L. Tawalbeh, Pankaj Chhetri, Paras Bhatt
With the advancement of the Internet and technology, the Internet of Things (IoT) has gained significant momentum in recent years. There is rapid growth in the number of smart IoT devices and IoT applications. These devices and applications primarily gather, store, and share user data. However, the IoT devices have limited resources, such as storage, power, and computation. Cloud Computing enables IoT to leverage its unlimited capabilities, such as storage, computation, and analytics. Today, Cloud and IoT have become parallels and move together to form a Cloud-Enabled IoT architecture. This diverse and dynamic Cloud-IoT architecture, where IoT devices connect and disconnect on the fly and share data for analysis and computation with the Cloud raises many security and privacy concerns and broadens the attack surface. For example, in a government organization with high security and data privacy risk, there has to be a secure access control mechanism in place to ensure authorized access to data and resources. In this paper, we discuss the state-of-art of authorization mechanisms in Cloud- Enabled IoT architecture. We present two use cases – A Smart Home use case, and A Smart University Parking use case, to discuss various access control and authorization requirements in Cloud-Based IoT. We then propose an Attribute-Based Access Control (ABAC), a flexible access control approach, to address these access control requirements in the Cloud-Based IoT architecture, mainly in the context of presented use cases.
随着互联网和技术的进步,物联网(IoT)近年来获得了显著的发展势头。智能物联网设备和物联网应用数量快速增长。这些设备和应用程序主要收集、存储和共享用户数据。然而,物联网设备的资源有限,如存储、电源和计算。云计算使物联网能够利用其无限的功能,如存储、计算和分析。如今,云和物联网已经并驾齐驱,共同形成了支持云的物联网架构。这种多样化和动态的云-物联网架构,物联网设备在飞行中连接和断开连接,并与云共享数据进行分析和计算,引发了许多安全和隐私问题,并扩大了攻击面。例如,在具有高安全性和数据隐私风险的政府组织中,必须有一个安全的访问控制机制,以确保对数据和资源的授权访问。在本文中,我们讨论了云支持物联网架构中授权机制的最新进展。我们提出了两个用例——智能家居用例和智能大学停车场用例,以讨论基于云的物联网中的各种访问控制和授权需求。然后,我们提出了一种基于属性的访问控制(ABAC),一种灵活的访问控制方法,以解决基于云的物联网架构中的这些访问控制需求,主要是在给出的用例上下文中。
{"title":"Authorizations in Cloud-Based Internet of Things: Current Trends and Use Cases","authors":"Smriti Bhatt, L. Tawalbeh, Pankaj Chhetri, Paras Bhatt","doi":"10.1109/FMEC.2019.8795309","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795309","url":null,"abstract":"With the advancement of the Internet and technology, the Internet of Things (IoT) has gained significant momentum in recent years. There is rapid growth in the number of smart IoT devices and IoT applications. These devices and applications primarily gather, store, and share user data. However, the IoT devices have limited resources, such as storage, power, and computation. Cloud Computing enables IoT to leverage its unlimited capabilities, such as storage, computation, and analytics. Today, Cloud and IoT have become parallels and move together to form a Cloud-Enabled IoT architecture. This diverse and dynamic Cloud-IoT architecture, where IoT devices connect and disconnect on the fly and share data for analysis and computation with the Cloud raises many security and privacy concerns and broadens the attack surface. For example, in a government organization with high security and data privacy risk, there has to be a secure access control mechanism in place to ensure authorized access to data and resources. In this paper, we discuss the state-of-art of authorization mechanisms in Cloud- Enabled IoT architecture. We present two use cases – A Smart Home use case, and A Smart University Parking use case, to discuss various access control and authorization requirements in Cloud-Based IoT. We then propose an Attribute-Based Access Control (ABAC), a flexible access control approach, to address these access control requirements in the Cloud-Based IoT architecture, mainly in the context of presented use cases.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129958875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
On the Allocation of Computing Tasks under QoS Constraints in Hierarchical MEC Architectures 分层MEC体系结构中QoS约束下计算任务分配研究
Pub Date : 2019-06-10 DOI: 10.1109/FMEC.2019.8795345
Michele Berno, J. Alcaraz, M. Rossi
In this study, a model for the allocation of processing tasks in Mobile Edge Computing (MEC) environments is put forward, whereby a certain amount of workload, coming from the base stations at the network edge, has to be optimally distributed across the available servers. At first, this allocation problem is formulated as a centralized (offline) optimization program with delay constraints (deadlines), by keeping into account server qualities such as computation speed and cost, and by optimally distributing the workload across a hierarchy of computation servers. Afterwards, the offline problem is solved devising a distributed algorithm, utilizing the Alternating Direction Method of Multipliers (ADMM). Selected numerical results are presented to discuss the key features of our approach, which provides control over contrasting optimization objectives such as minimizing the energy consumption, balancing the workload, and controlling the number of servers that are involved in the computation.
本研究提出了移动边缘计算(MEC)环境下处理任务分配模型,即来自网络边缘基站的一定工作量必须在可用服务器上进行优化分配。首先,通过考虑服务器质量(如计算速度和成本),并通过在计算服务器层次结构中最佳地分配工作负载,将此分配问题表示为具有延迟约束(截止日期)的集中式(脱机)优化程序。然后,利用乘法器交替方向法(ADMM)设计一种分布式算法来解决离线问题。本文给出了选定的数值结果,以讨论我们的方法的关键特征,该方法提供了对对比优化目标的控制,例如最小化能耗、平衡工作负载和控制参与计算的服务器数量。
{"title":"On the Allocation of Computing Tasks under QoS Constraints in Hierarchical MEC Architectures","authors":"Michele Berno, J. Alcaraz, M. Rossi","doi":"10.1109/FMEC.2019.8795345","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795345","url":null,"abstract":"In this study, a model for the allocation of processing tasks in Mobile Edge Computing (MEC) environments is put forward, whereby a certain amount of workload, coming from the base stations at the network edge, has to be optimally distributed across the available servers. At first, this allocation problem is formulated as a centralized (offline) optimization program with delay constraints (deadlines), by keeping into account server qualities such as computation speed and cost, and by optimally distributing the workload across a hierarchy of computation servers. Afterwards, the offline problem is solved devising a distributed algorithm, utilizing the Alternating Direction Method of Multipliers (ADMM). Selected numerical results are presented to discuss the key features of our approach, which provides control over contrasting optimization objectives such as minimizing the energy consumption, balancing the workload, and controlling the number of servers that are involved in the computation.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127969741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Intrusion Detection for IoT Devices based on RF Fingerprinting using Deep Learning 基于深度学习射频指纹的物联网设备入侵检测
Pub Date : 2019-06-10 DOI: 10.1109/FMEC.2019.8795319
J. Bassey, D. Adesina, Xiangfang Li, Lijun Qian, Alexander J. Aved, Timothy S. Kroecker
Internet of Things (IoT) and 4G/5G wireless networks have added huge number of devices and new services, where commercial-of-the-shelf (COTS) IoT devices have been deployed extensively. To ensure secure operations of these systems with wireless transmission capabilities, Radio Frequency (RF) surveillance is important to monitor their activities in RF spectrum and detect unauthorized IoT devices. Specifically, in order to prevent an adversary from impersonating legitimate users using identical devices from the same manufacturer, unique “signatures” must be obtained for every individual device in order to uniquely identify each device. In this study, a novel intrusion detection method is proposed to detect unauthorized IoT devices using deep learning. The proposed method is based on RF fingerprinting since physical layer based features are device specific and more difficult to impersonate. RF traces are collected from six “identical” ZigBee devices via a USRP based test bed. The traces span a range of Signal-to-Noise Ratio, to ensure robustness of the model. A convolutional neural network is used to extract features from the RF traces, and dimension reduction and de-correlation are performed on the extracted features. The reduced features are then clustered to identify IoT devices. We show that the proposed method is able to identify devices that are not observed during training. The results not only highlight the benefit of deep learning based feature extraction, but also show promising prospects for being able to distinguish new devices (classes) that are not observed during training.
物联网(IoT)和4G/5G无线网络增加了大量设备和新服务,商用货架(COTS)物联网设备已被广泛部署。为了确保这些具有无线传输能力的系统的安全运行,射频(RF)监控对于监控其在RF频谱中的活动并检测未经授权的物联网设备非常重要。具体来说,为了防止攻击者使用来自同一制造商的相同设备冒充合法用户,必须为每个单独的设备获得唯一的“签名”,以便唯一地标识每个设备。在本研究中,提出了一种新的入侵检测方法,利用深度学习检测未经授权的物联网设备。所提出的方法是基于射频指纹,因为基于物理层的特征是特定于设备的,更难以模拟。射频走线通过基于USRP的测试平台从六个“相同”的ZigBee设备收集。迹线跨越一定范围的信噪比,以确保模型的鲁棒性。利用卷积神经网络从射频迹中提取特征,并对提取的特征进行降维和去相关处理。然后将减少的特征聚类以识别物联网设备。我们表明,所提出的方法能够识别训练期间未观察到的设备。结果不仅突出了基于深度学习的特征提取的好处,而且显示了能够区分在训练期间未观察到的新设备(类)的良好前景。
{"title":"Intrusion Detection for IoT Devices based on RF Fingerprinting using Deep Learning","authors":"J. Bassey, D. Adesina, Xiangfang Li, Lijun Qian, Alexander J. Aved, Timothy S. Kroecker","doi":"10.1109/FMEC.2019.8795319","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795319","url":null,"abstract":"Internet of Things (IoT) and 4G/5G wireless networks have added huge number of devices and new services, where commercial-of-the-shelf (COTS) IoT devices have been deployed extensively. To ensure secure operations of these systems with wireless transmission capabilities, Radio Frequency (RF) surveillance is important to monitor their activities in RF spectrum and detect unauthorized IoT devices. Specifically, in order to prevent an adversary from impersonating legitimate users using identical devices from the same manufacturer, unique “signatures” must be obtained for every individual device in order to uniquely identify each device. In this study, a novel intrusion detection method is proposed to detect unauthorized IoT devices using deep learning. The proposed method is based on RF fingerprinting since physical layer based features are device specific and more difficult to impersonate. RF traces are collected from six “identical” ZigBee devices via a USRP based test bed. The traces span a range of Signal-to-Noise Ratio, to ensure robustness of the model. A convolutional neural network is used to extract features from the RF traces, and dimension reduction and de-correlation are performed on the extracted features. The reduced features are then clustered to identify IoT devices. We show that the proposed method is able to identify devices that are not observed during training. The results not only highlight the benefit of deep learning based feature extraction, but also show promising prospects for being able to distinguish new devices (classes) that are not observed during training.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130963492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
A Power Management Approach to Reduce Energy Consumption for Edge Computing Servers 降低边缘计算服务器能耗的电源管理方法
Pub Date : 2019-06-10 DOI: 10.1109/FMEC.2019.8795328
Mustafa Daraghmeh, I. A. Ridhawi, M. Aloqaily, Y. Jararweh, A. Agarwal
With the rapid development of edge computing and its applications, requests to edge servers is expected to grow, resulting in higher edge network energy consumption. This in essence would also result in higher operational costs for running edge applications. Furthermore, service providers try to manage their resources efficiently to provide appropriate quality of services to their customers while reducing service costs. To appropriately manage resources, it is necessary to apply useful models to measure energy consumption in the edge network. The linear relationship between energy consumption and CPU utilization is one powerful modeling method used to compute the energy consumption of edge network servers. The method calculates the power consumption of a server based on its CPU utilization during run-time. In this paper, we propose a linear power model for the EdgeCloudSim simulator to measure the energy consumption of edge network servers. Moreover, we introduce a simple dynamic power management model used to minimize power consumption in the edge network by switching the edge servers on and off based on provisioned application needs. The experimental and simulation results show a notable reduction in the total energy consumption when applying the proposed simple model on two different orchestration policies to manage the edge network servers.
随着边缘计算及其应用的快速发展,对边缘服务器的请求预计会越来越多,从而导致边缘网络能耗的增加。从本质上讲,这也会导致运行边缘应用程序的运营成本更高。此外,服务提供者试图有效地管理他们的资源,为他们的客户提供适当的服务质量,同时降低服务成本。为了合理地管理资源,有必要应用有用的模型来度量边缘网络的能耗。能量消耗与CPU利用率之间的线性关系是计算边缘网络服务器能量消耗的一种强大的建模方法。该方法根据服务器运行时的CPU利用率计算服务器的功耗。在本文中,我们为EdgeCloudSim模拟器提出了一个线性功率模型来测量边缘网络服务器的能耗。此外,我们还介绍了一个简单的动态电源管理模型,用于根据预置的应用程序需求打开和关闭边缘服务器,从而最大限度地减少边缘网络中的功耗。实验和仿真结果表明,将提出的简单模型应用于两种不同的编排策略来管理边缘网络服务器时,总能耗显著降低。
{"title":"A Power Management Approach to Reduce Energy Consumption for Edge Computing Servers","authors":"Mustafa Daraghmeh, I. A. Ridhawi, M. Aloqaily, Y. Jararweh, A. Agarwal","doi":"10.1109/FMEC.2019.8795328","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795328","url":null,"abstract":"With the rapid development of edge computing and its applications, requests to edge servers is expected to grow, resulting in higher edge network energy consumption. This in essence would also result in higher operational costs for running edge applications. Furthermore, service providers try to manage their resources efficiently to provide appropriate quality of services to their customers while reducing service costs. To appropriately manage resources, it is necessary to apply useful models to measure energy consumption in the edge network. The linear relationship between energy consumption and CPU utilization is one powerful modeling method used to compute the energy consumption of edge network servers. The method calculates the power consumption of a server based on its CPU utilization during run-time. In this paper, we propose a linear power model for the EdgeCloudSim simulator to measure the energy consumption of edge network servers. Moreover, we introduce a simple dynamic power management model used to minimize power consumption in the edge network by switching the edge servers on and off based on provisioned application needs. The experimental and simulation results show a notable reduction in the total energy consumption when applying the proposed simple model on two different orchestration policies to manage the edge network servers.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134356569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
On the Fog-Cloud Cooperation: How Fog Computing can address latency concerns of IoT applications 论雾云合作:雾计算如何解决物联网应用的延迟问题
Pub Date : 2019-06-10 DOI: 10.1109/FMEC.2019.8795320
Amir Karamoozian, A. Hafid, E. Aboulhamid
Fog computing emerged as a new computing paradigm which moves the computing power to the proximity of users, from core to the edge of the network. It is known as the extension of Cloud computing and it offers inordinate opportunities for real-time and latency-sensitive IoT applications. An IoT application consists of a set of dependent Processing Elements (PEs) defined as operations performed on data streams and can be modeled as a Directed Acyclic Graph (DAG). Each PE performs a variety of low-level computation on the incoming data such as aggregation or filtering. A key challenge is to decide how to distribute such PEs over the resources, in order to minimize the overall response time of the entire PE graph. This problem is known as distributed PE scheduling and placement problem. In this work, we try to address the question of how fog computing paradigm can help reducing the IoT application response time by efficiently distributing PE graphs over the Fog-Cloud continuum. We mathematically formulate the fundamental characteristics of IoT application and Fog infrastructure, then model the system as an optimization problem using Gravitational Search Algorithm (GSA) meta-heuristic technique. Our proposed GSA model is evaluated by comparing it with a well-known evolutionary algorithm in the literature via simulation. Also, a comparative analysis with the legacy cloud infrastructure is done in order to show the significant impact of fog presence on the performance of PE processing. Evaluation of our model demonstrates the efficiency of our approach comparing to the current literature.
雾计算作为一种新的计算范式出现,它将计算能力从网络核心转移到用户附近,从网络边缘转移到用户附近。它被称为云计算的扩展,它为实时和延迟敏感的物联网应用提供了无限的机会。物联网应用由一组相关的处理元素(pe)组成,这些处理元素被定义为在数据流上执行的操作,并且可以建模为有向无环图(DAG)。每个PE对传入数据执行各种低级计算,例如聚合或过滤。一个关键的挑战是决定如何在资源上分配这些PE,以最小化整个PE图的总体响应时间。这个问题被称为分布式PE调度和布局问题。在这项工作中,我们试图解决雾计算范式如何通过在雾云连续体上有效地分发PE图来帮助减少物联网应用程序响应时间的问题。我们在数学上制定了物联网应用和雾基础设施的基本特征,然后使用引力搜索算法(GSA)元启发式技术将系统建模为优化问题。我们提出的GSA模型通过仿真与文献中著名的进化算法进行比较来评估。此外,还与遗留云基础设施进行了比较分析,以显示雾的存在对PE处理性能的重大影响。对我们模型的评估表明,与当前文献相比,我们的方法是有效的。
{"title":"On the Fog-Cloud Cooperation: How Fog Computing can address latency concerns of IoT applications","authors":"Amir Karamoozian, A. Hafid, E. Aboulhamid","doi":"10.1109/FMEC.2019.8795320","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795320","url":null,"abstract":"Fog computing emerged as a new computing paradigm which moves the computing power to the proximity of users, from core to the edge of the network. It is known as the extension of Cloud computing and it offers inordinate opportunities for real-time and latency-sensitive IoT applications. An IoT application consists of a set of dependent Processing Elements (PEs) defined as operations performed on data streams and can be modeled as a Directed Acyclic Graph (DAG). Each PE performs a variety of low-level computation on the incoming data such as aggregation or filtering. A key challenge is to decide how to distribute such PEs over the resources, in order to minimize the overall response time of the entire PE graph. This problem is known as distributed PE scheduling and placement problem. In this work, we try to address the question of how fog computing paradigm can help reducing the IoT application response time by efficiently distributing PE graphs over the Fog-Cloud continuum. We mathematically formulate the fundamental characteristics of IoT application and Fog infrastructure, then model the system as an optimization problem using Gravitational Search Algorithm (GSA) meta-heuristic technique. Our proposed GSA model is evaluated by comparing it with a well-known evolutionary algorithm in the literature via simulation. Also, a comparative analysis with the legacy cloud infrastructure is done in order to show the significant impact of fog presence on the performance of PE processing. Evaluation of our model demonstrates the efficiency of our approach comparing to the current literature.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125552237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Health Monitoring with Low Power IoT Devices using Anomaly Detection Algorithm 使用异常检测算法对低功耗物联网设备进行健康监测
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795327
Suresh K. Peddoju, Himanshu Upadhyay, S. Bhansali
The healthcare industry is rapidly adopting new technologies such as the Internet of Things (IoT), which are dropping costs and improving healthcare outcomes. Such IoT systems typically include edge devices (glucose monitors, ventilators, pacemakers), gateway devices that aggregate the data from the edge devices and transmit it to the cloud, and cloud-based systems which analyze the device data to draw conclusions, display information, or direct the connected devices to take action. This process can lead to communication lags and delayed responses to patient conditions/treatment. The aim of this proposal is to overcome these delays with IoT technology and allow for prompt urgent treatment to patients. The solution proposed includes a model to monitor and process the data disseminated by wearable devices related to the patients’ health issues and connect the data to IoT cloud platforms. Analysis of the patients’ health data to identify anomalies will be performed at the device level by developing an offline machine learning model using specific algorithms for anomaly detection and deploying them on the IoT devices or IoT gateway. Processing of the real-time health data will be performed at the device level and the prediction of anomalous data will be sent to the third-party cloud for implementing any necessary actions.
医疗保健行业正在迅速采用物联网(IoT)等新技术,这些技术正在降低成本并改善医疗保健结果。此类物联网系统通常包括边缘设备(葡萄糖监测器、呼吸机、起搏器)、聚合来自边缘设备的数据并将其传输到云端的网关设备,以及分析设备数据以得出结论、显示信息或指示连接设备采取行动的基于云的系统。这一过程可能导致沟通滞后和对患者病情/治疗的延迟反应。该提案的目的是通过物联网技术克服这些延迟,并允许对患者进行及时紧急治疗。提出的解决方案包括一个模型,用于监控和处理可穿戴设备传播的与患者健康问题相关的数据,并将数据连接到物联网云平台。通过使用特定的异常检测算法开发离线机器学习模型,并将其部署在物联网设备或物联网网关上,从而在设备级执行患者健康数据分析以识别异常。实时健康数据的处理将在设备级执行,异常数据的预测将发送到第三方云,以便实施任何必要的操作。
{"title":"Health Monitoring with Low Power IoT Devices using Anomaly Detection Algorithm","authors":"Suresh K. Peddoju, Himanshu Upadhyay, S. Bhansali","doi":"10.1109/FMEC.2019.8795327","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795327","url":null,"abstract":"The healthcare industry is rapidly adopting new technologies such as the Internet of Things (IoT), which are dropping costs and improving healthcare outcomes. Such IoT systems typically include edge devices (glucose monitors, ventilators, pacemakers), gateway devices that aggregate the data from the edge devices and transmit it to the cloud, and cloud-based systems which analyze the device data to draw conclusions, display information, or direct the connected devices to take action. This process can lead to communication lags and delayed responses to patient conditions/treatment. The aim of this proposal is to overcome these delays with IoT technology and allow for prompt urgent treatment to patients. The solution proposed includes a model to monitor and process the data disseminated by wearable devices related to the patients’ health issues and connect the data to IoT cloud platforms. Analysis of the patients’ health data to identify anomalies will be performed at the device level by developing an offline machine learning model using specific algorithms for anomaly detection and deploying them on the IoT devices or IoT gateway. Processing of the real-time health data will be performed at the device level and the prediction of anomalous data will be sent to the third-party cloud for implementing any necessary actions.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126613416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1