首页 > 最新文献

2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)最新文献

英文 中文
Securing Industrial Control Systems Using Physical Device Fingerprinting 使用物理设备指纹保护工业控制系统
Tsion Yimer, Md Tanvir Arafin, K. Kornegay
The advent of the Internet-of-Things (IoT) has introduced new connectivity modalities, communication protocols, and optimized architectures to coordinate Things on a network. BACnet MS/TP is a protocol that has the potential to deliver a reliable IoT back-end for industrial systems. However, conventional security threats can severely affect trust between the nodes in the network, leading to critical infrastructure failures. Hence, we analyze the opportunities and challenges for hardware solutions in securing BACnet controllers in this work. First, we look into the security threats and develop practical attack models. Then, we demonstrate how we model clocks in the network for fingerprinting. Next, we propose a distributed security monitor for deployment across the BACnet MS/TP nodes. We also illustrate how clock fingerprinting data can enable the security monitor to prevent intrusion and tampering. Finally, we experimentally verify our attacker model, attack scenarios, and the effectiveness of hardware-oriented security solutions for intrusion prevention and tampering on an industrial standard BACnet MS/TP network.
物联网(IoT)的出现引入了新的连接模式、通信协议和优化的架构来协调网络上的事物。BACnet MS/TP是一种有潜力为工业系统提供可靠的物联网后端协议。然而,传统的安全威胁会严重影响网络中节点之间的信任,导致关键的基础设施故障。因此,我们分析了在这项工作中保护BACnet控制器的硬件解决方案的机遇和挑战。首先,我们研究安全威胁并开发实用的攻击模型。然后,我们将演示如何在网络中建模用于指纹识别的时钟。接下来,我们提出一个分布式安全监视器,用于跨BACnet MS/TP节点的部署。我们还说明了时钟指纹数据如何使安全监视器能够防止入侵和篡改。最后,我们在工业标准BACnet MS/TP网络上实验验证了我们的攻击者模型、攻击场景以及面向硬件的入侵防御和篡改安全解决方案的有效性。
{"title":"Securing Industrial Control Systems Using Physical Device Fingerprinting","authors":"Tsion Yimer, Md Tanvir Arafin, K. Kornegay","doi":"10.1109/IOTSMS52051.2020.9340160","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340160","url":null,"abstract":"The advent of the Internet-of-Things (IoT) has introduced new connectivity modalities, communication protocols, and optimized architectures to coordinate Things on a network. BACnet MS/TP is a protocol that has the potential to deliver a reliable IoT back-end for industrial systems. However, conventional security threats can severely affect trust between the nodes in the network, leading to critical infrastructure failures. Hence, we analyze the opportunities and challenges for hardware solutions in securing BACnet controllers in this work. First, we look into the security threats and develop practical attack models. Then, we demonstrate how we model clocks in the network for fingerprinting. Next, we propose a distributed security monitor for deployment across the BACnet MS/TP nodes. We also illustrate how clock fingerprinting data can enable the security monitor to prevent intrusion and tampering. Finally, we experimentally verify our attacker model, attack scenarios, and the effectiveness of hardware-oriented security solutions for intrusion prevention and tampering on an industrial standard BACnet MS/TP network.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130316802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Objective Function Descriptions And Optimization Methodologies For Task Allocation In A Dynamic Fog Environment 动态雾环境下任务分配的目标函数描述评价与优化方法
Reinout Eyckerman, Siegfried Mercelis, J. Márquez-Barja, P. Hellinckx
Industry, healthcare, and various other sectors are rapidly adopting the Internet of Things to drive information and automation systems. However, as the number of devices increases, the number of information sent over the network increases as well, inducing network congestion and a potential latency increase. To ensure that demanding applications, such as smart vehicles, are supported in the current network infrastructure, we provide a general methodology of distributing software from the cloud toward the edge, reducing multiple objectives such as latency. In this research we define several problems in multi-objective distribution scenarios, and compare several methodologies for defining and solving the problem. Additionally, we propose a method for decreasing the problem complexity, improving performance with only slightly reduced accuracy.
工业、医疗保健和其他各种部门正在迅速采用物联网来驱动信息和自动化系统。但是,随着设备数量的增加,通过网络发送的信息数量也会增加,从而导致网络拥塞和潜在的延迟增加。为了确保当前网络基础设施支持智能汽车等要求苛刻的应用程序,我们提供了一种将软件从云分发到边缘的通用方法,从而减少了延迟等多个目标。在本研究中,我们定义了多目标分布场景中的几个问题,并比较了几种定义和解决问题的方法。此外,我们提出了一种方法来降低问题的复杂性,提高性能,只略微降低准确性。
{"title":"Evaluation of Objective Function Descriptions And Optimization Methodologies For Task Allocation In A Dynamic Fog Environment","authors":"Reinout Eyckerman, Siegfried Mercelis, J. Márquez-Barja, P. Hellinckx","doi":"10.1109/IOTSMS52051.2020.9340219","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340219","url":null,"abstract":"Industry, healthcare, and various other sectors are rapidly adopting the Internet of Things to drive information and automation systems. However, as the number of devices increases, the number of information sent over the network increases as well, inducing network congestion and a potential latency increase. To ensure that demanding applications, such as smart vehicles, are supported in the current network infrastructure, we provide a general methodology of distributing software from the cloud toward the edge, reducing multiple objectives such as latency. In this research we define several problems in multi-objective distribution scenarios, and compare several methodologies for defining and solving the problem. Additionally, we propose a method for decreasing the problem complexity, improving performance with only slightly reduced accuracy.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115707213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Methodological approach for creating an IoT manufacturing application 创建物联网制造应用的方法学方法
Achraf Rahmouni, Catarina Ferreira Da Silva, P. Ghodous
With the heterogeneity and diversity of electronic systems and their memory capacity, the Internet of Things technologies face several challenges, such as the difficulty in choosing in a growing catalog of IoT technologies and the lack of interoperability of these technologies. This leads to the creation of particular IoT architectures and to the selection of IoT technologies by trying and error approaches. We propose a methodological approach for creating an IoT application guided by the users’ needs and by the contextual environment. It enables the user to select the right hardware guided by the market supply and to check the performances of the IoT solutions. We implement and test our proposition in a picking system of a manufacturing factory. This practical implementation provides feedback regarding our methodological approach for creating an IoT application, which in turn enables us to improve and remodel the approach.
随着电子系统及其存储容量的异质性和多样性,物联网技术面临着一些挑战,例如难以在不断增长的物联网技术目录中进行选择,以及这些技术缺乏互操作性。这导致创建特定的物联网架构,并通过尝试和错误方法选择物联网技术。我们提出了一种方法论方法,以用户需求和上下文环境为指导创建物联网应用程序。它使用户能够根据市场供应选择合适的硬件,并检查物联网解决方案的性能。我们在一家制造工厂的拣选系统中实施并测试了我们的命题。这个实际的实现提供了关于我们创建物联网应用程序的方法的反馈,这反过来又使我们能够改进和改造方法。
{"title":"Methodological approach for creating an IoT manufacturing application","authors":"Achraf Rahmouni, Catarina Ferreira Da Silva, P. Ghodous","doi":"10.1109/IOTSMS52051.2020.9340188","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340188","url":null,"abstract":"With the heterogeneity and diversity of electronic systems and their memory capacity, the Internet of Things technologies face several challenges, such as the difficulty in choosing in a growing catalog of IoT technologies and the lack of interoperability of these technologies. This leads to the creation of particular IoT architectures and to the selection of IoT technologies by trying and error approaches. We propose a methodological approach for creating an IoT application guided by the users’ needs and by the contextual environment. It enables the user to select the right hardware guided by the market supply and to check the performances of the IoT solutions. We implement and test our proposition in a picking system of a manufacturing factory. This practical implementation provides feedback regarding our methodological approach for creating an IoT application, which in turn enables us to improve and remodel the approach.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116152182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach Based on Blockchain to Enhance Security with Dynamic Policy Updating 基于区块链的动态策略更新增强安全的新方法
Oussama Mounnan, A. E. Mouatasim, Otman Manad, Aissam Outchakoucht, Hamza Es-Samaali, L. Boubchir
The cipher-text policy attribute-based encryption is a promising technique to ensure the security in the third trust parties environment and offers opportunities to their users. However, the policy updating becomes a challenging issue when we use CP-ABE to construct access control schemes. The traditional method consists of presenting a huge work to the data owners, data retrieving, its re-encryption under the new access policy, and the re-sending back to the cloud. These interactions incur a heavy computation burden and a high communication on the data owner. In this paper, we propose a novel approach, in one hand, to enhance the security by using Blockchain technology, and in the other hand to update the access policy dynamically. We use Blockchain to deploy a policy in a manner that preserves security. We use also the cloud to store the data with CP-ABE, and especially, we focus on the delegation of the policy updating method to the cloud. This method can minimize the computation work and avoid the transmission of encrypted data by combining the ciphertext and previous access strategy. Moreover, we also design a policy updating algorithm. In our scheme, the security is occurred by two factors, the first one must satisfy the policy in the CP-ABE. The second one also must satisfy the policy deployed in the Blockchain to have the authorization token generated to access the desired resources.
基于密文策略属性的加密技术是一种很有前途的技术,可以确保第三方信任方环境中的安全,并为其用户提供机会。然而,当我们使用CP-ABE构建访问控制方案时,策略更新成为一个具有挑战性的问题。传统的方法包括向数据所有者呈现大量的工作,检索数据,在新的访问策略下重新加密数据,并将其重新发送回云。这些交互会导致沉重的计算负担和数据所有者的高通信。在本文中,我们提出了一种新的方法,一方面利用区块链技术来增强安全性,另一方面动态更新访问策略。我们使用区块链以保持安全性的方式部署策略。我们还使用云来使用CP-ABE存储数据,特别是,我们将重点放在将策略更新方法委托给云上。该方法将密文与先前访问策略相结合,减少了计算量,避免了加密数据的传输。此外,我们还设计了策略更新算法。在我们的方案中,安全性是由两个因素产生的,第一个因素必须满足CP-ABE中的策略。第二个还必须满足部署在区块链中的策略,以生成授权令牌来访问所需的资源。
{"title":"A Novel Approach Based on Blockchain to Enhance Security with Dynamic Policy Updating","authors":"Oussama Mounnan, A. E. Mouatasim, Otman Manad, Aissam Outchakoucht, Hamza Es-Samaali, L. Boubchir","doi":"10.1109/IOTSMS52051.2020.9340164","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340164","url":null,"abstract":"The cipher-text policy attribute-based encryption is a promising technique to ensure the security in the third trust parties environment and offers opportunities to their users. However, the policy updating becomes a challenging issue when we use CP-ABE to construct access control schemes. The traditional method consists of presenting a huge work to the data owners, data retrieving, its re-encryption under the new access policy, and the re-sending back to the cloud. These interactions incur a heavy computation burden and a high communication on the data owner. In this paper, we propose a novel approach, in one hand, to enhance the security by using Blockchain technology, and in the other hand to update the access policy dynamically. We use Blockchain to deploy a policy in a manner that preserves security. We use also the cloud to store the data with CP-ABE, and especially, we focus on the delegation of the policy updating method to the cloud. This method can minimize the computation work and avoid the transmission of encrypted data by combining the ciphertext and previous access strategy. Moreover, we also design a policy updating algorithm. In our scheme, the security is occurred by two factors, the first one must satisfy the policy in the CP-ABE. The second one also must satisfy the policy deployed in the Blockchain to have the authorization token generated to access the desired resources.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132590569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WSNB: Wearable Sensors with Neural Networks Located in a Base Station for IoT Environment WSNB:基于物联网环境基站的神经网络可穿戴传感器
Alaa Mheisn, M. Shurman, A. Alma'aitah
The Internet of Things (IoT) is a system paradigm that recently introduced, which includes different smart devices and applications, especially, in smart cities, e.g.; manufacturing, homes, and offices. To improve their awareness capabilities, it is attractive to add more sensors to their framework. In this paper, we propose adding a new sensor as a wearable sensor connected wirelessly with a neural network located on the base station (WSNB). WSNB enables the added sensor to refine their labels through active learning. The new sensors achieve an average accuracy of 93.81%, which is 4.5% higher than the existing method, removing human support and increasing the life cycle for the sensors by using neural network approach in the base station.
物联网(IoT)是最近引入的一种系统范式,它包括不同的智能设备和应用,特别是在智能城市中,例如;制造业,家庭和办公室。为了提高它们的感知能力,在它们的框架中添加更多的传感器是有吸引力的。在本文中,我们提出增加一种新的传感器,作为可穿戴传感器与位于基站(WSNB)上的神经网络无线连接。WSNB使添加的传感器能够通过主动学习来改进它们的标签。新型传感器平均精度达到93.81%,比现有方法提高了4.5%,消除了人工支持,在基站中采用神经网络方法增加了传感器的生命周期。
{"title":"WSNB: Wearable Sensors with Neural Networks Located in a Base Station for IoT Environment","authors":"Alaa Mheisn, M. Shurman, A. Alma'aitah","doi":"10.1109/IOTSMS52051.2020.9340167","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340167","url":null,"abstract":"The Internet of Things (IoT) is a system paradigm that recently introduced, which includes different smart devices and applications, especially, in smart cities, e.g.; manufacturing, homes, and offices. To improve their awareness capabilities, it is attractive to add more sensors to their framework. In this paper, we propose adding a new sensor as a wearable sensor connected wirelessly with a neural network located on the base station (WSNB). WSNB enables the added sensor to refine their labels through active learning. The new sensors achieve an average accuracy of 93.81%, which is 4.5% higher than the existing method, removing human support and increasing the life cycle for the sensors by using neural network approach in the base station.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129030368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VM Introspection-based Allowlisting for IaaS IaaS中基于VM自省的Allowlisting
Farah Fargo, O. Franza, Cihan Tunc, S. Hariri
Cloud computing has become the main backend of the IT infrastructure as it provides ubiquitous and on-demand computing to serve to a wide range of users including end-users and high-performance demanding agencies. The users can allocate and free resources allocated for their Virtual Machines (VMs) as needed. However, with the rapid growth of interest in cloud computing systems, several issues have arisen especially in the domain of cybersecurity. It is a known fact that not only the malicious users can freely allocate VMs, but also they can infect victims’ VMs to run their own tools that include cryptocurrency mining, ransomware, or cyberattacks against others. Even though there exist intrusion detection systems (IDS), running an IDS on every VM can be a costly process and it would require fine configuration that only a small subset of the cloud users are knowledgeable about. Therefore, to overcome this challenge, in this paper we present a VM introspection based allowlisting method to be deployed and managed directly by the cloud providers to check if there are any malicious software running on the VMs with minimum user intervention. Our middleware monitors the processes and if it detects unknown events, it will notify the users and/or can take action as needed.
云计算已经成为IT基础设施的主要后端,因为它提供无处不在的按需计算,以服务于广泛的用户,包括最终用户和要求高性能的机构。用户可以根据需要分配和释放分配给虚拟机的资源。然而,随着人们对云计算系统的兴趣的快速增长,一些问题特别是在网络安全领域出现了。众所周知,恶意用户不仅可以自由分配虚拟机,而且还可以感染受害者的虚拟机来运行自己的工具,包括加密货币挖掘,勒索软件或针对他人的网络攻击。尽管存在入侵检测系统(IDS),但在每个VM上运行入侵检测系统可能是一个代价高昂的过程,并且需要精细的配置,只有一小部分云用户了解这些配置。因此,为了克服这一挑战,在本文中,我们提出了一种基于VM自省的允许列表方法,由云提供商直接部署和管理,以最小的用户干预检查是否有任何恶意软件在VM上运行。我们的中间件监视流程,如果检测到未知事件,它将通知用户和/或根据需要采取行动。
{"title":"VM Introspection-based Allowlisting for IaaS","authors":"Farah Fargo, O. Franza, Cihan Tunc, S. Hariri","doi":"10.1109/IOTSMS52051.2020.9340190","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340190","url":null,"abstract":"Cloud computing has become the main backend of the IT infrastructure as it provides ubiquitous and on-demand computing to serve to a wide range of users including end-users and high-performance demanding agencies. The users can allocate and free resources allocated for their Virtual Machines (VMs) as needed. However, with the rapid growth of interest in cloud computing systems, several issues have arisen especially in the domain of cybersecurity. It is a known fact that not only the malicious users can freely allocate VMs, but also they can infect victims’ VMs to run their own tools that include cryptocurrency mining, ransomware, or cyberattacks against others. Even though there exist intrusion detection systems (IDS), running an IDS on every VM can be a costly process and it would require fine configuration that only a small subset of the cloud users are knowledgeable about. Therefore, to overcome this challenge, in this paper we present a VM introspection based allowlisting method to be deployed and managed directly by the cloud providers to check if there are any malicious software running on the VMs with minimum user intervention. Our middleware monitors the processes and if it detects unknown events, it will notify the users and/or can take action as needed.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127186750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Siamese Networks to Detect Shading on the Edge of Solar Farms 使用暹罗网络检测太阳能农场边缘的阴影
S. Shapsough, I. Zualkernan, R. Dhaouadi, A. Sajun
Solar power is one of the most promising sources of green power for future cities. However, real-time anomaly detection remains a challenge. Internet of Things (IoT) is an effective platform for real-time monitoring of large-scale solar farms. Using low-cost edge devices such as the Raspberry Pi (RPI), it is possible to not only read power and irradiance values from in-situ sensors, but to also apply machine learning and deep learning algorithms for real-time analysis and for detecting anomalous behaviors. This paper presents the design and implementation of an edge analytics application that uses RPI as an edge device. The Isolation Forest algorithm was first used to detect shading anomalies. A Siamese neural network was then trained to create a latent-space mapping. An anomaly detection model based on the latent space and a neural network and kNN was developed. These models could detect shading anomalies with an F1-Score of 0.94. Embedded variants of the model based on TensorFlow Lite and TensorRT were evaluated to service a large number of solar panels at 1Hz. The results are that a single RPI could do parallel anomaly detection of 512 solar panels at 1 Hz with 0% failures. The TensorRT variant consumed more resources than the TensorFlow Lite implementation, but the maximum CPU utilization remained below 75%.
太阳能是未来城市最有前途的绿色能源之一。然而,实时异常检测仍然是一个挑战。物联网(IoT)是实时监控大型太阳能发电场的有效平台。使用树莓派(RPI)等低成本边缘设备,不仅可以从原位传感器读取功率和辐照度值,还可以应用机器学习和深度学习算法进行实时分析和检测异常行为。本文介绍了使用RPI作为边缘设备的边缘分析应用程序的设计和实现。隔离森林算法首先用于检测遮阳异常。然后训练一个暹罗神经网络来创建一个潜在空间映射。提出了一种基于潜在空间、神经网络和kNN的异常检测模型。这些模型可以检测到遮阳异常,F1-Score为0.94。该模型基于TensorFlow Lite和TensorRT的嵌入式变体进行了评估,以服务于大量1Hz的太阳能电池板。结果表明,单个RPI可以在1 Hz的频率下对512块太阳能电池板进行并行异常检测,故障率为0%。TensorRT变体比TensorFlow Lite实现消耗更多的资源,但最大CPU利用率保持在75%以下。
{"title":"Using Siamese Networks to Detect Shading on the Edge of Solar Farms","authors":"S. Shapsough, I. Zualkernan, R. Dhaouadi, A. Sajun","doi":"10.1109/IOTSMS52051.2020.9340189","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340189","url":null,"abstract":"Solar power is one of the most promising sources of green power for future cities. However, real-time anomaly detection remains a challenge. Internet of Things (IoT) is an effective platform for real-time monitoring of large-scale solar farms. Using low-cost edge devices such as the Raspberry Pi (RPI), it is possible to not only read power and irradiance values from in-situ sensors, but to also apply machine learning and deep learning algorithms for real-time analysis and for detecting anomalous behaviors. This paper presents the design and implementation of an edge analytics application that uses RPI as an edge device. The Isolation Forest algorithm was first used to detect shading anomalies. A Siamese neural network was then trained to create a latent-space mapping. An anomaly detection model based on the latent space and a neural network and kNN was developed. These models could detect shading anomalies with an F1-Score of 0.94. Embedded variants of the model based on TensorFlow Lite and TensorRT were evaluated to service a large number of solar panels at 1Hz. The results are that a single RPI could do parallel anomaly detection of 512 solar panels at 1 Hz with 0% failures. The TensorRT variant consumed more resources than the TensorFlow Lite implementation, but the maximum CPU utilization remained below 75%.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121521949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data Quality Model-based Testing of Information Systems: the Use-case of E-scooters 基于数据质量模型的信息系统测试:电动滑板车用例
Anastasija Nikiforova, J. Bičevskis, Zane Bicevska, Ivo Oditis
The paper proposes a data quality model-based testing methodology aimed at improving testing methodology of information systems (IS) using previously proposed data quality model. The solution supposes creation of a description of the data to be processed by IS and the data quality requirements used for the development of the tests, followed by performing an automated test of the system on the generated tests verifying the correctness of data to be entered and stored in the database. The generation of tests for all possible data quality conditions creates a complete set of tests that verify the operation of the IS under all possible data quality conditions. The proposed solution is demonstrated by the real example of the system dealing with e-scooters. Although the proposed solution is demonstrated by applying it to the system that is already in use, it can also be used when developing a new system.
本文提出了一种基于数据质量模型的测试方法,旨在利用已有的数据质量模型改进信息系统的测试方法。该解决方案假定创建要由IS处理的数据的描述和用于开发测试的数据质量要求,然后对生成的测试执行系统的自动化测试,以验证要输入和存储在数据库中的数据的正确性。为所有可能的数据质量条件生成测试将创建一套完整的测试,用于验证在所有可能的数据质量条件下IS的操作。并以电动滑板车系统为例进行了验证。虽然建议的解决方案是通过将其应用于已经在使用的系统来证明的,但它也可以在开发新系统时使用。
{"title":"Data Quality Model-based Testing of Information Systems: the Use-case of E-scooters","authors":"Anastasija Nikiforova, J. Bičevskis, Zane Bicevska, Ivo Oditis","doi":"10.1109/IOTSMS52051.2020.9340228","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340228","url":null,"abstract":"The paper proposes a data quality model-based testing methodology aimed at improving testing methodology of information systems (IS) using previously proposed data quality model. The solution supposes creation of a description of the data to be processed by IS and the data quality requirements used for the development of the tests, followed by performing an automated test of the system on the generated tests verifying the correctness of data to be entered and stored in the database. The generation of tests for all possible data quality conditions creates a complete set of tests that verify the operation of the IS under all possible data quality conditions. The proposed solution is demonstrated by the real example of the system dealing with e-scooters. Although the proposed solution is demonstrated by applying it to the system that is already in use, it can also be used when developing a new system.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130290550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Transferability of Privacy-related Behaviours to Shared Smart Home Assistant Devices 与隐私相关的行为可转移到共享智能家居辅助设备
Vanessa Z. Lin, S. Parkin
Smart assistant devices (such as Amazon Echo or Google Home) have notable differences to more conventional consumer computing devices. They can be used through voice control as well as physical interaction, and are often positioned as a shared device within a home environment. We conduct an exploratory online survey with 97 UK-based users of smart assistant devices, to examine the differences users perceive between smart assistants and more familiar devices (such as smartphones and computers), in terms of shared use dynamics, privacy-related behaviours, and privacy concerns. The survey explores typical usage, setup practices, perceived ease of use and control, privacy concerns for multiple users, shared usage of existing devices, and smart assistant privacy control usage. Approximately half of participants were unsure of where to access privacy settings on their smart home assistants; basic device controls and informal privacy controls saw general use. Those who had used privacy controls with previous devices used at least one smart assistant privacy control. Results have implications for supporting transferable privacy behaviours from computing devices to smart home devices, and improving privacy-related design for smart assistants.
智能助手设备(如亚马逊Echo或谷歌Home)与更传统的消费计算设备有显著区别。它们可以通过语音控制和物理交互来使用,通常被定位为家庭环境中的共享设备。我们对97名英国智能助理设备用户进行了一项探索性在线调查,以检查用户在共享使用动态、隐私相关行为和隐私问题方面对智能助理和更熟悉的设备(如智能手机和电脑)之间的差异。该调查探讨了典型用法、设置实践、感知易用性和控制、多个用户的隐私问题、现有设备的共享使用以及智能助手隐私控制的使用情况。大约一半的参与者不确定在哪里访问他们的智能家居助手的隐私设置;基本的设备控制和非正式的隐私控制得到了广泛的使用。那些在以前的设备上使用隐私控制的人至少使用了一个智能助手隐私控制。研究结果对支持从计算设备到智能家居设备的可转移隐私行为以及改进智能助手的隐私相关设计具有重要意义。
{"title":"Transferability of Privacy-related Behaviours to Shared Smart Home Assistant Devices","authors":"Vanessa Z. Lin, S. Parkin","doi":"10.1109/IOTSMS52051.2020.9340199","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340199","url":null,"abstract":"Smart assistant devices (such as Amazon Echo or Google Home) have notable differences to more conventional consumer computing devices. They can be used through voice control as well as physical interaction, and are often positioned as a shared device within a home environment. We conduct an exploratory online survey with 97 UK-based users of smart assistant devices, to examine the differences users perceive between smart assistants and more familiar devices (such as smartphones and computers), in terms of shared use dynamics, privacy-related behaviours, and privacy concerns. The survey explores typical usage, setup practices, perceived ease of use and control, privacy concerns for multiple users, shared usage of existing devices, and smart assistant privacy control usage. Approximately half of participants were unsure of where to access privacy settings on their smart home assistants; basic device controls and informal privacy controls saw general use. Those who had used privacy controls with previous devices used at least one smart assistant privacy control. Results have implications for supporting transferable privacy behaviours from computing devices to smart home devices, and improving privacy-related design for smart assistants.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130819801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IOTSMS 2020 Author Index IOTSMS 2020作者索引
{"title":"IOTSMS 2020 Author Index","authors":"","doi":"10.1109/iotsms52051.2020.9340227","DOIUrl":"https://doi.org/10.1109/iotsms52051.2020.9340227","url":null,"abstract":"","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"19 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132497936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1