首页 > 最新文献

2021 IEEE 7th World Forum on Internet of Things (WF-IoT)最新文献

英文 中文
[Career and Professional Events] [职业及专业活动]
Pub Date : 2021-06-14 DOI: 10.1109/wf-iot51360.2021.9595896
{"title":"[Career and Professional Events]","authors":"","doi":"10.1109/wf-iot51360.2021.9595896","DOIUrl":"https://doi.org/10.1109/wf-iot51360.2021.9595896","url":null,"abstract":"","PeriodicalId":184138,"journal":{"name":"2021 IEEE 7th World Forum on Internet of Things (WF-IoT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131636298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Home IoT Network with Machine Learning Based Classifiers 使用基于机器学习的分类器保护家庭物联网网络
Pub Date : 2021-06-14 DOI: 10.1109/WF-IoT51360.2021.9594932
Hasibul Jamil, Ning Yang, N. Weng
Modern home network has traditional Ether-net/WiFi traffic along with emerging low power cross platform IoT traffic, which makes traditional Network Intrusion Detection Systems (IDS) approaches ineffective. This paper presents a deep neural network approach with a split architecture of Intrusion Detection System (IDS) specially suitable for home networks. The split architecture consists of multiple ML models and trained on two separate dataset for heterogeneous traffic. We also compare our model performance with reported different ML algorithms and found superiority of our model. The proposed model achieves 0.9694, 0.9625 and 0.9651 in precision, recall, and F1-score, respectively, for NSL-KDD dataset. Another interesting finding is that tree-based method and ensemble methods outperform our model in case the training dataset is unbalanced. An analysis of run-time implementation performance of the proposed IDS model is also discussed.
现代家庭网络既有传统的以太网/WiFi流量,又有新兴的低功耗跨平台物联网流量,这使得传统的网络入侵检测系统(IDS)方法失效。本文提出了一种特别适用于家庭网络的具有分裂结构的深度神经网络入侵检测系统。分裂架构由多个ML模型组成,并在两个不同的数据集上训练,用于异构流量。我们还将我们的模型性能与报道的不同ML算法进行了比较,发现了我们模型的优越性。对于NSL-KDD数据集,该模型的准确率、召回率和f1得分分别达到0.9694、0.9625和0.9651。另一个有趣的发现是,在训练数据集不平衡的情况下,基于树的方法和集成方法优于我们的模型。对所提出的IDS模型的运行时实现性能进行了分析。
{"title":"Securing Home IoT Network with Machine Learning Based Classifiers","authors":"Hasibul Jamil, Ning Yang, N. Weng","doi":"10.1109/WF-IoT51360.2021.9594932","DOIUrl":"https://doi.org/10.1109/WF-IoT51360.2021.9594932","url":null,"abstract":"Modern home network has traditional Ether-net/WiFi traffic along with emerging low power cross platform IoT traffic, which makes traditional Network Intrusion Detection Systems (IDS) approaches ineffective. This paper presents a deep neural network approach with a split architecture of Intrusion Detection System (IDS) specially suitable for home networks. The split architecture consists of multiple ML models and trained on two separate dataset for heterogeneous traffic. We also compare our model performance with reported different ML algorithms and found superiority of our model. The proposed model achieves 0.9694, 0.9625 and 0.9651 in precision, recall, and F1-score, respectively, for NSL-KDD dataset. Another interesting finding is that tree-based method and ensemble methods outperform our model in case the training dataset is unbalanced. An analysis of run-time implementation performance of the proposed IDS model is also discussed.","PeriodicalId":184138,"journal":{"name":"2021 IEEE 7th World Forum on Internet of Things (WF-IoT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126497797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Randomization of Data Generation Times Improves Performance of Predictive IoT Networks 数据生成时间的随机化提高了预测性物联网网络的性能
Pub Date : 2021-06-14 DOI: 10.1109/WF-IoT51360.2021.9595819
Mert Nakıp, E. Gelenbe
A challenge of IoT networks is to offer Quality of Service (QoS) and meet deadline requirements when packets from numerous IoT devices must be forwarded. Thus this paper introduces the Randomization of flow Generation Times (RGT) that smooths incoming IoT traffic so that QoS improves and packet loss is avoided. When the “Earliest Deadline First” (EDF) or “Priority based on Average Load” (PAL) scheduling algorithms are used, simulation results show that RGT provides significantly better performance, for a small additional computational cost at each device, providing a useful performance improvement for IoT networks.
当来自众多物联网设备的数据包必须被转发时,物联网网络的一个挑战是提供服务质量(QoS)并满足截止日期要求。因此,本文引入了流生成时间(RGT)的随机化,使传入的物联网流量平滑,从而提高QoS并避免丢包。当使用“最早截止日期优先”(EDF)或“基于平均负载的优先级”(PAL)调度算法时,仿真结果表明,RGT提供了明显更好的性能,每个设备的额外计算成本很小,为物联网网络提供了有用的性能改进。
{"title":"Randomization of Data Generation Times Improves Performance of Predictive IoT Networks","authors":"Mert Nakıp, E. Gelenbe","doi":"10.1109/WF-IoT51360.2021.9595819","DOIUrl":"https://doi.org/10.1109/WF-IoT51360.2021.9595819","url":null,"abstract":"A challenge of IoT networks is to offer Quality of Service (QoS) and meet deadline requirements when packets from numerous IoT devices must be forwarded. Thus this paper introduces the Randomization of flow Generation Times (RGT) that smooths incoming IoT traffic so that QoS improves and packet loss is avoided. When the “Earliest Deadline First” (EDF) or “Priority based on Average Load” (PAL) scheduling algorithms are used, simulation results show that RGT provides significantly better performance, for a small additional computational cost at each device, providing a useful performance improvement for IoT networks.","PeriodicalId":184138,"journal":{"name":"2021 IEEE 7th World Forum on Internet of Things (WF-IoT)","volume":"142 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116598670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Methodical Analysis of a Fog Computing Assisted Animal-Welfare Software System in a Real-World Smart Dairy Farm IoT Deployment 雾计算辅助动物福利软件系统在现实世界智能奶牛场物联网部署中的方法分析
Pub Date : 2021-06-14 DOI: 10.1109/WF-IoT51360.2021.9595051
Mohit Taneja, Nikita Jalodia, P. Malone, E. Misha
In the IoT era, the devices along the things-to-cloud continuum, present a unique opportunity to additionally serve as computing hubs. Termed Fog computing, this paradigm can be used to host applications and process data closer to the source. In this article, we present a methodical analysis of our fog enabled software system in an IoT enabled smart dairy farm. The developed software system uses locomotion data generated by wearables on cows’ feet to detect anomalies in their behaviour. We analyze the benefits of using a fog computing assisted approach for developing such IoT solutions. We use resource utilization as the performance metric for analyzing the benefits of leveraging the fog computing paradigm compared to the traditional cloud centric approach. The results suggest that a fog enabled software system brings benefits such as efficient utilization of computing resources, improved QoS etc. The evaluation indicates that there will be need of special design (including both low-level and high-level system design) re-configurations and also re-engineering of some components to provide higher scalability using less computational resources.
在物联网时代,沿着物到云连续体的设备提供了一个独特的机会,可以额外充当计算中心。这种范式被称为雾计算,可用于托管应用程序和处理更靠近源的数据。在这篇文章中,我们对一个支持物联网的智能奶牛场中的雾启用软件系统进行了系统的分析。开发的软件系统利用牛脚上的可穿戴设备产生的运动数据来检测它们的异常行为。我们分析了使用雾计算辅助方法开发此类物联网解决方案的好处。我们使用资源利用率作为性能指标来分析利用雾计算范式与传统的以云为中心的方法相比的优势。结果表明,雾化软件系统具有计算资源利用率高、服务质量提高等优点。评估结果表明,为了使用更少的计算资源提供更高的可扩展性,需要对某些组件进行特殊的设计(包括低级和高级系统设计)、重新配置和重新设计。
{"title":"Methodical Analysis of a Fog Computing Assisted Animal-Welfare Software System in a Real-World Smart Dairy Farm IoT Deployment","authors":"Mohit Taneja, Nikita Jalodia, P. Malone, E. Misha","doi":"10.1109/WF-IoT51360.2021.9595051","DOIUrl":"https://doi.org/10.1109/WF-IoT51360.2021.9595051","url":null,"abstract":"In the IoT era, the devices along the things-to-cloud continuum, present a unique opportunity to additionally serve as computing hubs. Termed Fog computing, this paradigm can be used to host applications and process data closer to the source. In this article, we present a methodical analysis of our fog enabled software system in an IoT enabled smart dairy farm. The developed software system uses locomotion data generated by wearables on cows’ feet to detect anomalies in their behaviour. We analyze the benefits of using a fog computing assisted approach for developing such IoT solutions. We use resource utilization as the performance metric for analyzing the benefits of leveraging the fog computing paradigm compared to the traditional cloud centric approach. The results suggest that a fog enabled software system brings benefits such as efficient utilization of computing resources, improved QoS etc. The evaluation indicates that there will be need of special design (including both low-level and high-level system design) re-configurations and also re-engineering of some components to provide higher scalability using less computational resources.","PeriodicalId":184138,"journal":{"name":"2021 IEEE 7th World Forum on Internet of Things (WF-IoT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123345802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
KalKi++: A Scalable and Extensible IoT Security Platform kalki++:一个可扩展的物联网安全平台
Pub Date : 2021-06-14 DOI: 10.1109/WF-IoT51360.2021.9595004
Sebastián Echeverría, G. Lewis, Craig Mazzotta, Kyle O'Meara, Keegan Williams, Marc Novakouski, Amit Vasudevan, Matthew McCormack, V. Sekar
Internet of Things (IoT) security remains a challenge due to device vulnerabilities and untrusted supply chains, often limiting the benefits that organizations can obtain from integrating novel IoT devices to support business goals and enhance user experience. To that effect we developed KalKi: an IoT security platform that uses software-defined networking (SDN) concepts and constructs to create per-device defenses that enable integration of untrusted, off-the-shelf IoT devices. However, KalKi had limitations related to performance, scalability, and usability. This paper presents KalKi++, an evolution of KalKi that improves the performance, scalability and usability of the platform by orders of magnitude, with the added benefit of now being able to run on resource-limited hardware and support a larger number of use cases. We present the new architecture, enhanced threat model, and evaluation results for the new platform.
由于设备漏洞和不可信的供应链,物联网(IoT)安全仍然是一个挑战,通常限制了组织从集成新型物联网设备中获得的好处,以支持业务目标和增强用户体验。为此,我们开发了KalKi:一个物联网安全平台,它使用软件定义网络(SDN)概念和结构来创建每个设备的防御,从而能够集成不可信的、现成的物联网设备。然而,KalKi在性能、可伸缩性和可用性方面有限制。本文介绍了KalKi++, KalKi的一个演进版本,它以数量级提高了平台的性能、可伸缩性和可用性,并且现在能够在资源有限的硬件上运行并支持更多的用例。我们给出了新平台的新架构、增强的威胁模型和评估结果。
{"title":"KalKi++: A Scalable and Extensible IoT Security Platform","authors":"Sebastián Echeverría, G. Lewis, Craig Mazzotta, Kyle O'Meara, Keegan Williams, Marc Novakouski, Amit Vasudevan, Matthew McCormack, V. Sekar","doi":"10.1109/WF-IoT51360.2021.9595004","DOIUrl":"https://doi.org/10.1109/WF-IoT51360.2021.9595004","url":null,"abstract":"Internet of Things (IoT) security remains a challenge due to device vulnerabilities and untrusted supply chains, often limiting the benefits that organizations can obtain from integrating novel IoT devices to support business goals and enhance user experience. To that effect we developed KalKi: an IoT security platform that uses software-defined networking (SDN) concepts and constructs to create per-device defenses that enable integration of untrusted, off-the-shelf IoT devices. However, KalKi had limitations related to performance, scalability, and usability. This paper presents KalKi++, an evolution of KalKi that improves the performance, scalability and usability of the platform by orders of magnitude, with the added benefit of now being able to run on resource-limited hardware and support a larger number of use cases. We present the new architecture, enhanced threat model, and evaluation results for the new platform.","PeriodicalId":184138,"journal":{"name":"2021 IEEE 7th World Forum on Internet of Things (WF-IoT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130961514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating Machine Learning Classifiers for Prediction in an IoT-based Smart Building System 在基于物联网的智能建筑系统中评估机器学习分类器的预测
Pub Date : 2021-06-14 DOI: 10.1109/WF-IoT51360.2021.9596026
Felipe Rocha, Everton Cavalcante, T. Batista, Daniel Araújo
The integration of Machine Learning (ML) with the Internet of Things (IoT) allows effectively analyzing the huge amount of gathered data, thus making them more meaningful and helping to accurately identify anomalies and potential problems. This paper presents the use of ML techniques in the analysis of data gathered from Smart Place, a real-world IoT-based smart building system that automatically controls air conditioners aiming at saving energy. A predictive agent uses these techniques to determine the actual state of air conditioners based on data about temperature, humidity, and the presence of people in the monitored environments. Four well-known ML classifiers (namely k-Nearest Neighbors, Multi-Layer Perception neural networks, Random Forest, and Support Vector Machines) were considered in an empirical study aimed to evaluate their suitability with respect to accuracy, resource utilization, and execution time. Obtained results showed a maximum average accuracy of 96.5% in the prediction of the state of air conditioners, besides the feasibility of using alternative models in compliance with resource constraints related to the IoT scenario.
机器学习(ML)与物联网(IoT)的集成允许有效地分析大量收集的数据,从而使它们更有意义,并有助于准确识别异常和潜在问题。本文介绍了机器学习技术在分析从智能场所收集的数据中的应用,智能场所是一个基于物联网的智能建筑系统,可以自动控制空调,旨在节省能源。预测代理使用这些技术根据被监控环境中的温度、湿度和人员存在等数据来确定空调的实际状态。在一项实证研究中,我们考虑了四种著名的机器学习分类器(即k近邻、多层感知神经网络、随机森林和支持向量机),旨在评估它们在准确性、资源利用率和执行时间方面的适用性。获得的结果表明,除了使用符合物联网场景相关资源约束的替代模型的可行性外,空调状态预测的最高平均准确率为96.5%。
{"title":"Evaluating Machine Learning Classifiers for Prediction in an IoT-based Smart Building System","authors":"Felipe Rocha, Everton Cavalcante, T. Batista, Daniel Araújo","doi":"10.1109/WF-IoT51360.2021.9596026","DOIUrl":"https://doi.org/10.1109/WF-IoT51360.2021.9596026","url":null,"abstract":"The integration of Machine Learning (ML) with the Internet of Things (IoT) allows effectively analyzing the huge amount of gathered data, thus making them more meaningful and helping to accurately identify anomalies and potential problems. This paper presents the use of ML techniques in the analysis of data gathered from Smart Place, a real-world IoT-based smart building system that automatically controls air conditioners aiming at saving energy. A predictive agent uses these techniques to determine the actual state of air conditioners based on data about temperature, humidity, and the presence of people in the monitored environments. Four well-known ML classifiers (namely k-Nearest Neighbors, Multi-Layer Perception neural networks, Random Forest, and Support Vector Machines) were considered in an empirical study aimed to evaluate their suitability with respect to accuracy, resource utilization, and execution time. Obtained results showed a maximum average accuracy of 96.5% in the prediction of the state of air conditioners, besides the feasibility of using alternative models in compliance with resource constraints related to the IoT scenario.","PeriodicalId":184138,"journal":{"name":"2021 IEEE 7th World Forum on Internet of Things (WF-IoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114708359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Deep LSTM based Approach for Intrusion Detection IoT Devices Network in Smart Home 基于深度LSTM的智能家居物联网设备网络入侵检测方法
Pub Date : 2021-06-14 DOI: 10.1109/WF-IoT51360.2021.9596033
S. Azumah, Nelly Elsayed, Victor Adewopo, Zaghloul Saad Zaghloul, Chengcheng Li
The technological advancement of the Internet of Things (IoT) devices in our world today has become beneficial to many users but has security issues that are left unattended. IoT devices have the ability to connect to other devices on the internet to transmit and share data from anywhere. Hence, the need to secure these devices as they improve the quality of life comfort. Research shows that about 70% of IoT devices are easy to hack. Therefore, an efficient mechanism is highly needed to safeguard these devices, especially in smart homes. This paper proposes a novel deep learning-based anomaly detection approach to predict cyberattacks on smart home IoT network devices and learn new outliers as they occur over time using IoT network intrusion datasets. The proposed model is based on long-term memory architecture, which achieves a significant accuracy improvement compared to the existing state-of-the-art anomaly detection models for IoT networks in smart homes.
当今世界物联网(IoT)设备的技术进步已经为许多用户带来了好处,但却存在无人关注的安全问题。物联网设备能够连接到互联网上的其他设备,从任何地方传输和共享数据。因此,需要保护这些设备,因为它们提高了生活质量的舒适度。研究表明,大约70%的物联网设备很容易被黑客入侵。因此,迫切需要一种有效的机制来保护这些设备,特别是在智能家居中。本文提出了一种新的基于深度学习的异常检测方法,用于预测智能家居物联网网络设备的网络攻击,并使用物联网网络入侵数据集学习随着时间的推移发生的新异常值。该模型基于长期记忆架构,与智能家居中现有的最先进的物联网网络异常检测模型相比,该模型的准确性有了显着提高。
{"title":"A Deep LSTM based Approach for Intrusion Detection IoT Devices Network in Smart Home","authors":"S. Azumah, Nelly Elsayed, Victor Adewopo, Zaghloul Saad Zaghloul, Chengcheng Li","doi":"10.1109/WF-IoT51360.2021.9596033","DOIUrl":"https://doi.org/10.1109/WF-IoT51360.2021.9596033","url":null,"abstract":"The technological advancement of the Internet of Things (IoT) devices in our world today has become beneficial to many users but has security issues that are left unattended. IoT devices have the ability to connect to other devices on the internet to transmit and share data from anywhere. Hence, the need to secure these devices as they improve the quality of life comfort. Research shows that about 70% of IoT devices are easy to hack. Therefore, an efficient mechanism is highly needed to safeguard these devices, especially in smart homes. This paper proposes a novel deep learning-based anomaly detection approach to predict cyberattacks on smart home IoT network devices and learn new outliers as they occur over time using IoT network intrusion datasets. The proposed model is based on long-term memory architecture, which achieves a significant accuracy improvement compared to the existing state-of-the-art anomaly detection models for IoT networks in smart homes.","PeriodicalId":184138,"journal":{"name":"2021 IEEE 7th World Forum on Internet of Things (WF-IoT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134101312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Security Analysis of Large Scale IoT Network for Pollution Monitoring in Urban India 印度城市污染监测大型物联网网络安全性分析
Pub Date : 2021-06-14 DOI: 10.1109/WF-IoT51360.2021.9595688
Gangavarapu Vigneswara Ihita, K. S. Viswanadh, Y. Sudhansh, S. Chaudhari, S. Gaur
The surge in the development and adoption of Internet of Things (IoT)-enabled smart city technologies has brought with it a diverse set of critical security challenges. In this paper, protocol and network security threats pertaining to a large-scale IoT-enabled pollution monitoring sensor network, AirIoT, deployed in and around an educational campus in the Indian city of Hyderabad, have been explored. Using the STRIDE methodology, the paper assesses various threat vectors for the deployment. As solutions, the paper proposes an approach for end-to-end encryption, protocol and dashboard security, and a proof of concept deauthentication detector. This baseline threat analysis and risk assessment can provide a foundation for securing Wi-Fi and mobile network-based large-scale IoT deployments.
支持物联网(IoT)的智慧城市技术的开发和采用激增,带来了一系列关键的安全挑战。本文探讨了与大规模物联网污染监测传感器网络airot相关的协议和网络安全威胁,该网络部署在印度海得拉巴市的一个教育校园内及其周围。使用STRIDE方法,本文评估了部署的各种威胁向量。作为解决方案,本文提出了端到端加密、协议和仪表板安全的方法,以及概念验证去认证检测器。这种基线威胁分析和风险评估可以为确保基于Wi-Fi和移动网络的大规模物联网部署提供基础。
{"title":"Security Analysis of Large Scale IoT Network for Pollution Monitoring in Urban India","authors":"Gangavarapu Vigneswara Ihita, K. S. Viswanadh, Y. Sudhansh, S. Chaudhari, S. Gaur","doi":"10.1109/WF-IoT51360.2021.9595688","DOIUrl":"https://doi.org/10.1109/WF-IoT51360.2021.9595688","url":null,"abstract":"The surge in the development and adoption of Internet of Things (IoT)-enabled smart city technologies has brought with it a diverse set of critical security challenges. In this paper, protocol and network security threats pertaining to a large-scale IoT-enabled pollution monitoring sensor network, AirIoT, deployed in and around an educational campus in the Indian city of Hyderabad, have been explored. Using the STRIDE methodology, the paper assesses various threat vectors for the deployment. As solutions, the paper proposes an approach for end-to-end encryption, protocol and dashboard security, and a proof of concept deauthentication detector. This baseline threat analysis and risk assessment can provide a foundation for securing Wi-Fi and mobile network-based large-scale IoT deployments.","PeriodicalId":184138,"journal":{"name":"2021 IEEE 7th World Forum on Internet of Things (WF-IoT)","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132726257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Asynchronous Hybrid Deep Learning (AHDL): A Deep Learning Based Resource Mapping in DVFS Enabled Mobile MPSoCs 异步混合深度学习(AHDL):基于深度学习的DVFS移动mpsoc资源映射
Pub Date : 2021-06-14 DOI: 10.1109/WF-IoT51360.2021.9594956
Somdip Dey, Suman Saha, A. Singh, K. Mcdonald-Maier
Mapping resources to tasks accurately in order to gain performance, energy efficiency, reduction in peak temperature, etc. on an embedded/Edge device is a big challenge. Machine learning has proven to be effective in learning heuristics based resource mapping approaches, but its success is bound by the quality of feature extraction. Additionally, feature extraction in such approaches not just requires expert domain knowledge and human effort, but at the same time requires the application (tasks) to be profiled for such processes. Therefore, the efficacy of such resource mapping methodologies depends on expertise, skills, profiling time and architecture of the system. In this paper, we propose a novel methodology, Asynchronous Hybrid Deep Learning (AHDL), which sets a new paradigm of using Deep Learning approaches to map resources to application (tasks). In our approach, we leverage task profiling methodologies to achieve accurate mapping in order to achieve greater reward from the system, but at the same time is able to allocate resources to unprofiled application (tasks) at the same time without the need of manual feature extraction by domain experts. Our proposed methodology is able to achieve competitive results in comparison with the state-of- the-art without the usual associated challenges such as manual feature extraction.
为了在嵌入式/边缘设备上获得性能、能源效率、降低峰值温度等,准确地将资源映射到任务是一个巨大的挑战。机器学习已被证明在基于启发式资源映射方法的学习中是有效的,但其成功与否取决于特征提取的质量。此外,这些方法中的特征提取不仅需要专家领域知识和人力,同时还需要针对这些过程对应用程序(任务)进行分析。因此,这种资源映射方法的有效性取决于专业知识、技能、分析时间和系统的体系结构。在本文中,我们提出了一种新的方法,异步混合深度学习(AHDL),它为使用深度学习方法将资源映射到应用程序(任务)设置了一个新的范例。在我们的方法中,我们利用任务分析方法来实现精确的映射,以便从系统中获得更大的回报,但同时能够将资源分配给未被分析的应用程序(任务),而不需要由领域专家手动提取特征。与最先进的方法相比,我们提出的方法能够获得具有竞争力的结果,而无需手动特征提取等常见的相关挑战。
{"title":"Asynchronous Hybrid Deep Learning (AHDL): A Deep Learning Based Resource Mapping in DVFS Enabled Mobile MPSoCs","authors":"Somdip Dey, Suman Saha, A. Singh, K. Mcdonald-Maier","doi":"10.1109/WF-IoT51360.2021.9594956","DOIUrl":"https://doi.org/10.1109/WF-IoT51360.2021.9594956","url":null,"abstract":"Mapping resources to tasks accurately in order to gain performance, energy efficiency, reduction in peak temperature, etc. on an embedded/Edge device is a big challenge. Machine learning has proven to be effective in learning heuristics based resource mapping approaches, but its success is bound by the quality of feature extraction. Additionally, feature extraction in such approaches not just requires expert domain knowledge and human effort, but at the same time requires the application (tasks) to be profiled for such processes. Therefore, the efficacy of such resource mapping methodologies depends on expertise, skills, profiling time and architecture of the system. In this paper, we propose a novel methodology, Asynchronous Hybrid Deep Learning (AHDL), which sets a new paradigm of using Deep Learning approaches to map resources to application (tasks). In our approach, we leverage task profiling methodologies to achieve accurate mapping in order to achieve greater reward from the system, but at the same time is able to allocate resources to unprofiled application (tasks) at the same time without the need of manual feature extraction by domain experts. Our proposed methodology is able to achieve competitive results in comparison with the state-of- the-art without the usual associated challenges such as manual feature extraction.","PeriodicalId":184138,"journal":{"name":"2021 IEEE 7th World Forum on Internet of Things (WF-IoT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126043952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lightweight Hardware-based Authentication for Secure Smart Grid Energy Storage Units 安全智能电网储能单元的轻量级硬件认证
Pub Date : 2021-06-14 DOI: 10.1109/WF-IoT51360.2021.9595440
Fathi H. Amsaad, Selçuk Köse
Next generation smart power grid offers advanced features to enhance the traditional power grid by enabling faster and more user-friendly two-way communications between utility centers and the consumers for a faster, greener, safer, more reliable, and increasingly efficient power delivery. The energy storage units and smart charging stations have become the essential components of a smart power grid. An efficient authentication and key management scheme is proposed in this work to realize a secure and trusted smart charging coordination system using a low-cost data encryption standard (DES) design and a lightweight physical unclonable function. The proposed scheme is implemented and tested on a re-programmable platform using Artix-7 FPGA device. The experimental results demonstrate that the proposed scheme can be efficiently realized on a off-the-shelf hardware, preserve the privacy of energy storage unit owners, and provide low-cost authentication for different NIST security levels.
下一代智能电网提供了先进的功能,通过在公用事业中心和消费者之间实现更快、更友好的双向通信,从而增强传统电网,实现更快、更环保、更安全、更可靠和更高效的电力输送。储能单元和智能充电站已成为智能电网的重要组成部分。本文提出了一种高效的认证和密钥管理方案,利用低成本的数据加密标准(DES)设计和轻量级的物理不可克隆功能,实现安全可信的智能充电协调系统。利用Artix-7 FPGA器件在可编程平台上对该方案进行了实现和测试。实验结果表明,该方案可以在现成的硬件上有效实现,保护储能单元所有者的隐私,并为不同的NIST安全级别提供低成本的认证。
{"title":"A Lightweight Hardware-based Authentication for Secure Smart Grid Energy Storage Units","authors":"Fathi H. Amsaad, Selçuk Köse","doi":"10.1109/WF-IoT51360.2021.9595440","DOIUrl":"https://doi.org/10.1109/WF-IoT51360.2021.9595440","url":null,"abstract":"Next generation smart power grid offers advanced features to enhance the traditional power grid by enabling faster and more user-friendly two-way communications between utility centers and the consumers for a faster, greener, safer, more reliable, and increasingly efficient power delivery. The energy storage units and smart charging stations have become the essential components of a smart power grid. An efficient authentication and key management scheme is proposed in this work to realize a secure and trusted smart charging coordination system using a low-cost data encryption standard (DES) design and a lightweight physical unclonable function. The proposed scheme is implemented and tested on a re-programmable platform using Artix-7 FPGA device. The experimental results demonstrate that the proposed scheme can be efficiently realized on a off-the-shelf hardware, preserve the privacy of energy storage unit owners, and provide low-cost authentication for different NIST security levels.","PeriodicalId":184138,"journal":{"name":"2021 IEEE 7th World Forum on Internet of Things (WF-IoT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123673240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 IEEE 7th World Forum on Internet of Things (WF-IoT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1