Pub Date : 2023-10-01DOI: 10.1016/j.pmcj.2023.101845
Luca Sabatucci , Massimo Cossentino , Claudia Di Napoli , Angelo Susi
Context:
Engineering Ambient Assisted Living applications for the elderly is challenging due to the diversity and rapid changes of both end users’ needs and technological environment equipment.
Objective:
Assistive applications can be provided as combinations of functionalities provided by IoT devices. With the pervasive availability of functionally equivalent IoT devices, they should be selected according to the specific deployment context in terms of user needs and conditions, device availability, and regulations when the operative context dynamic conditions can be set. Such selection is the objective of this work.
Methods:
We rely on a conceptual framework for self-adaptation as the enabler for a run-time decision-making process. It allows for representing relations among IoT devices, the functionalities they deliver, and the different modalities these functionalities are provided with in terms of goals, devices, and norms. The framework is based on three fundamental principles: (1) high-level abstractions separating the expected functionality, how it can be delivered, and who is responsible for its delivery; (2) AAL applications as the run-time composition of atomic functionalities; (3) centrality of the user in the system.
Result:
The Device-Goal-Norm framework is proposed to specify diagrams for different AAL applications, together with the semantics to transform these diagrams into run-time models. We also provide a running implementation of a run-time model based on the belief–desire–intention paradigm.
{"title":"A model for automatic selection of IoT services in ambient assisted living for the elderly","authors":"Luca Sabatucci , Massimo Cossentino , Claudia Di Napoli , Angelo Susi","doi":"10.1016/j.pmcj.2023.101845","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101845","url":null,"abstract":"<div><h3>Context:</h3><p>Engineering Ambient Assisted Living applications for the elderly is challenging due to the diversity and rapid changes of both end users’ needs and technological environment equipment.</p></div><div><h3>Objective:</h3><p>Assistive applications can be provided as combinations of functionalities provided by IoT devices. With the pervasive availability of functionally equivalent IoT devices, they should be selected according to the specific deployment context in terms of user needs and conditions, device availability, and regulations when the operative context dynamic conditions can be set. Such selection is the objective of this work.</p></div><div><h3>Methods:</h3><p>We rely on a conceptual framework for self-adaptation as the enabler for a run-time decision-making process. It allows for representing relations among IoT devices, the functionalities they deliver, and the different modalities these functionalities are provided with in terms of goals, devices, and norms. The framework is based on three fundamental principles: (1) high-level abstractions separating the expected functionality, how it can be delivered, and who is responsible for its delivery; (2) AAL applications as the run-time composition of atomic functionalities; (3) centrality of the user in the system.</p></div><div><h3>Result:</h3><p>The Device-Goal-Norm framework is proposed to specify diagrams for different AAL applications, together with the semantics to transform these diagrams into run-time models. We also provide a running implementation of a run-time model based on the belief–desire–intention paradigm.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"95 ","pages":"Article 101845"},"PeriodicalIF":4.3,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49764547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.1016/j.pmcj.2023.101843
Huan Yang , Yajun Guo , Yimin Guo
With the rise of Internet of Things (IoT), the smart home is another emerging concept and application of IoT, where security and private data of devices are important. In this paper, fog computing is applied to the smart home environment, where fog can provide many smart features and services to the smart home. Fog computing has many advantages, such as low latency and real-time interaction. However, when fog computing is combined with smart home, it also faces some security threats: first, some fog nodes and smart home devices are deployed in public places, vulnerable to damage or theft by attackers, not considered fully trusted, and vulnerable to device loss/theft attacks, impersonation attacks, and message tampering attacks, etc. These threats can lead to adversaries controlling devices in the smart home or modifying messages to make smart home devices execute wrong commands, causing irreparable damage; Second, the smart home system should have good real-time interaction, and the authentication process using the low latency feature of fog computing should not be involved by the cloud. Considering these, it is necessary to design a secure and effective fog-enabled smart home authentication system that is secure against various known attacks, especially when the fog node is not fully trusted or the smart home device is captured as well. Finally, the authentication scheme should also be lightweight due to the limited resources of many smart home devices. To address these issues, this paper proposes a lightweight authentication scheme for the fog-enabled smart home system. It also employs a physical unclonable function to achieve mutual authentication among three parties: smart home devices, fog nodes and users. Formal security analysis under the Real-Or-Random model shows that this scheme is provably secure. And informal security analysis shows that our scheme is robust against various known attacks. At the same time, the proposed scheme requires less computation cost (8.239 ms) and is approximately 40% to 390% faster than existing related schemes. Although the communication cost is slightly higher (4512 bits), it is reasonable because the proposed scheme implements fog/gateway node compromised attack that has not been achieved by any other existing related schemes.
{"title":"A puf-based three-party authentication key establishment scheme for fog-enabled smart home","authors":"Huan Yang , Yajun Guo , Yimin Guo","doi":"10.1016/j.pmcj.2023.101843","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101843","url":null,"abstract":"<div><p>With the rise of Internet of Things<span><span> (IoT), the smart home is another emerging concept and application of IoT, where security and private data of devices are important. In this paper, fog computing<span><span> is applied to the smart home environment, where fog can provide many smart features and services to the smart home. Fog computing has many advantages, such as low latency and real-time interaction. However, when fog computing is combined with smart home, it also faces some security threats: first, some fog nodes and smart home devices are deployed in public places, vulnerable to damage or theft by attackers, not considered fully trusted, and vulnerable to device loss/theft attacks, impersonation attacks, and message tampering attacks, etc. These threats can lead to adversaries controlling devices in the smart home or modifying messages to make smart home devices execute wrong commands, causing irreparable damage; Second, the </span>smart home system<span> should have good real-time interaction, and the authentication process using the low latency feature of fog computing should not be involved by the cloud. Considering these, it is necessary to design a secure and effective fog-enabled smart home </span></span></span>authentication system<span><span> that is secure against various known attacks, especially when the fog node is not fully trusted or the smart home device is captured as well. Finally, the authentication scheme should also be lightweight due to the limited resources of many smart home devices. To address these issues, this paper proposes a lightweight authentication scheme for the fog-enabled smart home system. It also employs a physical unclonable function to achieve mutual authentication among three parties: smart home devices, fog nodes and users. Formal security analysis under the Real-Or-Random model shows that this scheme is </span>provably secure. And informal security analysis shows that our scheme is robust against various known attacks. At the same time, the proposed scheme requires less computation cost (8.239 ms) and is approximately 40% to 390% faster than existing related schemes. Although the communication cost is slightly higher (4512 bits), it is reasonable because the proposed scheme implements fog/gateway node compromised attack that has not been achieved by any other existing related schemes.</span></span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"95 ","pages":"Article 101843"},"PeriodicalIF":4.3,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49764543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.1016/j.pmcj.2023.101833
Domenico Minici , Guglielmo Cola , Giulia Perfetti , Sofia Espinoza Tofalos , Mauro Di Bari , Marco Avvenuti
The COVID-19 pandemic has considerably shifted the focus of scientific research, speeding up the process of digitizing medical monitoring. Wearable technology is already widely used in medical research, as it has the potential to monitor the user’s physical activity in daily life. This study aims to explore in-home collected wearable-derived signals for frailty status assessment. A sample of 35 subjects aged 70+, autonomous in basic activities of daily living and cognitively intact, was collected. After being clinically assessed for frailty according to Fried’s phenotype, participants wore a wrist device equipped with inertial motion sensors for 24 h, during which they led their usual life in their homes. Signal-derived traces were split into 10-s segments and labeled classified as gaits, other motor activities, or rests. Gait and other motor activity segments were used to calculate the Subject Activity Level (SAL), an index to quantify how users were active throughout the day. The SAL index was then combined with gait-derived features to design a novel frailty status assessment algorithm. In particular, subjects were classified as robust or non-robust, a category that includes both Fried’s frail and pre-frail phenotypes. For some users, activity levels alone enabled accurate frailty assessment, whereas, for others, a Gaussian Naive Bayes classifier based on the gait-derived features was required to assess frailty status. Overall, the proposed method showed extremely promising results, allowing discrimination of robust and non-robust subjects with an overall 91% accuracy, stemming from 95% sensitivity and 88% specificity. This study demonstrates the potential of unobtrusive, wearable devices in objectively assessing frailty through unsupervised monitoring in real-world settings.
{"title":"Automated, ecologic assessment of frailty using a wrist-worn device","authors":"Domenico Minici , Guglielmo Cola , Giulia Perfetti , Sofia Espinoza Tofalos , Mauro Di Bari , Marco Avvenuti","doi":"10.1016/j.pmcj.2023.101833","DOIUrl":"10.1016/j.pmcj.2023.101833","url":null,"abstract":"<div><p>The COVID-19 pandemic has considerably shifted the focus of scientific research, speeding up the process of digitizing medical monitoring. Wearable technology is already widely used in medical research, as it has the potential to monitor the user’s physical activity in daily life. This study aims to explore in-home collected wearable-derived signals for frailty status assessment. A sample of 35 subjects aged 70+, autonomous in basic activities of daily living and cognitively intact, was collected. After being clinically assessed for frailty according to Fried’s phenotype, participants wore a wrist device equipped with inertial motion sensors for 24 h, during which they led their usual life in their homes. Signal-derived traces were split into 10-s segments and labeled classified as gaits, other motor activities, or rests. Gait and other motor activity segments were used to calculate the Subject Activity Level (SAL), an index to quantify how users were active throughout the day. The SAL index was then combined with gait-derived features to design a novel frailty status assessment algorithm. In particular, subjects were classified as robust or non-robust, a category that includes both Fried’s frail and pre-frail phenotypes. For some users, activity levels alone enabled accurate frailty assessment, whereas, for others, a Gaussian Naive Bayes classifier based on the gait-derived features was required to assess frailty status. Overall, the proposed method showed extremely promising results, allowing discrimination of robust and non-robust subjects with an overall 91% accuracy, stemming from 95% sensitivity and 88% specificity. This study demonstrates the potential of unobtrusive, wearable devices in objectively assessing frailty through unsupervised monitoring in real-world settings.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"95 ","pages":"Article 101833"},"PeriodicalIF":4.3,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46211532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-09DOI: 10.1016/j.pmcj.2023.101831
Wei Shao , Yu Zhang , Pengfei Xiao , Kyle Kai Qin , Mohammad Saiedur Rahaman , Jeffrey Chan , Bin Guo , Andy Song , Flora D. Salim
Recently, real-time parking availability prediction has attracted much attention since the rapid development of sensor technologies and urbanisation. Most existing works have applied various models to predict long and short-term parking occupancy using historical records. However, historical records are not available for many real-world scenarios, such as new urban areas, where parking lots are fast adjusted and extended. In this paper, we aim to predict parking occupancy using historical data in other areas and contextual information within the targeted area that lacks historical data. We propose a two-step framework to first learn the important contextual features from areas where parking records already existed. Then we transfer these features to the other new areas without historical data records. Through conducting a real-world dataset with various clustering methods combined with different regression models, we observe that multiple contextual features are likely to influence parking availability prediction. We find the best combination (i.e., -shape clustering algorithm and LSTM regression model) to build parking occupancy prediction model based on the subsequent quantitative correlation analysis between contextual features and parking occupancy. The experimental results show that (1) the conventional internal clustering evaluation does not work well for spatio-temporal data clustering for the prediction purpose; (2) our proposed approach achieves approximately 3% error rate in 30 minutes of prediction, which is significantly better than the estimation of the occupancy rate using the rate in the adjacent regions (13.3%).
{"title":"Transferrable contextual feature clusters for parking occupancy prediction","authors":"Wei Shao , Yu Zhang , Pengfei Xiao , Kyle Kai Qin , Mohammad Saiedur Rahaman , Jeffrey Chan , Bin Guo , Andy Song , Flora D. Salim","doi":"10.1016/j.pmcj.2023.101831","DOIUrl":"10.1016/j.pmcj.2023.101831","url":null,"abstract":"<div><p>Recently, real-time parking availability prediction has attracted much attention since the rapid development of sensor technologies and urbanisation. Most existing works have applied various models to predict long and short-term parking occupancy using historical records. However, historical records are not available for many real-world scenarios, such as <em>new urban areas</em><span>, where parking lots are fast adjusted and extended. In this paper, we aim to predict parking occupancy using historical data in other areas and contextual information within the targeted area that lacks historical data. We propose a two-step framework to first learn the important contextual features from areas where parking records already existed. Then we transfer these features to the other new areas without historical data records. Through conducting a real-world dataset with various clustering methods combined with different regression models, we observe that multiple contextual features are likely to influence parking availability prediction. We find the best combination (i.e., </span><span><math><mi>k</mi></math></span><span>-shape clustering algorithm<span> and LSTM regression model) to build parking occupancy prediction model based on the subsequent quantitative correlation analysis between contextual features and parking occupancy. The experimental results show that (1) the conventional internal clustering evaluation does not work well for spatio-temporal data clustering for the prediction purpose; (2) our proposed approach achieves approximately 3% error rate in 30 minutes of prediction, which is significantly better than the estimation of the occupancy rate using the rate in the adjacent regions (13.3%).</span></span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"97 ","pages":"Article 101831"},"PeriodicalIF":4.3,"publicationDate":"2023-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46713015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Blockchain has proven in sensor networks as a distributed solution for transparent and secure storage, which allows its application in mobile wireless sensor networks (MWSNs). The consensus mechanism, an essential aspect of blockchain technology, must concern the high mobility, resource-constrained nature, and weak physical defenses of sensor nodes in MWSNs. To secure MWSN data storage in clustered communication, we design a proof-of-information (PoI) variant for fair miner campaigning via the amount of valid data generated from environmental information, including a dynamic adjustment of the data volume threshold to detect malicious nodes and prevent them from misreporting information. Additionally, we introduce a filtering mechanism through the dynamic integrated trust (DIt) of nodes, which integrates the trust evaluation of peer nodes across the network combining objective performance to prevent malicious nodes from infiltrating the final consensus group. The multi-level filtering technique improves the campaign fairness while isolating malicious nodes, ensuring complexity-sensitive PBFT algorithm efficiency in large-scale networks. Simulation results show that the scheme isolates 90% of the malicious nodes and screens 20% of members to produce a smaller final consensus group. Further analysis of impacts on the performance considering network topology and mobility patterns and comparisons of the relevant solutions are presented.
{"title":"Secure and efficient blockchain-based consensus scheme for MWSNs with clustered architecture","authors":"Weiwei Qi , Yu Xia , Pan Zhu , Shushu Zhang , Liucun Zhu , Shanjun Zhang","doi":"10.1016/j.pmcj.2023.101830","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101830","url":null,"abstract":"<div><p>Blockchain has proven in sensor networks as a distributed solution for transparent and secure storage, which allows its application in mobile wireless sensor networks (MWSNs). The consensus mechanism, an essential aspect of blockchain technology, must concern the high mobility, resource-constrained nature, and weak physical defenses of sensor nodes in MWSNs. To secure MWSN data storage in clustered communication, we design a proof-of-information (PoI) variant for fair miner campaigning via the amount of valid data generated from environmental information, including a dynamic adjustment of the data volume threshold to detect malicious nodes and prevent them from misreporting information. Additionally, we introduce a filtering mechanism through the dynamic integrated trust (DIt) of nodes, which integrates the trust evaluation of peer nodes across the network combining objective performance to prevent malicious nodes from infiltrating the final consensus group. The multi-level filtering technique improves the campaign fairness while isolating malicious nodes, ensuring complexity-sensitive PBFT algorithm efficiency in large-scale networks. Simulation results show that the scheme isolates 90% of the malicious nodes and screens 20% of members to produce a smaller final consensus group. Further analysis of impacts on the performance considering network topology and mobility patterns and comparisons of the relevant solutions are presented.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"94 ","pages":"Article 101830"},"PeriodicalIF":4.3,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49740772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.1016/j.pmcj.2023.101807
Rehab Shahin , Sherif M. Saif , Ali A. El-Moursy , Hazem M. Abbas , Salwa M. Nassar
Intelligent Transportation Systems (ITS) are one of the pillars of smart cities that enable smart traffic and smart mobility. Vehicular Ad-hoc Networks (VANETs) are utilized as platforms for ITS applications. In VANETs, vehicles collect relevant information from sensors and exchange information about road conditions and traffic status with each other and with roadside units (RSUs). Roadside units facilitate reliable communication among the vehicles and perform real-time processing for the sensed data before sending to the cloud. Although cloud computing offers high performance computational and storage resources, it does not conform to the real-time nature of the ITS applications and the massive amount of data exchange and generation rate due to its centralized nature and high communication latency. In this paper we propose a cost-effective strategy to solve the configuration and localization problem of fog-based RSU deployment in VANETs. The proposed strategy is able to assign the computational capacity of each fog node based on the amount of computational demand inside its coverage region. The problem is formulated as a Satisfiability Modulo Theories (SMT) problem. Our proposed strategy is more efficient than other strategies in terms of the total deployment cost and the overall satisfied computational demand.
{"title":"Fog-ROCL: A Fog based RSU Optimum Configuration and Localization in VANETs","authors":"Rehab Shahin , Sherif M. Saif , Ali A. El-Moursy , Hazem M. Abbas , Salwa M. Nassar","doi":"10.1016/j.pmcj.2023.101807","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101807","url":null,"abstract":"<div><p><span>Intelligent Transportation Systems<span> (ITS) are one of the pillars of smart cities that enable smart traffic and smart mobility. Vehicular Ad-hoc Networks (VANETs) are utilized as platforms for ITS applications. In VANETs, vehicles collect relevant information from sensors and exchange information about road conditions and traffic status with each other and with roadside units (RSUs). Roadside units facilitate reliable communication among the vehicles and perform real-time processing for the sensed data before sending to the cloud. Although </span></span>cloud computing<span> offers high performance computational and storage resources, it does not conform to the real-time nature of the ITS applications and the massive amount of data exchange and generation rate due to its centralized nature and high communication latency<span>. In this paper we propose a cost-effective strategy to solve the configuration and localization problem of fog-based RSU deployment in VANETs. The proposed strategy is able to assign the computational capacity of each fog node based on the amount of computational demand inside its coverage region. The problem is formulated as a Satisfiability Modulo Theories (SMT) problem. Our proposed strategy is more efficient than other strategies in terms of the total deployment cost and the overall satisfied computational demand.</span></span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"94 ","pages":"Article 101807"},"PeriodicalIF":4.3,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49740519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.1016/j.pmcj.2023.101832
Mariam Orabi, Zaher Al Aghbari, Ibrahim Kamel
The growth of Location-Based Services (LBSs) has been made possible by the widespread use of GPS-enabled devices. Some important LBSs require the ability to quickly process moving spatial-keyword queries over moving objects, such as when a moving customer is looking for a nearby mobile fuel delivery service. While there have been solutions proposed for scenarios where either the queries or the objects being queried are moving, there is still a need for solutions that can handle scenarios where both are in motion. This research focuses on the application of fog computing to provide real-time processing of moving spatial-keyword queries for LBSs. Specifically, the research proposes a new model, FogLBS, designed to efficiently process moving continuous top-k spatial-keyword queries over moving objects in a directed streets network, with a particular emphasis on the use case of a mobile service provider. FogLBS computes queries’ answer sets for time intervals and incrementally updates them using novel optimization techniques and indexing structures. By implementing FogLBS in a fog computing architecture, the model is able to meet the real-time requirements of the service provider application and other similar LBSs. The results of extensive experiments demonstrate the effectiveness of the proposed model in terms of efficiency, scalability, and accuracy, making it a valuable contribution to the field of fog computing in LBSs.
{"title":"FogLBS: Utilizing fog computing for providing mobile Location-Based Services to mobile customers","authors":"Mariam Orabi, Zaher Al Aghbari, Ibrahim Kamel","doi":"10.1016/j.pmcj.2023.101832","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101832","url":null,"abstract":"<div><p><span>The growth of Location-Based Services (LBSs) has been made possible by the widespread use of GPS-enabled devices. Some important LBSs require the ability to quickly process moving spatial-keyword queries over moving objects, such as when a moving customer is looking for a nearby mobile fuel delivery service. While there have been solutions proposed for scenarios where either the queries or the objects being queried are moving, there is still a need for solutions that can handle scenarios where both are in motion. This research focuses on the application of fog computing to provide real-time processing of moving spatial-keyword queries for LBSs. Specifically, the research proposes a new model, FogLBS, designed to efficiently process moving continuous top-k spatial-keyword queries over moving objects in a directed streets network, with a particular emphasis on the use case of a </span>mobile service<span> provider. FogLBS computes queries’ answer sets for time intervals and incrementally updates them using novel optimization techniques and indexing structures. By implementing FogLBS in a fog computing architecture, the model is able to meet the real-time requirements of the service provider application and other similar LBSs. The results of extensive experiments demonstrate the effectiveness of the proposed model in terms of efficiency, scalability, and accuracy, making it a valuable contribution to the field of fog computing in LBSs.</span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"94 ","pages":"Article 101832"},"PeriodicalIF":4.3,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49740796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.1016/j.pmcj.2023.101821
Penghui Zhou, Chunhua Jin, Zhiwei Chen, Guanhua Chen, Lanfang Wang
In today’s world, Internet of Things (IoT) has penetrated every aspect of us. The security of IoT is challenging because of the open nature of wireless communication and limited resources of sensor nodes (SNs). In this paper, we propose an efficient heterogeneous signcryption scheme from IoT to an Internet server, in which the server is in a public key infrastructure (PKI) environment, while the IoT is in a certificateless cryptosystem (CLC) environment. The proposed scheme is briefly referred to as CP-EHSC. CLC can settle the drawbacks of key escrow in identity-based cryptography (IBC) and public key certificate management in PKI. At the same time, PKI is suitable for the server since it has been widely adopted on the Internet. Our proposed scheme can provide security proof in the random oracle model (ROM). Performance analysis shows that the proposed scheme not only achieves great optimization in calculation cost and communication consumption but also makes great progress in total energy consumption. In addition, we illustrate the practical applicability of our proposed scheme by providing a realistic use case scenario.
{"title":"An efficient heterogeneous signcryption scheme for internet of things","authors":"Penghui Zhou, Chunhua Jin, Zhiwei Chen, Guanhua Chen, Lanfang Wang","doi":"10.1016/j.pmcj.2023.101821","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101821","url":null,"abstract":"<div><p><span>In today’s world, Internet of Things<span><span> (IoT) has penetrated every aspect of us. The security of IoT is challenging because of the open nature of wireless communication<span> and limited resources of sensor nodes (SNs). In this paper, we propose an efficient heterogeneous signcryption scheme from IoT to an Internet server, in which the server is in a </span></span>public key infrastructure<span> (PKI) environment, while the IoT is in a certificateless cryptosystem (CLC) environment. The proposed scheme is briefly referred to as CP-EHSC. CLC can settle the drawbacks of key escrow in identity-based cryptography (IBC) and </span></span></span>public key certificate<span><span> management in PKI. At the same time, PKI is suitable for the server since it has been widely adopted on the Internet. Our proposed scheme can provide security proof in the random oracle model (ROM). Performance analysis shows that the proposed scheme not only achieves great optimization in calculation cost and communication consumption but also makes great progress in </span>total energy consumption. In addition, we illustrate the practical applicability of our proposed scheme by providing a realistic use case scenario.</span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"94 ","pages":"Article 101821"},"PeriodicalIF":4.3,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49740771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.1016/j.pmcj.2023.101832
Mariam Orabi, Z. Aghbari, I. Kamel
{"title":"FogLBS: Utilizing fog computing for providing mobile Location-Based Services to mobile customers","authors":"Mariam Orabi, Z. Aghbari, I. Kamel","doi":"10.1016/j.pmcj.2023.101832","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101832","url":null,"abstract":"","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"94 1","pages":"101832"},"PeriodicalIF":4.3,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54902127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure and efficient blockchain-based consensus scheme for MWSNs with clustered architecture","authors":"Weiwei Qi, Yunjun Xia, Pan Zhu, Shushu Zhang, Liucun Zhu, Shanjun Zhang","doi":"10.1016/j.pmcj.2023.101830","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101830","url":null,"abstract":"","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"94 1","pages":"101830"},"PeriodicalIF":4.3,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54902085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}