首页 > 最新文献

Proceedings of the 12th International Conference on the Internet of Things最新文献

英文 中文
Every Thing Under the Sun: How Web of Things and Semantic Data Brings Benefit to Small-Scale Photovoltaic Installations 太阳下的万物:物联网和语义数据如何为小型光伏装置带来好处
Pub Date : 2022-11-07 DOI: 10.1145/3567445.3571113
G. Ramanathan, Srinivas Marella
Small-scale photovoltaic (PV) systems of up to a few kilowatts capacities are becoming increasingly available and affordable for off-grid installations. However, in our experience with using PV energy in farming in India, we found that many installations had faults or were lying underutilized. Though integrating such systems into IoT applications is now practical, analyzing the system’s performance and utilization requires knowledge of the components and the system design. Off-band infusion of this knowledge into the software applications leads to tight coupling and vertical silos. To address this challenge, we have developed an ontology to describe small-scale PV installations, which enables us to represent subsystems and their components in the form of Web of Things (WoT) Thing Descriptions. We show that our approach results in technical and semantic integration of the PV system into IoT applications, allowing the development of reusable fault detection and optimization programs. This reduces the cost of developing solutions to monitor and optimize the usage of PV systems, thereby bringing benefits to the farming community by improving their livelihood.
只有几千瓦容量的小型光伏(PV)系统正越来越多地用于离网安装,而且价格低廉。然而,根据我们在印度农业中使用光伏能源的经验,我们发现许多装置存在故障或未充分利用。虽然将此类系统集成到物联网应用中现在是可行的,但分析系统的性能和利用率需要了解组件和系统设计。将这些知识离线注入软件应用程序会导致紧密耦合和垂直竖井。为了应对这一挑战,我们开发了一个本体来描述小型光伏装置,使我们能够以物联网(WoT)事物描述的形式表示子系统及其组件。我们表明,我们的方法导致光伏系统与物联网应用的技术和语义集成,允许开发可重用的故障检测和优化程序。这降低了开发监控和优化光伏系统使用的解决方案的成本,从而通过改善农业社区的生活,为他们带来好处。
{"title":"Every Thing Under the Sun: How Web of Things and Semantic Data Brings Benefit to Small-Scale Photovoltaic Installations","authors":"G. Ramanathan, Srinivas Marella","doi":"10.1145/3567445.3571113","DOIUrl":"https://doi.org/10.1145/3567445.3571113","url":null,"abstract":"Small-scale photovoltaic (PV) systems of up to a few kilowatts capacities are becoming increasingly available and affordable for off-grid installations. However, in our experience with using PV energy in farming in India, we found that many installations had faults or were lying underutilized. Though integrating such systems into IoT applications is now practical, analyzing the system’s performance and utilization requires knowledge of the components and the system design. Off-band infusion of this knowledge into the software applications leads to tight coupling and vertical silos. To address this challenge, we have developed an ontology to describe small-scale PV installations, which enables us to represent subsystems and their components in the form of Web of Things (WoT) Thing Descriptions. We show that our approach results in technical and semantic integration of the PV system into IoT applications, allowing the development of reusable fault detection and optimization programs. This reduces the cost of developing solutions to monitor and optimize the usage of PV systems, thereby bringing benefits to the farming community by improving their livelihood.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122336343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Middleware for Automatic Composition and Mediation in IoT Systems 物联网系统中用于自动组合和中介的中间件
Pub Date : 2022-11-07 DOI: 10.1145/3567445.3567451
Abdessalam Elhabbash, Yehia Elkhatib, Georgios Bouloukakis, M. Salama
This paper presents Hetero-Genius, a middleware architecture that enables construction and mediation in Internet of Things (IoT) systems. IoT systems are deployed across physical spaces such as urban parks, residential areas, and highways. The services provided by such IoT deployments are constrained to specific devices and deployment contexts. While existing interoperability solutions enable the “design time” development and deployment of IoT systems, it is often essential to dynamically compose systems that consist of other “small scale” IoT systems. To achieve this, post-deployment composition is needed, i.e., runtime composition of diverse IoT devices and capabilities. Hetero-Genius supports system and service discoverability, as well as automatic composability. We demonstrate this using a real-world Internet of Vehicles (IoV) scenario. Our experimental evaluation shows that developers can save up to 47% of their time when using Hetero-Genius, as well as improve code correctness by 55% on average.
本文介绍了一种能够在物联网(IoT)系统中进行构建和中介的中间件体系结构Hetero-Genius。物联网系统部署在城市公园、住宅区、高速公路等物理空间。这种物联网部署提供的服务仅限于特定的设备和部署环境。虽然现有的互操作性解决方案支持物联网系统的“设计时”开发和部署,但通常必须动态组合由其他“小规模”物联网系统组成的系统。为了实现这一点,需要部署后的组合,即各种物联网设备和功能的运行时组合。Hetero-Genius支持系统和服务的可发现性,以及自动组合性。我们使用现实世界的车联网(IoV)场景来演示这一点。我们的实验评估表明,当使用Hetero-Genius时,开发人员可以节省多达47%的时间,并平均提高55%的代码正确性。
{"title":"A Middleware for Automatic Composition and Mediation in IoT Systems","authors":"Abdessalam Elhabbash, Yehia Elkhatib, Georgios Bouloukakis, M. Salama","doi":"10.1145/3567445.3567451","DOIUrl":"https://doi.org/10.1145/3567445.3567451","url":null,"abstract":"This paper presents Hetero-Genius, a middleware architecture that enables construction and mediation in Internet of Things (IoT) systems. IoT systems are deployed across physical spaces such as urban parks, residential areas, and highways. The services provided by such IoT deployments are constrained to specific devices and deployment contexts. While existing interoperability solutions enable the “design time” development and deployment of IoT systems, it is often essential to dynamically compose systems that consist of other “small scale” IoT systems. To achieve this, post-deployment composition is needed, i.e., runtime composition of diverse IoT devices and capabilities. Hetero-Genius supports system and service discoverability, as well as automatic composability. We demonstrate this using a real-world Internet of Vehicles (IoV) scenario. Our experimental evaluation shows that developers can save up to 47% of their time when using Hetero-Genius, as well as improve code correctness by 55% on average.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134525984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast Real-World Implementation of a Direction of Arrival Method for Constrained Embedded IoT Devices 约束嵌入式物联网设备到达方向方法的快速现实世界实现
Pub Date : 2022-11-07 DOI: 10.1145/3567445.3567446
Tiago Troccoli, Juho Pirskanen, A. Ometov, J. Nurmi, Ville Kaseva
Direction of arrival (DOA) methods are found in many applications, and in the case of the Internet of Things (IoT), it is used for indoor localization. However, the implementation of DOA in IoT devices poses a real challenge, since they are computationally expensive complex numerical methods that could easily lead to resource starvation, unacceptable execution time, and rapid depletion of batteries of small constrained embedded systems typically found in IoT networks. This paper contributes to alleviating that problem, it presents a fast low-power optimized version of a DOA method called Unitary TLS ESPRIT. The optimization exploits the radio communication system design to avoid two time-consuming executions of eigendecomposition, and instead, it applies two simple Power Method algorithms. The result is a lightweight version of ESPRIT that can attain sub-millisecond execution time. To prove the solution’s viability, we carried out experiments on energy consumption, memory footprint, accuracy, and execution time for three floating-point formats in a commercial constrained embedded IoT device series without any operating system and software layers. Experiments show the solution satisfies the hardware requirements and the floating-point precision fully operated by the Floating-Point Unit is found to be the best option.
到达方向(DOA)方法在许多应用中都有发现,在物联网(IoT)的情况下,它被用于室内定位。然而,在物联网设备中实施DOA提出了一个真正的挑战,因为它们是计算昂贵的复杂数值方法,很容易导致资源饥饿,执行时间不可接受,并且通常在物联网网络中发现的小型受限嵌入式系统的电池迅速耗尽。为了缓解这一问题,本文提出了一种快速、低功耗的优化版本的DOA方法,称为统一TLS ESPRIT。该优化利用无线电通信系统的设计来避免两次耗时的特征分解,而是采用两种简单的幂方法算法。其结果是一个轻量级的ESPRIT版本,可以达到亚毫秒的执行时间。为了证明该解决方案的可行性,我们在没有任何操作系统和软件层的商业受限嵌入式物联网设备系列中对三种浮点格式进行了能耗、内存占用、精度和执行时间的实验。实验结果表明,该方案满足硬件要求,且完全由浮点单元实现浮点精度是最佳方案。
{"title":"Fast Real-World Implementation of a Direction of Arrival Method for Constrained Embedded IoT Devices","authors":"Tiago Troccoli, Juho Pirskanen, A. Ometov, J. Nurmi, Ville Kaseva","doi":"10.1145/3567445.3567446","DOIUrl":"https://doi.org/10.1145/3567445.3567446","url":null,"abstract":"Direction of arrival (DOA) methods are found in many applications, and in the case of the Internet of Things (IoT), it is used for indoor localization. However, the implementation of DOA in IoT devices poses a real challenge, since they are computationally expensive complex numerical methods that could easily lead to resource starvation, unacceptable execution time, and rapid depletion of batteries of small constrained embedded systems typically found in IoT networks. This paper contributes to alleviating that problem, it presents a fast low-power optimized version of a DOA method called Unitary TLS ESPRIT. The optimization exploits the radio communication system design to avoid two time-consuming executions of eigendecomposition, and instead, it applies two simple Power Method algorithms. The result is a lightweight version of ESPRIT that can attain sub-millisecond execution time. To prove the solution’s viability, we carried out experiments on energy consumption, memory footprint, accuracy, and execution time for three floating-point formats in a commercial constrained embedded IoT device series without any operating system and software layers. Experiments show the solution satisfies the hardware requirements and the floating-point precision fully operated by the Floating-Point Unit is found to be the best option.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132416845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Protection Fortification: An Agile Approach for Threat Analysis of IoT Data 数据保护强化:物联网数据威胁分析的敏捷方法
Pub Date : 2022-11-07 DOI: 10.1145/3567445.3569164
Sigrid Marita Kvamme, Espen Gudmundsen, Tosin Daniel Oyetoyan, D. Cruzes
Data from Internet of Things (IoT) devices has become a critical asset for decision-making. However, IoT devices have security challenges due to their low-resource constraints, heterogeneity, and deployment in hostile environments. Systems consuming IoT data must thus be designed with security measures to detect and prevent data tampering attacks. We develop a data-centric threat modeling method named Data Protection Fortification (DPF) that practitioners can use during planning to assess and mitigate the security risk of using IoT data sources. We use design science to develop and validate DPF on 5 development teams from 3 organizations. Results show that DPF can be used to identify and improve security practices of data sources. Practitioners have a positive attitude towards using DPF and because it is easily understood, it has the potential to become a communication tool for security between developers and stakeholders.
来自物联网(IoT)设备的数据已成为决策的关键资产。然而,物联网设备由于其低资源限制、异构性和在敌对环境中的部署而面临安全挑战。因此,使用物联网数据的系统必须设计安全措施,以检测和防止数据篡改攻击。我们开发了一种以数据为中心的威胁建模方法,名为数据保护强化(DPF),从业者可以在规划期间使用该方法来评估和减轻使用物联网数据源的安全风险。我们使用设计科学在来自3个组织的5个开发团队中开发和验证DPF。结果表明,DPF可用于识别和改进数据源的安全实践。从业者对使用DPF持积极态度,因为DPF很容易理解,所以它有可能成为开发人员和涉众之间的安全沟通工具。
{"title":"Data Protection Fortification: An Agile Approach for Threat Analysis of IoT Data","authors":"Sigrid Marita Kvamme, Espen Gudmundsen, Tosin Daniel Oyetoyan, D. Cruzes","doi":"10.1145/3567445.3569164","DOIUrl":"https://doi.org/10.1145/3567445.3569164","url":null,"abstract":"Data from Internet of Things (IoT) devices has become a critical asset for decision-making. However, IoT devices have security challenges due to their low-resource constraints, heterogeneity, and deployment in hostile environments. Systems consuming IoT data must thus be designed with security measures to detect and prevent data tampering attacks. We develop a data-centric threat modeling method named Data Protection Fortification (DPF) that practitioners can use during planning to assess and mitigate the security risk of using IoT data sources. We use design science to develop and validate DPF on 5 development teams from 3 organizations. Results show that DPF can be used to identify and improve security practices of data sources. Practitioners have a positive attitude towards using DPF and because it is easily understood, it has the potential to become a communication tool for security between developers and stakeholders.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130301841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk Assessment and Classification of Medical Device Software for the Internet of Medical Things: Challenges arising from connected, intelligent medical devices 医疗物联网医疗设备软件风险评估与分类:互联智能医疗设备带来的挑战
Pub Date : 2022-11-07 DOI: 10.1145/3567445.3571104
I. Brass, Andrew Mkwashi
Although the medical device industry operates within a stringent regulatory environment, the growing deployment of connected, intelligent medical devices (CIMDs) in the healthcare sector is challenging these established regulatory frameworks. CIMDs come in a variety of forms, from implantables, to specialist IoMT devices deployed at the point-of-care, to AI-based medical devices, and AI as a medical device (AIaMDs). These devices raise several cybersecurity, data management, and algorithmic integrity concerns for patient safety and the delivery of reliable, responsible healthcare. The purpose of this article is to focus on a particular characteristic of CIMDs: their changing risk profile, several times throughout their lifecycle, with limited awareness from users, manufacturers, and regulators. Looking at the implications of these often subtle yet meaningful software modifications for current medical device regulations and for critical stakeholders in the CIMD ecosystem, the article highlights three main challenges to: i) risk assessment, classification and management frameworks that underpin current medical device regulations; ii) current medical device compliance frameworks, especially the post-market surveillance of medical devices; and iii) the detection, categorization, and reporting of compromised devices that might not perform according to their intended purpose. The article brings empirical evidence from a qualitative research study conducted with critical stakeholders in the medical device sector.
尽管医疗设备行业在严格的监管环境中运营,但医疗保健行业中联网智能医疗设备(cimd)的部署不断增加,对这些既定的监管框架构成了挑战。cimd有多种形式,从植入式设备到部署在护理点的专业IoMT设备,再到基于人工智能的医疗设备,以及人工智能作为医疗设备(aiamd)。这些设备对患者安全和提供可靠、负责任的医疗保健提出了若干网络安全、数据管理和算法完整性问题。本文的目的是关注cimd的一个特殊特征:它们在整个生命周期中多次变化的风险概况,而用户、制造商和监管机构的意识有限。查看这些通常微妙但有意义的软件修改对当前医疗器械法规和CIMD生态系统中的关键利益相关者的影响,文章强调了三个主要挑战:i)支持当前医疗器械法规的风险评估、分类和管理框架;Ii)现行医疗器械合规框架,特别是医疗器械上市后的监管;iii)检测、分类和报告可能无法按照其预期目的运行的受损设备。文章带来的经验证据,从定性研究研究与关键利益相关者在医疗器械部门进行。
{"title":"Risk Assessment and Classification of Medical Device Software for the Internet of Medical Things: Challenges arising from connected, intelligent medical devices","authors":"I. Brass, Andrew Mkwashi","doi":"10.1145/3567445.3571104","DOIUrl":"https://doi.org/10.1145/3567445.3571104","url":null,"abstract":"Although the medical device industry operates within a stringent regulatory environment, the growing deployment of connected, intelligent medical devices (CIMDs) in the healthcare sector is challenging these established regulatory frameworks. CIMDs come in a variety of forms, from implantables, to specialist IoMT devices deployed at the point-of-care, to AI-based medical devices, and AI as a medical device (AIaMDs). These devices raise several cybersecurity, data management, and algorithmic integrity concerns for patient safety and the delivery of reliable, responsible healthcare. The purpose of this article is to focus on a particular characteristic of CIMDs: their changing risk profile, several times throughout their lifecycle, with limited awareness from users, manufacturers, and regulators. Looking at the implications of these often subtle yet meaningful software modifications for current medical device regulations and for critical stakeholders in the CIMD ecosystem, the article highlights three main challenges to: i) risk assessment, classification and management frameworks that underpin current medical device regulations; ii) current medical device compliance frameworks, especially the post-market surveillance of medical devices; and iii) the detection, categorization, and reporting of compromised devices that might not perform according to their intended purpose. The article brings empirical evidence from a qualitative research study conducted with critical stakeholders in the medical device sector.","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128677879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proceedings of the 12th International Conference on the Internet of Things 第十二届物联网国际会议论文集
{"title":"Proceedings of the 12th International Conference on the Internet of Things","authors":"","doi":"10.1145/3567445","DOIUrl":"https://doi.org/10.1145/3567445","url":null,"abstract":"","PeriodicalId":152960,"journal":{"name":"Proceedings of the 12th International Conference on the Internet of Things","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122433843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 12th International Conference on the Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1