Internet of things is the trending direction when it comes to designing smart living environment. One of the popular applications of Internet of things is the smart home system. A smart home system usually consists of various types of connected sensors, actuators, appliances and a controller. The controller analyzes the data reported by the sensors and sends out messages to electric appliances and other sensors to ask them to behave accordingly. There are a lot of smart home designs proposed in the literature to make the systems smarter and more comfortable. However, little work has considered the security and privacy issues in smart home systems. In this paper, we analyze the differences of security and privacy issues that lie in the smart home systems, smart grid, and wireless sensor networks. Further, we propose our own solutions that achieves privacy preservation during the communications between end sensors and appliances and the controller.
{"title":"A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes","authors":"Tianyi Song, Ruinian Li, Bo Mei, Jiguo Yu, Xiaoshuang Xing, Xiuzhen Cheng","doi":"10.1109/IIKI.2016.3","DOIUrl":"https://doi.org/10.1109/IIKI.2016.3","url":null,"abstract":"Internet of things is the trending direction when it comes to designing smart living environment. One of the popular applications of Internet of things is the smart home system. A smart home system usually consists of various types of connected sensors, actuators, appliances and a controller. The controller analyzes the data reported by the sensors and sends out messages to electric appliances and other sensors to ask them to behave accordingly. There are a lot of smart home designs proposed in the literature to make the systems smarter and more comfortable. However, little work has considered the security and privacy issues in smart home systems. In this paper, we analyze the differences of security and privacy issues that lie in the smart home systems, smart grid, and wireless sensor networks. Further, we propose our own solutions that achieves privacy preservation during the communications between end sensors and appliances and the controller.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122792076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the k-coverage process of the target area, the wireless sensor network is easy to generate a great number of redundant nodes, consume a great deal of nodes energy in the network and is restricted by environmental factors. Based on the above deficiencies, this paper puts forward an optimization connected coverage algorithm based on rule area (optimization coverage control algorithm, OCCA). By using the double squares, this algorithm puts target nodes into the inner square area and establishes the correlation model by the sensor nodes and target nodes. As for the whole coverage area, the minimum number of sensor nodes is calculated through the expected value. The simulation shows that this algorithm can effectively complete the coverage of the target area at a low cost. Thus the effectiveness of the algorithm is verified. By using the algorithm, the allocation of network resources is reduced and the covering and connecting performance of the network can be better evaluated.
{"title":"Optimization Coverage Control Algorithm Based on Square Monitoring Area in Wireless Sensor Networks","authors":"Zeyu Sun, Ben Yan, Mengluo Ji, Huihui Wang","doi":"10.1109/IIKI.2016.82","DOIUrl":"https://doi.org/10.1109/IIKI.2016.82","url":null,"abstract":"In the k-coverage process of the target area, the wireless sensor network is easy to generate a great number of redundant nodes, consume a great deal of nodes energy in the network and is restricted by environmental factors. Based on the above deficiencies, this paper puts forward an optimization connected coverage algorithm based on rule area (optimization coverage control algorithm, OCCA). By using the double squares, this algorithm puts target nodes into the inner square area and establishes the correlation model by the sensor nodes and target nodes. As for the whole coverage area, the minimum number of sensor nodes is calculated through the expected value. The simulation shows that this algorithm can effectively complete the coverage of the target area at a low cost. Thus the effectiveness of the algorithm is verified. By using the algorithm, the allocation of network resources is reduced and the covering and connecting performance of the network can be better evaluated.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116021821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhaofeng Niu, Jiguo Yu, Xiuzhen Cheng, Tianyi Song
With the development of the Internet of Things (IoT), wireless sensor networks (WSNs) play a more and more important issue. Energy efficiency, one of the crucial performance indices, is always considered for design of protocols and algorithms in WSNs. In this paper, we focus on data frame transmission under SINR (signal to interference plus noise ratio) model. An efficient mechanism, called as SINR-Q-CSMA, is proposed. SINR-Q-CSMA combines dual-channel with time slotted methods, and considers sink circle and regular circle according to different scenarios, which can avoid collision problem effectively. Further, SINR-Q-CSMA employs a solution based on queue length to solve the collision.
{"title":"SINR-Q-CSMA: Carrier Sense Multiple Access Based on Queue Length under SINR","authors":"Zhaofeng Niu, Jiguo Yu, Xiuzhen Cheng, Tianyi Song","doi":"10.1109/IIKI.2016.100","DOIUrl":"https://doi.org/10.1109/IIKI.2016.100","url":null,"abstract":"With the development of the Internet of Things (IoT), wireless sensor networks (WSNs) play a more and more important issue. Energy efficiency, one of the crucial performance indices, is always considered for design of protocols and algorithms in WSNs. In this paper, we focus on data frame transmission under SINR (signal to interference plus noise ratio) model. An efficient mechanism, called as SINR-Q-CSMA, is proposed. SINR-Q-CSMA combines dual-channel with time slotted methods, and considers sink circle and regular circle according to different scenarios, which can avoid collision problem effectively. Further, SINR-Q-CSMA employs a solution based on queue length to solve the collision.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115459879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bo Mei, Xiaolu Cheng, Xiaoshuang Xing, Bowu Zhang, Wei Cheng
Movies are a major form of entertainment in the US. There are a dozens of websites focusing on movie information. On most of the websites, ratings and reviews from the users play an important role. When a user gives a movie a certain score, the user not only reflects his taste toward that movie but also potentially exposes his personal information. In this paper, we investigated several movie genres. In each genre, movies were classified into different clusters by using expectationmaximization (EM) algorithm. The classification criteria were built upon audience movie rating scores and existing user information. As a result, a new or anonymous users personal information could be predicted when he rated movies on movie-related websites. Moreover, newly released movies could be easily classified into corresponding clusters to assistant user information discovery. The revealed personal information was very useful and could be utilized in different ways such as increasing the accuracy for delivering user-related ads.
{"title":"Personal Information Prediction Based on Movie Rating Data","authors":"Bo Mei, Xiaolu Cheng, Xiaoshuang Xing, Bowu Zhang, Wei Cheng","doi":"10.1109/IIKI.2016.84","DOIUrl":"https://doi.org/10.1109/IIKI.2016.84","url":null,"abstract":"Movies are a major form of entertainment in the US. There are a dozens of websites focusing on movie information. On most of the websites, ratings and reviews from the users play an important role. When a user gives a movie a certain score, the user not only reflects his taste toward that movie but also potentially exposes his personal information. In this paper, we investigated several movie genres. In each genre, movies were classified into different clusters by using expectationmaximization (EM) algorithm. The classification criteria were built upon audience movie rating scores and existing user information. As a result, a new or anonymous users personal information could be predicted when he rated movies on movie-related websites. Moreover, newly released movies could be easily classified into corresponding clusters to assistant user information discovery. The revealed personal information was very useful and could be utilized in different ways such as increasing the accuracy for delivering user-related ads.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114653428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bojan Marinkovic, Z. Ognjanovic, Paola Glavan, A. Umek
The Chord protocol is one of the first, simplest and most popular overlay protocol. This paper describes the Chord protocol using the logic of time and knowledge. The formalization concerns Chord actions that maintain ring topology. We consider the case when the nodes are not allowed to fail or leave and prove the correctness with respect to it.
{"title":"Correctness of the Chord Protocol","authors":"Bojan Marinkovic, Z. Ognjanovic, Paola Glavan, A. Umek","doi":"10.1109/IIKI.2016.65","DOIUrl":"https://doi.org/10.1109/IIKI.2016.65","url":null,"abstract":"The Chord protocol is one of the first, simplest and most popular overlay protocol. This paper describes the Chord protocol using the logic of time and knowledge. The formalization concerns Chord actions that maintain ring topology. We consider the case when the nodes are not allowed to fail or leave and prove the correctness with respect to it.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122149278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Internet of Things (IoT) have become the most pervasive and largest computing platform nowadays. Security plays a more and more important role because of the nature of IoT systems that deals with people's daily life. IoT systems are often composed of low capable devices, which are devices with low computational capability, limited energy supply, or small memory size, some traditional security solutions, such as asymmetric key based protocols and IP-based solutions, cannot be effectively applied to IoT systems. Other factors, such as the tight coupling between the cyber system and the physical world, the heterogeneity of IoT devices and IoT communication protocols, and the extremely large system scale, make it more challenging to secure IoT systems. Within the context of a general IoT system architecture, this paper investigates special security issues, identifies new challenges, and explores alternative designs of deploying security solutions.
{"title":"Security in Internet of Things: Opportunities and Challenges","authors":"Wei Wei, Andrew T. Yang, Weisong Shi","doi":"10.1109/IIKI.2016.35","DOIUrl":"https://doi.org/10.1109/IIKI.2016.35","url":null,"abstract":"Internet of Things (IoT) have become the most pervasive and largest computing platform nowadays. Security plays a more and more important role because of the nature of IoT systems that deals with people's daily life. IoT systems are often composed of low capable devices, which are devices with low computational capability, limited energy supply, or small memory size, some traditional security solutions, such as asymmetric key based protocols and IP-based solutions, cannot be effectively applied to IoT systems. Other factors, such as the tight coupling between the cyber system and the physical world, the heterogeneity of IoT devices and IoT communication protocols, and the extremely large system scale, make it more challenging to secure IoT systems. Within the context of a general IoT system architecture, this paper investigates special security issues, identifies new challenges, and explores alternative designs of deploying security solutions.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125528538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yanhui Guo, Lin Meng, Xiaobing Tang, Yufeng Shi, Han Cao, Y. Bai
The Intelligent Transportation Systems bring a safely and comfortable motorized society, which are based on image processing such as predicting/detecting the danger of vehicles collecting the transport information to control the traffic flow on traffic control systems etc. However, with the pollution of environment, the fog/haze becomes a serious problem, causing the image deterioration or degradation and the Intelligent Transportation Systems lose their functions. This paper proposed an immunological method of image processing for detecting the fog/haze in the image to support Intelligent Transportation Systems. This state-of-the-art method is based on the theory of biological defence system, which unites the reducing of fog/haze and edge detection. The experimental results show that our proposed haze immunized algorithm can remove effect of haze on image processing algorithm. Compared to conventional de-haze image processing algorithm, our proposed algorithm unitizes bio-inspired algorithm to achieve efficient hardware consumption. The results of FPGA implementation show less hardware usage than conventional method.
{"title":"Artificial Haze Immune Algorithm for Image Processing","authors":"Yanhui Guo, Lin Meng, Xiaobing Tang, Yufeng Shi, Han Cao, Y. Bai","doi":"10.1109/IIKI.2016.14","DOIUrl":"https://doi.org/10.1109/IIKI.2016.14","url":null,"abstract":"The Intelligent Transportation Systems bring a safely and comfortable motorized society, which are based on image processing such as predicting/detecting the danger of vehicles collecting the transport information to control the traffic flow on traffic control systems etc. However, with the pollution of environment, the fog/haze becomes a serious problem, causing the image deterioration or degradation and the Intelligent Transportation Systems lose their functions. This paper proposed an immunological method of image processing for detecting the fog/haze in the image to support Intelligent Transportation Systems. This state-of-the-art method is based on the theory of biological defence system, which unites the reducing of fog/haze and edge detection. The experimental results show that our proposed haze immunized algorithm can remove effect of haze on image processing algorithm. Compared to conventional de-haze image processing algorithm, our proposed algorithm unitizes bio-inspired algorithm to achieve efficient hardware consumption. The results of FPGA implementation show less hardware usage than conventional method.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130319754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Over the past ten years, with the deepening and expansion of the application of Internet technology, more and more customers browse a lot of online reviews to understand the product and service reputation. Online reviews can provide decision support for consumers to purchase satisfactory product and the product customer satisfaction is mainly determined by product quality perceived value. This article will establish a new quality perceived value evaluation method by combining relatively mature test mining method with fuzzy comprehensive evaluation method. This evaluation model will be user oriented and more reflect the real needs of users. The new evaluation model will provide better decision support for consumers to buy satisfactory product.
{"title":"Research on the Evaluation of Product Quality Perceived Value Based on Text Mining and Fuzzy Comprehensive Evaluation","authors":"Lifeng He, Ning Zhang, Lemin Yin","doi":"10.1109/IIKI.2016.95","DOIUrl":"https://doi.org/10.1109/IIKI.2016.95","url":null,"abstract":"Over the past ten years, with the deepening and expansion of the application of Internet technology, more and more customers browse a lot of online reviews to understand the product and service reputation. Online reviews can provide decision support for consumers to purchase satisfactory product and the product customer satisfaction is mainly determined by product quality perceived value. This article will establish a new quality perceived value evaluation method by combining relatively mature test mining method with fuzzy comprehensive evaluation method. This evaluation model will be user oriented and more reflect the real needs of users. The new evaluation model will provide better decision support for consumers to buy satisfactory product.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"38 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114013069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
SMEs (Small and Medium-size Enterprises) in China always face financing constraints and hardly obtain bank loans under unsound financing system. In external f Academic literature has shown that widespread information asymmetry may prevent the efficient allocation of lending, leading to credit rationing. Currently, most credit reporting, models for SMEs in China are primarily based on hard information about the enterprises and their owners but lack comprehensive evaluation based on the combination with soft information. To bridge the gap for SMEs, we propose a novel big-data-driven credit reporting framework which presents a new credit reporting system by including big data in business, finance, and social networks. The proposed approach features in capturing diversified data online, conducting evaluation and analysis in real-time, and automatically generating online credit reports for SMEs, banks, and government. It also provides an efficient interactive way for SMEs to check credit reports online.
{"title":"A Novel Big-Data-Driven Credit Reporting Framework for SMEs in China","authors":"Yunchuan Sun, Chunlei Li, Xuegang Cui, Guangzhi Zhang, Xiaoping Zeng, Xueying Chang, Dengbiao Tu, Yongping Xiong","doi":"10.1109/IIKI.2016.46","DOIUrl":"https://doi.org/10.1109/IIKI.2016.46","url":null,"abstract":"SMEs (Small and Medium-size Enterprises) in China always face financing constraints and hardly obtain bank loans under unsound financing system. In external f Academic literature has shown that widespread information asymmetry may prevent the efficient allocation of lending, leading to credit rationing. Currently, most credit reporting, models for SMEs in China are primarily based on hard information about the enterprises and their owners but lack comprehensive evaluation based on the combination with soft information. To bridge the gap for SMEs, we propose a novel big-data-driven credit reporting framework which presents a new credit reporting system by including big data in business, finance, and social networks. The proposed approach features in capturing diversified data online, conducting evaluation and analysis in real-time, and automatically generating online credit reports for SMEs, banks, and government. It also provides an efficient interactive way for SMEs to check credit reports online.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131847015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Validity analysis plays important role in the study of fractional age assumptions (FAAs), which assures assumption methods be effective. This paper investigate the validity conditions of FAA under RIM introduced in Li et al. (2013). A new sufficient validity condition is obtained, which also revised one mistake in Theorem 1 of Li et al. (2013). And the necessary and sufficient condition is found, which gives the accurate range of the parameter, even a little complex in analytical form. Simulation shows a clear comparison between these two conditions. These results perfect FAA under RIM in theoretical viewpoint, and are helpful to choose appropriate parameter in actuarial practice of life insurance.
效度分析在分数年龄假设研究中起着重要的作用,它保证了假设方法的有效性。本文研究Li et al.(2013)引入的RIM下FAA的有效性条件。得到了一个新的充分有效条件,修正了Li et al.(2013)的定理1中的一个错误。并给出了该参数的准确取值范围的充分必要条件,其解析形式稍显复杂。仿真结果表明这两种情况有明显的比较。这些结果从理论上完善了RIM下的FAA,有助于寿险精算实践中选择合适的参数。
{"title":"Validity Analysis of Fractional Age Assumptions under Rational Interpolating Method","authors":"Xia Zhao, Shilong Li","doi":"10.1109/IIKI.2016.118","DOIUrl":"https://doi.org/10.1109/IIKI.2016.118","url":null,"abstract":"Validity analysis plays important role in the study of fractional age assumptions (FAAs), which assures assumption methods be effective. This paper investigate the validity conditions of FAA under RIM introduced in Li et al. (2013). A new sufficient validity condition is obtained, which also revised one mistake in Theorem 1 of Li et al. (2013). And the necessary and sufficient condition is found, which gives the accurate range of the parameter, even a little complex in analytical form. Simulation shows a clear comparison between these two conditions. These results perfect FAA under RIM in theoretical viewpoint, and are helpful to choose appropriate parameter in actuarial practice of life insurance.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134144833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}