首页 > 最新文献

2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)最新文献

英文 中文
Scalable IoT architecture for balancing performance and security in mobile crowdsensing systems* 可扩展的物联网架构,用于平衡移动人群传感系统的性能和安全性*
Theodoros Nestoridis, C. Oikonomou, Anastasios Temperekidis, F. Gioulekas, P. Katsaros
Crowdsourcing aims to deliver services and content by aggregating contributions from a large user population. For mobile networks and IoT systems, crowdsourcing is used to gather and process sensor data from mobile devices (crowdsensing), in order to deliver real-time, context-aware services and possibly support user collaboration in extended geographic areas. In applications like geonsensitive navigation, location-based activity sharing and recommendations, the challenge of adequate service quality and user experience may be at stake, as the services are provided securely to an ever-growing user population. This happens due to the inherent trade-off between security and real-time performance that ultimately sets in doubt any scalability prospect beyond a certain user-interaction load. This work introduces a publish-subscribe architecture for mobile crowdsensing systems, which can be transparently scaled up to higher usage load, while retaining adequate performance and security by load balancing into multiple MQTT brokers. The security support combines a lightweight TLS implementation with an integrated mechanism for two-level access control: user-device interactions and message topics. We provide proof-of-concept measurements that show how our solution scales to increasing interaction loads through load-balancing the processing cost that includes the overhead of the security mechanisms applied. The system architecture was implemented in a vehicular crowdsensing navigation network that allows to exchange navigation information at real-time, for improved routing of vehicles to their destination.
众包旨在通过聚集大量用户的贡献来提供服务和内容。对于移动网络和物联网系统,众包用于收集和处理来自移动设备的传感器数据(众包感知),以提供实时、上下文感知的服务,并可能支持扩展地理区域的用户协作。在地理敏感导航、基于位置的活动共享和推荐等应用程序中,由于这些服务要安全地提供给不断增长的用户群体,因此足够的服务质量和用户体验的挑战可能会受到威胁。这种情况的发生是由于安全性和实时性能之间的内在权衡,最终使超出特定用户交互负载的任何可伸缩性前景受到质疑。这项工作为移动众感系统引入了一个发布-订阅架构,该架构可以透明地扩展到更高的使用负载,同时通过负载平衡到多个MQTT代理来保持足够的性能和安全性。安全支持将轻量级TLS实现与两级访问控制(用户-设备交互和消息主题)的集成机制结合在一起。我们提供了概念验证度量,展示了我们的解决方案如何通过负载平衡处理成本(包括所应用的安全机制的开销)来增加交互负载。该系统架构在车辆群体传感导航网络中实现,该网络允许实时交换导航信息,以改进车辆到达目的地的路线。
{"title":"Scalable IoT architecture for balancing performance and security in mobile crowdsensing systems*","authors":"Theodoros Nestoridis, C. Oikonomou, Anastasios Temperekidis, F. Gioulekas, P. Katsaros","doi":"10.1109/IOTSMS52051.2020.9340165","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340165","url":null,"abstract":"Crowdsourcing aims to deliver services and content by aggregating contributions from a large user population. For mobile networks and IoT systems, crowdsourcing is used to gather and process sensor data from mobile devices (crowdsensing), in order to deliver real-time, context-aware services and possibly support user collaboration in extended geographic areas. In applications like geonsensitive navigation, location-based activity sharing and recommendations, the challenge of adequate service quality and user experience may be at stake, as the services are provided securely to an ever-growing user population. This happens due to the inherent trade-off between security and real-time performance that ultimately sets in doubt any scalability prospect beyond a certain user-interaction load. This work introduces a publish-subscribe architecture for mobile crowdsensing systems, which can be transparently scaled up to higher usage load, while retaining adequate performance and security by load balancing into multiple MQTT brokers. The security support combines a lightweight TLS implementation with an integrated mechanism for two-level access control: user-device interactions and message topics. We provide proof-of-concept measurements that show how our solution scales to increasing interaction loads through load-balancing the processing cost that includes the overhead of the security mechanisms applied. The system architecture was implemented in a vehicular crowdsensing navigation network that allows to exchange navigation information at real-time, for improved routing of vehicles to their destination.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124470067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An exploration of the cybercrime ecosystem around Shodan Shodan周边网络犯罪生态系统的探索
Maria Bada, Ildiko Pete
Discussions on underground forums provide valuable insights to hackers’ practices, interests and motivations. Although Internet of Things (IoT) vulnerabilities have been extensively explored, the question remains how members of hacker communities perceive the IoT landscape. In this work, we present an analysis of IoT related discussions that are potentially cybercriminal in nature. In particular, we analyse forum threads that discuss the search engine Shodan. The source of these posts is the CrimeBB dataset provided by the Cambridge Cybercrime Centre (CCC)1. We analyse 1051 thread discussions from 19 forums between 2009 and 2020. The overall aim of our work is to explore the main use cases of Shodan and highlight hackers’ targets and motivations. We find that Shodan is versatile and is actively used by hackers as a tool for passive information gathering providing easier access to hackable targets. Our results suggest that Shodan plays a prominent role in various specific use cases including remote control of target devices, building botnets, Distributed Denial of Service attacks and identifying open databases.
地下论坛上的讨论为黑客的行为、兴趣和动机提供了有价值的见解。尽管物联网(IoT)漏洞已被广泛探索,但黑客社区成员如何看待物联网前景的问题仍然存在。在这项工作中,我们对物联网相关的讨论进行了分析,这些讨论本质上是潜在的网络犯罪。特别地,我们分析讨论搜索引擎Shodan的论坛线程。这些帖子的来源是剑桥网络犯罪中心(CCC)提供的CrimeBB数据集。我们分析了2009年至2020年间19个论坛的1051个主题讨论。我们工作的总体目标是探索Shodan的主要用例,并强调黑客的目标和动机。我们发现Shodan是多功能的,并且被黑客积极用作被动信息收集的工具,从而更容易地访问可攻击的目标。我们的研究结果表明,Shodan在各种特定用例中发挥着重要作用,包括远程控制目标设备、构建僵尸网络、分布式拒绝服务攻击和识别开放数据库。
{"title":"An exploration of the cybercrime ecosystem around Shodan","authors":"Maria Bada, Ildiko Pete","doi":"10.1109/IOTSMS52051.2020.9340224","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340224","url":null,"abstract":"Discussions on underground forums provide valuable insights to hackers’ practices, interests and motivations. Although Internet of Things (IoT) vulnerabilities have been extensively explored, the question remains how members of hacker communities perceive the IoT landscape. In this work, we present an analysis of IoT related discussions that are potentially cybercriminal in nature. In particular, we analyse forum threads that discuss the search engine Shodan. The source of these posts is the CrimeBB dataset provided by the Cambridge Cybercrime Centre (CCC)1. We analyse 1051 thread discussions from 19 forums between 2009 and 2020. The overall aim of our work is to explore the main use cases of Shodan and highlight hackers’ targets and motivations. We find that Shodan is versatile and is actively used by hackers as a tool for passive information gathering providing easier access to hackable targets. Our results suggest that Shodan plays a prominent role in various specific use cases including remote control of target devices, building botnets, Distributed Denial of Service attacks and identifying open databases.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116668625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Investigating the potential of MFCC features in classifying respiratory diseases 探讨MFCC特征在呼吸道疾病分类中的潜力
A. Sreeram, Udhaya S. Ravishankar, Narayana Rao Sripada, Baswaraj Mamidgi
In the literature so far, classification of respiratory diseases with cough signals has typically involved extracting standard spectral features such as Mel Frequency Cepstral Coefficients (MFCC), and other descriptive features such as Zero-Cross-Rates (ZCR), Entropy, Centroid, etc., from the cough signals, before developing classification models. However, with current trends in audio signal classification gearing towards deep learning, which typically make use of only the spectral features, investigating the potential of MFCCs alone in classifying respiratory diseases becomes quite imperative. MFCCs alone, are in fact theoretically quite powerful in providing all vital information about any audio signal, and therefore using them as the standalone set of features in classifying the respiratory diseases is worth investigating. Furthermore, the classification of respiratory diseases so far has only been limited to no more than two diseases. Hence, in order to make a break in this area, this paper investigates the potential of MFCC features alone in classifying respiratory diseases. This is done through the development of a new classification model that features deep learning model design. This method of investigation is similar to typical feature importance studies that fit models before identifying the contributing features. In this case, however, the features are already filtered, and so the model is optimized only by design to perform the study. Furthermore, in order to substantiate the results of the investigation, the model is made to classify more than just two respiratory diseases. For this we have selected five common respiratory diseases namely Asthma, COPD, ILD, Bronchitis and Pneumonia for the classification. Results show that the MFCC features alone do have the potential of classifying the respiratory diseases. This has been substantiated by achieving training accuracies on the model to fall between 85.86 to 97.83% and test accuracies between 87.02 to 88.50%.
在目前的文献中,用咳嗽信号对呼吸道疾病进行分类通常涉及提取标准频谱特征,如Mel频率倒谱系数(MFCC),以及其他描述性特征,如零交叉率(ZCR)、熵、质心等,然后再建立分类模型。然而,随着当前音频信号分类的趋势转向深度学习(通常仅利用频谱特征),单独研究MFCCs在分类呼吸道疾病方面的潜力变得非常必要。事实上,理论上mfccc在提供任何音频信号的所有重要信息方面都非常强大,因此,将它们作为呼吸道疾病分类的独立特征集是值得研究的。此外,迄今为止,呼吸道疾病的分类仅限于不超过两种疾病。因此,为了在这一领域有所突破,本文单独探讨了MFCC特征在呼吸道疾病分类中的潜力。这是通过开发以深度学习模型设计为特征的新分类模型来实现的。这种调查方法类似于典型的特征重要性研究,即在确定贡献特征之前拟合模型。然而,在这种情况下,特征已经被过滤了,因此模型仅通过设计来优化以执行研究。此外,为了证实调查结果,该模型不仅对两种呼吸系统疾病进行了分类。为此,我们选择了哮喘、COPD、ILD、支气管炎和肺炎五种常见的呼吸系统疾病进行分类。结果表明,单靠MFCC特征确实具有对呼吸道疾病进行分类的潜力。通过实现模型上的训练准确度在85.86到97.83%之间,测试准确度在87.02到88.50%之间,这一点得到了证实。
{"title":"Investigating the potential of MFCC features in classifying respiratory diseases","authors":"A. Sreeram, Udhaya S. Ravishankar, Narayana Rao Sripada, Baswaraj Mamidgi","doi":"10.1109/IOTSMS52051.2020.9340166","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340166","url":null,"abstract":"In the literature so far, classification of respiratory diseases with cough signals has typically involved extracting standard spectral features such as Mel Frequency Cepstral Coefficients (MFCC), and other descriptive features such as Zero-Cross-Rates (ZCR), Entropy, Centroid, etc., from the cough signals, before developing classification models. However, with current trends in audio signal classification gearing towards deep learning, which typically make use of only the spectral features, investigating the potential of MFCCs alone in classifying respiratory diseases becomes quite imperative. MFCCs alone, are in fact theoretically quite powerful in providing all vital information about any audio signal, and therefore using them as the standalone set of features in classifying the respiratory diseases is worth investigating. Furthermore, the classification of respiratory diseases so far has only been limited to no more than two diseases. Hence, in order to make a break in this area, this paper investigates the potential of MFCC features alone in classifying respiratory diseases. This is done through the development of a new classification model that features deep learning model design. This method of investigation is similar to typical feature importance studies that fit models before identifying the contributing features. In this case, however, the features are already filtered, and so the model is optimized only by design to perform the study. Furthermore, in order to substantiate the results of the investigation, the model is made to classify more than just two respiratory diseases. For this we have selected five common respiratory diseases namely Asthma, COPD, ILD, Bronchitis and Pneumonia for the classification. Results show that the MFCC features alone do have the potential of classifying the respiratory diseases. This has been substantiated by achieving training accuracies on the model to fall between 85.86 to 97.83% and test accuracies between 87.02 to 88.50%.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127501042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Encryption scheme based on the automorphism group of the Ree function field 基于Ree函数域自同构群的加密方案
G. Khalimov, Y. Kotukh, Svitlana Khalimova
Internet of things (IoT) is a growing technology with a big market and impact to our lives. It can ease various different tasks for us. Meanwhile, IoT has many serious security threats, like data breaches, side-channel attacks, and virus and data authentication. Our present classical cryptography, like the Rivest-Shamir-Adleman (RSA) algorithm, work well under the classical computers. However, the technology is slowly shifting towards quantum computing, which has immense processing power and is more than enough to break the current cryptographic primitives in affordable time. So, it is required to design quantum cryptographic algorithms to prevent our systems from security breaches even before quantum computers will be available for commercial purposes on the market. In this paper, we describe a new implementation of MST3 cryptosystems based on the group of automorphisms of the field of the Pu function. The main difference of the presented implementation is the extension of the logarithmic signature and, as a consequence, the presence of multi-stage recovery of message parts from the ciphertext. The presented implementation of the cryptosystem is more reliable. The cryptanalysis complexity and message size for encryption are square times larger than the MST3 cryptosystem in the Suzuki group. This approach shows advantages and it is a quantum safe for the IoT use.
物联网(IoT)是一项不断发展的技术,对我们的生活有着巨大的市场和影响。它可以为我们减轻各种不同的任务。与此同时,物联网存在许多严重的安全威胁,如数据泄露、侧通道攻击、病毒和数据身份验证等。我们目前的经典密码学,如Rivest-Shamir-Adleman (RSA)算法,在经典计算机下运行良好。然而,这项技术正在慢慢转向量子计算,量子计算具有巨大的处理能力,足以在负担得起的时间内破解当前的密码原语。因此,在量子计算机在市场上用于商业用途之前,需要设计量子加密算法来防止我们的系统出现安全漏洞。本文描述了一种基于Pu函数域的自同构群的MST3密码系统的新实现。所提出的实现的主要区别在于对数签名的扩展,因此,存在从密文中恢复消息部分的多阶段。所提出的密码系统实现具有更高的可靠性。加密的密码分析复杂性和消息大小是Suzuki小组中MST3密码系统的平方倍。这种方法显示出优势,并且对于物联网使用来说是量子安全的。
{"title":"Encryption scheme based on the automorphism group of the Ree function field","authors":"G. Khalimov, Y. Kotukh, Svitlana Khalimova","doi":"10.1109/IOTSMS52051.2020.9340192","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340192","url":null,"abstract":"Internet of things (IoT) is a growing technology with a big market and impact to our lives. It can ease various different tasks for us. Meanwhile, IoT has many serious security threats, like data breaches, side-channel attacks, and virus and data authentication. Our present classical cryptography, like the Rivest-Shamir-Adleman (RSA) algorithm, work well under the classical computers. However, the technology is slowly shifting towards quantum computing, which has immense processing power and is more than enough to break the current cryptographic primitives in affordable time. So, it is required to design quantum cryptographic algorithms to prevent our systems from security breaches even before quantum computers will be available for commercial purposes on the market. In this paper, we describe a new implementation of MST3 cryptosystems based on the group of automorphisms of the field of the Pu function. The main difference of the presented implementation is the extension of the logarithmic signature and, as a consequence, the presence of multi-stage recovery of message parts from the ciphertext. The presented implementation of the cryptosystem is more reliable. The cryptanalysis complexity and message size for encryption are square times larger than the MST3 cryptosystem in the Suzuki group. This approach shows advantages and it is a quantum safe for the IoT use.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123487694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
BA-TLS: Blockchain Authentication for Transport Layer Security in Internet of Things BA-TLS:面向物联网传输层安全的区块链认证
Erin Beckwith, Geethapriya Thamilarasu
Traditional security solutions that rely on public key infrastructure present scalability and transparency challenges when deployed in Internet of Things (IoT). In this paper, we develop a blockchain based authentication mechanism for IoT that can be integrated into the traditional transport layer security protocols such as Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). Our proposed mechanism is an alternative to the traditional Certificate Authority (CA)-based Public Key Infrastructure (PKI) that relies on x.509 certificates. Specifically, the proposed solution enables the modified TLS/DTLS a viable option for resource constrained IoT devices where minimizing memory utilization is critical. Experiments show that blockchain based authentication can reduce dynamic memory usage by up to 20%, while only minimally increasing application image size and time of execution of the TLS/DTLS handshake.
依赖于公钥基础设施的传统安全解决方案在物联网(IoT)中部署时存在可扩展性和透明度方面的挑战。在本文中,我们开发了一种基于区块链的物联网认证机制,该机制可以集成到传统的传输层安全协议中,如传输层安全(TLS)和数据报传输层安全(DTLS)。我们提出的机制是传统的基于证书颁发机构(CA)的公钥基础设施(PKI)的替代方案,后者依赖于x.509证书。具体来说,提议的解决方案使修改后的TLS/DTLS成为资源受限的物联网设备的可行选择,其中最小化内存利用率至关重要。实验表明,基于区块链的身份验证可以将动态内存使用减少多达20%,同时只会最小限度地增加应用程序图像大小和TLS/DTLS握手的执行时间。
{"title":"BA-TLS: Blockchain Authentication for Transport Layer Security in Internet of Things","authors":"Erin Beckwith, Geethapriya Thamilarasu","doi":"10.1109/IOTSMS52051.2020.9340204","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340204","url":null,"abstract":"Traditional security solutions that rely on public key infrastructure present scalability and transparency challenges when deployed in Internet of Things (IoT). In this paper, we develop a blockchain based authentication mechanism for IoT that can be integrated into the traditional transport layer security protocols such as Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). Our proposed mechanism is an alternative to the traditional Certificate Authority (CA)-based Public Key Infrastructure (PKI) that relies on x.509 certificates. Specifically, the proposed solution enables the modified TLS/DTLS a viable option for resource constrained IoT devices where minimizing memory utilization is critical. Experiments show that blockchain based authentication can reduce dynamic memory usage by up to 20%, while only minimally increasing application image size and time of execution of the TLS/DTLS handshake.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116203716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Data Generator for Cloud-Edge Vehicle Communication in Multi Domain Cellular Networks 多域蜂窝网络中云边缘车辆通信的数据发生器
Marco Pomalo, V. T. Le, Nabil El Ioini, C. Pahl, H. Barzegar
The rapid development of telecommunications and cellular network technologies gave birth to a range of services and scenarios that were considered impossible a decade ago. Various architectures, scenarios, and use-cases can be deployed on top of the different generations of cellular networks to solve different business cases. Some scenarios require a high level of reliability due to their critical usage e.g., Vehicular Edge computing, medical IoT and so on. When offering services at the edge of the network, the information exchanged needs to be current and valid for systematic performance assessment and modeling. However, in order to run experiments, access to valid and reliable telecommunication data e.g., eNodeB (Base Station) properties, and configurations is not easy, since in most cases data is either confidential or at least difficult to obtain, especially when dealing with cross organizational boundaries (e.g., data coming from multiple telecom operators). To bridge this gap and allow researchers to build, test and analyze new protocols and algorithms with telecommunication data, we designed a mobile data generator (DG) for multi-domain cellular networks. Our generator provides a range of possible configurations and handles scenarios that include multiple participants, authorities and organizations. In this paper, we present the design and implementation of our generator. We evaluated the data generator by considering different scenarios, specifically, we have tested service interruptions and mobile network migration since these scenarios require a considerable amount of data.
电信和蜂窝网络技术的快速发展催生了一系列十年前被认为是不可能的服务和场景。不同的架构、场景和用例可以部署在不同代的蜂窝网络之上,以解决不同的业务用例。某些场景由于其关键用途而需要高水平的可靠性,例如车辆边缘计算,医疗物联网等。当在网络边缘提供服务时,交换的信息需要是最新的和有效的,以便进行系统性能评估和建模。然而,为了进行实验,访问有效和可靠的电信数据(例如,eNodeB(基站)属性和配置)并不容易,因为在大多数情况下,数据要么是机密的,要么至少是难以获得的,特别是在处理跨组织边界时(例如,来自多个电信运营商的数据)。为了弥补这一差距,并允许研究人员使用电信数据构建、测试和分析新的协议和算法,我们为多域蜂窝网络设计了一个移动数据生成器(DG)。我们的生成器提供了一系列可能的配置,并处理包括多个参与者、机构和组织的场景。在本文中,我们介绍了我们的发电机的设计和实现。我们通过考虑不同的场景来评估数据生成器,具体来说,我们已经测试了服务中断和移动网络迁移,因为这些场景需要大量的数据。
{"title":"A Data Generator for Cloud-Edge Vehicle Communication in Multi Domain Cellular Networks","authors":"Marco Pomalo, V. T. Le, Nabil El Ioini, C. Pahl, H. Barzegar","doi":"10.1109/IOTSMS52051.2020.9340163","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340163","url":null,"abstract":"The rapid development of telecommunications and cellular network technologies gave birth to a range of services and scenarios that were considered impossible a decade ago. Various architectures, scenarios, and use-cases can be deployed on top of the different generations of cellular networks to solve different business cases. Some scenarios require a high level of reliability due to their critical usage e.g., Vehicular Edge computing, medical IoT and so on. When offering services at the edge of the network, the information exchanged needs to be current and valid for systematic performance assessment and modeling. However, in order to run experiments, access to valid and reliable telecommunication data e.g., eNodeB (Base Station) properties, and configurations is not easy, since in most cases data is either confidential or at least difficult to obtain, especially when dealing with cross organizational boundaries (e.g., data coming from multiple telecom operators). To bridge this gap and allow researchers to build, test and analyze new protocols and algorithms with telecommunication data, we designed a mobile data generator (DG) for multi-domain cellular networks. Our generator provides a range of possible configurations and handles scenarios that include multiple participants, authorities and organizations. In this paper, we present the design and implementation of our generator. We evaluated the data generator by considering different scenarios, specifically, we have tested service interruptions and mobile network migration since these scenarios require a considerable amount of data.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"363 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115965614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IOTSMS 2020 Cover Page IOTSMS 2020封面页
{"title":"IOTSMS 2020 Cover Page","authors":"","doi":"10.1109/iotsms52051.2020.9340191","DOIUrl":"https://doi.org/10.1109/iotsms52051.2020.9340191","url":null,"abstract":"","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131148592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing the robustness of watermarked medical images using heuristic search algorithm 利用启发式搜索算法增强医学图像水印的鲁棒性
E. Elbasi
Nowadays, multimedia elements such as image, video, animation, audio, and software can be distributed in a short time anywhere in the world using internet technology. Content owners are concerned about copyright protection and authentication. Watermarking is one of the method to protect patient information in medical images such as magnetic resonance and ultrasound imaging. In the literature, there are several methods proposed using both frequency-domain (etc. digital cosine transforms (DCT), digital wavelet transforms (DWT), digital Fourier transforms (DFT), digital radon transform (DRT)) and spatial domain (least significant bits (LSB)) methods. Mostly digital wavelet transform based watermarking methods give very promising results after common attacks. In the DWT algorithm, scaling factor is used in embedding and extraction. A scaling factor is a number between 0 and 1 which has been determined by the user which is not efficient. We can use the brute force method which solves a problem by checking all the possible cases, but it is slow. In this work, we use simulated annealing heuristic search algorithm to find out the best scaling factor to reach more robust, transparent, high data capacity and resistant watermarking method in medical images. Experimental results show that simulated annealing-based scaling factor determination in frequency domain watermarking gives more robust, resistant, and transparent watermarked images.
如今,借助互联网技术,图像、视频、动画、音频和软件等多媒体元素可以在短时间内传播到世界任何地方。内容所有者关心版权保护和认证。在磁共振、超声等医学图像中,水印是保护患者信息的一种方法。在文献中,提出了几种使用频域(如数字余弦变换(DCT),数字小波变换(DWT),数字傅立叶变换(DFT),数字氡变换(DRT))和空间域(最低有效位(LSB))方法的方法。大多数基于数字小波变换的水印方法在常见攻击后都能得到很好的效果。在DWT算法中,使用比例因子进行嵌入和提取。缩放因子是一个介于0和1之间的数字,由用户决定,这是不有效的。我们可以使用蛮力方法,通过检查所有可能的情况来解决问题,但它很慢。在这项工作中,我们使用模拟退火启发式搜索算法来寻找最佳缩放因子,以达到更鲁棒、透明、高数据容量和抗医学图像水印的方法。实验结果表明,基于模拟退火的频率域水印比例因子确定方法能获得更强的鲁棒性、抗干扰性和透明性。
{"title":"Enhancing the robustness of watermarked medical images using heuristic search algorithm","authors":"E. Elbasi","doi":"10.1109/IOTSMS52051.2020.9340222","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340222","url":null,"abstract":"Nowadays, multimedia elements such as image, video, animation, audio, and software can be distributed in a short time anywhere in the world using internet technology. Content owners are concerned about copyright protection and authentication. Watermarking is one of the method to protect patient information in medical images such as magnetic resonance and ultrasound imaging. In the literature, there are several methods proposed using both frequency-domain (etc. digital cosine transforms (DCT), digital wavelet transforms (DWT), digital Fourier transforms (DFT), digital radon transform (DRT)) and spatial domain (least significant bits (LSB)) methods. Mostly digital wavelet transform based watermarking methods give very promising results after common attacks. In the DWT algorithm, scaling factor is used in embedding and extraction. A scaling factor is a number between 0 and 1 which has been determined by the user which is not efficient. We can use the brute force method which solves a problem by checking all the possible cases, but it is slow. In this work, we use simulated annealing heuristic search algorithm to find out the best scaling factor to reach more robust, transparent, high data capacity and resistant watermarking method in medical images. Experimental results show that simulated annealing-based scaling factor determination in frequency domain watermarking gives more robust, resistant, and transparent watermarked images.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132190532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reliable abnormal event detection from IoT surveillance systems 来自物联网监控系统的可靠异常事件检测
E. Elbasi
Surveillance systems are widely used in airports, streets, banks, military areas, borders, hospitals, and schools. There are two types of surveillance systems which are real-time systems and offline surveillance systems. Usually, security people track videos on time in monitoring rooms to find out abnormal human activities. Real-time human tracking from videos is very expensive especially in airports, borders, and streets due to the huge number of surveillance cameras. There are a lot of research works have been done for automated surveillance systems. In this paper, we presented a new surveillance system to recognize human activities from several cameras using machine learning algorithms. Sequences of images are collected from cameras using the internet of things technology from indoor or outdoor areas. A feature vector is created for each recognized moving object, then machine learning algorithms are applied to extract moving object activities. The proposed abnormal event detection system gives very promising results which are more than 96% accuracy in Multilayer Perceptron, Iterative Classifier Optimizer, and Random Forest algorithms.
监控系统广泛应用于机场、街道、银行、军区、边境、医院和学校。监控系统有两种类型,实时监控系统和离线监控系统。通常情况下,保安人员会在监控室中及时跟踪视频,以发现异常的人类活动。从视频中实时跟踪人是非常昂贵的,特别是在机场、边境和街道上,因为有大量的监控摄像头。人们对自动监控系统进行了大量的研究工作。在本文中,我们提出了一种新的监控系统,该系统使用机器学习算法从多个摄像机中识别人类活动。使用物联网技术从室内或室外区域的摄像头收集图像序列。对每个识别出的运动物体创建特征向量,然后应用机器学习算法提取运动物体的活动。本文提出的异常事件检测系统在多层感知器、迭代分类器优化器和随机森林算法中均取得了96%以上的准确率。
{"title":"Reliable abnormal event detection from IoT surveillance systems","authors":"E. Elbasi","doi":"10.1109/IOTSMS52051.2020.9340162","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340162","url":null,"abstract":"Surveillance systems are widely used in airports, streets, banks, military areas, borders, hospitals, and schools. There are two types of surveillance systems which are real-time systems and offline surveillance systems. Usually, security people track videos on time in monitoring rooms to find out abnormal human activities. Real-time human tracking from videos is very expensive especially in airports, borders, and streets due to the huge number of surveillance cameras. There are a lot of research works have been done for automated surveillance systems. In this paper, we presented a new surveillance system to recognize human activities from several cameras using machine learning algorithms. Sequences of images are collected from cameras using the internet of things technology from indoor or outdoor areas. A feature vector is created for each recognized moving object, then machine learning algorithms are applied to extract moving object activities. The proposed abnormal event detection system gives very promising results which are more than 96% accuracy in Multilayer Perceptron, Iterative Classifier Optimizer, and Random Forest algorithms.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124435137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Machine Learning Based Predictive Models in Mobile Platforms Using CPU-GPU 基于CPU-GPU的移动平台机器学习预测模型
Javad Sohankar, Madhurima Pore, Ayan Banerjee, Koosha Sadeghi, S. Gupta
Physiological signal based interactive systems communicate with human users in real time manner. However, the large size of data generated by sensors, complex computations necessary for processing physiological signals (e.g. machine learning algorithms) hamper the real-time performance of such systems. The main challenges to overcome these issues are limited computational capability of mobile platform and also the latency of offloading computation to servers. A solution is to use predictive models to access future data in order to improve the response time of the system. However, these predictive models have complex computation which result in high execution times on mobile phone that interferes with real time performance. With the advent of OpenCL enabled GPUs in mobile platform, there is a potential of developing general purpose applications (e.g. predictive models) which offload complex computation to GPUs. Although the use of GPUs will reduce the computation time in physiological signal based mobile systems, satisfying the time constraints of these systems can be challenging. That is due to the dynamically changing nature of physiological data which requires frequent updating of physiological models in the system. In this work, computations of a predictive model for brain signals is offloaded to mobile phone GPU. The evaluation of the performance shows that GPU can outperform CPU in mobile platform for general purpose computing.
基于生理信号的交互系统与人类用户进行实时通信。然而,传感器产生的大量数据,处理生理信号所需的复杂计算(例如机器学习算法)阻碍了此类系统的实时性能。克服这些问题的主要挑战是移动平台有限的计算能力以及将计算卸载到服务器的延迟。一种解决方案是使用预测模型来访问未来的数据,以改进系统的响应时间。然而,这些预测模型计算复杂,导致在手机上的高执行时间,干扰了实时性能。随着移动平台上支持OpenCL的gpu的出现,有可能开发通用应用程序(例如预测模型),将复杂的计算转移到gpu上。虽然gpu的使用将减少基于生理信号的移动系统的计算时间,但满足这些系统的时间限制可能是具有挑战性的。这是由于生理数据的动态变化性质,需要经常更新系统中的生理模型。在这项工作中,大脑信号预测模型的计算被卸载到手机GPU上。性能评估表明,GPU在移动平台上的通用计算性能优于CPU。
{"title":"Machine Learning Based Predictive Models in Mobile Platforms Using CPU-GPU","authors":"Javad Sohankar, Madhurima Pore, Ayan Banerjee, Koosha Sadeghi, S. Gupta","doi":"10.1109/IOTSMS52051.2020.9340194","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340194","url":null,"abstract":"Physiological signal based interactive systems communicate with human users in real time manner. However, the large size of data generated by sensors, complex computations necessary for processing physiological signals (e.g. machine learning algorithms) hamper the real-time performance of such systems. The main challenges to overcome these issues are limited computational capability of mobile platform and also the latency of offloading computation to servers. A solution is to use predictive models to access future data in order to improve the response time of the system. However, these predictive models have complex computation which result in high execution times on mobile phone that interferes with real time performance. With the advent of OpenCL enabled GPUs in mobile platform, there is a potential of developing general purpose applications (e.g. predictive models) which offload complex computation to GPUs. Although the use of GPUs will reduce the computation time in physiological signal based mobile systems, satisfying the time constraints of these systems can be challenging. That is due to the dynamically changing nature of physiological data which requires frequent updating of physiological models in the system. In this work, computations of a predictive model for brain signals is offloaded to mobile phone GPU. The evaluation of the performance shows that GPU can outperform CPU in mobile platform for general purpose computing.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130056543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1