首页 > 最新文献

2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)最新文献

英文 中文
Poster Abstract: Ensuring Low-Latency and Scalable Data Dissemination for Smart-City Applications 海报摘要:确保智慧城市应用的低延迟和可扩展数据传播
S. Khare, Hongyang Sun, Kaiwen Zhang, Julien Gascon-Samson, A. Gokhale, X. Koutsoukos
Low latency and scalable data dissemination is a critical requirement for many IoT applications, e.g., smart city applications, which are often built over a publish/subscribe communication paradigm. Ensuring low latency requires effective load balancing of the publish/subscribe topics across the different publishers and subscribers. To that end we present ongoing work on a data-driven approach to learning a latency-aware model of IoT broker loads, and in turn using it to determine broker replication, and balancing topics across them.
低延迟和可扩展的数据传播是许多物联网应用的关键要求,例如智能城市应用,这些应用通常建立在发布/订阅通信范式之上。确保低延迟需要跨不同发布者和订阅者对发布/订阅主题进行有效的负载平衡。为此,我们提出了一种数据驱动的方法来学习物联网代理负载的延迟感知模型,并反过来使用它来确定代理复制,并在它们之间平衡主题。
{"title":"Poster Abstract: Ensuring Low-Latency and Scalable Data Dissemination for Smart-City Applications","authors":"S. Khare, Hongyang Sun, Kaiwen Zhang, Julien Gascon-Samson, A. Gokhale, X. Koutsoukos","doi":"10.1109/IoTDI.2018.00041","DOIUrl":"https://doi.org/10.1109/IoTDI.2018.00041","url":null,"abstract":"Low latency and scalable data dissemination is a critical requirement for many IoT applications, e.g., smart city applications, which are often built over a publish/subscribe communication paradigm. Ensuring low latency requires effective load balancing of the publish/subscribe topics across the different publishers and subscribers. To that end we present ongoing work on a data-driven approach to learning a latency-aware model of IoT broker loads, and in turn using it to determine broker replication, and balancing topics across them.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124650834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Workload Shaping Energy Optimizations with Predictable Performance for Mobile Sensing 具有可预测性能的工作负载整形能量优化移动传感
Farley Lai, Marjan Radi, O. Chipara, W. Griswold
Energy-efficiency is a key concern in mobile sensing applications, such as those for tracking social interactions or physical activities. An attractive approach to saving energy is to shape the workload of the system by artificially introducing delays so that the workload would require less energy to process. However, adding delays to save energy may have a detrimental impact on user experience. To address this problem, we present Gratis, a novel paradigm for incorporating workload shaping energy optimizations in mobile sensing applications in an automated manner. Gratis adopts stream programs as a high-level abstraction whose execution is coordinated using an explicit power management policy. We present an expressive coordination language that can specify a broad range of workload-shaping optimizations. A unique property of the proposed power management policies is that they have predictable performance, which can be estimated at compile time, in a computationally efficient manner, from a small number of measurements. We have developed a simulator that can predict the energy with a average error of 7% and delay with a average error of 15%, even when applications have variable workloads. The simulator is scalable: hours of real-world traces can be simulated in a few seconds. Building on the simulator's accuracy and scalability, we have developed tools for configuring power management policies automatically. We have evaluated Gratis by developing two mobile applications and optimizing their energy consumption. For example, an application that tracks social interactions using speaker-identification techniques can run for only 7 hours without energy optimizations. However, when Gratis employs batching, scheduled concurrency, and adaptive sensing, the battery lifetime can be extended to 45 hours when the end-to-end deadline is one minute. These results demonstrate the efficacy of our approach to reduce energy consumption in mobile sensing applications.
能源效率是移动传感应用中的一个关键问题,例如跟踪社会互动或身体活动的应用。节省能源的一个有吸引力的方法是通过人为地引入延迟来塑造系统的工作负载,以便工作负载需要更少的能量来处理。然而,增加延迟以节省能源可能会对用户体验产生不利影响。为了解决这个问题,我们提出了Gratis,这是一种以自动化方式将工作负载塑造能量优化纳入移动传感应用的新范例。Gratis采用流程序作为高级抽象,其执行使用显式电源管理策略进行协调。我们提出了一种表达性的协调语言,它可以指定广泛的工作负载塑造优化。所提出的电源管理策略的一个独特特性是它们具有可预测的性能,可以在编译时以计算效率高的方式,通过少量测量来估计性能。我们已经开发了一个模拟器,即使在应用程序具有可变工作负载的情况下,也可以预测平均误差为7%的能量和平均误差为15%的延迟。模拟器是可扩展的:几个小时的真实世界的痕迹可以在几秒钟内模拟。基于模拟器的准确性和可扩展性,我们开发了用于自动配置电源管理策略的工具。我们通过开发两个移动应用程序并优化其能耗来评估Gratis。例如,一个使用说话人识别技术跟踪社交互动的应用程序在没有能量优化的情况下只能运行7个小时。然而,当Gratis采用批处理、调度并发和自适应感知时,当端到端截止日期为1分钟时,电池寿命可以延长到45小时。这些结果证明了我们的方法在移动传感应用中降低能耗的有效性。
{"title":"Workload Shaping Energy Optimizations with Predictable Performance for Mobile Sensing","authors":"Farley Lai, Marjan Radi, O. Chipara, W. Griswold","doi":"10.1109/IoTDI.2018.00026","DOIUrl":"https://doi.org/10.1109/IoTDI.2018.00026","url":null,"abstract":"Energy-efficiency is a key concern in mobile sensing applications, such as those for tracking social interactions or physical activities. An attractive approach to saving energy is to shape the workload of the system by artificially introducing delays so that the workload would require less energy to process. However, adding delays to save energy may have a detrimental impact on user experience. To address this problem, we present Gratis, a novel paradigm for incorporating workload shaping energy optimizations in mobile sensing applications in an automated manner. Gratis adopts stream programs as a high-level abstraction whose execution is coordinated using an explicit power management policy. We present an expressive coordination language that can specify a broad range of workload-shaping optimizations. A unique property of the proposed power management policies is that they have predictable performance, which can be estimated at compile time, in a computationally efficient manner, from a small number of measurements. We have developed a simulator that can predict the energy with a average error of 7% and delay with a average error of 15%, even when applications have variable workloads. The simulator is scalable: hours of real-world traces can be simulated in a few seconds. Building on the simulator's accuracy and scalability, we have developed tools for configuring power management policies automatically. We have evaluated Gratis by developing two mobile applications and optimizing their energy consumption. For example, an application that tracks social interactions using speaker-identification techniques can run for only 7 hours without energy optimizations. However, when Gratis employs batching, scheduled concurrency, and adaptive sensing, the battery lifetime can be extended to 45 hours when the end-to-end deadline is one minute. These results demonstrate the efficacy of our approach to reduce energy consumption in mobile sensing applications.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125222799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Automatic and Accurate Localization System for Firefighters 一种消防员自动精确定位系统
Jinyang Li, Zhiheng Xie, Xiaoshan Sun, Jian Tang, Hengchang Liu, J. Stankovic
Firefighters' safety is a critical problem and a major issue is the lack of reliable indoor firefighter localization. State of the art approaches have failed to provide an automatic, accurate and reliable solution to localize firefighters in harsh environments. This paper presents a novel system to achieve this goal, by combining pedestrian dead reckoning with a recently emerging breadcrumb system. Our solution includes a new collaborative localization algorithm that contains a novel marginalization scheme and can improve the location accuracy of firefighters. We fully implement the algorithm in a complete system and conduct experiments in both an office building and in a simulated firefighting scene that involved a real fire and professional firefighters. Evaluation results from a 400 meter-long trace demonstrate that our approach significantly reduces the average and maximum firefighter location error to 1.4% and 2.7% of the total distance, respectively.
消防人员的安全是一个关键问题,缺乏可靠的室内消防人员定位是一个主要问题。最先进的方法无法为恶劣环境中的消防员提供自动、准确和可靠的解决方案。本文提出了一种新的系统来实现这一目标,该系统将行人航位推算与最近出现的面包屑系统相结合。我们的解决方案包括一种新的协作定位算法,该算法包含一种新的边缘方案,可以提高消防员的定位精度。我们在一个完整的系统中充分实现了算法,并在办公楼和模拟消防场景中进行了实验,其中包括真实的火灾和专业消防员。400米长的轨迹评估结果表明,我们的方法显著降低了消防员定位误差的平均值和最大值,分别为总距离的1.4%和2.7%。
{"title":"An Automatic and Accurate Localization System for Firefighters","authors":"Jinyang Li, Zhiheng Xie, Xiaoshan Sun, Jian Tang, Hengchang Liu, J. Stankovic","doi":"10.1109/IoTDI.2018.00012","DOIUrl":"https://doi.org/10.1109/IoTDI.2018.00012","url":null,"abstract":"Firefighters' safety is a critical problem and a major issue is the lack of reliable indoor firefighter localization. State of the art approaches have failed to provide an automatic, accurate and reliable solution to localize firefighters in harsh environments. This paper presents a novel system to achieve this goal, by combining pedestrian dead reckoning with a recently emerging breadcrumb system. Our solution includes a new collaborative localization algorithm that contains a novel marginalization scheme and can improve the location accuracy of firefighters. We fully implement the algorithm in a complete system and conduct experiments in both an office building and in a simulated firefighting scene that involved a real fire and professional firefighters. Evaluation results from a 400 meter-long trace demonstrate that our approach significantly reduces the average and maximum firefighter location error to 1.4% and 2.7% of the total distance, respectively.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125956704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Poster Abstract: Good Advice That Just Doesn't Help 海报摘要:好建议只是没有帮助
Andrew Dingman, Gianpaolo Russo, Georg Osterholt, Tyler Uffelman, L. Camp
Guidelines exist for designing less vulnerable "things", but how useful are they in practice? To answer this question we present high-level analysis of the state of best practices in Internet of Things. We examined six sets of best practices, combining them into a single set. We then take that union and examine their applicability to three large-scale events. We evaluate if the best practices had been followed, would these have prevented the large scale abuse of IoT devices.
设计不那么脆弱的“东西”的指导方针是存在的,但它们在实践中有多大用处呢?为了回答这个问题,我们对物联网最佳实践的现状进行了高层次的分析。我们研究了六组最佳实践,并将它们合并为一组。然后,我们采用该联合并检验它们对三个大型事件的适用性。我们评估是否遵循了最佳实践,这些实践是否可以防止大规模滥用物联网设备。
{"title":"Poster Abstract: Good Advice That Just Doesn't Help","authors":"Andrew Dingman, Gianpaolo Russo, Georg Osterholt, Tyler Uffelman, L. Camp","doi":"10.1109/IoTDI.2018.00044","DOIUrl":"https://doi.org/10.1109/IoTDI.2018.00044","url":null,"abstract":"Guidelines exist for designing less vulnerable \"things\", but how useful are they in practice? To answer this question we present high-level analysis of the state of best practices in Internet of Things. We examined six sets of best practices, combining them into a single set. We then take that union and examine their applicability to three large-scale events. We evaluate if the best practices had been followed, would these have prevented the large scale abuse of IoT devices.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129615705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
LogSafe: Secure and Scalable Data Logger for IoT Devices LogSafe:用于物联网设备的安全、可扩展的数据记录器
Hung Nguyen, Radoslav Ivanov, L. T. Phan, O. Sokolsky, James Weimer, Insup Lee
As devices in the Internet of Things (IoT) increase in number and integrate with everyday lives, large amounts of personal information will be generated. With multiple discovered vulnerabilities in current IoT networks, a malicious attacker might be able to get access to and misuse this personal data. Thus, a logger that stores this information securely would make it possible to perform forensic analysis in case of such attacks that target valuable data. In this paper, we propose LogSafe, a scalable, fault-tolerant logger that leverages the use of Intel Software Guard Extensions (SGX) to store logs from IoT devices efficiently and securely. Using the security guarantees of SGX, LogSafe is designed to run on an untrusted cloud infrastructure and satisfies Confidentiality, Integrity, and Availability (CIA) security properties. Finally, we provide an exhaustive evaluation of LogSafe in order to demonstrate that it is capable of handling logs from a large number of IoT devices and at a very high data transmission rate.
随着物联网(IoT)设备数量的增加和与日常生活的融合,将产生大量的个人信息。由于在当前物联网网络中发现了多个漏洞,恶意攻击者可能能够访问并滥用这些个人数据。因此,安全存储此信息的日志记录器将使在针对有价值数据的此类攻击发生时执行取证分析成为可能。在本文中,我们提出了LogSafe,这是一种可扩展的容错日志记录器,它利用英特尔软件保护扩展(SGX)来高效安全地存储来自物联网设备的日志。LogSafe使用SGX的安全保证,设计用于运行在不受信任的云基础设施上,并满足机密性、完整性和可用性(CIA)安全属性。最后,我们对LogSafe进行了详尽的评估,以证明它能够以非常高的数据传输速率处理来自大量物联网设备的日志。
{"title":"LogSafe: Secure and Scalable Data Logger for IoT Devices","authors":"Hung Nguyen, Radoslav Ivanov, L. T. Phan, O. Sokolsky, James Weimer, Insup Lee","doi":"10.1109/IoTDI.2018.00023","DOIUrl":"https://doi.org/10.1109/IoTDI.2018.00023","url":null,"abstract":"As devices in the Internet of Things (IoT) increase in number and integrate with everyday lives, large amounts of personal information will be generated. With multiple discovered vulnerabilities in current IoT networks, a malicious attacker might be able to get access to and misuse this personal data. Thus, a logger that stores this information securely would make it possible to perform forensic analysis in case of such attacks that target valuable data. In this paper, we propose LogSafe, a scalable, fault-tolerant logger that leverages the use of Intel Software Guard Extensions (SGX) to store logs from IoT devices efficiently and securely. Using the security guarantees of SGX, LogSafe is designed to run on an untrusted cloud infrastructure and satisfies Confidentiality, Integrity, and Availability (CIA) security properties. Finally, we provide an exhaustive evaluation of LogSafe in order to demonstrate that it is capable of handling logs from a large number of IoT devices and at a very high data transmission rate.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124534560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
UnTran: Recognizing Unseen Activities with Unlabeled Data Using Transfer Learning UnTran:使用迁移学习识别未标记数据的不可见活动
Md Abdullah Al Hafiz Khan, Nirmalya Roy
The success and impact of activity recognition algorithms largely depends on the availability of the labeled training samples and adaptability of activity recognition models across various domains. In a new environment, the pre-trained activity recognition models face challenges in presence of sensing bias- ness, device heterogeneities, and inherent variabilities in human behaviors and activities. Activity Recognition (AR) system built in one environment does not scale well in another environment, if it has to learn new activities and the annotated activity samples are scarce. Indeed building a new activity recognition model and training the model with large annotated samples often help overcome this challenging problem. However, collecting annotated samples is cost-sensitive and learning activity model at wild is computationally expensive. In this work, we propose an activity recognition framework, UnTran that utilizes source domains' pre-trained autoencoder enabled activity model that transfers two layers of this network to generate a common feature space for both source and target domain activities. We postulate a hybrid AR framework that helps fuse the decisions from a trained model in source domain and two activity models (raw and deep-feature based activity model) in target domain reducing the demand of annotated activity samples to help recognize unseen activities. We evaluated our framework with three real-world data traces consisting of 41 users and 26 activities in total. Our proposed UnTran AR framework achieves ≈ 75% F1 score in recognizing unseen new activities using only 10% labeled activity data in the target domain. UnTran attains ≈ 98% F1 score while recognizing seen activities in presence of only 2-3% of labeled activity samples.
活动识别算法的成功和影响在很大程度上取决于标记训练样本的可用性和活动识别模型在各个领域的适应性。在新的环境下,预训练的活动识别模型面临着感知偏差、设备异质性以及人类行为和活动的内在变异性的挑战。在一种环境中构建的活动识别(AR)系统,如果需要学习新的活动,并且标注的活动样本很少,则无法很好地扩展到另一种环境中。实际上,构建一个新的活动识别模型并使用大量带注释的样本训练模型通常有助于克服这个具有挑战性的问题。然而,收集带注释的样本是成本敏感的,并且在野外学习活动模型的计算成本很高。在这项工作中,我们提出了一个活动识别框架,UnTran,它利用源域的预训练自动编码器支持的活动模型,该模型传输该网络的两层,以生成源域和目标域活动的公共特征空间。我们假设了一个混合AR框架,它有助于融合源域的训练模型和目标域的两个活动模型(原始和基于深度特征的活动模型)的决策,减少了对注释活动样本的需求,以帮助识别未见过的活动。我们用总共41个用户和26个活动组成的三个真实数据跟踪来评估我们的框架。我们提出的UnTran AR框架在使用目标域中仅10%的标记活动数据识别未见的新活动方面达到了≈75%的F1分数。UnTran在仅识别2-3%标记活性样本的情况下,获得了≈98%的F1分数。
{"title":"UnTran: Recognizing Unseen Activities with Unlabeled Data Using Transfer Learning","authors":"Md Abdullah Al Hafiz Khan, Nirmalya Roy","doi":"10.1109/IoTDI.2018.00014","DOIUrl":"https://doi.org/10.1109/IoTDI.2018.00014","url":null,"abstract":"The success and impact of activity recognition algorithms largely depends on the availability of the labeled training samples and adaptability of activity recognition models across various domains. In a new environment, the pre-trained activity recognition models face challenges in presence of sensing bias- ness, device heterogeneities, and inherent variabilities in human behaviors and activities. Activity Recognition (AR) system built in one environment does not scale well in another environment, if it has to learn new activities and the annotated activity samples are scarce. Indeed building a new activity recognition model and training the model with large annotated samples often help overcome this challenging problem. However, collecting annotated samples is cost-sensitive and learning activity model at wild is computationally expensive. In this work, we propose an activity recognition framework, UnTran that utilizes source domains' pre-trained autoencoder enabled activity model that transfers two layers of this network to generate a common feature space for both source and target domain activities. We postulate a hybrid AR framework that helps fuse the decisions from a trained model in source domain and two activity models (raw and deep-feature based activity model) in target domain reducing the demand of annotated activity samples to help recognize unseen activities. We evaluated our framework with three real-world data traces consisting of 41 users and 26 activities in total. Our proposed UnTran AR framework achieves ≈ 75% F1 score in recognizing unseen new activities using only 10% labeled activity data in the target domain. UnTran attains ≈ 98% F1 score while recognizing seen activities in presence of only 2-3% of labeled activity samples.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"51 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130184660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Poster Abstract: Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears 摘要:谁在照看你的孩子?用智能玩具熊探索家庭安全风险
Joshua Streiff, O. Kenny, Sanchari Das, Andrew Leeth, L. Camp
The Internet of Things (IoT) can affect the physical safety of a child in addition to their digital safety. Digital safety concerns include what is being recorded and who is monitoring them. IoT devices, like the Fisher Price Smart Toys are designed to play with children of ages 3-8 and entertain them with various activities. This has expanded digital exposure into children's spaces. These toys contain a variety of communication technologies that users are ill-prepared to understand, a myriad of sensors collecting private data, including video, and often rely on inadequate security tools and methodology. This intersection of poor security, invasive sensor data, and proximity to children may put children at risks both online and in-person. In examining the Fisher Price Bear, our researchers were able to both verify that security tools have been implemented to fix network security failures previously found in the toy, but also discovered a security flaw which allows root access to the smart toy, allowing full access to the nose camera and other sensors. Preliminary results are presented in how the operating system can be modified in order to install software so that a modified bear can be controlled remotely. Mitigation education is presented as a critical instrument for self-protection of parents and children in a smart toy environment.
除了数字安全之外,物联网(IoT)还会影响儿童的人身安全。数字安全问题包括正在记录的内容以及谁在监控它们。像Fisher Price智能玩具这样的物联网设备是为3-8岁的孩子设计的,并通过各种活动来娱乐他们。这将数字暴露扩展到儿童空间。这些玩具包含各种各样的通信技术,用户还没有准备好理解,无数的传感器收集私人数据,包括视频,而且往往依赖于不充分的安全工具和方法。安全性差、侵入式传感器数据以及与儿童的接近可能会使儿童在网上和现实生活中都面临风险。在检查费雪价格熊时,我们的研究人员能够验证安全工具已经实施,以修复之前在玩具中发现的网络安全故障,但也发现了一个安全漏洞,允许root访问智能玩具,允许完全访问鼻子摄像头和其他传感器。初步结果展示了如何修改操作系统,以便安装软件,从而可以远程控制修改后的熊。缓解教育被认为是智能玩具环境中父母和儿童自我保护的关键工具。
{"title":"Poster Abstract: Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears","authors":"Joshua Streiff, O. Kenny, Sanchari Das, Andrew Leeth, L. Camp","doi":"10.1109/IoTDI.2018.00042","DOIUrl":"https://doi.org/10.1109/IoTDI.2018.00042","url":null,"abstract":"The Internet of Things (IoT) can affect the physical safety of a child in addition to their digital safety. Digital safety concerns include what is being recorded and who is monitoring them. IoT devices, like the Fisher Price Smart Toys are designed to play with children of ages 3-8 and entertain them with various activities. This has expanded digital exposure into children's spaces. These toys contain a variety of communication technologies that users are ill-prepared to understand, a myriad of sensors collecting private data, including video, and often rely on inadequate security tools and methodology. This intersection of poor security, invasive sensor data, and proximity to children may put children at risks both online and in-person. In examining the Fisher Price Bear, our researchers were able to both verify that security tools have been implemented to fix network security failures previously found in the toy, but also discovered a security flaw which allows root access to the smart toy, allowing full access to the nose camera and other sensors. Preliminary results are presented in how the operating system can be modified in order to install software so that a modified bear can be controlled remotely. Mitigation education is presented as a critical instrument for self-protection of parents and children in a smart toy environment.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"21 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132532202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Poster Abstract: Comparison of Classifiers for Prediction of Human Actions in a Smart Home 摘要:智能家居中人类行为预测的分类器比较
Basman M. Hasan Alhafidh, Amar I. Daood, W. Allen
There is a strong interest in IoT-based systems that monitor and control smart home environments by accurately predicting the needs of the human occupants. Past research has focused on the accuracy of prediction of a user's future action. However, much of that work uses synthetic datasets which do not always reflect the real-world interactions that occur between an individual and the home environment. In addition, a focus on prediction accuracy often comes at the cost of slower processing time. This paper focuses on the prediction of future human actions in an intelligent environment with the goal of achieving both high accuracy and real-time performance. We performed experiments using the MavPad dataset, which was gathered from a fully-instrumented home environment, and compared several different machine learning algorithms that included both single and ensemble classifiers. The results show that using a Support Vector Machine approach achieved the best results when using a group of sensors within a local zone around the user and the Random Forest classifier achieved higher performance when using sensors that are distributed across the entire home environment.
人们对基于物联网的系统有着浓厚的兴趣,这些系统通过准确预测人类居住者的需求来监控和控制智能家居环境。过去的研究主要集中在预测用户未来行为的准确性上。然而,许多工作使用的合成数据集并不总是反映个人与家庭环境之间发生的现实世界的相互作用。此外,对预测准确性的关注往往是以较慢的处理时间为代价的。本文的重点是在智能环境中对人类未来行为的预测,其目标是实现高精度和实时性。我们使用MavPad数据集进行了实验,该数据集是从一个完全仪器化的家庭环境中收集的,并比较了几种不同的机器学习算法,包括单个分类器和集成分类器。结果表明,当在用户周围的局部区域内使用一组传感器时,使用支持向量机方法获得了最好的结果,而当使用分布在整个家庭环境中的传感器时,使用随机森林分类器获得了更高的性能。
{"title":"Poster Abstract: Comparison of Classifiers for Prediction of Human Actions in a Smart Home","authors":"Basman M. Hasan Alhafidh, Amar I. Daood, W. Allen","doi":"10.1109/IoTDI.2018.00043","DOIUrl":"https://doi.org/10.1109/IoTDI.2018.00043","url":null,"abstract":"There is a strong interest in IoT-based systems that monitor and control smart home environments by accurately predicting the needs of the human occupants. Past research has focused on the accuracy of prediction of a user's future action. However, much of that work uses synthetic datasets which do not always reflect the real-world interactions that occur between an individual and the home environment. In addition, a focus on prediction accuracy often comes at the cost of slower processing time. This paper focuses on the prediction of future human actions in an intelligent environment with the goal of achieving both high accuracy and real-time performance. We performed experiments using the MavPad dataset, which was gathered from a fully-instrumented home environment, and compared several different machine learning algorithms that included both single and ensemble classifiers. The results show that using a Support Vector Machine approach achieved the best results when using a group of sensors within a local zone around the user and the Random Forest classifier achieved higher performance when using sensors that are distributed across the entire home environment.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128246597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cyber-Physical Scheduling for Predictable Reliability of Inter-Vehicle Communications 车际通信可预测可靠性的网络物理调度
Chuan Li, Hongwei Zhang, J. Rao, L. Wang, G. Yin
Predictable inter-vehicle communication reliability is a basis for the paradigm shift from the traditional singlevehicle-oriented safety and efficiency control to networked vehicle control. The lack of predictable interference control in existing mechanisms of inter-vehicle communications, however, makes them incapable of ensuring predictable communication reliability. For predictable interference control, we propose the Cyber-Physical Scheduling (CPS) framework that leverages the PRK interference model and addresses the challenges of vehicle mobility to PRK-based scheduling. In particular, for lightweight control signaling and effective interference relation estimation, CPS leverages the physical locations of vehicles to define the gPRK interference model as a geometric approximation of the PRK model; for effective use of the gPRK model, CPS leverages cyber-physical structures of vehicle traffic flows, particularly, the spatiotemporal interference correlation as well as the macroand micro-scopic vehicle dynamics. Through experimental analysis with high-fidelity ns-3 and SUMO simulation, we observe that CPS enables predictable reliability while achieving high throughput and low delay in communication. To the best of our knowledge, CPS is the first field-deployable method that ensures predictable interference control and thus reliability in inter-vehicle communications.
可预测的车际通信可靠性是实现从传统的以单车为导向的安全和效率控制模式向网络化车辆控制模式转变的基础。然而,现有的车际通信机制缺乏可预测的干扰控制,无法保证可预测的通信可靠性。对于可预测的干扰控制,我们提出了利用PRK干扰模型的网络物理调度(CPS)框架,并解决了车辆移动性对基于PRK调度的挑战。特别是,对于轻量级控制信号和有效干扰关系估计,CPS利用车辆的物理位置将gPRK干扰模型定义为PRK模型的几何近似;为了有效利用gPRK模型,CPS利用了车辆交通流的网络物理结构,特别是时空干扰相关性以及宏观和微观车辆动力学。通过高保真ns-3和SUMO仿真的实验分析,我们观察到CPS在实现高吞吐量和低延迟通信的同时实现了可预测的可靠性。据我们所知,CPS是第一种可现场部署的方法,可确保可预测的干扰控制,从而确保车辆间通信的可靠性。
{"title":"Cyber-Physical Scheduling for Predictable Reliability of Inter-Vehicle Communications","authors":"Chuan Li, Hongwei Zhang, J. Rao, L. Wang, G. Yin","doi":"10.1109/IoTDI.2018.00035","DOIUrl":"https://doi.org/10.1109/IoTDI.2018.00035","url":null,"abstract":"Predictable inter-vehicle communication reliability is a basis for the paradigm shift from the traditional singlevehicle-oriented safety and efficiency control to networked vehicle control. The lack of predictable interference control in existing mechanisms of inter-vehicle communications, however, makes them incapable of ensuring predictable communication reliability. For predictable interference control, we propose the Cyber-Physical Scheduling (CPS) framework that leverages the PRK interference model and addresses the challenges of vehicle mobility to PRK-based scheduling. In particular, for lightweight control signaling and effective interference relation estimation, CPS leverages the physical locations of vehicles to define the gPRK interference model as a geometric approximation of the PRK model; for effective use of the gPRK model, CPS leverages cyber-physical structures of vehicle traffic flows, particularly, the spatiotemporal interference correlation as well as the macroand micro-scopic vehicle dynamics. Through experimental analysis with high-fidelity ns-3 and SUMO simulation, we observe that CPS enables predictable reliability while achieving high throughput and low delay in communication. To the best of our knowledge, CPS is the first field-deployable method that ensures predictable interference control and thus reliability in inter-vehicle communications.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126331244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Ride: A Resilient IoT Data Exchange Middleware Leveraging SDN and Edge Cloud Resources Ride:利用SDN和边缘云资源的弹性物联网数据交换中间件
Kyle E. Benson, Guoxi Wang, N. Venkatasubramanian, Young-Jin Kim
Internet of Things (IoT) deployments rely on data exchange middleware to manage communications between constrained devices and cloud resources that provide analytics, data storage, and serve user applications. In this paper, we propose the Resilient IoT Data Exchange (Ride) middleware that enables resilient operation of IoT applications despite prevalent network failures and congestion. It leverages programmable Software-Defined Networking (SDN)-enabled infrastructure along with both localized edge and cloud services. The two-phase Ride middleware extends existing publish-subscribe oriented IoT data exchanges according to application-specified resilience requirements and without IoT device client modifications. The first phase, Ride-C, improves IoT data collection by gathering network-awareness via a novel resource-aware adaptive probing mechanism and dynamically redirecting IoT data flows across multiple public and local (edge) cloud data exchange connections. The second phase, Ride-D, uses this information to disseminate time-critical alerts via an intelligent network-aware resilient multicast mechanism. Results from our prototype smart campus testbed implementation, Mininet-based emulated experiments, and larger-scale simulations show that Ride enables network awareness for greater cloud connection up-times, timely fail-over to edge services, and more resilient local alert dissemination.
物联网(IoT)部署依赖于数据交换中间件来管理受限设备和云资源之间的通信,云资源提供分析、数据存储和服务用户应用程序。在本文中,我们提出了弹性物联网数据交换(Ride)中间件,它可以在普遍的网络故障和拥塞情况下实现物联网应用程序的弹性操作。它利用支持可编程软件定义网络(SDN)的基础设施以及本地化的边缘和云服务。两阶段的Ride中间件根据应用程序指定的弹性需求扩展现有的面向发布-订阅的物联网数据交换,而无需修改物联网设备客户端。第一阶段,Ride-C,通过一种新颖的资源感知自适应探测机制收集网络感知,并在多个公共和本地(边缘)云数据交换连接上动态重定向物联网数据流,从而改善物联网数据收集。第二阶段,Ride-D,使用这些信息通过智能网络感知弹性多播机制传播时间关键警报。我们的原型智能校园测试平台实施、基于miniet的仿真实验和大规模模拟的结果表明,Ride使网络感知能够实现更长的云连接正常运行时间、及时的故障转移到边缘服务,以及更有弹性的本地警报传播。
{"title":"Ride: A Resilient IoT Data Exchange Middleware Leveraging SDN and Edge Cloud Resources","authors":"Kyle E. Benson, Guoxi Wang, N. Venkatasubramanian, Young-Jin Kim","doi":"10.1109/IoTDI.2018.00017","DOIUrl":"https://doi.org/10.1109/IoTDI.2018.00017","url":null,"abstract":"Internet of Things (IoT) deployments rely on data exchange middleware to manage communications between constrained devices and cloud resources that provide analytics, data storage, and serve user applications. In this paper, we propose the Resilient IoT Data Exchange (Ride) middleware that enables resilient operation of IoT applications despite prevalent network failures and congestion. It leverages programmable Software-Defined Networking (SDN)-enabled infrastructure along with both localized edge and cloud services. The two-phase Ride middleware extends existing publish-subscribe oriented IoT data exchanges according to application-specified resilience requirements and without IoT device client modifications. The first phase, Ride-C, improves IoT data collection by gathering network-awareness via a novel resource-aware adaptive probing mechanism and dynamically redirecting IoT data flows across multiple public and local (edge) cloud data exchange connections. The second phase, Ride-D, uses this information to disseminate time-critical alerts via an intelligent network-aware resilient multicast mechanism. Results from our prototype smart campus testbed implementation, Mininet-based emulated experiments, and larger-scale simulations show that Ride enables network awareness for greater cloud connection up-times, timely fail-over to edge services, and more resilient local alert dissemination.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114858218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
期刊
2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1