首页 > 最新文献

ACM Transactions on Internet of Things最新文献

英文 中文
Introduction to the Special Issue on Wireless Sensing for IoT 物联网无线传感特刊简介
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-30 DOI: 10.1145/3633078
Huadong Ma, Yuan He, Mo Li, Neal Patwari, Stephan Sigg
ACM TIOT launched its first special issue on the theme of wireless sensing for IoT. As an important component of the special issue and a novel practice of the journal, an online virtual workshop will be held, with presentations for each of the accepted articles. Welcome to join us for online discussion! Free registration is required for an attendee of the workshop. The zoom link will be shared to registered attendees before the workshop.
ACM TIOT 推出了以物联网无线传感为主题的第一期特刊。作为该特刊的重要组成部分和本期刊的新颖做法,将举办在线虚拟研讨会,并对每篇录用文章进行介绍。欢迎参加在线讨论!研讨会与会者需免费注册。变焦链接将在研讨会前发送给注册与会者。
{"title":"Introduction to the Special Issue on Wireless Sensing for IoT","authors":"Huadong Ma, Yuan He, Mo Li, Neal Patwari, Stephan Sigg","doi":"10.1145/3633078","DOIUrl":"https://doi.org/10.1145/3633078","url":null,"abstract":"ACM TIOT launched its first special issue on the theme of wireless sensing for IoT. As an important component of the special issue and a novel practice of the journal, an online virtual workshop will be held, with presentations for each of the accepted articles. Welcome to join us for online discussion! Free registration is required for an attendee of the workshop. The zoom link will be shared to registered attendees before the workshop.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":" 23","pages":"1 - 4"},"PeriodicalIF":2.7,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139197586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special Issue on Wireless Sensing for IoT: A Word from the Editor-in-Chief 物联网无线传感特刊:主编的话
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-30 DOI: 10.1145/3633752
G. Picco
{"title":"Special Issue on Wireless Sensing for IoT: A Word from the Editor-in-Chief","authors":"G. Picco","doi":"10.1145/3633752","DOIUrl":"https://doi.org/10.1145/3633752","url":null,"abstract":"","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"216 ","pages":"1 - 2"},"PeriodicalIF":2.7,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139203625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilient Intermediary‐Based Key Exchange Protocol for IoT 基于中间人的物联网弹性密钥交换协议
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-20 DOI: 10.1145/3632408
Zhangxiang Hu, Jun Li, Christopher Wilson
Due to the limited resources of Internet of Things (IoT) devices, Symmetric Key Cryptography (SKC) is typically favored over resource-intensive Public Key Cryptography (PKC) to secure communication between IoT devices. To utilize SKC, devices need to execute a key exchange protocol to establish a session key before initiating communication. However, existing SKC-based key exchange protocols assume communication devices have a pre-shared secret or there are trusted intermediaries between them; neither is always realistic in IoT. We introduce a new SKC-based key exchange protocol for IoT devices. While also intermediary-based, our protocol fundamentally departs from existing intermediary-based solutions in that intermediaries between two key exchange devices may be malicious, and moreover, our protocol can detect cheating behaviors and identify malicious intermediaries. We prove our protocol is secure under the universally composable model, and show it can detect malicious intermediaries with probability 1.0. We implemented and evaluated our protocol on different IoT devices. We show our protocol has significant improvements in computation time and energy cost. Compared to the PKC-based protocols ECDH, DH, and RSA, our protocol is 2.3 to 1591 times faster on one of the two key exchange devices and 0.7 to 4.67 times faster on the other.
由于物联网(IoT)设备的资源有限,对称密钥加密(SKC)通常比资源密集型公钥加密(PKC)更受青睐,以确保物联网设备之间的通信安全。要使用 SKC,设备需要执行密钥交换协议,以便在启动通信前建立会话密钥。然而,现有的基于 SKC 的密钥交换协议假定通信设备之间有一个预先共享的秘密或存在可信的中间人,但这两种情况在物联网中都不现实。我们为物联网设备引入了一种新的基于 SKC 的密钥交换协议。虽然我们的协议也是基于中介的,但它与现有的基于中介的解决方案有本质区别,因为两个密钥交换设备之间的中介可能是恶意的,而且我们的协议可以检测作弊行为并识别恶意中介。我们证明了我们的协议在普遍可组合模型下是安全的,并证明它能以 1.0 的概率检测到恶意中间人。我们在不同的物联网设备上实施并评估了我们的协议。结果表明,我们的协议在计算时间和能源成本方面都有显著改善。与基于 PKC 的 ECDH、DH 和 RSA 协议相比,我们的协议在两台密钥交换设备中的一台上要快 2.3 到 1591 倍,在另一台上要快 0.7 到 4.67 倍。
{"title":"Resilient Intermediary‐Based Key Exchange Protocol for IoT","authors":"Zhangxiang Hu, Jun Li, Christopher Wilson","doi":"10.1145/3632408","DOIUrl":"https://doi.org/10.1145/3632408","url":null,"abstract":"Due to the limited resources of Internet of Things (IoT) devices, Symmetric Key Cryptography (SKC) is typically favored over resource-intensive Public Key Cryptography (PKC) to secure communication between IoT devices. To utilize SKC, devices need to execute a key exchange protocol to establish a session key before initiating communication. However, existing SKC-based key exchange protocols assume communication devices have a pre-shared secret or there are trusted intermediaries between them; neither is always realistic in IoT. We introduce a new SKC-based key exchange protocol for IoT devices. While also intermediary-based, our protocol fundamentally departs from existing intermediary-based solutions in that intermediaries between two key exchange devices may be malicious, and moreover, our protocol can detect cheating behaviors and identify malicious intermediaries. We prove our protocol is secure under the universally composable model, and show it can detect malicious intermediaries with probability 1.0. We implemented and evaluated our protocol on different IoT devices. We show our protocol has significant improvements in computation time and energy cost. Compared to the PKC-based protocols ECDH, DH, and RSA, our protocol is 2.3 to 1591 times faster on one of the two key exchange devices and 0.7 to 4.67 times faster on the other.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"286 6","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139257855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Two-Mode, Adaptive Security Framework for Smart Home Security Applications 智能家居安全应用的双模式自适应安全框架
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-17 DOI: 10.1145/3617504
Devkishen Sisodia, Jun Li, Samuel Mergendahl, Hasan Cam
With the growth of the Internet of Things (IoT), the number of cyber attacks on the Internet is on the rise. However, the resource-constrained nature of IoT devices and their networks makes many classical security systems ineffective or inapplicable. We introduce TWINKLE, a two-mode, adaptive security framework that allows an IoT network to be in regular mode for most of the time, which incurs a low resource consumption rate, and to switch to vigilant mode only when suspicious behavior is detected, which potentially incurs a higher overhead. Compared to the early version of this work, this paper presents a more comprehensive design and architecture of TWINKLE, describes challenges and details in implementing TWINKLE, and reports evaluations of TWINKLE based on real-world IoT testbeds with more metrics. We show the efficacy of TWINKLE in two case studies where we examine two existing intrusion detection and prevention systems and transform both into new, improved systems using TWINKLE. Our evaluations show that TWINKLE is not only effective at securing resource-constrained IoT networks, but can also successfully detect and prevent attacks with a significantly lower overhead and detection latency than existing solutions.
随着物联网(IoT)的发展,互联网上的网络攻击数量不断上升。然而,物联网设备及其网络资源受限的特性使得许多经典安全系统失效或不适用。我们引入了 TWINKLE,这是一种双模式自适应安全框架,它允许物联网网络在大部分时间内处于常规模式(资源消耗率较低),只有在检测到可疑行为时才切换到警惕模式(可能会产生较高的开销)。与本文的早期版本相比,本文介绍了 TWINKLE 更全面的设计和架构,描述了实现 TWINKLE 所面临的挑战和细节,并报告了基于真实世界物联网测试平台的 TWINKLE 评估结果和更多指标。我们在两个案例研究中展示了 TWINKLE 的功效,在这两个案例研究中,我们检查了两个现有的入侵检测和防御系统,并使用 TWINKLE 将这两个系统转化为新的、改进的系统。我们的评估结果表明,TWINKLE 不仅能有效保护资源有限的物联网网络,还能成功检测和预防攻击,其开销和检测延迟明显低于现有解决方案。
{"title":"A Two-Mode, Adaptive Security Framework for Smart Home Security Applications","authors":"Devkishen Sisodia, Jun Li, Samuel Mergendahl, Hasan Cam","doi":"10.1145/3617504","DOIUrl":"https://doi.org/10.1145/3617504","url":null,"abstract":"With the growth of the Internet of Things (IoT), the number of cyber attacks on the Internet is on the rise. However, the resource-constrained nature of IoT devices and their networks makes many classical security systems ineffective or inapplicable. We introduce TWINKLE, a two-mode, adaptive security framework that allows an IoT network to be in regular mode for most of the time, which incurs a low resource consumption rate, and to switch to vigilant mode only when suspicious behavior is detected, which potentially incurs a higher overhead. Compared to the early version of this work, this paper presents a more comprehensive design and architecture of TWINKLE, describes challenges and details in implementing TWINKLE, and reports evaluations of TWINKLE based on real-world IoT testbeds with more metrics. We show the efficacy of TWINKLE in two case studies where we examine two existing intrusion detection and prevention systems and transform both into new, improved systems using TWINKLE. Our evaluations show that TWINKLE is not only effective at securing resource-constrained IoT networks, but can also successfully detect and prevent attacks with a significantly lower overhead and detection latency than existing solutions.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"3 1","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139263350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online learning for dynamic impending collision prediction using FMCW radar 基于FMCW雷达的动态碰撞预测在线学习
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-26 DOI: 10.1145/3616018
Aarti Singh, Neal Patwari
Radar collision prediction systems can play a crucial role in safety critical applications, such as autonomous vehicles and smart helmets for contact sports, by predicting impending collision just before it will occur. Collision prediction algorithms use the velocity and range measurements provided by radar to calculate time to collision. However, radar measurements used in such systems contain significant clutter, noise, and inaccuracies which hamper reliability. Existing solutions to reduce clutter are based on static filtering methods. In this paper, we present a deep learning approach using frequency modulated continuous wave (FMCW) radar and inertial sensing that learns the environmental and user-specific conditions that lead to future collisions. We present a process of converting raw radar samples to range-Doppler matrices (RDMs) and then training a deep convolutional neural network that outputs predictions (impending collision vs. none) for any measured RDM. The system is retrained to work in dynamically changing environments and maintain prediction accuracy. We demonstrate the effectiveness of our approach of using the information from radar data to predict impending collisions in real-time via real-world experiments, and show that our method achieves an F1-score of 0.91 and outperforms a traditional approach in accuracy and adaptability.
雷达碰撞预测系统可以在碰撞发生之前预测即将发生的碰撞,在安全关键应用中发挥至关重要的作用,例如自动驾驶汽车和接触式运动的智能头盔。碰撞预测算法使用雷达提供的速度和距离测量来计算碰撞时间。然而,在这种系统中使用的雷达测量包含显著的杂波、噪声和不准确性,从而妨碍了可靠性。现有的减少杂波的解决方案是基于静态过滤方法。在本文中,我们提出了一种使用调频连续波(FMCW)雷达和惯性传感的深度学习方法,该方法可以学习导致未来碰撞的环境和用户特定条件。我们提出了一个将原始雷达样本转换为距离多普勒矩阵(RDM)的过程,然后训练一个深度卷积神经网络,该网络为任何测量的RDM输出预测(即将发生的碰撞与无碰撞)。该系统经过再训练,可以在动态变化的环境中工作,并保持预测的准确性。我们通过现实世界的实验证明了利用雷达数据信息实时预测即将发生碰撞的方法的有效性,并表明我们的方法达到了f1得分0.91,并且在准确性和适应性方面优于传统方法。
{"title":"Online learning for dynamic impending collision prediction using FMCW radar","authors":"Aarti Singh, Neal Patwari","doi":"10.1145/3616018","DOIUrl":"https://doi.org/10.1145/3616018","url":null,"abstract":"Radar collision prediction systems can play a crucial role in safety critical applications, such as autonomous vehicles and smart helmets for contact sports, by predicting impending collision just before it will occur. Collision prediction algorithms use the velocity and range measurements provided by radar to calculate time to collision. However, radar measurements used in such systems contain significant clutter, noise, and inaccuracies which hamper reliability. Existing solutions to reduce clutter are based on static filtering methods. In this paper, we present a deep learning approach using frequency modulated continuous wave (FMCW) radar and inertial sensing that learns the environmental and user-specific conditions that lead to future collisions. We present a process of converting raw radar samples to range-Doppler matrices (RDMs) and then training a deep convolutional neural network that outputs predictions (impending collision vs. none) for any measured RDM. The system is retrained to work in dynamically changing environments and maintain prediction accuracy. We demonstrate the effectiveness of our approach of using the information from radar data to predict impending collisions in real-time via real-world experiments, and show that our method achieves an F1-score of 0.91 and outperforms a traditional approach in accuracy and adaptability.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"23 1","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86369942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CH-MAC: Achieving Low-latency Reliable Communication via Coding and Hopping in LPWAN CH-MAC:在LPWAN中通过编码和跳变实现低延迟可靠通信
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-25 DOI: 10.1145/3617505
Junzhou Luo, Zhuqing Xu, Jingkai Lin, Ciyuan Chen, Runqun Xiong
Wireless sensing has emerged as a powerful environmental sensing technology that is vulnerable to the impact of all kinds of ambient noises. LoRa is a novel interference-resilient technology of low-power wide-area networks (LPWAN), which has attracted wide attention from scientific and industrial communities. However, LoRa transmission suffers from serious latency in those complex wireless sensing environments requiring transmission reliability. In this paper, we present CH-MAC, the first MAC-layer protocol based on the local corruption nature of packets and the time-varying nature of channels to reduce end-to-end transmission latency in LPWAN with reliable communication requirements. Specifically, CH-MAC employs Luby Transform code to divide and encode the payload into several blocks such that the receiver can retain part of the coded information in the corrupted packets. In addition, CH-MAC utilizes hopping to transmit different blocks of a packet with various channels to avoid sudden noise collision. Moreover, CH-MAC adopts a dynamic packet length adjustment mechanism to mitigate network congestion. Extensive evaluations on a real-world hardware testbed and a simulation platform show that CH-MAC can reduce end-to-end transmission latency by 2.63 × with a communication success rate requirement of > (95% ) compared with state-of-the-art methods.
无线传感作为一种强大的环境传感技术,极易受到各种环境噪声的影响。LoRa是一种新型的低功耗广域网抗干扰技术,受到了科学界和工业界的广泛关注。然而,在要求传输可靠性的复杂无线传感环境中,LoRa传输存在严重的时延问题。在本文中,我们提出了CH-MAC,这是第一个基于分组本地损坏性质和信道时变性质的mac层协议,以减少具有可靠通信要求的LPWAN中的端到端传输延迟。具体来说,CH-MAC使用Luby Transform代码将有效载荷划分并编码为几个块,以便接收器可以在损坏的数据包中保留部分编码信息。此外,CH-MAC利用跳频技术将数据包的不同块以不同的信道传输,避免了突然的噪声碰撞。此外,CH-MAC采用动态数据包长度调整机制来缓解网络拥塞。在实际硬件测试平台和仿真平台上进行的大量评估表明,与现有方法相比,CH-MAC可以将端到端传输延迟降低2.63 x,通信成功率要求> (95% )。
{"title":"CH-MAC: Achieving Low-latency Reliable Communication via Coding and Hopping in LPWAN","authors":"Junzhou Luo, Zhuqing Xu, Jingkai Lin, Ciyuan Chen, Runqun Xiong","doi":"10.1145/3617505","DOIUrl":"https://doi.org/10.1145/3617505","url":null,"abstract":"Wireless sensing has emerged as a powerful environmental sensing technology that is vulnerable to the impact of all kinds of ambient noises. LoRa is a novel interference-resilient technology of low-power wide-area networks (LPWAN), which has attracted wide attention from scientific and industrial communities. However, LoRa transmission suffers from serious latency in those complex wireless sensing environments requiring transmission reliability. In this paper, we present CH-MAC, the first MAC-layer protocol based on the local corruption nature of packets and the time-varying nature of channels to reduce end-to-end transmission latency in LPWAN with reliable communication requirements. Specifically, CH-MAC employs Luby Transform code to divide and encode the payload into several blocks such that the receiver can retain part of the coded information in the corrupted packets. In addition, CH-MAC utilizes hopping to transmit different blocks of a packet with various channels to avoid sudden noise collision. Moreover, CH-MAC adopts a dynamic packet length adjustment mechanism to mitigate network congestion. Extensive evaluations on a real-world hardware testbed and a simulation platform show that CH-MAC can reduce end-to-end transmission latency by 2.63 × with a communication success rate requirement of > (95% ) compared with state-of-the-art methods.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"192 1","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84414636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MFD: Multi-object Frequency Feature Recognition and State Detection Based on RFID-single Tag 基于rfid单标签的多目标频率特征识别与状态检测
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-24 DOI: 10.1145/3615665
Biaokai Zhu, Zejiao Yang, Yupeng Jia, Shengxin Chen, Jie Song, Sanman Liu, P. Li, Feng Li, Deng-ao Li
Vibration is a normal reaction that occurs during the operation of machinery and is very common in industrial systems. How to turn fine-grained vibration perception into visualization, and further predict mechanical failures and reduce property losses based on visual vibration information, which has aroused our thinking. In this paper, the phase information generated by the tag is processed and analyzed, and MFD is proposed, a real-time vibration monitoring and fault-sensing discrimination system. MFD extracts phase information from the original RF signal and converts it into a markov transition map by introducing White Gaussian Noise and a low-pass filter for denoising. To accurately predict the failure of machinery, a deep and machine learning model is introduced to calculate the accuracy of failure analysis, realizing real-time monitoring and fault judgment. The test results show that the average recognition accuracy of vibration can reach 96.07%, and the average recognition accuracy of forward rotation, reverse rotation, oil spill, and screw loosening of motor equipment during long-term operation can reach 98.53%, 99.44%, 97.87%, and 99.91%, respectively, with high robustness.
振动是机械运行过程中发生的一种正常反应,在工业系统中很常见。如何将细粒度的振动感知转化为可视化,并基于视觉振动信息进一步预测机械故障,减少财产损失,这引起了我们的思考。本文对标签产生的相位信息进行处理和分析,提出了一种实时振动监测与故障感知识别系统MFD。MFD从原始射频信号中提取相位信息,通过引入高斯白噪声和低通滤波器进行降噪,将其转换成马尔可夫转换图。为准确预测机械故障,引入深度机器学习模型计算故障分析精度,实现实时监测和故障判断。试验结果表明,该系统对振动的平均识别精度可达96.07%,对电机设备长期运行时的正转、反转、溢油和螺钉松动的平均识别精度分别可达98.53%、99.44%、97.87%和99.91%,具有较高的鲁棒性。
{"title":"MFD: Multi-object Frequency Feature Recognition and State Detection Based on RFID-single Tag","authors":"Biaokai Zhu, Zejiao Yang, Yupeng Jia, Shengxin Chen, Jie Song, Sanman Liu, P. Li, Feng Li, Deng-ao Li","doi":"10.1145/3615665","DOIUrl":"https://doi.org/10.1145/3615665","url":null,"abstract":"Vibration is a normal reaction that occurs during the operation of machinery and is very common in industrial systems. How to turn fine-grained vibration perception into visualization, and further predict mechanical failures and reduce property losses based on visual vibration information, which has aroused our thinking. In this paper, the phase information generated by the tag is processed and analyzed, and MFD is proposed, a real-time vibration monitoring and fault-sensing discrimination system. MFD extracts phase information from the original RF signal and converts it into a markov transition map by introducing White Gaussian Noise and a low-pass filter for denoising. To accurately predict the failure of machinery, a deep and machine learning model is introduced to calculate the accuracy of failure analysis, realizing real-time monitoring and fault judgment. The test results show that the average recognition accuracy of vibration can reach 96.07%, and the average recognition accuracy of forward rotation, reverse rotation, oil spill, and screw loosening of motor equipment during long-term operation can reach 98.53%, 99.44%, 97.87%, and 99.91%, respectively, with high robustness.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"21 1","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75478093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
mmHSV: In-Air Handwritten Signature Verification via Millimeter-wave Radar mmHSV:基于毫米波雷达的空中手写签名验证
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-12 DOI: 10.1145/3614443
Wanqing Li, Tongtong He, Nan Jing, Lin Wang
Electronic signatures are widely used in financial business, telecommuting and identity authentication. Offline electronic signatures are vulnerable to copy or replay attacks. Contact-based online electronic signatures are limited by indirect contact such as handwriting pads and may threaten the health of users. Consider combining hand shape features and writing process features to form electronic signatures, the paper proposes an in-air handwritten signature verification system with millimeter-wave(mmWave) radar, namely mmHSV. First, the biometrics of the handwritten signature process are modeled, and phase-dependent biometrics and behavioral features are extracted from the mmWave radar mixture signal. Secondly, a handwritten feature recognition network based on few-sample learning is presented to fuse multi-dimensional features and determine user legitimacy. Finally, mmHSV is implemented and evaluated with commercial mmWave devices in different scenarios and attack mode conditions. Experimental results show that the mmHSV can achieve accurate, efficient, robust and scalable handwritten signature verification. Area Under Curve (AUC) is 98.96 (% ) , False Acceptance Rate (FAR) is 5.1 (% ) at the fixed threshold, AUC is 97.79 (% ) for untrained users.
电子签名广泛应用于金融业务、远程办公和身份认证等领域。离线电子签名容易受到复制或重放攻击。基于接触的在线电子签名受到手写板等间接接触的限制,可能威胁用户的健康。考虑结合手形特征和书写过程特征形成电子签名,本文提出了一种利用毫米波(mmWave)雷达的空中手写签名验证系统,即mmHSV。首先,对手写签名过程的生物特征进行建模,并从毫米波雷达混合信号中提取相位相关的生物特征和行为特征。其次,提出了一种基于少样本学习的手写体特征识别网络,融合多维特征,确定用户合法性;最后,利用商用毫米波器件在不同场景和攻击模式条件下实现和评估mmHSV。实验结果表明,mmHSV可以实现准确、高效、鲁棒和可扩展的手写签名验证。曲线下面积(AUC)为98.96 (% ),固定阈值下的错误接受率(FAR)为5.1 (% ),未经训练的用户的AUC为97.79 (% )。
{"title":"mmHSV: In-Air Handwritten Signature Verification via Millimeter-wave Radar","authors":"Wanqing Li, Tongtong He, Nan Jing, Lin Wang","doi":"10.1145/3614443","DOIUrl":"https://doi.org/10.1145/3614443","url":null,"abstract":"Electronic signatures are widely used in financial business, telecommuting and identity authentication. Offline electronic signatures are vulnerable to copy or replay attacks. Contact-based online electronic signatures are limited by indirect contact such as handwriting pads and may threaten the health of users. Consider combining hand shape features and writing process features to form electronic signatures, the paper proposes an in-air handwritten signature verification system with millimeter-wave(mmWave) radar, namely mmHSV. First, the biometrics of the handwritten signature process are modeled, and phase-dependent biometrics and behavioral features are extracted from the mmWave radar mixture signal. Secondly, a handwritten feature recognition network based on few-sample learning is presented to fuse multi-dimensional features and determine user legitimacy. Finally, mmHSV is implemented and evaluated with commercial mmWave devices in different scenarios and attack mode conditions. Experimental results show that the mmHSV can achieve accurate, efficient, robust and scalable handwritten signature verification. Area Under Curve (AUC) is 98.96 (% ) , False Acceptance Rate (FAR) is 5.1 (% ) at the fixed threshold, AUC is 97.79 (% ) for untrained users.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"28 1","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82573824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ViWise: Fusing Visual and Wireless Sensing Data for Trajectory Relationship Recognition ViWise:融合视觉和无线传感数据用于轨迹关系识别
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-10 DOI: 10.1145/3614441
Fang-Jing Wu, Sheng-Wun Lai, Sok-Ian Sou
People usually form a social structure (e.g., a leader-follower, companion, or independent group) for better interactions among them and thus share similar perceptions of visible scenes and invisible wireless signals encountered while moving. Many mobility-driven applications have paid much attention to recognizing trajectory relationships among people. This work models visual and wireless data to quantify the trajectory similarity between a pair of users. We design a visual and wireless sensor fusion system, called ViWise, which incorporates the first-person video frames collected by a wearable visual device and the wireless packets broadcast by a personal mobile device for recognizing finer-grained trajectory relationships within a mobility group. When people take similar trajectories, they usually share similar visual scenes. Their wireless packets observed by ambient wireless base stations (called wireless scanners in this work) usually contain similar patterns. We model the visual characteristics of physical objects seen by a user from two perspectives: micro-scale image structure with pixel-wise features and macro-scale semantic context. On the other hand, we model characteristics of wireless packets based on the encountered wireless scanners along the user’s trajectory. Given two users’ trajectories, their trajectory characteristics behind the visible video frames and invisible wireless packets are fused together to compute the visual-wireless data similarity that quantifies the correlation between trajectories taken by them. We exploit modeled visual-wireless data similarity to recognize the social structure within user trajectories. Comprehensive experimental results in indoor and outdoor environments show that the proposed ViWise is robust in trajectory relationship recognition with an accuracy of above 90%.
人们通常会形成一种社会结构(例如,领导者-追随者,同伴或独立团体),以便更好地相互作用,从而对移动时遇到的可见场景和不可见无线信号具有相似的感知。许多移动驱动的应用程序都非常重视识别人与人之间的轨迹关系。这项工作为视觉和无线数据建模,以量化一对用户之间的轨迹相似性。我们设计了一个视觉和无线传感器融合系统,称为ViWise,它结合了由可穿戴视觉设备收集的第一人称视频帧和由个人移动设备广播的无线数据包,用于识别移动群体中更细粒度的轨迹关系。当人们走相似的轨迹时,他们通常会分享相似的视觉场景。它们的无线数据包被周围的无线基站(在这项工作中称为无线扫描器)观察到,通常包含类似的模式。我们从两个角度对用户看到的物理对象的视觉特征进行建模:具有像素特征的微观尺度图像结构和宏观尺度语义上下文。另一方面,我们根据用户轨迹上遇到的无线扫描器对无线数据包的特征进行建模。给定两个用户的轨迹,将其可见视频帧和不可见无线数据包背后的轨迹特征融合在一起,以计算视觉-无线数据相似度,从而量化他们所采取的轨迹之间的相关性。我们利用建模的视觉无线数据相似性来识别用户轨迹中的社会结构。室内和室外环境的综合实验结果表明,所提出的ViWise在轨迹关系识别方面具有很强的鲁棒性,准确率在90%以上。
{"title":"ViWise: Fusing Visual and Wireless Sensing Data for Trajectory Relationship Recognition","authors":"Fang-Jing Wu, Sheng-Wun Lai, Sok-Ian Sou","doi":"10.1145/3614441","DOIUrl":"https://doi.org/10.1145/3614441","url":null,"abstract":"People usually form a social structure (e.g., a leader-follower, companion, or independent group) for better interactions among them and thus share similar perceptions of visible scenes and invisible wireless signals encountered while moving. Many mobility-driven applications have paid much attention to recognizing trajectory relationships among people. This work models visual and wireless data to quantify the trajectory similarity between a pair of users. We design a visual and wireless sensor fusion system, called ViWise, which incorporates the first-person video frames collected by a wearable visual device and the wireless packets broadcast by a personal mobile device for recognizing finer-grained trajectory relationships within a mobility group. When people take similar trajectories, they usually share similar visual scenes. Their wireless packets observed by ambient wireless base stations (called wireless scanners in this work) usually contain similar patterns. We model the visual characteristics of physical objects seen by a user from two perspectives: micro-scale image structure with pixel-wise features and macro-scale semantic context. On the other hand, we model characteristics of wireless packets based on the encountered wireless scanners along the user’s trajectory. Given two users’ trajectories, their trajectory characteristics behind the visible video frames and invisible wireless packets are fused together to compute the visual-wireless data similarity that quantifies the correlation between trajectories taken by them. We exploit modeled visual-wireless data similarity to recognize the social structure within user trajectories. Comprehensive experimental results in indoor and outdoor environments show that the proposed ViWise is robust in trajectory relationship recognition with an accuracy of above 90%.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"76 4 1","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78465506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
mmDrive: Fine-Grained Fatigue Driving Detection Using mmWave Radar mmDrive:使用毫米波雷达进行细粒度疲劳驾驶检测
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-10 DOI: 10.1145/3614437
Juncen Zhu, Jiannong Cao, Yanni Yang, Wei Ren, Huizi Han
Early detection of fatigue driving is pivotal for safety of drivers and pedestrians. Traditional approaches mainly employ cameras and wearable sensors to detect fatigue features, which are intrusive to drivers. Recent advances in radio frequency (RF) sensing enable non-intrusive fatigue feature detection from the signal reflected by driver’s body. However, existing RF-based solutions only detect partial or coarse-grained fatigue features, which reduces the detection accuracy. To tackle above limitations, we propose a mmWave-based fatigue driving detection system, called mmDrive, which can detect multiple fine-grained fatigue features from different body parts. However, achieving accurate detection of various fatigue features during driving encounters practical challenges. Specifically, normal driving activities and driver’s involuntary facial movements inevitably cause interference to fatigue features. Thus, we exploit unique geometric and behavioral characteristics of fatigue features and design effective signal processing methods to remove noises from fatigue-irrelevant activities. Based on the detected fatigue features, we further develop a fatigue determination algorithm to decide driver’s fatigue state. Extensive experiment results from both simulated and real driving environments show that the average accuracy for detecting nodding and yawning features is about (96% ) , and the average errors for estimating eye blink, respiration, and heartbeat rates are around 2.21bpm, 0.54bpm, and 2.52bpm, respectively. And the accuracy of the fatigue detection algorithm we proposed reached (97.63% ) .
早期发现疲劳驾驶对驾驶员和行人的安全至关重要。传统方法主要采用摄像头和可穿戴传感器来检测疲劳特征,这对驾驶员来说是一种干扰。射频(RF)传感技术的最新进展使驾驶员身体反射的信号能够进行非侵入式疲劳特征检测。然而,现有的基于rf的解决方案只能检测部分或粗粒度的疲劳特征,从而降低了检测精度。为了解决上述限制,我们提出了一种基于毫米波的疲劳驱动检测系统,称为mmDrive,它可以检测来自不同身体部位的多个细粒度疲劳特征。然而,在驾驶过程中实现各种疲劳特征的准确检测遇到了实际挑战。具体来说,正常的驾驶活动和驾驶员不自觉的面部运动不可避免地会对疲劳特征产生干扰。因此,我们利用疲劳特征的独特几何和行为特征,设计有效的信号处理方法来去除疲劳无关活动的噪声。基于检测到的疲劳特征,进一步开发了疲劳判定算法,确定驾驶员的疲劳状态。模拟和真实驾驶环境的大量实验结果表明,检测点头和打哈欠特征的平均准确率约为(96% ),估计眨眼、呼吸和心跳速率的平均误差分别约为2.21bpm、0.54bpm和2.52bpm。提出的疲劳检测算法的精度达到(97.63% )。
{"title":"mmDrive: Fine-Grained Fatigue Driving Detection Using mmWave Radar","authors":"Juncen Zhu, Jiannong Cao, Yanni Yang, Wei Ren, Huizi Han","doi":"10.1145/3614437","DOIUrl":"https://doi.org/10.1145/3614437","url":null,"abstract":"Early detection of fatigue driving is pivotal for safety of drivers and pedestrians. Traditional approaches mainly employ cameras and wearable sensors to detect fatigue features, which are intrusive to drivers. Recent advances in radio frequency (RF) sensing enable non-intrusive fatigue feature detection from the signal reflected by driver’s body. However, existing RF-based solutions only detect partial or coarse-grained fatigue features, which reduces the detection accuracy. To tackle above limitations, we propose a mmWave-based fatigue driving detection system, called mmDrive, which can detect multiple fine-grained fatigue features from different body parts. However, achieving accurate detection of various fatigue features during driving encounters practical challenges. Specifically, normal driving activities and driver’s involuntary facial movements inevitably cause interference to fatigue features. Thus, we exploit unique geometric and behavioral characteristics of fatigue features and design effective signal processing methods to remove noises from fatigue-irrelevant activities. Based on the detected fatigue features, we further develop a fatigue determination algorithm to decide driver’s fatigue state. Extensive experiment results from both simulated and real driving environments show that the average accuracy for detecting nodding and yawning features is about (96% ) , and the average errors for estimating eye blink, respiration, and heartbeat rates are around 2.21bpm, 0.54bpm, and 2.52bpm, respectively. And the accuracy of the fatigue detection algorithm we proposed reached (97.63% ) .","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"45 1","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84647069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1