首页 > 最新文献

Pervasive and Mobile Computing最新文献

英文 中文
A model for automatic selection of IoT services in ambient assisted living for the elderly 老年人环境辅助生活物联网服务自动选择模型
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-01 DOI: 10.1016/j.pmcj.2023.101845
Luca Sabatucci , Massimo Cossentino , Claudia Di Napoli , Angelo Susi

Context:

Engineering Ambient Assisted Living applications for the elderly is challenging due to the diversity and rapid changes of both end users’ needs and technological environment equipment.

Objective:

Assistive applications can be provided as combinations of functionalities provided by IoT devices. With the pervasive availability of functionally equivalent IoT devices, they should be selected according to the specific deployment context in terms of user needs and conditions, device availability, and regulations when the operative context dynamic conditions can be set. Such selection is the objective of this work.

Methods:

We rely on a conceptual framework for self-adaptation as the enabler for a run-time decision-making process. It allows for representing relations among IoT devices, the functionalities they deliver, and the different modalities these functionalities are provided with in terms of goals, devices, and norms. The framework is based on three fundamental principles: (1) high-level abstractions separating the expected functionality, how it can be delivered, and who is responsible for its delivery; (2) AAL applications as the run-time composition of atomic functionalities; (3) centrality of the user in the system.

Result:

The Device-Goal-Norm framework is proposed to specify diagrams for different AAL applications, together with the semantics to transform these diagrams into run-time models. We also provide a running implementation of a run-time model based on the belief–desire–intention paradigm.

背景:由于终端用户的需求和技术环境设备的多样性和快速变化,老年人的工程环境辅助生活应用具有挑战性。目标:辅助应用程序可以作为物联网设备提供的功能的组合提供。随着功能等效物联网设备的普遍可用性,当可以设置操作上下文动态条件时,应根据用户需求和条件、设备可用性和法规等方面的具体部署上下文来选择它们。这样的选择是这项工作的目标。方法:我们依赖于一个自我适应的概念框架,作为运行时决策过程的推动者。它允许表示物联网设备之间的关系,它们提供的功能,以及这些功能在目标、设备和规范方面提供的不同模式。该框架基于三个基本原则:(1)分离预期功能的高级抽象,如何交付,以及谁负责交付;(2) AAL应用程序作为原子功能的运行时组成;(3) 用户在系统中的中心性。结果:提出了设备目标规范框架来指定不同AAL应用程序的图,以及将这些图转换为运行时模型的语义。我们还提供了一个基于信念-欲望-意图范式的运行时模型的运行实现。
{"title":"A model for automatic selection of IoT services in ambient assisted living for the elderly","authors":"Luca Sabatucci ,&nbsp;Massimo Cossentino ,&nbsp;Claudia Di Napoli ,&nbsp;Angelo Susi","doi":"10.1016/j.pmcj.2023.101845","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101845","url":null,"abstract":"<div><h3>Context:</h3><p>Engineering Ambient Assisted Living applications for the elderly is challenging due to the diversity and rapid changes of both end users’ needs and technological environment equipment.</p></div><div><h3>Objective:</h3><p>Assistive applications can be provided as combinations of functionalities provided by IoT devices. With the pervasive availability of functionally equivalent IoT devices, they should be selected according to the specific deployment context in terms of user needs and conditions, device availability, and regulations when the operative context dynamic conditions can be set. Such selection is the objective of this work.</p></div><div><h3>Methods:</h3><p>We rely on a conceptual framework for self-adaptation as the enabler for a run-time decision-making process. It allows for representing relations among IoT devices, the functionalities they deliver, and the different modalities these functionalities are provided with in terms of goals, devices, and norms. The framework is based on three fundamental principles: (1) high-level abstractions separating the expected functionality, how it can be delivered, and who is responsible for its delivery; (2) AAL applications as the run-time composition of atomic functionalities; (3) centrality of the user in the system.</p></div><div><h3>Result:</h3><p>The Device-Goal-Norm framework is proposed to specify diagrams for different AAL applications, together with the semantics to transform these diagrams into run-time models. We also provide a running implementation of a run-time model based on the belief–desire–intention paradigm.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"95 ","pages":"Article 101845"},"PeriodicalIF":4.3,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49764547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A puf-based three-party authentication key establishment scheme for fog-enabled smart home 基于puf的雾智能家居三方认证密钥建立方案
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-01 DOI: 10.1016/j.pmcj.2023.101843
Huan Yang , Yajun Guo , Yimin Guo

With the rise of Internet of Things (IoT), the smart home is another emerging concept and application of IoT, where security and private data of devices are important. In this paper, fog computing is applied to the smart home environment, where fog can provide many smart features and services to the smart home. Fog computing has many advantages, such as low latency and real-time interaction. However, when fog computing is combined with smart home, it also faces some security threats: first, some fog nodes and smart home devices are deployed in public places, vulnerable to damage or theft by attackers, not considered fully trusted, and vulnerable to device loss/theft attacks, impersonation attacks, and message tampering attacks, etc. These threats can lead to adversaries controlling devices in the smart home or modifying messages to make smart home devices execute wrong commands, causing irreparable damage; Second, the smart home system should have good real-time interaction, and the authentication process using the low latency feature of fog computing should not be involved by the cloud. Considering these, it is necessary to design a secure and effective fog-enabled smart home authentication system that is secure against various known attacks, especially when the fog node is not fully trusted or the smart home device is captured as well. Finally, the authentication scheme should also be lightweight due to the limited resources of many smart home devices. To address these issues, this paper proposes a lightweight authentication scheme for the fog-enabled smart home system. It also employs a physical unclonable function to achieve mutual authentication among three parties: smart home devices, fog nodes and users. Formal security analysis under the Real-Or-Random model shows that this scheme is provably secure. And informal security analysis shows that our scheme is robust against various known attacks. At the same time, the proposed scheme requires less computation cost (8.239 ms) and is approximately 40% to 390% faster than existing related schemes. Although the communication cost is slightly higher (4512 bits), it is reasonable because the proposed scheme implements fog/gateway node compromised attack that has not been achieved by any other existing related schemes.

随着物联网(IoT)的兴起,智能家居是物联网的另一个新兴概念和应用,其中设备的安全和私人数据非常重要。本文将雾计算应用于智能家居环境,雾计算可以为智能家居提供许多智能功能和服务。雾计算具有低延迟和实时交互等优点。然而,当雾计算与智能家居结合时,它也面临一些安全威胁:首先,一些雾节点和智能家居设备部署在公共场所,容易受到攻击者的损坏或盗窃,不被认为是完全可信的,容易受到设备丢失/盗窃攻击、冒充攻击和消息篡改攻击等。这些威胁可能导致对手控制智能家居中的设备或修改消息,使智能家居设备执行错误的命令,造成无法弥补的损害;第二,智能家居系统应该具有良好的实时交互,使用雾计算低延迟特性的认证过程不应该被云所涉及。考虑到这些,有必要设计一个安全有效的支持雾的智能家居认证系统,该系统可以安全地抵御各种已知的攻击,特别是当雾节点不完全可信或智能家居设备也被捕获时。最后,由于许多智能家居设备的资源有限,认证方案也应该是轻量级的。为了解决这些问题,本文提出了一种用于启用雾的智能家居系统的轻量级身份验证方案。它还采用了物理上不可克隆的功能,实现了智能家居设备、雾节点和用户三方之间的相互认证。在真实或随机模型下的形式安全分析表明,该方案是可证明的安全性。非正式的安全分析表明,我们的方案对各种已知的攻击都是稳健的。同时,所提出的方案需要更少的计算成本(8.239ms),并且比现有的相关方案快大约40%到390%。尽管通信成本略高(4512比特),但这是合理的,因为所提出的方案实现了任何其他现有相关方案都没有实现的雾/网关节点折衷攻击。
{"title":"A puf-based three-party authentication key establishment scheme for fog-enabled smart home","authors":"Huan Yang ,&nbsp;Yajun Guo ,&nbsp;Yimin Guo","doi":"10.1016/j.pmcj.2023.101843","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101843","url":null,"abstract":"<div><p>With the rise of Internet of Things<span><span> (IoT), the smart home is another emerging concept and application of IoT, where security and private data of devices are important. In this paper, fog computing<span><span> is applied to the smart home environment, where fog can provide many smart features and services to the smart home. Fog computing has many advantages, such as low latency and real-time interaction. However, when fog computing is combined with smart home, it also faces some security threats: first, some fog nodes and smart home devices are deployed in public places, vulnerable to damage or theft by attackers, not considered fully trusted, and vulnerable to device loss/theft attacks, impersonation attacks, and message tampering attacks, etc. These threats can lead to adversaries controlling devices in the smart home or modifying messages to make smart home devices execute wrong commands, causing irreparable damage; Second, the </span>smart home system<span> should have good real-time interaction, and the authentication process using the low latency feature of fog computing should not be involved by the cloud. Considering these, it is necessary to design a secure and effective fog-enabled smart home </span></span></span>authentication system<span><span> that is secure against various known attacks, especially when the fog node is not fully trusted or the smart home device is captured as well. Finally, the authentication scheme should also be lightweight due to the limited resources of many smart home devices. To address these issues, this paper proposes a lightweight authentication scheme for the fog-enabled smart home system. It also employs a physical unclonable function to achieve mutual authentication among three parties: smart home devices, fog nodes and users. Formal security analysis under the Real-Or-Random model shows that this scheme is </span>provably secure. And informal security analysis shows that our scheme is robust against various known attacks. At the same time, the proposed scheme requires less computation cost (8.239 ms) and is approximately 40% to 390% faster than existing related schemes. Although the communication cost is slightly higher (4512 bits), it is reasonable because the proposed scheme implements fog/gateway node compromised attack that has not been achieved by any other existing related schemes.</span></span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"95 ","pages":"Article 101843"},"PeriodicalIF":4.3,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49764543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated, ecologic assessment of frailty using a wrist-worn device 使用手腕佩戴的设备对虚弱进行自动生态评估
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-01 DOI: 10.1016/j.pmcj.2023.101833
Domenico Minici , Guglielmo Cola , Giulia Perfetti , Sofia Espinoza Tofalos , Mauro Di Bari , Marco Avvenuti

The COVID-19 pandemic has considerably shifted the focus of scientific research, speeding up the process of digitizing medical monitoring. Wearable technology is already widely used in medical research, as it has the potential to monitor the user’s physical activity in daily life. This study aims to explore in-home collected wearable-derived signals for frailty status assessment. A sample of 35 subjects aged 70+, autonomous in basic activities of daily living and cognitively intact, was collected. After being clinically assessed for frailty according to Fried’s phenotype, participants wore a wrist device equipped with inertial motion sensors for 24 h, during which they led their usual life in their homes. Signal-derived traces were split into 10-s segments and labeled classified as gaits, other motor activities, or rests. Gait and other motor activity segments were used to calculate the Subject Activity Level (SAL), an index to quantify how users were active throughout the day. The SAL index was then combined with gait-derived features to design a novel frailty status assessment algorithm. In particular, subjects were classified as robust or non-robust, a category that includes both Fried’s frail and pre-frail phenotypes. For some users, activity levels alone enabled accurate frailty assessment, whereas, for others, a Gaussian Naive Bayes classifier based on the gait-derived features was required to assess frailty status. Overall, the proposed method showed extremely promising results, allowing discrimination of robust and non-robust subjects with an overall 91% accuracy, stemming from 95% sensitivity and 88% specificity. This study demonstrates the potential of unobtrusive, wearable devices in objectively assessing frailty through unsupervised monitoring in real-world settings.

新冠肺炎疫情大大转移了科研重点,加快了医疗监测数字化进程。可穿戴技术已经广泛应用于医学研究,因为它有可能监测用户在日常生活中的身体活动。本研究旨在探索家庭收集的可穿戴设备信号用于虚弱状态评估。选取年龄70岁以上、基本日常生活活动自主、认知完整的受试者35例。在根据弗里德的表型进行临床虚弱评估后,参与者戴上配备惯性运动传感器的手腕装置24小时,在此期间,他们在家中过着正常的生活。信号衍生的轨迹被分成10-s段,并被标记为步态、其他运动活动或休息。步态和其他运动活动部分被用来计算受试者活动水平(SAL),这是一个量化用户全天活动程度的指标。然后将SAL指数与步态衍生特征相结合,设计了一种新的虚弱状态评估算法。特别是,受试者被分类为健壮或非健壮,这一类别包括弗里德的虚弱和虚弱前表型。对于一些用户,仅活动水平就可以准确地评估虚弱状态,而对于其他用户,则需要基于步态衍生特征的高斯朴素贝叶斯分类器来评估虚弱状态。总体而言,所提出的方法显示出非常有希望的结果,允许对稳健和非稳健受试者进行区分,总体准确率为91%,灵敏度为95%,特异性为88%。这项研究展示了不显眼的可穿戴设备在现实环境中通过无监督监测客观评估脆弱性方面的潜力。
{"title":"Automated, ecologic assessment of frailty using a wrist-worn device","authors":"Domenico Minici ,&nbsp;Guglielmo Cola ,&nbsp;Giulia Perfetti ,&nbsp;Sofia Espinoza Tofalos ,&nbsp;Mauro Di Bari ,&nbsp;Marco Avvenuti","doi":"10.1016/j.pmcj.2023.101833","DOIUrl":"10.1016/j.pmcj.2023.101833","url":null,"abstract":"<div><p>The COVID-19 pandemic has considerably shifted the focus of scientific research, speeding up the process of digitizing medical monitoring. Wearable technology is already widely used in medical research, as it has the potential to monitor the user’s physical activity in daily life. This study aims to explore in-home collected wearable-derived signals for frailty status assessment. A sample of 35 subjects aged 70+, autonomous in basic activities of daily living and cognitively intact, was collected. After being clinically assessed for frailty according to Fried’s phenotype, participants wore a wrist device equipped with inertial motion sensors for 24 h, during which they led their usual life in their homes. Signal-derived traces were split into 10-s segments and labeled classified as gaits, other motor activities, or rests. Gait and other motor activity segments were used to calculate the Subject Activity Level (SAL), an index to quantify how users were active throughout the day. The SAL index was then combined with gait-derived features to design a novel frailty status assessment algorithm. In particular, subjects were classified as robust or non-robust, a category that includes both Fried’s frail and pre-frail phenotypes. For some users, activity levels alone enabled accurate frailty assessment, whereas, for others, a Gaussian Naive Bayes classifier based on the gait-derived features was required to assess frailty status. Overall, the proposed method showed extremely promising results, allowing discrimination of robust and non-robust subjects with an overall 91% accuracy, stemming from 95% sensitivity and 88% specificity. This study demonstrates the potential of unobtrusive, wearable devices in objectively assessing frailty through unsupervised monitoring in real-world settings.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"95 ","pages":"Article 101833"},"PeriodicalIF":4.3,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46211532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transferrable contextual feature clusters for parking occupancy prediction 用于停车占用预测的可转移上下文特征聚类
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-09 DOI: 10.1016/j.pmcj.2023.101831
Wei Shao , Yu Zhang , Pengfei Xiao , Kyle Kai Qin , Mohammad Saiedur Rahaman , Jeffrey Chan , Bin Guo , Andy Song , Flora D. Salim

Recently, real-time parking availability prediction has attracted much attention since the rapid development of sensor technologies and urbanisation. Most existing works have applied various models to predict long and short-term parking occupancy using historical records. However, historical records are not available for many real-world scenarios, such as new urban areas, where parking lots are fast adjusted and extended. In this paper, we aim to predict parking occupancy using historical data in other areas and contextual information within the targeted area that lacks historical data. We propose a two-step framework to first learn the important contextual features from areas where parking records already existed. Then we transfer these features to the other new areas without historical data records. Through conducting a real-world dataset with various clustering methods combined with different regression models, we observe that multiple contextual features are likely to influence parking availability prediction. We find the best combination (i.e., k-shape clustering algorithm and LSTM regression model) to build parking occupancy prediction model based on the subsequent quantitative correlation analysis between contextual features and parking occupancy. The experimental results show that (1) the conventional internal clustering evaluation does not work well for spatio-temporal data clustering for the prediction purpose; (2) our proposed approach achieves approximately 3% error rate in 30 minutes of prediction, which is significantly better than the estimation of the occupancy rate using the rate in the adjacent regions (13.3%).

近年来,随着传感器技术的快速发展和城市化进程的加快,实时车位可用性预测受到了人们的广泛关注。现有的大部分工作都是利用历史记录应用各种模型来预测长期和短期的停车占用情况。然而,许多现实场景的历史记录是不可用的,比如新的城市地区,那里的停车场被快速调整和扩展。在本文中,我们的目标是利用其他区域的历史数据和目标区域内缺乏历史数据的上下文信息来预测停车占用情况。我们提出了一个两步框架,首先从已经存在停车记录的地区了解重要的背景特征。然后我们将这些特征转移到其他没有历史数据记录的新区域。通过使用多种聚类方法结合不同回归模型的真实数据集,我们观察到多种上下文特征可能会影响停车可用性预测。在后续对上下文特征与停车占用率进行定量相关性分析的基础上,找到最佳组合(即k形聚类算法与LSTM回归模型)构建停车占用率预测模型。实验结果表明:(1)传统的内部聚类评价方法不能很好地用于以预测为目的的时空数据聚类;(2)我们提出的方法在30分钟的预测错误率约为3%,明显优于使用相邻区域的入住率来估计入住率(13.3%)。
{"title":"Transferrable contextual feature clusters for parking occupancy prediction","authors":"Wei Shao ,&nbsp;Yu Zhang ,&nbsp;Pengfei Xiao ,&nbsp;Kyle Kai Qin ,&nbsp;Mohammad Saiedur Rahaman ,&nbsp;Jeffrey Chan ,&nbsp;Bin Guo ,&nbsp;Andy Song ,&nbsp;Flora D. Salim","doi":"10.1016/j.pmcj.2023.101831","DOIUrl":"10.1016/j.pmcj.2023.101831","url":null,"abstract":"<div><p>Recently, real-time parking availability prediction has attracted much attention since the rapid development of sensor technologies and urbanisation. Most existing works have applied various models to predict long and short-term parking occupancy using historical records. However, historical records are not available for many real-world scenarios, such as <em>new urban areas</em><span>, where parking lots are fast adjusted and extended. In this paper, we aim to predict parking occupancy using historical data in other areas and contextual information within the targeted area that lacks historical data. We propose a two-step framework to first learn the important contextual features from areas where parking records already existed. Then we transfer these features to the other new areas without historical data records. Through conducting a real-world dataset with various clustering methods combined with different regression models, we observe that multiple contextual features are likely to influence parking availability prediction. We find the best combination (i.e., </span><span><math><mi>k</mi></math></span><span>-shape clustering algorithm<span> and LSTM regression model) to build parking occupancy prediction model based on the subsequent quantitative correlation analysis between contextual features and parking occupancy. The experimental results show that (1) the conventional internal clustering evaluation does not work well for spatio-temporal data clustering for the prediction purpose; (2) our proposed approach achieves approximately 3% error rate in 30 minutes of prediction, which is significantly better than the estimation of the occupancy rate using the rate in the adjacent regions (13.3%).</span></span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"97 ","pages":"Article 101831"},"PeriodicalIF":4.3,"publicationDate":"2023-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46713015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and efficient blockchain-based consensus scheme for MWSNs with clustered architecture 安全高效的基于区块链的集群mwsn共识方案
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-01 DOI: 10.1016/j.pmcj.2023.101830
Weiwei Qi , Yu Xia , Pan Zhu , Shushu Zhang , Liucun Zhu , Shanjun Zhang

Blockchain has proven in sensor networks as a distributed solution for transparent and secure storage, which allows its application in mobile wireless sensor networks (MWSNs). The consensus mechanism, an essential aspect of blockchain technology, must concern the high mobility, resource-constrained nature, and weak physical defenses of sensor nodes in MWSNs. To secure MWSN data storage in clustered communication, we design a proof-of-information (PoI) variant for fair miner campaigning via the amount of valid data generated from environmental information, including a dynamic adjustment of the data volume threshold to detect malicious nodes and prevent them from misreporting information. Additionally, we introduce a filtering mechanism through the dynamic integrated trust (DIt) of nodes, which integrates the trust evaluation of peer nodes across the network combining objective performance to prevent malicious nodes from infiltrating the final consensus group. The multi-level filtering technique improves the campaign fairness while isolating malicious nodes, ensuring complexity-sensitive PBFT algorithm efficiency in large-scale networks. Simulation results show that the scheme isolates 90% of the malicious nodes and screens 20% of members to produce a smaller final consensus group. Further analysis of impacts on the performance considering network topology and mobility patterns and comparisons of the relevant solutions are presented.

区块链已在传感器网络中被证明是一种透明和安全存储的分布式解决方案,这使其能够应用于移动无线传感器网络(MWSN)。共识机制是区块链技术的一个重要方面,必须关注MWSN中传感器节点的高移动性、资源受限性和薄弱的物理防御。为了在集群通信中确保MWSN数据存储的安全,我们设计了一种信息证明(PoI)变体,用于通过环境信息生成的有效数据量进行公平矿工活动,包括动态调整数据量阈值,以检测恶意节点并防止其误报信息。此外,我们通过节点的动态集成信任(DIt)引入了一种过滤机制,该机制结合客观性能集成了对整个网络中对等节点的信任评估,以防止恶意节点渗透到最终的共识组中。多级过滤技术在隔离恶意节点的同时提高了活动的公平性,确保了大规模网络中对复杂度敏感的PBFT算法的效率。仿真结果表明,该方案隔离了90%的恶意节点,筛选了20%的成员,生成了一个较小的最终共识组。进一步分析了考虑网络拓扑和移动性模式对性能的影响,并对相关解决方案进行了比较。
{"title":"Secure and efficient blockchain-based consensus scheme for MWSNs with clustered architecture","authors":"Weiwei Qi ,&nbsp;Yu Xia ,&nbsp;Pan Zhu ,&nbsp;Shushu Zhang ,&nbsp;Liucun Zhu ,&nbsp;Shanjun Zhang","doi":"10.1016/j.pmcj.2023.101830","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101830","url":null,"abstract":"<div><p>Blockchain has proven in sensor networks as a distributed solution for transparent and secure storage, which allows its application in mobile wireless sensor networks (MWSNs). The consensus mechanism, an essential aspect of blockchain technology, must concern the high mobility, resource-constrained nature, and weak physical defenses of sensor nodes in MWSNs. To secure MWSN data storage in clustered communication, we design a proof-of-information (PoI) variant for fair miner campaigning via the amount of valid data generated from environmental information, including a dynamic adjustment of the data volume threshold to detect malicious nodes and prevent them from misreporting information. Additionally, we introduce a filtering mechanism through the dynamic integrated trust (DIt) of nodes, which integrates the trust evaluation of peer nodes across the network combining objective performance to prevent malicious nodes from infiltrating the final consensus group. The multi-level filtering technique improves the campaign fairness while isolating malicious nodes, ensuring complexity-sensitive PBFT algorithm efficiency in large-scale networks. Simulation results show that the scheme isolates 90% of the malicious nodes and screens 20% of members to produce a smaller final consensus group. Further analysis of impacts on the performance considering network topology and mobility patterns and comparisons of the relevant solutions are presented.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"94 ","pages":"Article 101830"},"PeriodicalIF":4.3,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49740772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fog-ROCL: A Fog based RSU Optimum Configuration and Localization in VANETs 雾- rocl:一种基于雾的机动机动系统优化配置与定位方法
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-01 DOI: 10.1016/j.pmcj.2023.101807
Rehab Shahin , Sherif M. Saif , Ali A. El-Moursy , Hazem M. Abbas , Salwa M. Nassar

Intelligent Transportation Systems (ITS) are one of the pillars of smart cities that enable smart traffic and smart mobility. Vehicular Ad-hoc Networks (VANETs) are utilized as platforms for ITS applications. In VANETs, vehicles collect relevant information from sensors and exchange information about road conditions and traffic status with each other and with roadside units (RSUs). Roadside units facilitate reliable communication among the vehicles and perform real-time processing for the sensed data before sending to the cloud. Although cloud computing offers high performance computational and storage resources, it does not conform to the real-time nature of the ITS applications and the massive amount of data exchange and generation rate due to its centralized nature and high communication latency. In this paper we propose a cost-effective strategy to solve the configuration and localization problem of fog-based RSU deployment in VANETs. The proposed strategy is able to assign the computational capacity of each fog node based on the amount of computational demand inside its coverage region. The problem is formulated as a Satisfiability Modulo Theories (SMT) problem. Our proposed strategy is more efficient than other strategies in terms of the total deployment cost and the overall satisfied computational demand.

智能交通系统(ITS)是实现智能交通和智能出行的智能城市的支柱之一。车载自组织网络(VANET)被用作ITS应用的平台。在VANET中,车辆从传感器收集相关信息,并相互之间以及与路侧单元(RSU)交换有关道路状况和交通状况的信息。路边单元有助于车辆之间的可靠通信,并在发送到云端之前对感测数据进行实时处理。尽管云计算提供了高性能的计算和存储资源,但由于其集中性和高通信延迟,它不符合ITS应用程序的实时性以及大量数据交换和生成速率。在本文中,我们提出了一种经济高效的策略来解决VANET中基于雾的RSU部署的配置和定位问题。所提出的策略能够基于其覆盖区域内的计算需求量来分配每个雾节点的计算能力。该问题被表述为可满足性模理论(SMT)问题。就总部署成本和总体满足的计算需求而言,我们提出的策略比其他策略更有效。
{"title":"Fog-ROCL: A Fog based RSU Optimum Configuration and Localization in VANETs","authors":"Rehab Shahin ,&nbsp;Sherif M. Saif ,&nbsp;Ali A. El-Moursy ,&nbsp;Hazem M. Abbas ,&nbsp;Salwa M. Nassar","doi":"10.1016/j.pmcj.2023.101807","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101807","url":null,"abstract":"<div><p><span>Intelligent Transportation Systems<span> (ITS) are one of the pillars of smart cities that enable smart traffic and smart mobility. Vehicular Ad-hoc Networks (VANETs) are utilized as platforms for ITS applications. In VANETs, vehicles collect relevant information from sensors and exchange information about road conditions and traffic status with each other and with roadside units (RSUs). Roadside units facilitate reliable communication among the vehicles and perform real-time processing for the sensed data before sending to the cloud. Although </span></span>cloud computing<span> offers high performance computational and storage resources, it does not conform to the real-time nature of the ITS applications and the massive amount of data exchange and generation rate due to its centralized nature and high communication latency<span>. In this paper we propose a cost-effective strategy to solve the configuration and localization problem of fog-based RSU deployment in VANETs. The proposed strategy is able to assign the computational capacity of each fog node based on the amount of computational demand inside its coverage region. The problem is formulated as a Satisfiability Modulo Theories (SMT) problem. Our proposed strategy is more efficient than other strategies in terms of the total deployment cost and the overall satisfied computational demand.</span></span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"94 ","pages":"Article 101807"},"PeriodicalIF":4.3,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49740519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FogLBS: Utilizing fog computing for providing mobile Location-Based Services to mobile customers FogLBS:利用雾计算为移动客户提供基于位置的移动服务
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-01 DOI: 10.1016/j.pmcj.2023.101832
Mariam Orabi, Zaher Al Aghbari, Ibrahim Kamel

The growth of Location-Based Services (LBSs) has been made possible by the widespread use of GPS-enabled devices. Some important LBSs require the ability to quickly process moving spatial-keyword queries over moving objects, such as when a moving customer is looking for a nearby mobile fuel delivery service. While there have been solutions proposed for scenarios where either the queries or the objects being queried are moving, there is still a need for solutions that can handle scenarios where both are in motion. This research focuses on the application of fog computing to provide real-time processing of moving spatial-keyword queries for LBSs. Specifically, the research proposes a new model, FogLBS, designed to efficiently process moving continuous top-k spatial-keyword queries over moving objects in a directed streets network, with a particular emphasis on the use case of a mobile service provider. FogLBS computes queries’ answer sets for time intervals and incrementally updates them using novel optimization techniques and indexing structures. By implementing FogLBS in a fog computing architecture, the model is able to meet the real-time requirements of the service provider application and other similar LBSs. The results of extensive experiments demonstrate the effectiveness of the proposed model in terms of efficiency, scalability, and accuracy, making it a valuable contribution to the field of fog computing in LBSs.

GPS设备的广泛使用使得基于位置的服务(LBS)的增长成为可能。一些重要的LBS需要能够快速处理移动对象上的移动空间关键字查询,例如当移动客户正在寻找附近的移动燃料配送服务时。虽然已经针对查询或被查询对象正在移动的场景提出了解决方案,但仍然需要能够处理两者都在移动的场景的解决方案。本研究的重点是应用雾计算为LBS提供移动空间关键字查询的实时处理。具体而言,该研究提出了一种新的模型FogLBS,旨在有效地处理定向街道网络中移动对象上的连续top-k空间关键字查询,并特别强调移动服务提供商的用例。FogLBS计算时间间隔的查询答案集,并使用新颖的优化技术和索引结构对其进行增量更新。通过在雾计算架构中实现FogLBS,该模型能够满足服务提供商应用程序和其他类似LBS的实时要求。大量实验的结果证明了所提出的模型在效率、可扩展性和准确性方面的有效性,使其对LBS中的雾计算领域做出了有价值的贡献。
{"title":"FogLBS: Utilizing fog computing for providing mobile Location-Based Services to mobile customers","authors":"Mariam Orabi,&nbsp;Zaher Al Aghbari,&nbsp;Ibrahim Kamel","doi":"10.1016/j.pmcj.2023.101832","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101832","url":null,"abstract":"<div><p><span>The growth of Location-Based Services (LBSs) has been made possible by the widespread use of GPS-enabled devices. Some important LBSs require the ability to quickly process moving spatial-keyword queries over moving objects, such as when a moving customer is looking for a nearby mobile fuel delivery service. While there have been solutions proposed for scenarios where either the queries or the objects being queried are moving, there is still a need for solutions that can handle scenarios where both are in motion. This research focuses on the application of fog computing to provide real-time processing of moving spatial-keyword queries for LBSs. Specifically, the research proposes a new model, FogLBS, designed to efficiently process moving continuous top-k spatial-keyword queries over moving objects in a directed streets network, with a particular emphasis on the use case of a </span>mobile service<span> provider. FogLBS computes queries’ answer sets for time intervals and incrementally updates them using novel optimization techniques and indexing structures. By implementing FogLBS in a fog computing architecture, the model is able to meet the real-time requirements of the service provider application and other similar LBSs. The results of extensive experiments demonstrate the effectiveness of the proposed model in terms of efficiency, scalability, and accuracy, making it a valuable contribution to the field of fog computing in LBSs.</span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"94 ","pages":"Article 101832"},"PeriodicalIF":4.3,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49740796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient heterogeneous signcryption scheme for internet of things 一种高效的物联网异构签名加密方案
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-01 DOI: 10.1016/j.pmcj.2023.101821
Penghui Zhou, Chunhua Jin, Zhiwei Chen, Guanhua Chen, Lanfang Wang

In today’s world, Internet of Things (IoT) has penetrated every aspect of us. The security of IoT is challenging because of the open nature of wireless communication and limited resources of sensor nodes (SNs). In this paper, we propose an efficient heterogeneous signcryption scheme from IoT to an Internet server, in which the server is in a public key infrastructure (PKI) environment, while the IoT is in a certificateless cryptosystem (CLC) environment. The proposed scheme is briefly referred to as CP-EHSC. CLC can settle the drawbacks of key escrow in identity-based cryptography (IBC) and public key certificate management in PKI. At the same time, PKI is suitable for the server since it has been widely adopted on the Internet. Our proposed scheme can provide security proof in the random oracle model (ROM). Performance analysis shows that the proposed scheme not only achieves great optimization in calculation cost and communication consumption but also makes great progress in total energy consumption. In addition, we illustrate the practical applicability of our proposed scheme by providing a realistic use case scenario.

在当今世界,物联网已经渗透到我们的方方面面。由于无线通信的开放性和传感器节点的有限资源,物联网的安全性具有挑战性。在本文中,我们提出了一种从物联网到互联网服务器的高效异构签密方案,其中服务器处于公钥基础设施(PKI)环境中,而物联网处于无证书密码系统(CLC)环境中。拟议方案简称为CP-EHSC。CLC可以解决基于身份的密码学(IBC)中的密钥托管和PKI中的公钥证书管理的缺点。同时,PKI在互联网上得到了广泛的应用,因此适用于服务器。我们提出的方案可以在随机预言机模型(ROM)中提供安全性证明。性能分析表明,该方案不仅在计算成本和通信消耗方面取得了很大的优化,而且在总能耗方面也取得了很大进展。此外,我们通过提供一个现实的用例场景来说明我们提出的方案的实际适用性。
{"title":"An efficient heterogeneous signcryption scheme for internet of things","authors":"Penghui Zhou,&nbsp;Chunhua Jin,&nbsp;Zhiwei Chen,&nbsp;Guanhua Chen,&nbsp;Lanfang Wang","doi":"10.1016/j.pmcj.2023.101821","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101821","url":null,"abstract":"<div><p><span>In today’s world, Internet of Things<span><span> (IoT) has penetrated every aspect of us. The security of IoT is challenging because of the open nature of wireless communication<span> and limited resources of sensor nodes (SNs). In this paper, we propose an efficient heterogeneous signcryption scheme from IoT to an Internet server, in which the server is in a </span></span>public key infrastructure<span> (PKI) environment, while the IoT is in a certificateless cryptosystem (CLC) environment. The proposed scheme is briefly referred to as CP-EHSC. CLC can settle the drawbacks of key escrow in identity-based cryptography (IBC) and </span></span></span>public key certificate<span><span> management in PKI. At the same time, PKI is suitable for the server since it has been widely adopted on the Internet. Our proposed scheme can provide security proof in the random oracle model (ROM). Performance analysis shows that the proposed scheme not only achieves great optimization in calculation cost and communication consumption but also makes great progress in </span>total energy consumption. In addition, we illustrate the practical applicability of our proposed scheme by providing a realistic use case scenario.</span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"94 ","pages":"Article 101821"},"PeriodicalIF":4.3,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49740771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FogLBS: Utilizing fog computing for providing mobile Location-Based Services to mobile customers FogLBS:利用雾计算为移动客户提供基于位置的移动服务
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-01 DOI: 10.1016/j.pmcj.2023.101832
Mariam Orabi, Z. Aghbari, I. Kamel
{"title":"FogLBS: Utilizing fog computing for providing mobile Location-Based Services to mobile customers","authors":"Mariam Orabi, Z. Aghbari, I. Kamel","doi":"10.1016/j.pmcj.2023.101832","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101832","url":null,"abstract":"","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"94 1","pages":"101832"},"PeriodicalIF":4.3,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54902127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and efficient blockchain-based consensus scheme for MWSNs with clustered architecture 安全高效的基于区块链的集群mwsn共识方案
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-01 DOI: 10.1016/j.pmcj.2023.101830
Weiwei Qi, Yunjun Xia, Pan Zhu, Shushu Zhang, Liucun Zhu, Shanjun Zhang
{"title":"Secure and efficient blockchain-based consensus scheme for MWSNs with clustered architecture","authors":"Weiwei Qi, Yunjun Xia, Pan Zhu, Shushu Zhang, Liucun Zhu, Shanjun Zhang","doi":"10.1016/j.pmcj.2023.101830","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101830","url":null,"abstract":"","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"94 1","pages":"101830"},"PeriodicalIF":4.3,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54902085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Pervasive and Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1