首页 > 最新文献

2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)最新文献

英文 中文
Hardware-Based Online Self-Diagnosis for Faulty Device Identification in Large-Scale IoT Systems 大规模物联网系统中基于硬件的故障设备在线自诊断
Junghee Lee, Monobrata Debnath, A. Patki, Mostafa Hasan, C. Nicopoulos
Thanks to advances in semiconductor and communication technologies, a multitude of devices can be connected over a network. This widespread interconnectivity among disparate devices has ushered the era of Internet-of-Things (IoT). After IoT devices are developed and tested, they are integrated within a system and eventually deployed. Due to the complex nature of IoT systems, however, they may fail even after deployment. In a large-scale IoT system, an automatic diagnosis technique is imperative, because it may take too much time and effort to investigate a large number of devices. In this paper, a faulty device identification technique is proposed that is based on very lightweight processor-level architectural support. A hardware-based monitoring agent is incorporated within a processor, and connected to a separate monitoring program when an examination is required. By analyzing information collected by the agent, the monitoring program determines whether the device under monitoring is working correctly, or not. The experimental results demonstrate that the proposed technique can detect 92.66% of failures, with merely 1.55% false alarms.
由于半导体和通信技术的进步,许多设备可以通过网络连接起来。不同设备之间的广泛互联开启了物联网(IoT)时代。在开发和测试物联网设备后,将它们集成到系统中并最终部署。然而,由于物联网系统的复杂性,即使在部署之后,它们也可能会失败。在大规模物联网系统中,自动诊断技术是必不可少的,因为调查大量设备可能需要花费太多的时间和精力。本文提出了一种基于轻量级处理器级架构支持的故障设备识别技术。一个基于硬件的监控代理被集成到处理器中,并在需要检查时连接到一个单独的监控程序。监控程序通过分析代理收集到的信息,判断被监控设备是否正常工作。实验结果表明,该方法能检测出92.66%的故障,仅有1.55%的误报。
{"title":"Hardware-Based Online Self-Diagnosis for Faulty Device Identification in Large-Scale IoT Systems","authors":"Junghee Lee, Monobrata Debnath, A. Patki, Mostafa Hasan, C. Nicopoulos","doi":"10.1109/IoTDI.2018.00019","DOIUrl":"https://doi.org/10.1109/IoTDI.2018.00019","url":null,"abstract":"Thanks to advances in semiconductor and communication technologies, a multitude of devices can be connected over a network. This widespread interconnectivity among disparate devices has ushered the era of Internet-of-Things (IoT). After IoT devices are developed and tested, they are integrated within a system and eventually deployed. Due to the complex nature of IoT systems, however, they may fail even after deployment. In a large-scale IoT system, an automatic diagnosis technique is imperative, because it may take too much time and effort to investigate a large number of devices. In this paper, a faulty device identification technique is proposed that is based on very lightweight processor-level architectural support. A hardware-based monitoring agent is incorporated within a processor, and connected to a separate monitoring program when an examination is required. By analyzing information collected by the agent, the monitoring program determines whether the device under monitoring is working correctly, or not. The experimental results demonstrate that the proposed technique can detect 92.66% of failures, with merely 1.55% false alarms.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121531689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Demo Abstract: Smart City: A Real-Time Environmental Monitoring System on Green Roof 摘要:智慧城市:绿色屋顶环境实时监测系统
Zhihe Zhao, Jiaheng Wang, Chenxu Fu, Dawei Liu, Bailiang Li
The research on the green roof is of great importance in the field of urban beautification and improving ecological effect. According to the previous research, plants have shown a significant impact on the absorption of PM2.5. Therefore, it is justified that the appropriate planting design or some particular combinations of plants can be considered as a solution, dealing with the urban fine particulate matter (PM2.5). This paper presented a work in progress on developing wireless sensor networks (WSN) system based on a prototype wind tunnel, which is used for the simulation of the green roof. Several data collection processes are handled by this system, where the concentration of PM2.5, wind speed, temperature & relative humidity are obtained and stored in the database simultaneously. Additionally, users are able to real-timely define their commands in details, controlling the sensor's height through a GUI on the website. Experimental and simulation results and measurements have verified the validity of the wind tunnel module as well as the reliability of the sensor network. The system can be operated on thousands of devices when the packet delay maintained in a low level.
绿色屋顶的研究在城市美化和提高生态效益方面具有重要意义。根据之前的研究,植物对PM2.5的吸收有显著的影响。因此,可以考虑适当的种植设计或一些特定的植物组合作为解决城市细颗粒物(PM2.5)的解决方案。本文介绍了一种基于原型风洞的无线传感器网络(WSN)系统的开发工作,并将其用于绿色屋顶的仿真。该系统处理多个数据采集过程,同时获取PM2.5浓度、风速、温度和相对湿度并存储在数据库中。此外,用户可以实时定义他们的命令细节,通过网站上的GUI控制传感器的高度。实验、仿真和测量结果验证了风洞模块的有效性和传感器网络的可靠性。该系统可以在数千台设备上运行,且数据包延迟保持在较低的水平。
{"title":"Demo Abstract: Smart City: A Real-Time Environmental Monitoring System on Green Roof","authors":"Zhihe Zhao, Jiaheng Wang, Chenxu Fu, Dawei Liu, Bailiang Li","doi":"10.1109/IoTDI.2018.00049","DOIUrl":"https://doi.org/10.1109/IoTDI.2018.00049","url":null,"abstract":"The research on the green roof is of great importance in the field of urban beautification and improving ecological effect. According to the previous research, plants have shown a significant impact on the absorption of PM2.5. Therefore, it is justified that the appropriate planting design or some particular combinations of plants can be considered as a solution, dealing with the urban fine particulate matter (PM2.5). This paper presented a work in progress on developing wireless sensor networks (WSN) system based on a prototype wind tunnel, which is used for the simulation of the green roof. Several data collection processes are handled by this system, where the concentration of PM2.5, wind speed, temperature & relative humidity are obtained and stored in the database simultaneously. Additionally, users are able to real-timely define their commands in details, controlling the sensor's height through a GUI on the website. Experimental and simulation results and measurements have verified the validity of the wind tunnel module as well as the reliability of the sensor network. The system can be operated on thousands of devices when the packet delay maintained in a low level.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126392226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Poster Abstract: Privacy in Blockchain-Enabled IoT Devices 摘要:支持区块链的物联网设备中的隐私
Arman Pouraghily, Md. Nazmul Islam, S. Kundu, T. Wolf
Over past two decades, the idea of Internet of Things has been adopted widely as a solution to many societal problems in different areas. These areas include but are not limited to healthcare, transportation, environment, etc. Low cost overhead of Internet connectivity feature has been the main contributing factor in the widespread use of such devices in building different IoT solutions. The original stovepipe architecture of IoT systems limits the possibility of sharing the hardware infrastructure of IoT solutions and therefore is the main barrier against novel solutions. In recent year, however, there have been efforts to come up with solutions for sharing the hardware infrastructure and therefore pave the way for innovative solutions by amortizing the capital cost of setting up the hardware. In this work, we propose an architectural guideline for blockchain enabled IoT devices which facilitates sharing them between multiple blockchain ecosystems and at the same time, ensures the exclusive access to them seamlessly through blockchain smart contracts.
在过去的二十年里,物联网的概念被广泛采用,作为不同领域许多社会问题的解决方案。这些领域包括但不限于医疗保健、交通、环境等。互联网连接功能的低成本开销一直是在构建不同物联网解决方案中广泛使用此类设备的主要因素。物联网系统原有的烟囱式架构限制了共享物联网解决方案硬件基础设施的可能性,因此是阻碍新解决方案的主要障碍。然而,近年来,人们一直在努力提出共享硬件基础设施的解决方案,从而通过分摊设置硬件的资本成本为创新解决方案铺平道路。在这项工作中,我们为支持区块链的物联网设备提出了一个架构指南,该指南有助于在多个区块链生态系统之间共享它们,同时确保通过区块链智能合约无缝地独家访问它们。
{"title":"Poster Abstract: Privacy in Blockchain-Enabled IoT Devices","authors":"Arman Pouraghily, Md. Nazmul Islam, S. Kundu, T. Wolf","doi":"10.1109/IoTDI.2018.00045","DOIUrl":"https://doi.org/10.1109/IoTDI.2018.00045","url":null,"abstract":"Over past two decades, the idea of Internet of Things has been adopted widely as a solution to many societal problems in different areas. These areas include but are not limited to healthcare, transportation, environment, etc. Low cost overhead of Internet connectivity feature has been the main contributing factor in the widespread use of such devices in building different IoT solutions. The original stovepipe architecture of IoT systems limits the possibility of sharing the hardware infrastructure of IoT solutions and therefore is the main barrier against novel solutions. In recent year, however, there have been efforts to come up with solutions for sharing the hardware infrastructure and therefore pave the way for innovative solutions by amortizing the capital cost of setting up the hardware. In this work, we propose an architectural guideline for blockchain enabled IoT devices which facilitates sharing them between multiple blockchain ecosystems and at the same time, ensures the exclusive access to them seamlessly through blockchain smart contracts.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125925052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Don't Talk Unless I Say So! Securing the Internet of Things with Default-Off Networking 除非我说,否则不要说话!使用默认关闭网络保护物联网
James Hong, A. Levy, Laurynas Riliskis, P. Levis
The Internet of Things (IoT) is changing the way we interact with everyday objects. "Smart" devices will reduce energy use, keep our homes safe, and improve our health. However, as recent attacks have shown, these devices also create tremendous security vulnerabilities in our computing networks. Securing all of these devices is a daunting task. In this paper, we argue that IoT device communications should be default-off and desired network communications must be explicitly enabled. Unlike traditional networked applications or devices like a web browser or PC, IoT applications and devices serve narrowly defined purposes and do not require access to all services in the network. Our proposal, Bark, a policy language and runtime for specifying and enforcing minimal access permissions in IoT networks, exploits this fact. Bark phrases access control policies in terms of natural questions (who, what, where, when, and how) and transforms them into transparently enforceable rules for IoT application protocols. Bark can express detailed rules such as "Let the lights see the luminosity of the bedroom sensor at any time" and "Let a device at my front door, if I approve it, unlock my smart lock for 30 seconds" in a way that is presentable and explainable to users. We implement Bark for Wi-Fi/IP and Bluetooth Low Energy (BLE) networks and evaluate its efficacy on several example applications and attacks.
物联网(IoT)正在改变我们与日常物品互动的方式。“智能”设备将减少能源消耗,保证我们的家庭安全,改善我们的健康。然而,正如最近的攻击所显示的那样,这些设备也在我们的计算网络中造成了巨大的安全漏洞。保护所有这些设备是一项艰巨的任务。在本文中,我们认为物联网设备通信应该默认关闭,所需的网络通信必须明确启用。与传统的网络应用程序或设备(如web浏览器或PC)不同,物联网应用程序和设备服务于狭义定义的目的,不需要访问网络中的所有服务。我们的提案Bark是一种用于在物联网网络中指定和执行最小访问权限的策略语言和运行时,它利用了这一事实。Bark用自然问题(谁、什么、何地、何时、如何)来表达访问控制策略,并将其转换为物联网应用协议的透明可执行规则。Bark可以表达详细的规则,如“让灯随时看到卧室传感器的亮度”和“如果我同意,让一个设备在我的前门解锁我的智能锁30秒”,以一种可展示且可解释的方式向用户表达。我们在Wi-Fi/IP和蓝牙低功耗(BLE)网络中实现了Bark,并在几个示例应用和攻击中评估了它的有效性。
{"title":"Don't Talk Unless I Say So! Securing the Internet of Things with Default-Off Networking","authors":"James Hong, A. Levy, Laurynas Riliskis, P. Levis","doi":"10.1109/IoTDI.2018.00021","DOIUrl":"https://doi.org/10.1109/IoTDI.2018.00021","url":null,"abstract":"The Internet of Things (IoT) is changing the way we interact with everyday objects. \"Smart\" devices will reduce energy use, keep our homes safe, and improve our health. However, as recent attacks have shown, these devices also create tremendous security vulnerabilities in our computing networks. Securing all of these devices is a daunting task. In this paper, we argue that IoT device communications should be default-off and desired network communications must be explicitly enabled. Unlike traditional networked applications or devices like a web browser or PC, IoT applications and devices serve narrowly defined purposes and do not require access to all services in the network. Our proposal, Bark, a policy language and runtime for specifying and enforcing minimal access permissions in IoT networks, exploits this fact. Bark phrases access control policies in terms of natural questions (who, what, where, when, and how) and transforms them into transparently enforceable rules for IoT application protocols. Bark can express detailed rules such as \"Let the lights see the luminosity of the bedroom sensor at any time\" and \"Let a device at my front door, if I approve it, unlock my smart lock for 30 seconds\" in a way that is presentable and explainable to users. We implement Bark for Wi-Fi/IP and Bluetooth Low Energy (BLE) networks and evaluate its efficacy on several example applications and attacks.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126017826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
SEHS: Simultaneous Energy Harvesting and Sensing Using Piezoelectric Energy Harvester 基于压电能量采集器的同步能量采集与传感
Dong Ma, Guohao Lan, Weitao Xu, Mahbub Hassan, Wen Hu
Piezoelectric energy harvesting (PEH), which converts ambient motion, stress, and vibrations into usable electricity, may help combat battery issues in a growing number of industrial and wearable Internet of things (IoTs). Recently, many works have convincingly demonstrated that PEH can also act as a self-powered sensor for detecting a wide range of machine and human contexts. These developments suggest that the same PEH hardware could be potentially used for simultaneous energy harvesting and sensing (SEHS), offering a new design space for low cost and low power IoT devices. Unfortunately, realization of SEHS is challenging as the energy harvesting process distorts the sensing signal. To achieve high quality sensing from PEH, the state-of-the-art uses separate PEHs for sensing and energy harvesting, which increases system complexity, form factor, and cost. In this paper, we propose a novel SEHS architecture, which combines energy harvesting and sensing in the same piece of PEH, and minimizes distortion in the sensing signal by applying a special filtering algorithm. We prototype the SEHS concept in the form factor of a shoe, and evaluate its energy harvesting as well as sensing performance with 20 subjects using gait recognition as a case study. We demonstrate that the SEHS prototype harvests up to 127% more energy and detects human gait with 8% higher accuracy while consuming 35% less power compared to the state-of-the-art.
压电能量收集(PEH)将环境运动、应力和振动转化为可用的电力,可能有助于解决越来越多的工业和可穿戴物联网(iot)中的电池问题。最近,许多研究令人信服地证明,PEH也可以作为一种自供电传感器,用于检测广泛的机器和人类环境。这些发展表明,相同的PEH硬件可以潜在地用于同步能量收集和传感(SEHS),为低成本和低功耗物联网设备提供了新的设计空间。不幸的是,由于能量收集过程会扭曲传感信号,因此实现SEHS具有挑战性。为了从PEH中获得高质量的传感,最先进的PEH使用单独的PEH进行传感和能量收集,这增加了系统的复杂性、外形因素和成本。在本文中,我们提出了一种新的SEHS架构,该架构将能量收集和传感结合在同一块PEH中,并通过应用特殊的滤波算法来最小化传感信号的失真。我们将SEHS概念原型化在鞋子的外形上,并以20名受试者为例,以步态识别为例,评估其能量收集和传感性能。我们证明,与最先进的产品相比,SEHS原型可获得高达127%的能量,并以8%的准确率检测人类步态,同时消耗的功率减少35%。
{"title":"SEHS: Simultaneous Energy Harvesting and Sensing Using Piezoelectric Energy Harvester","authors":"Dong Ma, Guohao Lan, Weitao Xu, Mahbub Hassan, Wen Hu","doi":"10.1109/IoTDI.2018.00028","DOIUrl":"https://doi.org/10.1109/IoTDI.2018.00028","url":null,"abstract":"Piezoelectric energy harvesting (PEH), which converts ambient motion, stress, and vibrations into usable electricity, may help combat battery issues in a growing number of industrial and wearable Internet of things (IoTs). Recently, many works have convincingly demonstrated that PEH can also act as a self-powered sensor for detecting a wide range of machine and human contexts. These developments suggest that the same PEH hardware could be potentially used for simultaneous energy harvesting and sensing (SEHS), offering a new design space for low cost and low power IoT devices. Unfortunately, realization of SEHS is challenging as the energy harvesting process distorts the sensing signal. To achieve high quality sensing from PEH, the state-of-the-art uses separate PEHs for sensing and energy harvesting, which increases system complexity, form factor, and cost. In this paper, we propose a novel SEHS architecture, which combines energy harvesting and sensing in the same piece of PEH, and minimizes distortion in the sensing signal by applying a special filtering algorithm. We prototype the SEHS concept in the form factor of a shoe, and evaluate its energy harvesting as well as sensing performance with 20 subjects using gait recognition as a case study. We demonstrate that the SEHS prototype harvests up to 127% more energy and detects human gait with 8% higher accuracy while consuming 35% less power compared to the state-of-the-art.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133888032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Poster Abstract: DeepRT: A Predictable Deep Learning Inference Framework for IoT Devices 摘要:DeepRT:物联网设备的可预测深度学习推理框架
Woochul Kang, Daeyeon Kim
Recently, deep learning is emerging as a state-of-the-art approach in delivering robust and highly accurate inference in many domains, including Internet-of-Things (IoT). Deep learning is already changing the way computers embedded in IoT devices to make intelligent decisions using sensor feeds in the real world. There have been significant efforts to develop light-weight and highly efficient deep learning inference mechanisms for resource-constrained mobile and IoT devices. Some approaches propose a hardware-based accelerator, and some approaches propose to reduce the amount of computation of deep learning models using various model compression techniques. Even though these efforts have demonstrated significant gains in performance and efficiency, they are not aware of the Quality-of-Service (QoS) requirements of various IoT applications, and, hence manifest unpredictable 'best-effort' performance in terms of inference latency, power consumption, resource usage, etc. In IoT devices with temporal constraints, such unpredictability might result in undesirable effects such as compromising safety. In this work, we present a novel deep learning inference runtime called, DeepRT. Unlike previous inference accelerators, DeepRT focuses on supporting predictable inference performance both temporally and spatially.
最近,深度学习正在成为一种最先进的方法,在包括物联网(IoT)在内的许多领域提供强大且高度准确的推理。深度学习已经改变了嵌入物联网设备的计算机在现实世界中使用传感器馈送做出智能决策的方式。为资源受限的移动和物联网设备开发轻量级和高效的深度学习推理机制已经付出了巨大的努力。一些方法提出了基于硬件的加速器,一些方法提出了使用各种模型压缩技术来减少深度学习模型的计算量。尽管这些努力在性能和效率方面取得了显著的进步,但他们并不了解各种物联网应用的服务质量(QoS)要求,因此在推理延迟、功耗、资源使用等方面表现出不可预测的“尽力而为”性能。在具有时间限制的物联网设备中,这种不可预测性可能会导致不良影响,例如损害安全性。在这项工作中,我们提出了一种新的深度学习推理运行时,称为DeepRT。与以前的推理加速器不同,DeepRT专注于在时间和空间上支持可预测的推理性能。
{"title":"Poster Abstract: DeepRT: A Predictable Deep Learning Inference Framework for IoT Devices","authors":"Woochul Kang, Daeyeon Kim","doi":"10.1109/IoTDI.2018.00039","DOIUrl":"https://doi.org/10.1109/IoTDI.2018.00039","url":null,"abstract":"Recently, deep learning is emerging as a state-of-the-art approach in delivering robust and highly accurate inference in many domains, including Internet-of-Things (IoT). Deep learning is already changing the way computers embedded in IoT devices to make intelligent decisions using sensor feeds in the real world. There have been significant efforts to develop light-weight and highly efficient deep learning inference mechanisms for resource-constrained mobile and IoT devices. Some approaches propose a hardware-based accelerator, and some approaches propose to reduce the amount of computation of deep learning models using various model compression techniques. Even though these efforts have demonstrated significant gains in performance and efficiency, they are not aware of the Quality-of-Service (QoS) requirements of various IoT applications, and, hence manifest unpredictable 'best-effort' performance in terms of inference latency, power consumption, resource usage, etc. In IoT devices with temporal constraints, such unpredictability might result in undesirable effects such as compromising safety. In this work, we present a novel deep learning inference runtime called, DeepRT. Unlike previous inference accelerators, DeepRT focuses on supporting predictable inference performance both temporally and spatially.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114465545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Poster Abstract: Safety Analysis for UAV Networks 摘要:无人机网络安全分析
A. Jakaria, M. Rahman
The recent trend of collaborative operations of a network of Unmanned Aerial Vehicles (UAVs) to achieve a common objective has attracted the researchers, as well as commercial vendors. It has revolutionized the means of data collection to maximize mission performances. However, the collaborative UAVs need to be safe from cyberattacks to prevent catastrophe. They need to be able to collaborate with each other to avoid potential failure of a mission. As these smart devices are always targets of adversaries, they need to maintain safe communication with each other while avoiding fuel outage and mid-air collisions, as well as reducing the possibilities of being hacked. In this work, we present the idea of a formal verification tool that takes different UAV parameters, safety requirements, and resource constraints as input and verifies the network's safety.
最近,为了实现共同目标,无人机网络协同作战的趋势吸引了研究人员和商业供应商。它彻底改变了数据收集的方式,以最大限度地提高任务性能。然而,协作无人机需要安全,以防止网络攻击,以防止灾难。他们需要能够相互协作,以避免任务的潜在失败。由于这些智能设备始终是对手的目标,它们需要保持彼此之间的安全通信,同时避免燃料中断和空中碰撞,并减少被黑客攻击的可能性。在这项工作中,我们提出了一种形式化验证工具的想法,该工具将不同的无人机参数、安全要求和资源约束作为输入,并验证网络的安全性。
{"title":"Poster Abstract: Safety Analysis for UAV Networks","authors":"A. Jakaria, M. Rahman","doi":"10.1109/IoTDI.2018.00046","DOIUrl":"https://doi.org/10.1109/IoTDI.2018.00046","url":null,"abstract":"The recent trend of collaborative operations of a network of Unmanned Aerial Vehicles (UAVs) to achieve a common objective has attracted the researchers, as well as commercial vendors. It has revolutionized the means of data collection to maximize mission performances. However, the collaborative UAVs need to be safe from cyberattacks to prevent catastrophe. They need to be able to collaborate with each other to avoid potential failure of a mission. As these smart devices are always targets of adversaries, they need to maintain safe communication with each other while avoiding fuel outage and mid-air collisions, as well as reducing the possibilities of being hacked. In this work, we present the idea of a formal verification tool that takes different UAV parameters, safety requirements, and resource constraints as input and verifies the network's safety.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134589357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Demo Abstract: Enabling Inter-SNOW Concurrent P2P Communications 摘要:实现snow间并发P2P通信
Mahbubur Rahman, Dali Ismail, Abusayeed Saifullah
SNOW (Sensor Network Over White Spaces) has evolved as an enabling technology for Internet-of-Things (IoT) applications. To meet the future IoT demands, multiple SNOW networks will require to interact with each other, and thus demanding a scalable seamless integration between them. In this demonstration, we showcase seamless concurrent peer-to-peer (P2P) communications between multiple SNOW networks.
SNOW(白色空间传感器网络)已经发展成为物联网(IoT)应用的使能技术。为了满足未来的物联网需求,多个SNOW网络将需要相互交互,因此需要它们之间的可扩展无缝集成。在这个演示中,我们展示了多个SNOW网络之间无缝并发的点对点(P2P)通信。
{"title":"Demo Abstract: Enabling Inter-SNOW Concurrent P2P Communications","authors":"Mahbubur Rahman, Dali Ismail, Abusayeed Saifullah","doi":"10.1109/IoTDI.2018.00054","DOIUrl":"https://doi.org/10.1109/IoTDI.2018.00054","url":null,"abstract":"SNOW (Sensor Network Over White Spaces) has evolved as an enabling technology for Internet-of-Things (IoT) applications. To meet the future IoT demands, multiple SNOW networks will require to interact with each other, and thus demanding a scalable seamless integration between them. In this demonstration, we showcase seamless concurrent peer-to-peer (P2P) communications between multiple SNOW networks.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116872029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Poster Abstract: Characterizing Computational Workloads in UAV Applications 摘要:无人机应用中计算工作量的表征
Jayson G. Boubin, Shiqi Zhang, Venkata Mandadapu, Christopher Stewart
Unmanned aerial vehicles (UAV) enable novel but demanding computational workloads that exceed processing capacity of their onboard resources. Mobile and edge devices can support demanding workloads, but they increase network communication and power usage. These resource constraints block potentially transformative UAV applications that execute too slowly or use too much power. This poster presents early efforts to characterize computational demands of emerging UAV applications. We are building a selfie-drone benchmark. Our benchmark will capture processing metrics, e.g., CPU usage, cache misses, power usage, etc. It will also enable characterization across a wide range of local and edge setups. Our benchmark uses a micro services design, making it easy to move workload execution across multiple contexts. Early results show that our benchmark functions well, i.e., accurately detects faces and safely uses flight controls. Further, edge devices matter. A smart phone uses 4X less power than a laptop when executing our benchmark.
无人机(UAV)能够实现新颖但要求高的计算工作负载,超出其机载资源的处理能力。移动和边缘设备可以支持苛刻的工作负载,但它们增加了网络通信和电力使用。这些资源限制阻碍了执行太慢或使用太多功率的潜在变革性无人机应用。这张海报展示了新兴无人机应用的计算需求特征的早期努力。我们正在建立一个自拍无人机基准。我们的基准测试将捕获处理指标,例如,CPU使用情况、缓存丢失、电源使用情况等。它还将支持在广泛的本地和边缘设置中进行表征。我们的基准测试使用微服务设计,使得跨多个上下文移动工作负载执行变得容易。早期的结果表明,我们的基准功能良好,即准确地检测人脸并安全地使用飞行控制。此外,边缘设备也很重要。在执行我们的基准测试时,智能手机使用的电量比笔记本电脑少4倍。
{"title":"Poster Abstract: Characterizing Computational Workloads in UAV Applications","authors":"Jayson G. Boubin, Shiqi Zhang, Venkata Mandadapu, Christopher Stewart","doi":"10.1109/IoTDI.2018.00037","DOIUrl":"https://doi.org/10.1109/IoTDI.2018.00037","url":null,"abstract":"Unmanned aerial vehicles (UAV) enable novel but demanding computational workloads that exceed processing capacity of their onboard resources. Mobile and edge devices can support demanding workloads, but they increase network communication and power usage. These resource constraints block potentially transformative UAV applications that execute too slowly or use too much power. This poster presents early efforts to characterize computational demands of emerging UAV applications. We are building a selfie-drone benchmark. Our benchmark will capture processing metrics, e.g., CPU usage, cache misses, power usage, etc. It will also enable characterization across a wide range of local and edge setups. Our benchmark uses a micro services design, making it easy to move workload execution across multiple contexts. Early results show that our benchmark functions well, i.e., accurately detects faces and safely uses flight controls. Further, edge devices matter. A smart phone uses 4X less power than a laptop when executing our benchmark.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"287 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113993838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Poster Abstract: Chained of Things: A Secure and Dependable Design of Autonomous Vehicle Services 摘要:物链:自动驾驶汽车服务的安全可靠设计
Md. Golam Moula Mehedi Hasan, Amarjit Datta, M. Rahman
The rise of Autonomous Vehicles (AVs) indicates that AVs are soon going to be the juggernaut in car industry. The state-of-the-art technology used by the AVs makes ride-sharing a prominent and flexible way for transportation. In this case, the customers (i.e., who are sharing the AV) and the AV all should come into the picture to verify each other. However, When a user requests for a ride share or rent, the responding AV/IoT device does not have the sufficient capability to store, process, or verify each other. In the existing security solutions, every AV/IoT device typically needs to rely on a trusted third party, which invokes another trust issue. If the trusted third party is rogue or loses credibility, the whole system will collapse. This research aims at exploiting Blockchain to provide a secure and reliable way to communicate among devices with trusts. We implement our proposed Blockchain-based solution and demonstrate the solution on a synthetic case study.
自动驾驶汽车(AVs)的兴起预示着自动驾驶汽车将很快成为汽车行业的主宰。自动驾驶汽车所使用的最先进技术使拼车成为一种突出而灵活的交通方式。在这种情况下,客户(即共享AV的人)和AV都应该进入画面以相互验证。然而,当用户请求拼车或租车时,响应的AV/IoT设备没有足够的能力来存储、处理或相互验证。在现有的安全解决方案中,每个AV/IoT设备通常需要依赖于受信任的第三方,这引发了另一个信任问题。如果受信任的第三方是流氓或失去信誉,整个系统将崩溃。本研究旨在利用区块链为具有信任的设备之间提供一种安全可靠的通信方式。我们实现了我们提出的基于区块链的解决方案,并在一个综合案例研究中演示了该解决方案。
{"title":"Poster Abstract: Chained of Things: A Secure and Dependable Design of Autonomous Vehicle Services","authors":"Md. Golam Moula Mehedi Hasan, Amarjit Datta, M. Rahman","doi":"10.1109/IoTDI.2018.00048","DOIUrl":"https://doi.org/10.1109/IoTDI.2018.00048","url":null,"abstract":"The rise of Autonomous Vehicles (AVs) indicates that AVs are soon going to be the juggernaut in car industry. The state-of-the-art technology used by the AVs makes ride-sharing a prominent and flexible way for transportation. In this case, the customers (i.e., who are sharing the AV) and the AV all should come into the picture to verify each other. However, When a user requests for a ride share or rent, the responding AV/IoT device does not have the sufficient capability to store, process, or verify each other. In the existing security solutions, every AV/IoT device typically needs to rely on a trusted third party, which invokes another trust issue. If the trusted third party is rogue or loses credibility, the whole system will collapse. This research aims at exploiting Blockchain to provide a secure and reliable way to communicate among devices with trusts. We implement our proposed Blockchain-based solution and demonstrate the solution on a synthetic case study.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131107546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1