首页 > 最新文献

Proceedings of the 12th International Conference on the Internet of Things最新文献

英文 中文
Ensuring Situation-Aware Privacy for Connected Vehicles 确保联网车辆的态势感知隐私
Pub Date : 2022-11-07 DOI: 10.1145/3567445.3569163
Yunxuan Li, Pascal Hirmer, Christoph Stach, B. Mitschang
As technology advances in new sensors and software, modern vehicles become increasingly intelligent. To date, connected vehicles can collect, process, and share data with other entities in connected vehicle environments. However, in terms of data collection and exchange, privacy becomes a central issue. It is challenging to preserve privacy in connected vehicle environments when the privacy demands of drivers could change from situation to situation even for the same service. In this paper, we analyze the requirements for a privacy-preserving system in connected vehicle environments with a focus on situation-awareness and safety aspects. Based on the analysis, we propose a novel situation-aware privacy-preserving framework for connected vehicles. Our framework supports individual privacy protections for specific end-point services and situation-aware privacy protections for different circumstances.
随着新型传感器和软件技术的进步,现代车辆变得越来越智能。迄今为止,联网车辆可以收集、处理数据,并与联网车辆环境中的其他实体共享数据。然而,在数据收集和交换方面,隐私成为一个核心问题。即使是同一项服务,驾驶员的隐私需求也会随着情况的变化而变化,因此在互联汽车环境中保护隐私是一项挑战。本文从态势感知和安全两个方面分析了互联汽车环境下隐私保护系统的需求。在此基础上,提出了一种新的联网车辆态势感知隐私保护框架。我们的框架支持针对特定端点服务的个人隐私保护,以及针对不同情况的情境感知隐私保护。
{"title":"Ensuring Situation-Aware Privacy for Connected Vehicles","authors":"Yunxuan Li, Pascal Hirmer, Christoph Stach, B. Mitschang","doi":"10.1145/3567445.3569163","DOIUrl":"https://doi.org/10.1145/3567445.3569163","url":null,"abstract":"As technology advances in new sensors and software, modern vehicles become increasingly intelligent. To date, connected vehicles can collect, process, and share data with other entities in connected vehicle environments. However, in terms of data collection and exchange, privacy becomes a central issue. It is challenging to preserve privacy in connected vehicle environments when the privacy demands of drivers could change from situation to situation even for the same service. In this paper, we analyze the requirements for a privacy-preserving system in connected vehicle environments with a focus on situation-awareness and safety aspects. Based on the analysis, we propose a novel situation-aware privacy-preserving framework for connected vehicles. Our framework supports individual privacy protections for specific end-point services and situation-aware privacy protections for different circumstances.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"281 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127476357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Accelerating Command Injection Vulnerability Discovery in Embedded Firmware with Static Backtracking Analysis 利用静态回溯分析加速嵌入式固件命令注入漏洞发现
Pub Date : 2022-11-07 DOI: 10.1145/3567445.3567458
Xiaokang Yin, Ruijie Cai, Yizheng Zhang, Lukai Li, Qichao Yang, Shengli Liu
Command injection vulnerability is a severe threat to the embedded device. Most methods detect command injection vulnerability with taint analysis and symbolic execution and achieve promising results. However, they waste too much time analyzing secure sink call-sites, resulting in less efficient vulnerability detection. To tackle the above problem, we propose a novel sink call-site classification method named CINDY to accelerate the command injection vulnerability discovery in embedded firmware with static backtracking analysis. CINDY first performs sink call-sites detection in the binary executables and constructs the data flow for function call parameters. Then, CINDY analyzes whether the parameters passed to sink functions are derived from constant string or not and labels them “secure" or “risky". According to the labels, CINDY classifies the sink call-sites into risky and secure sink call-sites. Finally, CINDY performs taint analysis with symbolic execution to check whether a risky sink call-site is vulnerable. To demonstrate the efficacy of CINDY, we compare CINDY with the state-of-the-art method SaTC, using the dataset published by SaTC. Compared with SaTC, CINDY can filter out more of the secure sink call-sites, with a 35% decrease, and the efficiency is improved by 17% than SaTC.
命令注入漏洞是对嵌入式设备的严重威胁。大多数方法通过污染分析和符号执行来检测命令注入漏洞,并取得了令人满意的结果。然而,它们浪费了太多的时间来分析安全接收器调用站点,导致漏洞检测效率较低。针对上述问题,我们提出了一种新的sink - call-site分类方法CINDY,通过静态回溯分析加速嵌入式固件命令注入漏洞的发现。CINDY首先在二进制可执行文件中执行接收调用位置检测,并为函数调用参数构造数据流。然后,CINDY分析传递给sink函数的参数是否来自常量字符串,并将其标记为“安全”或“危险”。根据标签,CINDY将汇聚呼叫站点分为风险和安全两类。最后,CINDY使用符号执行进行污染分析,以检查有风险的接收调用站点是否易受攻击。为了证明CINDY的有效性,我们使用SaTC发布的数据集将CINDY与最先进的方法SaTC进行了比较。与SaTC相比,CINDY可以过滤掉更多的安全汇聚呼叫站点,比SaTC减少了35%,效率提高了17%。
{"title":"Accelerating Command Injection Vulnerability Discovery in Embedded Firmware with Static Backtracking Analysis","authors":"Xiaokang Yin, Ruijie Cai, Yizheng Zhang, Lukai Li, Qichao Yang, Shengli Liu","doi":"10.1145/3567445.3567458","DOIUrl":"https://doi.org/10.1145/3567445.3567458","url":null,"abstract":"Command injection vulnerability is a severe threat to the embedded device. Most methods detect command injection vulnerability with taint analysis and symbolic execution and achieve promising results. However, they waste too much time analyzing secure sink call-sites, resulting in less efficient vulnerability detection. To tackle the above problem, we propose a novel sink call-site classification method named CINDY to accelerate the command injection vulnerability discovery in embedded firmware with static backtracking analysis. CINDY first performs sink call-sites detection in the binary executables and constructs the data flow for function call parameters. Then, CINDY analyzes whether the parameters passed to sink functions are derived from constant string or not and labels them “secure\" or “risky\". According to the labels, CINDY classifies the sink call-sites into risky and secure sink call-sites. Finally, CINDY performs taint analysis with symbolic execution to check whether a risky sink call-site is vulnerable. To demonstrate the efficacy of CINDY, we compare CINDY with the state-of-the-art method SaTC, using the dataset published by SaTC. Compared with SaTC, CINDY can filter out more of the secure sink call-sites, with a 35% decrease, and the efficiency is improved by 17% than SaTC.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125517939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Future scoping of truly Human-Centric IoT and Intelligent Networks: A Foresight Approach 真正以人为中心的物联网和智能网络的未来范围:一种前瞻性方法
Pub Date : 2022-11-07 DOI: 10.1145/3567445.3567452
K. Ystgaard, K. De Moor
As IoT and network technology become increasingly pervasive, intelligent, and thus more powerful, it will be crucially important for future, sustainable and Human-Centric IoT scenarios that humans and humanity stay in control and can exercise meaningful agency. However, despite a growing understanding that this is of crucial importance, there is no clear shared vision between the multiple stakeholders of what is preferable and how to get there. This paper therefore reports on the first intelligence gathering that is part of a larger foresight study in this respect. More concretely, we report on a horizon scanning study and expert interviews (N=9) conducted in Norway, aimed at identifying emerging issues, trends and developments that may affect future scenarios related to human-centric intelligent networks and IoT environments.
随着物联网和网络技术变得越来越普及、智能和强大,对于未来、可持续和以人为中心的物联网场景来说,人类和人类保持控制并能够行使有意义的代理将至关重要。然而,尽管越来越多的人认识到这一点至关重要,但多方利益相关者对于什么是更可取的以及如何实现这一目标并没有明确的共同愿景。因此,本文报告了第一次情报收集,这是这方面更大的前瞻性研究的一部分。更具体地说,我们报告了在挪威进行的一项水平扫描研究和专家访谈(N=9),旨在确定可能影响与以人为中心的智能网络和物联网环境相关的未来场景的新问题、趋势和发展。
{"title":"Future scoping of truly Human-Centric IoT and Intelligent Networks: A Foresight Approach","authors":"K. Ystgaard, K. De Moor","doi":"10.1145/3567445.3567452","DOIUrl":"https://doi.org/10.1145/3567445.3567452","url":null,"abstract":"As IoT and network technology become increasingly pervasive, intelligent, and thus more powerful, it will be crucially important for future, sustainable and Human-Centric IoT scenarios that humans and humanity stay in control and can exercise meaningful agency. However, despite a growing understanding that this is of crucial importance, there is no clear shared vision between the multiple stakeholders of what is preferable and how to get there. This paper therefore reports on the first intelligence gathering that is part of a larger foresight study in this respect. More concretely, we report on a horizon scanning study and expert interviews (N=9) conducted in Norway, aimed at identifying emerging issues, trends and developments that may affect future scenarios related to human-centric intelligent networks and IoT environments.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133195242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security and Privacy Concerns of Pet Tech Users 宠物科技用户的安全和隐私问题
Pub Date : 2022-11-07 DOI: 10.1145/3567445.3571102
Scott Harper, M. Mehrnezhad, Matthew Leach
Abstract: An expanding variety of technologies are being offered to aid with the care of pets. These pet technologies (pet tech) are a rapidly growing industry, introducing new security, privacy, and safety risks to their users. Despite these risks, the security and privacy evaluation of these devices, and their users’ concerns regarding these issues, remain an under-researched field. In this work, we perform a user study of 593 participants across 3 different countries (UK, USA, Germany) to gain an understanding of what technologies are in use, incidents that have occurred or participants believe may occur, and the methods used by participants to protect their online security and privacy and whether they apply these to their pet tech. Our findings highlight that participants do believe that a range of attacks may occur targeting their pet tech. Despite this, they take few precautions to protect themselves and their pets from the possible risks and harms of these technologies.
摘要:越来越多的技术被用于帮助照顾宠物。这些宠物技术(pet technology)是一个快速发展的行业,给用户带来了新的安全、隐私和安全风险。尽管存在这些风险,但这些设备的安全和隐私评估,以及用户对这些问题的担忧,仍然是一个研究不足的领域。在这项工作中,我们对3个不同国家(英国、美国、德国)的593名参与者进行了一项用户研究,以了解正在使用的技术、已经发生的事件或参与者认为可能发生的事件,以及参与者用于保护其在线安全和隐私的方法,以及他们是否将这些方法应用于他们的宠物技术。我们的研究结果强调,参与者确实认为针对他们的宠物技术可能会发生一系列攻击。他们很少采取预防措施来保护自己和宠物免受这些技术可能带来的风险和伤害。
{"title":"Security and Privacy Concerns of Pet Tech Users","authors":"Scott Harper, M. Mehrnezhad, Matthew Leach","doi":"10.1145/3567445.3571102","DOIUrl":"https://doi.org/10.1145/3567445.3571102","url":null,"abstract":"Abstract: An expanding variety of technologies are being offered to aid with the care of pets. These pet technologies (pet tech) are a rapidly growing industry, introducing new security, privacy, and safety risks to their users. Despite these risks, the security and privacy evaluation of these devices, and their users’ concerns regarding these issues, remain an under-researched field. In this work, we perform a user study of 593 participants across 3 different countries (UK, USA, Germany) to gain an understanding of what technologies are in use, incidents that have occurred or participants believe may occur, and the methods used by participants to protect their online security and privacy and whether they apply these to their pet tech. Our findings highlight that participants do believe that a range of attacks may occur targeting their pet tech. Despite this, they take few precautions to protect themselves and their pets from the possible risks and harms of these technologies.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129429726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Industrial Control from the Edge-Cloud: A Structural Analysis of Adoption Challenges According to Industrial Experts 从边缘云走向工业控制:工业专家对采用挑战的结构分析
Pub Date : 2022-11-07 DOI: 10.1145/3567445.3567450
Marco Giani, Nelly Frank, A. Verl
The migration of industrial controls to an edge-cloud hosted on factory premises can reduce operation costs and increase the interoperability and flexibility of industrial machines. However, the adoption of Industrial Internet of Things (IIoT) technologies to realize an industrial edge-cloud for factory automation is likely to lead to a number of challenges that have not yet been investigated. Based on an expert interviews study, this paper provides two main contributions: (1) the identification of 11 technology-, engineering-, organization-, and strategy-related challenges that, according to industrial experts, will hinder the adoption of edge-cloud control (ECC) in future factories, (2) the derivation of a structural model showing how challenges are interlinked. The results illustrate the dependency between profitability and both engineering and operation of an ECC system, suggesting the importance of improving the usability of ECC for automation experts with limited IT know-how, for instance through the reorganization of departments and the standardization of integration concepts for ECC in factories.
将工业控制迁移到工厂托管的边缘云可以降低运营成本,提高工业机器的互操作性和灵活性。然而,采用工业物联网(IIoT)技术实现工厂自动化的工业边缘云可能会带来许多尚未调查的挑战。基于专家访谈研究,本文提供了两个主要贡献:(1)确定了11个技术、工程、组织和战略相关的挑战,根据行业专家的说法,这些挑战将阻碍未来工厂采用边缘云控制(ECC);(2)推导了一个结构模型,展示了挑战是如何相互关联的。研究结果说明了盈利能力与ECC系统的工程和运行之间的依赖关系,表明了提高ECC可用性对于IT知识有限的自动化专家的重要性,例如通过部门重组和工厂ECC集成概念的标准化。
{"title":"Towards Industrial Control from the Edge-Cloud: A Structural Analysis of Adoption Challenges According to Industrial Experts","authors":"Marco Giani, Nelly Frank, A. Verl","doi":"10.1145/3567445.3567450","DOIUrl":"https://doi.org/10.1145/3567445.3567450","url":null,"abstract":"The migration of industrial controls to an edge-cloud hosted on factory premises can reduce operation costs and increase the interoperability and flexibility of industrial machines. However, the adoption of Industrial Internet of Things (IIoT) technologies to realize an industrial edge-cloud for factory automation is likely to lead to a number of challenges that have not yet been investigated. Based on an expert interviews study, this paper provides two main contributions: (1) the identification of 11 technology-, engineering-, organization-, and strategy-related challenges that, according to industrial experts, will hinder the adoption of edge-cloud control (ECC) in future factories, (2) the derivation of a structural model showing how challenges are interlinked. The results illustrate the dependency between profitability and both engineering and operation of an ECC system, suggesting the importance of improving the usability of ECC for automation experts with limited IT know-how, for instance through the reorganization of departments and the standardization of integration concepts for ECC in factories.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123259755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A modeling approach for integration and contextualization of simulation-based digital services in IIoT 工业物联网中基于仿真的数字服务集成和情境化的建模方法
Pub Date : 2022-11-07 DOI: 10.1145/3567445.3571109
M. Schleipen, V. Schubert, Samir Dzidic, Dimitri Penner, S. Spieckermann
In the context of the Industrial Internet of Things (IIoT) production plants and components are increasingly growing together with information technologies. This is often realized by means of digital twins. They collect data in real time and learn from this data; they control processes automatically or support human decisions; and they communicate and interact through the internet. This is more and more evolving to intercompany interactions based on digital services. In addition to data of isolated assets (e.g. production resources), new capabilities for standard-based data integration and orchestration are necessary to contextualize the interaction of multiple digital twins and services. This paper suggests an approach to use common standards in the industrial context such as AutomationML, FMI, and OPC UA as basis for integration and contextualization of simulation-based digital services on IIoT platforms.
在工业物联网(IIoT)的背景下,生产工厂和部件与信息技术一起日益增长。这通常是通过数字孪生来实现的。他们实时收集数据并从中学习;它们自动控制流程或支持人类决策;他们通过互联网进行交流和互动。这越来越演变为基于数字服务的公司间互动。除了孤立资产(例如生产资源)的数据之外,还需要基于标准的数据集成和编排的新功能,以便将多个数字孪生和服务的交互置于环境中。本文提出了一种在工业环境中使用通用标准的方法,如AutomationML、FMI和OPC UA,作为工业物联网平台上基于仿真的数字服务集成和情境化的基础。
{"title":"A modeling approach for integration and contextualization of simulation-based digital services in IIoT","authors":"M. Schleipen, V. Schubert, Samir Dzidic, Dimitri Penner, S. Spieckermann","doi":"10.1145/3567445.3571109","DOIUrl":"https://doi.org/10.1145/3567445.3571109","url":null,"abstract":"In the context of the Industrial Internet of Things (IIoT) production plants and components are increasingly growing together with information technologies. This is often realized by means of digital twins. They collect data in real time and learn from this data; they control processes automatically or support human decisions; and they communicate and interact through the internet. This is more and more evolving to intercompany interactions based on digital services. In addition to data of isolated assets (e.g. production resources), new capabilities for standard-based data integration and orchestration are necessary to contextualize the interaction of multiple digital twins and services. This paper suggests an approach to use common standards in the industrial context such as AutomationML, FMI, and OPC UA as basis for integration and contextualization of simulation-based digital services on IIoT platforms.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123060024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
I just wanted to track my steps! Blocking unwanted traffic of Fitbit devices 我只是想记录我的步数!阻止Fitbit设备的不必要流量
Pub Date : 2022-11-07 DOI: 10.1145/3567445.3567457
Andrei Kazlouski, Thomas Marchioro, E. Markatos
The recent advent of wearable fitness trackers has fueled concerns in regards to the privacy they provide. In particular, previous works have indicated that the associated fitness apps may contact unexpected Internet destinations. In this work we identify the third-party connections of the official mobile Fitbit application and its partners, and study whether they can be blocked without hindering the essential functionality of the devices. We show that disabling traffic to the domains contained in well-maintained blocklists does not prevent Fitbit trackers from correctly reporting activity data, including steps, workouts, duration and quality of sleep, etc. Moreover, we demonstrate that Fitbit activity data are correctly synchronized for 6 partner apps of Fitbit when utilizing the above blocking rules. Our results suggest that more than of the third parties for the Fitbit-associated apps are contained in credible domain-based blocklists. Furthermore, we find all studied app to contact between 1 and 20 non-required third parties. Finally, over of the blocked destinations are identified by the default installation of uBlock Origin – universally used content filter (adblocker). Unlike previous works on blocking unnecessary IoT communications, our methodology can be easily utilized by end-users.
最近出现的可穿戴健身追踪器引发了人们对其提供的隐私的担忧。特别是,之前的研究表明,相关的健身应用程序可能会联系到意想不到的互联网目的地。在这项工作中,我们识别官方移动Fitbit应用程序及其合作伙伴的第三方连接,并研究是否可以在不妨碍设备基本功能的情况下阻止它们。我们表明,禁用维护良好的封锁列表中包含的域的流量并不会阻止Fitbit追踪器正确报告活动数据,包括步数、锻炼、持续时间和睡眠质量等。此外,我们证明了在使用上述阻断规则时,Fitbit的6个伙伴应用程序的Fitbit活动数据是正确同步的。我们的研究结果表明,超过第三方的fitbit相关应用程序包含在可信的基于域名的封锁列表中。此外,我们发现所有研究的应用程序可以联系1到20个非必需的第三方。最后,通过默认安装的uBlock Origin -普遍使用的内容过滤器(adblocker)来识别被阻止的目的地。与之前阻止不必要的物联网通信的工作不同,我们的方法可以很容易地被最终用户使用。
{"title":"I just wanted to track my steps! Blocking unwanted traffic of Fitbit devices","authors":"Andrei Kazlouski, Thomas Marchioro, E. Markatos","doi":"10.1145/3567445.3567457","DOIUrl":"https://doi.org/10.1145/3567445.3567457","url":null,"abstract":"The recent advent of wearable fitness trackers has fueled concerns in regards to the privacy they provide. In particular, previous works have indicated that the associated fitness apps may contact unexpected Internet destinations. In this work we identify the third-party connections of the official mobile Fitbit application and its partners, and study whether they can be blocked without hindering the essential functionality of the devices. We show that disabling traffic to the domains contained in well-maintained blocklists does not prevent Fitbit trackers from correctly reporting activity data, including steps, workouts, duration and quality of sleep, etc. Moreover, we demonstrate that Fitbit activity data are correctly synchronized for 6 partner apps of Fitbit when utilizing the above blocking rules. Our results suggest that more than of the third parties for the Fitbit-associated apps are contained in credible domain-based blocklists. Furthermore, we find all studied app to contact between 1 and 20 non-required third parties. Finally, over of the blocked destinations are identified by the default installation of uBlock Origin – universally used content filter (adblocker). Unlike previous works on blocking unnecessary IoT communications, our methodology can be easily utilized by end-users.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122502917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An approach for Web of Things over Named Data Networking 一种基于命名数据网络的物联网方法
Pub Date : 2022-11-07 DOI: 10.1145/3567445.3571106
Junior Dongo
Information-Centric Networking (ICN) aims to be the next Internet architecture. It brings many features, such as network scalability and in-network caching, by moving the networking paradigm from the current host-centric to content-centric, where the resources are important, not their location. To benefit from the ICN property, IoT architecture needs to be adapted to comply with this new Internet architecture, especially the Web of Things (WoT). One dominant of these Content-Centric Networking (CCN) architectures is the Named Data Networking (NDN), which the American National Science Foundation has financed (NSF) in the scope of the project Future Internet Architecture (FIA). This document describes a process to design and implement a consumer compatible with the WoT, operating on NDN and capitalizing on its properties. The approach is centered on the definition of a Thing Description compatible with the network architecture, and how the interaction between the Thing and the consumer can be possible. The approach is validated using a domos use case in which a virtual thermostat is controlled.
信息中心网络(ICN)的目标是成为下一个Internet架构。通过将网络范例从当前的以主机为中心转移到以内容为中心,它带来了许多特性,例如网络可伸缩性和网络内缓存,其中资源是重要的,而不是它们的位置。为了从ICN属性中受益,物联网架构需要适应这种新的互联网架构,特别是物联网(WoT)。这些以内容为中心的网络(CCN)体系结构中占主导地位的是命名数据网络(NDN),它由美国国家科学基金会(NSF)在未来互联网体系结构(FIA)项目范围内资助。本文档描述了设计和实现与WoT兼容的消费者的过程,在NDN上运行并利用其属性。该方法的核心是定义与网络架构兼容的事物描述,以及如何使事物与消费者之间的交互成为可能。使用domos用例验证了该方法,其中虚拟恒温器被控制。
{"title":"An approach for Web of Things over Named Data Networking","authors":"Junior Dongo","doi":"10.1145/3567445.3571106","DOIUrl":"https://doi.org/10.1145/3567445.3571106","url":null,"abstract":"Information-Centric Networking (ICN) aims to be the next Internet architecture. It brings many features, such as network scalability and in-network caching, by moving the networking paradigm from the current host-centric to content-centric, where the resources are important, not their location. To benefit from the ICN property, IoT architecture needs to be adapted to comply with this new Internet architecture, especially the Web of Things (WoT). One dominant of these Content-Centric Networking (CCN) architectures is the Named Data Networking (NDN), which the American National Science Foundation has financed (NSF) in the scope of the project Future Internet Architecture (FIA). This document describes a process to design and implement a consumer compatible with the WoT, operating on NDN and capitalizing on its properties. The approach is centered on the definition of a Thing Description compatible with the network architecture, and how the interaction between the Thing and the consumer can be possible. The approach is validated using a domos use case in which a virtual thermostat is controlled.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123016370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tongaraas: Tongs for Recognizing Littering Garbage with Active Acoustic Sensing 用主动声传感识别垃圾的钳
Pub Date : 2022-11-07 DOI: 10.1145/3567445.3571112
Koki Tachibana, Yuki Matsuda, Kaito Isobe, Daiki Mayumi, Takamasa Kikuchi, H. Suwa, K. Yasumoto, Kazuya Murao
Littering has developed into a serious environmental problem. However, the actual situation of litter and the results of litter pickup activities are not organized as information. Therefore, the objective of this research is to grasp the distribution of the type and location of litter comprehensively. To achieve the objective of this research, we have proposed a method for recognizing litter using an acoustic sensor on a smartwatch worn on the wrist and a method for recognizing litter using a small camera mounted on tongs. However, in these studies, there were limitations in the range of litter type estimation, lack of recognition accuracy, and privacy issues. To solve the above problem, we propose a litter type recognition system, named Tongaraas, that combines active acoustic sensing with tongs. In the evaluation experiment, we built the litter type recognition model for six categories of litter. The evaluation results showed the models, which were trained with dataset collected by single person and three people, perform at F-value of 0.978 (SVM) and 0.849 (LightGBM), respectively. It suggests it is possible to estimate with common litter type recognition model, although there is a certain level of negative effects due to the individual difference.
乱扔垃圾已经成为一个严重的环境问题。然而,垃圾的实际情况和垃圾收集活动的结果并没有被组织成信息。因此,本研究的目的是全面掌握凋落物类型和位置的分布情况。为了实现本研究的目的,我们提出了一种通过佩戴在手腕上的智能手表上的声学传感器识别垃圾的方法,以及一种通过安装在夹子上的小型摄像头识别垃圾的方法。然而,在这些研究中,存在着对凋落物类型估计范围的限制、识别精度的不足以及隐私问题。为了解决上述问题,我们提出了一种结合主动声传感和钳类的凋落物类型识别系统,命名为Tongaraas。在评价实验中,我们建立了6类凋落物的凋落物类型识别模型。评价结果表明,使用单人和三人采集的数据集训练的模型,f值分别为0.978 (SVM)和0.849 (LightGBM)。这表明,尽管由于个体差异存在一定程度的负面影响,但用普通凋落物类型识别模型进行估算是可行的。
{"title":"Tongaraas: Tongs for Recognizing Littering Garbage with Active Acoustic Sensing","authors":"Koki Tachibana, Yuki Matsuda, Kaito Isobe, Daiki Mayumi, Takamasa Kikuchi, H. Suwa, K. Yasumoto, Kazuya Murao","doi":"10.1145/3567445.3571112","DOIUrl":"https://doi.org/10.1145/3567445.3571112","url":null,"abstract":"Littering has developed into a serious environmental problem. However, the actual situation of litter and the results of litter pickup activities are not organized as information. Therefore, the objective of this research is to grasp the distribution of the type and location of litter comprehensively. To achieve the objective of this research, we have proposed a method for recognizing litter using an acoustic sensor on a smartwatch worn on the wrist and a method for recognizing litter using a small camera mounted on tongs. However, in these studies, there were limitations in the range of litter type estimation, lack of recognition accuracy, and privacy issues. To solve the above problem, we propose a litter type recognition system, named Tongaraas, that combines active acoustic sensing with tongs. In the evaluation experiment, we built the litter type recognition model for six categories of litter. The evaluation results showed the models, which were trained with dataset collected by single person and three people, perform at F-value of 0.978 (SVM) and 0.849 (LightGBM), respectively. It suggests it is possible to estimate with common litter type recognition model, although there is a certain level of negative effects due to the individual difference.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":" 31","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113952306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling the Carbon Footprint of Battery-Powered IoT Sensor Nodes for Environmental-Monitoring Applications 为环境监测应用建模电池供电的物联网传感器节点的碳足迹
Pub Date : 2022-11-07 DOI: 10.1145/3567445.3567448
Pol Maistriaux, Thibault Pirson, Maxime Schramme, J. Louveaux, D. Bol
The Internet-of-Things (IoT) is frequently presented as an effective tool to monitor our environment and subsequently reduce the environmental footprint of human activities. However, the environmental footprint of IoT nodes themselves is often overlooked. The standardized life-cycle assessment (LCA) methodology can help in this respect. While production impacts can be estimated using LCA databases, use phase impacts are complex to model for battery-powered IoT nodes, commonly used in environmental monitoring. Indeed, battery maintenance operations involve component replacement, transportation and depend on the service lifetime which is strongly influenced by the use phase scenario. We therefore propose a comprehensive open-source parametric model of battery-powered IoT nodes use phase in environmental monitoring applications. The model assesses the overall environmental footprint, including deployment and maintenance, with an enhanced service lifetime evaluation. Using a custom node prototype, additionally validating the underlying power consumption modeling, we then analyze a case study. The use phase model fosters eco-design by allowing the optimal battery capacity identification and highlighting the impact of various parameters on the carbon footprint, e.g., use phase scenario, operating conditions, node positioning, transport scheme, and replacement strategy. Finally, the model can easily be transposed to evaluate economic aspects, motivating the environmental and economic co-optimization.
物联网(IoT)经常作为一种有效的工具来监测我们的环境,从而减少人类活动的环境足迹。然而,物联网节点本身的环境足迹往往被忽视。标准化生命周期评估(LCA)方法可以在这方面提供帮助。虽然可以使用LCA数据库估计生产影响,但对于通常用于环境监测的电池供电的物联网节点来说,使用阶段影响的建模很复杂。实际上,电池维护操作涉及组件更换、运输,并取决于使用寿命,而使用寿命受到使用阶段情景的强烈影响。因此,我们提出了一个全面的开源参数模型,用于电池供电的物联网节点在环境监测应用中的使用阶段。该模型通过增强的服务生命周期评估评估整体环境足迹,包括部署和维护。使用自定义节点原型,另外验证底层功耗建模,然后我们分析一个案例研究。使用阶段模型通过允许最佳电池容量识别并突出各种参数对碳足迹的影响来促进生态设计,例如,使用阶段场景,操作条件,节点定位,运输方案和更换策略。最后,该模型可以很容易地转置到经济方面进行评估,从而促进环境和经济的共同优化。
{"title":"Modeling the Carbon Footprint of Battery-Powered IoT Sensor Nodes for Environmental-Monitoring Applications","authors":"Pol Maistriaux, Thibault Pirson, Maxime Schramme, J. Louveaux, D. Bol","doi":"10.1145/3567445.3567448","DOIUrl":"https://doi.org/10.1145/3567445.3567448","url":null,"abstract":"The Internet-of-Things (IoT) is frequently presented as an effective tool to monitor our environment and subsequently reduce the environmental footprint of human activities. However, the environmental footprint of IoT nodes themselves is often overlooked. The standardized life-cycle assessment (LCA) methodology can help in this respect. While production impacts can be estimated using LCA databases, use phase impacts are complex to model for battery-powered IoT nodes, commonly used in environmental monitoring. Indeed, battery maintenance operations involve component replacement, transportation and depend on the service lifetime which is strongly influenced by the use phase scenario. We therefore propose a comprehensive open-source parametric model of battery-powered IoT nodes use phase in environmental monitoring applications. The model assesses the overall environmental footprint, including deployment and maintenance, with an enhanced service lifetime evaluation. Using a custom node prototype, additionally validating the underlying power consumption modeling, we then analyze a case study. The use phase model fosters eco-design by allowing the optimal battery capacity identification and highlighting the impact of various parameters on the carbon footprint, e.g., use phase scenario, operating conditions, node positioning, transport scheme, and replacement strategy. Finally, the model can easily be transposed to evaluate economic aspects, motivating the environmental and economic co-optimization.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123850614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 12th International Conference on the Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1