Pub Date : 2023-01-03DOI: 10.1109/IMCOM56909.2023.10035546
Shah M. Mahir, Graham Koch, J. Herne, John J. Lee
With the rise of energy consumption, especially in the manufacturing sector, energy management systems are being developed to increase the energy efficiency of smart buildings and factories. These energy management systems are able to derive energy consumption parameters and visualize environmental data collected from a data acquisition platform. Internet of Things (loT) technologies can be used to acquire this data, but will face challenges in industrial settings-lack of cyber secure communication, poor scalability, and minimal back-end functionality are to name a few. This paper presents a data acquisition platform for industrial energy management that combats these loT challenges. The implemented platform utilizes the Message Queuing Telemetry Transport (MQTT) protocol to establish fast and simple communication between constrained loT devices. A home automation platform called open Home Automation Bus (openHAB) is utilized as an integration platform due to its balance between functionality and user experience. However, since openHAB does not offer end-to-end payload encryption for MQTT, a method of secure communication to and from openHAB is developed using AES-128 and XChaCha20 algorithms. To improve loT scalability, a method of dynamic sensor configuration is also developed, which mitigates open-HAB configuration time. Finally, though many databases are supported, Influx Database (InfluxDB) is integrated alongside openHAB to collect and analyze sensor data. The study concludes that the implemented system provides a data acquisition platform with sensor data storage and secure communication for easy integration and use in buildings or smart factories.
{"title":"Data Acquisition Platform for The Energy Management of Smart Factories and Buildings","authors":"Shah M. Mahir, Graham Koch, J. Herne, John J. Lee","doi":"10.1109/IMCOM56909.2023.10035546","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035546","url":null,"abstract":"With the rise of energy consumption, especially in the manufacturing sector, energy management systems are being developed to increase the energy efficiency of smart buildings and factories. These energy management systems are able to derive energy consumption parameters and visualize environmental data collected from a data acquisition platform. Internet of Things (loT) technologies can be used to acquire this data, but will face challenges in industrial settings-lack of cyber secure communication, poor scalability, and minimal back-end functionality are to name a few. This paper presents a data acquisition platform for industrial energy management that combats these loT challenges. The implemented platform utilizes the Message Queuing Telemetry Transport (MQTT) protocol to establish fast and simple communication between constrained loT devices. A home automation platform called open Home Automation Bus (openHAB) is utilized as an integration platform due to its balance between functionality and user experience. However, since openHAB does not offer end-to-end payload encryption for MQTT, a method of secure communication to and from openHAB is developed using AES-128 and XChaCha20 algorithms. To improve loT scalability, a method of dynamic sensor configuration is also developed, which mitigates open-HAB configuration time. Finally, though many databases are supported, Influx Database (InfluxDB) is integrated alongside openHAB to collect and analyze sensor data. The study concludes that the implemented system provides a data acquisition platform with sensor data storage and secure communication for easy integration and use in buildings or smart factories.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115142292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-03DOI: 10.1109/IMCOM56909.2023.10035591
Taleni Shirley Andjamba, G. Lusilao-Zodi
Video streaming has emerged to become an essential component of communication methods on the internet. However, streaming of video still faces a number of challenges. The transmission of video content over the Internet entails stringent bandwidth, delay and jitter requirements to guarantee better visual quality. The Internet, however, only offers best effort service that does not guarantee any requirement in terms of delay, loss and bandwidth, making video streaming very complicated to achieve. Existing routing protocols do not always offer assurance that certain quality of service will be met. In order to improve video streaming, it was proposed to transform the cloud architecture and its operations by incorporating the software-defined network approach. This also suggests a rethink in the design of routing protocols for video streaming. Several software-defined networks-based routing algorithms are proposed, however they do not always address the viewer's demand for a certain quality. This research introduces the Load Balancing Routing Protocol (LBRP) as an adaptive routing protocol that improves user-experience of stored video streaming applications. LBRP accomplishes routing by considering parameters such as link capacity and re-routing non-real-time traffic towards under utilized links. The performance of LBRP was tested using Mininet and taking into consideration metrics such as bandwidth distribution, throughput and delay. The results showed that LBRP gives precedence to real time traffic over non-real-time traffic in the network providing improved viewing experience for the user.
{"title":"A Load Balancing Protocol for Improved Video on Demand in SDN-Based Clouds","authors":"Taleni Shirley Andjamba, G. Lusilao-Zodi","doi":"10.1109/IMCOM56909.2023.10035591","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035591","url":null,"abstract":"Video streaming has emerged to become an essential component of communication methods on the internet. However, streaming of video still faces a number of challenges. The transmission of video content over the Internet entails stringent bandwidth, delay and jitter requirements to guarantee better visual quality. The Internet, however, only offers best effort service that does not guarantee any requirement in terms of delay, loss and bandwidth, making video streaming very complicated to achieve. Existing routing protocols do not always offer assurance that certain quality of service will be met. In order to improve video streaming, it was proposed to transform the cloud architecture and its operations by incorporating the software-defined network approach. This also suggests a rethink in the design of routing protocols for video streaming. Several software-defined networks-based routing algorithms are proposed, however they do not always address the viewer's demand for a certain quality. This research introduces the Load Balancing Routing Protocol (LBRP) as an adaptive routing protocol that improves user-experience of stored video streaming applications. LBRP accomplishes routing by considering parameters such as link capacity and re-routing non-real-time traffic towards under utilized links. The performance of LBRP was tested using Mininet and taking into consideration metrics such as bandwidth distribution, throughput and delay. The results showed that LBRP gives precedence to real time traffic over non-real-time traffic in the network providing improved viewing experience for the user.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121812721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-03DOI: 10.1109/IMCOM56909.2023.10035611
D. Balcha, I. Rahyadi, Ayu Agung Mirah Krisnawati, Rifa Bestari
In this study, the utilization of social media platforms was investigated out of three well-known Czech television stations using daily-based data on the Instagram official accounts of the stations, which involves a lengthy sample period from July 2021 to August 2022. The main contribution of this paper is that the study is a novel examination of Czech Republic television stations on the popular image-sharing social media while taking into account trend and entertainment conditions, and their presentability over different content and messages. The results indicate that several content strategy patterns such as how snapshots of TV program sets can produce a significant positive engagement from fans of the programs over certain parts of the shows. In addition, the results show that none of the content posted on the accounts which were examined contained a low-quality image. However, without considering trends and entertainment conditions, this study finds that social media is another media over digital spaces that has superior benefits if it is applied as an extension media for the television industry. The robustness of our results is confirmed based on qualitative analysis and several television stations samples. The findings of this study are beneficial for the social media practitioners engaged in the practice of diverse social media.
{"title":"Cultivating Social Media Utilization by Television Stations: An Analysis of Instagram Practices in Czech Republic","authors":"D. Balcha, I. Rahyadi, Ayu Agung Mirah Krisnawati, Rifa Bestari","doi":"10.1109/IMCOM56909.2023.10035611","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035611","url":null,"abstract":"In this study, the utilization of social media platforms was investigated out of three well-known Czech television stations using daily-based data on the Instagram official accounts of the stations, which involves a lengthy sample period from July 2021 to August 2022. The main contribution of this paper is that the study is a novel examination of Czech Republic television stations on the popular image-sharing social media while taking into account trend and entertainment conditions, and their presentability over different content and messages. The results indicate that several content strategy patterns such as how snapshots of TV program sets can produce a significant positive engagement from fans of the programs over certain parts of the shows. In addition, the results show that none of the content posted on the accounts which were examined contained a low-quality image. However, without considering trends and entertainment conditions, this study finds that social media is another media over digital spaces that has superior benefits if it is applied as an extension media for the television industry. The robustness of our results is confirmed based on qualitative analysis and several television stations samples. The findings of this study are beneficial for the social media practitioners engaged in the practice of diverse social media.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126624185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-03DOI: 10.1109/IMCOM56909.2023.10035640
Chindy Jessika Trielsa, M. Angeline
E-commerce users in Indonesia come from diverse backgrounds, including people with special needs. Therefore, accessibility to digital products, such as e-commerce platforms, needs to be increased. This study aims to determine whether the inclusive design has a positive influence on the accessibility of e-commerce users with disabilities in Indonesia. This study focuses on three types of disabilities such as low vision, physical navigation, and hearing loss. The study used a quantitative approach with a survey and statistical analysis. The findings indicate inclusive design has a strong association and mutually influences accessibility by 62%. By implementing inclusive design, e-commerce platforms may benefit from increased sales and usage among people with disabilities.
{"title":"The Effect of Inclusive Design on Easy Accessibility for Disabled E-Commerce Users in Indonesia","authors":"Chindy Jessika Trielsa, M. Angeline","doi":"10.1109/IMCOM56909.2023.10035640","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035640","url":null,"abstract":"E-commerce users in Indonesia come from diverse backgrounds, including people with special needs. Therefore, accessibility to digital products, such as e-commerce platforms, needs to be increased. This study aims to determine whether the inclusive design has a positive influence on the accessibility of e-commerce users with disabilities in Indonesia. This study focuses on three types of disabilities such as low vision, physical navigation, and hearing loss. The study used a quantitative approach with a survey and statistical analysis. The findings indicate inclusive design has a strong association and mutually influences accessibility by 62%. By implementing inclusive design, e-commerce platforms may benefit from increased sales and usage among people with disabilities.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122404806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-03DOI: 10.1109/IMCOM56909.2023.10035618
Riva Malik, Kifayat-Ullah Khan, Waqas Nawaz
Multi-document Summarization(MDS) involves ex-traction of salient information from multiple documents to represent it in a compressed yet comprehensible form. Existing approaches towards MDS utilize deep learning models. These approaches are data hungry and employ the complete search space of input documents for generating summaries. On the other hand, frequent subgraph mining(FSM) can be utilized as an unsupervised approach to reduce the search space where only the frequent subgraphs are considered as representative of documents. gSpan is a state-of-the-art FSM algorithm. The problem with using gSpan for generating subgraphs towards summarization is that the resultant subgraphs contain repetitive words that affects summary. To cater this problem, we propose Maximal gSpan, an extension of gSpan that mines maximal frequent subgraphs. These subgraphs contain diverse words hence resulting in better document coverage for summarization. The sentences of the summary are selected from these subgraphs. The proposed approach achieves better results in terms of sum-marization evaluation metric, i.e., ROUGE scores, compared with TextRank, which is another unsupervised graph-based extractive summarization technique.
{"title":"Maximal gSpan: Multi-Document Summarization through Frequent Subgraph Mining","authors":"Riva Malik, Kifayat-Ullah Khan, Waqas Nawaz","doi":"10.1109/IMCOM56909.2023.10035618","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035618","url":null,"abstract":"Multi-document Summarization(MDS) involves ex-traction of salient information from multiple documents to represent it in a compressed yet comprehensible form. Existing approaches towards MDS utilize deep learning models. These approaches are data hungry and employ the complete search space of input documents for generating summaries. On the other hand, frequent subgraph mining(FSM) can be utilized as an unsupervised approach to reduce the search space where only the frequent subgraphs are considered as representative of documents. gSpan is a state-of-the-art FSM algorithm. The problem with using gSpan for generating subgraphs towards summarization is that the resultant subgraphs contain repetitive words that affects summary. To cater this problem, we propose Maximal gSpan, an extension of gSpan that mines maximal frequent subgraphs. These subgraphs contain diverse words hence resulting in better document coverage for summarization. The sentences of the summary are selected from these subgraphs. The proposed approach achieves better results in terms of sum-marization evaluation metric, i.e., ROUGE scores, compared with TextRank, which is another unsupervised graph-based extractive summarization technique.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"94 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128389561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-03DOI: 10.1109/IMCOM56909.2023.10035608
Gyurin Byun, S. M. Raza, Hui-Lin Yang, Moonseong Kim, Hyunseung Choo
Network Traffic prediction is the prerequisite for proactive traffic management, where a longer duration and high accuracy of prediction ensures a more effective solution. This paper exploits Generative Adversarial Network (GAN) architecture to propose a model that utilizes spatiotemporal features in network traffic data for extended prediction of future traffic. The generator in GAN consists of a Convolutional Long Short-Term Memory (ConvLSTM) model for predicting network traffic, while the discriminator uses Convolutional Neural Network (CNN) model that provides feedback to the generator for training. The experiments based on network traces show that the proposed model reduces the error by 12% compared to the baseline model while predicting next 48 mins of network traffic.
{"title":"GAN vs. LSTM: Network State Prediction","authors":"Gyurin Byun, S. M. Raza, Hui-Lin Yang, Moonseong Kim, Hyunseung Choo","doi":"10.1109/IMCOM56909.2023.10035608","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035608","url":null,"abstract":"Network Traffic prediction is the prerequisite for proactive traffic management, where a longer duration and high accuracy of prediction ensures a more effective solution. This paper exploits Generative Adversarial Network (GAN) architecture to propose a model that utilizes spatiotemporal features in network traffic data for extended prediction of future traffic. The generator in GAN consists of a Convolutional Long Short-Term Memory (ConvLSTM) model for predicting network traffic, while the discriminator uses Convolutional Neural Network (CNN) model that provides feedback to the generator for training. The experiments based on network traces show that the proposed model reduces the error by 12% compared to the baseline model while predicting next 48 mins of network traffic.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128242687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-03DOI: 10.1109/IMCOM56909.2023.10035664
Y. Do, Minho Kim, Jonghun Kim, Jaewook Jeon
The application of a program-based control method using an Electronic Control Unit (ECU) for mechanical control has improved the reliability and performance of vehicles. However, vehicle network structures are becoming increasingly complex. Consequently, the current central gateway method is in the process of changing from a domain-based structure to a zone-based network. The Institute of Electrical and Electronics Engineers IEEE 802.1 group announced Time-Sensitive Networking (TSN) in line with the changing vehicle network system. TSN uses the IEEE 802.1Qav, IEEE 802.1Qbv, and IEEE 802.1Qbu protocols to achieve bounded low latency. Estimating the guard band area is essential when applying the IEEE 802.1 Qav protocol. This is because if the audio, video, and text frames are long or the transmission time is insufficient, the scheduled traffic area, where the control data are transmitted, might be invaded by the guard band area. A preemption function can be used to prevent such problems; however, to do so, additional processing time is required to divide or recombine frames. In addition, it is necessary to separate the divided frames and the required header for the re-assembly process. Subsequently, the preemption function can be used to minimize the guard band area, reduce the number of preemption occurrences, and increase the efficiency of the network. In this study, to solve the above-mentioned problem, we propose a method to explore the frame preemption and to reduce the number of preemptions that may occur in a specific situation. As a result, the number of preemption occurrences could be reduced by 87% by applying the proposed method.
{"title":"Method and Analysis for the Improvement of Preemption Performance in IEEE 802.1 TSN","authors":"Y. Do, Minho Kim, Jonghun Kim, Jaewook Jeon","doi":"10.1109/IMCOM56909.2023.10035664","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035664","url":null,"abstract":"The application of a program-based control method using an Electronic Control Unit (ECU) for mechanical control has improved the reliability and performance of vehicles. However, vehicle network structures are becoming increasingly complex. Consequently, the current central gateway method is in the process of changing from a domain-based structure to a zone-based network. The Institute of Electrical and Electronics Engineers IEEE 802.1 group announced Time-Sensitive Networking (TSN) in line with the changing vehicle network system. TSN uses the IEEE 802.1Qav, IEEE 802.1Qbv, and IEEE 802.1Qbu protocols to achieve bounded low latency. Estimating the guard band area is essential when applying the IEEE 802.1 Qav protocol. This is because if the audio, video, and text frames are long or the transmission time is insufficient, the scheduled traffic area, where the control data are transmitted, might be invaded by the guard band area. A preemption function can be used to prevent such problems; however, to do so, additional processing time is required to divide or recombine frames. In addition, it is necessary to separate the divided frames and the required header for the re-assembly process. Subsequently, the preemption function can be used to minimize the guard band area, reduce the number of preemption occurrences, and increase the efficiency of the network. In this study, to solve the above-mentioned problem, we propose a method to explore the frame preemption and to reduce the number of preemptions that may occur in a specific situation. As a result, the number of preemption occurrences could be reduced by 87% by applying the proposed method.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126275765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-03DOI: 10.1109/IMCOM56909.2023.10035661
Muyuan Niu, Yaokai Feng, K. Sakurai
Software-defined networking (SDN) has received a lot of attention in academia and industry in recent years, and DDoS attacks are still one of the most dangerous threats. As cyberattacks become more sophisticated, detection systems also become more complex and computationally intensive, for example, Deep Learning-based detection. Against this background, two-stage detection is proposed, in which a trigger is introduced before the complex detection being invoked. That is, the heavy detection module is called only when the requirements in the trigger are satisfied. Clearly, the triggering mechanism plays an important role in such detection systems as it determines when the second stage is invoked. Most of the existing relevant studies utilize one feature and a fixed threshold. However, it is not easy to predefine suitable thresholds in practice, and one feature is often not sufficient for effective trigger conditions that have a significant impact on detection performance of the whole detection system. The latest related work uses dynamic thresholding, but still only one feature, and the threshold adaptation mechanism is too simplistic, which make it too difficult to be used in real applications. Moreover, the performance of the approach in the most of related works are verified only using simulated data. In this study, we increase the number of features and optimized the threshold adjustment method in the trigger. In addition, in the detection module of the second stage, six features carefully determined from traffic bytes, packets, and IP addresses are used. The performance of the proposal is demonstrated in a simulated SDN environment using a public dataset. The experimental results indicate that the times of calling the computationally intensive detection module is significantly reduced, while at the same time the detection performance of the overall system is not degraded.
{"title":"A two-stage detection system of DDoS attacks in SDN using a trigger with multiple features and self-adaptive thresholds","authors":"Muyuan Niu, Yaokai Feng, K. Sakurai","doi":"10.1109/IMCOM56909.2023.10035661","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035661","url":null,"abstract":"Software-defined networking (SDN) has received a lot of attention in academia and industry in recent years, and DDoS attacks are still one of the most dangerous threats. As cyberattacks become more sophisticated, detection systems also become more complex and computationally intensive, for example, Deep Learning-based detection. Against this background, two-stage detection is proposed, in which a trigger is introduced before the complex detection being invoked. That is, the heavy detection module is called only when the requirements in the trigger are satisfied. Clearly, the triggering mechanism plays an important role in such detection systems as it determines when the second stage is invoked. Most of the existing relevant studies utilize one feature and a fixed threshold. However, it is not easy to predefine suitable thresholds in practice, and one feature is often not sufficient for effective trigger conditions that have a significant impact on detection performance of the whole detection system. The latest related work uses dynamic thresholding, but still only one feature, and the threshold adaptation mechanism is too simplistic, which make it too difficult to be used in real applications. Moreover, the performance of the approach in the most of related works are verified only using simulated data. In this study, we increase the number of features and optimized the threshold adjustment method in the trigger. In addition, in the detection module of the second stage, six features carefully determined from traffic bytes, packets, and IP addresses are used. The performance of the proposal is demonstrated in a simulated SDN environment using a public dataset. The experimental results indicate that the times of calling the computationally intensive detection module is significantly reduced, while at the same time the detection performance of the overall system is not degraded.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121621979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-03DOI: 10.1109/IMCOM56909.2023.10035619
Graham Koch, Shah M. Mahir, Stanley Y. P. Chien, J. Herne, Audrey Cheshire, John J. Lee
The management of energy consumption in the industrial field has never been more important. As energy consumption increases, so does society's need to curb it. Many energy management systems have been developed to do just that, but often are expensive with fixed node functionality. These limitations can be overcome with an Internet of Things (IoT) implementation of a universal sensor node. This study aims to develop a low cost, user friendly implementation of an IoT sensor node that supports various sensors and their communication protocols including 1-Wire, I2C, SPI, and UART to be used in an energy management systems. Such a goal is accomplished by developing a no-programming configurable sensor node that utilizes the Z-Wave plus wireless communication protocol and Commercial Off The Shelf (COTS) products. This improves functionality and reduces overall system costs. To make the device more user friendly, the authors develop software architecture that configures sensors by reading Dual In-line Package (DIP) switch inputs, which relieves the user of any programming. Through the testing process, the Z-Uno board on the market was found to be the most applicable piece of hardware to implement the architecture. It is proven that the proposed approach can be a viable option for building simple, user-friendly IoT-based no-programming sensor nodes.
{"title":"No Programming, Configurable Z-Wave Node with Multi-Sensor-Protocol Support","authors":"Graham Koch, Shah M. Mahir, Stanley Y. P. Chien, J. Herne, Audrey Cheshire, John J. Lee","doi":"10.1109/IMCOM56909.2023.10035619","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035619","url":null,"abstract":"The management of energy consumption in the industrial field has never been more important. As energy consumption increases, so does society's need to curb it. Many energy management systems have been developed to do just that, but often are expensive with fixed node functionality. These limitations can be overcome with an Internet of Things (IoT) implementation of a universal sensor node. This study aims to develop a low cost, user friendly implementation of an IoT sensor node that supports various sensors and their communication protocols including 1-Wire, I2C, SPI, and UART to be used in an energy management systems. Such a goal is accomplished by developing a no-programming configurable sensor node that utilizes the Z-Wave plus wireless communication protocol and Commercial Off The Shelf (COTS) products. This improves functionality and reduces overall system costs. To make the device more user friendly, the authors develop software architecture that configures sensors by reading Dual In-line Package (DIP) switch inputs, which relieves the user of any programming. Through the testing process, the Z-Uno board on the market was found to be the most applicable piece of hardware to implement the architecture. It is proven that the proposed approach can be a viable option for building simple, user-friendly IoT-based no-programming sensor nodes.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127575693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-03DOI: 10.1109/IMCOM56909.2023.10035629
S. Oh, Min Jeong Lee, Jaewook Jeon
Controller area network (CAN) data-reduction techniques have been developed to reduce CAN bus loads, which have increased due to the large number of electronic control units in modern automobiles. Automotive communication uses various in-vehicle network. These techniques make it possible that same information to be sent using less bandwidth. However, the existing CAN DR algorithms only consider the CAN network. Automotive communication uses various in-vehicle network (IVN) protocols such as CAN, FlexRay, and Ethernet. The use of DR techniques may cause compatibility issue in heterogenous IVNs. This paper proposes a gateway system for data-reduced communication between Ethernet and CAN systems with data-reduction. The proposed gateway system receives a compressed CAN message, decompresses it, and transmits it to the Ethernet network. Additionally, the gateway receives a normal Ethernet message, compresses it, and transmits it to the CAN protocol. An evaluation of the performance of the developed gateway system is also presented.
{"title":"Efficient Data Communication Automotive Gateway System for CAN-Ethernet Networks","authors":"S. Oh, Min Jeong Lee, Jaewook Jeon","doi":"10.1109/IMCOM56909.2023.10035629","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035629","url":null,"abstract":"Controller area network (CAN) data-reduction techniques have been developed to reduce CAN bus loads, which have increased due to the large number of electronic control units in modern automobiles. Automotive communication uses various in-vehicle network. These techniques make it possible that same information to be sent using less bandwidth. However, the existing CAN DR algorithms only consider the CAN network. Automotive communication uses various in-vehicle network (IVN) protocols such as CAN, FlexRay, and Ethernet. The use of DR techniques may cause compatibility issue in heterogenous IVNs. This paper proposes a gateway system for data-reduced communication between Ethernet and CAN systems with data-reduction. The proposed gateway system receives a compressed CAN message, decompresses it, and transmits it to the Ethernet network. Additionally, the gateway receives a normal Ethernet message, compresses it, and transmits it to the CAN protocol. An evaluation of the performance of the developed gateway system is also presented.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131051569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}