Pub Date : 2020-04-01DOI: 10.1109/FMEC49853.2020.9144875
Pietro Biondi, S. Bognanni, G. Bella
VoIP phones are early representatives as well as present enhancers of the IoT. This paper observes that they are still widely used in a traditional, unsecured configuration and demonstrates the Phonejack family of attacks: Phonejack 1 conjectures the exploitation of phone vulnerabilities; Phonejack 2 demonstrates how to mount a denial-of-service attack on a network of phones; Phonejack 3 sniffs calls. It is reassuring, however, that inexpensive devices such as a Raspberry Pi can be configured and programmed as effective countermeasures, thus supporting the approach of integrating both technologies. A video clip demonstrates both attacks and defence measures [14]. The concluding evaluations argue that trusting the underlying network security measures may turn out overly optimistic; moreover, VoIP phones really ought to be protected as laptops routinely are today.
{"title":"VoIP Can Still Be Exploited - Badly","authors":"Pietro Biondi, S. Bognanni, G. Bella","doi":"10.1109/FMEC49853.2020.9144875","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144875","url":null,"abstract":"VoIP phones are early representatives as well as present enhancers of the IoT. This paper observes that they are still widely used in a traditional, unsecured configuration and demonstrates the Phonejack family of attacks: Phonejack 1 conjectures the exploitation of phone vulnerabilities; Phonejack 2 demonstrates how to mount a denial-of-service attack on a network of phones; Phonejack 3 sniffs calls. It is reassuring, however, that inexpensive devices such as a Raspberry Pi can be configured and programmed as effective countermeasures, thus supporting the approach of integrating both technologies. A video clip demonstrates both attacks and defence measures [14]. The concluding evaluations argue that trusting the underlying network security measures may turn out overly optimistic; moreover, VoIP phones really ought to be protected as laptops routinely are today.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124423203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/FMEC49853.2020.9144776
P. González, Jaime Lloret, J. Tomás, O. Rodriguez, Mikel Hurtado
The implementation of potentiostats as portable and communicated devices has reached significant progress to benefit research, industry, and education. The Internet of Things (IoT) is a good opportunity to interconnect devices such as the potentiostats together with electronics, communication technologies, and chemistry into a single system. This work proposes a network for potentiostats using machine-to-machine (M2M) protocols, modifying its functioning mechanism in the broker to check the payload of the message that passes through it and synchronize the sensors depending on its content. Although one sensor can be synchronized directly to another, the broker decides which sensor to pair. This modification was made in the M2M protocol algorithm, both in the Broker and in the Client (sensor). In addition to this, the network uses an interconnection architecture of IoT smart networks of proximity with centralized management. The results of the tests carried out showed that the use of a modified M2M such as the one proposed in the architecture allows synchronization and comparison of the measurements of several sensors in real-time.
{"title":"IoT-WLAN Proximity Network for Potentiostats","authors":"P. González, Jaime Lloret, J. Tomás, O. Rodriguez, Mikel Hurtado","doi":"10.1109/FMEC49853.2020.9144776","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144776","url":null,"abstract":"The implementation of potentiostats as portable and communicated devices has reached significant progress to benefit research, industry, and education. The Internet of Things (IoT) is a good opportunity to interconnect devices such as the potentiostats together with electronics, communication technologies, and chemistry into a single system. This work proposes a network for potentiostats using machine-to-machine (M2M) protocols, modifying its functioning mechanism in the broker to check the payload of the message that passes through it and synchronize the sensors depending on its content. Although one sensor can be synchronized directly to another, the broker decides which sensor to pair. This modification was made in the M2M protocol algorithm, both in the Broker and in the Client (sensor). In addition to this, the network uses an interconnection architecture of IoT smart networks of proximity with centralized management. The results of the tests carried out showed that the use of a modified M2M such as the one proposed in the architecture allows synchronization and comparison of the measurements of several sensors in real-time.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133945832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/FMEC49853.2020.9144792
Nour Mostafa
Users of data-intensive cloud and fog computing service require reliable and continuous access to very large amount of data from cloud and fog service providers. The size of data in such applications is massive. A cloud and fog use replication as a database management technique to improve availability, fault tolerance, and one of the major aims of the cloud and fog is to reduce job response time. To support such continuous data access, this paper proposes a dynamic replica consistency approach, Cloud Fog Dynamic Consistency (CFDC), which combines the advantages of the optimistic and pessimistic approaches to achieve and ensure local and global consistency service within cloud and fog systems. The proposed CFDC approach provides a suitable solution for the scale up of the cloud and fog environment to maximize the performance and quality of services of those systems.
数据密集型云和雾计算服务的用户需要可靠且持续地访问来自云和雾服务提供商的大量数据。这类应用程序的数据量是巨大的。云和雾使用复制作为一种数据库管理技术来提高可用性和容错性,云和雾的主要目标之一是减少作业响应时间。为了支持这种连续的数据访问,本文提出了一种动态副本一致性方法——云雾动态一致性(Cloud Fog dynamic consistency, CFDC),该方法结合了乐观和悲观方法的优点,以实现和保证云雾系统内部的本地和全局一致性服务。提出的CFDC方法为云雾环境的扩展提供了一种合适的解决方案,以最大限度地提高这些系统的性能和服务质量。
{"title":"A Dynamic Approach for Consistency Service in Cloud and Fog Environment","authors":"Nour Mostafa","doi":"10.1109/FMEC49853.2020.9144792","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144792","url":null,"abstract":"Users of data-intensive cloud and fog computing service require reliable and continuous access to very large amount of data from cloud and fog service providers. The size of data in such applications is massive. A cloud and fog use replication as a database management technique to improve availability, fault tolerance, and one of the major aims of the cloud and fog is to reduce job response time. To support such continuous data access, this paper proposes a dynamic replica consistency approach, Cloud Fog Dynamic Consistency (CFDC), which combines the advantages of the optimistic and pessimistic approaches to achieve and ensure local and global consistency service within cloud and fog systems. The proposed CFDC approach provides a suitable solution for the scale up of the cloud and fog environment to maximize the performance and quality of services of those systems.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132063537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/FMEC49853.2020.9144957
Manish Shrestha, Christian Johansen, Josef Noll
The proliferation of IoT (Internet of Things) though making life easier, comes with security and privacy challenges. We have previously proposed a security classification methodology meant to help in practice build IoT systems focused on security during the development process. This method departs from classical risk analysis and certification methods in two ways: (i) it can be used at design time and (ii) it caters for the needs of system designers by helping them to identify protection mechanisms necessary for the connectivity required by their system under development. However, similarly to many risk analysis methods, this methodology was unable to provide assurance in the evaluation results. In this paper, we add two confidence parameters: belief and uncertainty to the assessment tree of arguments of a class. Thus, the final result is now a tuple , where $C$ is the class to which the system belongs, together with a belief measure $B$ in the evaluation aspects of C, and the uncertainty $U$ in the evaluation details. Looking at the confidence parameters tells how well the security assessment is justified. To exemplify this enhanced security classification methodology, we systematically apply it to control mechanisms for Smart Home Energy Management Systems.
{"title":"Building Confidence using Beliefs and Arguments in Security Class Evaluations for IoT","authors":"Manish Shrestha, Christian Johansen, Josef Noll","doi":"10.1109/FMEC49853.2020.9144957","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144957","url":null,"abstract":"The proliferation of IoT (Internet of Things) though making life easier, comes with security and privacy challenges. We have previously proposed a security classification methodology meant to help in practice build IoT systems focused on security during the development process. This method departs from classical risk analysis and certification methods in two ways: (i) it can be used at design time and (ii) it caters for the needs of system designers by helping them to identify protection mechanisms necessary for the connectivity required by their system under development. However, similarly to many risk analysis methods, this methodology was unable to provide assurance in the evaluation results. In this paper, we add two confidence parameters: belief and uncertainty to the assessment tree of arguments of a class. Thus, the final result is now a tuple , where $C$ is the class to which the system belongs, together with a belief measure $B$ in the evaluation aspects of C, and the uncertainty $U$ in the evaluation details. Looking at the confidence parameters tells how well the security assessment is justified. To exemplify this enhanced security classification methodology, we systematically apply it to control mechanisms for Smart Home Energy Management Systems.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116538479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/FMEC49853.2020.9144706
Ed Kamya Kiyemba Edris, Mahdi Aiash, J. Loo
Fifth generation mobile network (5G) will make network services available anywhere from multiple Service Providers (SP) and its provisioning raises security concerns. The users will require seamless connectivity and secure access to these services. Mobile Network Operator (MNO) will want to provide services to users and be able to share infrastructure resources with other MNOs. This requires robust authentication and authorization mechanisms that can provide secure access and provisioning of service to multiple users and providers in heterogeneous network. Therefore, Federated Identity (FId) with Single Sign On (SSO) could be used for seamless access and provisioning to network services in 5G. So, we propose Network Service Federated Identity (NS-FId) protocol, a federated protocol that provides secure access to services from multiple SPs and provides SSO to users. We formally verify and analyse the proposed NS-FId protocol using ProVerif. We also conduct a security analysis of the protocol's security properties.
{"title":"Network Service Federated Identity (NS- FId) Protocol for Service Authorization in 5G Network","authors":"Ed Kamya Kiyemba Edris, Mahdi Aiash, J. Loo","doi":"10.1109/FMEC49853.2020.9144706","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144706","url":null,"abstract":"Fifth generation mobile network (5G) will make network services available anywhere from multiple Service Providers (SP) and its provisioning raises security concerns. The users will require seamless connectivity and secure access to these services. Mobile Network Operator (MNO) will want to provide services to users and be able to share infrastructure resources with other MNOs. This requires robust authentication and authorization mechanisms that can provide secure access and provisioning of service to multiple users and providers in heterogeneous network. Therefore, Federated Identity (FId) with Single Sign On (SSO) could be used for seamless access and provisioning to network services in 5G. So, we propose Network Service Federated Identity (NS-FId) protocol, a federated protocol that provides secure access to services from multiple SPs and provides SSO to users. We formally verify and analyse the proposed NS-FId protocol using ProVerif. We also conduct a security analysis of the protocol's security properties.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134138040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/FMEC49853.2020.9144810
Daniel A. Basterrechea, Javier Rocher, L. Parra, Jaime Lloret
The monitoring of water level in the agriculture irrigation channels is essential to control the opening gates of these channels. In this way, WSNs (Wireless Sensor Networks) have high relevance to obtain this kind of data. In this paper, we propose a sensor to measure the depth changes in irrigation channels to control the gates opening. It is connected to an Adafruit Feather HUZZAH based on ESP8266, which allows us to build a mobile edge computing system. The developed sensor is based on two coils. Sinus-wave powers the first one, and the second is induced. The coils are winding over a polyvinyl chloride (PVC) that has high resistance for corrosion and low price. Besides, we use copper wire as a conductive metal. We test two different configurations of coils. P1 has five spires for the powered coil (PC) and ten spires for the induced coil (IC). On the other hand, P2 has 40 spires for the PC and 80 spires for the IC. The two prototypes were coiled in one layer. Then, both sensors are tested using a glass bottle where the water column increased with the target to obtain the information of the depth. In both prototypes, the difference of voltage between the maximum and minimum studied depths is more or less the same, 4.46V for P1 and 4.44V for P2. Nevertheless, during the stabilization test, the P1 showed better adaptation for the turbulences than the P2. The P1 shows an oscillation of 0.48V, where the P2 has a maximum fluctuation of 3.2V.
{"title":"Development of Inductive Sensor for Control Gate Opening of an Agricultural Irrigation System","authors":"Daniel A. Basterrechea, Javier Rocher, L. Parra, Jaime Lloret","doi":"10.1109/FMEC49853.2020.9144810","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144810","url":null,"abstract":"The monitoring of water level in the agriculture irrigation channels is essential to control the opening gates of these channels. In this way, WSNs (Wireless Sensor Networks) have high relevance to obtain this kind of data. In this paper, we propose a sensor to measure the depth changes in irrigation channels to control the gates opening. It is connected to an Adafruit Feather HUZZAH based on ESP8266, which allows us to build a mobile edge computing system. The developed sensor is based on two coils. Sinus-wave powers the first one, and the second is induced. The coils are winding over a polyvinyl chloride (PVC) that has high resistance for corrosion and low price. Besides, we use copper wire as a conductive metal. We test two different configurations of coils. P1 has five spires for the powered coil (PC) and ten spires for the induced coil (IC). On the other hand, P2 has 40 spires for the PC and 80 spires for the IC. The two prototypes were coiled in one layer. Then, both sensors are tested using a glass bottle where the water column increased with the target to obtain the information of the depth. In both prototypes, the difference of voltage between the maximum and minimum studied depths is more or less the same, 4.46V for P1 and 4.44V for P2. Nevertheless, during the stabilization test, the P1 showed better adaptation for the turbulences than the P2. The P1 shows an oscillation of 0.48V, where the P2 has a maximum fluctuation of 3.2V.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130832187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/FMEC49853.2020.9144948
Huda Basloom, Sahar Bo-saeed, Rashid Mehmood
Smart cities, societies, and organizations rely on automation of ordinary and advanced tasks to drive higher efficiencies and economic growth. Automatic personal identification is one such important task in modern enterprises such as for attendance systems and fingerprint verification is among the most reliable methods for the purpose. Designing a fingerprint-based attendance system has several challenges including the need to address false and multiple fingerprint logging, lack of necessary integration with other systems, etc. In this paper, we present a smart attendance system that uses fuzzy logic and integrates with the human resource system including a vacation database to address related challenges. The attendance system is implemented using. NET C# Web service, Oracle database, and the fingerprint device, ZKTeco U260-C. The implemented system has been deployed in a real environment in an organization comprising over 18,000 employees and has been tested using real data containing 6.1 million records. The proposed system is able to reduce the daily error rate from 14.7% to 2.5%. Conclusions are drawn with directions for future work.
智慧城市、社会和组织依靠普通和高级任务的自动化来提高效率和经济增长。个人身份的自动识别是现代企业的一项重要任务,如考勤系统,指纹验证是实现这一目标最可靠的方法之一。设计一个基于指纹的考勤系统有几个挑战,包括需要解决错误和多个指纹记录,缺乏与其他系统的必要集成等。在本文中,我们提出了一个智能考勤系统,使用模糊逻辑,并与人力资源系统集成,包括假期数据库,以解决相关的挑战。考勤系统采用。. NET c# Web服务,Oracle数据库,指纹设备ZKTeco U260-C。所实施的系统已部署在一个拥有超过18,000名员工的组织的真实环境中,并使用包含610万条记录的真实数据进行了测试。该系统能够将日错误率从14.7%降低到2.5%。得出结论,并为今后的工作指明方向。
{"title":"Hudhour: A Fuzzy Logic based Smart Fingerprint Attendance System","authors":"Huda Basloom, Sahar Bo-saeed, Rashid Mehmood","doi":"10.1109/FMEC49853.2020.9144948","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144948","url":null,"abstract":"Smart cities, societies, and organizations rely on automation of ordinary and advanced tasks to drive higher efficiencies and economic growth. Automatic personal identification is one such important task in modern enterprises such as for attendance systems and fingerprint verification is among the most reliable methods for the purpose. Designing a fingerprint-based attendance system has several challenges including the need to address false and multiple fingerprint logging, lack of necessary integration with other systems, etc. In this paper, we present a smart attendance system that uses fuzzy logic and integrates with the human resource system including a vacation database to address related challenges. The attendance system is implemented using. NET C# Web service, Oracle database, and the fingerprint device, ZKTeco U260-C. The implemented system has been deployed in a real environment in an organization comprising over 18,000 employees and has been tested using real data containing 6.1 million records. The proposed system is able to reduce the daily error rate from 14.7% to 2.5%. Conclusions are drawn with directions for future work.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131523245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/FMEC49853.2020.9144826
Khalid A. Darabkh, Wafa'a K. Kassab, A. Khalifeh
The development of novel and efficient energy algorithms for the Internet of Things (IoT) paradigm is a challenging issue since the network performance of this state-of-the-art technology cannot be handled effectively by the existing techniques that are utilized in wireless sensor networks. To meet the requirements of maximizing IoT network lifetime, this paper addresses the energy efficiency challenge by proposing a novel deployment protocol called Life Time Maximizing Based on Analytical Hierarchal Process and Genetic Clustering Protocol (LiM-AHP-G-CP) for the IoT Environment. Particularly, the protocol presents a novel optimal clustering algorithm for battery-powered IoT devices, an efficient IoT heads selection algorithm, as well as a heuristic method for optimal hop selection. The simulation results show that our protocol outperforms the Energy-Aware Clustering and Routing Protocol (EA-CRP) in terms of network energy utilization.
{"title":"Maximizing the Life Time of Wireless Sensor Networks Over IoT Environment","authors":"Khalid A. Darabkh, Wafa'a K. Kassab, A. Khalifeh","doi":"10.1109/FMEC49853.2020.9144826","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144826","url":null,"abstract":"The development of novel and efficient energy algorithms for the Internet of Things (IoT) paradigm is a challenging issue since the network performance of this state-of-the-art technology cannot be handled effectively by the existing techniques that are utilized in wireless sensor networks. To meet the requirements of maximizing IoT network lifetime, this paper addresses the energy efficiency challenge by proposing a novel deployment protocol called Life Time Maximizing Based on Analytical Hierarchal Process and Genetic Clustering Protocol (LiM-AHP-G-CP) for the IoT Environment. Particularly, the protocol presents a novel optimal clustering algorithm for battery-powered IoT devices, an efficient IoT heads selection algorithm, as well as a heuristic method for optimal hop selection. The simulation results show that our protocol outperforms the Energy-Aware Clustering and Routing Protocol (EA-CRP) in terms of network energy utilization.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130500681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/FMEC49853.2020.9144848
R. Prasad
Street Lighting is an important factor for ensuring safety in the city and instilling a sense of security in the mind of the citizens. But the cost associated with it is quite high which is borne by the local municipalities. Recent development in the lighting devices has seen a paradigm shift in the types of devices used which has led to little savings in energy consumption, but a lot remains wasted. Smart street lighting is a cost-effective solution in an urban environment which compromises of advance wireless communication techniques, low cost LED lights and additional sensors which controls the intensity of light. This new system has significant cost and energy savings over the conventional switching ON-OFF method. This paper presents a case study of smart lighting system in Nagpur smart city where one of the goals was to reduce the carbon footprint by reducing the energy consumption. This was achieved by replacing the outdated 320 street luminaries and integrating additional 63 LED lights with motion detection smart lighting system. The deployed intelligent street lighting system of Nagpur smart city has drastically reduced the energy consumption by approximately 55 % per month, while maintaining the lighting norms for the pedestrians and vehicles.
{"title":"Energy Efficient Smart Street Lighting System in Nagpur Smart City using IoT-A Case Study","authors":"R. Prasad","doi":"10.1109/FMEC49853.2020.9144848","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144848","url":null,"abstract":"Street Lighting is an important factor for ensuring safety in the city and instilling a sense of security in the mind of the citizens. But the cost associated with it is quite high which is borne by the local municipalities. Recent development in the lighting devices has seen a paradigm shift in the types of devices used which has led to little savings in energy consumption, but a lot remains wasted. Smart street lighting is a cost-effective solution in an urban environment which compromises of advance wireless communication techniques, low cost LED lights and additional sensors which controls the intensity of light. This new system has significant cost and energy savings over the conventional switching ON-OFF method. This paper presents a case study of smart lighting system in Nagpur smart city where one of the goals was to reduce the carbon footprint by reducing the energy consumption. This was achieved by replacing the outdated 320 street luminaries and integrating additional 63 LED lights with motion detection smart lighting system. The deployed intelligent street lighting system of Nagpur smart city has drastically reduced the energy consumption by approximately 55 % per month, while maintaining the lighting norms for the pedestrians and vehicles.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133047493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/FMEC49853.2020.9144770
I. Zualkernan, Mohammed Towheed
Smartwatches are an important enabler of the Social Internet of Things (SIoT). However, a successful transition to SIoT will require negotiating challenges specific to social networks. One current challenge for social networks is the detection and removal of toxic comments like insults, threats, or sexually explicit language. Many proposed techniques for detecting toxic comments use deep neural networks. Like Siri, a smartwatch can use a remote service to detect toxic comments, or alternatively run the neural network on the edge to detect such comments. This paper presents the results of an experiment comparing the tradeoffs in memory consumption, CPU load and response time between running a toxic text detection CNN on a Samsung S3 smartwatch, or running the CNN remotely using computational offloading. Sentences were processed either periodically or by using a Poisson distribution with periods of between 0.25 and 4 minutes. The results were that there was little difference in battery depletion between running the CNN locally on the watch or remotely running the CNN. However, using WIFI for offloading resulted in much better (< 1 second) response time than running the CNN on the watch (1–2 seconds). This suggests that computational offloading is a preferred solution in this instance.
{"title":"Computational Offloading for CNN-based Toxic Comment Detection on a Smartwatch","authors":"I. Zualkernan, Mohammed Towheed","doi":"10.1109/FMEC49853.2020.9144770","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144770","url":null,"abstract":"Smartwatches are an important enabler of the Social Internet of Things (SIoT). However, a successful transition to SIoT will require negotiating challenges specific to social networks. One current challenge for social networks is the detection and removal of toxic comments like insults, threats, or sexually explicit language. Many proposed techniques for detecting toxic comments use deep neural networks. Like Siri, a smartwatch can use a remote service to detect toxic comments, or alternatively run the neural network on the edge to detect such comments. This paper presents the results of an experiment comparing the tradeoffs in memory consumption, CPU load and response time between running a toxic text detection CNN on a Samsung S3 smartwatch, or running the CNN remotely using computational offloading. Sentences were processed either periodically or by using a Poisson distribution with periods of between 0.25 and 4 minutes. The results were that there was little difference in battery depletion between running the CNN locally on the watch or remotely running the CNN. However, using WIFI for offloading resulted in much better (< 1 second) response time than running the CNN on the watch (1–2 seconds). This suggests that computational offloading is a preferred solution in this instance.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131308558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}