首页 > 最新文献

2022 5th Conference on Cloud and Internet of Things (CIoT)最新文献

英文 中文
Dog's Behaviour Classification Based on Wearable Sensor Accelerometer Data 基于可穿戴传感器加速度计数据的狗的行为分类
Pub Date : 2022-03-28 DOI: 10.1109/ciot53061.2022.9766553
Anniek Eerdekens, Arne Callaert, M. Deruyck, L. Martens, W. Joseph
Sensor-based behavioral detection and classification can improve dog health and welfare. Since continuous monitoring is required, an energy-efficient solution is needed. The number of logging axes, sampling rate, and selected features of accelerometer data not only have a significant impact on classification accuracy in activity recognition but also on the sensor's energy needs. Three models are designed for detecting dog's activities namely, a Random Forest classifier (RF), a Convolutional Neural Network (CNN) and a hybrid CNN, i.e. a CNN fused with statistical features that retain knowledge about the global time series form. The models are validated using an experimental dataset consisting of six different dogs performing in eight different activities i.e. lying, sitting, standing, walking, running, sprinting, eating and drinking. The results indicate that using neck and chest accelerometer data sampled at 10 Hz is sufficient for high overall classification accuracies (96.44%) for the three models. The hybrid CNN is capable of excellent performance, detecting nearly 97.87% of the behaviours at 10 Hz with a class accuracy of 80 % or higher.
基于传感器的行为检测和分类可以改善狗的健康和福利。由于需要持续监测,因此需要一种节能的解决方案。加速度计数据的测井轴数、采样率和特征选择不仅对活动识别的分类精度有很大影响,而且对传感器的能量需求也有很大影响。设计了三种模型用于检测狗的活动,即随机森林分类器(RF),卷积神经网络(CNN)和混合CNN,即融合了统计特征的CNN,保留了关于全局时间序列形式的知识。这些模型使用一个实验数据集进行验证,该数据集由6只不同的狗组成,它们在8种不同的活动中表现出来,即躺着、坐着、站着、走着、跑着、短跑着、吃着和喝着。结果表明,使用10 Hz采样频率的颈部和胸部加速度计数据足以使三种模型的总体分类精度达到96.44%。混合CNN具有优异的性能,在10 Hz下检测到97.87%的行为,类精度达到80%或更高。
{"title":"Dog's Behaviour Classification Based on Wearable Sensor Accelerometer Data","authors":"Anniek Eerdekens, Arne Callaert, M. Deruyck, L. Martens, W. Joseph","doi":"10.1109/ciot53061.2022.9766553","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766553","url":null,"abstract":"Sensor-based behavioral detection and classification can improve dog health and welfare. Since continuous monitoring is required, an energy-efficient solution is needed. The number of logging axes, sampling rate, and selected features of accelerometer data not only have a significant impact on classification accuracy in activity recognition but also on the sensor's energy needs. Three models are designed for detecting dog's activities namely, a Random Forest classifier (RF), a Convolutional Neural Network (CNN) and a hybrid CNN, i.e. a CNN fused with statistical features that retain knowledge about the global time series form. The models are validated using an experimental dataset consisting of six different dogs performing in eight different activities i.e. lying, sitting, standing, walking, running, sprinting, eating and drinking. The results indicate that using neck and chest accelerometer data sampled at 10 Hz is sufficient for high overall classification accuracies (96.44%) for the three models. The hybrid CNN is capable of excellent performance, detecting nearly 97.87% of the behaviours at 10 Hz with a class accuracy of 80 % or higher.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127473244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cloud Computing Security and Challenges: Issues, Threats, and Solutions 云计算安全与挑战:问题、威胁和解决方案
Pub Date : 2022-03-28 DOI: 10.1109/ciot53061.2022.9766571
Sadeem Hamad Alrasheed, Majid Aied Alhariri, Sulaiman Abdulaziz Adubaykhi, S. Khediri
Cloud Computing has become a point of interest to institutions, companies, and individuals because of the many advantages it provides, and its low-cost infrastructure, in addition to the ease of managing it and accessing it remotely anywhere there is an Internet connection that it has become a great innovation in the information technology. With the rapid evolution of cloud computing, information security concerns have emerged that hinder the evolution of cloud computing and need a solution, as security has become the main challenge of cloud computing. This paper will focus on cloud computing security, challenges, issues, threats, and solutions.
云计算已经成为机构、公司和个人的兴趣点,因为它提供了许多优势,它的低成本基础设施,除了易于管理和远程访问它之外,在任何有互联网连接的地方,它已经成为信息技术中的一个伟大创新。随着云计算的快速发展,信息安全问题的出现阻碍了云计算的发展,需要一个解决方案,安全已经成为云计算的主要挑战。本文将重点讨论云计算安全、挑战、问题、威胁和解决方案。
{"title":"Cloud Computing Security and Challenges: Issues, Threats, and Solutions","authors":"Sadeem Hamad Alrasheed, Majid Aied Alhariri, Sulaiman Abdulaziz Adubaykhi, S. Khediri","doi":"10.1109/ciot53061.2022.9766571","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766571","url":null,"abstract":"Cloud Computing has become a point of interest to institutions, companies, and individuals because of the many advantages it provides, and its low-cost infrastructure, in addition to the ease of managing it and accessing it remotely anywhere there is an Internet connection that it has become a great innovation in the information technology. With the rapid evolution of cloud computing, information security concerns have emerged that hinder the evolution of cloud computing and need a solution, as security has become the main challenge of cloud computing. This paper will focus on cloud computing security, challenges, issues, threats, and solutions.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130174210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
In-network Computation for IoT Data Processing with ActiveNDN in Wireless Sensor Networks 无线传感器网络中基于ActiveNDN的物联网数据处理的网络内计算
Pub Date : 2022-03-28 DOI: 10.1109/ciot53061.2022.9766613
Preechai Mekbungwan, G. Pau, K. Kanchanasut
In-network computation allows application functions to be computed within the network directly on raw sensor data, and publish real-time responses or alerts to users in the field. We propose to extend Named Data Networking (NDN) with in-network computation by embedding functions in an additional entity called Function Library, which is connected to the NDN forwarder in each NDN router. Function calls can be expressed as part of the Interest names with proper name prefixes for routing, with the results of the computation returned as NDN Data packets, creating an ActiveNDN network. Our main focus is on performing robust distributed computation, such as analysing and filtering raw data in real-time, as close as possible to sensors in an environment with intermittent Internet connectivity and resource-constrained computable IoT nodes. In this paper, we describe the design of ActiveNDN with a small prototype network as a proof of concept. Extensive simulation experiments were conducted to investigate the performance and effectiveness of ActiveNDN in large-scale wireless IoT networks. We also compared the real-time processing capabilities of ActiveNDN with those of centralised edge computing. It has been shown that with the proposed minimal changes to NDN, low latency can be achieved so that time-critical IoT data processing of sensor data can meet the required deadlines.
网络内计算允许应用程序功能在网络内直接对原始传感器数据进行计算,并向现场用户发布实时响应或警报。我们建议通过在一个称为函数库的附加实体中嵌入函数来扩展命名数据网络(NDN)的网络内计算,该实体连接到每个NDN路由器中的NDN转发器。函数调用可以表示为带有路由专用名称前缀的兴趣名称的一部分,计算结果作为NDN数据包返回,从而创建一个ActiveNDN网络。我们的主要重点是执行强大的分布式计算,例如实时分析和过滤原始数据,在具有间歇性互联网连接和资源受限的可计算物联网节点的环境中尽可能靠近传感器。在本文中,我们用一个小型原型网络描述了ActiveNDN的设计,作为概念验证。为了研究ActiveNDN在大规模无线物联网网络中的性能和有效性,进行了大量的仿真实验。我们还比较了ActiveNDN与集中式边缘计算的实时处理能力。研究表明,通过对NDN进行最小的更改,可以实现低延迟,从而使传感器数据的时间关键型物联网数据处理能够满足所需的最后期限。
{"title":"In-network Computation for IoT Data Processing with ActiveNDN in Wireless Sensor Networks","authors":"Preechai Mekbungwan, G. Pau, K. Kanchanasut","doi":"10.1109/ciot53061.2022.9766613","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766613","url":null,"abstract":"In-network computation allows application functions to be computed within the network directly on raw sensor data, and publish real-time responses or alerts to users in the field. We propose to extend Named Data Networking (NDN) with in-network computation by embedding functions in an additional entity called Function Library, which is connected to the NDN forwarder in each NDN router. Function calls can be expressed as part of the Interest names with proper name prefixes for routing, with the results of the computation returned as NDN Data packets, creating an ActiveNDN network. Our main focus is on performing robust distributed computation, such as analysing and filtering raw data in real-time, as close as possible to sensors in an environment with intermittent Internet connectivity and resource-constrained computable IoT nodes. In this paper, we describe the design of ActiveNDN with a small prototype network as a proof of concept. Extensive simulation experiments were conducted to investigate the performance and effectiveness of ActiveNDN in large-scale wireless IoT networks. We also compared the real-time processing capabilities of ActiveNDN with those of centralised edge computing. It has been shown that with the proposed minimal changes to NDN, low latency can be achieved so that time-critical IoT data processing of sensor data can meet the required deadlines.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130905595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Blockchain Based Architecture for Building Information Modelling (BIM) 面向建筑信息模型(BIM)的区块链架构
Pub Date : 2022-03-28 DOI: 10.1109/ciot53061.2022.9766540
Soumaya Bachtobji, Djamel Eddine Kouicem, Mouna Ben Mabrouk
Building Management Systems (BMS) is a set of software and hardware tools that enables the monitoring and the control of building's mechanical and electrical equipment. These systems take advantage of Internet of Things (IoT) and Information Technology (IT) domains to efficiently enhance the buildings management. Blockchain technology is a new emerging technology that has attracted many researchers this last years. Basically, it has many applications in the field of cryptocur-rency, finance and insurances fields. However, these last years, blockchain has known other applications beyond cryptocurrency domain, such as the IoT. In this paper, we shed the light on one specific application of blockchain technology to assist the design of efficient BMS. We propose an hierarchical architecture composed of IoT, fog and cloud layers where the blockchain is integrated on the different layers to enhance the security of the whole BMS systems. We show the main advantages of applying blockchain technology in BMS systems and how our architecture outperforms the existing architectures in terms of low latency, security and privacy.
楼宇管理系统(BMS)是一套软件和硬件工具,能够监测和控制建筑物的机械和电气设备。这些系统利用物联网(IoT)和信息技术(IT)领域来有效地增强建筑物管理。区块链技术是一项新兴技术,近年来吸引了许多研究人员。基本上,它在加密货币、金融和保险领域有很多应用。然而,在过去的几年里,区块链已经知道了加密货币领域之外的其他应用,比如物联网。在本文中,我们揭示了区块链技术的一个具体应用,以帮助设计高效的BMS。我们提出了一个由物联网、雾层和云层组成的分层架构,其中区块链集成在不同的层上,以增强整个BMS系统的安全性。我们展示了在BMS系统中应用区块链技术的主要优势,以及我们的架构如何在低延迟、安全性和隐私性方面优于现有架构。
{"title":"Towards Blockchain Based Architecture for Building Information Modelling (BIM)","authors":"Soumaya Bachtobji, Djamel Eddine Kouicem, Mouna Ben Mabrouk","doi":"10.1109/ciot53061.2022.9766540","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766540","url":null,"abstract":"Building Management Systems (BMS) is a set of software and hardware tools that enables the monitoring and the control of building's mechanical and electrical equipment. These systems take advantage of Internet of Things (IoT) and Information Technology (IT) domains to efficiently enhance the buildings management. Blockchain technology is a new emerging technology that has attracted many researchers this last years. Basically, it has many applications in the field of cryptocur-rency, finance and insurances fields. However, these last years, blockchain has known other applications beyond cryptocurrency domain, such as the IoT. In this paper, we shed the light on one specific application of blockchain technology to assist the design of efficient BMS. We propose an hierarchical architecture composed of IoT, fog and cloud layers where the blockchain is integrated on the different layers to enhance the security of the whole BMS systems. We show the main advantages of applying blockchain technology in BMS systems and how our architecture outperforms the existing architectures in terms of low latency, security and privacy.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122160534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards an intelligent system to manage IDS for IoT 迈向物联网IDS智能管理系统
Pub Date : 2022-03-28 DOI: 10.1109/ciot53061.2022.9766759
Hind Khoulimi, M. Lahby, Othman Benammar
Nowadays, the security of information system has become more and more important in our lives. Indeed, the appearance of 5G see 6G and technological progress which has given rise to the democratization of connected objects, thus increasing the related risks and making the task of information system security administrator more and harder. To remedy this, the researchers focused on several systems including IDS which is an Intrusion Detection System used in host and network security. However, this system generates a large number of alarms which must be managed by a security administrator, something which is not easy to do, but is necessary to guarantee an optimal level of security. In this work, we will present a system that helps the security administrator to properly detect and manage IDS alerts. This system is based on detecting attacks, collecting alerts generated by different IDS in a network of objects, analyzing these alerts and taking appropriate actions. We propose automation of said tasks based on artificial intelligence algorithms, especially Deep Learning. Our choice is directed towards the algorithm of the Artificial Neural Network (ANN) according to several criteria namely the performance and the speed of detection which is our major concern while combining it with the algorithm of Spider Monkey Optimization (SMO) for a good optimization of the entries. Our system aims to strengthen the second line of defense and make it more efficient and intelligent by equipping it with three intelligent engines namely, a detection engine, an analysis engine and an action engine. To illustrate the applicability of the proposed approaches, we begun to test the performance of detection by using different measures for example error of detection, training time and accuracy rate which have been obtained by testing with NSL-KDD dataset.
如今,信息系统的安全在我们的生活中变得越来越重要。的确,5G的出现和6G的技术进步带来了连接对象的民主化,从而增加了相关的风险,使信息系统安全管理员的任务越来越困难。为了解决这个问题,研究人员专注于几个系统,包括IDS,这是一个用于主机和网络安全的入侵检测系统。但是,该系统会产生大量的告警,必须由安全管理员进行管理,这是不容易做到的,但却是保证最佳安全级别所必需的。在本文中,我们将介绍一个帮助安全管理员正确检测和管理IDS警报的系统。该系统基于检测攻击,收集对象网络中不同IDS产生的警报,分析这些警报并采取适当的措施。我们建议基于人工智能算法,特别是深度学习,实现上述任务的自动化。我们的选择是针对人工神经网络(ANN)的算法,根据几个标准,即性能和检测速度,这是我们主要关注的问题,同时将其与蜘蛛猴优化(SMO)算法相结合,以实现对条目的良好优化。我们的系统旨在加强第二道防线,通过为其配备三个智能引擎,即检测引擎、分析引擎和行动引擎,使其更加高效和智能。为了说明所提出方法的适用性,我们开始使用不同的度量来测试检测的性能,例如检测误差、训练时间和准确率,这些度量是通过使用NSL-KDD数据集测试获得的。
{"title":"Towards an intelligent system to manage IDS for IoT","authors":"Hind Khoulimi, M. Lahby, Othman Benammar","doi":"10.1109/ciot53061.2022.9766759","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766759","url":null,"abstract":"Nowadays, the security of information system has become more and more important in our lives. Indeed, the appearance of 5G see 6G and technological progress which has given rise to the democratization of connected objects, thus increasing the related risks and making the task of information system security administrator more and harder. To remedy this, the researchers focused on several systems including IDS which is an Intrusion Detection System used in host and network security. However, this system generates a large number of alarms which must be managed by a security administrator, something which is not easy to do, but is necessary to guarantee an optimal level of security. In this work, we will present a system that helps the security administrator to properly detect and manage IDS alerts. This system is based on detecting attacks, collecting alerts generated by different IDS in a network of objects, analyzing these alerts and taking appropriate actions. We propose automation of said tasks based on artificial intelligence algorithms, especially Deep Learning. Our choice is directed towards the algorithm of the Artificial Neural Network (ANN) according to several criteria namely the performance and the speed of detection which is our major concern while combining it with the algorithm of Spider Monkey Optimization (SMO) for a good optimization of the entries. Our system aims to strengthen the second line of defense and make it more efficient and intelligent by equipping it with three intelligent engines namely, a detection engine, an analysis engine and an action engine. To illustrate the applicability of the proposed approaches, we begun to test the performance of detection by using different measures for example error of detection, training time and accuracy rate which have been obtained by testing with NSL-KDD dataset.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132935941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MPaS: A Micro-services based Publish/Subscribe Middleware System Model for IoT MPaS:基于微服务的物联网发布/订阅中间件系统模型
Pub Date : 2022-03-28 DOI: 10.1109/ciot53061.2022.9766670
Noor O. Ahmed
This paper introduces a highly scalable Micro-services based Publish and Subscribe (MPaS) system model for IoT. MPaS follows design concepts from Software Define Networking and Fractal Theory, a subset of Chaos Theory, to decompose the traditional pub/sub system into a control and data planes and further into self-similar fractals implemented as self-replicating micro services that are correct by construction. We first present the system model. Then, discuss the MPaS prototype implementation built on top of ZeroMQ, an open source messaging middleware, and deployed in docker containers on Raspberry Pi computing cluster. Finally, we show the preliminary experimental results to illustrate the practicality and the efficacy of the proposed system model.
介绍了一种高度可扩展的基于微服务的物联网发布和订阅(MPaS)系统模型。MPaS遵循软件定义网络和分形理论(混沌理论的一个子集)的设计概念,将传统的pub/sub系统分解为控制平面和数据平面,并进一步分解为自相似的分形,实现为自复制的微服务,这些微服务在结构上是正确的。我们首先提出系统模型。然后,讨论了基于ZeroMQ(一种开源消息传递中间件)构建的MPaS原型实现,并将其部署在Raspberry Pi计算集群的docker容器中。最后,给出了初步的实验结果,以说明所提出的系统模型的实用性和有效性。
{"title":"MPaS: A Micro-services based Publish/Subscribe Middleware System Model for IoT","authors":"Noor O. Ahmed","doi":"10.1109/ciot53061.2022.9766670","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766670","url":null,"abstract":"This paper introduces a highly scalable Micro-services based Publish and Subscribe (MPaS) system model for IoT. MPaS follows design concepts from Software Define Networking and Fractal Theory, a subset of Chaos Theory, to decompose the traditional pub/sub system into a control and data planes and further into self-similar fractals implemented as self-replicating micro services that are correct by construction. We first present the system model. Then, discuss the MPaS prototype implementation built on top of ZeroMQ, an open source messaging middleware, and deployed in docker containers on Raspberry Pi computing cluster. Finally, we show the preliminary experimental results to illustrate the practicality and the efficacy of the proposed system model.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114246400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Secure Scheme for Vehicle-to-Vehicle (V2V) Routing Protocol 车对车(V2V)路由协议的安全方案
Pub Date : 2022-03-28 DOI: 10.1109/ciot53061.2022.9766544
Mostafa Alawieh, W. Fahs, Jamal Haydar, Fadlallah Chbib, A. Fadlallah
Intelligent Transportation System (ITS) has witnessed some great advancements in the recent years increasing the drivers' safety and comfort. ITS offers for types of wireless communications: vehicle to vehicle (V2V), vehicle to Road-Side Unit (V2R), Vehicle to everything (V2X) and Vehicle to Infrastructure (V2I). The highly dynamic connections and the time sensitivity of ITS make it an eye-catching field for attackers. Moreover, Security dangers and vulnerabilities have increased as V2V communications have evolved. Vehicular communications are exposed to several vulnerabilities such as Denial of Service attacks (DOS), Black hole and fabrication attacks. Fabrication attacks involve a malicious vehicle that alters the packet's information, causing serious network damage such as congestion and high delay. We propose a new secure routing scheme aims at detecting malicious vehicles and eliminating them from the network. Each vehicle is monitored by its neighbors. We identify a malicious vehicle by detecting an asymmetric average between its inputs and outputs routing packets, and a delete message is sent throughout the network to eliminate the malicious car from the routing table. Simulations show that the proposed scheme has improved the performance and efficiency of the Ad-hoc On-demand Distance Vector (AODV) protocol with respect to end-to-end delay, throughput and packet delivery ratio.
智能交通系统(ITS)近年来取得了很大的进步,提高了驾驶员的安全性和舒适性。ITS提供的无线通信类型包括:车对车(V2V)、车对路侧单元(V2R)、车对一切(V2X)和车对基础设施(V2I)。ITS的高动态连接和时间敏感性使其成为攻击者关注的领域。此外,随着V2V通信的发展,安全危险和漏洞也在增加。车辆通信暴露在拒绝服务攻击(DOS)、黑洞攻击和制造攻击等漏洞中。伪造攻击涉及恶意车辆改变数据包的信息,造成严重的网络破坏,如拥塞和高延迟。我们提出了一种新的安全路由方案,旨在检测恶意车辆并将其从网络中清除。每辆车都受到相邻车辆的监控。我们通过检测其输入和输出路由数据包之间的不对称平均值来识别恶意车辆,并在整个网络中发送删除消息以从路由表中消除恶意车辆。仿真结果表明,该方案在端到端延迟、吞吐量和分组传输率方面提高了Ad-hoc按需距离矢量(AODV)协议的性能和效率。
{"title":"A Secure Scheme for Vehicle-to-Vehicle (V2V) Routing Protocol","authors":"Mostafa Alawieh, W. Fahs, Jamal Haydar, Fadlallah Chbib, A. Fadlallah","doi":"10.1109/ciot53061.2022.9766544","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766544","url":null,"abstract":"Intelligent Transportation System (ITS) has witnessed some great advancements in the recent years increasing the drivers' safety and comfort. ITS offers for types of wireless communications: vehicle to vehicle (V2V), vehicle to Road-Side Unit (V2R), Vehicle to everything (V2X) and Vehicle to Infrastructure (V2I). The highly dynamic connections and the time sensitivity of ITS make it an eye-catching field for attackers. Moreover, Security dangers and vulnerabilities have increased as V2V communications have evolved. Vehicular communications are exposed to several vulnerabilities such as Denial of Service attacks (DOS), Black hole and fabrication attacks. Fabrication attacks involve a malicious vehicle that alters the packet's information, causing serious network damage such as congestion and high delay. We propose a new secure routing scheme aims at detecting malicious vehicles and eliminating them from the network. Each vehicle is monitored by its neighbors. We identify a malicious vehicle by detecting an asymmetric average between its inputs and outputs routing packets, and a delete message is sent throughout the network to eliminate the malicious car from the routing table. Simulations show that the proposed scheme has improved the performance and efficiency of the Ad-hoc On-demand Distance Vector (AODV) protocol with respect to end-to-end delay, throughput and packet delivery ratio.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123271407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multipath-routing based load-balancing in SDN networks SDN网络中基于多路径路由的负载均衡
Pub Date : 2022-03-28 DOI: 10.1109/ciot53061.2022.9766801
Farah Chahlaoui, H. Dahmouni, H. E. Alami
Due to the rapid growth of traffic and the increasing demand of network quality of service (QoS) and high throughput in today's 5G networks, load-balancing mechanisms became the main strategy used to enhance network performance and user experience. The use of standard load-balancing methods, however, may hinder the network's ability to achieve QoS goals in terms of resources utilization and latency constraints. In this paper, we study multi-path load balancing in a centralized SDN-based network to achieve the best network performance possible and we propose a multi-path load-balancing mechanism that guarantees a better user experience through optimizing delay, jitter, and the packet-loss rate.
在当今的5G网络中,由于流量的快速增长以及对网络服务质量(QoS)和高吞吐量的需求越来越高,负载均衡机制成为提升网络性能和用户体验的主要策略。然而,使用标准负载平衡方法可能会阻碍网络在资源利用和延迟限制方面实现QoS目标的能力。本文研究了集中式sdn网络中的多路径负载均衡,以获得最佳的网络性能,并提出了一种多路径负载均衡机制,通过优化延迟、抖动和丢包率来保证更好的用户体验。
{"title":"Multipath-routing based load-balancing in SDN networks","authors":"Farah Chahlaoui, H. Dahmouni, H. E. Alami","doi":"10.1109/ciot53061.2022.9766801","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766801","url":null,"abstract":"Due to the rapid growth of traffic and the increasing demand of network quality of service (QoS) and high throughput in today's 5G networks, load-balancing mechanisms became the main strategy used to enhance network performance and user experience. The use of standard load-balancing methods, however, may hinder the network's ability to achieve QoS goals in terms of resources utilization and latency constraints. In this paper, we study multi-path load balancing in a centralized SDN-based network to achieve the best network performance possible and we propose a multi-path load-balancing mechanism that guarantees a better user experience through optimizing delay, jitter, and the packet-loss rate.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121994749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
DASS-CARE 2.0: Blockchain-Based Healthcare Framework for Collaborative Diagnosis in CIoMT Ecosystem DASS-CARE 2.0:基于区块链的CIoMT生态系统协同诊断医疗框架
Pub Date : 2022-03-28 DOI: 10.1109/ciot53061.2022.9766532
Meryeme Ayache, A. Gawanmeh, J. Al-Karaki
Due to current Covid-19 pandemic, several countries enforce lock-down to prevent pandemic outspread. Hence, the mode of delivery of health services shall change as physical visits are not allowed. As such, the need of tele-medicine service and remote diagnosis have become a necessity. To provide reliable, safe, secure, and sustainable tele-medicine consultancy services, the supporting IT infrastructure need to be transformed. Therefore, it is necessary to use new generation of information technologies such as loT, Blockchain, and cloud computing to transform the traditional medical systems to smart healthcare systems. In this paper, we propose a proof of concept (PoC) of an ameliorated version of our DASS-CARE framework that supports decentralized, accessible, scalable, and secure access to healthcare services based on Internet of Medical things (IoMT) and Artificial Intelligence (AI). In this paper, we propose DASS-CARE 2.0 that offers more medical services including: (a) the real time health monitoring, (b) the collaborative and secure access to medical records, (c) the storage of medical history diagnosis and prescriptions, and (d)the patient's discharge and bills' payments. The paper concludes with future changes to the framework that can furnish further services.
由于目前的Covid-19大流行,一些国家实施了封锁,以防止大流行蔓延。因此,应改变提供保健服务的方式,因为不允许进行实际访问。因此,对远程医疗服务和远程诊断的需求已成为一种必然。为了提供可靠、安全、可靠和可持续的远程医疗咨询服务,配套的IT基础设施需要转型。因此,有必要利用loT、区块链、云计算等新一代信息技术,将传统医疗系统转变为智慧医疗系统。在本文中,我们提出了DASS-CARE框架改进版本的概念验证(PoC),该框架支持基于医疗物联网(IoMT)和人工智能(AI)的分散、可访问、可扩展和安全访问医疗保健服务。在本文中,我们提出了DASS-CARE 2.0,提供更多的医疗服务,包括:(a)实时健康监测,(b)协作和安全访问医疗记录,(c)病史诊断和处方的存储,以及(d)患者的出院和账单支付。文章最后提出了未来对该框架的修改,以提供进一步的服务。
{"title":"DASS-CARE 2.0: Blockchain-Based Healthcare Framework for Collaborative Diagnosis in CIoMT Ecosystem","authors":"Meryeme Ayache, A. Gawanmeh, J. Al-Karaki","doi":"10.1109/ciot53061.2022.9766532","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766532","url":null,"abstract":"Due to current Covid-19 pandemic, several countries enforce lock-down to prevent pandemic outspread. Hence, the mode of delivery of health services shall change as physical visits are not allowed. As such, the need of tele-medicine service and remote diagnosis have become a necessity. To provide reliable, safe, secure, and sustainable tele-medicine consultancy services, the supporting IT infrastructure need to be transformed. Therefore, it is necessary to use new generation of information technologies such as loT, Blockchain, and cloud computing to transform the traditional medical systems to smart healthcare systems. In this paper, we propose a proof of concept (PoC) of an ameliorated version of our DASS-CARE framework that supports decentralized, accessible, scalable, and secure access to healthcare services based on Internet of Medical things (IoMT) and Artificial Intelligence (AI). In this paper, we propose DASS-CARE 2.0 that offers more medical services including: (a) the real time health monitoring, (b) the collaborative and secure access to medical records, (c) the storage of medical history diagnosis and prescriptions, and (d)the patient's discharge and bills' payments. The paper concludes with future changes to the framework that can furnish further services.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126632041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adapting Deep Learning models to IoT environments 使深度学习模型适应物联网环境
Pub Date : 2022-03-28 DOI: 10.1109/ciot53061.2022.9766636
Sofien Resifi, H. Hassan, K. Drira
Deep Learning (DL) models are very efficient for many applications including, computer vision, natural language processing… Yet DL models require important computation resources making it particularly difficult to deploy these applications in constrained environments such as the Internet of Things (IoT). Offloading DL models to the cloud is one solution to this problem but has a number of drawbacks related to the trade-off between efficiency and latency, and other privacy issues. In this paper we try to solve this problem using two approaches, first by sharing the DL model between the cloud and the device and second by optimising the execution of the model using early exiting where inputs do not need to execute the model entirely. Both approaches are optimized automatically in order to choose the best sharing point and the best exiting point according to input. The solutions proposed could be easily generalized and are independent of applications and offer a good alternative in order to execute DL models locally.
深度学习(DL)模型对于许多应用非常有效,包括计算机视觉、自然语言处理……然而,深度学习模型需要大量的计算资源,这使得在物联网(IoT)等受限环境中部署这些应用变得特别困难。将DL模型卸载到云端是解决这个问题的一种方法,但是在效率和延迟之间的权衡以及其他隐私问题上存在许多缺点。在本文中,我们尝试使用两种方法来解决这个问题,首先是通过在云和设备之间共享DL模型,其次是通过使用早期退出来优化模型的执行,其中输入不需要完全执行模型。两种方法均自动优化,根据输入选择最佳共享点和最佳退出点。提出的解决方案可以很容易地推广,并且独立于应用程序,并且为本地执行DL模型提供了一个很好的替代方案。
{"title":"Adapting Deep Learning models to IoT environments","authors":"Sofien Resifi, H. Hassan, K. Drira","doi":"10.1109/ciot53061.2022.9766636","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766636","url":null,"abstract":"Deep Learning (DL) models are very efficient for many applications including, computer vision, natural language processing… Yet DL models require important computation resources making it particularly difficult to deploy these applications in constrained environments such as the Internet of Things (IoT). Offloading DL models to the cloud is one solution to this problem but has a number of drawbacks related to the trade-off between efficiency and latency, and other privacy issues. In this paper we try to solve this problem using two approaches, first by sharing the DL model between the cloud and the device and second by optimising the execution of the model using early exiting where inputs do not need to execute the model entirely. Both approaches are optimized automatically in order to choose the best sharing point and the best exiting point according to input. The solutions proposed could be easily generalized and are independent of applications and offer a good alternative in order to execute DL models locally.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126068766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 5th Conference on Cloud and Internet of Things (CIoT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1