首页 > 最新文献

Pervasive and Mobile Computing最新文献

英文 中文
Reliable and adaptive computation offload strategy with load and cost coordination for edge computing 针对边缘计算的可靠自适应计算卸载策略与负载和成本协调
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-30 DOI: 10.1016/j.pmcj.2024.101932
Weicheng Tang , Donghui Gao , Siyu Yu , Jianbo Lu , Zhiyong Wei , Zhanrong Li , Ningjiang Chen

There are several important factors to consider in edge computing systems including latency, reliability, power consumption, and queue load. Task replication requires additional energy costs in mobile edge offloading scenarios based on master-slave replication for fault tolerance. Excessive task offloading may lead to a sharp increase in the total energy consumption of the system including replication costs. Conversely, new tasks cannot enter the waiting queue and are lost, resulting in reliability issues. This paper proposes an adaptive task offloading strategy for balancing the edge node queue load and offloading cost (Lyapunov and Differential Evolution based Offloading schedule strategy, LDEO). The LDEO strategy innovatively customizes the Lyapunov drift-plus-penalty function by incorporating replication redundancy offloading costs to establish a balance model between the queue load and offloading cost. The LDEO strategy computes the optimal offloading decisions with dynamic adjustment characteristics by integrating a low-complexity differential evolution method, aiming to find the optimal balance point that minimizes the offloading cost while maintaining reliability performance. The experimental results show that compared with the existing strategies, LDEO strategy effectively reduces the redundancy of fault tolerance cost and the waiting time under the condition of ensuring that the task will not be discarded over time. It stabilizes the queue length in a reasonable range, controls the waiting time and loss rate of tasks, reduces the extra energy consumption paid by replication redundancy, and effectively realizes the optimal balance under multiple conditions.

边缘计算系统需要考虑几个重要因素,包括延迟、可靠性、功耗和队列负载。在基于主从复制容错的移动边缘卸载场景中,任务复制需要额外的能源成本。过度的任务卸载可能会导致系统总能耗(包括复制成本)急剧增加。相反,新任务无法进入等待队列而丢失,从而导致可靠性问题。本文提出了一种平衡边缘节点队列负载和卸载成本的自适应任务卸载策略(基于 Lyapunov 和差分进化的卸载计划策略,LDEO)。LDEO 策略通过结合复制冗余卸载成本,创新性地定制了 Lyapunov 漂移加惩罚函数,从而建立了队列负载与卸载成本之间的平衡模型。LDEO 策略通过集成低复杂度的微分演化方法,计算出具有动态调整特性的最优卸载决策,旨在找到最优平衡点,在保持可靠性能的同时使卸载成本最小。实验结果表明,与现有的策略相比,LDEO 策略在保证任务不被长期丢弃的前提下,有效降低了容错成本的冗余度,减少了等待时间。它将队列长度稳定在合理范围内,控制了任务的等待时间和丢失率,减少了复制冗余付出的额外能耗,有效实现了多种条件下的最优平衡。
{"title":"Reliable and adaptive computation offload strategy with load and cost coordination for edge computing","authors":"Weicheng Tang ,&nbsp;Donghui Gao ,&nbsp;Siyu Yu ,&nbsp;Jianbo Lu ,&nbsp;Zhiyong Wei ,&nbsp;Zhanrong Li ,&nbsp;Ningjiang Chen","doi":"10.1016/j.pmcj.2024.101932","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101932","url":null,"abstract":"<div><p>There are several important factors to consider in edge computing systems including latency, reliability, power consumption, and queue load. Task replication requires additional energy costs in mobile edge offloading scenarios based on master-slave replication for fault tolerance. Excessive task offloading may lead to a sharp increase in the total energy consumption of the system including replication costs. Conversely, new tasks cannot enter the waiting queue and are lost, resulting in reliability issues. This paper proposes an adaptive task offloading strategy for balancing the edge node queue load and offloading cost (Lyapunov and Differential Evolution based Offloading schedule strategy, LDEO). The LDEO strategy innovatively customizes the Lyapunov drift-plus-penalty function by incorporating replication redundancy offloading costs to establish a balance model between the queue load and offloading cost. The LDEO strategy computes the optimal offloading decisions with dynamic adjustment characteristics by integrating a low-complexity differential evolution method, aiming to find the optimal balance point that minimizes the offloading cost while maintaining reliability performance. The experimental results show that compared with the existing strategies, LDEO strategy effectively reduces the redundancy of fault tolerance cost and the waiting time under the condition of ensuring that the task will not be discarded over time. It stabilizes the queue length in a reasonable range, controls the waiting time and loss rate of tasks, reduces the extra energy consumption paid by replication redundancy, and effectively realizes the optimal balance under multiple conditions.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141068466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SmAuto: A domain-specific-language for application development in smart environments SmAuto:用于智能环境应用程序开发的特定领域语言
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-21 DOI: 10.1016/j.pmcj.2024.101931
Konstantinos Panayiotou, Constantine Doumanidis, Emmanouil Tsardoulias, Andreas L. Symeonidis

A common problem in the development of Internet-of-Things (IoT) and Cyber-Physical System (CPS) applications is the complexity of these domains, due to their hybrid and distributed nature in multiple layers (hardware, network, communication, application etc.). Apart from other issues, this inherent complexity often gives room for implementation errors, which can be in many cases fatal and drive the application and/or the system to undesired states. The current work aspires to alleviate this problem by introducing a low-code approach for building IoT and CPS applications. We argue that, through the proposed approach it is possible to lower development time and risk (errors/bug-related ones) and allow a wide range of end-users to build and monitor applications for state-of-the-art domains, such as smart home and smart industry. In this context, Model-Driven Engineering (MDE) approaches are explored and SmAuto, a Domain-specific Language (DSL) is proposed for creating and executing automation tasks for smart environments. Through SmAuto it is possible to handle the heterogeneity and complexity issues of the IoT and CPS domains, this way allowing end-users are non-technical application experts to build well-designed and properly functioning smart applications. The proposed DSL implements a Sense-Think-Act-Communicate model for smart environments and enables the creation, validation, and dynamic execution of composite automation models in physical, virtual and hybrid environments, while it also enables automated code generation of virtual entities for verification purposes. By using layered abstractions to automate the development process, end-users can concentrate on the real problem instead of dwelling into technical details, thus increasing their productivity. The results of the empirical evaluation and the comparison to existing approaches show that SmAuto can make application development more rigorous, improves productivity of end-users including non-experts, i.e. citizen developers and satisfies several functional and non-functional requirements of modern DSLs, such as tool support, modular deployment, reusability, availability and extensibility.

开发物联网(IoT)和网络物理系统(CPS)应用的一个常见问题是这些领域的复杂性,因为它们具有多层次(硬件、网络、通信、应用等)的混合和分布式性质。除其他问题外,这种固有的复杂性往往会给实施错误提供空间,而这种错误在很多情况下是致命的,会将应用和/或系统推向不期望的状态。目前的工作旨在通过引入低代码方法来构建物联网和 CPS 应用程序,从而缓解这一问题。我们认为,通过所提出的方法,有可能降低开发时间和风险(错误/与错误相关的风险),并允许广泛的最终用户为智能家居和智能工业等最先进的领域构建和监控应用程序。在此背景下,对模型驱动工程(MDE)方法进行了探索,并提出了用于创建和执行智能环境自动化任务的特定领域语言(DSL)SmAuto。通过 SmAuto,可以处理物联网和 CPS 领域的异构性和复杂性问题,从而使终端用户(非技术应用专家)能够构建设计良好、功能正常的智能应用。拟议的 DSL 实现了智能环境的 "感知-思考-行动-交流 "模型,能够在物理、虚拟和混合环境中创建、验证和动态执行复合自动化模型,同时还能自动生成用于验证目的的虚拟实体代码。通过使用分层抽象实现开发过程自动化,终端用户可以专注于真正的问题,而不是纠缠于技术细节,从而提高工作效率。实证评估结果以及与现有方法的比较表明,SmAuto 可以使应用程序开发更加严谨,提高包括非专业人员(即公民开发人员)在内的最终用户的工作效率,并满足现代 DSL 的一些功能性和非功能性要求,如工具支持、模块化部署、可重用性、可用性和可扩展性。
{"title":"SmAuto: A domain-specific-language for application development in smart environments","authors":"Konstantinos Panayiotou,&nbsp;Constantine Doumanidis,&nbsp;Emmanouil Tsardoulias,&nbsp;Andreas L. Symeonidis","doi":"10.1016/j.pmcj.2024.101931","DOIUrl":"10.1016/j.pmcj.2024.101931","url":null,"abstract":"<div><p>A common problem in the development of Internet-of-Things (IoT) and Cyber-Physical System (CPS) applications is the complexity of these domains, due to their hybrid and distributed nature in multiple layers (hardware, network, communication, application etc.). Apart from other issues, this inherent complexity often gives room for implementation errors, which can be in many cases fatal and drive the application and/or the system to undesired states. The current work aspires to alleviate this problem by introducing a low-code approach for building IoT and CPS applications. We argue that, through the proposed approach it is possible to lower development time and risk (errors/bug-related ones) and allow a wide range of end-users to build and monitor applications for state-of-the-art domains, such as smart home and smart industry. In this context, Model-Driven Engineering (MDE) approaches are explored and <em>SmAuto</em>, a Domain-specific Language (DSL) is proposed for creating and executing automation tasks for smart environments. Through <em>SmAuto</em> it is possible to handle the heterogeneity and complexity issues of the IoT and CPS domains, this way allowing end-users are non-technical application experts to build well-designed and properly functioning smart applications. The proposed DSL implements a Sense-Think-Act-Communicate model for smart environments and enables the creation, validation, and dynamic execution of composite automation models in physical, virtual and hybrid environments, while it also enables automated code generation of virtual entities for verification purposes. By using layered abstractions to automate the development process, end-users can concentrate on the real problem instead of dwelling into technical details, thus increasing their productivity. The results of the empirical evaluation and the comparison to existing approaches show that <em>SmAuto</em> can make application development more rigorous, improves productivity of end-users including non-experts, i.e. citizen developers and satisfies several functional and non-functional requirements of modern DSLs, such as tool support, modular deployment, reusability, availability and extensibility.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140790904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MotionID: Towards practical behavioral biometrics-based implicit user authentication on smartphones MotionID:在智能手机上实现实用的基于行为生物识别技术的隐式用户身份验证
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-03 DOI: 10.1016/j.pmcj.2024.101922
Mohsen Ali Alawami , Tamer Abuhmed , Mohammed Abuhamad , Hyoungshick Kim

Traditional one-time authentication mechanisms cannot authenticate smartphone users’ identities throughout the session — the concept of using behavioral-based biometrics captured by the built-in motion sensors and touch data is a candidate to solve this issue. Many studies proposed solutions for behavioral-based continuous authentication; however, they are still far from practicality and generality for real-world usage. To date, no commercially deployed implicit user authentication scheme exists because most of those solutions were designed to improve detection accuracy without addressing real-world deployment requirements. To bridge this gap, we tackle the limitations of existing schemes and reach towards developing a more practical implicit authentication scheme, dubbed MotionID, based on a one-class detector using behavioral data from motion sensors when users touch their smartphones. Compared with previous studies, our work addresses the following challenges: ① Global mobile average to dynamically adjust the sampling rate for sensors on any device and mitigate the impact of using sensors’ fixed sampling rate; ② Over-all-apps to authenticate a user across all the mobile applications, not only on-specific application; ③ Single-device-evaluation to measure the performance with multiple users’ (i.e., genuine users and imposters) data collected from the same device; ④ Rapid authentication to quickly identify users’ identities using a few samples collected within short durations of touching (1–5 s) the device; ⑤ Unconditional settings to collect sensor data from real-world smartphone usage rather than a laboratory study. To show the feasibility of MotionID for those challenges, we evaluated the performance of MotionID with ten users’ motion sensor data on five different smartphones under various settings. Our results show the impracticality of using a fixed sampling rate across devices that most previous studies have adopted. MotionID is able to authenticate users with an F1-score up to 98.5% for some devices under practical requirements and an F1-score up to roughly 90% when considering the drift concept and rapid authentication settings. Finally, we investigate time efficiency, power consumption, and memory usage considerations to examine the practicality of MotionID.

传统的一次性身份验证机制无法在整个会话过程中验证智能手机用户的身份--使用内置运动传感器和触摸数据捕获的基于行为的生物识别技术的概念是解决这一问题的候选方案。许多研究都提出了基于行为的持续身份验证解决方案,但这些方案在实际应用中的实用性和通用性还相差甚远。迄今为止,还没有商业化的隐式用户身份验证方案,因为这些方案大多是为了提高检测准确性,而没有解决现实世界的部署要求。为了弥补这一差距,我们解决了现有方案的局限性,并致力于开发一种更实用的隐式身份验证方案,命名为 MotionID,它基于单类检测器,利用用户触摸智能手机时来自运动传感器的行为数据。与之前的研究相比,我们的工作解决了以下难题:全球移动平均值,以动态调整任何设备上传感器的采样率,减轻使用传感器固定采样率的影响;②Over-all-apps,在所有移动应用程序中对用户进行身份验证,而不仅仅是在特定应用程序中;③单设备评估,测量多个用户(即:真实用户和冒名用户)数据的性能、快速身份验证,利用在短时间(1-5 秒)内触摸设备收集到的少量样本快速识别用户身份;⑤无条件设置,收集真实智能手机使用中的传感器数据,而不是实验室研究。为了证明 MotionID 在应对这些挑战方面的可行性,我们利用五款不同智能手机上的十位用户的运动传感器数据,在不同设置下对 MotionID 的性能进行了评估。我们的结果表明,在不同设备上使用固定采样率是不切实际的,而之前的大多数研究都采用了这种采样率。在实际要求下,MotionID 能够在某些设备上以高达 98.5% 的 F1 分数对用户进行身份验证,而在考虑漂移概念和快速身份验证设置的情况下,F1 分数可高达约 90%。最后,我们研究了时间效率、功耗和内存使用等方面的因素,以检验 MotionID 的实用性。
{"title":"MotionID: Towards practical behavioral biometrics-based implicit user authentication on smartphones","authors":"Mohsen Ali Alawami ,&nbsp;Tamer Abuhmed ,&nbsp;Mohammed Abuhamad ,&nbsp;Hyoungshick Kim","doi":"10.1016/j.pmcj.2024.101922","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101922","url":null,"abstract":"<div><p>Traditional one-time authentication mechanisms cannot authenticate smartphone users’ identities throughout the session — the concept of using behavioral-based biometrics captured by the built-in motion sensors and touch data is a candidate to solve this issue. Many studies proposed solutions for behavioral-based continuous authentication; however, they are still far from practicality and generality for real-world usage. To date, no commercially deployed implicit user authentication scheme exists because most of those solutions were designed to improve detection accuracy without addressing real-world deployment requirements. To bridge this gap, we tackle the limitations of existing schemes and reach towards developing a more practical implicit authentication scheme, dubbed MotionID, based on a one-class detector using behavioral data from motion sensors when users touch their smartphones. Compared with previous studies, our work addresses the following challenges: ① <em>Global mobile average</em> to dynamically adjust the sampling rate for sensors on any device and mitigate the impact of using sensors’ fixed sampling rate; ② <em>Over-all-apps</em> to authenticate a user across all the mobile applications, not only on-specific application; ③ <em>Single-device-evaluation</em> to measure the performance with multiple users’ (i.e., genuine users and imposters) data collected from the same device; ④ <em>Rapid authentication</em> to quickly identify users’ identities using a few samples collected within short durations of touching (1–5 s) the device; ⑤ <em>Unconditional settings</em> to collect sensor data from real-world smartphone usage rather than a laboratory study. To show the feasibility of MotionID for those challenges, we evaluated the performance of MotionID with ten users’ motion sensor data on five different smartphones under various settings. Our results show the impracticality of using a <em>fixed sampling rate</em> across devices that most previous studies have adopted. MotionID is able to authenticate users with an F1-score up to 98.5% for some devices under practical requirements and an F1-score up to roughly 90% when considering the drift concept and rapid authentication settings. Finally, we investigate time efficiency, power consumption, and memory usage considerations to examine the practicality of MotionID.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140539084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defending dominant cooperative probabilistic attack in CRNs by JS-divergence-based improved reputation algorithm 通过基于 JS-发散的改进信誉算法防御 CRN 中的主导合作概率攻击
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-03-27 DOI: 10.1016/j.pmcj.2024.101921
Lingling Chen , Xuan Shen , Xiaohui Zhao , Ziwei Wang , Wei He , Guoji Xu , Yiyang Chen

Rapid advances in wireless communication services has made limited spectrum resources increasingly scarce. One promising solution for enhancing spectrum utilization is cooperative spectrum sensing (CSS) in cognitive radio networks (CRNs). However CSS is vulnerable to Byzantine attack. Current researches show that Byzantine attack is easily defended for their fixed attack probability. In this context, we propose an improved attack model called the dominated cooperative probabilistic attack (DCPA) model in the actual situation, building upon the generalized collaborative probabilistic Byzantine attack model. This DCPA model contains auxiliary cooperative attackers (ACAs) who launch attacks and a dominant attacker (DA) who determines ACAs’ attack probability intervals based on their respective credibility. The DCPA model allows ACAs to flexibly launch attacks, without being identified by the traditional reputation defense algorithm, significantly compromising the sensing performance of CSS. To successfully resist the threat posed by the DCPA model to CSS, we propose a JS-divergence-based improved reputation algorithm that can distinguish honest users (HUs) from attackers. This algorithm analyzes two consecutive sensing reports to identify differences in sensing behavior between HUs and attackers. Through Python simulation analysis, we demonstrate that, compared to the generalized cooperative probabilistic attack (CPA) model and the attack-free CSS (AFC) model, the proposed DCPA model is more concealed and significantly more disruptive to the performance of traditional reputation defense algorithms. Furthermore, our approach greatly enhances the performance of CSS by promoting the participation of HUs and suppressing attackers during the final data fusion. And also compared with the PAM2 algorithm, the conventional voting rule (CVR) algorithm and the traditional reputation defense algorithm, our proposed algorithm improves the detection performance by at least 7%, 15% and 50%.

无线通信服务的快速发展使得有限的频谱资源日益稀缺。认知无线电网络(CRN)中的合作频谱感知(CSS)是提高频谱利用率的一个有前途的解决方案。然而,CSS 容易受到拜占庭攻击。目前的研究表明,拜占庭攻击在攻击概率固定的情况下很容易防御。在这种情况下,我们在广义协作概率拜占庭攻击模型的基础上,根据实际情况提出了一种改进的攻击模型,称为主导合作概率攻击(DCPA)模型。这种 DCPA 模型包含发起攻击的辅助合作攻击者(ACA)和根据各自可信度确定 ACA 攻击概率区间的主导攻击者(DA)。DCPA 模型允许 ACA 灵活地发起攻击,而不会被传统的信誉防御算法识别出来,从而大大降低了 CSS 的传感性能。为了成功抵御 DCPA 模型对 CSS 的威胁,我们提出了一种基于 JS-发散的改进信誉算法,该算法可以区分诚实用户(HU)和攻击者。该算法通过分析两份连续的感知报告来识别诚实用户和攻击者在感知行为上的差异。通过 Python 仿真分析,我们证明了与广义合作概率攻击(CPA)模型和无攻击 CSS(AFC)模型相比,所提出的 DCPA 模型更具隐蔽性,对传统声誉防御算法性能的破坏性也明显更大。此外,我们的方法在最终数据融合过程中促进了 HU 的参与并抑制了攻击者,从而大大提高了 CSS 的性能。同时,与 PAM2 算法、传统投票规则(CVR)算法和传统声誉防御算法相比,我们提出的算法至少提高了 7%、15% 和 50%的检测性能。
{"title":"Defending dominant cooperative probabilistic attack in CRNs by JS-divergence-based improved reputation algorithm","authors":"Lingling Chen ,&nbsp;Xuan Shen ,&nbsp;Xiaohui Zhao ,&nbsp;Ziwei Wang ,&nbsp;Wei He ,&nbsp;Guoji Xu ,&nbsp;Yiyang Chen","doi":"10.1016/j.pmcj.2024.101921","DOIUrl":"10.1016/j.pmcj.2024.101921","url":null,"abstract":"<div><p>Rapid advances in wireless communication services has made limited spectrum resources increasingly scarce. One promising solution for enhancing spectrum utilization is cooperative spectrum sensing (CSS) in cognitive radio networks (CRNs). However CSS is vulnerable to Byzantine attack. Current researches show that Byzantine attack is easily defended for their fixed attack probability. In this context, we propose an improved attack model called the dominated cooperative probabilistic attack (DCPA) model in the actual situation, building upon the generalized collaborative probabilistic Byzantine attack model. This DCPA model contains auxiliary cooperative attackers (ACAs) who launch attacks and a dominant attacker (DA) who determines ACAs’ attack probability intervals based on their respective credibility. The DCPA model allows ACAs to flexibly launch attacks, without being identified by the traditional reputation defense algorithm, significantly compromising the sensing performance of CSS. To successfully resist the threat posed by the DCPA model to CSS, we propose a JS-divergence-based improved reputation algorithm that can distinguish honest users (HUs) from attackers. This algorithm analyzes two consecutive sensing reports to identify differences in sensing behavior between HUs and attackers. Through Python simulation analysis, we demonstrate that, compared to the generalized cooperative probabilistic attack (CPA) model and the attack-free CSS (AFC) model, the proposed DCPA model is more concealed and significantly more disruptive to the performance of traditional reputation defense algorithms. Furthermore, our approach greatly enhances the performance of CSS by promoting the participation of HUs and suppressing attackers during the final data fusion. And also compared with the PAM2 algorithm, the conventional voting rule (CVR) algorithm and the traditional reputation defense algorithm, our proposed algorithm improves the detection performance by at least 7%, 15% and 50%.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140403293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feasibility and reliability of peercloud in vehicular networks: A comprehensive study 车载网络中对等云的可行性和可靠性:综合研究
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-03-26 DOI: 10.1016/j.pmcj.2024.101920
Xiaomei Zhang, Zack Stiltner

Advanced computing capabilities embedded in modern vehicles enable them to accommodate a variety of intelligent transportation systems and real-world applications that help improve driving safety and compliance with road regulations. However, some of these applications are computationally demanding, and the local processing capabilities of vehicles may not always be enough to support them. To address this issue, existing research has proposed offloading the excessive workload to other computing facilities, such as nearby base stations, roadside units, or remote cloud servers. Still, these facilities have several limitations, including frequent unavailability, congestion, and high fees. In this paper, we explore a more pervasive and cost-effective solution: offloading excessive workloads to nearby peer vehicles via peer-to-peer connections. This approach, referred to as peercloud-vehicle, is an extension of the peercloud approach, which has been proposed for mobile social networks in the literature. The objective of this work is to have a comprehensive study on the feasibility and reliability of vehicle-to-vehicle offloading. First, we analyze two real-world vehicular network datasets to study the robustness of the vehicle contacts and estimate contact durations with deep learning-based regression methods. Second, we design reliable vehicle-to-vehicle offloading approaches based on two optimization objectives: min-delay task offloading to minimize the overall execution delay, and cost-aware task offloading to minimize the cost of task offloading. Experimental results based on real-world datasets demonstrate that peercloud-vehicle significantly outperforms existing approaches.

现代车辆中嵌入的先进计算能力使其能够容纳各种智能交通系统和实际应用,从而有助于提高驾驶安全性和遵守道路法规。然而,其中一些应用对计算要求很高,而车辆的本地处理能力可能并不总是足以支持这些应用。为解决这一问题,现有研究建议将过多的工作量卸载到其他计算设施,如附近的基站、路边装置或远程云服务器。然而,这些设施仍有一些局限性,包括经常无法使用、拥堵和费用高昂。在本文中,我们将探索一种更普遍、更经济高效的解决方案:通过点对点连接将过多的工作负载卸载到附近的对等车辆上。这种方法被称为 "对等云-车辆",是对等云方法的延伸,在文献中已被提出用于移动社交网络。这项工作的目的是全面研究车对车卸载的可行性和可靠性。首先,我们分析了两个真实世界的车辆网络数据集,研究车辆接触的鲁棒性,并用基于深度学习的回归方法估计接触持续时间。其次,我们基于两个优化目标设计了可靠的车对车卸载方法:最小延迟任务卸载,以最小化整体执行延迟;成本感知任务卸载,以最小化任务卸载成本。基于真实世界数据集的实验结果表明,对等云-车辆的性能明显优于现有方法。
{"title":"Feasibility and reliability of peercloud in vehicular networks: A comprehensive study","authors":"Xiaomei Zhang,&nbsp;Zack Stiltner","doi":"10.1016/j.pmcj.2024.101920","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101920","url":null,"abstract":"<div><p>Advanced computing capabilities embedded in modern vehicles enable them to accommodate a variety of intelligent transportation systems and real-world applications that help improve driving safety and compliance with road regulations. However, some of these applications are computationally demanding, and the local processing capabilities of vehicles may not always be enough to support them. To address this issue, existing research has proposed offloading the excessive workload to other computing facilities, such as nearby base stations, roadside units, or remote cloud servers. Still, these facilities have several limitations, including frequent unavailability, congestion, and high fees. In this paper, we explore a more pervasive and cost-effective solution: offloading excessive workloads to nearby peer vehicles via peer-to-peer connections. This approach, referred to as <em>peercloud-vehicle</em>, is an extension of the <em>peercloud</em> approach, which has been proposed for mobile social networks in the literature. The objective of this work is to have a comprehensive study on the feasibility and reliability of vehicle-to-vehicle offloading. First, we analyze two real-world vehicular network datasets to study the robustness of the vehicle contacts and estimate contact durations with deep learning-based regression methods. Second, we design reliable vehicle-to-vehicle offloading approaches based on two optimization objectives: <em>min-delay</em> task offloading to minimize the overall execution delay, and <em>cost-aware</em> task offloading to minimize the cost of task offloading. Experimental results based on real-world datasets demonstrate that <em>peercloud-vehicle</em> significantly outperforms existing approaches.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140309565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-efficient indoor hybrid deployment strategy for 5G mobile small-cell base stations using JAFR Algorithm 使用 JAFR 算法的 5G 移动小蜂窝基站节能室内混合部署策略
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-03-25 DOI: 10.1016/j.pmcj.2024.101918
Yong Shen , Yu Chen , Hongwei Kang, Xingping Sun, Qingyi Chen

In the context of 5th-generation (5G) mobile communication technology, deploying indoor small-cell base stations (SBS) to serve visitors has become common. However, indoor SBS is constrained by factors such as service capacity, signal interference, and structural layout. Merchants within large buildings frequently host diverse activities to attract visitors, significantly increasing indoor traffic and crowd-gathering phenomenon. Consequently, SBS faces challenges of excessive energy consumption, compromised communication quality, and an inability to provide service to all visitors. Merchants aim to deploy SBS that can effectively curtail energy consumption costs while fulfilling visitor needs. However, due to the intermittent nature of high footfall situations, employing additional fixed SBS is not economically viable. Therefore, we address the challenge of maintaining service quality and mitigating energy consumption of SBS during footfall fluctuations by proposing an SBS model with a dynamic sleep mechanism. We simulate the internal structure of a three-dimensional (3D) building and the footfall over time. Within this model, we leverage the flexibility of mobile small-cell base stations (MSBS) to seamlessly traverse service regions. We compute the transmission power and location of SBS and MSBS based on energy efficiency (EE), combining their strengths to tackle the challenge. This approach maintains SBS communication quality while curbing energy consumption. We attain the optimal hybrid deployment strategy by enhancing the adaptive differential evolution with optional external archive (JADE) algorithm and incorporating the final fitness formula, the adaptive ranking mutation operator strategy, and the disorder replacement strategy (DRS) in it to form the proposed joint adaptive fusion with ranking (JAFR) algorithm. Our comparative simulation experiments demonstrate the effectiveness of JAFR in addressing the challenges against conventional methods, recent differential evolution algorithms, and mobile base station (MBS) deployment approaches posed by this model. The results indicate that the JAFR algorithm yields superior SBS deployment strategies in most cases.

在第五代(5G)移动通信技术的背景下,部署室内小蜂窝基站(SBS)为游客提供服务已变得十分普遍。然而,室内小蜂窝基站受到服务容量、信号干扰和结构布局等因素的制约。大型建筑内的商家经常举办各种活动吸引游客,大大增加了室内流量和人群聚集现象。因此,SBS 面临着能源消耗过大、通信质量下降、无法为所有游客提供服务等挑战。商家希望部署的 SBS 既能有效降低能耗成本,又能满足游客需求。然而,由于高人流量情况的间歇性,采用额外的固定 SBS 在经济上并不可行。因此,我们提出了一种具有动态休眠机制的 SBS 模型,以应对在人流量波动时保持 SBS 服务质量和降低能耗的挑战。我们模拟了三维(3D)建筑的内部结构和随时间变化的人流量。在这个模型中,我们利用移动小蜂窝基站(MSBS)的灵活性无缝穿越服务区域。我们根据能效 (EE) 计算 SBS 和 MSBS 的传输功率和位置,结合它们的优势来应对挑战。这种方法既能保持 SBS 的通信质量,又能降低能耗。我们通过增强带可选外部存档的自适应微分进化(JADE)算法,并将最终适配公式、自适应排序突变算子策略和无序替换策略(DRS)融入其中,形成了拟议的联合自适应排序融合(JAFR)算法,从而实现了最佳混合部署策略。我们的对比模拟实验证明了 JAFR 在应对传统方法、最新的差分进化算法和移动基站(MBS)部署方法所带来的挑战方面的有效性。结果表明,JAFR 算法在大多数情况下都能产生更优越的 SBS 部署策略。
{"title":"Energy-efficient indoor hybrid deployment strategy for 5G mobile small-cell base stations using JAFR Algorithm","authors":"Yong Shen ,&nbsp;Yu Chen ,&nbsp;Hongwei Kang,&nbsp;Xingping Sun,&nbsp;Qingyi Chen","doi":"10.1016/j.pmcj.2024.101918","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101918","url":null,"abstract":"<div><p>In the context of 5th-generation (5G) mobile communication technology, deploying indoor small-cell base stations (SBS) to serve visitors has become common. However, indoor SBS is constrained by factors such as service capacity, signal interference, and structural layout. Merchants within large buildings frequently host diverse activities to attract visitors, significantly increasing indoor traffic and crowd-gathering phenomenon. Consequently, SBS faces challenges of excessive energy consumption, compromised communication quality, and an inability to provide service to all visitors. Merchants aim to deploy SBS that can effectively curtail energy consumption costs while fulfilling visitor needs. However, due to the intermittent nature of high footfall situations, employing additional fixed SBS is not economically viable. Therefore, we address the challenge of maintaining service quality and mitigating energy consumption of SBS during footfall fluctuations by proposing an SBS model with a dynamic sleep mechanism. We simulate the internal structure of a three-dimensional (3D) building and the footfall over time. Within this model, we leverage the flexibility of mobile small-cell base stations (MSBS) to seamlessly traverse service regions. We compute the transmission power and location of SBS and MSBS based on energy efficiency (EE), combining their strengths to tackle the challenge. This approach maintains SBS communication quality while curbing energy consumption. We attain the optimal hybrid deployment strategy by enhancing the adaptive differential evolution with optional external archive (JADE) algorithm and incorporating the final fitness formula, the adaptive ranking mutation operator strategy, and the disorder replacement strategy (DRS) in it to form the proposed joint adaptive fusion with ranking (JAFR) algorithm. Our comparative simulation experiments demonstrate the effectiveness of JAFR in addressing the challenges against conventional methods, recent differential evolution algorithms, and mobile base station (MBS) deployment approaches posed by this model. The results indicate that the JAFR algorithm yields superior SBS deployment strategies in most cases.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140339744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum-resistance blockchain-assisted certificateless data authentication and key exchange scheme for the smart grid metering infrastructure 用于智能电网计量基础设施的量子抗性区块链辅助无证书数据认证和密钥交换方案
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-03-18 DOI: 10.1016/j.pmcj.2024.101919
Hema Shekhawat , Daya Sagar Gupta

In the contemporary landscape of energy infrastructure, the “smart-grid metering infrastructure (SGMI)” emerges as a pivotal entity for efficiently monitoring and regulating electricity generation in response to client behavior. Within this context, SGMI addresses a spectrum of pertinent security and privacy concerns. This study systematically addresses the inherent research problems associated with SGMI and introduces a lattice-based blockchain-assisted certificateless data authentication and key exchange scheme. The primary aim of this scheme is to establish quantum resistance, conditional anonymity, dynamic participation, and the capacity for key updates and revocations, all of which are imperative facets for the robust implementation of mutual authentication within SGMI. Our scheme harnesses blockchain technology to mitigate the vulnerabilities associated with centralized administrative control, thus eliminating the risk of a single-point failure and distributed denial-of-service attacks. Furthermore, our proposed scheme is meticulously designed to accommodate the resource constraints of smart meters, characterized by lightweight operations. Rigorous formal security analysis is conducted within the framework of the quantum-accessible random oracle model, fortified by ’history-free reduction,’ substantiating its security credentials. Complementing this, simulation orchestration serves to underscore its superiority over existing methodologies, particularly in the realms of energy efficiency, data computation, communication, and the costs associated with private key storage.

在当代能源基础设施领域,"智能电网计量基础设施(SGMI)"已成为根据客户行为有效监控和调节发电量的关键实体。在此背景下,SGMI 解决了一系列相关的安全和隐私问题。本研究系统地解决了与 SGMI 相关的固有研究问题,并介绍了一种基于网格的区块链辅助无证书数据验证和密钥交换方案。该方案的主要目的是建立量子抗性、有条件的匿名性、动态参与以及密钥更新和撤销的能力,所有这些都是在 SGMI 中稳健实施相互认证的必要条件。我们的方案利用区块链技术减少了与集中式管理控制相关的漏洞,从而消除了单点故障和分布式拒绝服务攻击的风险。此外,我们提出的方案经过精心设计,以适应智能电表的资源限制,其特点是轻量级操作。我们在量子可访问随机甲骨文模型的框架内进行了严格的正式安全分析,并通过 "无历史还原 "进行了强化,从而证实了其安全性。作为补充,仿真协调强调了其优于现有方法的性能,特别是在能效、数据计算、通信以及与私钥存储相关的成本方面。
{"title":"Quantum-resistance blockchain-assisted certificateless data authentication and key exchange scheme for the smart grid metering infrastructure","authors":"Hema Shekhawat ,&nbsp;Daya Sagar Gupta","doi":"10.1016/j.pmcj.2024.101919","DOIUrl":"10.1016/j.pmcj.2024.101919","url":null,"abstract":"<div><p>In the contemporary landscape of energy infrastructure, the “smart-grid metering infrastructure (SGMI)” emerges as a pivotal entity for efficiently monitoring and regulating electricity generation in response to client behavior. Within this context, SGMI addresses a spectrum of pertinent security and privacy concerns. This study systematically addresses the inherent research problems associated with SGMI and introduces a lattice-based blockchain-assisted certificateless data authentication and key exchange scheme. The primary aim of this scheme is to establish quantum resistance, conditional anonymity, dynamic participation, and the capacity for key updates and revocations, all of which are imperative facets for the robust implementation of mutual authentication within SGMI. Our scheme harnesses blockchain technology to mitigate the vulnerabilities associated with centralized administrative control, thus eliminating the risk of a single-point failure and distributed denial-of-service attacks. Furthermore, our proposed scheme is meticulously designed to accommodate the resource constraints of smart meters, characterized by lightweight operations. Rigorous formal security analysis is conducted within the framework of the quantum-accessible random oracle model, fortified by ’history-free reduction,’ substantiating its security credentials. Complementing this, simulation orchestration serves to underscore its superiority over existing methodologies, particularly in the realms of energy efficiency, data computation, communication, and the costs associated with private key storage.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140167635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SEEK+: Securing vehicle GPS via a sequential dashcam-based vehicle localization framework SEEK+:通过基于连续仪表盘摄像头的车辆定位框架确保车辆 GPS 安全
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-03-12 DOI: 10.1016/j.pmcj.2024.101916
Peng Jiang , Hongyi Wu , Yanxiao Zhao , Dan Zhao , Gang Zhou , Chunsheng Xin

Nowadays, the Global Positioning System (GPS) plays an critical role in providing navigational services for transportation and a variety of other location-dependent applications. However, the emergent threat of GPS spoofing attacks compromises the safety and reliability of these systems. In response, this study introduces a cutting-edge computer vision-based methodology, the SEquential dashcam-based vEhicle localization frameworK Plus (SEEK+), designed to counteract GPS spoofing. By analyzing dashcam footage to ascertain a vehicle’s actual location, SEEK+ scrutinizes the authenticity of reported GPS data, effectively identifying spoofing incidents. The application of dashcam imagery for localization, however, presents inherent obstacles, such as adverse lighting and weather conditions, seasonal and temporal image variations, obstructions within the camera’s field of view, and fluctuating vehicle velocities. To overcome these issues, SEEK+ integrates innovative strategies within its framework, demonstrating superior efficacy over existing approaches with a notable detection accuracy rate of up to 94%.

如今,全球定位系统(GPS)在为交通和其他各种依赖位置的应用提供导航服务方面发挥着至关重要的作用。然而,新出现的 GPS 欺骗攻击威胁损害了这些系统的安全性和可靠性。为此,本研究引入了一种基于计算机视觉的先进方法,即基于仪表盘的SEquential vEhicle localization frameworK Plus (SEEK+),旨在对抗GPS欺骗。通过分析仪表盘录像来确定车辆的实际位置,SEEK+ 可以仔细检查所报告的 GPS 数据的真实性,从而有效识别欺骗事件。然而,应用仪表盘摄像头图像进行定位存在固有的障碍,例如不利的照明和天气条件、季节和时间图像变化、摄像头视野内的障碍物以及波动的车辆速度。为了克服这些问题,SEEK+ 在其框架内集成了创新策略,与现有方法相比,显示出卓越的功效,检测准确率高达 94%。
{"title":"SEEK+: Securing vehicle GPS via a sequential dashcam-based vehicle localization framework","authors":"Peng Jiang ,&nbsp;Hongyi Wu ,&nbsp;Yanxiao Zhao ,&nbsp;Dan Zhao ,&nbsp;Gang Zhou ,&nbsp;Chunsheng Xin","doi":"10.1016/j.pmcj.2024.101916","DOIUrl":"10.1016/j.pmcj.2024.101916","url":null,"abstract":"<div><p>Nowadays, the Global Positioning System (GPS) plays an critical role in providing navigational services for transportation and a variety of other location-dependent applications. However, the emergent threat of GPS spoofing attacks compromises the safety and reliability of these systems. In response, this study introduces a cutting-edge computer vision-based methodology, the SEquential dashcam-based vEhicle localization frameworK Plus (SEEK+), designed to counteract GPS spoofing. By analyzing dashcam footage to ascertain a vehicle’s actual location, SEEK+ scrutinizes the authenticity of reported GPS data, effectively identifying spoofing incidents. The application of dashcam imagery for localization, however, presents inherent obstacles, such as adverse lighting and weather conditions, seasonal and temporal image variations, obstructions within the camera’s field of view, and fluctuating vehicle velocities. To overcome these issues, SEEK+ integrates innovative strategies within its framework, demonstrating superior efficacy over existing approaches with a notable detection accuracy rate of up to 94%.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140275819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Seeing the world from its words: All-embracing Transformers for fingerprint-based indoor localization 从文字看世界基于指纹的室内定位的全能变形金刚
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-03-11 DOI: 10.1016/j.pmcj.2024.101912
Son Minh Nguyen , Duc Viet Le , Paul J.M. Havinga

In this paper, we present all-embracing Transformers (AaTs) that are capable of deftly manipulating attention mechanism for Received Signal Strength (RSS) fingerprints in order to invigorate localizing performance. Since most machine learning models applied to the RSS modality do not possess any attention mechanism, they can merely capture superficial representations. Moreover, compared to textual and visual modalities, the RSS modality is inherently notorious for its sensitivity to environmental dynamics. Such adversities inhibit their access to subtle but distinct representations that characterize the corresponding location, ultimately resulting in significant degradation in the testing phase. In contrast, a major appeal of AaTs is the ability to focus exclusively on relevant anchors in RSS sequences, allowing full rein to the exploitation of subtle and distinct representations for specific locations. This also facilitates disregarding redundant clues formed by noisy ambient conditions, thus enhancing accuracy in localization. Apart from that, explicitly resolving the representation collapse (i.e., none-informative or homogeneous features, and gradient vanishing) can further invigorate the self-attention process in transformer blocks, by which subtle but distinct representations to specific locations are radically captured with ease. For that purpose, we first enhance our proposed model with two sub-constraints, namely covariance and variance losses at the Anchor2Vec. The proposed constraints are automatically mediated with the primary task towards a novel multi-task learning manner. In an advanced manner, we present further the ultimate in design with a few simple tweaks carefully crafted for transformer encoder blocks. This effort aims to promote representation augmentation via stabilizing the inflow of gradients to these blocks. Thus, the problems of representation collapse in regular Transformers can be tackled. To evaluate our AaTs, we compare the models with the state-of-the-art (SoTA) methods on three benchmark indoor localization datasets. The experimental results confirm our hypothesis and show that our proposed models could deliver much higher and more stable accuracy.

在本文中,我们介绍了能够巧妙地操纵接收信号强度(RSS)指纹的注意力机制,以提高定位性能的全方位变换器(AaTs)。由于大多数应用于 RSS 模式的机器学习模型都不具备任何注意力机制,因此它们只能捕捉肤浅的表征。此外,与文本和视觉模态相比,RSS 模态对环境动态的敏感性与生俱来。这些不利因素抑制了它们对相应位置的微妙而独特的表征的获取,最终导致测试阶段的效果大打折扣。与此相反,AaTs 的一个主要优点是能够只关注 RSS 序列中的相关锚点,从而能够充分利用特定位置的微妙而独特的表征。这也有利于忽略嘈杂环境条件下形成的冗余线索,从而提高定位的准确性。除此以外,明确解决表征坍塌(即无信息或同质特征以及梯度消失)还能进一步激活转换块中的自我注意过程,从而从根本上轻松捕捉特定位置的微妙而独特的表征。为此,我们首先用两个子约束条件来增强我们提出的模型,即 Anchor2Vec 的协方差和方差损失。所提出的约束条件会自动与主要任务相结合,从而实现一种新颖的多任务学习方式。在高级方面,我们通过对变压器编码器模块精心设计的一些简单调整,进一步实现了设计的终极目标。这一努力旨在通过稳定梯度流入这些区块来促进表征增强。因此,普通变压器中的表示崩溃问题可以得到解决。为了评估我们的 AaTs,我们在三个基准室内定位数据集上将这些模型与最先进的 SoTA 方法进行了比较。实验结果证实了我们的假设,并表明我们提出的模型可以提供更高更稳定的精度。
{"title":"Seeing the world from its words: All-embracing Transformers for fingerprint-based indoor localization","authors":"Son Minh Nguyen ,&nbsp;Duc Viet Le ,&nbsp;Paul J.M. Havinga","doi":"10.1016/j.pmcj.2024.101912","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101912","url":null,"abstract":"<div><p>In this paper, we present all-embracing Transformers (AaTs) that are capable of deftly manipulating attention mechanism for Received Signal Strength (RSS) fingerprints in order to invigorate localizing performance. Since most machine learning models applied to the RSS modality do not possess any attention mechanism, they can merely capture superficial representations. Moreover, compared to textual and visual modalities, the RSS modality is inherently notorious for its sensitivity to environmental dynamics. Such adversities inhibit their access to subtle but distinct representations that characterize the corresponding location, ultimately resulting in significant degradation in the testing phase. In contrast, a major appeal of AaTs is the ability to focus exclusively on relevant anchors in RSS sequences, allowing full rein to the exploitation of subtle and distinct representations for specific locations. This also facilitates disregarding redundant clues formed by noisy ambient conditions, thus enhancing accuracy in localization. Apart from that, explicitly resolving the representation collapse (<em>i.e.</em>, none-informative or homogeneous features, and gradient vanishing) can further invigorate the self-attention process in transformer blocks, by which subtle but distinct representations to specific locations are radically captured with ease. For that purpose, we first enhance our proposed model with two sub-constraints, namely covariance and variance losses at the <em>Anchor2Vec</em>. The proposed constraints are automatically mediated with the primary task towards a novel multi-task learning manner. In an advanced manner, we present further the ultimate in design with a few simple tweaks carefully crafted for transformer encoder blocks. This effort aims to promote representation augmentation via stabilizing the inflow of gradients to these blocks. Thus, the problems of representation collapse in regular Transformers can be tackled. To evaluate our AaTs, we compare the models with the state-of-the-art (SoTA) methods on three benchmark indoor localization datasets. The experimental results confirm our hypothesis and show that our proposed models could deliver much higher and more stable accuracy.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224000385/pdfft?md5=119bfe7ecffea68a2c6b1240cc6ebda1&pid=1-s2.0-S1574119224000385-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140135031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving pedestrian tracking with path image inpainting and 3D point cloud features 利用路径图像涂抹和三维点云特征进行保护隐私的行人追踪
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-03-11 DOI: 10.1016/j.pmcj.2024.101914
Masakazu Ohno, Riki Ukyo, Tatsuya Amano, Hamada Rizk, Hirozumi Yamaguchi

Tracking pedestrian flow in large public areas is vital, yet ensuring privacy is paramount. Traditional visual-based tracking systems are raising concerns for potentially obtaining persistent and permanent identifiers that can compromise individual identities. Moreover, in areas such as the vicinity of restrooms, any form of data acquisition capturing human behavior should be refrained from, making it also crucial to appropriately address and complement these blind spots for a comprehensive analysis of pedestrian movement in the entire area. In this paper, we present our pedestrian tracking algorithm using distributed 3D LiDARs (Light Detection and Ranging), which capture pedestrians as 3D point clouds, omitting identifiable features. Our system bridges blind spots by leveraging historical movement data and 3D point cloud features, complemented by a generative diffusion model to predict trajectories in unseen areas. In a large-scale testbed with 70 LiDARs, the system achieved a 0.98 F-measure, highlighting its potential as a leading privacy-preserving tracking solution.

跟踪大型公共区域的人流至关重要,但确保隐私也是头等大事。传统的视觉跟踪系统可能会获取持久和永久的身份识别信息,从而危及个人身份,这引起了人们的关注。此外,在厕所附近等区域,任何形式的捕捉人类行为的数据采集都应避免,因此适当解决和补充这些盲点以全面分析整个区域的行人流动情况也至关重要。在本文中,我们介绍了使用分布式三维激光雷达(光探测与测距)的行人跟踪算法,该算法以三维点云的形式捕捉行人,省略了可识别的特征。我们的系统利用历史运动数据和三维点云特征,辅以生成扩散模型来预测未见区域的轨迹,从而弥补了盲点。在一个有 70 个激光雷达的大型测试平台上,该系统的 F 测量值达到了 0.98,凸显了其作为领先的隐私保护跟踪解决方案的潜力。
{"title":"Privacy-preserving pedestrian tracking with path image inpainting and 3D point cloud features","authors":"Masakazu Ohno,&nbsp;Riki Ukyo,&nbsp;Tatsuya Amano,&nbsp;Hamada Rizk,&nbsp;Hirozumi Yamaguchi","doi":"10.1016/j.pmcj.2024.101914","DOIUrl":"10.1016/j.pmcj.2024.101914","url":null,"abstract":"<div><p>Tracking pedestrian flow in large public areas is vital, yet ensuring privacy is paramount. Traditional visual-based tracking systems are raising concerns for potentially obtaining persistent and permanent identifiers that can compromise individual identities. Moreover, in areas such as the vicinity of restrooms, any form of data acquisition capturing human behavior should be refrained from, making it also crucial to appropriately address and complement these blind spots for a comprehensive analysis of pedestrian movement in the entire area. In this paper, we present our pedestrian tracking algorithm using distributed 3D LiDARs (Light Detection and Ranging), which capture pedestrians as 3D point clouds, omitting identifiable features. Our system bridges blind spots by leveraging historical movement data and 3D point cloud features, complemented by a generative diffusion model to predict trajectories in unseen areas. In a large-scale testbed with 70 LiDARs, the system achieved a 0.98 F-measure, highlighting its potential as a leading privacy-preserving tracking solution.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224000403/pdfft?md5=d59e7b592fa6f7f65168d1cbc0adb7a2&pid=1-s2.0-S1574119224000403-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140105444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Pervasive and Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1