首页 > 最新文献

2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)最新文献

英文 中文
VoIP Can Still Be Exploited - Badly VoIP仍然可以被严重利用
Pub Date : 2020-04-01 DOI: 10.1109/FMEC49853.2020.9144875
Pietro Biondi, S. Bognanni, G. Bella
VoIP phones are early representatives as well as present enhancers of the IoT. This paper observes that they are still widely used in a traditional, unsecured configuration and demonstrates the Phonejack family of attacks: Phonejack 1 conjectures the exploitation of phone vulnerabilities; Phonejack 2 demonstrates how to mount a denial-of-service attack on a network of phones; Phonejack 3 sniffs calls. It is reassuring, however, that inexpensive devices such as a Raspberry Pi can be configured and programmed as effective countermeasures, thus supporting the approach of integrating both technologies. A video clip demonstrates both attacks and defence measures [14]. The concluding evaluations argue that trusting the underlying network security measures may turn out overly optimistic; moreover, VoIP phones really ought to be protected as laptops routinely are today.
VoIP电话是物联网的早期代表,也是目前的增强器。本文观察到它们仍然广泛用于传统的,不安全的配置,并演示了Phonejack系列攻击:Phonejack 1推测利用手机漏洞;Phonejack 2演示了如何在电话网络上安装拒绝服务攻击;电话插孔3嗅探电话。然而,令人放心的是,像树莓派这样的廉价设备可以配置和编程为有效的对策,从而支持集成这两种技术的方法。视频片段演示了攻击和防御措施[14]。结论性评价认为,相信潜在的网络安全措施可能会变得过于乐观;此外,VoIP电话确实应该像今天的笔记本电脑一样受到保护。
{"title":"VoIP Can Still Be Exploited - Badly","authors":"Pietro Biondi, S. Bognanni, G. Bella","doi":"10.1109/FMEC49853.2020.9144875","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144875","url":null,"abstract":"VoIP phones are early representatives as well as present enhancers of the IoT. This paper observes that they are still widely used in a traditional, unsecured configuration and demonstrates the Phonejack family of attacks: Phonejack 1 conjectures the exploitation of phone vulnerabilities; Phonejack 2 demonstrates how to mount a denial-of-service attack on a network of phones; Phonejack 3 sniffs calls. It is reassuring, however, that inexpensive devices such as a Raspberry Pi can be configured and programmed as effective countermeasures, thus supporting the approach of integrating both technologies. A video clip demonstrates both attacks and defence measures [14]. The concluding evaluations argue that trusting the underlying network security measures may turn out overly optimistic; moreover, VoIP phones really ought to be protected as laptops routinely are today.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124423203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IoT-WLAN Proximity Network for Potentiostats 用于电位器的IoT-WLAN接近网络
Pub Date : 2020-04-01 DOI: 10.1109/FMEC49853.2020.9144776
P. González, Jaime Lloret, J. Tomás, O. Rodriguez, Mikel Hurtado
The implementation of potentiostats as portable and communicated devices has reached significant progress to benefit research, industry, and education. The Internet of Things (IoT) is a good opportunity to interconnect devices such as the potentiostats together with electronics, communication technologies, and chemistry into a single system. This work proposes a network for potentiostats using machine-to-machine (M2M) protocols, modifying its functioning mechanism in the broker to check the payload of the message that passes through it and synchronize the sensors depending on its content. Although one sensor can be synchronized directly to another, the broker decides which sensor to pair. This modification was made in the M2M protocol algorithm, both in the Broker and in the Client (sensor). In addition to this, the network uses an interconnection architecture of IoT smart networks of proximity with centralized management. The results of the tests carried out showed that the use of a modified M2M such as the one proposed in the architecture allows synchronization and comparison of the measurements of several sensors in real-time.
实现电位器作为便携式和通信设备已经取得了重大进展,有利于研究,工业和教育。物联网(IoT)是一个很好的机会,可以将电位器等设备与电子、通信技术和化学技术连接到一个单一的系统中。这项工作提出了一个使用机器对机器(M2M)协议的电位器网络,修改其在代理中的功能机制,以检查通过它的消息的有效载荷,并根据其内容同步传感器。尽管一个传感器可以直接与另一个传感器同步,但由代理决定配对哪个传感器。这种修改是在Broker和Client(传感器)中的M2M协议算法中进行的。除此之外,该网络还采用物联网智能网络的互联架构,就近集中管理。进行的测试结果表明,使用改进的M2M(如架构中提出的M2M)可以实时同步和比较多个传感器的测量结果。
{"title":"IoT-WLAN Proximity Network for Potentiostats","authors":"P. González, Jaime Lloret, J. Tomás, O. Rodriguez, Mikel Hurtado","doi":"10.1109/FMEC49853.2020.9144776","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144776","url":null,"abstract":"The implementation of potentiostats as portable and communicated devices has reached significant progress to benefit research, industry, and education. The Internet of Things (IoT) is a good opportunity to interconnect devices such as the potentiostats together with electronics, communication technologies, and chemistry into a single system. This work proposes a network for potentiostats using machine-to-machine (M2M) protocols, modifying its functioning mechanism in the broker to check the payload of the message that passes through it and synchronize the sensors depending on its content. Although one sensor can be synchronized directly to another, the broker decides which sensor to pair. This modification was made in the M2M protocol algorithm, both in the Broker and in the Client (sensor). In addition to this, the network uses an interconnection architecture of IoT smart networks of proximity with centralized management. The results of the tests carried out showed that the use of a modified M2M such as the one proposed in the architecture allows synchronization and comparison of the measurements of several sensors in real-time.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133945832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Dynamic Approach for Consistency Service in Cloud and Fog Environment 云雾环境下一致性服务的动态方法
Pub Date : 2020-04-01 DOI: 10.1109/FMEC49853.2020.9144792
Nour Mostafa
Users of data-intensive cloud and fog computing service require reliable and continuous access to very large amount of data from cloud and fog service providers. The size of data in such applications is massive. A cloud and fog use replication as a database management technique to improve availability, fault tolerance, and one of the major aims of the cloud and fog is to reduce job response time. To support such continuous data access, this paper proposes a dynamic replica consistency approach, Cloud Fog Dynamic Consistency (CFDC), which combines the advantages of the optimistic and pessimistic approaches to achieve and ensure local and global consistency service within cloud and fog systems. The proposed CFDC approach provides a suitable solution for the scale up of the cloud and fog environment to maximize the performance and quality of services of those systems.
数据密集型云和雾计算服务的用户需要可靠且持续地访问来自云和雾服务提供商的大量数据。这类应用程序的数据量是巨大的。云和雾使用复制作为一种数据库管理技术来提高可用性和容错性,云和雾的主要目标之一是减少作业响应时间。为了支持这种连续的数据访问,本文提出了一种动态副本一致性方法——云雾动态一致性(Cloud Fog dynamic consistency, CFDC),该方法结合了乐观和悲观方法的优点,以实现和保证云雾系统内部的本地和全局一致性服务。提出的CFDC方法为云雾环境的扩展提供了一种合适的解决方案,以最大限度地提高这些系统的性能和服务质量。
{"title":"A Dynamic Approach for Consistency Service in Cloud and Fog Environment","authors":"Nour Mostafa","doi":"10.1109/FMEC49853.2020.9144792","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144792","url":null,"abstract":"Users of data-intensive cloud and fog computing service require reliable and continuous access to very large amount of data from cloud and fog service providers. The size of data in such applications is massive. A cloud and fog use replication as a database management technique to improve availability, fault tolerance, and one of the major aims of the cloud and fog is to reduce job response time. To support such continuous data access, this paper proposes a dynamic replica consistency approach, Cloud Fog Dynamic Consistency (CFDC), which combines the advantages of the optimistic and pessimistic approaches to achieve and ensure local and global consistency service within cloud and fog systems. The proposed CFDC approach provides a suitable solution for the scale up of the cloud and fog environment to maximize the performance and quality of services of those systems.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132063537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Building Confidence using Beliefs and Arguments in Security Class Evaluations for IoT 在物联网安全类评估中使用信念和论据建立信心
Pub Date : 2020-04-01 DOI: 10.1109/FMEC49853.2020.9144957
Manish Shrestha, Christian Johansen, Josef Noll
The proliferation of IoT (Internet of Things) though making life easier, comes with security and privacy challenges. We have previously proposed a security classification methodology meant to help in practice build IoT systems focused on security during the development process. This method departs from classical risk analysis and certification methods in two ways: (i) it can be used at design time and (ii) it caters for the needs of system designers by helping them to identify protection mechanisms necessary for the connectivity required by their system under development. However, similarly to many risk analysis methods, this methodology was unable to provide assurance in the evaluation results. In this paper, we add two confidence parameters: belief and uncertainty to the assessment tree of arguments of a class. Thus, the final result is now a tuple , where $C$ is the class to which the system belongs, together with a belief measure $B$ in the evaluation aspects of C, and the uncertainty $U$ in the evaluation details. Looking at the confidence parameters tells how well the security assessment is justified. To exemplify this enhanced security classification methodology, we systematically apply it to control mechanisms for Smart Home Energy Management Systems.
物联网(IoT)的普及虽然让生活变得更容易,但也带来了安全和隐私方面的挑战。我们之前提出了一种安全分类方法,旨在帮助在开发过程中构建专注于安全的物联网系统。该方法在两个方面与传统的风险分析和认证方法不同:(i)它可以在设计时使用,(ii)它通过帮助系统设计者识别开发中的系统所需的连接性所需的保护机制来满足他们的需求。然而,与许多风险分析方法类似,该方法无法为评价结果提供保证。本文在一类参数的评价树中加入了两个置信参数:信誉度和不确定性。因此,最终结果现在是一个元组,其中$C$是系统所属的类,以及C的评估方面的信念度量$B$和评估细节中的不确定性$U$。查看置信度参数可以了解安全性评估的合理性。为了举例说明这种增强的安全分类方法,我们系统地将其应用于智能家居能源管理系统的控制机制。
{"title":"Building Confidence using Beliefs and Arguments in Security Class Evaluations for IoT","authors":"Manish Shrestha, Christian Johansen, Josef Noll","doi":"10.1109/FMEC49853.2020.9144957","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144957","url":null,"abstract":"The proliferation of IoT (Internet of Things) though making life easier, comes with security and privacy challenges. We have previously proposed a security classification methodology meant to help in practice build IoT systems focused on security during the development process. This method departs from classical risk analysis and certification methods in two ways: (i) it can be used at design time and (ii) it caters for the needs of system designers by helping them to identify protection mechanisms necessary for the connectivity required by their system under development. However, similarly to many risk analysis methods, this methodology was unable to provide assurance in the evaluation results. In this paper, we add two confidence parameters: belief and uncertainty to the assessment tree of arguments of a class. Thus, the final result is now a tuple , where $C$ is the class to which the system belongs, together with a belief measure $B$ in the evaluation aspects of C, and the uncertainty $U$ in the evaluation details. Looking at the confidence parameters tells how well the security assessment is justified. To exemplify this enhanced security classification methodology, we systematically apply it to control mechanisms for Smart Home Energy Management Systems.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116538479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network Service Federated Identity (NS- FId) Protocol for Service Authorization in 5G Network 5G网络中服务授权的网络服务联邦身份(NS- FId)协议
Pub Date : 2020-04-01 DOI: 10.1109/FMEC49853.2020.9144706
Ed Kamya Kiyemba Edris, Mahdi Aiash, J. Loo
Fifth generation mobile network (5G) will make network services available anywhere from multiple Service Providers (SP) and its provisioning raises security concerns. The users will require seamless connectivity and secure access to these services. Mobile Network Operator (MNO) will want to provide services to users and be able to share infrastructure resources with other MNOs. This requires robust authentication and authorization mechanisms that can provide secure access and provisioning of service to multiple users and providers in heterogeneous network. Therefore, Federated Identity (FId) with Single Sign On (SSO) could be used for seamless access and provisioning to network services in 5G. So, we propose Network Service Federated Identity (NS-FId) protocol, a federated protocol that provides secure access to services from multiple SPs and provides SSO to users. We formally verify and analyse the proposed NS-FId protocol using ProVerif. We also conduct a security analysis of the protocol's security properties.
第五代移动网络(5G)将使网络服务可以从多个服务提供商(SP)的任何地方获得,其供应引发了安全问题。用户将需要无缝连接和安全访问这些服务。移动网络运营商(MNO)希望向用户提供服务,并能够与其他MNO共享基础设施资源。这需要健壮的身份验证和授权机制,能够为异构网络中的多个用户和提供者提供安全的访问和服务供应。因此,具有单点登录(SSO)的联邦身份(FId)可用于5G网络服务的无缝访问和配置。因此,我们提出了网络服务联邦身份(NS-FId)协议,该协议提供对来自多个sp的服务的安全访问,并为用户提供SSO。我们使用ProVerif正式验证和分析提议的NS-FId协议。我们还对协议的安全属性进行安全分析。
{"title":"Network Service Federated Identity (NS- FId) Protocol for Service Authorization in 5G Network","authors":"Ed Kamya Kiyemba Edris, Mahdi Aiash, J. Loo","doi":"10.1109/FMEC49853.2020.9144706","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144706","url":null,"abstract":"Fifth generation mobile network (5G) will make network services available anywhere from multiple Service Providers (SP) and its provisioning raises security concerns. The users will require seamless connectivity and secure access to these services. Mobile Network Operator (MNO) will want to provide services to users and be able to share infrastructure resources with other MNOs. This requires robust authentication and authorization mechanisms that can provide secure access and provisioning of service to multiple users and providers in heterogeneous network. Therefore, Federated Identity (FId) with Single Sign On (SSO) could be used for seamless access and provisioning to network services in 5G. So, we propose Network Service Federated Identity (NS-FId) protocol, a federated protocol that provides secure access to services from multiple SPs and provides SSO to users. We formally verify and analyse the proposed NS-FId protocol using ProVerif. We also conduct a security analysis of the protocol's security properties.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134138040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Development of Inductive Sensor for Control Gate Opening of an Agricultural Irrigation System 农业灌溉系统闸门开启控制电感式传感器的研制
Pub Date : 2020-04-01 DOI: 10.1109/FMEC49853.2020.9144810
Daniel A. Basterrechea, Javier Rocher, L. Parra, Jaime Lloret
The monitoring of water level in the agriculture irrigation channels is essential to control the opening gates of these channels. In this way, WSNs (Wireless Sensor Networks) have high relevance to obtain this kind of data. In this paper, we propose a sensor to measure the depth changes in irrigation channels to control the gates opening. It is connected to an Adafruit Feather HUZZAH based on ESP8266, which allows us to build a mobile edge computing system. The developed sensor is based on two coils. Sinus-wave powers the first one, and the second is induced. The coils are winding over a polyvinyl chloride (PVC) that has high resistance for corrosion and low price. Besides, we use copper wire as a conductive metal. We test two different configurations of coils. P1 has five spires for the powered coil (PC) and ten spires for the induced coil (IC). On the other hand, P2 has 40 spires for the PC and 80 spires for the IC. The two prototypes were coiled in one layer. Then, both sensors are tested using a glass bottle where the water column increased with the target to obtain the information of the depth. In both prototypes, the difference of voltage between the maximum and minimum studied depths is more or less the same, 4.46V for P1 and 4.44V for P2. Nevertheless, during the stabilization test, the P1 showed better adaptation for the turbulences than the P2. The P1 shows an oscillation of 0.48V, where the P2 has a maximum fluctuation of 3.2V.
农业灌渠水位监测是控制农业灌渠开闸的重要手段。因此,无线传感器网络(WSNs)对获取此类数据具有很高的相关性。在本文中,我们提出了一种传感器来测量灌溉渠的深度变化,以控制闸门的开启。它连接到一个基于ESP8266的Adafruit Feather HUZZAH,使我们能够构建一个移动边缘计算系统。所开发的传感器是基于两个线圈。正弦波驱动第一个,第二个是诱导的。线圈缠绕在聚氯乙烯(PVC)上,具有高耐腐蚀性和低价格。此外,我们使用铜线作为导电金属。我们测试了两种不同配置的线圈。P1有五个尖塔用于供电线圈(PC)和十个尖塔用于感应线圈(IC)。另一方面,P2有40个尖塔用于PC, 80个尖塔用于IC。两个原型卷成一层。然后,用玻璃瓶测试两个传感器,其中水柱随着目标的增加而增加,以获得深度信息。在两个原型中,最大和最小研究深度之间的电压差大致相同,P1为4.46V, P2为4.44V。然而,在稳定试验中,P1对湍流的适应性优于P2。P1的振荡为0.48V, P2的最大波动为3.2V。
{"title":"Development of Inductive Sensor for Control Gate Opening of an Agricultural Irrigation System","authors":"Daniel A. Basterrechea, Javier Rocher, L. Parra, Jaime Lloret","doi":"10.1109/FMEC49853.2020.9144810","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144810","url":null,"abstract":"The monitoring of water level in the agriculture irrigation channels is essential to control the opening gates of these channels. In this way, WSNs (Wireless Sensor Networks) have high relevance to obtain this kind of data. In this paper, we propose a sensor to measure the depth changes in irrigation channels to control the gates opening. It is connected to an Adafruit Feather HUZZAH based on ESP8266, which allows us to build a mobile edge computing system. The developed sensor is based on two coils. Sinus-wave powers the first one, and the second is induced. The coils are winding over a polyvinyl chloride (PVC) that has high resistance for corrosion and low price. Besides, we use copper wire as a conductive metal. We test two different configurations of coils. P1 has five spires for the powered coil (PC) and ten spires for the induced coil (IC). On the other hand, P2 has 40 spires for the PC and 80 spires for the IC. The two prototypes were coiled in one layer. Then, both sensors are tested using a glass bottle where the water column increased with the target to obtain the information of the depth. In both prototypes, the difference of voltage between the maximum and minimum studied depths is more or less the same, 4.46V for P1 and 4.44V for P2. Nevertheless, during the stabilization test, the P1 showed better adaptation for the turbulences than the P2. The P1 shows an oscillation of 0.48V, where the P2 has a maximum fluctuation of 3.2V.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130832187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hudhour: A Fuzzy Logic based Smart Fingerprint Attendance System Hudhour:基于模糊逻辑的智能指纹考勤系统
Pub Date : 2020-04-01 DOI: 10.1109/FMEC49853.2020.9144948
Huda Basloom, Sahar Bo-saeed, Rashid Mehmood
Smart cities, societies, and organizations rely on automation of ordinary and advanced tasks to drive higher efficiencies and economic growth. Automatic personal identification is one such important task in modern enterprises such as for attendance systems and fingerprint verification is among the most reliable methods for the purpose. Designing a fingerprint-based attendance system has several challenges including the need to address false and multiple fingerprint logging, lack of necessary integration with other systems, etc. In this paper, we present a smart attendance system that uses fuzzy logic and integrates with the human resource system including a vacation database to address related challenges. The attendance system is implemented using. NET C# Web service, Oracle database, and the fingerprint device, ZKTeco U260-C. The implemented system has been deployed in a real environment in an organization comprising over 18,000 employees and has been tested using real data containing 6.1 million records. The proposed system is able to reduce the daily error rate from 14.7% to 2.5%. Conclusions are drawn with directions for future work.
智慧城市、社会和组织依靠普通和高级任务的自动化来提高效率和经济增长。个人身份的自动识别是现代企业的一项重要任务,如考勤系统,指纹验证是实现这一目标最可靠的方法之一。设计一个基于指纹的考勤系统有几个挑战,包括需要解决错误和多个指纹记录,缺乏与其他系统的必要集成等。在本文中,我们提出了一个智能考勤系统,使用模糊逻辑,并与人力资源系统集成,包括假期数据库,以解决相关的挑战。考勤系统采用。. NET c# Web服务,Oracle数据库,指纹设备ZKTeco U260-C。所实施的系统已部署在一个拥有超过18,000名员工的组织的真实环境中,并使用包含610万条记录的真实数据进行了测试。该系统能够将日错误率从14.7%降低到2.5%。得出结论,并为今后的工作指明方向。
{"title":"Hudhour: A Fuzzy Logic based Smart Fingerprint Attendance System","authors":"Huda Basloom, Sahar Bo-saeed, Rashid Mehmood","doi":"10.1109/FMEC49853.2020.9144948","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144948","url":null,"abstract":"Smart cities, societies, and organizations rely on automation of ordinary and advanced tasks to drive higher efficiencies and economic growth. Automatic personal identification is one such important task in modern enterprises such as for attendance systems and fingerprint verification is among the most reliable methods for the purpose. Designing a fingerprint-based attendance system has several challenges including the need to address false and multiple fingerprint logging, lack of necessary integration with other systems, etc. In this paper, we present a smart attendance system that uses fuzzy logic and integrates with the human resource system including a vacation database to address related challenges. The attendance system is implemented using. NET C# Web service, Oracle database, and the fingerprint device, ZKTeco U260-C. The implemented system has been deployed in a real environment in an organization comprising over 18,000 employees and has been tested using real data containing 6.1 million records. The proposed system is able to reduce the daily error rate from 14.7% to 2.5%. Conclusions are drawn with directions for future work.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131523245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Maximizing the Life Time of Wireless Sensor Networks Over IoT Environment 最大化物联网环境下无线传感器网络的寿命
Pub Date : 2020-04-01 DOI: 10.1109/FMEC49853.2020.9144826
Khalid A. Darabkh, Wafa'a K. Kassab, A. Khalifeh
The development of novel and efficient energy algorithms for the Internet of Things (IoT) paradigm is a challenging issue since the network performance of this state-of-the-art technology cannot be handled effectively by the existing techniques that are utilized in wireless sensor networks. To meet the requirements of maximizing IoT network lifetime, this paper addresses the energy efficiency challenge by proposing a novel deployment protocol called Life Time Maximizing Based on Analytical Hierarchal Process and Genetic Clustering Protocol (LiM-AHP-G-CP) for the IoT Environment. Particularly, the protocol presents a novel optimal clustering algorithm for battery-powered IoT devices, an efficient IoT heads selection algorithm, as well as a heuristic method for optimal hop selection. The simulation results show that our protocol outperforms the Energy-Aware Clustering and Routing Protocol (EA-CRP) in terms of network energy utilization.
为物联网(IoT)范式开发新颖高效的能量算法是一个具有挑战性的问题,因为无线传感器网络中使用的现有技术无法有效处理这种最先进技术的网络性能。为了满足最大化物联网网络生命周期的要求,本文提出了一种新的物联网环境部署协议,称为基于分析层次过程和遗传聚类协议(LiM-AHP-G-CP)的生命周期最大化,从而解决了能效挑战。特别是,该协议提出了一种新的电池供电物联网设备的最优聚类算法,一种高效的物联网头选择算法,以及一种最优跳选择的启发式方法。仿真结果表明,该协议在网络能量利用率方面优于能量感知聚类路由协议(EA-CRP)。
{"title":"Maximizing the Life Time of Wireless Sensor Networks Over IoT Environment","authors":"Khalid A. Darabkh, Wafa'a K. Kassab, A. Khalifeh","doi":"10.1109/FMEC49853.2020.9144826","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144826","url":null,"abstract":"The development of novel and efficient energy algorithms for the Internet of Things (IoT) paradigm is a challenging issue since the network performance of this state-of-the-art technology cannot be handled effectively by the existing techniques that are utilized in wireless sensor networks. To meet the requirements of maximizing IoT network lifetime, this paper addresses the energy efficiency challenge by proposing a novel deployment protocol called Life Time Maximizing Based on Analytical Hierarchal Process and Genetic Clustering Protocol (LiM-AHP-G-CP) for the IoT Environment. Particularly, the protocol presents a novel optimal clustering algorithm for battery-powered IoT devices, an efficient IoT heads selection algorithm, as well as a heuristic method for optimal hop selection. The simulation results show that our protocol outperforms the Energy-Aware Clustering and Routing Protocol (EA-CRP) in terms of network energy utilization.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130500681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Energy Efficient Smart Street Lighting System in Nagpur Smart City using IoT-A Case Study 那格浦尔智慧城市使用物联网的节能智能街道照明系统案例研究
Pub Date : 2020-04-01 DOI: 10.1109/FMEC49853.2020.9144848
R. Prasad
Street Lighting is an important factor for ensuring safety in the city and instilling a sense of security in the mind of the citizens. But the cost associated with it is quite high which is borne by the local municipalities. Recent development in the lighting devices has seen a paradigm shift in the types of devices used which has led to little savings in energy consumption, but a lot remains wasted. Smart street lighting is a cost-effective solution in an urban environment which compromises of advance wireless communication techniques, low cost LED lights and additional sensors which controls the intensity of light. This new system has significant cost and energy savings over the conventional switching ON-OFF method. This paper presents a case study of smart lighting system in Nagpur smart city where one of the goals was to reduce the carbon footprint by reducing the energy consumption. This was achieved by replacing the outdated 320 street luminaries and integrating additional 63 LED lights with motion detection smart lighting system. The deployed intelligent street lighting system of Nagpur smart city has drastically reduced the energy consumption by approximately 55 % per month, while maintaining the lighting norms for the pedestrians and vehicles.
街道照明是确保城市安全的重要因素,也是向市民灌输安全感的重要因素。但与此相关的成本相当高,由当地市政当局承担。最近照明设备的发展已经看到了所使用设备类型的范式转变,这导致了很少的能源消耗节约,但仍然浪费了很多。在城市环境中,智能街道照明是一种具有成本效益的解决方案,它结合了先进的无线通信技术、低成本的LED灯和控制光强度的附加传感器。与传统的开关- off方法相比,这种新系统具有显著的成本和能源节约。本文介绍了那格浦尔智能城市智能照明系统的一个案例研究,其目标之一是通过减少能源消耗来减少碳足迹。这是通过替换过时的320盏路灯,并将额外的63盏LED灯与运动检测智能照明系统集成在一起实现的。那格浦尔智能城市部署的智能街道照明系统每月大幅降低了约55%的能耗,同时保持了行人和车辆的照明标准。
{"title":"Energy Efficient Smart Street Lighting System in Nagpur Smart City using IoT-A Case Study","authors":"R. Prasad","doi":"10.1109/FMEC49853.2020.9144848","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144848","url":null,"abstract":"Street Lighting is an important factor for ensuring safety in the city and instilling a sense of security in the mind of the citizens. But the cost associated with it is quite high which is borne by the local municipalities. Recent development in the lighting devices has seen a paradigm shift in the types of devices used which has led to little savings in energy consumption, but a lot remains wasted. Smart street lighting is a cost-effective solution in an urban environment which compromises of advance wireless communication techniques, low cost LED lights and additional sensors which controls the intensity of light. This new system has significant cost and energy savings over the conventional switching ON-OFF method. This paper presents a case study of smart lighting system in Nagpur smart city where one of the goals was to reduce the carbon footprint by reducing the energy consumption. This was achieved by replacing the outdated 320 street luminaries and integrating additional 63 LED lights with motion detection smart lighting system. The deployed intelligent street lighting system of Nagpur smart city has drastically reduced the energy consumption by approximately 55 % per month, while maintaining the lighting norms for the pedestrians and vehicles.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133047493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Computational Offloading for CNN-based Toxic Comment Detection on a Smartwatch 智能手表上基于cnn的有毒评论检测的计算卸载
Pub Date : 2020-04-01 DOI: 10.1109/FMEC49853.2020.9144770
I. Zualkernan, Mohammed Towheed
Smartwatches are an important enabler of the Social Internet of Things (SIoT). However, a successful transition to SIoT will require negotiating challenges specific to social networks. One current challenge for social networks is the detection and removal of toxic comments like insults, threats, or sexually explicit language. Many proposed techniques for detecting toxic comments use deep neural networks. Like Siri, a smartwatch can use a remote service to detect toxic comments, or alternatively run the neural network on the edge to detect such comments. This paper presents the results of an experiment comparing the tradeoffs in memory consumption, CPU load and response time between running a toxic text detection CNN on a Samsung S3 smartwatch, or running the CNN remotely using computational offloading. Sentences were processed either periodically or by using a Poisson distribution with periods of between 0.25 and 4 minutes. The results were that there was little difference in battery depletion between running the CNN locally on the watch or remotely running the CNN. However, using WIFI for offloading resulted in much better (< 1 second) response time than running the CNN on the watch (1–2 seconds). This suggests that computational offloading is a preferred solution in this instance.
智能手表是社会物联网(SIoT)的重要推动者。然而,向SIoT的成功过渡将需要针对社交网络的特定挑战进行协商。社交网络目前面临的一个挑战是检测和删除有害评论,如侮辱、威胁或露骨的性语言。许多提出的检测有毒评论的技术都使用了深度神经网络。与Siri一样,智能手表可以使用远程服务来检测有毒评论,或者在边缘运行神经网络来检测此类评论。本文介绍了一项实验的结果,比较了在三星S3智能手表上运行有毒文本检测CNN或使用计算卸载远程运行CNN在内存消耗,CPU负载和响应时间方面的权衡。句子要么定期处理,要么使用泊松分布处理,周期在0.25到4分钟之间。结果表明,在手表上本地运行CNN和远程运行CNN在电池消耗方面几乎没有区别。然而,使用WIFI进行卸载导致的响应时间(< 1秒)比在手表上运行CNN(1 - 2秒)要好得多。这表明在这种情况下,计算卸载是首选的解决方案。
{"title":"Computational Offloading for CNN-based Toxic Comment Detection on a Smartwatch","authors":"I. Zualkernan, Mohammed Towheed","doi":"10.1109/FMEC49853.2020.9144770","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144770","url":null,"abstract":"Smartwatches are an important enabler of the Social Internet of Things (SIoT). However, a successful transition to SIoT will require negotiating challenges specific to social networks. One current challenge for social networks is the detection and removal of toxic comments like insults, threats, or sexually explicit language. Many proposed techniques for detecting toxic comments use deep neural networks. Like Siri, a smartwatch can use a remote service to detect toxic comments, or alternatively run the neural network on the edge to detect such comments. This paper presents the results of an experiment comparing the tradeoffs in memory consumption, CPU load and response time between running a toxic text detection CNN on a Samsung S3 smartwatch, or running the CNN remotely using computational offloading. Sentences were processed either periodically or by using a Poisson distribution with periods of between 0.25 and 4 minutes. The results were that there was little difference in battery depletion between running the CNN locally on the watch or remotely running the CNN. However, using WIFI for offloading resulted in much better (< 1 second) response time than running the CNN on the watch (1–2 seconds). This suggests that computational offloading is a preferred solution in this instance.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131308558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1