首页 > 最新文献

ACM Transactions on Internet of Things最新文献

英文 中文
A Survey on IoT Profiling, Fingerprinting, and Identification 物联网分析、指纹和身份识别研究综述
IF 2.7 Pub Date : 2022-05-31 DOI: 10.1145/3539736
Miraqa Safi, S. Dadkhah, Farzaneh Shoeleh, Hassan Mahdikhani, Heather Molyneaux, A. Ghorbani
The proliferation of heterogeneous Internet of things (IoT) devices connected to the Internet produces several operational and security challenges, such as monitoring, detecting, and recognizing millions of interconnected IoT devices. Network and system administrators must correctly identify which devices are functional, need security updates, or are vulnerable to specific attacks. IoT profiling is an emerging technique to identify and validate the connected devices’ specific behaviour and isolate the suspected and vulnerable devices within the network for further monitoring. This article provides a comprehensive review of various IoT device profiling methods and provides a clear taxonomy for IoT profiling techniques based on different security perspectives. We first investigate several current IoT device profiling techniques and their applications. Next, we analyzed various IoT device vulnerabilities, outlined multiple features, and provided detailed information to implement profiling algorithms’ risk assessment/mitigation stage. By reviewing approaches for profiling IoT devices, we identify various state-of-the-art methods that organizations of different domains can implement to satisfy profiling needs. Furthermore, this article also discusses several machine learning and deep learning algorithms utilized for IoT device profiling. Finally, we discuss challenges and future research possibilities in this domain.
连接到互联网的异构物联网(IoT)设备的激增产生了一些操作和安全挑战,例如监控、检测和识别数百万互联的物联网设备。网络和系统管理员必须正确识别哪些设备是正常的,哪些设备需要安全更新,哪些设备容易受到特定攻击。物联网分析是一种新兴技术,用于识别和验证连接设备的特定行为,并在网络中隔离可疑和易受攻击的设备,以进行进一步监控。本文全面回顾了各种物联网设备分析方法,并基于不同的安全角度为物联网分析技术提供了清晰的分类。我们首先研究了几种当前的物联网设备分析技术及其应用。接下来,我们分析了各种物联网设备漏洞,概述了多个特征,并提供了详细信息,以实现分析算法的风险评估/缓解阶段。通过回顾分析物联网设备的方法,我们确定了不同领域的组织可以实施的各种最先进的方法,以满足分析需求。此外,本文还讨论了用于物联网设备分析的几种机器学习和深度学习算法。最后,我们讨论了该领域的挑战和未来研究的可能性。
{"title":"A Survey on IoT Profiling, Fingerprinting, and Identification","authors":"Miraqa Safi, S. Dadkhah, Farzaneh Shoeleh, Hassan Mahdikhani, Heather Molyneaux, A. Ghorbani","doi":"10.1145/3539736","DOIUrl":"https://doi.org/10.1145/3539736","url":null,"abstract":"The proliferation of heterogeneous Internet of things (IoT) devices connected to the Internet produces several operational and security challenges, such as monitoring, detecting, and recognizing millions of interconnected IoT devices. Network and system administrators must correctly identify which devices are functional, need security updates, or are vulnerable to specific attacks. IoT profiling is an emerging technique to identify and validate the connected devices’ specific behaviour and isolate the suspected and vulnerable devices within the network for further monitoring. This article provides a comprehensive review of various IoT device profiling methods and provides a clear taxonomy for IoT profiling techniques based on different security perspectives. We first investigate several current IoT device profiling techniques and their applications. Next, we analyzed various IoT device vulnerabilities, outlined multiple features, and provided detailed information to implement profiling algorithms’ risk assessment/mitigation stage. By reviewing approaches for profiling IoT devices, we identify various state-of-the-art methods that organizations of different domains can implement to satisfy profiling needs. Furthermore, this article also discusses several machine learning and deep learning algorithms utilized for IoT device profiling. Finally, we discuss challenges and future research possibilities in this domain.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90803755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
6TiSCH – IPv6 Enabled Open Stack IoT Network Formation: A Review 6TiSCH -支持IPv6的开放堆栈物联网网络形成:综述
IF 2.7 Pub Date : 2022-05-10 DOI: 10.1145/3536166
Alakesh Kalita, M. Khatua
The IPv6 over IEEE 802.15.4e TSCH mode (6TiSCH) network is intended to provide reliable and delay bounded communication in multi-hop and scalable Industrial Internet of Things (IIoT). The IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) link layer protocol allows the nodes to change their physical channel after each transmission to eliminate interference and multi-path fading on the channels. However, due to this feature, new nodes (aka pledges) take more time to join the 6TiSCH network, resulting in significant energy consumption and inefficient data transmission, which makes the communication unreliable. Therefore, the formation of 6TiSCH network has gained immense interest among the researchers. To date, numerous solutions have been offered by various researchers in order to speed up the formation of 6TiSCH networks. This article briefly discusses about the 6TiSCH network and its formation process, followed by a detailed survey on the works that considered 6TiSCH network formation. We also perform theoretical analysis and real testbed experiments for a better understanding of the existing works related to 6TiSCH network formation. This article is concluded after summarizing the research challenges in 6TiSCH network formation and providing a few open issues in this domain of work.
IPv6 over IEEE 802.15.4e TSCH模式(6TiSCH)网络旨在为多跳和可扩展的工业物联网(IIoT)提供可靠和延迟有限的通信。IEEE 802.15.4e时隙信道跳频(TSCH)链路层协议允许节点在每次传输后改变其物理信道,以消除信道上的干扰和多径衰落。然而,由于这一特性,新节点(即承诺节点)加入6TiSCH网络需要更多的时间,从而导致大量的能量消耗和低效的数据传输,使得通信不可靠。因此,6TiSCH网络的形成引起了研究者的极大兴趣。迄今为止,为了加快6TiSCH网络的形成,各种研究人员已经提出了许多解决方案。本文简要讨论了6TiSCH网络及其形成过程,然后对考虑6TiSCH网络形成的工作进行了详细的综述。为了更好地理解现有的与6TiSCH网络形成相关的工作,我们还进行了理论分析和实际试验台实验。本文总结了6TiSCH网络形成的研究挑战,并提出了该工作领域的一些有待解决的问题。
{"title":"6TiSCH – IPv6 Enabled Open Stack IoT Network Formation: A Review","authors":"Alakesh Kalita, M. Khatua","doi":"10.1145/3536166","DOIUrl":"https://doi.org/10.1145/3536166","url":null,"abstract":"The IPv6 over IEEE 802.15.4e TSCH mode (6TiSCH) network is intended to provide reliable and delay bounded communication in multi-hop and scalable Industrial Internet of Things (IIoT). The IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) link layer protocol allows the nodes to change their physical channel after each transmission to eliminate interference and multi-path fading on the channels. However, due to this feature, new nodes (aka pledges) take more time to join the 6TiSCH network, resulting in significant energy consumption and inefficient data transmission, which makes the communication unreliable. Therefore, the formation of 6TiSCH network has gained immense interest among the researchers. To date, numerous solutions have been offered by various researchers in order to speed up the formation of 6TiSCH networks. This article briefly discusses about the 6TiSCH network and its formation process, followed by a detailed survey on the works that considered 6TiSCH network formation. We also perform theoretical analysis and real testbed experiments for a better understanding of the existing works related to 6TiSCH network formation. This article is concluded after summarizing the research challenges in 6TiSCH network formation and providing a few open issues in this domain of work.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83734341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IoTRepair: Flexible Fault Handling in Diverse IoT Deployments iorepair:灵活处理各种物联网部署中的故障
IF 2.7 Pub Date : 2022-05-09 DOI: 10.1145/3532194
Michael Norris, Z. Berkay Celik, P. Venkatesh, Shulin Zhao, P. Mcdaniel, A. Sivasubramaniam, Gang Tan
IoT devices can be used to complete a wide array of physical tasks, but due to factors such as low computational resources and distributed physical deployment, they are susceptible to a wide array of faulty behaviors. Many devices deployed in homes, vehicles, industrial sites, and hospitals carry a great risk of damage to property, harm to a person, or breach of security if they behave faultily. We propose a general fault handling system named IoTRepair, which shows promising results for effectiveness with limited latency and power overhead in an IoT environment. IoTRepair dynamically organizes and customizes fault-handling techniques to address the unique problems associated with heterogeneous IoT deployments. We evaluate IoTRepair by creating a physical implementation mirroring a typical home environment to motivate the effectiveness of this system. Our evaluation showed that each of our fault-handling functions could be completed within 100 milliseconds after fault identification, which is a fraction of the time that state-of-the-art fault-identification methods take (measured in minutes). The power overhead is equally small, with the computation and device action consuming less than 30 milliwatts. This evaluation shows that IoTRepair not only can be deployed in a physical system, but offers significant benefits at a low overhead.
物联网设备可用于完成各种物理任务,但由于低计算资源和分布式物理部署等因素,它们容易受到各种错误行为的影响。部署在家庭、车辆、工业场所和医院中的许多设备,如果出现故障,可能会造成财产损失、人身伤害或违反安全规定。我们提出了一种名为IoTRepair的通用故障处理系统,该系统在物联网环境中以有限的延迟和功耗开销显示出有希望的效果。IoTRepair动态组织和定制故障处理技术,以解决与异构物联网部署相关的独特问题。我们通过创建一个反映典型家庭环境的物理实现来评估IoTRepair,以激发该系统的有效性。我们的评估表明,我们的每个故障处理功能都可以在故障识别后的100毫秒内完成,这是最先进的故障识别方法所需时间(以分钟为单位)的一小部分。功率开销同样小,计算和设备动作消耗不到30毫瓦。该评估表明,IoTRepair不仅可以部署在物理系统中,而且可以在低开销的情况下提供显著的优势。
{"title":"IoTRepair: Flexible Fault Handling in Diverse IoT Deployments","authors":"Michael Norris, Z. Berkay Celik, P. Venkatesh, Shulin Zhao, P. Mcdaniel, A. Sivasubramaniam, Gang Tan","doi":"10.1145/3532194","DOIUrl":"https://doi.org/10.1145/3532194","url":null,"abstract":"IoT devices can be used to complete a wide array of physical tasks, but due to factors such as low computational resources and distributed physical deployment, they are susceptible to a wide array of faulty behaviors. Many devices deployed in homes, vehicles, industrial sites, and hospitals carry a great risk of damage to property, harm to a person, or breach of security if they behave faultily. We propose a general fault handling system named IoTRepair, which shows promising results for effectiveness with limited latency and power overhead in an IoT environment. IoTRepair dynamically organizes and customizes fault-handling techniques to address the unique problems associated with heterogeneous IoT deployments. We evaluate IoTRepair by creating a physical implementation mirroring a typical home environment to motivate the effectiveness of this system. Our evaluation showed that each of our fault-handling functions could be completed within 100 milliseconds after fault identification, which is a fraction of the time that state-of-the-art fault-identification methods take (measured in minutes). The power overhead is equally small, with the computation and device action consuming less than 30 milliwatts. This evaluation shows that IoTRepair not only can be deployed in a physical system, but offers significant benefits at a low overhead.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86952542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Classification Strategy for Internet of Things Data Based on the Class Separability Analysis of Time Series Dynamics 基于时间序列动态类可分性分析的物联网数据分类策略
IF 2.7 Pub Date : 2022-05-09 DOI: 10.1145/3533049
J. B. Borges, Heitor S. Ramos, A. Loureiro
This article proposes TSCLAS, a time series classification strategy for the Internet of Things (IoT) data, based on the class separability analysis of their temporal dynamics. Given the large number and incompleteness of IoT data, the use of traditional classification algorithms is not possible. Thus, we claim that solutions for IoT scenarios should avoid using raw data directly, preferring their transformation to a new domain. In the ordinal patterns domain, it is possible to capture the temporal dynamics of raw data to distinguish them. However, to be applied to this challenging scenario, TSCLAS follows a strategy for selecting the best parameters for the ordinal patterns transformation based on maximizing the class separability of the time series dynamics. We show that our method is competitive compared to other classification algorithms from the literature. Furthermore, TSCLAS is scalable concerning the length of time series and robust to the presence of missing data gaps on them. By simulating missing data gaps as long as 50% of the data, our method could beat the accuracy of the compared classification algorithms. Besides, even when losing in accuracy, TSCLAS presents lower computation times for both training and testing phases.
基于物联网数据时间动态的类可分性分析,提出了物联网数据的时间序列分类策略TSCLAS。考虑到物联网数据的数量和不完整性,使用传统的分类算法是不可能的。因此,我们声称物联网场景的解决方案应避免直接使用原始数据,而更倾向于将其转换到新领域。在有序模式域中,可以捕获原始数据的时间动态以区分它们。然而,为了应用于这个具有挑战性的场景,TSCLAS遵循一种策略,基于最大化时间序列动态的类可分离性,为有序模式转换选择最佳参数。我们表明,与文献中的其他分类算法相比,我们的方法具有竞争力。此外,TSCLAS在时间序列长度方面具有可扩展性,并且对缺失数据间隙的存在具有鲁棒性。通过模拟高达50%的数据缺失,我们的方法可以击败比较的分类算法的准确性。此外,即使在准确性下降的情况下,TSCLAS在训练和测试阶段都具有较低的计算时间。
{"title":"A Classification Strategy for Internet of Things Data Based on the Class Separability Analysis of Time Series Dynamics","authors":"J. B. Borges, Heitor S. Ramos, A. Loureiro","doi":"10.1145/3533049","DOIUrl":"https://doi.org/10.1145/3533049","url":null,"abstract":"This article proposes TSCLAS, a time series classification strategy for the Internet of Things (IoT) data, based on the class separability analysis of their temporal dynamics. Given the large number and incompleteness of IoT data, the use of traditional classification algorithms is not possible. Thus, we claim that solutions for IoT scenarios should avoid using raw data directly, preferring their transformation to a new domain. In the ordinal patterns domain, it is possible to capture the temporal dynamics of raw data to distinguish them. However, to be applied to this challenging scenario, TSCLAS follows a strategy for selecting the best parameters for the ordinal patterns transformation based on maximizing the class separability of the time series dynamics. We show that our method is competitive compared to other classification algorithms from the literature. Furthermore, TSCLAS is scalable concerning the length of time series and robust to the presence of missing data gaps on them. By simulating missing data gaps as long as 50% of the data, our method could beat the accuracy of the compared classification algorithms. Besides, even when losing in accuracy, TSCLAS presents lower computation times for both training and testing phases.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84637334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Unsupervised Dynamic Sensor Selection for IoT-Based Predictive Maintenance of a Fleet of Public Transport Buses 基于物联网的公交车队预测性维护的无监督动态传感器选择
IF 2.7 Pub Date : 2022-04-20 DOI: 10.1145/3530991
P. Killeen, I. Kiringa, T. Yeap
In recent years, big data produced by the Internet of Things has enabled new kinds of useful applications. One such application is monitoring a fleet of vehicles in real time to predict their remaining useful life. The consensus self-organized models (COSMO) approach is an example of a predictive maintenance system. The present work proposes a novel Internet of Things based architecture for predictive maintenance that consists of three primary nodes: the vehicle node, the server leader node, and the root node, which enable on-board vehicle data processing, heavy-duty data processing, and fleet administration, respectively. A minimally viable prototype of the proposed architecture was implemented and deployed to a local bus garage in Gatineau, Canada. The present work proposes improved consensus self-organized models (ICOSMO), a fleet-wide unsupervised dynamic sensor selection algorithm. To analyze the performance of ICOSMO, a fleet simulation was implemented. The J1939 data gathered from a hybrid bus was used to generate synthetic data in the simulations. Simulation results that compared the performance of the COSMO and ICOSMO approaches revealed that in general ICOSMO improves the average area under the curve of COSMO by approximately 1.5% when using the Cosine distance and 0.6% when using Hellinger distance.
近年来,物联网产生的大数据催生了新的有用应用。其中一个应用程序是实时监控车队,以预测它们的剩余使用寿命。共识自组织模型(COSMO)方法是预测性维护系统的一个例子。目前的工作提出了一种新的基于物联网的预测性维护架构,该架构由三个主要节点组成:车辆节点、服务器领导节点和根节点,分别实现车载数据处理、重型数据处理和车队管理。在加拿大Gatineau,一个最小可行的架构原型被实现并部署到当地的公共汽车车库。本工作提出了改进的共识自组织模型(ICOSMO),一种全舰队无监督动态传感器选择算法。为了分析ICOSMO的性能,进行了机群仿真。从混合动力总线收集的J1939数据用于生成模拟中的合成数据。对比COSMO和ICOSMO方法性能的仿真结果表明,ICOSMO方法在使用余弦距离时将COSMO曲线下的平均面积提高了约1.5%,使用海灵格距离时提高了约0.6%。
{"title":"Unsupervised Dynamic Sensor Selection for IoT-Based Predictive Maintenance of a Fleet of Public Transport Buses","authors":"P. Killeen, I. Kiringa, T. Yeap","doi":"10.1145/3530991","DOIUrl":"https://doi.org/10.1145/3530991","url":null,"abstract":"In recent years, big data produced by the Internet of Things has enabled new kinds of useful applications. One such application is monitoring a fleet of vehicles in real time to predict their remaining useful life. The consensus self-organized models (COSMO) approach is an example of a predictive maintenance system. The present work proposes a novel Internet of Things based architecture for predictive maintenance that consists of three primary nodes: the vehicle node, the server leader node, and the root node, which enable on-board vehicle data processing, heavy-duty data processing, and fleet administration, respectively. A minimally viable prototype of the proposed architecture was implemented and deployed to a local bus garage in Gatineau, Canada. The present work proposes improved consensus self-organized models (ICOSMO), a fleet-wide unsupervised dynamic sensor selection algorithm. To analyze the performance of ICOSMO, a fleet simulation was implemented. The J1939 data gathered from a hybrid bus was used to generate synthetic data in the simulations. Simulation results that compared the performance of the COSMO and ICOSMO approaches revealed that in general ICOSMO improves the average area under the curve of COSMO by approximately 1.5% when using the Cosine distance and 0.6% when using Hellinger distance.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85588113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
LA-MQTT: Location-aware Publish-subscribe Communications for the Internet of Things LA-MQTT:物联网的位置感知发布-订阅通信
IF 2.7 Pub Date : 2022-04-20 DOI: 10.1145/3529978
Federico Montori, Lorenzo Gigli, L. Sciullo, M. D. Felice
Nowadays, several Internet of Things (IoT) deployments use publish-subscribe paradigms to disseminate IoT data to a pool of interested consumers. At the moment, the most widespread standard for such scenarios is MQTT. We also register an increasing interest in IoT-enabled Location-Based Services, where data must be disseminated over a target area and its spatial relevance and the current positions of the consumers must be taken into account. Unfortunately, the MQTT protocol does not support location awareness, and hence it may result in notifying consumers that are geographically far from the data source, causing increased network overhead and poor Quality of Service (QoS). We address the issue by proposing LA-MQTT, an extension to standard MQTT supporting spatial-aware publish-subscribe communications on IoT scenarios. LA-MQTT is broker-agnostic and fully backward compatible with standard MQTT. As monitoring the position of subscribers over time may cause privacy concerns, LA-MQTT carefully supports location privacy preservation, for which the optimal tradeoff with the QoS of the spatial notifications is addressed via a learning-based algorithm. We demonstrate the effectiveness of LA-MQTT by experimentally evaluating its features via large-scale hybrid simulations, including real and virtual components. Finally, we provide a Proof of Concept real implementation of an LA-MQTT scenario.
如今,一些物联网(IoT)部署使用发布-订阅模式将物联网数据传播给感兴趣的消费者。目前,用于此类场景的最广泛的标准是MQTT。我们对基于物联网的位置服务也越来越感兴趣,在这种服务中,数据必须在目标区域内传播,并且必须考虑到其空间相关性和消费者的当前位置。不幸的是,MQTT协议不支持位置感知,因此它可能导致通知地理上远离数据源的使用者,从而增加网络开销和较差的服务质量(QoS)。我们通过提出LA-MQTT来解决这个问题,LA-MQTT是标准MQTT的扩展,支持物联网场景下的空间感知发布-订阅通信。LA-MQTT与代理无关,与标准MQTT完全向后兼容。随着时间的推移监视订阅者的位置可能会引起隐私问题,因此LA-MQTT谨慎地支持位置隐私保护,为此通过基于学习的算法处理空间通知的QoS的最佳权衡。我们通过大规模混合仿真(包括真实和虚拟组件)实验评估其特征,证明了LA-MQTT的有效性。最后,我们提供了一个LA-MQTT场景的概念验证实际实现。
{"title":"LA-MQTT: Location-aware Publish-subscribe Communications for the Internet of Things","authors":"Federico Montori, Lorenzo Gigli, L. Sciullo, M. D. Felice","doi":"10.1145/3529978","DOIUrl":"https://doi.org/10.1145/3529978","url":null,"abstract":"Nowadays, several Internet of Things (IoT) deployments use publish-subscribe paradigms to disseminate IoT data to a pool of interested consumers. At the moment, the most widespread standard for such scenarios is MQTT. We also register an increasing interest in IoT-enabled Location-Based Services, where data must be disseminated over a target area and its spatial relevance and the current positions of the consumers must be taken into account. Unfortunately, the MQTT protocol does not support location awareness, and hence it may result in notifying consumers that are geographically far from the data source, causing increased network overhead and poor Quality of Service (QoS). We address the issue by proposing LA-MQTT, an extension to standard MQTT supporting spatial-aware publish-subscribe communications on IoT scenarios. LA-MQTT is broker-agnostic and fully backward compatible with standard MQTT. As monitoring the position of subscribers over time may cause privacy concerns, LA-MQTT carefully supports location privacy preservation, for which the optimal tradeoff with the QoS of the spatial notifications is addressed via a learning-based algorithm. We demonstrate the effectiveness of LA-MQTT by experimentally evaluating its features via large-scale hybrid simulations, including real and virtual components. Finally, we provide a Proof of Concept real implementation of an LA-MQTT scenario.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77596971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Haunted House: Physical Smart Home Event Verification in the Presence of Compromised Sensors 鬼屋:存在受损传感器的物理智能家居事件验证
IF 2.7 Pub Date : 2022-04-11 DOI: 10.1145/3506859
S. Birnbach, Simon Eberz, I. Martinovic
In this article, we verify physical events using data from an ensemble of smart home sensors. This approach both protects against event sensor faults and sophisticated attackers. To validate our system’s performance, we set up a “smart home” in an office environment. We recognize 22 event types using 48 sensors over the course of two weeks. Using data from the physical sensors, we verify the event stream supplied by the event sensors to detect both masking and spoofing attacks. We consider three threat models: a zero-effort attacker, an opportunistic attacker, and a sensor-compromise attacker who can arbitrarily modify live sensor data. For spoofed events, we achieve perfect classification for 9 out of 22 events and achieve a 0% false alarm rate at a detection rate exceeding 99.9% for 15 events. For 11 events the majority of masking attacks can be detected without causing any false alarms. We also show that even a strong opportunistic attacker is inherently limited to spoofing few select events and that doing so involves lengthy waiting periods. Finally, we demonstrate the vulnerability of a single-classifier system to compromised sensor data and introduce a more secure approach based on sensor fusion.
在本文中,我们使用来自智能家居传感器集合的数据验证物理事件。这种方法既可以防止事件传感器故障,也可以防止复杂的攻击者。为了验证系统的性能,我们在办公环境中设置了一个“智能家居”。在两周的时间里,我们使用48个传感器识别了22种事件类型。使用来自物理传感器的数据,我们验证由事件传感器提供的事件流,以检测屏蔽和欺骗攻击。我们考虑了三种威胁模型:零努力攻击者、机会攻击者和可以任意修改实时传感器数据的传感器妥协攻击者。对于欺骗事件,我们对22个事件中的9个事件实现了完美的分类,并且在15个事件的检测率超过99.9%的情况下实现了0%的虚警率。对于11个事件,大多数屏蔽攻击可以被检测到而不会引起任何假警报。我们还表明,即使是强大的机会主义攻击者也天生局限于欺骗少数选定的事件,并且这样做需要很长的等待时间。最后,我们展示了单一分类器系统对受损传感器数据的脆弱性,并介绍了一种基于传感器融合的更安全的方法。
{"title":"Haunted House: Physical Smart Home Event Verification in the Presence of Compromised Sensors","authors":"S. Birnbach, Simon Eberz, I. Martinovic","doi":"10.1145/3506859","DOIUrl":"https://doi.org/10.1145/3506859","url":null,"abstract":"In this article, we verify physical events using data from an ensemble of smart home sensors. This approach both protects against event sensor faults and sophisticated attackers. To validate our system’s performance, we set up a “smart home” in an office environment. We recognize 22 event types using 48 sensors over the course of two weeks. Using data from the physical sensors, we verify the event stream supplied by the event sensors to detect both masking and spoofing attacks. We consider three threat models: a zero-effort attacker, an opportunistic attacker, and a sensor-compromise attacker who can arbitrarily modify live sensor data. For spoofed events, we achieve perfect classification for 9 out of 22 events and achieve a 0% false alarm rate at a detection rate exceeding 99.9% for 15 events. For 11 events the majority of masking attacks can be detected without causing any false alarms. We also show that even a strong opportunistic attacker is inherently limited to spoofing few select events and that doing so involves lengthy waiting periods. Finally, we demonstrate the vulnerability of a single-classifier system to compromised sensor data and introduce a more secure approach based on sensor fusion.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74137814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Runtime Resource Management and Provisioning Middleware for Fog Computing Infrastructures 面向雾计算基础设施的运行时资源管理和供应中间件
IF 2.7 Pub Date : 2022-04-11 DOI: 10.1145/3506718
A. Miele, Henry Zárate, Luca Cassano, C. Bolchini, Jorge E. Ortiz
The pervasiveness and growing processing capabilities of mobile and embedded systems have enabled the widespread diffusion of the Fog Computing paradigm in the Internet of Things scenario, where computing is directly performed at the edges of the networked infrastructure in distributed cyber-physical systems. This scenario is characterized by a highly dynamic workload and architecture in which applications enter and leave the system, as well as nodes and connections. This article proposes a runtime resource management and provisioning middleware for the dynamic distribution of the applications on the processing resources. The proposed middleware consists of a two-level hierarchy: (i) a global Fog Orchestrator monitoring the architecture status and (ii) a Local Agent on each node, performing a fine-grain tuning of its resources. The co-operation between these components allows one to dynamically adapt and exploit the fine-grain nodes view for fulfilling the defined system-level goals, for example, minimizing power consumption while meeting Quality of Service requirements such as application throughput. This hierarchical architecture and the adopted policies offer a unified optimization strategy that is unique with regard to existing approaches that typically focus on a single aspect of resource management at runtime. A middleware prototype is presented and experimentally evaluated in a Smart Building case study.
移动和嵌入式系统的普及和不断增长的处理能力使雾计算范式在物联网场景中的广泛传播成为可能,在物联网场景中,计算直接在分布式网络物理系统的网络基础设施边缘执行。此场景的特点是高度动态的工作负载和体系结构,其中应用程序进入和离开系统,以及节点和连接。本文提出了一个运行时资源管理和供应中间件,用于动态分布处理资源上的应用程序。提议的中间件由两层层次结构组成:(i)监视体系结构状态的全局Fog Orchestrator和(ii)每个节点上的Local Agent,执行其资源的细粒度调优。这些组件之间的合作允许动态地适应和利用细粒度节点视图来实现定义的系统级目标,例如,在满足服务质量要求(如应用程序吞吐量)的同时最小化功耗。这种分层体系结构和所采用的策略提供了统一的优化策略,与通常只关注运行时资源管理的单个方面的现有方法相比,这种策略是独一无二的。提出了一种中间件原型,并在智能建筑案例研究中进行了实验评估。
{"title":"A Runtime Resource Management and Provisioning Middleware for Fog Computing Infrastructures","authors":"A. Miele, Henry Zárate, Luca Cassano, C. Bolchini, Jorge E. Ortiz","doi":"10.1145/3506718","DOIUrl":"https://doi.org/10.1145/3506718","url":null,"abstract":"The pervasiveness and growing processing capabilities of mobile and embedded systems have enabled the widespread diffusion of the Fog Computing paradigm in the Internet of Things scenario, where computing is directly performed at the edges of the networked infrastructure in distributed cyber-physical systems. This scenario is characterized by a highly dynamic workload and architecture in which applications enter and leave the system, as well as nodes and connections. This article proposes a runtime resource management and provisioning middleware for the dynamic distribution of the applications on the processing resources. The proposed middleware consists of a two-level hierarchy: (i) a global Fog Orchestrator monitoring the architecture status and (ii) a Local Agent on each node, performing a fine-grain tuning of its resources. The co-operation between these components allows one to dynamically adapt and exploit the fine-grain nodes view for fulfilling the defined system-level goals, for example, minimizing power consumption while meeting Quality of Service requirements such as application throughput. This hierarchical architecture and the adopted policies offer a unified optimization strategy that is unique with regard to existing approaches that typically focus on a single aspect of resource management at runtime. A middleware prototype is presented and experimentally evaluated in a Smart Building case study.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88500311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Evaluation of Group OSCORE for Secure Group Communication in the Internet of Things 面向物联网安全群组通信的群组OSCORE性能评价
IF 2.7 Pub Date : 2022-03-26 DOI: 10.1145/3523064
M. Gunnarsson, Krzysztof Mateusz Malarski, Rikard Höglund, Marco Tiloca
The Constrained Application Protocol (CoAP) is a major application-layer protocol for the Internet of Things (IoT). The recently standardized security protocol Object Security for Constrained RESTful Environments (OSCORE) efficiently provides end-to-end security of CoAP messages at the application layer, also in the presence of untrusted intermediaries. At the same time, CoAP supports one-to-many communication, targeting use cases such as smart lighting and building automation, firmware update, or emergency broadcast. Securing group communication for CoAP has additional challenges. It can be done using the novel Group Object Security for Constrained RESTful Environments (Group OSCORE) security protocol, which fulfills the same security requirements of OSCORE in group communication environments. While evaluations of OSCORE are available, no studies exist on the performance of Group OSCORE on resource-constrained IoT devices. This article presents the results of our extensive performance evaluation of Group OSCORE over two popular constrained IoT platforms, namely Zolertia Zoul and TI Simplelink. We have implemented Group OSCORE for the Contiki-NG operating system and made our implementation available as open source software. We compared Group OSCORE against unprotected CoAP as well as OSCORE. To the best of our knowledge, this is the first comprehensive and experimental evaluation of Group OSCORE over real constrained IoT devices.
约束应用协议(CoAP)是物联网(IoT)的主要应用层协议。最近标准化的安全协议OSCORE (Object security for Constrained RESTful Environments)有效地在应用层提供了CoAP消息的端到端安全性,在不受信任的中介存在的情况下也是如此。同时,CoAP支持一对多通信,针对智能照明和楼宇自动化、固件更新或紧急广播等用例。为CoAP保护组通信还有其他挑战。它可以使用新的受约束RESTful环境的组对象安全(Group OSCORE)安全协议来实现,该协议在组通信环境中满足了与OSCORE相同的安全要求。虽然OSCORE的评估是可用的,但没有关于OSCORE组在资源受限的物联网设备上的性能的研究。本文介绍了我们在两个流行的受限物联网平台(即Zolertia Zoul和TI Simplelink)上对Group OSCORE进行广泛性能评估的结果。我们已经为Contiki-NG操作系统实现了Group OSCORE,并将我们的实现作为开源软件提供。我们将OSCORE组与未受保护的CoAP和OSCORE组进行了比较。据我们所知,这是OSCORE集团首次对真实受限物联网设备进行全面的实验性评估。
{"title":"Performance Evaluation of Group OSCORE for Secure Group Communication in the Internet of Things","authors":"M. Gunnarsson, Krzysztof Mateusz Malarski, Rikard Höglund, Marco Tiloca","doi":"10.1145/3523064","DOIUrl":"https://doi.org/10.1145/3523064","url":null,"abstract":"The Constrained Application Protocol (CoAP) is a major application-layer protocol for the Internet of Things (IoT). The recently standardized security protocol Object Security for Constrained RESTful Environments (OSCORE) efficiently provides end-to-end security of CoAP messages at the application layer, also in the presence of untrusted intermediaries. At the same time, CoAP supports one-to-many communication, targeting use cases such as smart lighting and building automation, firmware update, or emergency broadcast. Securing group communication for CoAP has additional challenges. It can be done using the novel Group Object Security for Constrained RESTful Environments (Group OSCORE) security protocol, which fulfills the same security requirements of OSCORE in group communication environments. While evaluations of OSCORE are available, no studies exist on the performance of Group OSCORE on resource-constrained IoT devices. This article presents the results of our extensive performance evaluation of Group OSCORE over two popular constrained IoT platforms, namely Zolertia Zoul and TI Simplelink. We have implemented Group OSCORE for the Contiki-NG operating system and made our implementation available as open source software. We compared Group OSCORE against unprotected CoAP as well as OSCORE. To the best of our knowledge, this is the first comprehensive and experimental evaluation of Group OSCORE over real constrained IoT devices.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85206956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QID: Robust Mobile Device Recognition via a Multi-Coil Qi-Wireless Charging System QID:基于多线圈qi无线充电系统的稳健移动设备识别
IF 2.7 Pub Date : 2022-03-17 DOI: 10.1145/3498904
Deliang Yang, Guoliang Xing, Jun Huang, Xiangmao Chang, Xiaofan Jiang
Recent years have witnessed the increasing penetration of wireless charging base stations in the workplace and public areas, such as airports and cafeterias. Such an emerging wireless charging infrastructure has presented opportunities for new indoor localization and identification services for mobile users. In this paper, we present QID, the first system that can identify a Qi-compliant mobile device during wireless charging in real-time. QID extracts features from the clock oscillator and control scheme of the power receiver and employs light-weight algorithms to classify the device. QID adopts a 2-dimensional motion unit to emulate a variety of multi-coil designs of Qi, which allows for fine-grained device fingerprinting. Our results show that QID achieves high recognition accuracy. With the prevalence of public wireless charging stations, our results also have important implications for mobile user privacy.
近年来,无线充电基站在工作场所和公共场所(如机场和自助餐厅)的普及率越来越高。这种新兴的无线充电基础设施为移动用户提供了新的室内定位和识别服务的机会。在本文中,我们提出了QID,这是第一个能够在无线充电过程中实时识别符合qi标准的移动设备的系统。QID从功率接收器的时钟振荡器和控制方案中提取特征,并采用轻量级算法对器件进行分类。QID采用二维运动单元来模拟Qi的各种多线圈设计,从而允许细粒度的设备指纹识别。结果表明,QID具有较高的识别精度。随着公共无线充电站的普及,我们的研究结果也对移动用户隐私具有重要意义。
{"title":"QID: Robust Mobile Device Recognition via a Multi-Coil Qi-Wireless Charging System","authors":"Deliang Yang, Guoliang Xing, Jun Huang, Xiangmao Chang, Xiaofan Jiang","doi":"10.1145/3498904","DOIUrl":"https://doi.org/10.1145/3498904","url":null,"abstract":"Recent years have witnessed the increasing penetration of wireless charging base stations in the workplace and public areas, such as airports and cafeterias. Such an emerging wireless charging infrastructure has presented opportunities for new indoor localization and identification services for mobile users. In this paper, we present QID, the first system that can identify a Qi-compliant mobile device during wireless charging in real-time. QID extracts features from the clock oscillator and control scheme of the power receiver and employs light-weight algorithms to classify the device. QID adopts a 2-dimensional motion unit to emulate a variety of multi-coil designs of Qi, which allows for fine-grained device fingerprinting. Our results show that QID achieves high recognition accuracy. With the prevalence of public wireless charging stations, our results also have important implications for mobile user privacy.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90193759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1