Pub Date : 2017-03-13DOI: 10.1109/PERCOMW.2017.7917612
Rami Akeela, Yacoub Elziq
In order to efficiently support the Machine-to-Machine (M2M) and Internet of Things (IoT) applications, a new amendment for the Wi-Fi standard known as IEEE 802.11ah is introduced. In 802.11ah (or Wi-Fi HaLow), several enhanced MAC features are added in order to provide scalability for a large number of stations, increase the range of operation, while at the same time reduce the energy consumption compared to the existing Wi-Fi standards. In this paper, a Verilog RTL implementation of the new standard is presented. It is suitable for IoT, M2M, V2V (Vehicle-to-Vehicle) applications, and smart grids that require long battery life and long range reliability. Software simulations using Xilinx Vivado are also provided to verify the design. The design is then synthesized using the same tool, and performance, power, and area are reported.
{"title":"Design and verification of IEEE 802.11ah for IoT and M2M applications","authors":"Rami Akeela, Yacoub Elziq","doi":"10.1109/PERCOMW.2017.7917612","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917612","url":null,"abstract":"In order to efficiently support the Machine-to-Machine (M2M) and Internet of Things (IoT) applications, a new amendment for the Wi-Fi standard known as IEEE 802.11ah is introduced. In 802.11ah (or Wi-Fi HaLow), several enhanced MAC features are added in order to provide scalability for a large number of stations, increase the range of operation, while at the same time reduce the energy consumption compared to the existing Wi-Fi standards. In this paper, a Verilog RTL implementation of the new standard is presented. It is suitable for IoT, M2M, V2V (Vehicle-to-Vehicle) applications, and smart grids that require long battery life and long range reliability. Software simulations using Xilinx Vivado are also provided to verify the design. The design is then synthesized using the same tool, and performance, power, and area are reported.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117346564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-13DOI: 10.1109/PERCOMW.2017.7917593
A. Khasnobish, R. Gavas, D. Chatterjee, Ved Raj, S. Naitam
The paper presents EyeAssist, a low cost, user friendly communication aid developed specifically for individuals suffering from neuro-motor problems. Existing gaze based typing systems encounter problems of unintentional key presses, extensive calibration process and inbuilt noise of eye trackers. We tried to solve these problems in the EyeAssist system by employing accurate gaze tracking. Fixation information are derived from the acquired gaze data. The systematic and variable noises of the eye tracker are being removed by graph signal processing based filters, Kalman filter and linear transformation. A unique one-time calibration which is subject and session independent has made the system easy to use without compromising its efficacy. The system has provision for setting variable dwell time according to users' preferences. EyeAssist also provides some unique features like text to speech conversion of typed sentences, predictive word and sentence entry etc. Results show that the average typing rate is 11.8 words per minute with an average error rate of 6.6%. Moreover the error rate reduces drastically with some practice. The system is user friendly, easy to use which makes it a perfect choice for patients suffering with neuro-motor disabilities.
{"title":"EyeAssist: A communication aid through gaze tracking for patients with neuro-motor disabilities","authors":"A. Khasnobish, R. Gavas, D. Chatterjee, Ved Raj, S. Naitam","doi":"10.1109/PERCOMW.2017.7917593","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917593","url":null,"abstract":"The paper presents EyeAssist, a low cost, user friendly communication aid developed specifically for individuals suffering from neuro-motor problems. Existing gaze based typing systems encounter problems of unintentional key presses, extensive calibration process and inbuilt noise of eye trackers. We tried to solve these problems in the EyeAssist system by employing accurate gaze tracking. Fixation information are derived from the acquired gaze data. The systematic and variable noises of the eye tracker are being removed by graph signal processing based filters, Kalman filter and linear transformation. A unique one-time calibration which is subject and session independent has made the system easy to use without compromising its efficacy. The system has provision for setting variable dwell time according to users' preferences. EyeAssist also provides some unique features like text to speech conversion of typed sentences, predictive word and sentence entry etc. Results show that the average typing rate is 11.8 words per minute with an average error rate of 6.6%. Moreover the error rate reduces drastically with some practice. The system is user friendly, easy to use which makes it a perfect choice for patients suffering with neuro-motor disabilities.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129515119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-13DOI: 10.1109/PERCOMW.2017.7917540
Dominik Schürmann
Many scenarios require confidential communication and protection against active attackers. The way to establish trust between devices and authenticate these networks depends completely on the scenario. In Body Area Networks human biometrics can serve as a shared secret among devices. In real-time voice communication, the ZRTP protocol allows for interactive trust establishment by recognizing the peer's voice. In asynchronous networks, such as email, other interactive mechanisms have been deployed, such as key fingerprint verification. In our research, we are analyzing the security and usability of existing trust mechanisms for heterogeneous networks. Furthermore, we are proposing protocol changes and new mechanisms to establish trust between devices. In this paper an overview is given over existing and upcoming research in this area. For synchronous networks, human biometrics, such as human gait or a peer's voice, are used as trust anchors. For asynchronous networks, the usability of interactive public-key verification mechanism are analyzed as trust anchors.
{"title":"Establishing trust in heterogeneous networks","authors":"Dominik Schürmann","doi":"10.1109/PERCOMW.2017.7917540","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917540","url":null,"abstract":"Many scenarios require confidential communication and protection against active attackers. The way to establish trust between devices and authenticate these networks depends completely on the scenario. In Body Area Networks human biometrics can serve as a shared secret among devices. In real-time voice communication, the ZRTP protocol allows for interactive trust establishment by recognizing the peer's voice. In asynchronous networks, such as email, other interactive mechanisms have been deployed, such as key fingerprint verification. In our research, we are analyzing the security and usability of existing trust mechanisms for heterogeneous networks. Furthermore, we are proposing protocol changes and new mechanisms to establish trust between devices. In this paper an overview is given over existing and upcoming research in this area. For synchronous networks, human biometrics, such as human gait or a peer's voice, are used as trust anchors. For asynchronous networks, the usability of interactive public-key verification mechanism are analyzed as trust anchors.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122380221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-13DOI: 10.1109/PERCOMW.2017.7917506
T. Maekawa
Preparing and labeling sensing data are necessary when we develop state-of-the-art sensing devices or methods in our studies. Since developing and proposing new sensing devices or modalities are important in the pervasive computing and ubicomp research communities, we need to provide high quality labeled data by making use of our limited time whenever we develop a new sensing device. In this keynote talk, we first introduce our recent studies on activity recognition and indoor positioning based on machine learning. Later, we discuss important aspects of producing labeled data and share our experiences gathered during our research activities.
{"title":"Good pervasive computing studies require laborious data labeling efforts: Our experience in activity recognition and indoor positioning studies","authors":"T. Maekawa","doi":"10.1109/PERCOMW.2017.7917506","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917506","url":null,"abstract":"Preparing and labeling sensing data are necessary when we develop state-of-the-art sensing devices or methods in our studies. Since developing and proposing new sensing devices or modalities are important in the pervasive computing and ubicomp research communities, we need to provide high quality labeled data by making use of our limited time whenever we develop a new sensing device. In this keynote talk, we first introduce our recent studies on activity recognition and indoor positioning based on machine learning. Later, we discuss important aspects of producing labeled data and share our experiences gathered during our research activities.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130158890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-13DOI: 10.1109/PERCOMW.2017.7917541
Yanbing Yang
While the traditional Visible Light Communication (VLC) system has attracted a lot of research attentions on boosting throughput, using Commercial Off-The-Shelf (COTS) devices, e.g. existing cameras on the smartphones, is a recent trend to implement readily deployable VLC systems. In particular, since LED-Camera VLC systems have shown a promising potential in large indoor communication due to the growing deployment of LED lighting infrastructure, a comprehensive VLC system with cooperative transmission and roaming support has become an impending need. To this end, we propose a novel VLC and visible light sensing (VLS) system to address that by leveraging LED sensing and effective encoding/decoding schemes. It is achieved first by utilizing LED sensing via converting parts of LED luminaire into light sensors to detect diffuse reflection change caused by presence of the user. After the users are detected and located, the system employs rateless codes and newly designed code assignment scheme to collaboratively transmit to detected users in their communication cells. We believe the proposed system has the potential to a roaming support VLC system in the whole building or indoor areas.
虽然传统的可见光通信(VLC)系统在提高吞吐量方面吸引了大量的研究关注,但使用商用现货(COTS)设备,例如智能手机上现有的摄像头,是实现易于部署的VLC系统的最新趋势。特别是,由于LED照明基础设施的部署不断增加,LED- camera VLC系统在大型室内通信中显示出了良好的潜力,因此具有协作传输和漫游支持的综合VLC系统已成为迫在眉睫的需求。为此,我们提出了一种新的VLC和可见光传感(VLS)系统,通过利用LED传感和有效的编码/解码方案来解决这个问题。它首先是利用LED传感,通过将LED灯具的部分转换成光传感器来检测由于用户存在而引起的漫反射变化。在用户被检测并定位后,系统采用无速率码和新设计的码分配方案,在被检测用户的通信小区内协同传输。我们相信该系统有潜力成为整个建筑物或室内区域的漫游支持VLC系统。
{"title":"Practical Visible Light Communication system utilizing LED sensing","authors":"Yanbing Yang","doi":"10.1109/PERCOMW.2017.7917541","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917541","url":null,"abstract":"While the traditional Visible Light Communication (VLC) system has attracted a lot of research attentions on boosting throughput, using Commercial Off-The-Shelf (COTS) devices, e.g. existing cameras on the smartphones, is a recent trend to implement readily deployable VLC systems. In particular, since LED-Camera VLC systems have shown a promising potential in large indoor communication due to the growing deployment of LED lighting infrastructure, a comprehensive VLC system with cooperative transmission and roaming support has become an impending need. To this end, we propose a novel VLC and visible light sensing (VLS) system to address that by leveraging LED sensing and effective encoding/decoding schemes. It is achieved first by utilizing LED sensing via converting parts of LED luminaire into light sensors to detect diffuse reflection change caused by presence of the user. After the users are detected and located, the system employs rateless codes and newly designed code assignment scheme to collaboratively transmit to detected users in their communication cells. We believe the proposed system has the potential to a roaming support VLC system in the whole building or indoor areas.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130899307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-13DOI: 10.1109/PERCOMW.2017.7917649
Gerold Hölzl, M. Kranz, A. Schmid, P. Halbmayer, A. Ferscha
Indoor Positioning is a crucial topic to provide autonomous services to people based on their location. Nowadays dominating positioning systems, like GPS (Global Positioning System), are designed for outdoor use not applicable for indoor scenarios as they depend on a direct line of sight to reference stations. Recent progress in wearable computing peaked in the promising development of SmartWatches. They are seen as a successor of the SmartPhone evoking a new era of an always on, large scale, planet spanning, body sensor network. This work investigates in the question if SmartWatches are an accurate and suitable approach for an out of the lab, 24/7, real world Indoor Positioning System. In utilising Wi-Fi fingerprinting methodologies in combination with machine learning techniques, it is shown that state of the art consumer hardware in form of SmartWatches can be used to shape a cost effective, unobtrusive, and accurate indoor positioning system.
{"title":"Size does matter - positioning on the wrist a comparative study: SmartWatch vs. SmartPhone","authors":"Gerold Hölzl, M. Kranz, A. Schmid, P. Halbmayer, A. Ferscha","doi":"10.1109/PERCOMW.2017.7917649","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917649","url":null,"abstract":"Indoor Positioning is a crucial topic to provide autonomous services to people based on their location. Nowadays dominating positioning systems, like GPS (Global Positioning System), are designed for outdoor use not applicable for indoor scenarios as they depend on a direct line of sight to reference stations. Recent progress in wearable computing peaked in the promising development of SmartWatches. They are seen as a successor of the SmartPhone evoking a new era of an always on, large scale, planet spanning, body sensor network. This work investigates in the question if SmartWatches are an accurate and suitable approach for an out of the lab, 24/7, real world Indoor Positioning System. In utilising Wi-Fi fingerprinting methodologies in combination with machine learning techniques, it is shown that state of the art consumer hardware in form of SmartWatches can be used to shape a cost effective, unobtrusive, and accurate indoor positioning system.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131773984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-13DOI: 10.1109/PERCOMW.2017.7917518
Ngu Nguyen, S. Sigg
In this paper, we analyse first-person-view videos to develop a personalized user authentication mechanism. Our proposed algorithm generates provisional image-based passwords which benefit a variety of purposes such as unlocking a mobile device or fallback authentication. First, representative frames are extracted from the egocentric videos. Then, they are split into distinguishable segments before a clustering procedure is applied to discard repetitive scenes. The whole process aims to retain memorable images to form the authentication challenges. We integrate eye tracking data to select informative sequences of video frames and suggest another alternative method if an eye-facing camera is not available. To evaluate our system, we perform experiments in different settings including object-interaction activities and traveling contexts. Even though our mechanism produces variable graphical passwords, the log-in effort for the user is comparable with approaches based on static challenges. We verified the authentication scheme in the presence of an informed attacker and observed that the effort is significantly higher than that of the legitimate user.
{"title":"PassFrame: Generating image-based passwords from egocentric videos","authors":"Ngu Nguyen, S. Sigg","doi":"10.1109/PERCOMW.2017.7917518","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917518","url":null,"abstract":"In this paper, we analyse first-person-view videos to develop a personalized user authentication mechanism. Our proposed algorithm generates provisional image-based passwords which benefit a variety of purposes such as unlocking a mobile device or fallback authentication. First, representative frames are extracted from the egocentric videos. Then, they are split into distinguishable segments before a clustering procedure is applied to discard repetitive scenes. The whole process aims to retain memorable images to form the authentication challenges. We integrate eye tracking data to select informative sequences of video frames and suggest another alternative method if an eye-facing camera is not available. To evaluate our system, we perform experiments in different settings including object-interaction activities and traveling contexts. Even though our mechanism produces variable graphical passwords, the log-in effort for the user is comparable with approaches based on static challenges. We verified the authentication scheme in the presence of an informed attacker and observed that the effort is significantly higher than that of the legitimate user.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131912887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-13DOI: 10.1109/PERCOMW.2017.7917517
Suiming Guo, Yaxiao Liu, Ke Xu, D. Chiu
In recent years emerging ride-on-demand services (eg., Uber or Didi) are penetrating into the market of traditional taxi service. In these new services mobile devices are a key enabler: they serve as the intermediary between passengers/drivers and the service provider, tracking the locations and behavior of both passengers and drivers. On the other hand, the use of mobile devices also help us to capture huge amount of data for analysis. Through collaboration with a leading service provider in China, we collect vast amount of accurate data and analyze, in this paper, passenger reaction to dynamic prices in such a service. We consider the analysis as an important step towards making the service more efficient and more attractive to the passengers. We present the patterns of passengers' reaction, and discuss if it is useful to estimate the trip fare for multiple times in order to get a lower price. Our findings pave the way for future study on system optimization and policy considerations.
{"title":"Understanding passenger reaction to dynamic prices in ride-on-demand service","authors":"Suiming Guo, Yaxiao Liu, Ke Xu, D. Chiu","doi":"10.1109/PERCOMW.2017.7917517","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917517","url":null,"abstract":"In recent years emerging ride-on-demand services (eg., Uber or Didi) are penetrating into the market of traditional taxi service. In these new services mobile devices are a key enabler: they serve as the intermediary between passengers/drivers and the service provider, tracking the locations and behavior of both passengers and drivers. On the other hand, the use of mobile devices also help us to capture huge amount of data for analysis. Through collaboration with a leading service provider in China, we collect vast amount of accurate data and analyze, in this paper, passenger reaction to dynamic prices in such a service. We consider the analysis as an important step towards making the service more efficient and more attractive to the passengers. We present the patterns of passengers' reaction, and discuss if it is useful to estimate the trip fare for multiple times in order to get a lower price. Our findings pave the way for future study on system optimization and policy considerations.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134163093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-13DOI: 10.1109/PERCOMW.2017.7917638
P. Majumder, K. Sinha
Secure wireless communication based applications in IoT typically require very short sessions. Stream ciphers constitute a popular choice for ensuring security of data communications in such applications. To keep the cost, complexity and energy expenditure in the implementation of such stream cipher algorithms low, the short duration of the wireless communication sessions are often exploited by using a lightweight cryptographic (LWC) algorithm. Such an LWC algorithm will provide the desired security during the short session at the required speed, and a new key will be used for the next session so that an adversary would not have enough time to decipher the key of any session. In this paper, we propose a technique based on generating stream of random keys from streaming twitter data. The sequence of random keys generated by the proposed tweet-based key generation (TBKG) algorithm has been tested by the NIST statistical test suite for randomness. The test results show that TBKG algorithm passes all the fifteen tests for randomness. Also, the period of the key values is quite high, thus making it suitable for use over short sessions involving communication of 350 MB data through the wireless network. The unpredictability of the generated random key values is governed by the unpredictable nature of the tweets from thousands of individuals. The algorithm is very simple to implement with low computational and energy overhead.
{"title":"A novel key generation algorithm from twitter data stream for secure communication in IoT","authors":"P. Majumder, K. Sinha","doi":"10.1109/PERCOMW.2017.7917638","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917638","url":null,"abstract":"Secure wireless communication based applications in IoT typically require very short sessions. Stream ciphers constitute a popular choice for ensuring security of data communications in such applications. To keep the cost, complexity and energy expenditure in the implementation of such stream cipher algorithms low, the short duration of the wireless communication sessions are often exploited by using a lightweight cryptographic (LWC) algorithm. Such an LWC algorithm will provide the desired security during the short session at the required speed, and a new key will be used for the next session so that an adversary would not have enough time to decipher the key of any session. In this paper, we propose a technique based on generating stream of random keys from streaming twitter data. The sequence of random keys generated by the proposed tweet-based key generation (TBKG) algorithm has been tested by the NIST statistical test suite for randomness. The test results show that TBKG algorithm passes all the fifteen tests for randomness. Also, the period of the key values is quite high, thus making it suitable for use over short sessions involving communication of 350 MB data through the wireless network. The unpredictability of the generated random key values is governed by the unpredictable nature of the tweets from thousands of individuals. The algorithm is very simple to implement with low computational and energy overhead.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132659634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-13DOI: 10.1109/PERCOMW.2017.7917631
Myeong-in Choi, Keon-hee Cho, Junyeon Hwang, L. Park, Kyuhee Jang, Sunghwan Park, Sehyun Park
Zero energy building (ZEB) technologies are under investigation as a solution to problems of greenhouse gas emissions and energy depletion. Not only to solving energy problems, but also future ZEB needs to provide a comfortable environment for building occupants. A HVAC systems are significant parts of ZEB technologies. However, the existing HVAC systems have several problems. To solve the problem, in this paper, we propose a IoT-based HVAC system (I-HVACS) for indoor air quality (IAQ) management and reduction of building energy consumption. The I-HVACS is implemented and demonstrated in a real building which is a senior care center in Republic of Korea. The power consumption in the building is reduced by about 13.7% compared with the existing system.
{"title":"Design and implementation of IoT-based HVAC system for future zero energy building","authors":"Myeong-in Choi, Keon-hee Cho, Junyeon Hwang, L. Park, Kyuhee Jang, Sunghwan Park, Sehyun Park","doi":"10.1109/PERCOMW.2017.7917631","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917631","url":null,"abstract":"Zero energy building (ZEB) technologies are under investigation as a solution to problems of greenhouse gas emissions and energy depletion. Not only to solving energy problems, but also future ZEB needs to provide a comfortable environment for building occupants. A HVAC systems are significant parts of ZEB technologies. However, the existing HVAC systems have several problems. To solve the problem, in this paper, we propose a IoT-based HVAC system (I-HVACS) for indoor air quality (IAQ) management and reduction of building energy consumption. The I-HVACS is implemented and demonstrated in a real building which is a senior care center in Republic of Korea. The power consumption in the building is reduced by about 13.7% compared with the existing system.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121995565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}