首页 > 最新文献

2022 5th Conference on Cloud and Internet of Things (CIoT)最新文献

英文 中文
An Efficient Strategy with High Availability for Dynamic Provisioning of Access Points in Large-Scale Wireless Networks 大规模无线网络中接入点动态配置的高效、高可用性策略
Pub Date : 2022-03-28 DOI: 10.1109/ciot53061.2022.9766688
Matheus B. de A. Rodrigues, Ana Carolina R. Mendes, Marcos Paulo C. de Mendonça, G. R. Carrara, Luiz Claudio S. Magalhães, C. Albuquerque, Dianne S. V. Medeiros, D. M. F. Mattos
The dynamical users' association with wireless access points and the requirement for maximum network coverage foster the challenge of providing energy efficiency alongside network availability for large-scale wireless networks. This paper proposes an access-point provisioning strategy based on a multi-objective optimization heuristic. The heuristic purposes are maximizing coverage, ensuring high network availability, and minimizing the number of active access points, while improving energy efficiency. We evaluate our proposal by simulating a connected component of the Universidade Federal Fluminense (UFF - Brazil) wireless network, comprising 363 access points in a university campus. The simulation considers actual flows and features of users' association to the network. The results show that the best performing strategy is a greedy heuristic, which activates access points with the most significant number of potential neighbors that are not active. Our proposal implies 2% of unserved users while activating only 23% of the access points, ensuring high availability and energy efficiency.
动态用户与无线接入点的关联以及对最大网络覆盖范围的要求,为大规模无线网络提供能源效率和网络可用性带来了挑战。提出了一种基于多目标优化启发式的接入点配置策略。启发式目的是最大化覆盖范围,确保高网络可用性,最小化活动接入点的数量,同时提高能源效率。我们通过模拟联邦弗鲁米嫩塞大学(UFF -巴西)无线网络的连接组件来评估我们的建议,该网络由大学校园中的363个接入点组成。仿真考虑了用户与网络关联的实际流程和特征。结果表明,性能最好的策略是贪心启发式策略,它激活具有最显著数量的未激活的潜在邻居的接入点。我们的建议意味着2%的未服务用户,而仅激活23%的接入点,确保高可用性和能源效率。
{"title":"An Efficient Strategy with High Availability for Dynamic Provisioning of Access Points in Large-Scale Wireless Networks","authors":"Matheus B. de A. Rodrigues, Ana Carolina R. Mendes, Marcos Paulo C. de Mendonça, G. R. Carrara, Luiz Claudio S. Magalhães, C. Albuquerque, Dianne S. V. Medeiros, D. M. F. Mattos","doi":"10.1109/ciot53061.2022.9766688","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766688","url":null,"abstract":"The dynamical users' association with wireless access points and the requirement for maximum network coverage foster the challenge of providing energy efficiency alongside network availability for large-scale wireless networks. This paper proposes an access-point provisioning strategy based on a multi-objective optimization heuristic. The heuristic purposes are maximizing coverage, ensuring high network availability, and minimizing the number of active access points, while improving energy efficiency. We evaluate our proposal by simulating a connected component of the Universidade Federal Fluminense (UFF - Brazil) wireless network, comprising 363 access points in a university campus. The simulation considers actual flows and features of users' association to the network. The results show that the best performing strategy is a greedy heuristic, which activates access points with the most significant number of potential neighbors that are not active. Our proposal implies 2% of unserved users while activating only 23% of the access points, ensuring high availability and energy efficiency.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121579996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Computing Predictive Resource Management Framework Using Hidden Markov Model 基于隐马尔可夫模型的云计算预测资源管理框架
Pub Date : 2022-03-28 DOI: 10.1109/ciot53061.2022.9766809
A. Adel, Amr H. El Mougy
Volunteer and cloud computing are heterogeneous environments that aggregate the capabilities of their resources to solve large scale computationally-intensive problems and provide various services to users. Due to the dynamic nature of these environments, performance states of resources rapidly change, making elasticity characteristic and task allocation very challenging aspects. In order to implement a scalable elastic mechanism while utilizing the resources efficiently and maintaining the overall balance of these systems, real-time performance data need to be collected periodically. However, data collection may significantly increase the communication overhead in the cloud and volunteer network and consume from the limited processing power, energy and bandwidth of resources. Accordingly, this paper proposes solutions for balancing the load while reducing the communication overhead. A reactive and proactive resource auto-scaling task allocation algorithms are proposed. The proactive auto-scaling algorithm is based on the Hidden Markov Model (HMM). Performance evaluation using computer simulations show that the proposed algorithm achieves high prediction accuracy, enhances the overall system utilization and significantly decreases the communication overhead.
志愿者和云计算是异构环境,它们聚集了资源的能力,以解决大规模的计算密集型问题,并为用户提供各种服务。由于这些环境的动态性,资源的性能状态迅速变化,使得弹性特性和任务分配成为非常具有挑战性的方面。为了实现可扩展的弹性机制,同时有效地利用资源并保持这些系统的整体平衡,需要定期收集实时性能数据。然而,数据收集可能会显著增加云和志愿者网络中的通信开销,并消耗有限的处理能力、能源和带宽资源。因此,本文提出了在平衡负载的同时降低通信开销的解决方案。提出了一种被动和主动的资源自动伸缩任务分配算法。主动自缩放算法是基于隐马尔可夫模型的。计算机仿真性能评价表明,该算法具有较高的预测精度,提高了系统整体利用率,显著降低了通信开销。
{"title":"Cloud Computing Predictive Resource Management Framework Using Hidden Markov Model","authors":"A. Adel, Amr H. El Mougy","doi":"10.1109/ciot53061.2022.9766809","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766809","url":null,"abstract":"Volunteer and cloud computing are heterogeneous environments that aggregate the capabilities of their resources to solve large scale computationally-intensive problems and provide various services to users. Due to the dynamic nature of these environments, performance states of resources rapidly change, making elasticity characteristic and task allocation very challenging aspects. In order to implement a scalable elastic mechanism while utilizing the resources efficiently and maintaining the overall balance of these systems, real-time performance data need to be collected periodically. However, data collection may significantly increase the communication overhead in the cloud and volunteer network and consume from the limited processing power, energy and bandwidth of resources. Accordingly, this paper proposes solutions for balancing the load while reducing the communication overhead. A reactive and proactive resource auto-scaling task allocation algorithms are proposed. The proactive auto-scaling algorithm is based on the Hidden Markov Model (HMM). Performance evaluation using computer simulations show that the proposed algorithm achieves high prediction accuracy, enhances the overall system utilization and significantly decreases the communication overhead.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115082206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Recent review of Distributed Denial of Service Attacks in the Internet of Things 物联网中分布式拒绝服务攻击的最新综述
Pub Date : 2022-03-28 DOI: 10.1109/ciot53061.2022.9766655
Hubert Djuitcheu, Maik Debes, Matthias Aumüller, J. Seitz
The use of the Internet of Things (IoT) in almost all domains nowadays makes it the network of the future. Due to the high attention since its creation, this network is the target of numerous attacks of different purpose and nature, of which one of the most perpetrated and virulent is the distributed denial of services (DDoS) attack. This article reviews the different security requirements and some of the attacks within IoT networks. It then focuses on DDoS attacks on the IoT and summarizes some methods of countermeasures for this attack, from the oldest to the most recent ones. Based on this study, it seems that the benefits of machine learning (ML) and deep learning (DL) combined with other technologies such as software defined networking (SDN) are very promising approaches against DDoS attacks.
如今,物联网(IoT)在几乎所有领域的使用使其成为未来的网络。由于其创建以来的高度关注,该网络是许多不同目的和性质的攻击的目标,其中最常见和最致命的攻击之一是分布式拒绝服务(DDoS)攻击。本文回顾了不同的安全需求和物联网网络中的一些攻击。然后重点介绍了针对物联网的DDoS攻击,并总结了针对这种攻击的一些对策方法,从最古老的到最新的。基于这项研究,机器学习(ML)和深度学习(DL)与软件定义网络(SDN)等其他技术相结合的好处似乎是对抗DDoS攻击的非常有前途的方法。
{"title":"Recent review of Distributed Denial of Service Attacks in the Internet of Things","authors":"Hubert Djuitcheu, Maik Debes, Matthias Aumüller, J. Seitz","doi":"10.1109/ciot53061.2022.9766655","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766655","url":null,"abstract":"The use of the Internet of Things (IoT) in almost all domains nowadays makes it the network of the future. Due to the high attention since its creation, this network is the target of numerous attacks of different purpose and nature, of which one of the most perpetrated and virulent is the distributed denial of services (DDoS) attack. This article reviews the different security requirements and some of the attacks within IoT networks. It then focuses on DDoS attacks on the IoT and summarizes some methods of countermeasures for this attack, from the oldest to the most recent ones. Based on this study, it seems that the benefits of machine learning (ML) and deep learning (DL) combined with other technologies such as software defined networking (SDN) are very promising approaches against DDoS attacks.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115123242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Attack Graph-based Solution for Vulnerabilities Impact Assessment in Dynamic Environment 基于攻击图的动态环境下漏洞影响评估方法
Pub Date : 2022-03-28 DOI: 10.1109/ciot53061.2022.9766588
Antoine Boudermine, R. Khatoun, Jean-Henri Choyer
Nowadays, networks are exposed to a set of risks and threats that can potentially cause damage and losses for companies. The security of networks must be assessed in order to measure the effectiveness of the protective measures that have been implemented. However, the impact of the dynamic behavior of these systems on the attacker's strategy is rarely considered. In this paper, we propose an attack graph-based solution that consider the evolution of system properties such as network topology changes, vulnerability discovery and patching, as well as attack detection and wiping of some system components. The topology of the attack graph evolves over time considering the evolution of the system state. Several simulations of the attacker infiltration in the system are performed by following the attack paths present in the attack graph in order to assess the security of the system. The proposed solution has been tested on a use case where a user is in remote work. By considering the changes in the network topology, new attack paths can be identified.
如今,网络面临着一系列风险和威胁,这些风险和威胁可能会给公司造成损害和损失。为了衡量已经实施的保护措施的有效性,必须对网络的安全性进行评估。然而,很少考虑这些系统的动态行为对攻击者策略的影响。在本文中,我们提出了一种基于攻击图的解决方案,该方案考虑了网络拓扑变化、漏洞发现和修补以及部分系统组件的攻击检测和清除等系统属性的演变。考虑到系统状态的演变,攻击图的拓扑结构会随着时间的推移而演变。根据攻击图中的攻击路径,对攻击者在系统中的渗透进行了多次模拟,以评估系统的安全性。建议的解决方案已经在用户远程工作的用例上进行了测试。通过考虑网络拓扑结构的变化,可以识别新的攻击路径。
{"title":"Attack Graph-based Solution for Vulnerabilities Impact Assessment in Dynamic Environment","authors":"Antoine Boudermine, R. Khatoun, Jean-Henri Choyer","doi":"10.1109/ciot53061.2022.9766588","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766588","url":null,"abstract":"Nowadays, networks are exposed to a set of risks and threats that can potentially cause damage and losses for companies. The security of networks must be assessed in order to measure the effectiveness of the protective measures that have been implemented. However, the impact of the dynamic behavior of these systems on the attacker's strategy is rarely considered. In this paper, we propose an attack graph-based solution that consider the evolution of system properties such as network topology changes, vulnerability discovery and patching, as well as attack detection and wiping of some system components. The topology of the attack graph evolves over time considering the evolution of the system state. Several simulations of the attacker infiltration in the system are performed by following the attack paths present in the attack graph in order to assess the security of the system. The proposed solution has been tested on a use case where a user is in remote work. By considering the changes in the network topology, new attack paths can be identified.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130961888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy and Delay Aware Computation Offloading Scheme in MCC Environment MCC环境下能量和延迟感知的计算卸载方案
Pub Date : 2022-03-28 DOI: 10.1109/ciot53061.2022.9766509
Farhan Sufyan, Mohd Sameen Chishti, Amit Banerjee
Computation Offloading is a technique that utilizes cloud resources to maintain the QoS of computation-intensive applications executed on resource-constrained smart devices (SDs). Researchers have proposed various profiling-based offloading frameworks to minimize the execution delay and extend the battery lifetime of the SDs. Most of these offloading strategies rely on the availability of infinite cloud resources to spun independent VMs for profiling the SDs, which may not be an efficient method to handle the increasing application demands of the SDs. To address this, we investigate a generic mobile cloud computing (MCC) computation offloading framework for handling the computational demands generated by a large number of SDs. The framework utilizes appropriate queuing models to simulate the traffic generated by the SDs and formulate a non-linear multi-objective optimization problem to minimize the energy consumption and execution delay of the SDs. Finally, we propose a Stochastic Gradient descent (SGD) solution that jointly optimizes offloading probability and transmission power to find the optimal trade-off between the offloading objectives. Simulation results show the proposed system's effectiveness and efficiency for an increasing number of SDs.
计算卸载是一种利用云资源来维护在资源受限的智能设备上执行的计算密集型应用程序的QoS的技术。研究人员提出了各种基于分析的卸载框架,以最大限度地减少执行延迟并延长sd的电池寿命。大多数这些卸载策略依赖于无限云资源的可用性来旋转独立的vm来分析sd,这可能不是处理sd不断增长的应用程序需求的有效方法。为了解决这个问题,我们研究了一个通用的移动云计算(MCC)计算卸载框架,用于处理大量sd产生的计算需求。该框架利用合适的排队模型对SDs产生的流量进行模拟,并制定非线性多目标优化问题,以最小化SDs的能耗和执行延迟。最后,我们提出了一种随机梯度下降(SGD)方法,该方法联合优化卸载概率和传输功率,以找到卸载目标之间的最优权衡。仿真结果表明,该系统能够有效地处理越来越多的SDs。
{"title":"Energy and Delay Aware Computation Offloading Scheme in MCC Environment","authors":"Farhan Sufyan, Mohd Sameen Chishti, Amit Banerjee","doi":"10.1109/ciot53061.2022.9766509","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766509","url":null,"abstract":"Computation Offloading is a technique that utilizes cloud resources to maintain the QoS of computation-intensive applications executed on resource-constrained smart devices (SDs). Researchers have proposed various profiling-based offloading frameworks to minimize the execution delay and extend the battery lifetime of the SDs. Most of these offloading strategies rely on the availability of infinite cloud resources to spun independent VMs for profiling the SDs, which may not be an efficient method to handle the increasing application demands of the SDs. To address this, we investigate a generic mobile cloud computing (MCC) computation offloading framework for handling the computational demands generated by a large number of SDs. The framework utilizes appropriate queuing models to simulate the traffic generated by the SDs and formulate a non-linear multi-objective optimization problem to minimize the energy consumption and execution delay of the SDs. Finally, we propose a Stochastic Gradient descent (SGD) solution that jointly optimizes offloading probability and transmission power to find the optimal trade-off between the offloading objectives. Simulation results show the proposed system's effectiveness and efficiency for an increasing number of SDs.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134457309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulating Distributed Wireless Sensor Networks for Edge-AI 基于Edge-AI的分布式无线传感器网络仿真
Pub Date : 2022-03-28 DOI: 10.1109/ciot53061.2022.9766520
Ambar Prajapati, Bonny Banerjee
This paper presents the simulation of distributed wireless sensor networks (WSNs) consisting of autonomous mobile nodes that communicate, with or without a central/root node, as desired for edge artificial intelligence (edge-AI). We harness the high-resolution and multidimensional sensing characteristics of IEEE 802.15.4 standard and Routing Protocol for Low-Power and Lossy Networks (RPL) to implement dynamic, asynchronous, event-driven, targeted communication in distributed WSNs. We choose Contiki-NG/Cooja to simulate two WSNs, one with and the other without a root node. The simulations are assessed on the network Quality of Service (QoS) parameters such as throughput, network lifetime, power consumption, and packet delivery ratio. The simulation outputs show that the sensor nodes at the edge communicate successfully with the specific targets responding to particular events in an autonomous and asynchronous manner. The performance is slightly degraded when using the RPL WSN with a root node. This work shows how to simulate and evaluate distributed WSNs using the Cooja simulator which would be useful for designing such networks for edge-AI applications, such as visual surveillance, monitoring in assisted living facilities, intelligent transportation with connected vehicles, automated factory floors, immersive social media experience, and so on.
本文介绍了分布式无线传感器网络(wsn)的仿真,该网络由自主移动节点组成,这些节点可以根据边缘人工智能(edge- ai)的需要进行通信,无论有无中心/根节点。我们利用IEEE 802.15.4标准和低功耗和有损网络路由协议(RPL)的高分辨率和多维感知特性,在分布式wsn中实现动态、异步、事件驱动、目标通信。我们选择Contiki-NG/Cooja来模拟两个wsn,一个有根节点,另一个没有根节点。仿真评估了网络服务质量(QoS)参数,如吞吐量、网络生存期、功耗和数据包传送率。仿真结果表明,边缘传感器节点以自主和异步的方式与响应特定事件的特定目标成功通信。当使用带有根节点的RPL WSN时,性能略有下降。这项工作展示了如何使用Cooja模拟器模拟和评估分布式wsn,这将有助于为边缘人工智能应用设计此类网络,如视觉监控、辅助生活设施监控、联网车辆的智能交通、自动化工厂车间、沉浸式社交媒体体验等。
{"title":"Simulating Distributed Wireless Sensor Networks for Edge-AI","authors":"Ambar Prajapati, Bonny Banerjee","doi":"10.1109/ciot53061.2022.9766520","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766520","url":null,"abstract":"This paper presents the simulation of distributed wireless sensor networks (WSNs) consisting of autonomous mobile nodes that communicate, with or without a central/root node, as desired for edge artificial intelligence (edge-AI). We harness the high-resolution and multidimensional sensing characteristics of IEEE 802.15.4 standard and Routing Protocol for Low-Power and Lossy Networks (RPL) to implement dynamic, asynchronous, event-driven, targeted communication in distributed WSNs. We choose Contiki-NG/Cooja to simulate two WSNs, one with and the other without a root node. The simulations are assessed on the network Quality of Service (QoS) parameters such as throughput, network lifetime, power consumption, and packet delivery ratio. The simulation outputs show that the sensor nodes at the edge communicate successfully with the specific targets responding to particular events in an autonomous and asynchronous manner. The performance is slightly degraded when using the RPL WSN with a root node. This work shows how to simulate and evaluate distributed WSNs using the Cooja simulator which would be useful for designing such networks for edge-AI applications, such as visual surveillance, monitoring in assisted living facilities, intelligent transportation with connected vehicles, automated factory floors, immersive social media experience, and so on.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114206688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cache Optimization Strategy for Mobile Edge Computing in Maritime IoT 海事物联网中移动边缘计算缓存优化策略
Pub Date : 2022-03-28 DOI: 10.1109/ciot53061.2022.9766604
Hailong Feng, Zhengqi Cui, Tingting Yang
With the increasing storage capacity of Internet of Things (IoT) mobile devices, cache-enabled device-to-device (D2D) networks enable efficient information sharing, thereby increasing the transmission efficiency of the entire network. The efficiency is further improved by the rational deployment of caching strategies on mobile devices in combination with traditional base station transmission methods. In this paper, the mobile-aware caching strategy is divided into two problems to solve. The first problem is to solve the user's latency-minimizing cache placement problem. We transform the problem into a decision problem, propose a low-complexity algorithm that approximates the optimal solution, and justify the method using the properties of submodular functions. The second problem addresses external restriction parameters, such as cache file type, cache upper limit, and deadline. We find through simulation that there is a bottleneck in the performance improvement of the whole system as the external parameters change. A suitable formulation of these parameters can put the system in a range where the input and output are most effective, further maximizing the performance of the optimization method. We introduce the concept of marginal efficiency and use Bayesian optimization to solve the selection of these parameters. The final validation is obtained by simulation with real data.
随着物联网(IoT)移动设备存储容量的不断增加,支持缓存的设备到设备(device-to-device, D2D)网络可以实现高效的信息共享,从而提高整个网络的传输效率。结合传统基站传输方式,在移动设备上合理部署缓存策略,进一步提高了效率。本文将移动感知缓存策略分为两个问题来解决。第一个问题是解决用户最小化延迟的缓存放置问题。我们将该问题转化为决策问题,提出了一种近似最优解的低复杂度算法,并利用子模函数的性质对该方法进行了证明。第二个问题涉及外部限制参数,例如缓存文件类型、缓存上限和截止日期。通过仿真发现,随着外部参数的变化,整个系统的性能提升存在瓶颈。这些参数的适当公式可以使系统处于输入和输出最有效的范围内,从而进一步最大化优化方法的性能。我们引入了边际效率的概念,并用贝叶斯优化方法解决了这些参数的选择问题。通过对实际数据的仿真,得到了最后的验证结果。
{"title":"Cache Optimization Strategy for Mobile Edge Computing in Maritime IoT","authors":"Hailong Feng, Zhengqi Cui, Tingting Yang","doi":"10.1109/ciot53061.2022.9766604","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766604","url":null,"abstract":"With the increasing storage capacity of Internet of Things (IoT) mobile devices, cache-enabled device-to-device (D2D) networks enable efficient information sharing, thereby increasing the transmission efficiency of the entire network. The efficiency is further improved by the rational deployment of caching strategies on mobile devices in combination with traditional base station transmission methods. In this paper, the mobile-aware caching strategy is divided into two problems to solve. The first problem is to solve the user's latency-minimizing cache placement problem. We transform the problem into a decision problem, propose a low-complexity algorithm that approximates the optimal solution, and justify the method using the properties of submodular functions. The second problem addresses external restriction parameters, such as cache file type, cache upper limit, and deadline. We find through simulation that there is a bottleneck in the performance improvement of the whole system as the external parameters change. A suitable formulation of these parameters can put the system in a range where the input and output are most effective, further maximizing the performance of the optimization method. We introduce the concept of marginal efficiency and use Bayesian optimization to solve the selection of these parameters. The final validation is obtained by simulation with real data.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114496558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
3rd Cloudification of the Internet of Things Conference 第三届物联网云化大会
Pub Date : 2022-03-28 DOI: 10.1109/ciot53061.2022.9766728
{"title":"3rd Cloudification of the Internet of Things Conference","authors":"","doi":"10.1109/ciot53061.2022.9766728","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766728","url":null,"abstract":"","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"2004 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125795850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating the Robustness of IoT Security Cameras against Cyber Attacks* 调查物联网安全摄像头对网络攻击的稳健性*
Pub Date : 2022-03-28 DOI: 10.1109/ciot53061.2022.9766814
Z. Trabelsi
In recent years, Internet of Things (IoT) become widely used in various domains. Particularly, consumers are increasingly using IoT devices to build smart homes. These IoT devices can collect data and enable users to manage and secure their smart home environment. However, IoT devices are the target of malicious users and activities. Hence, the security is particularly important for IoT based smart home devices. This paper aims to experimentally evaluate the robustness and resilience of a particular type of IoT devices, known as smart home security cameras, against several common cyber attacks. The attack platform is Kali Linux operation system, which is installed with different types of penetration-testing and cyber-attack programs. The experimental results demonstrate clearly that the evaluated smart home security cameras are very vul-nerable to the tested cyber-attacks, and do not deploy built-in efficient security features. As a consequence, this investigation contributes to confirm the belief that most current IoT based smart home devices are designed and built without sufficient security considerations and solutions and may not be very reliable in untrust and unsafe environments.
近年来,物联网(IoT)被广泛应用于各个领域。特别是,消费者越来越多地使用物联网设备来构建智能家居。这些物联网设备可以收集数据,使用户能够管理和保护他们的智能家居环境。然而,物联网设备是恶意用户和活动的目标。因此,安全性对于基于物联网的智能家居设备尤为重要。本文旨在通过实验评估一种特定类型的物联网设备(称为智能家庭安全摄像头)对几种常见网络攻击的鲁棒性和弹性。攻击平台为Kali Linux操作系统,该操作系统安装了不同类型的渗透测试和网络攻击程序。实验结果清楚地表明,所评估的智能家庭安全摄像机非常容易受到所测试的网络攻击,并且没有部署内置的高效安全功能。因此,这项调查有助于证实这样一种观点,即目前大多数基于物联网的智能家居设备的设计和制造都没有充分的安全考虑和解决方案,在untrust和不安全的环境中可能不是很可靠。
{"title":"Investigating the Robustness of IoT Security Cameras against Cyber Attacks*","authors":"Z. Trabelsi","doi":"10.1109/ciot53061.2022.9766814","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766814","url":null,"abstract":"In recent years, Internet of Things (IoT) become widely used in various domains. Particularly, consumers are increasingly using IoT devices to build smart homes. These IoT devices can collect data and enable users to manage and secure their smart home environment. However, IoT devices are the target of malicious users and activities. Hence, the security is particularly important for IoT based smart home devices. This paper aims to experimentally evaluate the robustness and resilience of a particular type of IoT devices, known as smart home security cameras, against several common cyber attacks. The attack platform is Kali Linux operation system, which is installed with different types of penetration-testing and cyber-attack programs. The experimental results demonstrate clearly that the evaluated smart home security cameras are very vul-nerable to the tested cyber-attacks, and do not deploy built-in efficient security features. As a consequence, this investigation contributes to confirm the belief that most current IoT based smart home devices are designed and built without sufficient security considerations and solutions and may not be very reliable in untrust and unsafe environments.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121125594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Transforming Deep Learning Models for Resource-Efficient Activity Recognition on Mobile Devices 移动设备上资源高效活动识别的深度学习模型转换
Pub Date : 2022-03-28 DOI: 10.1109/ciot53061.2022.9766512
Sevda Ozge Bursa, Özlem Durmaz Incel, G. Alptekin
Mobile and wearable sensor technologies have gradually extended their usability into a wide range of applications, from well-being to healthcare. The amount of collected data can quickly become immense to be processed. These time and resource-consuming computations require efficient methods of classification and analysis, where deep learning is a promising technique. However, it is challenging to train and run deep learning algorithms on mobile devices due to resource constraints, such as limited battery power, memory, and computation units. In this paper, we have focused on evaluating the performance of four different deep architectures when optimized with the Tensorflow Lite platform to be deployed on mobile devices in the field of human activity recognition. We have used two datasets from the literature (WISDM and MobiAct) and trained the deep learning algorithms. We have compared the performance of the original models in terms of model accuracy, model size, and resource usages, such as CPU, memory, and energy usage, with their optimized versions. As a result of the experiments, we observe that the model sizes and resource consumption were significantly reduced when the models are optimized compared to the original models.
移动和可穿戴传感器技术已逐渐将其可用性扩展到广泛的应用领域,从福祉到医疗保健。收集的数据量很快就会变得巨大,需要处理。这些耗费时间和资源的计算需要有效的分类和分析方法,而深度学习是一种很有前途的技术。然而,由于有限的电池电量、内存和计算单元等资源限制,在移动设备上训练和运行深度学习算法是具有挑战性的。在本文中,我们专注于评估四种不同深度架构在使用Tensorflow Lite平台进行优化时的性能,这些平台将部署在移动设备上,用于人类活动识别领域。我们使用了文献中的两个数据集(WISDM和MobiAct)并训练了深度学习算法。我们比较了原始模型在模型精度、模型大小和资源使用方面的性能,例如CPU、内存和能源使用,以及它们的优化版本。实验结果表明,与原始模型相比,优化后的模型尺寸和资源消耗显著减少。
{"title":"Transforming Deep Learning Models for Resource-Efficient Activity Recognition on Mobile Devices","authors":"Sevda Ozge Bursa, Özlem Durmaz Incel, G. Alptekin","doi":"10.1109/ciot53061.2022.9766512","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766512","url":null,"abstract":"Mobile and wearable sensor technologies have gradually extended their usability into a wide range of applications, from well-being to healthcare. The amount of collected data can quickly become immense to be processed. These time and resource-consuming computations require efficient methods of classification and analysis, where deep learning is a promising technique. However, it is challenging to train and run deep learning algorithms on mobile devices due to resource constraints, such as limited battery power, memory, and computation units. In this paper, we have focused on evaluating the performance of four different deep architectures when optimized with the Tensorflow Lite platform to be deployed on mobile devices in the field of human activity recognition. We have used two datasets from the literature (WISDM and MobiAct) and trained the deep learning algorithms. We have compared the performance of the original models in terms of model accuracy, model size, and resource usages, such as CPU, memory, and energy usage, with their optimized versions. As a result of the experiments, we observe that the model sizes and resource consumption were significantly reduced when the models are optimized compared to the original models.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114473582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2022 5th Conference on Cloud and Internet of Things (CIoT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1