首页 > 最新文献

2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)最新文献

英文 中文
Multi-layer Approach to Internet of Things (IoT) Security 物联网(IoT)安全的多层方法
Pub Date : 2019-08-01 DOI: 10.1109/FiCloud.2019.00023
Yusuf Muhammad Tukur, D. Thakker, I. Awan
The Internet of Things (IoT) is a huge, global, distributed network of interlinked heterogeneous devices armed with embedded sensors, actuators and processors enabling them to connect to the internet, exchange data, communicate and interact seamlessly with one another in real time. It enjoys wide range of applications where it holds important data, hence becoming exposed to varying degrees of security and privacy threats which require careful architectural design to address. Consequently, we present in this paper a multi-layer security aware IoT architecture that aims to secure the entire system by providing security at all layers to ensure secure data collection, transfer, analysis, storage and usage. That is necessary because each layer of the IoT has vulnerabilities and a successful attack on any layer can have far-reaching impact on the whole system. We then proposed a novel security algorithm to protect the IoT system against Denial of Service (DoS) attacks at the application layer, the weakest link in IoT. The algorithm logs record of user activities and actions at given times of the day which it employs to regulate access and prevent DoS attacks. Finally, we evaluated our proposed approach against IoT security and privacy requirements, and it demonstrated better level of security.
物联网(IoT)是一个巨大的、全球性的分布式网络,由相互连接的异构设备组成,这些设备配备了嵌入式传感器、执行器和处理器,使它们能够实时连接到互联网、交换数据、通信和相互无缝交互。它拥有广泛的应用程序,其中包含重要数据,因此暴露于不同程度的安全和隐私威胁,需要仔细的架构设计来解决。因此,我们在本文中提出了一个多层安全意识的物联网架构,旨在通过在所有层提供安全性来确保整个系统的安全,以确保安全的数据收集,传输,分析,存储和使用。这是必要的,因为物联网的每一层都有漏洞,对任何一层的成功攻击都可能对整个系统产生深远的影响。然后,我们提出了一种新的安全算法,以保护物联网系统免受应用层(物联网中最薄弱的环节)的拒绝服务(DoS)攻击。该算法记录了用户在一天中给定时间的活动和操作记录,用于规范访问和防止DoS攻击。最后,我们根据物联网安全和隐私要求评估了我们提出的方法,并证明了更好的安全水平。
{"title":"Multi-layer Approach to Internet of Things (IoT) Security","authors":"Yusuf Muhammad Tukur, D. Thakker, I. Awan","doi":"10.1109/FiCloud.2019.00023","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00023","url":null,"abstract":"The Internet of Things (IoT) is a huge, global, distributed network of interlinked heterogeneous devices armed with embedded sensors, actuators and processors enabling them to connect to the internet, exchange data, communicate and interact seamlessly with one another in real time. It enjoys wide range of applications where it holds important data, hence becoming exposed to varying degrees of security and privacy threats which require careful architectural design to address. Consequently, we present in this paper a multi-layer security aware IoT architecture that aims to secure the entire system by providing security at all layers to ensure secure data collection, transfer, analysis, storage and usage. That is necessary because each layer of the IoT has vulnerabilities and a successful attack on any layer can have far-reaching impact on the whole system. We then proposed a novel security algorithm to protect the IoT system against Denial of Service (DoS) attacks at the application layer, the weakest link in IoT. The algorithm logs record of user activities and actions at given times of the day which it employs to regulate access and prevent DoS attacks. Finally, we evaluated our proposed approach against IoT security and privacy requirements, and it demonstrated better level of security.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125332275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Packet Routing Based on Integral Normalized Criterion 基于积分归一化准则的分组路由
Pub Date : 2019-08-01 DOI: 10.1109/FiCloud.2019.00064
M. Greguš, O. Liskevych, K. Obelovska, Roman S. Panchyshyn
The modified algorithm for constructing routing tables based on the open shortest path first protocol is proposed. It takes into account three criteria: the channels capacity, the number of intermediate nodes on the path and signal propagation delay. The integral criterion to minimize the total relative deviation, calculated on all three criteria, obtained from optimal values as a result of optimization according to separate criteria is proposed. In addition, it is proposed to use weight coefficients for each criterion. The integral criterion includes the normalized values of the ordinary criteria and their weights. The integral criteria must be determined for each metric. The path to be added to the resulting routing table is the one with the best integral criterion.
提出了一种基于开放最短路径优先协议的路由表构造改进算法。它考虑了三个标准:信道容量、路径上的中间节点数量和信号传播延迟。提出了根据独立准则进行优化得到的最优值,并在三个准则上计算出最小总相对偏差的积分准则。此外,还提出了对每个准则使用权系数的方法。积分准则包括普通准则的归一化值及其权重。必须为每个度量确定积分准则。要添加到生成的路由表中的路径是具有最佳积分准则的路径。
{"title":"Packet Routing Based on Integral Normalized Criterion","authors":"M. Greguš, O. Liskevych, K. Obelovska, Roman S. Panchyshyn","doi":"10.1109/FiCloud.2019.00064","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00064","url":null,"abstract":"The modified algorithm for constructing routing tables based on the open shortest path first protocol is proposed. It takes into account three criteria: the channels capacity, the number of intermediate nodes on the path and signal propagation delay. The integral criterion to minimize the total relative deviation, calculated on all three criteria, obtained from optimal values as a result of optimization according to separate criteria is proposed. In addition, it is proposed to use weight coefficients for each criterion. The integral criterion includes the normalized values of the ordinary criteria and their weights. The integral criteria must be determined for each metric. The path to be added to the resulting routing table is the one with the best integral criterion.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126871463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Audio-Visual Arabic Dataset for Natural Emotions 阿拉伯语自然情感视听数据集
Pub Date : 2019-08-01 DOI: 10.1109/FiCloud.2019.00054
Ftoon Abu Shaqra, R. Duwairi, M. Al-Ayyoub
Emotions are a crucial aspect of human life and the researchers have tried to build an automatic emotion recognition system that helps to provide important real-world applications. The psychologists have shown that emotions differ across culture, considering this fact, we provide and describe the first audio-visual Arabic emotional dataset which called (AVANEmo). In this work we aim to fill the gap between studies of emotion recognition for Arabic content and other languages by provided an Arabic dataset which is a major and fundamental part of build emotion recognition application. Our dataset contains 3000 clips for video and audio data, and it covers six basic emotional labels (Happy, Sad, Angry, Surprise, Disgust, Neutral). Also, we provide some baseline experiments to measure the primitive performance for automated audio and visual emotion recognition application using the AVANEmo dataset. The best accuracy that we achieved was 54.5% and 57.9% using the audio and visual data respectively. The data will be available for distribution to researchers.
情绪是人类生活的一个重要方面,研究人员试图建立一个自动情绪识别系统,帮助提供重要的现实世界应用。心理学家已经证明,不同文化背景下的情感是不同的。考虑到这一事实,我们提供并描述了第一个视听阿拉伯语情感数据集,名为 (AVANEmo)。在这项工作中,我们旨在通过提供一个阿拉伯语数据集,填补阿拉伯语内容与其他语言情感识别研究之间的空白,该数据集是构建情感识别应用的重要基础部分。我们的数据集包含 3000 个视频和音频数据片段,涵盖六种基本情感标签(快乐、悲伤、愤怒、惊讶、厌恶、中性)。此外,我们还提供了一些基线实验,利用 AVANEmo 数据集测量自动视听情感识别应用的原始性能。我们使用音频和视觉数据取得的最佳准确率分别为 54.5% 和 57.9%。这些数据将提供给研究人员使用。
{"title":"The Audio-Visual Arabic Dataset for Natural Emotions","authors":"Ftoon Abu Shaqra, R. Duwairi, M. Al-Ayyoub","doi":"10.1109/FiCloud.2019.00054","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00054","url":null,"abstract":"Emotions are a crucial aspect of human life and the researchers have tried to build an automatic emotion recognition system that helps to provide important real-world applications. The psychologists have shown that emotions differ across culture, considering this fact, we provide and describe the first audio-visual Arabic emotional dataset which called (AVANEmo). In this work we aim to fill the gap between studies of emotion recognition for Arabic content and other languages by provided an Arabic dataset which is a major and fundamental part of build emotion recognition application. Our dataset contains 3000 clips for video and audio data, and it covers six basic emotional labels (Happy, Sad, Angry, Surprise, Disgust, Neutral). Also, we provide some baseline experiments to measure the primitive performance for automated audio and visual emotion recognition application using the AVANEmo dataset. The best accuracy that we achieved was 54.5% and 57.9% using the audio and visual data respectively. The data will be available for distribution to researchers.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131355409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Ransomware Prediction Using Supervised Learning Algorithms 使用监督学习算法预测勒索软件
Pub Date : 2019-08-01 DOI: 10.1109/FiCloud.2019.00016
Umaru Adamu, I. Awan
Malware has become most popular attack vector, among which ransomware remained a threat to individuals and organisations. Ransomware main objectives is extortion by imposing some form of denial of service to either the system or system resources such as files until ransom is paid. This make ransomware different from conventional malware that seek to replicate, delete files, exhilarate data or extensively consume system resources. Unfortunately, detection approaches such as sandboxes analysis and pipelines are inadequate due to lack of luxury of being able to isolate a sample to analyse, and when this occurs is already too late for several users.Therefore, machine learning as prove its efficiency and has been used in research for malware detection. In this paper, we explore machine learning algorithms in ransomware detection. Specifically, the data set used contains 30,000 attributes which is to be use as independent variables to predict ransomware.However, since is difficult to incorporate all the attribute in the analysis, we therefore results to use five attribute to serves a proof of concept for feature selection. Then, after feature selection, we apply support vector machine algorithm of which RMSE of 0.179 was obtained and classifying ransomware with 88.2% accuracy. The Support Vector Machine has high performance in detection and classifying ransomware when compare to other machine learning classifier.
恶意软件已成为最流行的攻击媒介,其中勒索软件仍然是对个人和组织的威胁。勒索软件的主要目的是通过对系统或系统资源(如文件)施加某种形式的拒绝服务来勒索,直到支付赎金。这使得勒索软件不同于传统的恶意软件,后者试图复制、删除文件、激活数据或大量消耗系统资源。不幸的是,沙盒分析和管道等检测方法是不够的,因为缺乏能够分离样本进行分析的奢侈,而当这种情况发生时,对一些用户来说已经太晚了。因此,机器学习已经证明了它的有效性,并被用于恶意软件检测的研究中。在本文中,我们探索机器学习算法在勒索软件检测。具体来说,使用的数据集包含30,000个属性,这些属性将被用作独立变量来预测勒索软件。然而,由于很难在分析中包含所有属性,因此我们决定使用五个属性来为特征选择提供概念证明。然后,在特征选择之后,采用RMSE为0.179的支持向量机算法对勒索软件进行分类,准确率达到88.2%。与其他机器学习分类器相比,支持向量机在检测和分类勒索软件方面具有较高的性能。
{"title":"Ransomware Prediction Using Supervised Learning Algorithms","authors":"Umaru Adamu, I. Awan","doi":"10.1109/FiCloud.2019.00016","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00016","url":null,"abstract":"Malware has become most popular attack vector, among which ransomware remained a threat to individuals and organisations. Ransomware main objectives is extortion by imposing some form of denial of service to either the system or system resources such as files until ransom is paid. This make ransomware different from conventional malware that seek to replicate, delete files, exhilarate data or extensively consume system resources. Unfortunately, detection approaches such as sandboxes analysis and pipelines are inadequate due to lack of luxury of being able to isolate a sample to analyse, and when this occurs is already too late for several users.Therefore, machine learning as prove its efficiency and has been used in research for malware detection. In this paper, we explore machine learning algorithms in ransomware detection. Specifically, the data set used contains 30,000 attributes which is to be use as independent variables to predict ransomware.However, since is difficult to incorporate all the attribute in the analysis, we therefore results to use five attribute to serves a proof of concept for feature selection. Then, after feature selection, we apply support vector machine algorithm of which RMSE of 0.179 was obtained and classifying ransomware with 88.2% accuracy. The Support Vector Machine has high performance in detection and classifying ransomware when compare to other machine learning classifier.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134128323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
From the Edge to the Cloud: Enabling Reliable IoT Applications 从边缘到云:实现可靠的物联网应用
Pub Date : 2019-08-01 DOI: 10.1109/FiCloud.2019.00011
Cristian Martín, Daniel Garrido, M. Díaz, B. Rubio
This paper presents a reliable architecture for the IoT considering multiple levels: edge, fog and cloud. This architecture can help to reduce latency and improve resiliency of IoT applications. The platform is based on a set of containerised components replicated at different levels. Fault tolerance mechanisms are provided by means of replication, the Apache Kafka framework and shadow devices. Apache Kafka is used to distribute messages along the multiple levels. Shadow devices include device states, and they can be used to avoid device interruptions using physical replication and state restoration. The architecture is also protocol-agnostic, allowing the use of different adaptors for the most common IoT protocols. A mission-critical use case is presented where this architecture can be applied. Finally, an evaluation has been carried out in order to test the feasibility of the fog infrastructure.
本文提出了一种可靠的物联网架构,考虑了多个层面:边缘、雾和云。这种架构可以帮助减少延迟并提高物联网应用程序的弹性。该平台基于一组在不同级别复制的容器化组件。容错机制是通过复制、Apache Kafka框架和影子设备提供的。Apache Kafka用于在多个级别上分发消息。影子设备包括设备状态,它们可用于通过物理复制和状态恢复来避免设备中断。该架构也是协议无关的,允许为最常见的物联网协议使用不同的适配器。给出了可以应用此体系结构的关键任务用例。最后,对雾基础设施进行了评价,以验证雾基础设施的可行性。
{"title":"From the Edge to the Cloud: Enabling Reliable IoT Applications","authors":"Cristian Martín, Daniel Garrido, M. Díaz, B. Rubio","doi":"10.1109/FiCloud.2019.00011","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00011","url":null,"abstract":"This paper presents a reliable architecture for the IoT considering multiple levels: edge, fog and cloud. This architecture can help to reduce latency and improve resiliency of IoT applications. The platform is based on a set of containerised components replicated at different levels. Fault tolerance mechanisms are provided by means of replication, the Apache Kafka framework and shadow devices. Apache Kafka is used to distribute messages along the multiple levels. Shadow devices include device states, and they can be used to avoid device interruptions using physical replication and state restoration. The architecture is also protocol-agnostic, allowing the use of different adaptors for the most common IoT protocols. A mission-critical use case is presented where this architecture can be applied. Finally, an evaluation has been carried out in order to test the feasibility of the fog infrastructure.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132238300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Bazaar-Contract: A Smart Contract for Binding Multi-Round Bilateral Negotiations on Cloud Markets Bazaar-Contract:绑定云市场多轮双边谈判的智能合约
Pub Date : 2019-08-01 DOI: 10.1109/FiCloud.2019.00028
Benedikt Pittl, Stefan Starflinger, W. Mach, E. Schikuta
Amazon's EC2 On-Demand marketspace is the dominant platform for trading Cloud services such as virtual machines. On such platforms consumers and providers do not negotiate with each other. Instead, consumers purchase predefined virtual machines at fixed-prices and so this approach is also termed take-it-or-leave-it approach. In the last years more dynamic platforms emerged such as Amazon's spot marketspace which was relaunched at the end of 2017 - here consumers can bid for virtual machines. The recent efforts of Amazon and other Cloud providers such as VirtuStream show that dynamic trading mechanisms are a promising approach for realizing future Cloud markets. Hence, multi-round bilateral negotiations which are executed autonomously have gained popularity in the scientific community. A key challenge towards the adoption of autonomous multi-round bilateral negotiations is to ensure the integrity and transparency so that the generated agreements are legally biding. In the paper at hand we present an approach which uses a smart contract - called Bazaar-Contract - to ensure integrity and transparency during multi-round bilateral negotiations. Thereby, consumers and providers exchange offers by calling methods of the Bazaar-Contract. Moreover, Cloud referees can use these Bazaar-Contracts in order to manage penalties resulting from poor service quality. In order to prove the technical feasibility of our approach we implemented the Bazaar-Contract using Ethereum and the Inter-Planetary File System. We evaluate the economical feasibility of our approach by considering the gas costs.
亚马逊的EC2按需市场空间是虚拟机等云服务交易的主导平台。在这样的平台上,消费者和供应商不相互协商。相反,消费者以固定价格购买预定义的虚拟机,因此这种方法也被称为接受或放弃方法。在过去的几年里,更多的动态平台出现了,比如亚马逊的现货市场空间,它在2017年底重新启动,消费者可以在这里竞标虚拟机。亚马逊和其他云提供商(如VirtuStream)最近的努力表明,动态交易机制是实现未来云市场的一种很有前途的方法。因此,自主执行的多轮双边谈判在科学界受到欢迎。采用自主多轮双边谈判的一项关键挑战是确保完整性和透明度,使所产生的协议具有法律效力。在本文中,我们提出了一种使用智能合约(称为Bazaar-Contract)的方法,以确保多轮双边谈判期间的完整性和透明度。因此,消费者和提供者通过调用Bazaar-Contract的方法来交换报价。此外,云裁判可以使用这些集市合同来管理因服务质量差而产生的处罚。为了证明我们方法的技术可行性,我们使用以太坊和星际文件系统实现了Bazaar-Contract。我们通过考虑天然气成本来评估我们方法的经济可行性。
{"title":"Bazaar-Contract: A Smart Contract for Binding Multi-Round Bilateral Negotiations on Cloud Markets","authors":"Benedikt Pittl, Stefan Starflinger, W. Mach, E. Schikuta","doi":"10.1109/FiCloud.2019.00028","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00028","url":null,"abstract":"Amazon's EC2 On-Demand marketspace is the dominant platform for trading Cloud services such as virtual machines. On such platforms consumers and providers do not negotiate with each other. Instead, consumers purchase predefined virtual machines at fixed-prices and so this approach is also termed take-it-or-leave-it approach. In the last years more dynamic platforms emerged such as Amazon's spot marketspace which was relaunched at the end of 2017 - here consumers can bid for virtual machines. The recent efforts of Amazon and other Cloud providers such as VirtuStream show that dynamic trading mechanisms are a promising approach for realizing future Cloud markets. Hence, multi-round bilateral negotiations which are executed autonomously have gained popularity in the scientific community. A key challenge towards the adoption of autonomous multi-round bilateral negotiations is to ensure the integrity and transparency so that the generated agreements are legally biding. In the paper at hand we present an approach which uses a smart contract - called Bazaar-Contract - to ensure integrity and transparency during multi-round bilateral negotiations. Thereby, consumers and providers exchange offers by calling methods of the Bazaar-Contract. Moreover, Cloud referees can use these Bazaar-Contracts in order to manage penalties resulting from poor service quality. In order to prove the technical feasibility of our approach we implemented the Bazaar-Contract using Ethereum and the Inter-Planetary File System. We evaluate the economical feasibility of our approach by considering the gas costs.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114328125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AL and S Methods: Two Extensions for L-Method AL和S方法:l -方法的两种扩展
Pub Date : 2019-08-01 DOI: 10.1109/FiCloud.2019.00061
M. Antunes, Henrique Aguiar, D. Gomes
With the advent of smart IoT and M2M scenarios it becomes necessary to develop autonomous systems that optimize themselves with minimal human intervention. One possible method to achieve this is through Knee/elbow point estimation. Most of the time these points represent ideal compromises for parameters, methods and algorithms. However, estimating the knee/elbow point in curves is a challenging task. Our focus is on determining the ideal number of clusters autonomously. We analyse and discuss well-known knee/elbow estimators and two extensions based on the theoretical definition. The proposed methods (named AL and S methods) were evaluated against state-of-the-art estimators. The proposed methods are a viable stable solution for knee/elbow estimation.
随着智能物联网和M2M场景的出现,有必要开发以最少人为干预进行自我优化的自主系统。实现这一目标的一个可能方法是通过膝盖/肘关节点估计。大多数情况下,这些点代表了参数、方法和算法的理想妥协。然而,估计弯曲中的膝盖/肘部点是一项具有挑战性的任务。我们的重点是自主确定理想的集群数量。在理论定义的基础上,对已知的膝关节/肘关节估计量及其两个扩展进行了分析和讨论。提出的方法(命名为AL和S方法)对最先进的估计器进行了评估。该方法是一种可行的、稳定的膝关节/肘关节估计方法。
{"title":"AL and S Methods: Two Extensions for L-Method","authors":"M. Antunes, Henrique Aguiar, D. Gomes","doi":"10.1109/FiCloud.2019.00061","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00061","url":null,"abstract":"With the advent of smart IoT and M2M scenarios it becomes necessary to develop autonomous systems that optimize themselves with minimal human intervention. One possible method to achieve this is through Knee/elbow point estimation. Most of the time these points represent ideal compromises for parameters, methods and algorithms. However, estimating the knee/elbow point in curves is a challenging task. Our focus is on determining the ideal number of clusters autonomously. We analyse and discuss well-known knee/elbow estimators and two extensions based on the theoretical definition. The proposed methods (named AL and S methods) were evaluated against state-of-the-art estimators. The proposed methods are a viable stable solution for knee/elbow estimation.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114384929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Vehicular Sinks Over Wide Area Wireless Sensor Networks for Telemetry Applications in Logistics 基于广域无线传感器网络的车辆水槽在物流中的遥测应用
Pub Date : 2019-08-01 DOI: 10.1109/FiCloud.2019.00021
N. Zingirian, Mattia Dalla Via
The paper analyzes the scenario of a logistic organization that collects customer inventory telemetries from wide area Wireless Sensor Networks, using mobile sinks installed on the vehicles used for deliveries. The paper analyzes the constraints of this scenario and proposes a distributed data collection algorithm for contextual ad-hoc network route discovery and message delivery, that combines control and telemetry data within the same messages. Simulations of the algorithm performance, based both on abstract parameters and on real data of oil & gas logistics, validate the algorithm and the application feasibility.
本文分析了一个物流组织的场景,该组织使用安装在送货车辆上的移动接收器,从广域无线传感器网络收集客户库存遥测数据。本文分析了该场景的约束条件,提出了一种用于上下文自组织网络路由发现和消息传递的分布式数据收集算法,该算法将同一消息中的控制和遥测数据结合在一起。基于抽象参数和油气物流实际数据对算法性能进行了仿真,验证了算法的有效性和应用的可行性。
{"title":"Vehicular Sinks Over Wide Area Wireless Sensor Networks for Telemetry Applications in Logistics","authors":"N. Zingirian, Mattia Dalla Via","doi":"10.1109/FiCloud.2019.00021","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00021","url":null,"abstract":"The paper analyzes the scenario of a logistic organization that collects customer inventory telemetries from wide area Wireless Sensor Networks, using mobile sinks installed on the vehicles used for deliveries. The paper analyzes the constraints of this scenario and proposes a distributed data collection algorithm for contextual ad-hoc network route discovery and message delivery, that combines control and telemetry data within the same messages. Simulations of the algorithm performance, based both on abstract parameters and on real data of oil & gas logistics, validate the algorithm and the application feasibility.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129068113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anonymous IoT Mutual Inter-Device Authentication Scheme Based on Incremental Counter (AIMIA-IC) 基于增量计数器的物联网设备间匿名认证方案(AIMIA-IC)
Pub Date : 2019-08-01 DOI: 10.1109/FiCloud.2019.00013
M. Alshahrani, I. Traoré, I. Woungang
Cyber attackers are shifting their attention from traditional computers to IoT devices for malignant activities like exposing smart homeowner private information and/or to launch botnet attacks. Like for conventional networks, the security of IoT networks rests on how properly the authentication process is done. However, unlike conventional networks, IoT infrastructure faces an uphill battle in deploying and operating strong authentication schemes because of inherent limitations on the underlying storage and computation capability. In this paper, we propose a new anonymous mutual Inter-device authentication protocol based on transient identities, incremental counter and temporary secret keys for IoT. The proposed protocol is based on symmetric cryptography and somehow follows the ZigBee protocol. It allows IoT devices to anonymously and mutually authenticate in an unlinkable and untraceable manner, and implements essential security requirements for IoT devices. By analyzing the protocol, we evaluate and demonstrate its efficiency and its relatively limited computational and storage overhead. Furthermore, the security of the protocol is assured through informal security analysis and formally by using the automated validation of Internet security protocols and applications (AVISPA) toolkit.
网络攻击者正在将注意力从传统计算机转移到物联网设备,进行恶意活动,如暴露智能房主的私人信息和/或发动僵尸网络攻击。与传统网络一样,物联网网络的安全性取决于如何正确地完成身份验证过程。然而,与传统网络不同的是,由于底层存储和计算能力的固有限制,物联网基础设施在部署和操作强认证方案方面面临着一场艰苦的战斗。本文提出了一种基于瞬态身份、增量计数器和临时密钥的物联网设备间匿名互鉴协议。提出的协议基于对称加密,并以某种方式遵循ZigBee协议。它允许物联网设备以不可链接和不可追踪的方式匿名和相互认证,并实现物联网设备的基本安全要求。通过分析该协议,我们评估并证明了它的效率及其相对有限的计算和存储开销。此外,通过非正式的安全分析和使用互联网安全协议和应用程序(AVISPA)工具包的自动验证来保证协议的安全性。
{"title":"Anonymous IoT Mutual Inter-Device Authentication Scheme Based on Incremental Counter (AIMIA-IC)","authors":"M. Alshahrani, I. Traoré, I. Woungang","doi":"10.1109/FiCloud.2019.00013","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00013","url":null,"abstract":"Cyber attackers are shifting their attention from traditional computers to IoT devices for malignant activities like exposing smart homeowner private information and/or to launch botnet attacks. Like for conventional networks, the security of IoT networks rests on how properly the authentication process is done. However, unlike conventional networks, IoT infrastructure faces an uphill battle in deploying and operating strong authentication schemes because of inherent limitations on the underlying storage and computation capability. In this paper, we propose a new anonymous mutual Inter-device authentication protocol based on transient identities, incremental counter and temporary secret keys for IoT. The proposed protocol is based on symmetric cryptography and somehow follows the ZigBee protocol. It allows IoT devices to anonymously and mutually authenticate in an unlinkable and untraceable manner, and implements essential security requirements for IoT devices. By analyzing the protocol, we evaluate and demonstrate its efficiency and its relatively limited computational and storage overhead. Furthermore, the security of the protocol is assured through informal security analysis and formally by using the automated validation of Internet security protocols and applications (AVISPA) toolkit.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132150970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
In-Video Game Player's Behavior Measurement using Big Five Personal Traits 基于五大个人特征的电子游戏玩家行为测量
Pub Date : 2019-08-01 DOI: 10.1109/FiCloud.2019.00052
Muhannad Quwaider, Abdullah Alabed, R. Duwairi
The propagation of video games in the previous years has led to the emergence of new areas associated with the video game industry. One of these areas is exploring the emotions and the behaviors of players after playing a specific game within a controlled environment such as a computer lab. In this paper, we will introduce a new way of analyzing the emotions and the behavior of players outside a controlled environment and using in-game data rather than using traditional questionnaires and interviews. The proposed system is expected to be part of future Internet of Things (IoT) application that is needed for human interaction. We will analyze the player's personality using in-game data. The data is generated and collected using mobile developed video game. Then, the collected data is evaluated using a well-known personality traits model called big Five-Factor Model (FFM). In order to create a set of appropriate scenarios to analyze the player's personality based on FFM we developed a First Person Shooter (FPS) video game. Using this game, we managed to generate and collect in-game data from hundreds of people. The results show that it was able to study the player's behavior over FFM traits. It was shown that the FFM traits scores are improved by repeating the game.
前几年电子游戏的传播导致了与电子游戏产业相关的新领域的出现。其中一个领域是探索玩家在受控环境(如计算机实验室)中玩特定游戏后的情绪和行为。在本文中,我们将介绍一种分析玩家在受控环境之外的情绪和行为的新方法,并使用游戏内数据而不是传统的问卷调查和访谈。该系统有望成为人类互动所需的未来物联网(IoT)应用的一部分。我们将使用游戏内部数据分析玩家的个性。数据是使用手机开发的视频游戏生成和收集的。然后,收集到的数据使用一个著名的人格特征模型,称为大五因素模型(FFM)进行评估。为了基于FFM创造一组合适的场景去分析玩家的个性,我们开发了一款第一人称射击游戏(FPS)。通过这款游戏,我们成功地生成并收集了数百人的游戏内数据。结果表明,该方法能够通过FFM特征来研究玩家的行为。结果表明,通过重复游戏,FFM性状得分得到了提高。
{"title":"In-Video Game Player's Behavior Measurement using Big Five Personal Traits","authors":"Muhannad Quwaider, Abdullah Alabed, R. Duwairi","doi":"10.1109/FiCloud.2019.00052","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00052","url":null,"abstract":"The propagation of video games in the previous years has led to the emergence of new areas associated with the video game industry. One of these areas is exploring the emotions and the behaviors of players after playing a specific game within a controlled environment such as a computer lab. In this paper, we will introduce a new way of analyzing the emotions and the behavior of players outside a controlled environment and using in-game data rather than using traditional questionnaires and interviews. The proposed system is expected to be part of future Internet of Things (IoT) application that is needed for human interaction. We will analyze the player's personality using in-game data. The data is generated and collected using mobile developed video game. Then, the collected data is evaluated using a well-known personality traits model called big Five-Factor Model (FFM). In order to create a set of appropriate scenarios to analyze the player's personality based on FFM we developed a First Person Shooter (FPS) video game. Using this game, we managed to generate and collect in-game data from hundreds of people. The results show that it was able to study the player's behavior over FFM traits. It was shown that the FFM traits scores are improved by repeating the game.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125022222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1