Yunxuan Li, Pascal Hirmer, Christoph Stach, B. Mitschang
As technology advances in new sensors and software, modern vehicles become increasingly intelligent. To date, connected vehicles can collect, process, and share data with other entities in connected vehicle environments. However, in terms of data collection and exchange, privacy becomes a central issue. It is challenging to preserve privacy in connected vehicle environments when the privacy demands of drivers could change from situation to situation even for the same service. In this paper, we analyze the requirements for a privacy-preserving system in connected vehicle environments with a focus on situation-awareness and safety aspects. Based on the analysis, we propose a novel situation-aware privacy-preserving framework for connected vehicles. Our framework supports individual privacy protections for specific end-point services and situation-aware privacy protections for different circumstances.
{"title":"Ensuring Situation-Aware Privacy for Connected Vehicles","authors":"Yunxuan Li, Pascal Hirmer, Christoph Stach, B. Mitschang","doi":"10.1145/3567445.3569163","DOIUrl":"https://doi.org/10.1145/3567445.3569163","url":null,"abstract":"As technology advances in new sensors and software, modern vehicles become increasingly intelligent. To date, connected vehicles can collect, process, and share data with other entities in connected vehicle environments. However, in terms of data collection and exchange, privacy becomes a central issue. It is challenging to preserve privacy in connected vehicle environments when the privacy demands of drivers could change from situation to situation even for the same service. In this paper, we analyze the requirements for a privacy-preserving system in connected vehicle environments with a focus on situation-awareness and safety aspects. Based on the analysis, we propose a novel situation-aware privacy-preserving framework for connected vehicles. Our framework supports individual privacy protections for specific end-point services and situation-aware privacy protections for different circumstances.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"281 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127476357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Command injection vulnerability is a severe threat to the embedded device. Most methods detect command injection vulnerability with taint analysis and symbolic execution and achieve promising results. However, they waste too much time analyzing secure sink call-sites, resulting in less efficient vulnerability detection. To tackle the above problem, we propose a novel sink call-site classification method named CINDY to accelerate the command injection vulnerability discovery in embedded firmware with static backtracking analysis. CINDY first performs sink call-sites detection in the binary executables and constructs the data flow for function call parameters. Then, CINDY analyzes whether the parameters passed to sink functions are derived from constant string or not and labels them “secure" or “risky". According to the labels, CINDY classifies the sink call-sites into risky and secure sink call-sites. Finally, CINDY performs taint analysis with symbolic execution to check whether a risky sink call-site is vulnerable. To demonstrate the efficacy of CINDY, we compare CINDY with the state-of-the-art method SaTC, using the dataset published by SaTC. Compared with SaTC, CINDY can filter out more of the secure sink call-sites, with a 35% decrease, and the efficiency is improved by 17% than SaTC.
{"title":"Accelerating Command Injection Vulnerability Discovery in Embedded Firmware with Static Backtracking Analysis","authors":"Xiaokang Yin, Ruijie Cai, Yizheng Zhang, Lukai Li, Qichao Yang, Shengli Liu","doi":"10.1145/3567445.3567458","DOIUrl":"https://doi.org/10.1145/3567445.3567458","url":null,"abstract":"Command injection vulnerability is a severe threat to the embedded device. Most methods detect command injection vulnerability with taint analysis and symbolic execution and achieve promising results. However, they waste too much time analyzing secure sink call-sites, resulting in less efficient vulnerability detection. To tackle the above problem, we propose a novel sink call-site classification method named CINDY to accelerate the command injection vulnerability discovery in embedded firmware with static backtracking analysis. CINDY first performs sink call-sites detection in the binary executables and constructs the data flow for function call parameters. Then, CINDY analyzes whether the parameters passed to sink functions are derived from constant string or not and labels them “secure\" or “risky\". According to the labels, CINDY classifies the sink call-sites into risky and secure sink call-sites. Finally, CINDY performs taint analysis with symbolic execution to check whether a risky sink call-site is vulnerable. To demonstrate the efficacy of CINDY, we compare CINDY with the state-of-the-art method SaTC, using the dataset published by SaTC. Compared with SaTC, CINDY can filter out more of the secure sink call-sites, with a 35% decrease, and the efficiency is improved by 17% than SaTC.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125517939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As IoT and network technology become increasingly pervasive, intelligent, and thus more powerful, it will be crucially important for future, sustainable and Human-Centric IoT scenarios that humans and humanity stay in control and can exercise meaningful agency. However, despite a growing understanding that this is of crucial importance, there is no clear shared vision between the multiple stakeholders of what is preferable and how to get there. This paper therefore reports on the first intelligence gathering that is part of a larger foresight study in this respect. More concretely, we report on a horizon scanning study and expert interviews (N=9) conducted in Norway, aimed at identifying emerging issues, trends and developments that may affect future scenarios related to human-centric intelligent networks and IoT environments.
{"title":"Future scoping of truly Human-Centric IoT and Intelligent Networks: A Foresight Approach","authors":"K. Ystgaard, K. De Moor","doi":"10.1145/3567445.3567452","DOIUrl":"https://doi.org/10.1145/3567445.3567452","url":null,"abstract":"As IoT and network technology become increasingly pervasive, intelligent, and thus more powerful, it will be crucially important for future, sustainable and Human-Centric IoT scenarios that humans and humanity stay in control and can exercise meaningful agency. However, despite a growing understanding that this is of crucial importance, there is no clear shared vision between the multiple stakeholders of what is preferable and how to get there. This paper therefore reports on the first intelligence gathering that is part of a larger foresight study in this respect. More concretely, we report on a horizon scanning study and expert interviews (N=9) conducted in Norway, aimed at identifying emerging issues, trends and developments that may affect future scenarios related to human-centric intelligent networks and IoT environments.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133195242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract: An expanding variety of technologies are being offered to aid with the care of pets. These pet technologies (pet tech) are a rapidly growing industry, introducing new security, privacy, and safety risks to their users. Despite these risks, the security and privacy evaluation of these devices, and their users’ concerns regarding these issues, remain an under-researched field. In this work, we perform a user study of 593 participants across 3 different countries (UK, USA, Germany) to gain an understanding of what technologies are in use, incidents that have occurred or participants believe may occur, and the methods used by participants to protect their online security and privacy and whether they apply these to their pet tech. Our findings highlight that participants do believe that a range of attacks may occur targeting their pet tech. Despite this, they take few precautions to protect themselves and their pets from the possible risks and harms of these technologies.
{"title":"Security and Privacy Concerns of Pet Tech Users","authors":"Scott Harper, M. Mehrnezhad, Matthew Leach","doi":"10.1145/3567445.3571102","DOIUrl":"https://doi.org/10.1145/3567445.3571102","url":null,"abstract":"Abstract: An expanding variety of technologies are being offered to aid with the care of pets. These pet technologies (pet tech) are a rapidly growing industry, introducing new security, privacy, and safety risks to their users. Despite these risks, the security and privacy evaluation of these devices, and their users’ concerns regarding these issues, remain an under-researched field. In this work, we perform a user study of 593 participants across 3 different countries (UK, USA, Germany) to gain an understanding of what technologies are in use, incidents that have occurred or participants believe may occur, and the methods used by participants to protect their online security and privacy and whether they apply these to their pet tech. Our findings highlight that participants do believe that a range of attacks may occur targeting their pet tech. Despite this, they take few precautions to protect themselves and their pets from the possible risks and harms of these technologies.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129429726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The migration of industrial controls to an edge-cloud hosted on factory premises can reduce operation costs and increase the interoperability and flexibility of industrial machines. However, the adoption of Industrial Internet of Things (IIoT) technologies to realize an industrial edge-cloud for factory automation is likely to lead to a number of challenges that have not yet been investigated. Based on an expert interviews study, this paper provides two main contributions: (1) the identification of 11 technology-, engineering-, organization-, and strategy-related challenges that, according to industrial experts, will hinder the adoption of edge-cloud control (ECC) in future factories, (2) the derivation of a structural model showing how challenges are interlinked. The results illustrate the dependency between profitability and both engineering and operation of an ECC system, suggesting the importance of improving the usability of ECC for automation experts with limited IT know-how, for instance through the reorganization of departments and the standardization of integration concepts for ECC in factories.
{"title":"Towards Industrial Control from the Edge-Cloud: A Structural Analysis of Adoption Challenges According to Industrial Experts","authors":"Marco Giani, Nelly Frank, A. Verl","doi":"10.1145/3567445.3567450","DOIUrl":"https://doi.org/10.1145/3567445.3567450","url":null,"abstract":"The migration of industrial controls to an edge-cloud hosted on factory premises can reduce operation costs and increase the interoperability and flexibility of industrial machines. However, the adoption of Industrial Internet of Things (IIoT) technologies to realize an industrial edge-cloud for factory automation is likely to lead to a number of challenges that have not yet been investigated. Based on an expert interviews study, this paper provides two main contributions: (1) the identification of 11 technology-, engineering-, organization-, and strategy-related challenges that, according to industrial experts, will hinder the adoption of edge-cloud control (ECC) in future factories, (2) the derivation of a structural model showing how challenges are interlinked. The results illustrate the dependency between profitability and both engineering and operation of an ECC system, suggesting the importance of improving the usability of ECC for automation experts with limited IT know-how, for instance through the reorganization of departments and the standardization of integration concepts for ECC in factories.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123259755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Schleipen, V. Schubert, Samir Dzidic, Dimitri Penner, S. Spieckermann
In the context of the Industrial Internet of Things (IIoT) production plants and components are increasingly growing together with information technologies. This is often realized by means of digital twins. They collect data in real time and learn from this data; they control processes automatically or support human decisions; and they communicate and interact through the internet. This is more and more evolving to intercompany interactions based on digital services. In addition to data of isolated assets (e.g. production resources), new capabilities for standard-based data integration and orchestration are necessary to contextualize the interaction of multiple digital twins and services. This paper suggests an approach to use common standards in the industrial context such as AutomationML, FMI, and OPC UA as basis for integration and contextualization of simulation-based digital services on IIoT platforms.
{"title":"A modeling approach for integration and contextualization of simulation-based digital services in IIoT","authors":"M. Schleipen, V. Schubert, Samir Dzidic, Dimitri Penner, S. Spieckermann","doi":"10.1145/3567445.3571109","DOIUrl":"https://doi.org/10.1145/3567445.3571109","url":null,"abstract":"In the context of the Industrial Internet of Things (IIoT) production plants and components are increasingly growing together with information technologies. This is often realized by means of digital twins. They collect data in real time and learn from this data; they control processes automatically or support human decisions; and they communicate and interact through the internet. This is more and more evolving to intercompany interactions based on digital services. In addition to data of isolated assets (e.g. production resources), new capabilities for standard-based data integration and orchestration are necessary to contextualize the interaction of multiple digital twins and services. This paper suggests an approach to use common standards in the industrial context such as AutomationML, FMI, and OPC UA as basis for integration and contextualization of simulation-based digital services on IIoT platforms.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123060024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The recent advent of wearable fitness trackers has fueled concerns in regards to the privacy they provide. In particular, previous works have indicated that the associated fitness apps may contact unexpected Internet destinations. In this work we identify the third-party connections of the official mobile Fitbit application and its partners, and study whether they can be blocked without hindering the essential functionality of the devices. We show that disabling traffic to the domains contained in well-maintained blocklists does not prevent Fitbit trackers from correctly reporting activity data, including steps, workouts, duration and quality of sleep, etc. Moreover, we demonstrate that Fitbit activity data are correctly synchronized for 6 partner apps of Fitbit when utilizing the above blocking rules. Our results suggest that more than of the third parties for the Fitbit-associated apps are contained in credible domain-based blocklists. Furthermore, we find all studied app to contact between 1 and 20 non-required third parties. Finally, over of the blocked destinations are identified by the default installation of uBlock Origin – universally used content filter (adblocker). Unlike previous works on blocking unnecessary IoT communications, our methodology can be easily utilized by end-users.
{"title":"I just wanted to track my steps! Blocking unwanted traffic of Fitbit devices","authors":"Andrei Kazlouski, Thomas Marchioro, E. Markatos","doi":"10.1145/3567445.3567457","DOIUrl":"https://doi.org/10.1145/3567445.3567457","url":null,"abstract":"The recent advent of wearable fitness trackers has fueled concerns in regards to the privacy they provide. In particular, previous works have indicated that the associated fitness apps may contact unexpected Internet destinations. In this work we identify the third-party connections of the official mobile Fitbit application and its partners, and study whether they can be blocked without hindering the essential functionality of the devices. We show that disabling traffic to the domains contained in well-maintained blocklists does not prevent Fitbit trackers from correctly reporting activity data, including steps, workouts, duration and quality of sleep, etc. Moreover, we demonstrate that Fitbit activity data are correctly synchronized for 6 partner apps of Fitbit when utilizing the above blocking rules. Our results suggest that more than of the third parties for the Fitbit-associated apps are contained in credible domain-based blocklists. Furthermore, we find all studied app to contact between 1 and 20 non-required third parties. Finally, over of the blocked destinations are identified by the default installation of uBlock Origin – universally used content filter (adblocker). Unlike previous works on blocking unnecessary IoT communications, our methodology can be easily utilized by end-users.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122502917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Information-Centric Networking (ICN) aims to be the next Internet architecture. It brings many features, such as network scalability and in-network caching, by moving the networking paradigm from the current host-centric to content-centric, where the resources are important, not their location. To benefit from the ICN property, IoT architecture needs to be adapted to comply with this new Internet architecture, especially the Web of Things (WoT). One dominant of these Content-Centric Networking (CCN) architectures is the Named Data Networking (NDN), which the American National Science Foundation has financed (NSF) in the scope of the project Future Internet Architecture (FIA). This document describes a process to design and implement a consumer compatible with the WoT, operating on NDN and capitalizing on its properties. The approach is centered on the definition of a Thing Description compatible with the network architecture, and how the interaction between the Thing and the consumer can be possible. The approach is validated using a domos use case in which a virtual thermostat is controlled.
{"title":"An approach for Web of Things over Named Data Networking","authors":"Junior Dongo","doi":"10.1145/3567445.3571106","DOIUrl":"https://doi.org/10.1145/3567445.3571106","url":null,"abstract":"Information-Centric Networking (ICN) aims to be the next Internet architecture. It brings many features, such as network scalability and in-network caching, by moving the networking paradigm from the current host-centric to content-centric, where the resources are important, not their location. To benefit from the ICN property, IoT architecture needs to be adapted to comply with this new Internet architecture, especially the Web of Things (WoT). One dominant of these Content-Centric Networking (CCN) architectures is the Named Data Networking (NDN), which the American National Science Foundation has financed (NSF) in the scope of the project Future Internet Architecture (FIA). This document describes a process to design and implement a consumer compatible with the WoT, operating on NDN and capitalizing on its properties. The approach is centered on the definition of a Thing Description compatible with the network architecture, and how the interaction between the Thing and the consumer can be possible. The approach is validated using a domos use case in which a virtual thermostat is controlled.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123016370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Koki Tachibana, Yuki Matsuda, Kaito Isobe, Daiki Mayumi, Takamasa Kikuchi, H. Suwa, K. Yasumoto, Kazuya Murao
Littering has developed into a serious environmental problem. However, the actual situation of litter and the results of litter pickup activities are not organized as information. Therefore, the objective of this research is to grasp the distribution of the type and location of litter comprehensively. To achieve the objective of this research, we have proposed a method for recognizing litter using an acoustic sensor on a smartwatch worn on the wrist and a method for recognizing litter using a small camera mounted on tongs. However, in these studies, there were limitations in the range of litter type estimation, lack of recognition accuracy, and privacy issues. To solve the above problem, we propose a litter type recognition system, named Tongaraas, that combines active acoustic sensing with tongs. In the evaluation experiment, we built the litter type recognition model for six categories of litter. The evaluation results showed the models, which were trained with dataset collected by single person and three people, perform at F-value of 0.978 (SVM) and 0.849 (LightGBM), respectively. It suggests it is possible to estimate with common litter type recognition model, although there is a certain level of negative effects due to the individual difference.
{"title":"Tongaraas: Tongs for Recognizing Littering Garbage with Active Acoustic Sensing","authors":"Koki Tachibana, Yuki Matsuda, Kaito Isobe, Daiki Mayumi, Takamasa Kikuchi, H. Suwa, K. Yasumoto, Kazuya Murao","doi":"10.1145/3567445.3571112","DOIUrl":"https://doi.org/10.1145/3567445.3571112","url":null,"abstract":"Littering has developed into a serious environmental problem. However, the actual situation of litter and the results of litter pickup activities are not organized as information. Therefore, the objective of this research is to grasp the distribution of the type and location of litter comprehensively. To achieve the objective of this research, we have proposed a method for recognizing litter using an acoustic sensor on a smartwatch worn on the wrist and a method for recognizing litter using a small camera mounted on tongs. However, in these studies, there were limitations in the range of litter type estimation, lack of recognition accuracy, and privacy issues. To solve the above problem, we propose a litter type recognition system, named Tongaraas, that combines active acoustic sensing with tongs. In the evaluation experiment, we built the litter type recognition model for six categories of litter. The evaluation results showed the models, which were trained with dataset collected by single person and three people, perform at F-value of 0.978 (SVM) and 0.849 (LightGBM), respectively. It suggests it is possible to estimate with common litter type recognition model, although there is a certain level of negative effects due to the individual difference.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":" 31","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113952306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pol Maistriaux, Thibault Pirson, Maxime Schramme, J. Louveaux, D. Bol
The Internet-of-Things (IoT) is frequently presented as an effective tool to monitor our environment and subsequently reduce the environmental footprint of human activities. However, the environmental footprint of IoT nodes themselves is often overlooked. The standardized life-cycle assessment (LCA) methodology can help in this respect. While production impacts can be estimated using LCA databases, use phase impacts are complex to model for battery-powered IoT nodes, commonly used in environmental monitoring. Indeed, battery maintenance operations involve component replacement, transportation and depend on the service lifetime which is strongly influenced by the use phase scenario. We therefore propose a comprehensive open-source parametric model of battery-powered IoT nodes use phase in environmental monitoring applications. The model assesses the overall environmental footprint, including deployment and maintenance, with an enhanced service lifetime evaluation. Using a custom node prototype, additionally validating the underlying power consumption modeling, we then analyze a case study. The use phase model fosters eco-design by allowing the optimal battery capacity identification and highlighting the impact of various parameters on the carbon footprint, e.g., use phase scenario, operating conditions, node positioning, transport scheme, and replacement strategy. Finally, the model can easily be transposed to evaluate economic aspects, motivating the environmental and economic co-optimization.
{"title":"Modeling the Carbon Footprint of Battery-Powered IoT Sensor Nodes for Environmental-Monitoring Applications","authors":"Pol Maistriaux, Thibault Pirson, Maxime Schramme, J. Louveaux, D. Bol","doi":"10.1145/3567445.3567448","DOIUrl":"https://doi.org/10.1145/3567445.3567448","url":null,"abstract":"The Internet-of-Things (IoT) is frequently presented as an effective tool to monitor our environment and subsequently reduce the environmental footprint of human activities. However, the environmental footprint of IoT nodes themselves is often overlooked. The standardized life-cycle assessment (LCA) methodology can help in this respect. While production impacts can be estimated using LCA databases, use phase impacts are complex to model for battery-powered IoT nodes, commonly used in environmental monitoring. Indeed, battery maintenance operations involve component replacement, transportation and depend on the service lifetime which is strongly influenced by the use phase scenario. We therefore propose a comprehensive open-source parametric model of battery-powered IoT nodes use phase in environmental monitoring applications. The model assesses the overall environmental footprint, including deployment and maintenance, with an enhanced service lifetime evaluation. Using a custom node prototype, additionally validating the underlying power consumption modeling, we then analyze a case study. The use phase model fosters eco-design by allowing the optimal battery capacity identification and highlighting the impact of various parameters on the carbon footprint, e.g., use phase scenario, operating conditions, node positioning, transport scheme, and replacement strategy. Finally, the model can easily be transposed to evaluate economic aspects, motivating the environmental and economic co-optimization.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123850614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}