首页 > 最新文献

2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)最新文献

英文 中文
MinHash Hierarchy for Privacy Preserving Trajectory Sensing and Query 隐私保护轨迹感知和查询的MinHash层次结构
J. Ding, Chien-Chun Ni, Mengyu Zhou, Jie Gao
In this work, we study privacy preserving trajectory sensing and query when $n$ mobile entities (e.g., mobile devices or vehicles) move in an environment of $m$ checkpoints (e.g, WiFi or cellular towers). The checkpoints detect the appearances of mobile entities in the proximity, meanwhile, employ the MinHash signatures to record the set of mobile entities passing by. We build on the checkpoints a distributed data structure named the MinHash hierarchy, with which one can efficiently answer queries regarding popular paths and other traffic patterns. The MinHash hierarchy has a total of near linear storage, linear construction cost, and logarithmic update cost. The cost of a popular path query is logarithmic in the number of checkpoints. Further, the MinHash signature provides privacy protection using a model inspired by the differential privacy model.We evaluated our algorithm using a large mobility data set and compared with previous works to demonstrate its utilities and performances.
在这项工作中,我们研究了当$n$移动实体(例如,移动设备或车辆)在$m$检查点(例如,WiFi或蜂窝塔)的环境中移动时,隐私保护轨迹感知和查询。检查点检测附近移动实体的出现,同时使用MinHash签名记录经过的移动实体集。我们在检查点上构建了一个名为MinHash层次结构的分布式数据结构,使用它可以有效地回答有关流行路径和其他流量模式的查询。MinHash层次结构总共有近线性存储、线性构建成本和对数更新成本。流行路径查询的代价在检查点数量上是对数的。此外,MinHash签名使用受差分隐私模型启发的模型提供隐私保护。我们使用大型移动数据集评估了我们的算法,并与以前的工作进行了比较,以展示其实用性和性能。
{"title":"MinHash Hierarchy for Privacy Preserving Trajectory Sensing and Query","authors":"J. Ding, Chien-Chun Ni, Mengyu Zhou, Jie Gao","doi":"10.1145/3055031.3055076","DOIUrl":"https://doi.org/10.1145/3055031.3055076","url":null,"abstract":"In this work, we study privacy preserving trajectory sensing and query when $n$ mobile entities (e.g., mobile devices or vehicles) move in an environment of $m$ checkpoints (e.g, WiFi or cellular towers). The checkpoints detect the appearances of mobile entities in the proximity, meanwhile, employ the MinHash signatures to record the set of mobile entities passing by. We build on the checkpoints a distributed data structure named the MinHash hierarchy, with which one can efficiently answer queries regarding popular paths and other traffic patterns. The MinHash hierarchy has a total of near linear storage, linear construction cost, and logarithmic update cost. The cost of a popular path query is logarithmic in the number of checkpoints. Further, the MinHash signature provides privacy protection using a model inspired by the differential privacy model.We evaluated our algorithm using a large mobility data set and compared with previous works to demonstrate its utilities and performances.","PeriodicalId":228318,"journal":{"name":"2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116981843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
PitchIn: Eavesdropping via Intelligible Speech Reconstruction Using Non-acoustic Sensor Fusion
Jun Han, Albert Jin Chung, P. Tague
Despite the advent of numerous Internet-of-Things (IoT) applications, recent research demonstrates potential side-channel vulnerabilities exploiting sensors which are used for event and environment monitoring. In this paper, we propose a new side-channel attack, where a network of distributed non-acoustic sensors can be exploited by an attacker to launch an eavesdropping attack by reconstructing intelligible speech signals. Specifically, we present PitchIn to demonstrate the feasibility of speech reconstruction from non-acoustic sensor data collected offline across networked devices. Unlike speech reconstruction which requires a high sampling frequency (e.g., > 5 KHz), typical applications using non-acoustic sensors do not rely on richly sampled data, presenting a challenge to the speech reconstruction attack. Hence, PitchIn leverages a distributed form of Time Interleaved Analog-Digital-Conversion (TI-ADC) to approximate a high sampling frequency, while maintaining low per-node sampling frequency. We demonstrate how distributed TI-ADC can be used to achieve intelligibility by processing an interleaved signal composed of different sensors across networked devices. We implement PitchIn and evaluate reconstructed speech signal intelligibility via user studies. PitchIn has word recognition accuracy as high as 79%. Though some additional work is required to improve accuracy, our results suggest that eavesdropping using a fusion of non-acoustic sensors is a real and practical threat.
尽管出现了许多物联网(IoT)应用,但最近的研究表明,用于事件和环境监测的传感器存在潜在的侧信道漏洞。在本文中,我们提出了一种新的侧信道攻击,攻击者可以利用分布式非声学传感器网络通过重建可理解的语音信号来发动窃听攻击。具体来说,我们提出PitchIn来证明从跨网络设备离线收集的非声学传感器数据中进行语音重建的可行性。与需要高采样频率(例如> 5 KHz)的语音重建不同,使用非声学传感器的典型应用不依赖于丰富的采样数据,这对语音重建攻击提出了挑战。因此,PitchIn利用时间交错模数转换(TI-ADC)的分布式形式来近似高采样频率,同时保持低每节点采样频率。我们演示了如何使用分布式TI-ADC通过处理跨网络设备的不同传感器组成的交错信号来实现可理解性。我们实现了PitchIn,并通过用户研究来评估重构语音信号的可理解性。PitchIn的单词识别准确率高达79%。虽然需要做一些额外的工作来提高准确性,但我们的研究结果表明,使用非声学传感器融合的窃听是一个真实而实际的威胁。
{"title":"PitchIn: Eavesdropping via Intelligible Speech Reconstruction Using Non-acoustic Sensor Fusion","authors":"Jun Han, Albert Jin Chung, P. Tague","doi":"10.1145/3055031.3055088","DOIUrl":"https://doi.org/10.1145/3055031.3055088","url":null,"abstract":"Despite the advent of numerous Internet-of-Things (IoT) applications, recent research demonstrates potential side-channel vulnerabilities exploiting sensors which are used for event and environment monitoring. In this paper, we propose a new side-channel attack, where a network of distributed non-acoustic sensors can be exploited by an attacker to launch an eavesdropping attack by reconstructing intelligible speech signals. Specifically, we present PitchIn to demonstrate the feasibility of speech reconstruction from non-acoustic sensor data collected offline across networked devices. Unlike speech reconstruction which requires a high sampling frequency (e.g., > 5 KHz), typical applications using non-acoustic sensors do not rely on richly sampled data, presenting a challenge to the speech reconstruction attack. Hence, PitchIn leverages a distributed form of Time Interleaved Analog-Digital-Conversion (TI-ADC) to approximate a high sampling frequency, while maintaining low per-node sampling frequency. We demonstrate how distributed TI-ADC can be used to achieve intelligibility by processing an interleaved signal composed of different sensors across networked devices. We implement PitchIn and evaluate reconstructed speech signal intelligibility via user studies. PitchIn has word recognition accuracy as high as 79%. Though some additional work is required to improve accuracy, our results suggest that eavesdropping using a fusion of non-acoustic sensors is a real and practical threat.","PeriodicalId":228318,"journal":{"name":"2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131002590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Argus: Realistic Target Coverage by Drones 阿古斯:无人机的真实目标覆盖
Ahmed Saeed, Ahmed Abdelkader, Mouhyemen Khan, A. Neishaboori, Khaled A. Harras, Amr M. Mohamed
Low-cost mini-drones with advanced sensing and maneuverability enable a new class of intelligent visual sensing systems. This potential motivated several research efforts to employ drones as standalone surveillance systems or to assist legacy deployments. However, several fundamental challenges remain unsolved including: 1) Adequate coverage of sizable targets; 2) Target orientation that render coverage effective only from certain directions; 3) Occlusion by elements in the environment, including other targets.In this paper, we present Argus, a system that provides visual coverage of wide and oriented targets, using camera-mounted drones, taking into account the challenges stated above. Argus relies on a geometric model that captures both target shapes and coverage constraints. With drones being the scarcest resource in Argus, we study the problem of minimizing the number of drones required to cover a set of such targets and derive a best-possible approximation algorithm. Building upon that, we present a sampling heuristic that performs favorably, while running up to 100x faster compared to the approximation algorithm. We implement a complete prototype of Argus to demonstrate and evaluate the proposed coverage algorithms within a fully autonomous surveillance system. Finally, we evaluate the proposed algorithms via simulations to compare their performance at scale under various conditions.
具有先进传感和机动性的低成本微型无人机使一类新的智能视觉传感系统成为可能。这种潜力激发了一些研究工作,将无人机用作独立的监视系统或辅助传统部署。然而,仍有几个根本性的挑战尚未解决,包括:1)足够覆盖相当大的目标;2)目标方向,使覆盖仅从某些方向有效;3)被环境中的元素遮挡,包括其他目标。在本文中,我们提出了Argus,一个系统,提供广泛和定向目标的视觉覆盖,使用安装摄像头的无人机,考虑到上述挑战。Argus依赖于捕获目标形状和覆盖限制的几何模型。由于无人机是Argus中最稀缺的资源,我们研究了覆盖一组这样的目标所需的无人机数量最小化的问题,并得出了最佳逼近算法。在此基础上,我们提出了一种性能良好的抽样启发式算法,与近似算法相比,它的运行速度快了100倍。我们实现了一个完整的Argus原型,以演示和评估在完全自主监视系统中提出的覆盖算法。最后,我们通过模拟来评估所提出的算法,以比较它们在各种条件下的大规模性能。
{"title":"Argus: Realistic Target Coverage by Drones","authors":"Ahmed Saeed, Ahmed Abdelkader, Mouhyemen Khan, A. Neishaboori, Khaled A. Harras, Amr M. Mohamed","doi":"10.1145/3055031.3055078","DOIUrl":"https://doi.org/10.1145/3055031.3055078","url":null,"abstract":"Low-cost mini-drones with advanced sensing and maneuverability enable a new class of intelligent visual sensing systems. This potential motivated several research efforts to employ drones as standalone surveillance systems or to assist legacy deployments. However, several fundamental challenges remain unsolved including: 1) Adequate coverage of sizable targets; 2) Target orientation that render coverage effective only from certain directions; 3) Occlusion by elements in the environment, including other targets.In this paper, we present Argus, a system that provides visual coverage of wide and oriented targets, using camera-mounted drones, taking into account the challenges stated above. Argus relies on a geometric model that captures both target shapes and coverage constraints. With drones being the scarcest resource in Argus, we study the problem of minimizing the number of drones required to cover a set of such targets and derive a best-possible approximation algorithm. Building upon that, we present a sampling heuristic that performs favorably, while running up to 100x faster compared to the approximation algorithm. We implement a complete prototype of Argus to demonstrate and evaluate the proposed coverage algorithms within a fully autonomous surveillance system. Finally, we evaluate the proposed algorithms via simulations to compare their performance at scale under various conditions.","PeriodicalId":228318,"journal":{"name":"2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124582965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
3D Through-Wall Imaging with Unmanned Aerial Vehicles Using WiFi 使用WiFi的无人机3D穿墙成像
Chitra R. Karanam, Y. Mostofi
In this paper, we are interested in the 3D through-wall imaging of a completely unknown area, using WiFi RSSI and Unmanned Aerial Vehicles (UAVs) that move outside of the area of interest to collect WiFi measurements. It is challenging to estimate a volume represented by an extremely high number of voxels with a small number of measurements. Yet many applications are time-critical and/or limited on resources, precluding extensive measurement collection. In this paper, we then propose an approach based on Markov random field modeling, loopy belief propagation, and sparse signal processing for 3D imaging based on wireless power measurements. Furthermore, we show how to design efficient aerial routes that are informative for 3D imaging. Finally, we design and implement a complete experimental testbed and show high-quality 3D robotic through-wall imaging of unknown areas with less than 4% of measurements.
在本文中,我们对完全未知区域的3D穿墙成像感兴趣,使用WiFi RSSI和无人驾驶飞行器(uav)在感兴趣的区域外移动以收集WiFi测量值。用少量的测量来估计由大量体素代表的体积是具有挑战性的。然而,许多应用程序是时间关键和/或有限的资源,排除了广泛的测量收集。在本文中,我们提出了一种基于马尔可夫随机场建模、循环信念传播和稀疏信号处理的基于无线功率测量的三维成像方法。此外,我们展示了如何设计有效的空中路线,为3D成像提供信息。最后,我们设计并实现了一个完整的实验测试平台,并以不到4%的测量量展示了未知区域的高质量3D机器人穿壁成像。
{"title":"3D Through-Wall Imaging with Unmanned Aerial Vehicles Using WiFi","authors":"Chitra R. Karanam, Y. Mostofi","doi":"10.1145/3055031.3055084","DOIUrl":"https://doi.org/10.1145/3055031.3055084","url":null,"abstract":"In this paper, we are interested in the 3D through-wall imaging of a completely unknown area, using WiFi RSSI and Unmanned Aerial Vehicles (UAVs) that move outside of the area of interest to collect WiFi measurements. It is challenging to estimate a volume represented by an extremely high number of voxels with a small number of measurements. Yet many applications are time-critical and/or limited on resources, precluding extensive measurement collection. In this paper, we then propose an approach based on Markov random field modeling, loopy belief propagation, and sparse signal processing for 3D imaging based on wireless power measurements. Furthermore, we show how to design efficient aerial routes that are informative for 3D imaging. Finally, we design and implement a complete experimental testbed and show high-quality 3D robotic through-wall imaging of unknown areas with less than 4% of measurements.","PeriodicalId":228318,"journal":{"name":"2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)","volume":"490 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116694025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
BLEnd: Practical Continuous Neighbor Discovery for Bluetooth Low Energy BLEnd:低功耗蓝牙的实用连续邻居发现
C. Julien, Chenguang Liu, A. Murphy, G. Picco
Identifying "who is around" is key in a plethora of smart scenarios. While many solutions exist, they often take a theoretical approach, reasoning about protocol behavior with an abstract model that makes simplifying assumptions about the environment. This approach creates a gap between protocol implementations and the models used during design and analysis. In this paper, we take a system approach to continuous neighbor discovery: starting with the concrete technology of Bluetooth Low Energy (BLE) we build a protocol, called BLEnd, tailored to its constraints. Moreover, we also consider the very real effects of packet collisions, to our knowledge a first in this domain. Our ultimate goal is to directly empower developers with the ability to determine the optimal protocol configuration for their applications; in this respect, the slotless operation of BLEnd offers richer alternatives than state-of-the-art protocols. Developers specify the minimum discovery probability, the target discovery latency, and the maximum expected node density; these are used by an optimizer tool to parameterize the BLEnd implementation towards maximum lifetime. This paper shows that BLEnd not only achieves the user-specified goals, but does so more efficiently than analogous configurations of competing protocols.
在众多智能场景中,识别“谁在周围”是关键。虽然存在许多解决方案,但它们通常采用理论方法,使用抽象模型对协议行为进行推理,该模型简化了对环境的假设。这种方法在协议实现和设计和分析期间使用的模型之间造成了差距。在本文中,我们采用系统方法进行连续邻居发现:从低功耗蓝牙(BLE)的具体技术开始,我们根据其约束构建了一个称为BLEnd的协议。此外,我们还考虑了数据包碰撞的真实影响,据我们所知,这是该领域的第一次。我们的最终目标是直接授权开发人员为其应用程序确定最佳协议配置的能力;在这方面,BLEnd的无槽操作提供了比最先进的协议更丰富的选择。开发人员指定最小发现概率、目标发现延迟和最大预期节点密度;优化器工具使用这些参数化BLEnd实现以获得最大的生命周期。本文表明,BLEnd不仅实现了用户指定的目标,而且比竞争协议的类似配置更有效。
{"title":"BLEnd: Practical Continuous Neighbor Discovery for Bluetooth Low Energy","authors":"C. Julien, Chenguang Liu, A. Murphy, G. Picco","doi":"10.1145/3055031.3055086","DOIUrl":"https://doi.org/10.1145/3055031.3055086","url":null,"abstract":"Identifying \"who is around\" is key in a plethora of smart scenarios. While many solutions exist, they often take a theoretical approach, reasoning about protocol behavior with an abstract model that makes simplifying assumptions about the environment. This approach creates a gap between protocol implementations and the models used during design and analysis. In this paper, we take a system approach to continuous neighbor discovery: starting with the concrete technology of Bluetooth Low Energy (BLE) we build a protocol, called BLEnd, tailored to its constraints. Moreover, we also consider the very real effects of packet collisions, to our knowledge a first in this domain. Our ultimate goal is to directly empower developers with the ability to determine the optimal protocol configuration for their applications; in this respect, the slotless operation of BLEnd offers richer alternatives than state-of-the-art protocols. Developers specify the minimum discovery probability, the target discovery latency, and the maximum expected node density; these are used by an optimizer tool to parameterize the BLEnd implementation towards maximum lifetime. This paper shows that BLEnd not only achieves the user-specified goals, but does so more efficiently than analogous configurations of competing protocols.","PeriodicalId":228318,"journal":{"name":"2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128123522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Coresets for Differentially Private K-Means Clustering and Applications to Privacy in Mobile Sensor Networks 差分私有k均值聚类的核心集及其在移动传感器网络中的应用
Dan Feldman, C. Xiang, Ruihao Zhu, D. Rus
Mobile sensor networks are a great source of data. By collecting data with mobile sensor nodes from individuals in a user community, e.g. using their smartphones, we can learn global information such as traffic congestion patterns in the city, location of key community facilities, and locations of gathering places. Can we publish and run queries on mobile sensor network databases without disclosing information about individual nodes?Differential privacy is a strong notion of privacy which guarantees that very little will be learned about individual records in the database, no matter what the attackers already know or wish to learn. Still, there is no practical system applying differential privacy algorithms for clustering points on real databases. This paper describes the construction of small coresets for computing k-means clustering of a set of points while preserving differential privacy. As a result, we give the first k-means clustering algorithm that is both differentially private, and has an approximation error that depends sub-linearly on the data's dimension d. Previous results introduced errors that are exponential in d.We implemented this algorithm and used it to create differentially private location data from GPS tracks. Specifically our algorithm allows clustering GPS databases generated from mobile nodes, while letting the user control the introduced noise due to privacy. We provide experimental results for the system and algorithms, and compare them to existing techniques. To the best of our knowledge, this is the first practical system that enables differentially private clustering on real data.
移动传感器网络是一个重要的数据来源。通过移动传感器节点收集用户社区中个人的数据,例如使用他们的智能手机,我们可以了解全球信息,例如城市交通拥堵模式,关键社区设施的位置,聚集地的位置。我们可以在不泄露单个节点信息的情况下发布和运行移动传感器网络数据库上的查询吗?差异隐私是一种强烈的隐私概念,它保证数据库中的个人记录几乎不会被了解,无论攻击者已经知道或希望了解什么。然而,目前还没有一个实用的系统将差分隐私算法应用于真实数据库上的点聚类。本文描述了计算一组点的k-均值聚类同时保持微分隐私的小核心集的构造。因此,我们给出了第一个k-means聚类算法,该算法既具有差分私有性,又具有亚线性依赖于数据维度d的近似误差。之前的结果引入了d的指数误差。我们实现了该算法并使用它来创建来自GPS轨迹的差分私有位置数据。具体来说,我们的算法允许对从移动节点生成的GPS数据库进行聚类,同时让用户控制由于隐私而引入的噪声。我们提供了系统和算法的实验结果,并与现有技术进行了比较。据我们所知,这是第一个在真实数据上实现差异化私有集群的实用系统。
{"title":"Coresets for Differentially Private K-Means Clustering and Applications to Privacy in Mobile Sensor Networks","authors":"Dan Feldman, C. Xiang, Ruihao Zhu, D. Rus","doi":"10.1145/3055031.3055090","DOIUrl":"https://doi.org/10.1145/3055031.3055090","url":null,"abstract":"Mobile sensor networks are a great source of data. By collecting data with mobile sensor nodes from individuals in a user community, e.g. using their smartphones, we can learn global information such as traffic congestion patterns in the city, location of key community facilities, and locations of gathering places. Can we publish and run queries on mobile sensor network databases without disclosing information about individual nodes?Differential privacy is a strong notion of privacy which guarantees that very little will be learned about individual records in the database, no matter what the attackers already know or wish to learn. Still, there is no practical system applying differential privacy algorithms for clustering points on real databases. This paper describes the construction of small coresets for computing k-means clustering of a set of points while preserving differential privacy. As a result, we give the first k-means clustering algorithm that is both differentially private, and has an approximation error that depends sub-linearly on the data's dimension d. Previous results introduced errors that are exponential in d.We implemented this algorithm and used it to create differentially private location data from GPS tracks. Specifically our algorithm allows clustering GPS databases generated from mobile nodes, while letting the user control the introduced noise due to privacy. We provide experimental results for the system and algorithms, and compare them to existing techniques. To the best of our knowledge, this is the first practical system that enables differentially private clustering on real data.","PeriodicalId":228318,"journal":{"name":"2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115934846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Synchronous Dynamic View Learning: A Framework for Autonomous Training of Activity Recognition Models Using Wearable Sensors 同步动态视图学习:基于可穿戴传感器的活动识别模型自主训练框架
Seyed Ali Rokni, Hassan Ghasemzadeh
Wearable technologies play a central role in human-centered Internet-of-Things applications. Wearables leverage machine learning algorithms to detect events of interest such as physical activities and medical complications. These algorithms, however, need to be retrained upon any changes in configuration of the system, such as addition/ removal of a sensor to/ from the network or displacement/ misplacement/ mis-orientation of the physical sensors on the body. We challenge this retraining model by stimulating the vision of autonomous learning with the goal of eliminating the labor-intensive, time-consuming, and highly expensive process of collecting labeled training data in dynamic environments. We propose an approach for autonomous retraining of the machine learning algorithms in real-time without need for any new labeled training data. We focus on a dynamic setting where new sensors are added to the system and worn on various body locations. We capture the inherent correlation between observations made by a static sensor view for which trained algorithms exist and the new dynamic sensor views for which an algorithm needs to be developed. By applying our real-time dynamic-view autonomous learning approach, we achieve an average accuracy of 81.1% in activity recognition using three experimental datasets. This amount of accuracy represents more than 13.8% improvement in the accuracy due to the automatic labeling of the sensor data in the newly added sensor. This performance is only 11.2% lower than the experimental upper bound where labeled training data are collected with the new sensor.
可穿戴技术在以人为中心的物联网应用中发挥着核心作用。可穿戴设备利用机器学习算法来检测感兴趣的事件,如身体活动和医疗并发症。然而,这些算法需要根据系统配置的任何变化进行重新训练,例如向网络中添加/移除传感器或身体上的物理传感器的位移/错位/错误方向。我们通过激发自主学习的愿景来挑战这种再训练模型,其目标是消除在动态环境中收集标记训练数据的劳动密集型、耗时和高度昂贵的过程。我们提出了一种机器学习算法的实时自主再训练方法,而不需要任何新的标记训练数据。我们专注于动态设置,将新的传感器添加到系统中,并佩戴在不同的身体位置。我们捕获了静态传感器视图(其中存在训练算法)和需要开发算法的新动态传感器视图(其中需要开发算法)所做观察之间的内在相关性。通过应用我们的实时动态视图自主学习方法,我们在三个实验数据集上的活动识别平均准确率达到81.1%。由于在新添加的传感器中自动标记传感器数据,这种精度表示精度提高了13.8%以上。该性能仅比使用新传感器收集标记训练数据的实验上界低11.2%。
{"title":"Synchronous Dynamic View Learning: A Framework for Autonomous Training of Activity Recognition Models Using Wearable Sensors","authors":"Seyed Ali Rokni, Hassan Ghasemzadeh","doi":"10.1145/3055031.3055087","DOIUrl":"https://doi.org/10.1145/3055031.3055087","url":null,"abstract":"Wearable technologies play a central role in human-centered Internet-of-Things applications. Wearables leverage machine learning algorithms to detect events of interest such as physical activities and medical complications. These algorithms, however, need to be retrained upon any changes in configuration of the system, such as addition/ removal of a sensor to/ from the network or displacement/ misplacement/ mis-orientation of the physical sensors on the body. We challenge this retraining model by stimulating the vision of autonomous learning with the goal of eliminating the labor-intensive, time-consuming, and highly expensive process of collecting labeled training data in dynamic environments. We propose an approach for autonomous retraining of the machine learning algorithms in real-time without need for any new labeled training data. We focus on a dynamic setting where new sensors are added to the system and worn on various body locations. We capture the inherent correlation between observations made by a static sensor view for which trained algorithms exist and the new dynamic sensor views for which an algorithm needs to be developed. By applying our real-time dynamic-view autonomous learning approach, we achieve an average accuracy of 81.1% in activity recognition using three experimental datasets. This amount of accuracy represents more than 13.8% improvement in the accuracy due to the automatic labeling of the sensor data in the newly added sensor. This performance is only 11.2% lower than the experimental upper bound where labeled training data are collected with the new sensor.","PeriodicalId":228318,"journal":{"name":"2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122500229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
HarvOS: Efficient Code Instrumentation for Transiently-Powered Embedded Sensing HarvOS:瞬态供电嵌入式传感的高效代码检测
Naveed Anwar Bhatti, L. Mottola
We present code instrumentation strategies to allow transiently-powered embedded sensing devices efficiently checkpoint the system’s state before energy is exhausted. Our solution, called HarvOS, operates at compile-time with limited developer intervention based on the control-flow graph of a program, while adapting to varying levels of remaining energy and possible program executions at run-time. In addition, the underlying design rationale allows the system to spare the energy-intensive probing of the energy buffer whenever possible. Compared to existing approaches, our evaluation indicates that HarvOS allows transiently-powered devices to complete a given workload with 68% fewer checkpoints, on average. Moreover, our performance in the number of required checkpoints rests only 19% far from that of an “oracle” that represents an ideal solution, yet unfeasible in practice, that knows exactly the last point in time when to checkpoint.
我们提出了代码检测策略,允许瞬态供电的嵌入式传感设备在能量耗尽之前有效地检查系统的状态。我们的解决方案称为HarvOS,它在编译时运行,基于程序的控制流图,开发人员干预有限,同时在运行时适应不同水平的剩余能量和可能的程序执行。此外,潜在的设计原理允许系统在可能的情况下节省能量缓冲的能量密集型探测。与现有方法相比,我们的评估表明,HarvOS允许瞬态供电设备平均减少68%的检查点来完成给定的工作负载。此外,我们在所需检查点数量上的性能仅比代表理想解决方案的“oracle”差19%,但在实践中是不可行的,因为它确切地知道检查点的最后一个时间点。
{"title":"HarvOS: Efficient Code Instrumentation for Transiently-Powered Embedded Sensing","authors":"Naveed Anwar Bhatti, L. Mottola","doi":"10.1145/3055031.3055082","DOIUrl":"https://doi.org/10.1145/3055031.3055082","url":null,"abstract":"We present code instrumentation strategies to allow transiently-powered embedded sensing devices efficiently checkpoint the system’s state before energy is exhausted. Our solution, called HarvOS, operates at compile-time with limited developer intervention based on the control-flow graph of a program, while adapting to varying levels of remaining energy and possible program executions at run-time. In addition, the underlying design rationale allows the system to spare the energy-intensive probing of the energy buffer whenever possible. Compared to existing approaches, our evaluation indicates that HarvOS allows transiently-powered devices to complete a given workload with 68% fewer checkpoints, on average. Moreover, our performance in the number of required checkpoints rests only 19% far from that of an “oracle” that represents an ideal solution, yet unfeasible in practice, that knows exactly the last point in time when to checkpoint.","PeriodicalId":228318,"journal":{"name":"2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131971977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 111
Fast and Robust GPS Fix Using One Millisecond of Data 快速和强大的GPS定位使用一毫秒的数据
Pascal Bissig, M. Eichelberger, Roger Wattenhofer
GPS is used for outdoor localization in a large variety of applications. Current receivers consume too much power for energy-constrained situations like continuous location tracking on small wearable devices. Mainly, this is due to the large amount of GPS signal that has to be decoded to compute the first position fix. While Coarse-Time Navigation (CTN) can reduce the necessary signal to a few milliseconds, it is not robust to noise. Collective Detection (CD) of satellites can mitigate noise to some degree, but the basic method is computationally expensive.We show how CD can be solved optimally and efficiently.Furthermore, we improve the accuracy of CD by exploiting the shape of the likelihood function.All our results are based on real-world signal observations and we achieve localization accuracies of less than 25 meters using a single millisecond of signal.When using 10 consecutive millisecond samples the accuracy improves to less than 10 meters.
GPS在各种各样的应用中用于户外定位。目前的接收器在能量有限的情况下消耗太多的能量,比如在小型可穿戴设备上进行连续的位置跟踪。这主要是由于需要解码大量GPS信号来计算第一个定位。虽然粗时导航(CTN)可以将必要的信号减少到几毫秒,但它对噪声的鲁棒性较差。卫星集体探测(CD)可以在一定程度上缓解噪声,但其基本方法计算成本高。我们将展示如何优化和有效地解决CD问题。此外,我们利用似然函数的形状来提高CD的精度。我们所有的结果都是基于真实世界的信号观测,我们使用一毫秒的信号实现了小于25米的定位精度。当使用10个连续的毫秒样本时,精度提高到10米以下。
{"title":"Fast and Robust GPS Fix Using One Millisecond of Data","authors":"Pascal Bissig, M. Eichelberger, Roger Wattenhofer","doi":"10.1145/3055031.3055083","DOIUrl":"https://doi.org/10.1145/3055031.3055083","url":null,"abstract":"GPS is used for outdoor localization in a large variety of applications. Current receivers consume too much power for energy-constrained situations like continuous location tracking on small wearable devices. Mainly, this is due to the large amount of GPS signal that has to be decoded to compute the first position fix. While Coarse-Time Navigation (CTN) can reduce the necessary signal to a few milliseconds, it is not robust to noise. Collective Detection (CD) of satellites can mitigate noise to some degree, but the basic method is computationally expensive.We show how CD can be solved optimally and efficiently.Furthermore, we improve the accuracy of CD by exploiting the shape of the likelihood function.All our results are based on real-world signal observations and we achieve localization accuracies of less than 25 meters using a single millisecond of signal.When using 10 consecutive millisecond samples the accuracy improves to less than 10 meters.","PeriodicalId":228318,"journal":{"name":"2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123365512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Kryptein: A Compressive-Sensing-Based Encryption Scheme for the Internet of Things Kryptein:一个基于压缩感知的物联网加密方案
Wanli Xue, Chengwen Luo, Guohao Lan, R. Rana, Wen Hu, A. Seneviratne
Internet ofThings (IoT) is flourishing and has penetrated deeply into people’s daily life. With the seamless connection to the physical world, IoT provides tremendous opportunities to a wide range of applications. However, potential risks exist when the IoT system collects sensor data and uploads it to the cloud.The leakage of private data can be severe with curious database administrator or malicious hackers who compromise the cloud. In this work, we propose Kryptein, a compressive-sensing-based encryption scheme for cloud-enabled IoT systems to secure the interaction between the IoT devices and the cloud. Kryptein supports random compressed encryption, statistical decryption, and accurate raw data decryption. According to our evaluation based on two real datasets, Kryptein provides strong protection to the data. It is 250 times faster than other state-of-the-art systems and incurs 120 times less energy consumption.e performance of Kryptein is also measured on off -the-shelf IoT devices, and the result shows Kryptein can run efficiently on IoT devices.
物联网正在蓬勃发展,并已深入到人们的日常生活中。通过与物理世界的无缝连接,物联网为广泛的应用提供了巨大的机会。然而,当物联网系统收集传感器数据并将其上传到云端时,存在潜在风险。对于好奇的数据库管理员或破坏云的恶意黑客来说,私人数据的泄露可能会很严重。在这项工作中,我们提出了Kryptein,这是一种基于压缩感知的加密方案,用于支持云的物联网系统,以保护物联网设备与云之间的交互。Kryptein支持随机压缩加密,统计解密和准确的原始数据解密。根据我们基于两个真实数据集的评估,Kryptein对数据提供了强大的保护。它比其他最先进的系统快250倍,能耗减少120倍。Kryptein的性能也在现成的物联网设备上进行了测量,结果表明Kryptein可以在物联网设备上高效运行。
{"title":"Kryptein: A Compressive-Sensing-Based Encryption Scheme for the Internet of Things","authors":"Wanli Xue, Chengwen Luo, Guohao Lan, R. Rana, Wen Hu, A. Seneviratne","doi":"10.1145/3055031.3055079","DOIUrl":"https://doi.org/10.1145/3055031.3055079","url":null,"abstract":"Internet ofThings (IoT) is flourishing and has penetrated deeply into people’s daily life. With the seamless connection to the physical world, IoT provides tremendous opportunities to a wide range of applications. However, potential risks exist when the IoT system collects sensor data and uploads it to the cloud.The leakage of private data can be severe with curious database administrator or malicious hackers who compromise the cloud. In this work, we propose Kryptein, a compressive-sensing-based encryption scheme for cloud-enabled IoT systems to secure the interaction between the IoT devices and the cloud. Kryptein supports random compressed encryption, statistical decryption, and accurate raw data decryption. According to our evaluation based on two real datasets, Kryptein provides strong protection to the data. It is 250 times faster than other state-of-the-art systems and incurs 120 times less energy consumption.e performance of Kryptein is also measured on off -the-shelf IoT devices, and the result shows Kryptein can run efficiently on IoT devices.","PeriodicalId":228318,"journal":{"name":"2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124664269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
期刊
2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1