首页 > 最新文献

ACM Transactions on Internet of Things最新文献

英文 中文
Unsupervised Dynamic Sensor Selection for IoT-Based Predictive Maintenance of a Fleet of Public Transport Buses 基于物联网的公交车队预测性维护的无监督动态传感器选择
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-04-20 DOI: 10.1145/3530991
P. Killeen, I. Kiringa, T. Yeap
In recent years, big data produced by the Internet of Things has enabled new kinds of useful applications. One such application is monitoring a fleet of vehicles in real time to predict their remaining useful life. The consensus self-organized models (COSMO) approach is an example of a predictive maintenance system. The present work proposes a novel Internet of Things based architecture for predictive maintenance that consists of three primary nodes: the vehicle node, the server leader node, and the root node, which enable on-board vehicle data processing, heavy-duty data processing, and fleet administration, respectively. A minimally viable prototype of the proposed architecture was implemented and deployed to a local bus garage in Gatineau, Canada. The present work proposes improved consensus self-organized models (ICOSMO), a fleet-wide unsupervised dynamic sensor selection algorithm. To analyze the performance of ICOSMO, a fleet simulation was implemented. The J1939 data gathered from a hybrid bus was used to generate synthetic data in the simulations. Simulation results that compared the performance of the COSMO and ICOSMO approaches revealed that in general ICOSMO improves the average area under the curve of COSMO by approximately 1.5% when using the Cosine distance and 0.6% when using Hellinger distance.
近年来,物联网产生的大数据催生了新的有用应用。其中一个应用程序是实时监控车队,以预测它们的剩余使用寿命。共识自组织模型(COSMO)方法是预测性维护系统的一个例子。目前的工作提出了一种新的基于物联网的预测性维护架构,该架构由三个主要节点组成:车辆节点、服务器领导节点和根节点,分别实现车载数据处理、重型数据处理和车队管理。在加拿大Gatineau,一个最小可行的架构原型被实现并部署到当地的公共汽车车库。本工作提出了改进的共识自组织模型(ICOSMO),一种全舰队无监督动态传感器选择算法。为了分析ICOSMO的性能,进行了机群仿真。从混合动力总线收集的J1939数据用于生成模拟中的合成数据。对比COSMO和ICOSMO方法性能的仿真结果表明,ICOSMO方法在使用余弦距离时将COSMO曲线下的平均面积提高了约1.5%,使用海灵格距离时提高了约0.6%。
{"title":"Unsupervised Dynamic Sensor Selection for IoT-Based Predictive Maintenance of a Fleet of Public Transport Buses","authors":"P. Killeen, I. Kiringa, T. Yeap","doi":"10.1145/3530991","DOIUrl":"https://doi.org/10.1145/3530991","url":null,"abstract":"In recent years, big data produced by the Internet of Things has enabled new kinds of useful applications. One such application is monitoring a fleet of vehicles in real time to predict their remaining useful life. The consensus self-organized models (COSMO) approach is an example of a predictive maintenance system. The present work proposes a novel Internet of Things based architecture for predictive maintenance that consists of three primary nodes: the vehicle node, the server leader node, and the root node, which enable on-board vehicle data processing, heavy-duty data processing, and fleet administration, respectively. A minimally viable prototype of the proposed architecture was implemented and deployed to a local bus garage in Gatineau, Canada. The present work proposes improved consensus self-organized models (ICOSMO), a fleet-wide unsupervised dynamic sensor selection algorithm. To analyze the performance of ICOSMO, a fleet simulation was implemented. The J1939 data gathered from a hybrid bus was used to generate synthetic data in the simulations. Simulation results that compared the performance of the COSMO and ICOSMO approaches revealed that in general ICOSMO improves the average area under the curve of COSMO by approximately 1.5% when using the Cosine distance and 0.6% when using Hellinger distance.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"45 1","pages":"1 - 36"},"PeriodicalIF":2.7,"publicationDate":"2022-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85588113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
LA-MQTT: Location-aware Publish-subscribe Communications for the Internet of Things LA-MQTT:物联网的位置感知发布-订阅通信
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-04-20 DOI: 10.1145/3529978
Federico Montori, Lorenzo Gigli, L. Sciullo, M. D. Felice
Nowadays, several Internet of Things (IoT) deployments use publish-subscribe paradigms to disseminate IoT data to a pool of interested consumers. At the moment, the most widespread standard for such scenarios is MQTT. We also register an increasing interest in IoT-enabled Location-Based Services, where data must be disseminated over a target area and its spatial relevance and the current positions of the consumers must be taken into account. Unfortunately, the MQTT protocol does not support location awareness, and hence it may result in notifying consumers that are geographically far from the data source, causing increased network overhead and poor Quality of Service (QoS). We address the issue by proposing LA-MQTT, an extension to standard MQTT supporting spatial-aware publish-subscribe communications on IoT scenarios. LA-MQTT is broker-agnostic and fully backward compatible with standard MQTT. As monitoring the position of subscribers over time may cause privacy concerns, LA-MQTT carefully supports location privacy preservation, for which the optimal tradeoff with the QoS of the spatial notifications is addressed via a learning-based algorithm. We demonstrate the effectiveness of LA-MQTT by experimentally evaluating its features via large-scale hybrid simulations, including real and virtual components. Finally, we provide a Proof of Concept real implementation of an LA-MQTT scenario.
如今,一些物联网(IoT)部署使用发布-订阅模式将物联网数据传播给感兴趣的消费者。目前,用于此类场景的最广泛的标准是MQTT。我们对基于物联网的位置服务也越来越感兴趣,在这种服务中,数据必须在目标区域内传播,并且必须考虑到其空间相关性和消费者的当前位置。不幸的是,MQTT协议不支持位置感知,因此它可能导致通知地理上远离数据源的使用者,从而增加网络开销和较差的服务质量(QoS)。我们通过提出LA-MQTT来解决这个问题,LA-MQTT是标准MQTT的扩展,支持物联网场景下的空间感知发布-订阅通信。LA-MQTT与代理无关,与标准MQTT完全向后兼容。随着时间的推移监视订阅者的位置可能会引起隐私问题,因此LA-MQTT谨慎地支持位置隐私保护,为此通过基于学习的算法处理空间通知的QoS的最佳权衡。我们通过大规模混合仿真(包括真实和虚拟组件)实验评估其特征,证明了LA-MQTT的有效性。最后,我们提供了一个LA-MQTT场景的概念验证实际实现。
{"title":"LA-MQTT: Location-aware Publish-subscribe Communications for the Internet of Things","authors":"Federico Montori, Lorenzo Gigli, L. Sciullo, M. D. Felice","doi":"10.1145/3529978","DOIUrl":"https://doi.org/10.1145/3529978","url":null,"abstract":"Nowadays, several Internet of Things (IoT) deployments use publish-subscribe paradigms to disseminate IoT data to a pool of interested consumers. At the moment, the most widespread standard for such scenarios is MQTT. We also register an increasing interest in IoT-enabled Location-Based Services, where data must be disseminated over a target area and its spatial relevance and the current positions of the consumers must be taken into account. Unfortunately, the MQTT protocol does not support location awareness, and hence it may result in notifying consumers that are geographically far from the data source, causing increased network overhead and poor Quality of Service (QoS). We address the issue by proposing LA-MQTT, an extension to standard MQTT supporting spatial-aware publish-subscribe communications on IoT scenarios. LA-MQTT is broker-agnostic and fully backward compatible with standard MQTT. As monitoring the position of subscribers over time may cause privacy concerns, LA-MQTT carefully supports location privacy preservation, for which the optimal tradeoff with the QoS of the spatial notifications is addressed via a learning-based algorithm. We demonstrate the effectiveness of LA-MQTT by experimentally evaluating its features via large-scale hybrid simulations, including real and virtual components. Finally, we provide a Proof of Concept real implementation of an LA-MQTT scenario.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"33 1","pages":"1 - 28"},"PeriodicalIF":2.7,"publicationDate":"2022-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77596971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Haunted House: Physical Smart Home Event Verification in the Presence of Compromised Sensors 鬼屋:存在受损传感器的物理智能家居事件验证
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-04-11 DOI: 10.1145/3506859
S. Birnbach, Simon Eberz, I. Martinovic
In this article, we verify physical events using data from an ensemble of smart home sensors. This approach both protects against event sensor faults and sophisticated attackers. To validate our system’s performance, we set up a “smart home” in an office environment. We recognize 22 event types using 48 sensors over the course of two weeks. Using data from the physical sensors, we verify the event stream supplied by the event sensors to detect both masking and spoofing attacks. We consider three threat models: a zero-effort attacker, an opportunistic attacker, and a sensor-compromise attacker who can arbitrarily modify live sensor data. For spoofed events, we achieve perfect classification for 9 out of 22 events and achieve a 0% false alarm rate at a detection rate exceeding 99.9% for 15 events. For 11 events the majority of masking attacks can be detected without causing any false alarms. We also show that even a strong opportunistic attacker is inherently limited to spoofing few select events and that doing so involves lengthy waiting periods. Finally, we demonstrate the vulnerability of a single-classifier system to compromised sensor data and introduce a more secure approach based on sensor fusion.
在本文中,我们使用来自智能家居传感器集合的数据验证物理事件。这种方法既可以防止事件传感器故障,也可以防止复杂的攻击者。为了验证系统的性能,我们在办公环境中设置了一个“智能家居”。在两周的时间里,我们使用48个传感器识别了22种事件类型。使用来自物理传感器的数据,我们验证由事件传感器提供的事件流,以检测屏蔽和欺骗攻击。我们考虑了三种威胁模型:零努力攻击者、机会攻击者和可以任意修改实时传感器数据的传感器妥协攻击者。对于欺骗事件,我们对22个事件中的9个事件实现了完美的分类,并且在15个事件的检测率超过99.9%的情况下实现了0%的虚警率。对于11个事件,大多数屏蔽攻击可以被检测到而不会引起任何假警报。我们还表明,即使是强大的机会主义攻击者也天生局限于欺骗少数选定的事件,并且这样做需要很长的等待时间。最后,我们展示了单一分类器系统对受损传感器数据的脆弱性,并介绍了一种基于传感器融合的更安全的方法。
{"title":"Haunted House: Physical Smart Home Event Verification in the Presence of Compromised Sensors","authors":"S. Birnbach, Simon Eberz, I. Martinovic","doi":"10.1145/3506859","DOIUrl":"https://doi.org/10.1145/3506859","url":null,"abstract":"In this article, we verify physical events using data from an ensemble of smart home sensors. This approach both protects against event sensor faults and sophisticated attackers. To validate our system’s performance, we set up a “smart home” in an office environment. We recognize 22 event types using 48 sensors over the course of two weeks. Using data from the physical sensors, we verify the event stream supplied by the event sensors to detect both masking and spoofing attacks. We consider three threat models: a zero-effort attacker, an opportunistic attacker, and a sensor-compromise attacker who can arbitrarily modify live sensor data. For spoofed events, we achieve perfect classification for 9 out of 22 events and achieve a 0% false alarm rate at a detection rate exceeding 99.9% for 15 events. For 11 events the majority of masking attacks can be detected without causing any false alarms. We also show that even a strong opportunistic attacker is inherently limited to spoofing few select events and that doing so involves lengthy waiting periods. Finally, we demonstrate the vulnerability of a single-classifier system to compromised sensor data and introduce a more secure approach based on sensor fusion.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"42 1","pages":"1 - 28"},"PeriodicalIF":2.7,"publicationDate":"2022-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74137814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Runtime Resource Management and Provisioning Middleware for Fog Computing Infrastructures 面向雾计算基础设施的运行时资源管理和供应中间件
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-04-11 DOI: 10.1145/3506718
A. Miele, Henry Zárate, Luca Cassano, C. Bolchini, Jorge E. Ortiz
The pervasiveness and growing processing capabilities of mobile and embedded systems have enabled the widespread diffusion of the Fog Computing paradigm in the Internet of Things scenario, where computing is directly performed at the edges of the networked infrastructure in distributed cyber-physical systems. This scenario is characterized by a highly dynamic workload and architecture in which applications enter and leave the system, as well as nodes and connections. This article proposes a runtime resource management and provisioning middleware for the dynamic distribution of the applications on the processing resources. The proposed middleware consists of a two-level hierarchy: (i) a global Fog Orchestrator monitoring the architecture status and (ii) a Local Agent on each node, performing a fine-grain tuning of its resources. The co-operation between these components allows one to dynamically adapt and exploit the fine-grain nodes view for fulfilling the defined system-level goals, for example, minimizing power consumption while meeting Quality of Service requirements such as application throughput. This hierarchical architecture and the adopted policies offer a unified optimization strategy that is unique with regard to existing approaches that typically focus on a single aspect of resource management at runtime. A middleware prototype is presented and experimentally evaluated in a Smart Building case study.
移动和嵌入式系统的普及和不断增长的处理能力使雾计算范式在物联网场景中的广泛传播成为可能,在物联网场景中,计算直接在分布式网络物理系统的网络基础设施边缘执行。此场景的特点是高度动态的工作负载和体系结构,其中应用程序进入和离开系统,以及节点和连接。本文提出了一个运行时资源管理和供应中间件,用于动态分布处理资源上的应用程序。提议的中间件由两层层次结构组成:(i)监视体系结构状态的全局Fog Orchestrator和(ii)每个节点上的Local Agent,执行其资源的细粒度调优。这些组件之间的合作允许动态地适应和利用细粒度节点视图来实现定义的系统级目标,例如,在满足服务质量要求(如应用程序吞吐量)的同时最小化功耗。这种分层体系结构和所采用的策略提供了统一的优化策略,与通常只关注运行时资源管理的单个方面的现有方法相比,这种策略是独一无二的。提出了一种中间件原型,并在智能建筑案例研究中进行了实验评估。
{"title":"A Runtime Resource Management and Provisioning Middleware for Fog Computing Infrastructures","authors":"A. Miele, Henry Zárate, Luca Cassano, C. Bolchini, Jorge E. Ortiz","doi":"10.1145/3506718","DOIUrl":"https://doi.org/10.1145/3506718","url":null,"abstract":"The pervasiveness and growing processing capabilities of mobile and embedded systems have enabled the widespread diffusion of the Fog Computing paradigm in the Internet of Things scenario, where computing is directly performed at the edges of the networked infrastructure in distributed cyber-physical systems. This scenario is characterized by a highly dynamic workload and architecture in which applications enter and leave the system, as well as nodes and connections. This article proposes a runtime resource management and provisioning middleware for the dynamic distribution of the applications on the processing resources. The proposed middleware consists of a two-level hierarchy: (i) a global Fog Orchestrator monitoring the architecture status and (ii) a Local Agent on each node, performing a fine-grain tuning of its resources. The co-operation between these components allows one to dynamically adapt and exploit the fine-grain nodes view for fulfilling the defined system-level goals, for example, minimizing power consumption while meeting Quality of Service requirements such as application throughput. This hierarchical architecture and the adopted policies offer a unified optimization strategy that is unique with regard to existing approaches that typically focus on a single aspect of resource management at runtime. A middleware prototype is presented and experimentally evaluated in a Smart Building case study.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"73 1","pages":"1 - 29"},"PeriodicalIF":2.7,"publicationDate":"2022-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88500311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Evaluation of Group OSCORE for Secure Group Communication in the Internet of Things 面向物联网安全群组通信的群组OSCORE性能评价
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-03-26 DOI: 10.1145/3523064
M. Gunnarsson, Krzysztof Mateusz Malarski, Rikard Höglund, Marco Tiloca
The Constrained Application Protocol (CoAP) is a major application-layer protocol for the Internet of Things (IoT). The recently standardized security protocol Object Security for Constrained RESTful Environments (OSCORE) efficiently provides end-to-end security of CoAP messages at the application layer, also in the presence of untrusted intermediaries. At the same time, CoAP supports one-to-many communication, targeting use cases such as smart lighting and building automation, firmware update, or emergency broadcast. Securing group communication for CoAP has additional challenges. It can be done using the novel Group Object Security for Constrained RESTful Environments (Group OSCORE) security protocol, which fulfills the same security requirements of OSCORE in group communication environments. While evaluations of OSCORE are available, no studies exist on the performance of Group OSCORE on resource-constrained IoT devices. This article presents the results of our extensive performance evaluation of Group OSCORE over two popular constrained IoT platforms, namely Zolertia Zoul and TI Simplelink. We have implemented Group OSCORE for the Contiki-NG operating system and made our implementation available as open source software. We compared Group OSCORE against unprotected CoAP as well as OSCORE. To the best of our knowledge, this is the first comprehensive and experimental evaluation of Group OSCORE over real constrained IoT devices.
约束应用协议(CoAP)是物联网(IoT)的主要应用层协议。最近标准化的安全协议OSCORE (Object security for Constrained RESTful Environments)有效地在应用层提供了CoAP消息的端到端安全性,在不受信任的中介存在的情况下也是如此。同时,CoAP支持一对多通信,针对智能照明和楼宇自动化、固件更新或紧急广播等用例。为CoAP保护组通信还有其他挑战。它可以使用新的受约束RESTful环境的组对象安全(Group OSCORE)安全协议来实现,该协议在组通信环境中满足了与OSCORE相同的安全要求。虽然OSCORE的评估是可用的,但没有关于OSCORE组在资源受限的物联网设备上的性能的研究。本文介绍了我们在两个流行的受限物联网平台(即Zolertia Zoul和TI Simplelink)上对Group OSCORE进行广泛性能评估的结果。我们已经为Contiki-NG操作系统实现了Group OSCORE,并将我们的实现作为开源软件提供。我们将OSCORE组与未受保护的CoAP和OSCORE组进行了比较。据我们所知,这是OSCORE集团首次对真实受限物联网设备进行全面的实验性评估。
{"title":"Performance Evaluation of Group OSCORE for Secure Group Communication in the Internet of Things","authors":"M. Gunnarsson, Krzysztof Mateusz Malarski, Rikard Höglund, Marco Tiloca","doi":"10.1145/3523064","DOIUrl":"https://doi.org/10.1145/3523064","url":null,"abstract":"The Constrained Application Protocol (CoAP) is a major application-layer protocol for the Internet of Things (IoT). The recently standardized security protocol Object Security for Constrained RESTful Environments (OSCORE) efficiently provides end-to-end security of CoAP messages at the application layer, also in the presence of untrusted intermediaries. At the same time, CoAP supports one-to-many communication, targeting use cases such as smart lighting and building automation, firmware update, or emergency broadcast. Securing group communication for CoAP has additional challenges. It can be done using the novel Group Object Security for Constrained RESTful Environments (Group OSCORE) security protocol, which fulfills the same security requirements of OSCORE in group communication environments. While evaluations of OSCORE are available, no studies exist on the performance of Group OSCORE on resource-constrained IoT devices. This article presents the results of our extensive performance evaluation of Group OSCORE over two popular constrained IoT platforms, namely Zolertia Zoul and TI Simplelink. We have implemented Group OSCORE for the Contiki-NG operating system and made our implementation available as open source software. We compared Group OSCORE against unprotected CoAP as well as OSCORE. To the best of our knowledge, this is the first comprehensive and experimental evaluation of Group OSCORE over real constrained IoT devices.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"97 1","pages":"1 - 31"},"PeriodicalIF":2.7,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85206956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monitoring Runtime Metrics of Fog Manufacturing via a Qualitative and Quantitative (QQ) Control Chart 通过定性和定量(QQ)控制图监控雾制造的运行时间指标
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-03-17 DOI: 10.1145/3501262
Yifu Li, Lening Wang, Dongyoon Lee, R. Jin
Fog manufacturing combines Fog and Cloud computing in a manufacturing network to provide efficient data analytics and support real-time decision-making. Detecting anomalies, including imbalanced computational workloads and cyber-attacks, is critical to ensure reliable and responsive computation services. However, such anomalies often concur with dynamic offloading events where computation tasks are migrated from well-occupied Fog nodes to less-occupied ones to reduce the overall computation time latency and improve the throughput. Such concurrences jointly affect the system behaviors, which makes anomaly detection inaccurate. We propose a qualitative and quantitative (QQ) control chart to monitor system anomalies through identifying the changes of monitored runtime metric relationship (quantitative variables) under the presence of dynamic offloading (qualitative variable) using a risk-adjusted monitoring framework. Both the simulation and Fog manufacturing case studies show the advantage of the proposed method compared with the existing literature under the dynamic offloading influence.
雾制造在制造网络中结合了雾和云计算,提供高效的数据分析并支持实时决策。检测异常,包括不平衡的计算工作负载和网络攻击,对于确保可靠和响应的计算服务至关重要。然而,这种异常通常与动态卸载事件同时发生,其中计算任务从占用率较高的Fog节点迁移到占用率较低的Fog节点,以减少总体计算时间延迟并提高吞吐量。这种并发性共同影响系统行为,导致异常检测不准确。我们提出了一个定性和定量(QQ)控制图,通过识别在动态卸载(定性变量)存在下被监控的运行时度量关系(定量变量)的变化,使用风险调整监测框架来监测系统异常。仿真和制造雾的实例研究表明,在动态卸载影响下,与现有文献相比,所提出的方法具有优势。
{"title":"Monitoring Runtime Metrics of Fog Manufacturing via a Qualitative and Quantitative (QQ) Control Chart","authors":"Yifu Li, Lening Wang, Dongyoon Lee, R. Jin","doi":"10.1145/3501262","DOIUrl":"https://doi.org/10.1145/3501262","url":null,"abstract":"Fog manufacturing combines Fog and Cloud computing in a manufacturing network to provide efficient data analytics and support real-time decision-making. Detecting anomalies, including imbalanced computational workloads and cyber-attacks, is critical to ensure reliable and responsive computation services. However, such anomalies often concur with dynamic offloading events where computation tasks are migrated from well-occupied Fog nodes to less-occupied ones to reduce the overall computation time latency and improve the throughput. Such concurrences jointly affect the system behaviors, which makes anomaly detection inaccurate. We propose a qualitative and quantitative (QQ) control chart to monitor system anomalies through identifying the changes of monitored runtime metric relationship (quantitative variables) under the presence of dynamic offloading (qualitative variable) using a risk-adjusted monitoring framework. Both the simulation and Fog manufacturing case studies show the advantage of the proposed method compared with the existing literature under the dynamic offloading influence.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"77 1","pages":"1 - 19"},"PeriodicalIF":2.7,"publicationDate":"2022-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80086891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QID: Robust Mobile Device Recognition via a Multi-Coil Qi-Wireless Charging System QID:基于多线圈qi无线充电系统的稳健移动设备识别
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-03-17 DOI: 10.1145/3498904
Deliang Yang, Guoliang Xing, Jun Huang, Xiangmao Chang, Xiaofan Jiang
Recent years have witnessed the increasing penetration of wireless charging base stations in the workplace and public areas, such as airports and cafeterias. Such an emerging wireless charging infrastructure has presented opportunities for new indoor localization and identification services for mobile users. In this paper, we present QID, the first system that can identify a Qi-compliant mobile device during wireless charging in real-time. QID extracts features from the clock oscillator and control scheme of the power receiver and employs light-weight algorithms to classify the device. QID adopts a 2-dimensional motion unit to emulate a variety of multi-coil designs of Qi, which allows for fine-grained device fingerprinting. Our results show that QID achieves high recognition accuracy. With the prevalence of public wireless charging stations, our results also have important implications for mobile user privacy.
近年来,无线充电基站在工作场所和公共场所(如机场和自助餐厅)的普及率越来越高。这种新兴的无线充电基础设施为移动用户提供了新的室内定位和识别服务的机会。在本文中,我们提出了QID,这是第一个能够在无线充电过程中实时识别符合qi标准的移动设备的系统。QID从功率接收器的时钟振荡器和控制方案中提取特征,并采用轻量级算法对器件进行分类。QID采用二维运动单元来模拟Qi的各种多线圈设计,从而允许细粒度的设备指纹识别。结果表明,QID具有较高的识别精度。随着公共无线充电站的普及,我们的研究结果也对移动用户隐私具有重要意义。
{"title":"QID: Robust Mobile Device Recognition via a Multi-Coil Qi-Wireless Charging System","authors":"Deliang Yang, Guoliang Xing, Jun Huang, Xiangmao Chang, Xiaofan Jiang","doi":"10.1145/3498904","DOIUrl":"https://doi.org/10.1145/3498904","url":null,"abstract":"Recent years have witnessed the increasing penetration of wireless charging base stations in the workplace and public areas, such as airports and cafeterias. Such an emerging wireless charging infrastructure has presented opportunities for new indoor localization and identification services for mobile users. In this paper, we present QID, the first system that can identify a Qi-compliant mobile device during wireless charging in real-time. QID extracts features from the clock oscillator and control scheme of the power receiver and employs light-weight algorithms to classify the device. QID adopts a 2-dimensional motion unit to emulate a variety of multi-coil designs of Qi, which allows for fine-grained device fingerprinting. Our results show that QID achieves high recognition accuracy. With the prevalence of public wireless charging stations, our results also have important implications for mobile user privacy.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"7 1","pages":"1 - 27"},"PeriodicalIF":2.7,"publicationDate":"2022-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90193759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MAIDE: Augmented Reality (AR)-facilitated Mobile System for Onboarding of Internet of Things (IoT) Devices at Ease MAIDE:增强现实(AR)便利的移动系统,用于轻松登录物联网(IoT)设备
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-02-15 DOI: 10.1145/3506667
Huanle Zhang, M. Uddin, F. Hao, S. Mukherjee, P. Mohapatra
Having an efficient onboarding process is a pivotal step to utilize and provision the IoT devices for accessing the network infrastructure. However, the current process to onboard IoT devices is time-consuming and labor-intensive, which makes the process vulnerable to human errors and security risks. In order to have a streamlined onboarding process, we need a mechanism to reliably associate each digital identity with each physical device. We design an onboarding mechanism called MAIDE to fill this technical gap. MAIDE is an Augmented Reality (AR)-facilitated app that systematically selects multiple measurement locations, calculates measurement time for each location and guides the user through the measurement process. The app also uses an optimized voting-based algorithm to derive the device-to-ID mapping based on measurement data. This method does not require any modification to existing IoT devices or the infrastructure and can be applied to all major wireless protocols such as BLE, and WiFi. Our extensive experiments show that MAIDE achieves high device-to-ID mapping accuracy. For example, to distinguish two devices on a ceiling in a typical enterprise environment, MAIDE achieves ~95% accuracy by measuring 5 seconds of Received Signal Strength (RSS) data for each measurement location when the devices are 4 feet apart.
高效的入职流程是利用和配置物联网设备访问网络基础设施的关键一步。然而,目前板载物联网设备的过程既耗时又费力,这使得该过程容易受到人为错误和安全风险的影响。为了简化入职流程,我们需要一种机制来可靠地将每个数字身份与每个物理设备关联起来。我们设计了一种名为MAIDE的入职机制来填补这一技术空白。MAIDE是一个增强现实(AR)便利的应用程序,系统地选择多个测量位置,计算每个位置的测量时间,并指导用户完成测量过程。该应用程序还使用优化的基于投票的算法,根据测量数据导出设备到id的映射。这种方法不需要对现有的物联网设备或基础设施进行任何修改,可以应用于所有主要的无线协议,如BLE和WiFi。大量实验表明,MAIDE实现了较高的设备到id映射精度。例如,在典型的企业环境中,为了区分天花板上的两个设备,MAIDE在设备相距4英尺时,通过测量每个测量位置的5秒接收信号强度(RSS)数据,达到了~95%的精度。
{"title":"MAIDE: Augmented Reality (AR)-facilitated Mobile System for Onboarding of Internet of Things (IoT) Devices at Ease","authors":"Huanle Zhang, M. Uddin, F. Hao, S. Mukherjee, P. Mohapatra","doi":"10.1145/3506667","DOIUrl":"https://doi.org/10.1145/3506667","url":null,"abstract":"Having an efficient onboarding process is a pivotal step to utilize and provision the IoT devices for accessing the network infrastructure. However, the current process to onboard IoT devices is time-consuming and labor-intensive, which makes the process vulnerable to human errors and security risks. In order to have a streamlined onboarding process, we need a mechanism to reliably associate each digital identity with each physical device. We design an onboarding mechanism called MAIDE to fill this technical gap. MAIDE is an Augmented Reality (AR)-facilitated app that systematically selects multiple measurement locations, calculates measurement time for each location and guides the user through the measurement process. The app also uses an optimized voting-based algorithm to derive the device-to-ID mapping based on measurement data. This method does not require any modification to existing IoT devices or the infrastructure and can be applied to all major wireless protocols such as BLE, and WiFi. Our extensive experiments show that MAIDE achieves high device-to-ID mapping accuracy. For example, to distinguish two devices on a ceiling in a typical enterprise environment, MAIDE achieves ~95% accuracy by measuring 5 seconds of Received Signal Strength (RSS) data for each measurement location when the devices are 4 feet apart.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"70 1","pages":"1 - 21"},"PeriodicalIF":2.7,"publicationDate":"2022-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74096679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Systematic Review on Osmotic Computing 渗透计算的系统综述
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-02-15 DOI: 10.1145/3488247
Benazir Neha, S. K. Panda, P. Sahu, Kshira Sagar Sahoo, A. Gandomi
Osmotic computing in association with related computing paradigms (cloud, fog, and edge) emerges as a promising solution for handling bulk of security-critical as well as latency-sensitive data generated by the digital devices. It is a growing research domain that studies deployment, migration, and optimization of applications in the form of microservices across cloud/edge infrastructure. It presents dynamically tailored microservices in technology-centric environments by exploiting edge and cloud platforms. Osmotic computing promotes digital transformation and furnishes benefits to transportation, smart cities, education, and healthcare. In this article, we present a comprehensive analysis of osmotic computing through a systematic literature review approach. To ensure high-quality review, we conduct an advanced search on numerous digital libraries to extracting related studies. The advanced search strategy identifies 99 studies, from which 29 relevant studies are selected for a thorough review. We present a summary of applications in osmotic computing build on their key features. On the basis of the observations, we outline the research challenges for the applications in this research field. Finally, we discuss the security issues resolved and unresolved in osmotic computing.
与相关计算范例(云、雾和边缘)相关联的渗透计算作为处理数字设备生成的大量安全关键型和延迟敏感型数据的有前途的解决方案而出现。这是一个不断发展的研究领域,研究跨云/边缘基础设施的微服务形式的应用程序的部署、迁移和优化。它通过利用边缘和云平台,在以技术为中心的环境中提供动态定制的微服务。渗透计算促进了数字化转型,并为交通、智慧城市、教育和医疗保健带来了好处。在本文中,我们通过系统的文献回顾方法,对渗透计算进行了全面的分析。为了确保高质量的综述,我们对众多数字图书馆进行了高级检索,以提取相关研究。高级检索策略确定了99项研究,从中选择了29项相关研究进行全面审查。我们根据渗透计算的主要特点对其应用进行了总结。在观察的基础上,我们概述了该研究领域应用的研究挑战。最后,讨论了渗透计算中已解决和未解决的安全问题。
{"title":"A Systematic Review on Osmotic Computing","authors":"Benazir Neha, S. K. Panda, P. Sahu, Kshira Sagar Sahoo, A. Gandomi","doi":"10.1145/3488247","DOIUrl":"https://doi.org/10.1145/3488247","url":null,"abstract":"Osmotic computing in association with related computing paradigms (cloud, fog, and edge) emerges as a promising solution for handling bulk of security-critical as well as latency-sensitive data generated by the digital devices. It is a growing research domain that studies deployment, migration, and optimization of applications in the form of microservices across cloud/edge infrastructure. It presents dynamically tailored microservices in technology-centric environments by exploiting edge and cloud platforms. Osmotic computing promotes digital transformation and furnishes benefits to transportation, smart cities, education, and healthcare. In this article, we present a comprehensive analysis of osmotic computing through a systematic literature review approach. To ensure high-quality review, we conduct an advanced search on numerous digital libraries to extracting related studies. The advanced search strategy identifies 99 studies, from which 29 relevant studies are selected for a thorough review. We present a summary of applications in osmotic computing build on their key features. On the basis of the observations, we outline the research challenges for the applications in this research field. Finally, we discuss the security issues resolved and unresolved in osmotic computing.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"16 1","pages":"1 - 30"},"PeriodicalIF":2.7,"publicationDate":"2022-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75887380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Computer Science Perspective on Digital Transformation in Production 从计算机科学的角度看生产中的数字化转型
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-02-15 DOI: 10.1145/3502265
P. Brauner, M. Dalibor, M. Jarke, Ike Kunze, I. Koren, G. Lakemeyer, M. Liebenberg, Judith Michael, J. Pennekamp, C. Quix, Bernhard Rumpe, Wil M.P. van der Aalst, Klaus Wehrle, A. Wortmann, M. Ziefle
The Industrial Internet-of-Things (IIoT) promises significant improvements for the manufacturing industry by facilitating the integration of manufacturing systems by Digital Twins. However, ecological and economic demands also require a cross-domain linkage of multiple scientific perspectives from material sciences, engineering, operations, business, and ergonomics, as optimization opportunities can be derived from any of these perspectives. To extend the IIoT to a true Internet of Production, two concepts are required: first, a complex, interrelated network of Digital Shadows which combine domain-specific models with data-driven AI methods; and second, the integration of a large number of research labs, engineering, and production sites as a World Wide Lab which offers controlled exchange of selected, innovation-relevant data even across company boundaries. In this article, we define the underlying Computer Science challenges implied by these novel concepts in four layers: Smart human interfaces provide access to information that has been generated by model-integrated AI. Given the large variety of manufacturing data, new data modeling techniques should enable efficient management of Digital Shadows, which is supported by an interconnected infrastructure. Based on a detailed analysis of these challenges, we derive a systematized research roadmap to make the vision of the Internet of Production a reality.
工业物联网(IIoT)通过促进数字孪生制造系统的集成,有望为制造业带来重大改善。然而,生态和经济需求也需要材料科学、工程、运营、商业和人体工程学等多个科学观点的跨领域联系,因为优化机会可以从这些观点中得到。要将工业物联网扩展到真正的生产互联网,需要两个概念:首先,一个复杂的、相互关联的数字阴影网络,将特定领域的模型与数据驱动的人工智能方法相结合;第二,将大量的研究实验室、工程和生产基地整合为一个世界范围的实验室,提供选定的、与创新相关的数据的受控交换,甚至跨越公司边界。在本文中,我们从四个层面定义了这些新概念所隐含的潜在计算机科学挑战:智能人机界面提供对由模型集成人工智能生成的信息的访问。鉴于制造数据的多样性,新的数据建模技术应该能够有效地管理数字阴影,这是由互联基础设施支持的。在对这些挑战进行详细分析的基础上,我们得出了一个系统化的研究路线图,以使生产互联网的愿景成为现实。
{"title":"A Computer Science Perspective on Digital Transformation in Production","authors":"P. Brauner, M. Dalibor, M. Jarke, Ike Kunze, I. Koren, G. Lakemeyer, M. Liebenberg, Judith Michael, J. Pennekamp, C. Quix, Bernhard Rumpe, Wil M.P. van der Aalst, Klaus Wehrle, A. Wortmann, M. Ziefle","doi":"10.1145/3502265","DOIUrl":"https://doi.org/10.1145/3502265","url":null,"abstract":"The Industrial Internet-of-Things (IIoT) promises significant improvements for the manufacturing industry by facilitating the integration of manufacturing systems by Digital Twins. However, ecological and economic demands also require a cross-domain linkage of multiple scientific perspectives from material sciences, engineering, operations, business, and ergonomics, as optimization opportunities can be derived from any of these perspectives. To extend the IIoT to a true Internet of Production, two concepts are required: first, a complex, interrelated network of Digital Shadows which combine domain-specific models with data-driven AI methods; and second, the integration of a large number of research labs, engineering, and production sites as a World Wide Lab which offers controlled exchange of selected, innovation-relevant data even across company boundaries. In this article, we define the underlying Computer Science challenges implied by these novel concepts in four layers: Smart human interfaces provide access to information that has been generated by model-integrated AI. Given the large variety of manufacturing data, new data modeling techniques should enable efficient management of Digital Shadows, which is supported by an interconnected infrastructure. Based on a detailed analysis of these challenges, we derive a systematized research roadmap to make the vision of the Internet of Production a reality.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"14 1","pages":"1 - 32"},"PeriodicalIF":2.7,"publicationDate":"2022-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81046170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
期刊
ACM Transactions on Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1