This paper presents GateScatter, the first backscatter-based gateway connecting commodity IoT to WiFi. The backscatter design of GateScatter is an economic option towards pervasive Internet connectivity for ever-growing IoT. The carefully designed tag optimally reshapes ZigBee IoT packets with an arbitrary payload into an 802.11b WiFi packet over the air, such that the payload can be reliably retrieved at the WiFi receiver (hence a gateway). Gate-Scatter is highly compatible - it works with a wide range of IEEE 802.15.4-compliant systems, is agnostic to upper layer proprietary protocols, and does not require any modification to the commodity IoT platforms. GateScatter is extended to BLE IoT for generality. We prototype GateScatter hardware on FPGA where the wide applicability is demonstrated through evaluations on five popular IoT devices including Samsung SmartThings sensor, Philips smart bulb, and Amazon Echo Plus. Further extensive evaluations show that GateScatter consistently achieves throughput above 200 kbps and range of over 27 m under diverse practical scenarios including a corridor, dormitory room, and under user mobility.
{"title":"Gateway over the air: towards pervasive internet connectivity for commodity IoT","authors":"Jinhwan Jung, Jihoon Ryoo, Yung Yi, S. Kim","doi":"10.1145/3386901.3388949","DOIUrl":"https://doi.org/10.1145/3386901.3388949","url":null,"abstract":"This paper presents GateScatter, the first backscatter-based gateway connecting commodity IoT to WiFi. The backscatter design of GateScatter is an economic option towards pervasive Internet connectivity for ever-growing IoT. The carefully designed tag optimally reshapes ZigBee IoT packets with an arbitrary payload into an 802.11b WiFi packet over the air, such that the payload can be reliably retrieved at the WiFi receiver (hence a gateway). Gate-Scatter is highly compatible - it works with a wide range of IEEE 802.15.4-compliant systems, is agnostic to upper layer proprietary protocols, and does not require any modification to the commodity IoT platforms. GateScatter is extended to BLE IoT for generality. We prototype GateScatter hardware on FPGA where the wide applicability is demonstrated through evaluations on five popular IoT devices including Samsung SmartThings sensor, Philips smart bulb, and Amazon Echo Plus. Further extensive evaluations show that GateScatter consistently achieves throughput above 200 kbps and range of over 27 m under diverse practical scenarios including a corridor, dormitory room, and under user mobility.","PeriodicalId":345029,"journal":{"name":"Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services","volume":"54 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124833973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Part of my interest comes from a fascination with Sarek and Amanda. What might have motivated people from two separate species to come together? Yet I didn't want to attempt their story, nor write this as Kirk and Spock. I wanted to create something of my own. And thus, this is my first story with original characters (OCs). Both Holly and Syrok are OCs, although this is still a Star Trek universe, and with cameos by Sarek, and mentions of the existence of Spock.
{"title":"Vulcan","authors":"E. Yi, Heng Zhang, A. Maji, S. Bagchi","doi":"10.1145/3386901.3397492","DOIUrl":"https://doi.org/10.1145/3386901.3397492","url":null,"abstract":"Part of my interest comes from a fascination with Sarek and Amanda. What might have motivated people from two separate species to come together? Yet I didn't want to attempt their story, nor write this as Kirk and Spock. I wanted to create something of my own. And thus, this is my first story with original characters (OCs). Both Holly and Syrok are OCs, although this is still a Star Trek universe, and with cameos by Sarek, and mentions of the existence of Spock.","PeriodicalId":345029,"journal":{"name":"Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116102560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiliang Wang, Feng Hu, Ye Zhou, Yunhao Liu, Hanyi Zhang, Zhe Liu
Today's smart devices like fitness tracker, smartwatch, etc., often employ Bluetooth Low Energy (BLE) for data transmission. Such devices thus become our information portal, e.g., SMS message and notifications are delivered to those devices through BLE. In this study, we present BlueDoor, which can obtain unauthorized information from smart devices via BLE vulnerability. We thoroughly examine the BLE protocol, and leverage its intrinsic properties designed for low-cost embedded and wearable devices to bypass the encryption and authentication in BLE. By mimicking a low capacity device to downgrade the process of encryption key negotiation and authentication, BlueDoor can enforce a new key with the peripheral BLE device and pass the authentication without user participation. As a result, BlueDoor can extract BLE packets as well as read/write stored data on BLE devices. We show that BlueDoor works well on the fundamental design tradeoff of using BLE on diverse embedded and wearable devices, and thus can be generalized to various BLE devices. We implement the BlueDoor design and examine its performance on 15 COTS BLE enabled smart devices, including fitness trackers, smartwatch, smart bulb, etc. The results show that BlueDoor can break the information flow and obtain different types of information (e.g., SMS message, notifications) delivered to BLE devices. In addition to privacy threats, this further means traditional operations such as using SMS for verification in widely adopted authentication, are insecure.
{"title":"BlueDoor","authors":"Jiliang Wang, Feng Hu, Ye Zhou, Yunhao Liu, Hanyi Zhang, Zhe Liu","doi":"10.1145/3386901.3389025","DOIUrl":"https://doi.org/10.1145/3386901.3389025","url":null,"abstract":"Today's smart devices like fitness tracker, smartwatch, etc., often employ Bluetooth Low Energy (BLE) for data transmission. Such devices thus become our information portal, e.g., SMS message and notifications are delivered to those devices through BLE. In this study, we present BlueDoor, which can obtain unauthorized information from smart devices via BLE vulnerability. We thoroughly examine the BLE protocol, and leverage its intrinsic properties designed for low-cost embedded and wearable devices to bypass the encryption and authentication in BLE. By mimicking a low capacity device to downgrade the process of encryption key negotiation and authentication, BlueDoor can enforce a new key with the peripheral BLE device and pass the authentication without user participation. As a result, BlueDoor can extract BLE packets as well as read/write stored data on BLE devices. We show that BlueDoor works well on the fundamental design tradeoff of using BLE on diverse embedded and wearable devices, and thus can be generalized to various BLE devices. We implement the BlueDoor design and examine its performance on 15 COTS BLE enabled smart devices, including fitness trackers, smartwatch, smart bulb, etc. The results show that BlueDoor can break the information flow and obtain different types of information (e.g., SMS message, notifications) delivered to BLE devices. In addition to privacy threats, this further means traditional operations such as using SMS for verification in widely adopted authentication, are insecure.","PeriodicalId":345029,"journal":{"name":"Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122085445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Coronavirus disease 2019, known as COVID-19, has spread rapidly and infected millions of people around the world. In addition to respiratory droplet spreading, a common mode of contraction of this virus is when individuals touch their face after coming into contact with a contaminated surface. In this poster, we leverage near-field communication (NFC) and propose a system design, NoFaceContact, which can promptly warn users when they attempt to touch their face with the aim of helping to reduce the spread of COVID-19 and improve overall hygiene. A proof-of-concept experiment shows that NoFaceContact can achieve an average communication distance of 8.07 cm and can potentially detect a wide range of face touching poses.
{"title":"NoFaceContact","authors":"Junbo Zhang, Swarun Kumar","doi":"10.1145/3386901.3396603","DOIUrl":"https://doi.org/10.1145/3386901.3396603","url":null,"abstract":"Coronavirus disease 2019, known as COVID-19, has spread rapidly and infected millions of people around the world. In addition to respiratory droplet spreading, a common mode of contraction of this virus is when individuals touch their face after coming into contact with a contaminated surface. In this poster, we leverage near-field communication (NFC) and propose a system design, NoFaceContact, which can promptly warn users when they attempt to touch their face with the aim of helping to reduce the spread of COVID-19 and improve overall hygiene. A proof-of-concept experiment shows that NoFaceContact can achieve an average communication distance of 8.07 cm and can potentially detect a wide range of face touching poses.","PeriodicalId":345029,"journal":{"name":"Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116748352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Mirzamohammadi, Yuxin Liu, Tianmei Ann Huang, A. A. Sani, S. Agarwal, Sung Eun Kim
A legal contract is an agreement between two or more parties as to something that is to be done in the future. Forming contracts electronically is desirable since it is convenient. However, existing electronic contract platforms have a critical shortcoming. They do not provide strong evidence that a contract has been legally and validly created. More specifically, they do not provide strong evidence that an electronic signature is authentic, that there was mutual assent, and that the parties had an opportunity to read the contract. We present Tabellion, a system for forming legal contracts on mobile devices, such as smartphones and tablets, that addresses the above shortcoming. We define four secure primitives and use them in Tabellion to introduce self-evident contracts, the validity of which can be verified by independent inspectors. We show how these primitives can be implemented securely in the Trusted Execution Environment (TEE) of mobile devices as well as a secure enclave in a centralized server, all with a small Trusted Computing Base (TCB). Moreover, we demonstrate that it is feasible to build a fully functional contract platform on top of these primitives. We develop ~15,000 lines of code (LoC) for our prototype, only ~1,000 of which need to be trusted. Through analysis, prototype measurements, and a 30-person user study, we show that Tabellion is secure, achieves acceptable performance, and provides slightly better usability than the state-of-the-art electronic contract platform, DocuSign, for viewing and signing contracts.
{"title":"Tabellion","authors":"S. Mirzamohammadi, Yuxin Liu, Tianmei Ann Huang, A. A. Sani, S. Agarwal, Sung Eun Kim","doi":"10.1145/3386901.3389027","DOIUrl":"https://doi.org/10.1145/3386901.3389027","url":null,"abstract":"A legal contract is an agreement between two or more parties as to something that is to be done in the future. Forming contracts electronically is desirable since it is convenient. However, existing electronic contract platforms have a critical shortcoming. They do not provide strong evidence that a contract has been legally and validly created. More specifically, they do not provide strong evidence that an electronic signature is authentic, that there was mutual assent, and that the parties had an opportunity to read the contract. We present Tabellion, a system for forming legal contracts on mobile devices, such as smartphones and tablets, that addresses the above shortcoming. We define four secure primitives and use them in Tabellion to introduce self-evident contracts, the validity of which can be verified by independent inspectors. We show how these primitives can be implemented securely in the Trusted Execution Environment (TEE) of mobile devices as well as a secure enclave in a centralized server, all with a small Trusted Computing Base (TCB). Moreover, we demonstrate that it is feasible to build a fully functional contract platform on top of these primitives. We develop ~15,000 lines of code (LoC) for our prototype, only ~1,000 of which need to be trusted. Through analysis, prototype measurements, and a 30-person user study, we show that Tabellion is secure, achieves acceptable performance, and provides slightly better usability than the state-of-the-art electronic contract platform, DocuSign, for viewing and signing contracts.","PeriodicalId":345029,"journal":{"name":"Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125439071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Taiga Nishiyama, Daichi Yoshikawa, N. Nishio, K. Tsubouchi
There is growing interest in using augmented reality technology for gaming, navigation, and remote communication. Although 3D space models can be made manually or digitalized using specialized and expensive sensing devices like LiDAR (Light Detection and Ranging), which are costly and time-consuming, the recently developed ARCore for Android and ARkit for iOS are convenient and quick means of developing AR applications. Their recognition performance is poor for flat and monotone walls. This drawback is significant because most walls in indoor environments are flat and only a small portion of them are colorful enough to detect feature points.
{"title":"AirPlanes","authors":"Taiga Nishiyama, Daichi Yoshikawa, N. Nishio, K. Tsubouchi","doi":"10.1145/3386901.3396599","DOIUrl":"https://doi.org/10.1145/3386901.3396599","url":null,"abstract":"There is growing interest in using augmented reality technology for gaming, navigation, and remote communication. Although 3D space models can be made manually or digitalized using specialized and expensive sensing devices like LiDAR (Light Detection and Ranging), which are costly and time-consuming, the recently developed ARCore for Android and ARkit for iOS are convenient and quick means of developing AR applications. Their recognition performance is poor for flat and monotone walls. This drawback is significant because most walls in indoor environments are flat and only a small portion of them are colorful enough to detect feature points.","PeriodicalId":345029,"journal":{"name":"Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122790922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, considerable effort has been recently exerted to explore the high-precision RF-tracking systems indoors to satisfy various real-world demands. However, such systems are tailored for a particular type of device (e.g., RFID, WSN or Wi-Fi). With the rapid development of the Internet of Things (IoT), various new wireless protocols (e.g., LoRa, Sigfox, and NB-IoT) have been proposed to accommodate different demands. The coexistence of multiple types of IoT devices forces users to deploy multiple tracking systems in a warehouse or a smart home where various IoT devices are running, which causes huge additional costs in installation and maintenance. To address this issue, this work presents iArk, which is a general-purpose tracking platform for all types of IoT devices working at the ultra high frequency band. Our innovation lies in the design of the "K+1"-model hardware, the protocol free middleware, and the multipath resistant learnware. By the virtue of decoupling from wireless protocols, iArk also allows researchers to concentrate on developing a new tracking algorithm without considering the protocol diversity. To date, the platform can support five mainstream types of IoT devices (i.e., NB-IoT, LoRa, RFID, Sigfox and Zigbee) and is scalable to other types with minimal effort.
{"title":"General-purpose deep tracking platform across protocols for the internet of things","authors":"Zhenlin An, Qiongzheng Lin, Ping Li, Lei Yang","doi":"10.1145/3386901.3389029","DOIUrl":"https://doi.org/10.1145/3386901.3389029","url":null,"abstract":"In recent years, considerable effort has been recently exerted to explore the high-precision RF-tracking systems indoors to satisfy various real-world demands. However, such systems are tailored for a particular type of device (e.g., RFID, WSN or Wi-Fi). With the rapid development of the Internet of Things (IoT), various new wireless protocols (e.g., LoRa, Sigfox, and NB-IoT) have been proposed to accommodate different demands. The coexistence of multiple types of IoT devices forces users to deploy multiple tracking systems in a warehouse or a smart home where various IoT devices are running, which causes huge additional costs in installation and maintenance. To address this issue, this work presents iArk, which is a general-purpose tracking platform for all types of IoT devices working at the ultra high frequency band. Our innovation lies in the design of the \"K+1\"-model hardware, the protocol free middleware, and the multipath resistant learnware. By the virtue of decoupling from wireless protocols, iArk also allows researchers to concentrate on developing a new tracking algorithm without considering the protocol diversity. To date, the platform can support five mainstream types of IoT devices (i.e., NB-IoT, LoRa, RFID, Sigfox and Zigbee) and is scalable to other types with minimal effort.","PeriodicalId":345029,"journal":{"name":"Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121754644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-15DOI: 10.1163/2213-2139_emc_sim_00933
{"title":"EMO","authors":"","doi":"10.1163/2213-2139_emc_sim_00933","DOIUrl":"https://doi.org/10.1163/2213-2139_emc_sim_00933","url":null,"abstract":"","PeriodicalId":345029,"journal":{"name":"Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114599067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Navid Salehnamadi, Abdulaziz Alshayban, Iftekhar Ahmed, S. Malek
Over the past few years, researchers have proposed various program analysis tools for automated detection of event-race conditions in Android. However, to this date, it is not clear how these tools compare to one another, as they have been evaluated on arbitrary, disjointed set of Android apps, for which there is no ground truth, i.e., verified set of event races. To fill this gap and support future research in this area, we introduce BenchERoid, a set of 34 Android apps with injected event-race bugs. The current version of benchmark contains 36 types of event-race bugs that were identified by analyzing Android concurrency literature and publicly available issue repositories. We believe that our framework is a valuable resource for both developers and researchers interested in concurrency bug analysis in Android. BenchERoid is publicly available at: https://github.com/seal-hub/bencheroid.
{"title":"A benchmark for event-race analysis in android apps","authors":"Navid Salehnamadi, Abdulaziz Alshayban, Iftekhar Ahmed, S. Malek","doi":"10.1145/3386901.3396602","DOIUrl":"https://doi.org/10.1145/3386901.3396602","url":null,"abstract":"Over the past few years, researchers have proposed various program analysis tools for automated detection of event-race conditions in Android. However, to this date, it is not clear how these tools compare to one another, as they have been evaluated on arbitrary, disjointed set of Android apps, for which there is no ground truth, i.e., verified set of event races. To fill this gap and support future research in this area, we introduce BenchERoid, a set of 34 Android apps with injected event-race bugs. The current version of benchmark contains 36 types of event-race bugs that were identified by analyzing Android concurrency literature and publicly available issue repositories. We believe that our framework is a valuable resource for both developers and researchers interested in concurrency bug analysis in Android. BenchERoid is publicly available at: https://github.com/seal-hub/bencheroid.","PeriodicalId":345029,"journal":{"name":"Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115475342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nhat Pham, Tuan Dinh, Zohreh Raghebi, Taeho Kim, Nam Bui, Phuc Nguyen, Hoang Truong, F. Banaei-Kashani, A. Halbower, Thang Dinh, Tam N. Vu
Microsleep, caused by sleep deprivation, sleep apnea, and narcolepsy, costs the U.S.'s economy more than $411 billion/year because of work performance reduction, injuries, and traffic accidents. Mitigating microsleep's consequences require an unobtrusive, reliable, and socially acceptable microsleep detection solution throughout the day, every day. Unfortunately, existing solutions do not meet these requirements. In this paper, we propose a novel behind-the-ear wearable device for microsleep detection, called WAKE. WAKE detects microsleep by monitoring biosignals from the brain, eye movements, facial muscle contractions, and sweat gland activities from behind the user's ears. In particular, we introduce a Three-fold Cascaded Amplifying (3CA) technique to tame the motion artifacts and environmental noises for capturing high fidelity signals. The behind-the-ear form factor is motivated by the fact that bone-conductance headphones, which are worn around the ear, are becoming widely used. This technology trend gives us an opportunity to enable a wide range of cognitive monitoring and improvement applications by integrating more sensing and actuating functionality into the ear-phone, making it a smarter one. Through our prototyping, we show that WAKE can suppress motion and environmental noise in real-time by 9.74-19.47 dB while walking, driving, or staying in different environments ensuring that the biosignals are captured reliably. We evaluated WAKE against gold-standard devices on 19 sleep-deprived and narcoleptic subjects. The Leave-One-Subject-Out Cross-Validation results show the feasibility of WAKE in microsleep detection on an unseen subject with average precision and recall of 76% and 85%, respectively.
{"title":"WAKE","authors":"Nhat Pham, Tuan Dinh, Zohreh Raghebi, Taeho Kim, Nam Bui, Phuc Nguyen, Hoang Truong, F. Banaei-Kashani, A. Halbower, Thang Dinh, Tam N. Vu","doi":"10.1145/3386901.3389032","DOIUrl":"https://doi.org/10.1145/3386901.3389032","url":null,"abstract":"Microsleep, caused by sleep deprivation, sleep apnea, and narcolepsy, costs the U.S.'s economy more than $411 billion/year because of work performance reduction, injuries, and traffic accidents. Mitigating microsleep's consequences require an unobtrusive, reliable, and socially acceptable microsleep detection solution throughout the day, every day. Unfortunately, existing solutions do not meet these requirements. In this paper, we propose a novel behind-the-ear wearable device for microsleep detection, called WAKE. WAKE detects microsleep by monitoring biosignals from the brain, eye movements, facial muscle contractions, and sweat gland activities from behind the user's ears. In particular, we introduce a Three-fold Cascaded Amplifying (3CA) technique to tame the motion artifacts and environmental noises for capturing high fidelity signals. The behind-the-ear form factor is motivated by the fact that bone-conductance headphones, which are worn around the ear, are becoming widely used. This technology trend gives us an opportunity to enable a wide range of cognitive monitoring and improvement applications by integrating more sensing and actuating functionality into the ear-phone, making it a smarter one. Through our prototyping, we show that WAKE can suppress motion and environmental noise in real-time by 9.74-19.47 dB while walking, driving, or staying in different environments ensuring that the biosignals are captured reliably. We evaluated WAKE against gold-standard devices on 19 sleep-deprived and narcoleptic subjects. The Leave-One-Subject-Out Cross-Validation results show the feasibility of WAKE in microsleep detection on an unseen subject with average precision and recall of 76% and 85%, respectively.","PeriodicalId":345029,"journal":{"name":"Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115979763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}