Pub Date : 2019-03-11DOI: 10.1109/PERCOMW.2019.8730788
Radu-Corneliu Marin, Alexandru Gherghina-Pestrea, Alexandru Florin Robert Timisica, Radu-Ioan Ciobanu, C. Dobre
The large number of mobile devices existing nowadays has led to the evolution of mobile cloud computing towards bringing data and computations closer to the nodes. This has manifested first in the shape of fog and edge computing, where an additional communication and processing layer is added at the edge of the network. However, the fast adoption of the Internet of Things has shown the limitations of even this model, so the focus now is moving towards another layer that is one level below: the ad hoc network composed of the mobile devices themselves. One paradigm based on this model is Drop Computing, where nodes that need to do some computations first attempt to process them through the help of neighbor devices using close-range communication (such as Wi-Fi Direct or Bluetooth), and only then do they attempt to contact the fog/edge nodes or the cloud itself. In this paper, we propose an Android implementation of the device-to-device layer of Drop Computing. On top of this implementation, we present an application that creates a video collage from multiple photos using ffmpeg with the help of neighboring nodes through close-range communication using the HYCCUPS and Google Nearby frameworks. Through experiments on four Android devices, we show that our implementation can drastically decrease CPU usage per device, which in turn increases the overall quality of experience for Android users. Furthermore, the total battery consumption is lowered, since nodes have less computations to perform and the CPU cores spend less time in higher frequencies.
{"title":"Device to Device Collaboration for Mobile Clouds in Drop Computing","authors":"Radu-Corneliu Marin, Alexandru Gherghina-Pestrea, Alexandru Florin Robert Timisica, Radu-Ioan Ciobanu, C. Dobre","doi":"10.1109/PERCOMW.2019.8730788","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730788","url":null,"abstract":"The large number of mobile devices existing nowadays has led to the evolution of mobile cloud computing towards bringing data and computations closer to the nodes. This has manifested first in the shape of fog and edge computing, where an additional communication and processing layer is added at the edge of the network. However, the fast adoption of the Internet of Things has shown the limitations of even this model, so the focus now is moving towards another layer that is one level below: the ad hoc network composed of the mobile devices themselves. One paradigm based on this model is Drop Computing, where nodes that need to do some computations first attempt to process them through the help of neighbor devices using close-range communication (such as Wi-Fi Direct or Bluetooth), and only then do they attempt to contact the fog/edge nodes or the cloud itself. In this paper, we propose an Android implementation of the device-to-device layer of Drop Computing. On top of this implementation, we present an application that creates a video collage from multiple photos using ffmpeg with the help of neighboring nodes through close-range communication using the HYCCUPS and Google Nearby frameworks. Through experiments on four Android devices, we show that our implementation can drastically decrease CPU usage per device, which in turn increases the overall quality of experience for Android users. Furthermore, the total battery consumption is lowered, since nodes have less computations to perform and the CPU cores spend less time in higher frequencies.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130914085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-11DOI: 10.1109/PERCOMW.2019.8730672
Joseph Bugeja, Bahtijar Vogel, A. Jacobsson, Rimpu Varshney
The Internet of Things (IoT) market is growing rapidly, allowing continuous evolution of new technologies. Alongside this development, most IoT devices are easy to compromise, as security is often not a prioritized characteristic. This paper proposes a novel IoT Security Model (IoTSM) that can be used by organizations to formulate and implement a strategy for developing end-to-end IoT security. IoTSM is grounded by the Software Assurance Maturity Model (SAMM) framework, however it expands it with new security practices and empirical data gathered from IoT practitioners. Moreover, we generalize the model into a conceptual framework. This approach allows the formal analysis for security in general and evaluates an organization's security practices. Overall, our proposed approach can help researchers, practitioners, and IoT organizations, to discourse about IoT security from an end-to-end perspective.
{"title":"IoTSM: An End-to-end Security Model for IoT Ecosystems","authors":"Joseph Bugeja, Bahtijar Vogel, A. Jacobsson, Rimpu Varshney","doi":"10.1109/PERCOMW.2019.8730672","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730672","url":null,"abstract":"The Internet of Things (IoT) market is growing rapidly, allowing continuous evolution of new technologies. Alongside this development, most IoT devices are easy to compromise, as security is often not a prioritized characteristic. This paper proposes a novel IoT Security Model (IoTSM) that can be used by organizations to formulate and implement a strategy for developing end-to-end IoT security. IoTSM is grounded by the Software Assurance Maturity Model (SAMM) framework, however it expands it with new security practices and empirical data gathered from IoT practitioners. Moreover, we generalize the model into a conceptual framework. This approach allows the formal analysis for security in general and evaluates an organization's security practices. Overall, our proposed approach can help researchers, practitioners, and IoT organizations, to discourse about IoT security from an end-to-end perspective.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127274423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-11DOI: 10.1109/PERCOMW.2019.8730724
Mehdi Nobakht, Craig Russell, Wen Hu, A. Seneviratne
The increasingly widespread adoption of the Internet of Things (IoT) has resulted in concerns about IoT security. Recently, there have been proposals to leverage software-defined networking (SDN) to augment IoT device security with network-level measurements. We argue that existing general-purpose security solutions using SDN are impractical for supporting today's home and corporate networks due to the high volume and rates of network traffic, differences in characteristics of IoT systems and computer networks, and limited resources in underlying network switches. To this end we propose IoT-NetSec, a framework that enables policy-based and fine-grained traffic monitoring of the network segments that include only IoT devices. We describe a prototype implementation and its integration with an SDN controller. The prototype implementation and simulations with three network service attacks (port scanning, SYN DoS Flooding and smurf DDoS) demonstrate IoT-NetSec feasibility in a network of real IoT devices.
{"title":"IoT-NetSec: Policy-Based IoT Network Security Using OpenFlow","authors":"Mehdi Nobakht, Craig Russell, Wen Hu, A. Seneviratne","doi":"10.1109/PERCOMW.2019.8730724","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730724","url":null,"abstract":"The increasingly widespread adoption of the Internet of Things (IoT) has resulted in concerns about IoT security. Recently, there have been proposals to leverage software-defined networking (SDN) to augment IoT device security with network-level measurements. We argue that existing general-purpose security solutions using SDN are impractical for supporting today's home and corporate networks due to the high volume and rates of network traffic, differences in characteristics of IoT systems and computer networks, and limited resources in underlying network switches. To this end we propose IoT-NetSec, a framework that enables policy-based and fine-grained traffic monitoring of the network segments that include only IoT devices. We describe a prototype implementation and its integration with an SDN controller. The prototype implementation and simulations with three network service attacks (port scanning, SYN DoS Flooding and smurf DDoS) demonstrate IoT-NetSec feasibility in a network of real IoT devices.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125423917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-11DOI: 10.1109/PERCOMW.2019.8730816
T. Tantidham, Yu Nandar Aung
Due to emerging disruptive technologies, Internet of Things (IoT) play a vital role for smart living domains, for examples, elderly and disabilities healthcare services and home safety and security monitoring and automation control services. These systems will send automatically an emergency call with home user information and location as a privacy data to public services like hospitals, police offices, or fire departments. This paper introduces emergency service for a Smart Home System (SHS) based on Ethereum blockchain with smart contract for decentralized handling access control among untrusted public services so called Home Service Providers (HSPs) and smart home IoT devices. Our SHS testbed consists of (1) smart home sensor manger equipped with Raspberry Pi (RPi) represented as an edge IoT gateway for gathering environmental sensor data, (2) HSP miners deployed Meteor and Ethereum platform, and (3) web-based applications for home users and HSP staffs. Furthermore, our contribution includes the integration of digital signature for the IoT device authentication, the One Time Passcode with QR code for HSP staff access control, and IPFS for manipulating emergency call from SHS in peers. Our implementation results focusing on HSP miners will be presented and analysed.
{"title":"Emergency Service for Smart Home System Using Ethereum Blockchain: System and Architecture","authors":"T. Tantidham, Yu Nandar Aung","doi":"10.1109/PERCOMW.2019.8730816","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730816","url":null,"abstract":"Due to emerging disruptive technologies, Internet of Things (IoT) play a vital role for smart living domains, for examples, elderly and disabilities healthcare services and home safety and security monitoring and automation control services. These systems will send automatically an emergency call with home user information and location as a privacy data to public services like hospitals, police offices, or fire departments. This paper introduces emergency service for a Smart Home System (SHS) based on Ethereum blockchain with smart contract for decentralized handling access control among untrusted public services so called Home Service Providers (HSPs) and smart home IoT devices. Our SHS testbed consists of (1) smart home sensor manger equipped with Raspberry Pi (RPi) represented as an edge IoT gateway for gathering environmental sensor data, (2) HSP miners deployed Meteor and Ethereum platform, and (3) web-based applications for home users and HSP staffs. Furthermore, our contribution includes the integration of digital signature for the IoT device authentication, the One Time Passcode with QR code for HSP staff access control, and IPFS for manipulating emergency call from SHS in peers. Our implementation results focusing on HSP miners will be presented and analysed.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128348695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-11DOI: 10.1109/PERCOMW.2019.8730743
Taha Alhersh, H. Stuckenschmidt
Different Action recognition methods use Inertial Measurement Unit (IMU) and optical flow independently. This research aims to explore the usefulness of combining IMU and Optical flow for action recognition. We are investigating the effectiveness of using statistical features to build an expandable feature vector space.
{"title":"On the Combination of IMU and Optical Flow for Action Recognition","authors":"Taha Alhersh, H. Stuckenschmidt","doi":"10.1109/PERCOMW.2019.8730743","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730743","url":null,"abstract":"Different Action recognition methods use Inertial Measurement Unit (IMU) and optical flow independently. This research aims to explore the usefulness of combining IMU and Optical flow for action recognition. We are investigating the effectiveness of using statistical features to build an expandable feature vector space.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123908998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-11DOI: 10.1109/PERCOMW.2019.8730772
Sabbir Ahmed, Soaibuzzaman, Mohammad Saidur Rahman, M. Rahaman
In this paper, we introduce an integrated smart parking system. The proposed integrated smart parking system brings multiple parking service providers together under a unified platform aiming to provide one-stop parking information services to the commuters in a smart city. However, the adaptation of such a system is prone to tempering while a massive amount of data is shared among different parties which raise concerns related to trust and performance. To address this challenge, we propose a blockchain-based architecture specific to the integrated smart parking systems. Finally, we present a set of design principles which shows the applicability of our proposed blockchain-based integrated parking system.
{"title":"A Blockchain-Based Architecture for Integrated Smart Parking Systems","authors":"Sabbir Ahmed, Soaibuzzaman, Mohammad Saidur Rahman, M. Rahaman","doi":"10.1109/PERCOMW.2019.8730772","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730772","url":null,"abstract":"In this paper, we introduce an integrated smart parking system. The proposed integrated smart parking system brings multiple parking service providers together under a unified platform aiming to provide one-stop parking information services to the commuters in a smart city. However, the adaptation of such a system is prone to tempering while a massive amount of data is shared among different parties which raise concerns related to trust and performance. To address this challenge, we propose a blockchain-based architecture specific to the integrated smart parking systems. Finally, we present a set of design principles which shows the applicability of our proposed blockchain-based integrated parking system.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114178310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-11DOI: 10.1109/PERCOMW.2019.8730584
Shigeyuki Hirai, Michi Takamura
Many commonly used household appliances and equipment include refrigerators, washing machines, intercoms, telephones, air conditioners, microwaves, and ovens; they communicate various information to the users by providing notifications using auditory displays. However, an occupied user may not pay attention to the notifications and/or cannot recognize simultaneous auditory alerts. Therefore, in this study, we propose a ceiling display system that displays information depending on the location of the users. This display system utilizes house ceilings as overhead visual displays that can update the users with various information simultaneously. This paper describes the different situations where appliances notify the users on completing a task; subsequently, we propose a concept for the ceiling display system in a smart house that will be introduced in the near future. In addition, the expected effectiveness of this system, some useful scenarios, and initial verifications of the visual notifications on the ceiling are described.
{"title":"Everyday Life ToDo Display on Ceiling for Smart Living Space","authors":"Shigeyuki Hirai, Michi Takamura","doi":"10.1109/PERCOMW.2019.8730584","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730584","url":null,"abstract":"Many commonly used household appliances and equipment include refrigerators, washing machines, intercoms, telephones, air conditioners, microwaves, and ovens; they communicate various information to the users by providing notifications using auditory displays. However, an occupied user may not pay attention to the notifications and/or cannot recognize simultaneous auditory alerts. Therefore, in this study, we propose a ceiling display system that displays information depending on the location of the users. This display system utilizes house ceilings as overhead visual displays that can update the users with various information simultaneously. This paper describes the different situations where appliances notify the users on completing a task; subsequently, we propose a concept for the ceiling display system in a smart house that will be introduced in the near future. In addition, the expected effectiveness of this system, some useful scenarios, and initial verifications of the visual notifications on the ceiling are described.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115290962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-11DOI: 10.1109/PERCOMW.2019.8730767
Bashima Islam, Md Tamzeed Islam, J. Kaur, S. Nirjon
In this paper, we analyze the feasibility of using LoRa, an emerging low-power wide-area networking technology, in indoor localization. We define seven criteria upon which a wireless technology's prospect as an indoor localization system depends largely. For comparison, we take two other popular wireless technologies (BLE and WiFi) that have been previously proposed in many modern indoor localization systems. We deploy these three technologies in multiple line-of-sight and non-line-of-sight indoor scenarios including corridors, open spaces, spaces with a varying number of walls, and across floors of multi-storied buildings. Considering the coverage, stability and regularity of signals, accuracy of localization, responsiveness, power, and cost–we conclude that LoRa is a feasible choice for indoor localization solution, especially in wide and tall indoor environments like warehouses and multi-storied buildings.
{"title":"LoRaIn: Making a Case for LoRa in Indoor Localization","authors":"Bashima Islam, Md Tamzeed Islam, J. Kaur, S. Nirjon","doi":"10.1109/PERCOMW.2019.8730767","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730767","url":null,"abstract":"In this paper, we analyze the feasibility of using LoRa, an emerging low-power wide-area networking technology, in indoor localization. We define seven criteria upon which a wireless technology's prospect as an indoor localization system depends largely. For comparison, we take two other popular wireless technologies (BLE and WiFi) that have been previously proposed in many modern indoor localization systems. We deploy these three technologies in multiple line-of-sight and non-line-of-sight indoor scenarios including corridors, open spaces, spaces with a varying number of walls, and across floors of multi-storied buildings. Considering the coverage, stability and regularity of signals, accuracy of localization, responsiveness, power, and cost–we conclude that LoRa is a feasible choice for indoor localization solution, especially in wide and tall indoor environments like warehouses and multi-storied buildings.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125549928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-11DOI: 10.1109/PERCOMW.2019.8730805
Zilu Liang, Mario Alberto Chapa Martell
The recent rise of the Quantified Self movement has witnessed a significant increase in the adoption of consumer wearable wristbands for sleep tracking. Nevertheless, data quality of these devices has been a main concern. This study aimed to validate a most popular consumer wristband, i.e. Fitbit Charge 2™, against medical devices. We proposed a new validation approach that combines numerical technique with visual aid for epoch-by-epoch comparison on sleep stages. We found that Fitbit Charge 2™ had low accuracy in detecting wake and reasonable accuracy in detecting light, deep, and REM sleep stages. The visual aid of scatter plots showed that Fitbit was more accurate in detecting deep sleep stage in the first half of a night and more accurate in detecting REM sleep stage in the second half of a night. Our results indicate that consumer wearable wristbands are not able to produce high quality data of sleep stages in ecological settings. Future studies should consider the effect of time on device accuracy and may resort to segmented modelling techniques to improve data quality.
{"title":"Combining Numerical and Visual Approaches in Validating Sleep Data Quality of Consumer Wearable Wristbands","authors":"Zilu Liang, Mario Alberto Chapa Martell","doi":"10.1109/PERCOMW.2019.8730805","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730805","url":null,"abstract":"The recent rise of the Quantified Self movement has witnessed a significant increase in the adoption of consumer wearable wristbands for sleep tracking. Nevertheless, data quality of these devices has been a main concern. This study aimed to validate a most popular consumer wristband, i.e. Fitbit Charge 2™, against medical devices. We proposed a new validation approach that combines numerical technique with visual aid for epoch-by-epoch comparison on sleep stages. We found that Fitbit Charge 2™ had low accuracy in detecting wake and reasonable accuracy in detecting light, deep, and REM sleep stages. The visual aid of scatter plots showed that Fitbit was more accurate in detecting deep sleep stage in the first half of a night and more accurate in detecting REM sleep stage in the second half of a night. Our results indicate that consumer wearable wristbands are not able to produce high quality data of sleep stages in ecological settings. Future studies should consider the effect of time on device accuracy and may resort to segmented modelling techniques to improve data quality.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126628324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-11DOI: 10.1109/PERCOMW.2019.8730884
Bhargav Mahesh, E. Prassler, Teena Hassan, Jens-Uwe Garbas
Stress is necessary for optimal performance and functioning in daily life. However, when stress exceeds person-specific coping levels, then it begins to negatively impact health and productivity. An automatic stress monitoring system that tracks stress levels based on physical and physiological parameters, can assist the user in maintaining stress within healthy limits. In order to build such a system, we need to develop and test various algorithms on a reference dataset consisting of multimodal stress responses. Such a reference dataset should fulfil requirements derived from results and practices of clinical and empirical research. This paper proposes a set of such requirements to support the establishment of a reference dataset for multimodal human stress detection. The requirements cover person-dependent and technical aspects such as selection of sample population, choice of stress stimuli, inclusion of multiple stress modalities, selection of annotation methods, and selection of data acquisition devices. Existing publicly available stress datasets were evaluated based on criteria derived from the proposed requirements. It was found that none of these datasets completely fulfilled the requirements. Therefore, efforts should be made in the future to establish a reference dataset, satisfying the specified requirements, in order to ensure comparability and reliability of results.
{"title":"Requirements for a Reference Dataset for Multimodal Human Stress Detection","authors":"Bhargav Mahesh, E. Prassler, Teena Hassan, Jens-Uwe Garbas","doi":"10.1109/PERCOMW.2019.8730884","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730884","url":null,"abstract":"Stress is necessary for optimal performance and functioning in daily life. However, when stress exceeds person-specific coping levels, then it begins to negatively impact health and productivity. An automatic stress monitoring system that tracks stress levels based on physical and physiological parameters, can assist the user in maintaining stress within healthy limits. In order to build such a system, we need to develop and test various algorithms on a reference dataset consisting of multimodal stress responses. Such a reference dataset should fulfil requirements derived from results and practices of clinical and empirical research. This paper proposes a set of such requirements to support the establishment of a reference dataset for multimodal human stress detection. The requirements cover person-dependent and technical aspects such as selection of sample population, choice of stress stimuli, inclusion of multiple stress modalities, selection of annotation methods, and selection of data acquisition devices. Existing publicly available stress datasets were evaluated based on criteria derived from the proposed requirements. It was found that none of these datasets completely fulfilled the requirements. Therefore, efforts should be made in the future to establish a reference dataset, satisfying the specified requirements, in order to ensure comparability and reliability of results.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131824363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}