首页 > 最新文献

ACM Transactions on Internet of Things最新文献

英文 中文
Continual Activity Recognition with Generative Adversarial Networks 基于生成对抗网络的持续活动识别
IF 2.7 Pub Date : 2021-03-01 DOI: 10.1145/3440036
Juan Ye, Pakawat Nakwijit, Martin Schiemer, Saurav Jha, F. Zambonelli
Continual learning is an emerging research challenge in human activity recognition (HAR). As an increasing number of HAR applications are deployed in real-world environments, it is important and essential to extend the activity model to adapt to the change in people’s activity routine. Otherwise, HAR applications can become obsolete and fail to deliver activity-aware services. The existing research in HAR has focused on detecting abnormal sensor events or new activities, however, extending the activity model is currently under-explored. To directly tackle this challenge, we build on the recent advance in the area of lifelong machine learning and design a continual activity recognition system, called HAR-GAN, to grow the activity model over time. HAR-GAN does not require a prior knowledge on what new activity classes might be and it does not require to store historical data by leveraging the use of Generative Adversarial Networks (GAN) to generate sensor data on the previously learned activities. We have evaluated HAR-GAN on four third-party, public datasets collected on binary sensors and accelerometers. Our extensive empirical results demonstrate the effectiveness of HAR-GAN in continual activity recognition and shed insight on the future challenges.
持续学习是人类活动识别(HAR)领域一个新兴的研究挑战。随着越来越多的HAR应用部署在现实环境中,扩展活动模型以适应人们活动常规的变化是非常重要和必要的。否则,HAR应用程序可能会过时,无法交付活动感知服务。HAR的现有研究主要集中在检测异常传感器事件或新活动,然而,扩展活动模型目前尚未得到充分探索。为了直接应对这一挑战,我们基于终身机器学习领域的最新进展,设计了一个持续的活动识别系统,称为HAR-GAN,以随着时间的推移发展活动模型。HAR-GAN不需要预先了解新的活动类别,也不需要通过使用生成对抗网络(GAN)来存储历史数据,以生成先前学习过的活动的传感器数据。我们在二进制传感器和加速度计上收集的四个第三方公开数据集上评估了HAR-GAN。我们广泛的实证结果证明了HAR-GAN在持续活动识别中的有效性,并对未来的挑战提供了见解。
{"title":"Continual Activity Recognition with Generative Adversarial Networks","authors":"Juan Ye, Pakawat Nakwijit, Martin Schiemer, Saurav Jha, F. Zambonelli","doi":"10.1145/3440036","DOIUrl":"https://doi.org/10.1145/3440036","url":null,"abstract":"Continual learning is an emerging research challenge in human activity recognition (HAR). As an increasing number of HAR applications are deployed in real-world environments, it is important and essential to extend the activity model to adapt to the change in people’s activity routine. Otherwise, HAR applications can become obsolete and fail to deliver activity-aware services. The existing research in HAR has focused on detecting abnormal sensor events or new activities, however, extending the activity model is currently under-explored. To directly tackle this challenge, we build on the recent advance in the area of lifelong machine learning and design a continual activity recognition system, called HAR-GAN, to grow the activity model over time. HAR-GAN does not require a prior knowledge on what new activity classes might be and it does not require to store historical data by leveraging the use of Generative Adversarial Networks (GAN) to generate sensor data on the previously learned activities. We have evaluated HAR-GAN on four third-party, public datasets collected on binary sensors and accelerometers. Our extensive empirical results demonstrate the effectiveness of HAR-GAN in continual activity recognition and shed insight on the future challenges.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87077087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Tale of Two Entities 《两个实体的故事
IF 2.7 Pub Date : 2021-03-01 DOI: 10.1145/3437258
Hossam ElHussini, C. Assi, Bassam Moussa, Ribal Atallah, A. Ghrayeb
With the growing market of Electric Vehicles (EV), the procurement of their charging infrastructure plays a crucial role in their adoption. Within the revolution of Internet of Things, the EV charging infrastructure is getting on board with the introduction of smart Electric Vehicle Charging Stations (EVCS), a myriad set of communication protocols, and different entities. We provide in this article an overview of this infrastructure detailing the participating entities and the communication protocols. Further, we contextualize the current deployment of EVCSs through the use of available public data. In the light of such a survey, we identify two key concerns, the lack of standardization and multiple points of failures, which renders the current deployment of EV charging infrastructure vulnerable to an array of different attacks. Moreover, we propose a novel attack scenario that exploits the unique characteristics of the EVCSs and their protocol (such as high power wattage and support for reverse power flow) to cause disturbances to the power grid. We investigate three different attack variations; sudden surge in power demand, sudden surge in power supply, and a switching attack. To support our claims, we showcase using a real-world example how an adversary can compromise an EVCS and create a traffic bottleneck by tampering with the charging schedules of EVs. Further, we perform a simulation-based study of the impact of our proposed attack variations on the WSCC 9 bus system. Our simulations show that an adversary can cause devastating effects on the power grid, which might result in blackout and cascading failure by comprising a small number of EVCSs.
随着电动汽车市场的不断发展,充电基础设施的采购对电动汽车的普及起着至关重要的作用。在物联网革命中,随着智能电动汽车充电站(EVCS)、无数通信协议和不同实体的引入,电动汽车充电基础设施也在不断发展。我们将在本文中概述该基础设施,详细介绍参与的实体和通信协议。此外,我们通过使用可用的公共数据将evcs的当前部署置于背景中。根据这项调查,我们确定了两个关键问题,即缺乏标准化和多点故障,这使得目前部署的电动汽车充电基础设施容易受到一系列不同的攻击。此外,我们提出了一种新的攻击方案,利用evcs及其协议的独特特性(如高功率瓦数和支持反向潮流)对电网造成干扰。我们研究了三种不同的攻击变化;电力需求突然激增,电力供应突然激增,以及开关攻击。为了支持我们的说法,我们使用一个现实世界的例子来展示攻击者如何通过篡改电动汽车的充电计划来破坏EVCS并造成流量瓶颈。此外,我们对我们提出的攻击变化对WSCC 9总线系统的影响进行了基于模拟的研究。我们的模拟表明,对手可以对电网造成破坏性影响,通过组成少量evcs可能导致停电和级联故障。
{"title":"A Tale of Two Entities","authors":"Hossam ElHussini, C. Assi, Bassam Moussa, Ribal Atallah, A. Ghrayeb","doi":"10.1145/3437258","DOIUrl":"https://doi.org/10.1145/3437258","url":null,"abstract":"With the growing market of Electric Vehicles (EV), the procurement of their charging infrastructure plays a crucial role in their adoption. Within the revolution of Internet of Things, the EV charging infrastructure is getting on board with the introduction of smart Electric Vehicle Charging Stations (EVCS), a myriad set of communication protocols, and different entities. We provide in this article an overview of this infrastructure detailing the participating entities and the communication protocols. Further, we contextualize the current deployment of EVCSs through the use of available public data. In the light of such a survey, we identify two key concerns, the lack of standardization and multiple points of failures, which renders the current deployment of EV charging infrastructure vulnerable to an array of different attacks. Moreover, we propose a novel attack scenario that exploits the unique characteristics of the EVCSs and their protocol (such as high power wattage and support for reverse power flow) to cause disturbances to the power grid. We investigate three different attack variations; sudden surge in power demand, sudden surge in power supply, and a switching attack. To support our claims, we showcase using a real-world example how an adversary can compromise an EVCS and create a traffic bottleneck by tampering with the charging schedules of EVs. Further, we perform a simulation-based study of the impact of our proposed attack variations on the WSCC 9 bus system. Our simulations show that an adversary can cause devastating effects on the power grid, which might result in blackout and cascading failure by comprising a small number of EVCSs.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82548225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Spatial Source Location Privacy-aware Duty Cycle for Internet of Things Sensor Networks 物联网传感器网络空间源位置隐私感知占空比
IF 2.7 Pub Date : 2021-02-01 DOI: 10.1145/3430379
M. Bradbury, A. Jhumka, C. Maple
Source Location Privacy (SLP) is an important property for monitoring assets in privacy-critical sensor network and Internet of Things applications. Many SLP-aware routing techniques exist, with most striking a tradeoff between SLP and other key metrics such as energy (due to battery power). Typically, the number of messages sent has been used as a proxy for the energy consumed. Existing work (for SLP against a local attacker) does not consider the impact of sleeping via duty cycling to reduce the energy cost of an SLP-aware routing protocol. Therefore, two main challenges exist: (i) how to achieve a low duty cycle without loss of control messages that configure the SLP protocol and (ii) how to achieve high SLP without requiring a long time spent awake. In this article, we present a novel formalisation of a duty cycling protocol as a transformation process. Using derived transformation rules, we present the first duty cycling protocol for an SLP-aware routing protocol for a local eavesdropping attacker. Simulation results on grids demonstrate a duty cycle of 10%, while only increasing the capture ratio of the source by 3 percentage points, and testbed experiments on FlockLab demonstrate an 80% reduction in the average current draw.
在隐私关键型传感器网络和物联网应用中,源位置隐私(SLP)是监控资产的重要属性。存在许多感知SLP的路由技术,其中最引人注目的是在SLP和其他关键指标(如能量(由于电池电量))之间进行权衡。通常,发送的消息数量被用作能耗的代理。现有的工作(针对本地攻击者的SLP)没有考虑通过占空比来降低SLP感知路由协议的能量成本的睡眠影响。因此,存在两个主要挑战:(i)如何在不丢失配置SLP协议的控制消息的情况下实现低占空比;(ii)如何在不需要长时间清醒的情况下实现高SLP。在这篇文章中,我们提出了一个新的形式化的占空比协议作为一个转换过程。利用派生的转换规则,我们提出了针对本地窃听攻击者的slp感知路由协议的第一个占空比协议。在网格上的仿真结果表明占空比为10%,而源捕获率仅提高了3个百分点,并且在FlockLab上的测试平台实验表明平均电流消耗减少了80%。
{"title":"A Spatial Source Location Privacy-aware Duty Cycle for Internet of Things Sensor Networks","authors":"M. Bradbury, A. Jhumka, C. Maple","doi":"10.1145/3430379","DOIUrl":"https://doi.org/10.1145/3430379","url":null,"abstract":"Source Location Privacy (SLP) is an important property for monitoring assets in privacy-critical sensor network and Internet of Things applications. Many SLP-aware routing techniques exist, with most striking a tradeoff between SLP and other key metrics such as energy (due to battery power). Typically, the number of messages sent has been used as a proxy for the energy consumed. Existing work (for SLP against a local attacker) does not consider the impact of sleeping via duty cycling to reduce the energy cost of an SLP-aware routing protocol. Therefore, two main challenges exist: (i) how to achieve a low duty cycle without loss of control messages that configure the SLP protocol and (ii) how to achieve high SLP without requiring a long time spent awake. In this article, we present a novel formalisation of a duty cycling protocol as a transformation process. Using derived transformation rules, we present the first duty cycling protocol for an SLP-aware routing protocol for a local eavesdropping attacker. Simulation results on grids demonstrate a duty cycle of 10%, while only increasing the capture ratio of the source by 3 percentage points, and testbed experiments on FlockLab demonstrate an 80% reduction in the average current draw.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2021-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75074523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Velocity Optimization of Pure Electric Vehicles with Traffic Dynamics and Driving Safety Considerations 考虑交通动力学和驾驶安全的纯电动汽车速度优化
IF 2.7 Pub Date : 2021-02-01 DOI: 10.1145/3433678
Liuwang Kang, Ankur Sarker, Haiying Shen
As Electric Vehicles (EVs) become increasingly popular, their battery-related problems (e.g., short driving range and heavy battery weight) must be resolved as soon as possible. Velocity optimization of EVs to minimize energy consumption in driving is an effective alternative to handle these problems. However, previous velocity optimization methods assume that vehicles will pass through traffic lights immediately at green traffic signals. Actually, a vehicle may still experience a delay to pass a green traffic light due to a vehicle waiting queue in front of the traffic light. Also, as velocity optimization is for individual vehicles, previous methods cannot avoid rear-end collisions. That is, a vehicle following its optimal velocity profile may experience rear-end collisions with its frontal vehicle on the road. In this article, for the first time, we propose a velocity optimization system that enables EVs to immediately pass green traffic lights without delay and to avoid rear-end collisions to ensure driving safety when EVs follow optimal velocity profiles on the road. We collected real driving data on road sections of US-25 highway (with two driving lanes in each direction and relatively low traffic volume) to conduct extensive trace-driven simulation studies. Results show that our velocity optimization system reduces energy consumption by up to 17.5% compared with real driving patterns without increasing trip time. Also, it helps EVs to avoid possible collisions compared with existing collision avoidance methods.
随着电动汽车(ev)的日益普及,其电池相关问题(如行驶里程短、电池重量大)必须尽快解决。对电动汽车进行速度优化以实现行驶能耗最小化是解决这些问题的有效途径。然而,以往的速度优化方法假设车辆在绿灯处立即通过交通信号灯。实际上,车辆通过绿灯时仍然可能会遇到延误,因为有车辆在红绿灯前排队等候。此外,由于速度优化是针对单个车辆的,以往的方法无法避免追尾碰撞。也就是说,遵循最佳速度剖面的车辆可能会与道路上的前方车辆发生追尾碰撞。在本文中,我们首次提出了一种速度优化系统,使电动汽车在道路上按照最优速度曲线行驶时,能够立即无延迟地通过绿灯,避免追尾,确保驾驶安全。我们收集了US-25高速公路(每个方向有两条车道,车流量相对较低)路段的真实驾驶数据,进行了广泛的轨迹驱动模拟研究。结果表明,该速度优化系统在不增加行驶时间的情况下,与实际驾驶模式相比,能耗降低了17.5%。此外,与现有的避碰方法相比,它可以帮助电动汽车避免可能发生的碰撞。
{"title":"Velocity Optimization of Pure Electric Vehicles with Traffic Dynamics and Driving Safety Considerations","authors":"Liuwang Kang, Ankur Sarker, Haiying Shen","doi":"10.1145/3433678","DOIUrl":"https://doi.org/10.1145/3433678","url":null,"abstract":"As Electric Vehicles (EVs) become increasingly popular, their battery-related problems (e.g., short driving range and heavy battery weight) must be resolved as soon as possible. Velocity optimization of EVs to minimize energy consumption in driving is an effective alternative to handle these problems. However, previous velocity optimization methods assume that vehicles will pass through traffic lights immediately at green traffic signals. Actually, a vehicle may still experience a delay to pass a green traffic light due to a vehicle waiting queue in front of the traffic light. Also, as velocity optimization is for individual vehicles, previous methods cannot avoid rear-end collisions. That is, a vehicle following its optimal velocity profile may experience rear-end collisions with its frontal vehicle on the road. In this article, for the first time, we propose a velocity optimization system that enables EVs to immediately pass green traffic lights without delay and to avoid rear-end collisions to ensure driving safety when EVs follow optimal velocity profiles on the road. We collected real driving data on road sections of US-25 highway (with two driving lanes in each direction and relatively low traffic volume) to conduct extensive trace-driven simulation studies. Results show that our velocity optimization system reduces energy consumption by up to 17.5% compared with real driving patterns without increasing trip time. Also, it helps EVs to avoid possible collisions compared with existing collision avoidance methods.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2021-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82491871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security and Privacy Requirements for the Internet of Things 物联网的安全与隐私需求
IF 2.7 Pub Date : 2021-02-01 DOI: 10.1145/3437537
Nada Alhirabi, O. Rana, Charith Perera
The design and development process for internet of things (IoT) applications is more complicated than that for desktop, mobile, or web applications. First, IoT applications require both software and hardware to work together across many different types of nodes with different capabilities under different conditions. Second, IoT application development involves different types of software engineers such as desktop, web, embedded, and mobile to work together. Furthermore, non-software engineering personnel such as business analysts are also involved in the design process. In addition to the complexity of having multiple software engineering specialists cooperating to merge different hardware and software components together, the development process requires different software and hardware stacks to be integrated together (e.g., different stacks from different companies such as Microsoft Azure and IBM Bluemix). Due to the above complexities, non-functional requirements (such as security and privacy, which are highly important in the context of the IoT) tend to be ignored or treated as though they are less important in the IoT application development process. This article reviews techniques, methods, and tools to support security and privacy requirements in existing non-IoT application designs, enabling their use and integration into IoT applications. This article primarily focuses on design notations, models, and languages that facilitate capturing non-functional requirements (i.e., security and privacy). Our goal is not only to analyse, compare, and consolidate the empirical research but also to appreciate their findings and discuss their applicability for the IoT.
物联网(IoT)应用程序的设计和开发过程比桌面、移动或web应用程序更复杂。首先,物联网应用需要软件和硬件在不同条件下跨具有不同功能的许多不同类型的节点协同工作。其次,物联网应用程序的开发涉及不同类型的软件工程师,如桌面、web、嵌入式和移动,以协同工作。此外,像业务分析师这样的非软件工程人员也参与到设计过程中。除了让多个软件工程专家合作将不同的硬件和软件组件合并在一起的复杂性之外,开发过程还需要将不同的软件和硬件堆栈集成在一起(例如,来自不同公司的不同堆栈,例如Microsoft Azure和IBM Bluemix)。由于上述复杂性,非功能需求(例如在物联网环境中非常重要的安全性和隐私性)往往被忽略或视为在物联网应用程序开发过程中不那么重要。本文回顾了支持现有非物联网应用设计中的安全和隐私需求的技术、方法和工具,使其能够使用并集成到物联网应用中。本文主要关注有助于捕获非功能需求(即安全性和隐私性)的设计符号、模型和语言。我们的目标不仅是分析、比较和巩固实证研究,而且还要欣赏他们的发现并讨论他们对物联网的适用性。
{"title":"Security and Privacy Requirements for the Internet of Things","authors":"Nada Alhirabi, O. Rana, Charith Perera","doi":"10.1145/3437537","DOIUrl":"https://doi.org/10.1145/3437537","url":null,"abstract":"The design and development process for internet of things (IoT) applications is more complicated than that for desktop, mobile, or web applications. First, IoT applications require both software and hardware to work together across many different types of nodes with different capabilities under different conditions. Second, IoT application development involves different types of software engineers such as desktop, web, embedded, and mobile to work together. Furthermore, non-software engineering personnel such as business analysts are also involved in the design process. In addition to the complexity of having multiple software engineering specialists cooperating to merge different hardware and software components together, the development process requires different software and hardware stacks to be integrated together (e.g., different stacks from different companies such as Microsoft Azure and IBM Bluemix). Due to the above complexities, non-functional requirements (such as security and privacy, which are highly important in the context of the IoT) tend to be ignored or treated as though they are less important in the IoT application development process. This article reviews techniques, methods, and tools to support security and privacy requirements in existing non-IoT application designs, enabling their use and integration into IoT applications. This article primarily focuses on design notations, models, and languages that facilitate capturing non-functional requirements (i.e., security and privacy). Our goal is not only to analyse, compare, and consolidate the empirical research but also to appreciate their findings and discuss their applicability for the IoT.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2021-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83751973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Location- and Person-Independent Activity Recognition with WiFi, Deep Neural Networks, and Reinforcement Learning WiFi,深度神经网络和强化学习的位置和人独立活动识别
IF 2.7 Pub Date : 2021-01-21 DOI: 10.1145/3424739
Yongsen Ma, S. Arshad, Swetha Muniraju, E. Torkildson, Enrico Rantala, K. Doppler, Gang Zhou
In recent years, Channel State Information (CSI) measured by WiFi is widely used for human activity recognition. In this article, we propose a deep learning design for location- and person-independent activity recognition with WiFi. The proposed design consists of three Deep Neural Networks (DNNs): a 2D Convolutional Neural Network (CNN) as the recognition algorithm, a 1D CNN as the state machine, and a reinforcement learning agent for neural architecture search. The recognition algorithm learns location- and person-independent features from different perspectives of CSI data. The state machine learns temporal dependency information from history classification results. The reinforcement learning agent optimizes the neural architecture of the recognition algorithm using a Recurrent Neural Network (RNN) with Long Short-Term Memory (LSTM). The proposed design is evaluated in a lab environment with different WiFi device locations, antenna orientations, sitting/standing/walking locations/orientations, and multiple persons. The proposed design has 97% average accuracy when testing devices and persons are not seen during training. The proposed design is also evaluated by two public datasets with accuracy of 80% and 83%. The proposed design needs very little human efforts for ground truth labeling, feature engineering, signal processing, and tuning of learning parameters and hyperparameters.
近年来,WiFi测量的信道状态信息(Channel State Information, CSI)被广泛用于人体活动识别。在本文中,我们提出了一种基于WiFi的独立于位置和个人的活动识别的深度学习设计。提出的设计由三个深度神经网络(dnn)组成:二维卷积神经网络(CNN)作为识别算法,一维卷积神经网络作为状态机,以及用于神经结构搜索的强化学习代理。该识别算法从CSI数据的不同角度学习与位置和人无关的特征。状态机从历史分类结果中学习时间依赖信息。强化学习智能体使用具有长短期记忆(LSTM)的递归神经网络(RNN)优化识别算法的神经结构。在不同的WiFi设备位置、天线方向、坐/站/行走位置/方向和多人的实验室环境中对所提出的设计进行了评估。当训练期间没有看到测试设备和人员时,所提出的设计的平均准确率为97%。该设计还通过两个公共数据集进行了评估,准确率分别为80%和83%。所提出的设计需要很少的人力来进行地面真值标记、特征工程、信号处理以及学习参数和超参数的调整。
{"title":"Location- and Person-Independent Activity Recognition with WiFi, Deep Neural Networks, and Reinforcement Learning","authors":"Yongsen Ma, S. Arshad, Swetha Muniraju, E. Torkildson, Enrico Rantala, K. Doppler, Gang Zhou","doi":"10.1145/3424739","DOIUrl":"https://doi.org/10.1145/3424739","url":null,"abstract":"In recent years, Channel State Information (CSI) measured by WiFi is widely used for human activity recognition. In this article, we propose a deep learning design for location- and person-independent activity recognition with WiFi. The proposed design consists of three Deep Neural Networks (DNNs): a 2D Convolutional Neural Network (CNN) as the recognition algorithm, a 1D CNN as the state machine, and a reinforcement learning agent for neural architecture search. The recognition algorithm learns location- and person-independent features from different perspectives of CSI data. The state machine learns temporal dependency information from history classification results. The reinforcement learning agent optimizes the neural architecture of the recognition algorithm using a Recurrent Neural Network (RNN) with Long Short-Term Memory (LSTM). The proposed design is evaluated in a lab environment with different WiFi device locations, antenna orientations, sitting/standing/walking locations/orientations, and multiple persons. The proposed design has 97% average accuracy when testing devices and persons are not seen during training. The proposed design is also evaluated by two public datasets with accuracy of 80% and 83%. The proposed design needs very little human efforts for ground truth labeling, feature engineering, signal processing, and tuning of learning parameters and hyperparameters.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2021-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78014146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Opportunistic Transmission of Control Packets for Faster Formation of 6TiSCH Network 6TiSCH网络快速形成控制包的机会传输
IF 2.7 Pub Date : 2021-01-02 DOI: 10.1145/3430380
Alakesh Kalita, M. Khatua
Network bootstrapping is one of the initial tasks executed in any wireless network such as Industrial Internet of Things (IIoT). Fast formation of IIoT network helps in resource conservation and efficient data collection. Our probabilistic analysis reveals that the performance of 6TiSCH based IIoT network formation degrades with time because of the following reasons: (i) IETF 6TiSCH Minimal Configuration (6TiSCH-MC) standard considered that beacon frame has the highest priority over all other control packets, (ii) 6TiSCH-MC provides minimal routing information during network formation, and (iii) sometimes, joined node can not transmit control packets due to high congestion in shared slots. To deal with these problems, this article proposes two schemes—opportunistic priority alternation and rate control (OPR) and opportunistic channel access (OCA). OPR dynamically adjusts the priority of control packets and provides sufficient routing information during network bootstrapping, whereas OCA allows the nodes having urgent packet to transmit it in less time. Along with the theoretical analysis of the proposed schemes, we also provide comparison-based simulation and real testbed experiment results to validate the proposed schemes together. The received results show significant performance improvements in terms of joining time and energy consumption.
网络引导是任何无线网络(如工业物联网(IIoT))中执行的初始任务之一。工业物联网网络的快速形成有助于资源节约和高效的数据收集。我们的概率分析表明,由于以下原因,基于6TiSCH的IIoT网络形成性能随着时间的推移而下降:(i) IETF 6TiSCH最小配置(6TiSCH- mc)标准认为信标帧具有高于所有其他控制数据包的最高优先级;(ii) 6TiSCH- mc在网络形成过程中提供的路由信息最少;(iii)有时,由于共享槽的高度拥塞,加入节点无法传输控制数据包。针对这些问题,本文提出了机会优先级交替和速率控制(OPR)和机会信道接入(OCA)两种方案。OPR可以动态调整控制报文的优先级,并在网络启动过程中提供足够的路由信息,而OCA则允许具有紧急报文的节点在更短的时间内传输。在对所提方案进行理论分析的同时,我们还提供了基于对比的仿真和真实试验台实验结果来验证所提方案。得到的结果表明,在连接时间和能耗方面有显著的性能改进。
{"title":"Opportunistic Transmission of Control Packets for Faster Formation of 6TiSCH Network","authors":"Alakesh Kalita, M. Khatua","doi":"10.1145/3430380","DOIUrl":"https://doi.org/10.1145/3430380","url":null,"abstract":"Network bootstrapping is one of the initial tasks executed in any wireless network such as Industrial Internet of Things (IIoT). Fast formation of IIoT network helps in resource conservation and efficient data collection. Our probabilistic analysis reveals that the performance of 6TiSCH based IIoT network formation degrades with time because of the following reasons: (i) IETF 6TiSCH Minimal Configuration (6TiSCH-MC) standard considered that beacon frame has the highest priority over all other control packets, (ii) 6TiSCH-MC provides minimal routing information during network formation, and (iii) sometimes, joined node can not transmit control packets due to high congestion in shared slots. To deal with these problems, this article proposes two schemes—opportunistic priority alternation and rate control (OPR) and opportunistic channel access (OCA). OPR dynamically adjusts the priority of control packets and provides sufficient routing information during network bootstrapping, whereas OCA allows the nodes having urgent packet to transmit it in less time. Along with the theoretical analysis of the proposed schemes, we also provide comparison-based simulation and real testbed experiment results to validate the proposed schemes together. The received results show significant performance improvements in terms of joining time and energy consumption.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2021-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86121200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
On Lightweight Privacy-preserving Collaborative Learning for Internet of Things by Independent Random Projections 基于独立随机投影的物联网轻量级隐私保护协同学习研究
IF 2.7 Pub Date : 2020-12-11 DOI: 10.1145/3441303
Linshan Jiang, Rui Tan, Xin Lou, Guosheng Lin
The Internet of Things (IoT) will be a main data generation infrastructure for achieving better system intelligence. This article considers the design and implementation of a practical privacy-preserving collaborative learning scheme, in which a curious learning coordinator trains a better machine learning model based on the data samples contributed by a number of IoT objects, while the confidentiality of the raw forms of the training data is protected against the coordinator. Existing distributed machine learning and data encryption approaches incur significant computation and communication overhead, rendering them ill-suited for resource-constrained IoT objects. We study an approach that applies independent random projection at each IoT object to obfuscate data and trains a deep neural network at the coordinator based on the projected data from the IoT objects. This approach introduces light computation overhead to the IoT objects and moves most workload to the coordinator that can have sufficient computing resources. Although the independent projections performed by the IoT objects address the potential collusion between the curious coordinator and some compromised IoT objects, they significantly increase the complexity of the projected data. In this article, we leverage the superior learning capability of deep learning in capturing sophisticated patterns to maintain good learning performance. Extensive comparative evaluation shows that this approach outperforms other lightweight approaches that apply additive noisification for differential privacy and/or support vector machines for learning in the applications with light to moderate data pattern complexities.
物联网(IoT)将成为实现更好的系统智能的主要数据生成基础设施。本文考虑了一种实用的保护隐私的协作学习方案的设计和实现,其中好奇的学习协调器根据许多物联网对象提供的数据样本训练更好的机器学习模型,同时保护训练数据原始形式的机密性不受协调器的影响。现有的分布式机器学习和数据加密方法会产生大量的计算和通信开销,使得它们不适合资源受限的物联网对象。我们研究了一种方法,该方法在每个物联网对象上应用独立随机投影来混淆数据,并基于来自物联网对象的投影数据在协调器上训练深度神经网络。这种方法为物联网对象引入了少量的计算开销,并将大部分工作负载转移给具有足够计算资源的协调器。尽管物联网对象执行的独立预测解决了好奇的协调器和一些受损物联网对象之间的潜在勾结,但它们显着增加了预测数据的复杂性。在本文中,我们利用深度学习的优越学习能力来捕获复杂的模式,以保持良好的学习性能。广泛的比较评估表明,这种方法优于其他轻量级方法,这些方法在具有轻度到中度数据模式复杂性的应用程序中对差分隐私和/或支持向量机应用加性噪声进行学习。
{"title":"On Lightweight Privacy-preserving Collaborative Learning for Internet of Things by Independent Random Projections","authors":"Linshan Jiang, Rui Tan, Xin Lou, Guosheng Lin","doi":"10.1145/3441303","DOIUrl":"https://doi.org/10.1145/3441303","url":null,"abstract":"The Internet of Things (IoT) will be a main data generation infrastructure for achieving better system intelligence. This article considers the design and implementation of a practical privacy-preserving collaborative learning scheme, in which a curious learning coordinator trains a better machine learning model based on the data samples contributed by a number of IoT objects, while the confidentiality of the raw forms of the training data is protected against the coordinator. Existing distributed machine learning and data encryption approaches incur significant computation and communication overhead, rendering them ill-suited for resource-constrained IoT objects. We study an approach that applies independent random projection at each IoT object to obfuscate data and trains a deep neural network at the coordinator based on the projected data from the IoT objects. This approach introduces light computation overhead to the IoT objects and moves most workload to the coordinator that can have sufficient computing resources. Although the independent projections performed by the IoT objects address the potential collusion between the curious coordinator and some compromised IoT objects, they significantly increase the complexity of the projected data. In this article, we leverage the superior learning capability of deep learning in capturing sophisticated patterns to maintain good learning performance. Extensive comparative evaluation shows that this approach outperforms other lightweight approaches that apply additive noisification for differential privacy and/or support vector machines for learning in the applications with light to moderate data pattern complexities.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81054621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Federated Learning Approach to Anomaly Detection in Smart Buildings 智能建筑异常检测的联邦学习方法
IF 2.7 Pub Date : 2020-10-20 DOI: 10.1145/3467981
Raed Abdel Sater, A. Hamza
Internet of Things (IoT) sensors in smart buildings are becoming increasingly ubiquitous, making buildings more livable, energy efficient, and sustainable. These devices sense the environment and generate multivariate temporal data of paramount importance for detecting anomalies and improving the prediction of energy usage in smart buildings. However, detecting these anomalies in centralized systems is often plagued by a huge delay in response time. To overcome this issue, we formulate the anomaly detection problem in a federated learning setting by leveraging the multi-task learning paradigm, which aims at solving multiple tasks simultaneously while taking advantage of the similarities and differences across tasks. We propose a novel privacy-by-design federated learning model using a stacked long short-time memory (LSTM) model, and we demonstrate that it is more than twice as fast during training convergence compared to the centralized LSTM. The effectiveness of our federated learning approach is demonstrated on three real-world datasets generated by the IoT production system at General Electric Current smart building, achieving state-of-the-art performance compared to baseline methods in both classification and regression tasks. Our experimental results demonstrate the effectiveness of the proposed framework in reducing the overall training cost without compromising the prediction performance.
智能建筑中的物联网(IoT)传感器变得越来越普遍,使建筑更加宜居、节能和可持续。这些设备感知环境并生成多元时间数据,这些数据对于检测异常和改进智能建筑中的能源使用预测至关重要。然而,在集中式系统中检测这些异常通常会受到响应时间的巨大延迟的困扰。为了克服这一问题,我们利用多任务学习范式在联邦学习环境中制定异常检测问题,该范式旨在同时解决多个任务,同时利用任务之间的相似性和差异性。我们提出了一种使用堆叠长短时记忆(LSTM)模型的新型隐私设计联邦学习模型,并且我们证明了与集中式LSTM相比,它在训练收敛期间的速度要快两倍以上。我们的联合学习方法的有效性在通用电气当前智能建筑的物联网生产系统生成的三个真实数据集上得到了证明,与分类和回归任务的基线方法相比,实现了最先进的性能。我们的实验结果证明了该框架在不影响预测性能的情况下降低整体训练成本的有效性。
{"title":"A Federated Learning Approach to Anomaly Detection in Smart Buildings","authors":"Raed Abdel Sater, A. Hamza","doi":"10.1145/3467981","DOIUrl":"https://doi.org/10.1145/3467981","url":null,"abstract":"Internet of Things (IoT) sensors in smart buildings are becoming increasingly ubiquitous, making buildings more livable, energy efficient, and sustainable. These devices sense the environment and generate multivariate temporal data of paramount importance for detecting anomalies and improving the prediction of energy usage in smart buildings. However, detecting these anomalies in centralized systems is often plagued by a huge delay in response time. To overcome this issue, we formulate the anomaly detection problem in a federated learning setting by leveraging the multi-task learning paradigm, which aims at solving multiple tasks simultaneously while taking advantage of the similarities and differences across tasks. We propose a novel privacy-by-design federated learning model using a stacked long short-time memory (LSTM) model, and we demonstrate that it is more than twice as fast during training convergence compared to the centralized LSTM. The effectiveness of our federated learning approach is demonstrated on three real-world datasets generated by the IoT production system at General Electric Current smart building, achieving state-of-the-art performance compared to baseline methods in both classification and regression tasks. Our experimental results demonstrate the effectiveness of the proposed framework in reducing the overall training cost without compromising the prediction performance.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80335269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Edge-Assisted Control for Healthcare Internet of Things 医疗物联网边缘辅助控制
IF 2.7 Pub Date : 2020-10-19 DOI: 10.1145/3407091
A. Anzanpour, Delaram Amiri, I. Azimi, M. Levorato, N. Dutt, P. Liljeberg, A. Rahmani
Recent advances in pervasive Internet of Things technologies and edge computing have opened new avenues for development of ubiquitous health monitoring applications. Delivering an acceptable level of usability and accuracy for these healthcare Internet of Things applications requires optimization of both system-driven and data-driven aspects, which are typically done in a disjoint manner. Although decoupled optimization of these processes yields local optima at each level, synergistic coupling of the system and data levels can lead to a holistic solution opening new opportunities for optimization. In this article, we present an edge-assisted resource manager that dynamically controls the fidelity and duration of sensing w.r.t. changes in the patient’s activity and health state, thus fine-tuning the trade-off between energy efficiency and measurement accuracy. The cornerstone of our proposed solution is an intelligent low-latency real-time controller implemented at the edge layer that detects abnormalities in the patient’s condition and accordingly adjusts the sensing parameters of a reconfigurable wireless sensor node. We assess the efficiency of our proposed system via a case study of the photoplethysmography-based medical early warning score system. Our experiments on a real full hardware-software early warning score system reveal up to 49% power savings while maintaining the accuracy of the sensory data.
普及物联网技术和边缘计算的最新进展为开发无处不在的健康监测应用开辟了新的途径。为这些医疗保健物联网应用程序提供可接受的可用性和准确性水平,需要对系统驱动和数据驱动两个方面进行优化,而这两个方面通常以脱节的方式完成。虽然这些过程的解耦优化在每个级别上产生局部最优,但系统和数据级别的协同耦合可以产生一个整体的解决方案,为优化提供新的机会。在本文中,我们介绍了一种边缘辅助资源管理器,它可以动态控制感知患者活动和健康状态下w.r.t.变化的保真度和持续时间,从而微调能源效率和测量精度之间的权衡。我们提出的解决方案的基础是在边缘层实现一个智能低延迟实时控制器,该控制器可以检测患者病情的异常情况,并相应地调整可重构无线传感器节点的传感参数。我们通过一个基于光容积脉搏波的医疗预警评分系统的案例研究来评估我们提出的系统的效率。我们在一个真正的全硬件软件预警评分系统上的实验显示,在保持感官数据准确性的同时,节省高达49%的电力。
{"title":"Edge-Assisted Control for Healthcare Internet of Things","authors":"A. Anzanpour, Delaram Amiri, I. Azimi, M. Levorato, N. Dutt, P. Liljeberg, A. Rahmani","doi":"10.1145/3407091","DOIUrl":"https://doi.org/10.1145/3407091","url":null,"abstract":"Recent advances in pervasive Internet of Things technologies and edge computing have opened new avenues for development of ubiquitous health monitoring applications. Delivering an acceptable level of usability and accuracy for these healthcare Internet of Things applications requires optimization of both system-driven and data-driven aspects, which are typically done in a disjoint manner. Although decoupled optimization of these processes yields local optima at each level, synergistic coupling of the system and data levels can lead to a holistic solution opening new opportunities for optimization. In this article, we present an edge-assisted resource manager that dynamically controls the fidelity and duration of sensing w.r.t. changes in the patient’s activity and health state, thus fine-tuning the trade-off between energy efficiency and measurement accuracy. The cornerstone of our proposed solution is an intelligent low-latency real-time controller implemented at the edge layer that detects abnormalities in the patient’s condition and accordingly adjusts the sensing parameters of a reconfigurable wireless sensor node. We assess the efficiency of our proposed system via a case study of the photoplethysmography-based medical early warning score system. Our experiments on a real full hardware-software early warning score system reveal up to 49% power savings while maintaining the accuracy of the sensory data.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76847146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
ACM Transactions on Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1