Trust Management Framework for Internet of Things

Size: px
Start display at page:

Download "Trust Management Framework for Internet of Things"

Transcription

1 2016 IEEE 30th International Conference on Advanced Information Networking and Applications Trust Management Framework for Internet of Things Yefeng Ruan, Arjan Durresi, Lina Alfantoukh Indiana University Purdue University at Indianapolis Indianapolis, IN, USA Abstract Internet of Things (IoT) can connect a large number of things (or agents) through communication networks for various types of applications. Like in many other applications, it is very important for all the agents in IoT systems to collaborate with each other following predefined protocols. In this paper, we proposed a general trust management framework aiming to help agents to evaluate their partners trustworthiness. We run a simulation for a food nutrition analysis example. It shows that by using trust, the analysis error can be reduced. Also, we illustrate two possible types of attacks, and show how to use different trust factors or environments together to alleviate the damage. I. INTRODUCTION Internet of Things (IoT) can connect a large number of things through communication networks for various types of applications. In IoT systems, things can be sensors, monitors, smart devices, laptops, or even human beings. In the following of this paper, we call things agents in general. IoT integrates physical objects with the virtual world [25]. With the rapid development of smart devices and sensing technology, IoT has a promising future and is widely used in many fields, such as supply chain, system monitoring, health care, and so on [1] [24] [19]. It can make people s life more convenient and intelligent by making use of smart devices together; however, it also faces several security challenges [15] [23]. In IoT systems, depending on applications, agents may collaborate with others to fulfill complex tasks [4]. For example, sensors collect environmental data and send them to a computational device for pre-processing. The device parses the data and filters out the noise based on the pre-defined criteria. Then the pre-processed data will be send to some more powerful devices, e.g. Cloud servers, to do data mining. The analysis results will be sent back to users through some intermediate agents, and then users adjust their behaviors based on the received feedback. Also, similar to P2P systems, agents can send requests to other agents to ask for various types of services [16] [8]. Since agents in IoT systems need to collaborate with each other, it is very important for them to find a way to evaluate their partners trustworthiness. Also, given a complex task fulfilled by a chain of agents, it is necessary for the end users to evaluate all the involved agents trustworthiness. Therefore, how to manage trust relationships becomes a challenging but very important topic for IoT systems [24] [4] [23] [16] [15]. Since trust itself is a subjective concept, it is very difficult to define it. In this paper, if the object satisfies the subject, e.g. forwarding data following defined protocol, we assume that the object is trustworthy in the subject s point of view. Otherwise, the object is untrustworthy in the subject s point of view. According to [10], we call the agents who evaluate others subject. And the agents being evaluated are called object. Environments are the platforms or factors that form trust relationships. We propose a general trust management framework for IoT systems. Instead of considering specific determining environments or factors for trust in specific applications, we propose a general framework to measure trust based on the measurement theory. Besides this, our framework is able to help the end user to evaluate the trustworthiness of the operation completed by multiple agents. To better illustrate our framework, we run a simulation for a food nutrition analysis example. To our best knowledge, it is the first work that models trust in a general way for IoT systems, and can be applied to various types of applications. The remainder of this paper is organized as following: in Section II, we introduce the background knowledge about IoT and some literature work in this field. In Section III, we illustrate our trust management framework. In Section IV, we run a simulation for a food nutrition analysis example, and illustrate two possible types of attacks. In Section VI, we conclude this paper. II. BACKGROUND AND RELATED WORKS A. Internet of Things (IoT) Internet of Things, as the term indicates, contains two terms: Internet and Things [4]. Internet mainly focuses on the communication among agents, e.g. communication protocols. Also, it considers security issues in the communication, e.g. encrypted packets. Things, on the other hand, focuses on agents functionalities and roles. For example, in order to capture temperature information, certain devices must be provided. More important, IoT systems connect physical agents including human beings with the virtual world. When integrated with Internet, agents are no longer isolated. Instead, they are connected with each others. Therefore, not only communication protocols and agents functionalities should be taken into account, the relationships among agents are also very important. We refer it as agent-to-agent relationship. In this paper, we further divide agents into two X/16 $ IEEE DOI /AINA

2 categories: human beings and devices. Accordingly, agentto-agent relationship can be divided into human-to-human, device-to-device, human-to-device and device-to-human relationships [8]. These relationships are accumalted based on previous experiences or prior knowledge. For example, human beings accumulate their impressions towards others based on previous interactions [26] [20]. Similarly, devices in IoT systems are able to communicate with each other to evaluate others trustworthiness [16]. When human beings use devices, they can also form impressions towards the devices. This can help human beings or devices to make educated decisions later. Furthermore, given open environments in IoT systems, it can help agents to avoid to collaborate with malicious agents [5]. B. Related works As we can see, trust plays an important role in many applications as well as in people s life [23]. Although IoT is relatively new, many works have been developed to exploring the usage of trust in IoT systems. [16] takes the idea of trustworthiness in social networking. It considers four relationships among agents: parent object relationship, co-location object relationship, owner object relationship and social object relationship. Among them, social object relationship is based on agents previous interactions and feedback. It assumes that an agent will rate others in a binary way after each transaction. It shows that by using trust management framework, systems can mitigate malicious attacks. Similarly, Bao and Chen proposed a framework in which trust is dynamically updated [5]. TRM-IoT is a trust management framework based on fuzzy theory [7]. Trust in TRM-IoT is based on agents packet forwarding success rate in wireless sensor networks. It also calculates reputation based on agents local trust relationships. Similarly, [13] uses fuzzy theory to model trust among agents. Trust in [13] is divided into three levels based on three corresponding layers in IoT architecture: sensor layer, core layer and application layer. [8] proposes a trust management framework for serviceoriented architecture (SOA) based IoT systems. Trust is based on agents previous interactions and experiences. It uses distributed collaborative filtering to select trust recommendations. It dynamically adjusts the protocol s parameters for different environments. Also, it considers four types of malicious attacks. [22] considers that trust is related to specific functions. Agents cannot use previous experiences related to one function to infer trust for another function. Therefore, trust is contextaware. TACIoT considers multi-dimensional trust in access control for IoT systems [6]. Although there are many works about trust in IoT systems, most of them are designed for specific applications, e.g. service provision. These applications specific frameworks have a common limitation. They cannot be applied to other applications. In other words, they are dependent on specific assumptions, such as feedback must be available, agents social roles (or ownership) are known, and so on. Instead of considering specific factors to model trust, we proposed a general trust management framework based on the measurement theory, which can be adopted by various types of applications. III. TRUST MANAGEMENT FRAMEWORK The process of trustworthiness evaluation is similar to the measurement process [26]. People get an initial impression or evaluation about a given physical quantity by measuring it using appropriate equipment. It can be further updated or improved by using more precise equipment, combining different methods, or repeating the measurement. In IoT systems, agents can evaluate others in a similar way. For example, the subject can have prior knowledge or interactions with the object, and it can be further updated. The determining factors or environments for trustworthiness evaluation are dependent on applications. Also, the availability of humanto-human, human-to-device, device-to-human and device-todevice relationships is application dependent. A. Trustworthiness and confidence In our framework, we use two metrics trustworthiness and confidence to represent trust. Trustworthiness is the comprehensive summary of the subject s multiple measurements or evaluations towards the object. This summarization is very similar to the averaging of sample measurements in statistics; however, the concrete meaning of trustworthiness depends on specific applications. For example, it could be the quality of service, packet forwarding success rate, and so on. Each measurement is a single piece of information that contributes to the trustworthiness evaluation. Trust can be established through multiple environments, such as previous interactions, reputation, and so on. Apart from this, within each environment, it can have a single measurement or multiple measurements. Besides trustworthiness, confidence measures to what extent the subject is certain about the trustworthiness evaluation [26]. As trustworthiness is evaluated based on different measurements, e.g. the number of measurements can be different, confidence also varies. Given a set of trustworthiness measurements, the subject would have a distribution of measurements in a range around the summarized average trustworthiness. In such a scenario, confidence is related to the uncertainty in the measurement theory [14]. We calculate the standard uncertainty σ from the distribution and convert it into confidence as in Equation 3. The higher the standard uncertainty is, the lower the confidence is. We use Te D (m D e,c D e ) to denote the subject s direct trust towards the object. And we use m D e to denote the trust determined by environment e, c D e to denote the confidence. We assume both m D e and c D e are real numbers in the range of [0, 1]. Higher values represent more trustworthy or confident. We use x i to denote each trustworthiness measurement, and it can be converted from raw input to a real number in the range of [0, 1]. For each environment e, m D e, standard uncertainty σe D and c D e can be calculated in Equations 1, 2 and 3 accordingly. 1014

3 i=n m D i=1 E = x i N i=n σe D i=1 = (x i m D E )2 N (N 1) (1) (2) c D E =1 2 σ D E (3) As we indicated, trust can be build through several environments or factors [24] [5] [19]. Therefore, it is necessary to combine them together to determine trust. As each environment may play different roles, we use weighted mean to combine them. For a general purpose, we denote weights as w k. The overall trust To D (m D o,c D o ) can be calculated in Equations 4 and 5. Note that, the confidence is calculated following the error propagation theory. k=k m D k=1 o = w k m D k k=k k=1 w (4) k k=k c D o =1 2 k=1 (w k σk D)2 ( k=k k=1 w (5) k) 2 B. Trust Modeling Framework In IoT systems, i.e. social IoT, agents can be connected through multiple environments. For example, agents can be friends with each other in online social networks. Also, they may interact with each other in their working environment. We illustrate the trust modeling scenario in Figure 1. Environments can be some application layer platforms, such as social medias. Note that, as shown in Figure 1b, it is possible that an environment can be composed of a chain of subenvironments, i.e. physical links. Therefore, in general, it can be illustrated as in Figure 1c. The subject and environments which are inside the dash line rectangle in Figure 1c can be treated as a basic unit in trust network, as the subject must connect with the object through environments. We use T e to denote the subject s trust towards the environments, as not all the environments are equally trustworthy and important to the subject. Finally, the subject s overall trust T o can be determined as T o = f(t e1,t 1,..., T ek,t k ). f can be any general functions. In the following of this paper, we use weighted mean as indicated in Equations 4 and 5. C. Human-to-human trust relationship Human beings play an important role in IoT systems. They are connected through Internet, such as online social networks [26] [20] [21]. Therefore social networks, such as Twitter [12], can be integrated into IoT systems [18]. In the following, we list some possible environments that can be taken into account in determining human-to-human trust relationship. Friendship. Friendship is among one of the most widely used social relationships. In many online social networks, such as Twitter and Facebook, users are friends and commnucate with each other. Also, friendship is a straightforward measurement to measure trustworthiness in IoT systems [8]. Social interactions. Like in real life, human-to-human trust relationship can be accumulated by their social interactions. For example, in Twitter, users post interactive Tweets, e.g. reply, forward, retweet, towards specific users [20]. Each interaction can be treated as a measurement of trustworthiness. Reviews. In many online communities, users are able to write reviews towards other users. For example, in Epinions.com, users can express either like or dislike towards others. Besides this, they can rate others articles from un-helpful to very helpful. Those proposition and rating information can be used to model human-to-human trust relationship as well [26]. Common interest. Human beings having similar interests may also trust each other. Common interest is used to measure trustworthiness in [8] and [27]. D. Device-to-device trust relationship As indicated by [3], devices in IoT systems can have social relationships among them. Also, devices need to collaborate with other devices to accomplish complex tasks. Therefore, they can evaluate their partners through collaboration. We list some environments that may be considered in device-to-device trust relationship in the following. Behavior evidence. In IoT systems, devices are mainly designed to fulfill specific functionalities. For example, routers are designed to forward packages following predefined protocols. In other words, the subject device expects the object device to act in a certain way; however, it is possible that the object device fail to act as the subject device expected due to various reasons. Therefore, the subject can develop trust towards the object based on the satisfied evidence (positive evidence) and unsatisfied evidence (negative evidence). Data similarity. Data similarity can be used to evaluate data trustworthiness [9]. Similarly, it can be used in IoT systems to evaluate devices trustworthiness. Given a event, two devices data regarding this event may be different. For example, several sensors are used to measure the temperature in the same room; however, their measured temperature may be different. In such a case, if two devices have very closed results, we say they are trustworthy to each other regarding measuring temperature. Such type of trustworthiness is mainly used in the field of data process. Profile information. Like human beings, devices also can have profiles, including devices basic information, such as their manufacturers, owners, and working conditions. As pointed out by [3], devices owned by the same owner are considered more trustworthy than those belonging to other owners. 1015

4 (a) A trust modeling scheme including environments (b) An environment including multiple subenvironments Fig. 1. Trust modeling scheme (c) A general trust modeling scheme E. Human-to-device trust relationship Human-to-human and device-to-device trust relationships are two separated layers. Human-to-device trust relationship connects them, and also makes IoT systems integrating physical world with virtual world. Ownership. It is straightforward that ownership is an important component to connect human beings and devices. In IoT systems, devices have their owners, and in most cases, the owner trust their owned devices more than others. Observation. Human beings are able to evaluate devices performances. Note that, in some cases, both the owner and other users can observe the device s performance. Therefore, these observations can be treated as satisfied evidence or unsatisfied evidence. Capacity and feature. Human-to-device trust relationship can be affected by devices capacities and features. For example, in some cases, devices with long battery life are preferred. Also, devices prior knowledge, such as reputation, is a vital factor. For example, if the user knows the device s manufacturer, it may help her/him to form an initial impression towards the device. F. Device-to-human trust relationship As long as there exist interactions between devices and human beings, devices are also able to evaluate human beings performance. Similar to human-to-device trust relationship, devices can evaluate human beings performance as satisfied or unsatisfied evidence. Note that, we only list few possible (sub)environments or factors here. They are dependent on applications, e.g. the meaning of trust. Also, it has the limitation on their availability. Only if they are available in the application, they can be used to measure trust relationships. On the other hand, not necessarily all these factors are available and have to been considered in all the applications. IV. EXPERIMENTAL SIMULATION In this section, we use an example to illustrate the usage of our trust management framework in IoT systems. IoT systems are now widely used in chronic diseases therapy management, such as diabetes treatment [11]. For example, sensors are distributed along with patients to monitor their blood sugar levels and intake food. In Type 1 diabetes therapy, patients insulin dose is partially determined by their food intake [2]. Therefore, it is very important for doctors and patients themselves to know the meals carbohydrate content. Thanks to the wide deployment of smartphones, it is now very easy and convenient for patients to take photos for their meals. As indicated by Platemate [17], nutrition analysis can be done through three steps: tag, identify and measure. In the first step, food items are separated from each other based on the boundary. Then each food item is identified by category and name. In the measurement step, food items are estimate by size or count and calculated for nutrition using existing databases. The nutrition analysis is implement by human beings in Platemate through Amazon Mechanical Turk [17]. In our simulation, we assume that both human beings and devices are able to implement these three tasks. We show this scenario in Figure 2. Fig. 2. Flow of food image estimation We use Pa = {Pa 1,Pa 2,..., P a n } to denote the set of patients. Accordingly, A = {A 1,A 2,..., A k }, I = {I 1,I 2,..., I k } and M = {M 1,M 2,..., M k } represent tagers, identifiers and measurers. A. Trust relationship Human-to-human trust. As indicated in Section III-C, human-to-human trust can be determined by several subenvironments. We assume that people rate others based on their performance. Besides this, we assume people also have social interactions in social medias, e.g. Twitter. Their social interactions can be evaluated by sentiment analysis, which includes negative, positive and/or neutral [21]. Each interaction can be considered as a measurement of trust. Therefore, in this simulation we consider two environments: review ratings and social interactions. For simplicity, we assume that both of them are expressed in the range of [0, 1]. 0 represents distrust, while 1 represents trust. We use weighted mean to combine these two environments as in Equations 4 and 5. Device-to-device trust, human-to-device trust, device-tohuman trust. We only consider the quality of estimations 1016

5 for other three types of trust relationships. In other words, they only have one subenvironment. The value of each trust measurement is in the range of [0, 1] as well. B. Experimental setup In this simulation, we assume that there are 100 patients who are looking for nutrition analysis service. On the other hand, these patients themselves can act as tagers, identifiers and measurers. In addition to that, we assume that there are 100 devices that can act as tagers, identifiers and measurers correspondingly. To simulate the real scenario, we assume patients are from two groups and the types of their food are different, e.g. American food and Asian food. It is reasonable that patients are able to estimate their own food type better than another type. Therefore, for patients who belong to the same group, we assign higher review ratings (follow normal distribution) than patients from another group. In our following simulation, we assume devices are used to analyze group 1 s food. So, devices have high ratings for patients from group 1, and patients from group 1 have high ratings for devices. For the number of estimation ratings and/or social interactions between two agents, we assume that it follows uniform distribution. For each agent, we assume the number of its neighbors follows power-law distribution. More details about these parameters can be found in Table IV-B. TABLE I EXPERIMENTAL SIMULATION PARAMETERS P a, A, I, M 100 Number of neighbors P (4, 20), s = 1.2 Number of ratings or interactions between agents U(1, 50) Ratings in the same group N(0.8, ) Ratings in the different groups N(0.2, ) Ratings among devices N(0.8, ) Ratings between group 1 and devices N(0.8, ) Ratings between group 2 and devices N(0.2, ) Ratings between devices and group 1 N(0.8, ) Ratings between devices and group 2 N(0.2, ) C. Experimental results As two groups of patients are not good at estimating another group s food, we assume the estimation errors of patients from different groups are higher than patients within the same group. To simulate this, we assume the estimation error produced by patients within the same group is equal to 0.1, e psame = 0.1, while e pdiff = 0.8 for patients from two different groups. Similarly, for devices, we assume their error e d1 =0.1for other devices and patients from group 1. Patients from group 2 get error e d2 =0.8 from all the devices. As the nutrition analysis consists of three process, we calculate error step by step. For example, tagers get intermediate results from identifiers, and identifiers get results from measurers. For each agent in a specific step, the incoming error (error produced by the next step) is calculated as in Equation 6. Here I is set of incoming neighbors. Note that, we use weighted mean to combine incoming information, where weights are the product of m and c. Besides the incoming error, the agent itself also introduce an error e i. Therefore, the total error until this agent is updated as e i = e i + e in. i I e in = m i c i e i i I m (6) i c i We update error for each agent step by step. We begin from measuring step to identifying step, and then from identifying step to taging step. Finally, patients get the results from tagers. In the following of this paper, we only consider the error received by patients from group 1. In the above, we have illustrated that human-to-human trust has two environments review ratings and social interactions. In section IV-B, we only illustrate review ratings distribution. For social interactions, we consider two scenarios: 1) human beings social interactions have no group knowledge and follows the same distribution for two groups; 2). human beings social interactions have group knowledge such that they follow different distributions for different groups. In the first scenario, we assume that social interactions among human beings, regardless of which group they are from, follow the same normal distribution N(0.5, ). It means that all the social interactions are randomly distributed around the neutral trustworthiness. In the second scenario, we assume that human beings social interactions follow the normal distribution N(0.8, ) if they are from the same group. While two human beings are from different groups, their social interactions follow the normal distribution N(0.2, ). In other words, social interactions also capture the group difference. As we use weighted mean to combine review ratings and social interactions for human-to-human trust relationship, we run simulations (repeat 10 times) that use different weights (w r and w s ) for them. Higher is the weight, more important is the corresponding environment. The results are shown in Figures 3 and 4 for two scenarios separately. Compared with the cases using trust as in Equation 6, we also run simulation without using trust. In such a case, instead of using the product of m and c as weight, we calculate the incoming error just using the mean. From Figures 3 and 4, we can see that overall by using trust, patients in group 1 receive less error than without using trust. Therefore, it is necessary and helpful to incorporate trust in such IoT systems. Note that, as the minimum error for each step is 0.1, the minimum overall error for the whole process is 0.3. Furthermore, among 100 patients, we increase the number of group 2 patients from 0 to 50 (which is half of the total patients). We can see that, by increasing the number of group 2 patients, group 1 patients received error also increase. This is because group 2 patients produce higher error than group 1 patients; However, by using different weights for social interactions and review ratings, we get different results. In the 1017

6 Patinets (in Group 1) received error Patinets (in Group 1) received error Mean without using trust wr=0.0,ws=1.0 wr=0.2,ws=0.8 wr=0.4,ws=0.6 wr=0.6,ws=0.4 wr=0.8,ws=0.2 wr=1.0,ws= Number of patients from Group Fig. 3. Social interactions have no group knowledge Mean without using trust wr=0.0,ws=1.0 wr=0.2,ws=0.8 wr=0.4,ws=0.6 wr=0.6,ws=0.4 wr=0.8,ws=0.2 wr=1.0,ws= Number of patients from Group 2 Fig. 4. Social interactions have group knowledge first scenario, only review ratings reflect the group difference. Therefore, more weight on review ratings can help to reduce the received error. While in the second scenarios, both review ratings and social interactions capture the group difference. From Figure 4, we can see that different weights (w r from 0.2 to 0.8) have very similar performance; However, we also see that by only using either social interactions or review ratings (the lowermost two lines), it can achieve better results. From our simulations, we can see that how to select weights for different environments are important. In our cases, assigning more weights on review ratings achieve better performance; However, in other cases or applications, it is possible that weights between 0 and 1 can achieve the best performance. Therefore, weights selection is application dependent. D. Attacks simulation In this section, we first introduce another type of trust global trust or reputation. In the above, we have already seen that each agent has a set of neighbors. It is possible to combine all these neighbors opinions, and form a global opinion as the whole community towards that agent. We call it global trust, while some other works may refer it as reputation. Correspondingly, trust mentioned in the above sections can be referred as local trust. Suppose that agent A has a set of neighbors N, who hold trust evaluations towards A. Then we calculate A s global trust as in Equations 7 and 8. m g is the weighted mean of all the neighbors opinions, where weights are 1. It means that more confident opinions have higher σi 2 weights than less confident opinions. m g = i N 1 σi 2 i N 1 σi 2 c g =1 2 m i 1 i N σ2 i Global trust can be even seen as an environment for determining local trust, where weighted mean can be used as before. In other words, when an agent evaluate other agents trust, it also takes their global trust into account. By incorporating trust into IoT systems, one of the main purpose is to help systems to detect or mitigate attacks. Here, we simulate two types of attacks. In the first case, we assume attackers do not care about their global trust, they only concern the victims that they have connections. Therefore, attackers global trust is very low; However, their local trust is high in the victims point of view because of their previous camouflaged good behaviors. In the second case, we assume that attackers know the importance of their global trust such that they have a set of colluders who increase attackers global trust; However, attackers do not pay attention to specific victims. Therefore, their local trust is low in victims point of view. Here we simulate the scenario where there exist 20 victims and 10 attackers. Victims are connected with both attackers and other normal agents, the number of their neighbors follows the power-law distribution as before. To simulate high and low global trust for attackers, we assume that there are different number of colluders in two cases. In the first case (low global trust and high local trust), we assume there is no colluders. And for high local trust from victims points of view, we assume both victims review ratings and social interactions follow normal distribution N(0.8, ). In the second case (high global trust and low local trust), we assume there are 90 colluders, and both victims review ratings and social interactions follow normal distribution N(0.2, ) for low local trust. Note that those colluders only connect with the attackers, but not connect to any victims or other normal agents. To combine social interactions and review ratings, we use the weights w r = w s =0.5. We run the simulation for different weighs on local (w l ) and global trust (w g ) in Figure 5. We can see that weights play opposite roles in two types of attacks. In the first case, more weights on global trust is preferred as global trust reflects attackers real malicious behaviors and can help to mitigate their effect. While in the second case, local trust is more important. Also, we compare the results with the case which does not use trust. From Figure 5, we can see that knowing attackers behavior patterns is very important. Facing two different types of attacks, weights have opposite performance. Therefore, corresponding weights on different environments following the attackers behavior pattern can be used to mitigate attacks. This will be part of our future work. (7) (8) 1018

7 Victims received error Mean without using trust Type1: attackers have low global trust, high local trust Type2: attackers have high global trust, low local trust Weights on the global trust Fig. 5. Weights for attacks simulation V. ACKNOWLEDGMENTS This work was partially supported by National Science Foundation under Grant No VI. CONCLUSIONS In this paper, we propose a general trust management framework for IoT systems. we use two metrics to measure trust: trustworthiness (m) and confidence (c). Our framework is based on measurement theory, which consider agents trust evaluations or interactions as measurements. Moreover, we consider that agents can evaluate each other through different environments. We also list several possible environments and factors that may determine trust relationships in IoT systems. Our trust management framework is general such that it can be deployed in many IoT systems. To better illustrate it, we run a food nutrition analysis in diabetes treatment as an example to show the benefit of our trust management framework. The results show that by using trust, it can help patients to filter out inaccurate information or mitigate its effect. Also, we illustrate two possible types of attacks. By showing these two types of attacks, we can see that selecting and weighting environments is very important for IoT systems. REFERENCES [1] Sarita Agrawal and Manik Lal Das. Internet of thingsa paradigm shift of future internet applications. In Engineering (NUiCONE), 2011 Nirma University International Conference on, pages 1 7. IEEE, [2] Marios M Anthimopoulos, Lauro Gianola, Luca Scarnato, Peter Diem, and Stavroula G Mougiakakou. A food recognition system for diabetic patients based on an optimized bag-of-features model. Biomedical and Health Informatics, IEEE Journal of, 18(4): , [3] L. Atzori, A. Iera, and G. Morabito. Siot: Giving a social structure to the internet of things. Communications Letters, IEEE, 15(11): , November [4] Luigi Atzori, Antonio Iera, and Giacomo Morabito. The internet of things: A survey. Computer networks, 54(15): , [5] Fenye Bao and Ing-Ray Chen. Dynamic trust management for internet of things applications. In Proceedings of the 2012 international workshop on Self-aware internet of things, pages 1 6. ACM, [6] Jorge Bernal Bernabe, Jose Luis Hernandez Ramos, and Antonio F Skarmeta Gomez. Taciot: multidimensional trust-aware access control system for the internet of things. Soft Computing, pages 1 17, [7] Dong Chen, Guiran Chang, Dawei Sun, Jiajia Li, Jie Jia, and Xingwei Wang. Trm-iot: A trust management model based on fuzzy reputation for internet of things. Computer Science and Information Systems, 8(4): , [8] I.-R. Chen, J. Guo, and F. Bao. Trust management for soa-based iot and its application to service composition. Services Computing, IEEE Transactions on, PP(99):1 1, [9] Chenyun Dai, Dan Lin, Elisa Bertino, and Murat Kantarcioglu. An approach to evaluate data trustworthiness based on data provenance. In Secure Data Management, pages Springer, [10] V Hu, D Ferraiolo, R Kuhn, A Schnitzer, K Sandlin, R Miller, and K Scarfone. Attribute based access control definition and consideration. NIST Special Publication, pages [11] Antonio J Jara, Miguel A Zamora, and Antonio F Skarmeta. An internet of things based personal device for diabetes therapy management in ambient assisted living (aal). Personal and Ubiquitous Computing, 15(4): , [12] Matthias Kranz, Luis Roalter, and Florian Michahelles. Things that twitter: social networks and the internet of things. In What can the Internet of Things do for the Citizen (CIoT) Workshop at The Eighth International Conference on Pervasive Computing (Pervasive 2010), pages 1 10, [13] Gu Lize, Wang Jingpei, and Sun Bin. Trust management mechanism for internet of things. Communications, China, 11(2): , Feb [14] Douglas C Montgomery and George C Runger. Applied statistics and probability for engineers. John Wiley & Sons, [15] Huansheng Ning, Hong Liu, and Laurence T Yang. Cyberentity security in the internet of things. Computer, (4):46 53, [16] Michele Nitti, Roberto Girau, Luigi Atzori, Antonio Iera, and Giacomo Morabito. A subjective model for trustworthiness evaluation in the social internet of things. In Personal Indoor and Mobile Radio Communications (PIMRC), 2012 IEEE 23rd International Symposium on, pages IEEE, [17] Jon Noronha, Eric Hysen, Haoqi Zhang, and Krzysztof Z Gajos. Platemate: crowdsourcing nutritional analysis from food photographs. In Proceedings of the 24th annual ACM symposium on User interface software and technology, pages ACM, [18] A.M. Ortiz, D. Hussein, Soochang Park, S.N. Han, and N. Crespi. The cluster between internet of things and social networks: Review and research challenges. Internet of Things Journal, IEEE, 1(3): , June [19] Charith Perera, Chi Harold Liu, and Srimal Jayawardena. The emerging internet of things marketplace from an industrial perspective: a survey. IEEE Transactions on Emerging Topics in Computing, [20] Yefeng Ruan, L. Alfantoukh, and A. Durresi. Exploring stock market using twitter trust network. In Advanced Information Networking and Applications (AINA), 2015 IEEE 29th International Conference on, pages , March [21] Yefeng Ruan, L. Alfantoukh, A. Fang, and A. Durresi. Exploring trust propagation behaviors in online communities. In Network-Based Information Systems (NBiS), th International Conference on, pages , Sept [22] Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, and Maryline Laurent. Trust management system design for the internet of things: a context-aware and multi-service approach. Computers & Security, 39: , [23] S Sicari, A Rizzardi, LA Grieco, and A Coen-Porisini. Security, privacy and trust in internet of things: The road ahead. Computer Networks, 76: , [24] Zheng Yan, Peng Zhang, and Athanasios V Vasilakos. A survey on trust management for internet of things. Journal of network and computer applications, 42: , [25] Lina Yao, Quan Z Sheng, Anne HH Ngu, Helen Ashman, and Xue Li. Exploring recommendations in internet of things. In Proceedings of the 37th international ACM SIGIR conference on Research & development in information retrieval, pages ACM, [26] Ping Zhang and Arjan Durresi. Trust management framework for social networks. In Communications (ICC), 2012 IEEE International Conference on, pages IEEE, [27] Cai-Nicolas Ziegler and Jennifer Golbeck. Investigating interactions of trust and interest similarity. Decision support systems, 43(2): ,

UNIVERSITY OF CAGLIARI

UNIVERSITY OF CAGLIARI UNIVERSITY OF CAGLIARI DIEE - Department of Electrical and Electronic Engineering Can the Wearable be Social? Michele Nitti michele.nitti@diee.unica.it At MCLab http://mclab.diee.unica.it/ 1 Outline How

More information

A Profile-based Trust Management Scheme for Ubiquitous Healthcare Environment

A Profile-based Trust Management Scheme for Ubiquitous Healthcare Environment A -based Management Scheme for Ubiquitous Healthcare Environment Georgia Athanasiou, Georgios Mantas, Member, IEEE, Maria-Anna Fengou, Dimitrios Lymberopoulos, Member, IEEE Abstract Ubiquitous Healthcare

More information

THINK SMART, THINK SOCIAL! THE ROAD MAP FROM SMARTER OBJECTS TO SOCIAL OBJECTS IN SOCIAL INTERNET OF THINGS - A SURVEY

THINK SMART, THINK SOCIAL! THE ROAD MAP FROM SMARTER OBJECTS TO SOCIAL OBJECTS IN SOCIAL INTERNET OF THINGS - A SURVEY Review Paper Paper number: 15(2017)2, 423, 149-154 doi:10.5937/jaes15-12161 THINK SMART, THINK SOCIAL! THE ROAD MAP FROM SMARTER OBJECTS TO SOCIAL OBJECTS IN SOCIAL INTERNET OF THINGS - A SURVEY A.Meena

More information

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Yandong Zheng 1, Hua Guo 1 1 State Key Laboratory of Software Development Environment, Beihang University Beiing

More information

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University

More information

SPTF: Smart Photo-Tagging Framework on Smart Phones

SPTF: Smart Photo-Tagging Framework on Smart Phones , pp.123-132 http://dx.doi.org/10.14257/ijmue.2014.9.9.14 SPTF: Smart Photo-Tagging Framework on Smart Phones Hao Xu 1 and Hong-Ning Dai 2* and Walter Hon-Wai Lau 2 1 School of Computer Science and Engineering,

More information

Towards Location and Trajectory Privacy Protection in Participatory Sensing

Towards Location and Trajectory Privacy Protection in Participatory Sensing Towards Location and Trajectory Privacy Protection in Participatory Sensing Sheng Gao 1, Jianfeng Ma 1, Weisong Shi 2 and Guoxing Zhan 2 1 Xidian University, Xi an, Shaanxi 710071, China 2 Wayne State

More information

Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication

Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication Ahmet Onur Durahim, İsmail Fatih Yıldırım, Erkay Savaş and Albert Levi durahim, ismailfatih, erkays, levi@sabanciuniv.edu

More information

Global Journal on Technology

Global Journal on Technology Global Journal on Technology Vol 5 (2014) 73-77 Selected Paper of 4 th World Conference on Information Technology (WCIT-2013) Issues in Internet of Things for Wellness Human-care System Jae Sung Choi*,

More information

A User Interface Level Context Model for Ambient Assisted Living

A User Interface Level Context Model for Ambient Assisted Living not for distribution, only for internal use A User Interface Level Context Model for Ambient Assisted Living Manfred Wojciechowski 1, Jinhua Xiong 2 1 Fraunhofer Institute for Software- und Systems Engineering,

More information

Internet of Things Paradigms as Enablers of Ambient Assisted Living Systems

Internet of Things Paradigms as Enablers of Ambient Assisted Living Systems International Journal of Automation, Control and Intelligent Systems Vol. 4, No. 4, 2018, pp. 27-32 http://www.aiscience.org/journal/ijacis ISSN: 2381-7526 (Print); ISSN: 2381-7534 (Online) Internet of

More information

Mobile Crowdsensing enabled IoT frameworks: harnessing the power and wisdom of the crowd

Mobile Crowdsensing enabled IoT frameworks: harnessing the power and wisdom of the crowd Mobile Crowdsensing enabled IoT frameworks: harnessing the power and wisdom of the crowd Malamati Louta Konstantina Banti University of Western Macedonia OUTLINE Internet of Things Mobile Crowd Sensing

More information

Research on Framework of Knowledge-Oriented Innovation. Risk Management System

Research on Framework of Knowledge-Oriented Innovation. Risk Management System Original Paper Modern Management Science & Engineering ISSN 2052-2576 Vol. 1, No. 2, 2013 www.scholink.org/ojs/index.php/mmse Research on Framework of Knowledge-Oriented Innovation Risk Management System

More information

Location Discovery in Sensor Network

Location Discovery in Sensor Network Location Discovery in Sensor Network Pin Nie Telecommunications Software and Multimedia Laboratory Helsinki University of Technology niepin@cc.hut.fi Abstract One established trend in electronics is micromation.

More information

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network K.T. Sze, K.M. Ho, and K.T. Lo Abstract in this paper, we study the performance of a video-on-demand (VoD) system in wireless

More information

ACADEMIC YEAR

ACADEMIC YEAR INTERNATIONAL JOURNAL SL.NO. NAME OF THE FACULTY TITLE OF THE PAPER JOURNAL DETAILS 1 Dr.K.Komathy 2 Dr.K.Komathy 3 Dr.K. Komathy 4 Dr.G.S.Anandha Mala 5 Dr.G.S.Anandha Mala 6 Dr.G.S.Anandha Mala 7 Dr.G.S.Anandha

More information

Wi-Fi Fingerprinting through Active Learning using Smartphones

Wi-Fi Fingerprinting through Active Learning using Smartphones Wi-Fi Fingerprinting through Active Learning using Smartphones Le T. Nguyen Carnegie Mellon University Moffet Field, CA, USA le.nguyen@sv.cmu.edu Joy Zhang Carnegie Mellon University Moffet Field, CA,

More information

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.955

More information

Secure and Intelligent Mobile Crowd Sensing

Secure and Intelligent Mobile Crowd Sensing Secure and Intelligent Mobile Crowd Sensing Chi (Harold) Liu Professor and Vice Dean School of Computer Science Beijing Institute of Technology, China June 19, 2018 Marist College Agenda Introduction QoI

More information

Extending lifetime of sensor surveillance systems in data fusion model

Extending lifetime of sensor surveillance systems in data fusion model IEEE WCNC 2011 - Network Exting lifetime of sensor surveillance systems in data fusion model Xiang Cao Xiaohua Jia Guihai Chen State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing,

More information

The Road Map Form Wireless Sensor Networks to Internet of Things to the Social Internet of Things

The Road Map Form Wireless Sensor Networks to Internet of Things to the Social Internet of Things European Journal of Applied Sciences 9 (4): 170-177, 2017 ISSN 2079-2077 IDOSI Publications, 2017 DOI: 10.5829/idosi.ejas.2017.170.177 The Road Map Form Wireless Sensor Networks to Internet of Things to

More information

Coalface WSN Sub-area Model and Network Deployment Strategy

Coalface WSN Sub-area Model and Network Deployment Strategy 2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Coalface WSN Sub-area Model and Network Deployment Strategy Peng Zhang 1,

More information

The User Activity Reasoning Model Based on Context-Awareness in a Virtual Living Space

The User Activity Reasoning Model Based on Context-Awareness in a Virtual Living Space , pp.62-67 http://dx.doi.org/10.14257/astl.2015.86.13 The User Activity Reasoning Model Based on Context-Awareness in a Virtual Living Space Bokyoung Park, HyeonGyu Min, Green Bang and Ilju Ko Department

More information

This list supersedes the one published in the November 2002 issue of CR.

This list supersedes the one published in the November 2002 issue of CR. PERIODICALS RECEIVED This is the current list of periodicals received for review in Reviews. International standard serial numbers (ISSNs) are provided to facilitate obtaining copies of articles or subscriptions.

More information

SMARTSAN: A P2P Social Agent Network for Generating Recommendations in a Smart City Environment

SMARTSAN: A P2P Social Agent Network for Generating Recommendations in a Smart City Environment 108 1 SMARTSAN: A P2P Social Agent Network for Generating Recommendations in a Smart City Environment Antonello Comi DIIES, University Mediterranea of Reggio Calabria, Via Graziella, Località Feo di Vito,

More information

Research on Fuzzy Neural Network Assisted Train Positioning Based on GSM-R

Research on Fuzzy Neural Network Assisted Train Positioning Based on GSM-R Acta Technica 62 (2017), No. 6A, 313 320 c 2017 Institute of Thermomechanics CAS, v.v.i. Research on Fuzzy Neural Network Assisted Train Positioning Based on GSM-R Xiuhui Diao 1, Pengfei Wang 2, Weidong

More information

Constructing the Ubiquitous Intelligence Model based on Frame and High-Level Petri Nets for Elder Healthcare

Constructing the Ubiquitous Intelligence Model based on Frame and High-Level Petri Nets for Elder Healthcare Constructing the Ubiquitous Intelligence Model based on Frame and High-Level Petri Nets for Elder Healthcare Jui-Feng Weng, *Shian-Shyong Tseng and Nam-Kek Si Abstract--In general, the design of ubiquitous

More information

Computer Control System Application for Electrical Engineering and Electrical Automation

Computer Control System Application for Electrical Engineering and Electrical Automation IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Computer Control System Application for Electrical Engineering and Electrical Automation To cite this article: Weigang Liu 2018

More information

Design and Implementation of Privacy-preserving Recommendation System Based on MASK

Design and Implementation of Privacy-preserving Recommendation System Based on MASK JOURNAL OF SOFTWARE, VOL. 9, NO. 10, OCTOBER 2014 2607 Design and Implementation of Privacy-preserving Recommendation System Based on MASK Yonghong Xie, Aziguli Wulamu and Xiaojing Hu School of Computer

More information

PERFORMANCE OF POWER DECENTRALIZED DETECTION IN WIRELESS SENSOR SYSTEM WITH DS-CDMA

PERFORMANCE OF POWER DECENTRALIZED DETECTION IN WIRELESS SENSOR SYSTEM WITH DS-CDMA PERFORMANCE OF POWER DECENTRALIZED DETECTION IN WIRELESS SENSOR SYSTEM WITH DS-CDMA Ali M. Fadhil 1, Haider M. AlSabbagh 2, and Turki Y. Abdallah 1 1 Department of Computer Engineering, College of Engineering,

More information

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE. Title Coding aware routing in wireless networks with bandwidth guarantees Author(s) Hou, R; Lui, KS; Li, J Citation The IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, Hungary, 15-18

More information

Ubiquitous Home Simulation Using Augmented Reality

Ubiquitous Home Simulation Using Augmented Reality Proceedings of the 2007 WSEAS International Conference on Computer Engineering and Applications, Gold Coast, Australia, January 17-19, 2007 112 Ubiquitous Home Simulation Using Augmented Reality JAE YEOL

More information

Localization of tagged inhabitants in smart environments

Localization of tagged inhabitants in smart environments Localization of tagged inhabitants in smart environments M. Javad Akhlaghinia, Student Member, IEEE, Ahmad Lotfi, Senior Member, IEEE, and Caroline Langensiepen School of Science and Technology Nottingham

More information

Object Circles: Modelling physical objects as social relationships

Object Circles: Modelling physical objects as social relationships Business Process & Application Object Circles: Modelling physical objects as social relationships Florian Michahelles, Philipp Probst. Auto-ID Labs White Paper WP-BIZAPP-061 December 2012 Dr. Florian Michahelles

More information

A Social Network Specialized for the Elderly Meets the Social Internet of Things

A Social Network Specialized for the Elderly Meets the Social Internet of Things A Social Network Specialized for the Elderly Meets the Social Internet of Things Vittorio Miori Institute of Science and Technologies of Information (ISTI) National Research Council of Italy (CNR) Pisa,

More information

Evolving High-Dimensional, Adaptive Camera-Based Speed Sensors

Evolving High-Dimensional, Adaptive Camera-Based Speed Sensors In: M.H. Hamza (ed.), Proceedings of the 21st IASTED Conference on Applied Informatics, pp. 1278-128. Held February, 1-1, 2, Insbruck, Austria Evolving High-Dimensional, Adaptive Camera-Based Speed Sensors

More information

中国科技论文在线. An Efficient Method of License Plate Location in Natural-scene Image. Haiqi Huang 1, Ming Gu 2,Hongyang Chao 2

中国科技论文在线. An Efficient Method of License Plate Location in Natural-scene Image.   Haiqi Huang 1, Ming Gu 2,Hongyang Chao 2 Fifth International Conference on Fuzzy Systems and Knowledge Discovery n Efficient ethod of License Plate Location in Natural-scene Image Haiqi Huang 1, ing Gu 2,Hongyang Chao 2 1 Department of Computer

More information

Latest trends in sentiment analysis - A survey

Latest trends in sentiment analysis - A survey Latest trends in sentiment analysis - A survey Anju Rose G Punneliparambil PG Scholar Department of Computer Science & Engineering Govt. Engineering College, Thrissur, India anjurose.ar@gmail.com Abstract

More information

I. INTRODUCTION II. LITERATURE SURVEY. International Journal of Advanced Networking & Applications (IJANA) ISSN:

I. INTRODUCTION II. LITERATURE SURVEY. International Journal of Advanced Networking & Applications (IJANA) ISSN: A Friend Recommendation System based on Similarity Metric and Social Graphs Rashmi. J, Dr. Asha. T Department of Computer Science Bangalore Institute of Technology, Bangalore, Karnataka, India rash003.j@gmail.com,

More information

Design and Application of Architecture of Internet of Things Based on Open Source Hardware

Design and Application of Architecture of Internet of Things Based on Open Source Hardware 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 Design and Application of Architecture of Internet of Things Based on Open Source Hardware

More information

An Approach of Traffic Management System for Control of Emergency Vehicles Using IOT (Internet of Things)

An Approach of Traffic Management System for Control of Emergency Vehicles Using IOT (Internet of Things) Volume 118 No. 5 2018, 245-252 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu An Approach of Traffic Management System for Control of Emergency Vehicles

More information

Internet of Things Application Practice and Information and Communication Technology

Internet of Things Application Practice and Information and Communication Technology 2019 2nd International Conference on Computer Science and Advanced Materials (CSAM 2019) Internet of Things Application Practice and Information and Communication Technology Chen Ning Guangzhou City Polytechnic,

More information

CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing

CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University of Rhode

More information

Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration

Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration Research Supervisor: Minoru Etoh (Professor, Open and Transdisciplinary Research Initiatives, Osaka University)

More information

A Reputation and Knowledge Based Trust Service Platform for Trustworthy Social Internet of Things

A Reputation and Knowledge Based Trust Service Platform for Trustworthy Social Internet of Things A Reputation and Knowledge Based Trust Service Platform for Trustworthy Social Internet of Things Nguyen B.Truong Department of Computer Science Liverpool John Moores University, Liverpool, L3 3AF n.b.truong@2015.ljmu.ac.uk

More information

Understanding User Privacy in Internet of Things Environments IEEE WORLD FORUM ON INTERNET OF THINGS / 30

Understanding User Privacy in Internet of Things Environments IEEE WORLD FORUM ON INTERNET OF THINGS / 30 Understanding User Privacy in Internet of Things Environments HOSUB LEE AND ALFRED KOBSA DONALD BREN SCHOOL OF INFORMATION AND COMPUTER SCIENCES UNIVERSITY OF CALIFORNIA, IRVINE 2016-12-13 IEEE WORLD FORUM

More information

Running head: ETHICS, TECHNOLOGY, SUSTAINABILITY AND SOCIAL ISSUES 1. Ethics, Technology, Sustainability and Social Issues in Business.

Running head: ETHICS, TECHNOLOGY, SUSTAINABILITY AND SOCIAL ISSUES 1. Ethics, Technology, Sustainability and Social Issues in Business. Running head: ETHICS, TECHNOLOGY, SUSTAINABILITY AND SOCIAL ISSUES 1 Ethics, Technology, Sustainability and Social Issues in Business Name Institutional Affiliation ETHICS, TECHNOLOGY, SUSTAINABILITY AND

More information

Software Agent Reusability Mechanism at Application Level

Software Agent Reusability Mechanism at Application Level Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 3 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Resistance Furnace Temperature Control System Based on OPC and MATLAB

Resistance Furnace Temperature Control System Based on OPC and MATLAB 569257MAC0010.1177/0020294015569257Resistance Furnace Temperature Control System Based on and MATLABResistance Furnace Temperature Control System Based on and MATLAB research-article2015 Themed Paper Resistance

More information

CROSS-LAYER FEATURES IN CONVOLUTIONAL NEURAL NETWORKS FOR GENERIC CLASSIFICATION TASKS. Kuan-Chuan Peng and Tsuhan Chen

CROSS-LAYER FEATURES IN CONVOLUTIONAL NEURAL NETWORKS FOR GENERIC CLASSIFICATION TASKS. Kuan-Chuan Peng and Tsuhan Chen CROSS-LAYER FEATURES IN CONVOLUTIONAL NEURAL NETWORKS FOR GENERIC CLASSIFICATION TASKS Kuan-Chuan Peng and Tsuhan Chen Cornell University School of Electrical and Computer Engineering Ithaca, NY 14850

More information

Journal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS

Journal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS List of Journals with impact factors Date retrieved: 1 August 2009 Journal Title ISSN Impact Factor 5-Year Impact Factor 1. ACM SURVEYS 0360-0300 9.920 14.672 2. VLDB JOURNAL 1066-8888 6.800 9.164 3. IEEE

More information

Fingerprinting Based Indoor Positioning System using RSSI Bluetooth

Fingerprinting Based Indoor Positioning System using RSSI Bluetooth IJSRD - International Journal for Scientific Research & Development Vol. 1, Issue 4, 2013 ISSN (online): 2321-0613 Fingerprinting Based Indoor Positioning System using RSSI Bluetooth Disha Adalja 1 Girish

More information

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

On Measurement of the Spatio-Frequency Property of OFDM Backscattering

On Measurement of the Spatio-Frequency Property of OFDM Backscattering On Measurement of the Spatio-Frequency Property of OFDM Backscattering Xiaoxue Zhang, Nanhuan Mi, Xin He, Panlong Yang, Haohua Du, Jiahui Hou and Pengjun Wan School of Computer Science and Technology,

More information

Effects of Malicious Users on the Energy Efficiency of Cognitive Radio Networks

Effects of Malicious Users on the Energy Efficiency of Cognitive Radio Networks Effects of Malicious Users on the Energy Efficiency of Cognitive Radio Networks Efe F. Orumwense 1, Thomas J. Afullo 2, Viranjay M. Srivastava 3 School of Electrical, Electronic and Computer Engineering,

More information

IT and Systems Science Transformational Impact on Technology, Society, Work, Life, Education, Training

IT and Systems Science Transformational Impact on Technology, Society, Work, Life, Education, Training IT and Systems Science Transformational Impact on Technology, Society, Work, Life, Education, Training John S. Baras Institute for Systems Research and Dept. of Electrical and Computer Engin. University

More information

An Adaptive Indoor Positioning Algorithm for ZigBee WSN

An Adaptive Indoor Positioning Algorithm for ZigBee WSN An Adaptive Indoor Positioning Algorithm for ZigBee WSN Tareq Alhmiedat Department of Information Technology Tabuk University Tabuk, Saudi Arabia t.alhmiedat@ut.edu.sa ABSTRACT: The areas of positioning

More information

A Cognitive Framework for Realizing and Exploiting the Internet of Things Concept

A Cognitive Framework for Realizing and Exploiting the Internet of Things Concept A Cognitive Framework for Realizing and Exploiting the Internet of Things Concept Gianmarco Baldini 1, Rao Venkatesha Prasad 2, Abdur Rahim Biswas 3, Klaus Moessner 4, Matti Etelapera 5, Juha Pekka Soininen

More information

Radar Signal Classification Based on Cascade of STFT, PCA and Naïve Bayes

Radar Signal Classification Based on Cascade of STFT, PCA and Naïve Bayes 216 7th International Conference on Intelligent Systems, Modelling and Simulation Radar Signal Classification Based on Cascade of STFT, PCA and Naïve Bayes Yuanyuan Guo Department of Electronic Engineering

More information

The Study on the Architecture of Public knowledge Service Platform Based on Collaborative Innovation

The Study on the Architecture of Public knowledge Service Platform Based on Collaborative Innovation The Study on the Architecture of Public knowledge Service Platform Based on Chang ping Hu, Min Zhang, Fei Xiang Center for the Studies of Information Resources of Wuhan University, Wuhan,430072,China,

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic

More information

Wireless Sensor Network Operating with Directive Antenna - A survey

Wireless Sensor Network Operating with Directive Antenna - A survey Wireless Sensor Network Operating with Directive Antenna - A survey Harish V. Rajurkar 1, Dr. Sudhir G. Akojwar 2 1 Department of Electronics & Telecommunication, St. Vincent Pallotti College of Engineering

More information

ANFIS-based Indoor Location Awareness System for the Position Monitoring of Patients

ANFIS-based Indoor Location Awareness System for the Position Monitoring of Patients Acta Polytechnica Hungarica Vol. 11, No. 1, 2014 ANFIS-based Indoor Location Awareness System for the Position Monitoring of Patients Chih-Min Lin 1, Yi-Jen Mon 2, Ching-Hung Lee 3, Jih-Gau Juang 4, Imre

More information

IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP

IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP LIU Ying 1,HAN Yan-bin 2 and ZHANG Yu-lin 3 1 School of Information Science and Engineering, University of Jinan, Jinan 250022, PR China

More information

Design and Development of a Social Robot Framework for Providing an Intelligent Service

Design and Development of a Social Robot Framework for Providing an Intelligent Service Design and Development of a Social Robot Framework for Providing an Intelligent Service Joohee Suh and Chong-woo Woo Abstract Intelligent service robot monitors its surroundings, and provides a service

More information

Analysis on Privacy and Reliability of Ad Hoc Network-Based in Protecting Agricultural Data

Analysis on Privacy and Reliability of Ad Hoc Network-Based in Protecting Agricultural Data Send Orders for Reprints to reprints@benthamscience.ae The Open Electrical & Electronic Engineering Journal, 2014, 8, 777-781 777 Open Access Analysis on Privacy and Reliability of Ad Hoc Network-Based

More information

FILTERING THE RESULTS OF ZIGBEE DISTANCE MEASUREMENTS WITH RANSAC ALGORITHM

FILTERING THE RESULTS OF ZIGBEE DISTANCE MEASUREMENTS WITH RANSAC ALGORITHM Acta Geodyn. Geomater., Vol. 13, No. 1 (181), 83 88, 2016 DOI: 10.13168/AGG.2015.0043 journal homepage: http://www.irsm.cas.cz/acta ORIGINAL PAPER FILTERING THE RESULTS OF ZIGBEE DISTANCE MEASUREMENTS

More information

Development of Virtual Reality Simulation Training System for Substation Zongzhan DU

Development of Virtual Reality Simulation Training System for Substation Zongzhan DU 6th International Conference on Mechatronics, Materials, Biotechnology and Environment (ICMMBE 2016) Development of Virtual Reality Simulation Training System for Substation Zongzhan DU School of Electrical

More information

Extended Gradient Predictor and Filter for Smoothing RSSI

Extended Gradient Predictor and Filter for Smoothing RSSI Extended Gradient Predictor and Filter for Smoothing RSSI Fazli Subhan 1, Salman Ahmed 2 and Khalid Ashraf 3 1 Department of Information Technology and Engineering, National University of Modern Languages-NUML,

More information

POLICY SIMULATION AND E-GOVERNANCE

POLICY SIMULATION AND E-GOVERNANCE POLICY SIMULATION AND E-GOVERNANCE Peter SONNTAGBAUER cellent AG Lassallestraße 7b, A-1020 Vienna, Austria Artis AIZSTRAUTS, Egils GINTERS, Dace AIZSTRAUTA Vidzeme University of Applied Sciences Cesu street

More information

Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks

Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks Giuseppe Anastasi Pervasive Computing & Networking Lab () Dept. of Information Engineering, University of Pisa E-mail:

More information

38 Int'l Conf. Internet Computing and Internet of Things ICOMP'16. IoT is SoS

38 Int'l Conf. Internet Computing and Internet of Things ICOMP'16. IoT is SoS 38 Int'l Conf. Internet Computing and Internet of Things ICOMP'16 IoT is SoS Parisa Mahya 1, Hooman Tahayori 2 1 Dept. of Computer Science and Information Technology, International Division, Shiraz University,

More information

Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing

Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing Sai kiran pudi 1, T. Syama Sundara 2, Dr. Nimmagadda Padmaja 3 Department of Electronics and Communication Engineering, Sree

More information

The Fifth Electronics Research Institute of the Ministry of Industry and Information Technology, Guangzhou, China

The Fifth Electronics Research Institute of the Ministry of Industry and Information Technology, Guangzhou, China 2016 International Conference on Humanities Science, Management and Education Technology (HSMET 2016) ISBN: 978-1-60595-394-6 Research on Science and Technology Project Management Based on Data Knowledge

More information

WFEO STANDING COMMITTEE ON ENGINEERING FOR INNOVATIVE TECHNOLOGY (WFEO-CEIT) STRATEGIC PLAN ( )

WFEO STANDING COMMITTEE ON ENGINEERING FOR INNOVATIVE TECHNOLOGY (WFEO-CEIT) STRATEGIC PLAN ( ) WFEO STANDING COMMITTEE ON ENGINEERING FOR INNOVATIVE TECHNOLOGY (WFEO-CEIT) STRATEGIC PLAN (2016-2019) Hosted by The China Association for Science and Technology March, 2016 WFEO-CEIT STRATEGIC PLAN (2016-2019)

More information

A Study of Optimal Spatial Partition Size and Field of View in Massively Multiplayer Online Game Server

A Study of Optimal Spatial Partition Size and Field of View in Massively Multiplayer Online Game Server A Study of Optimal Spatial Partition Size and Field of View in Massively Multiplayer Online Game Server Youngsik Kim * * Department of Game and Multimedia Engineering, Korea Polytechnic University, Republic

More information

Laser Printer Source Forensics for Arbitrary Chinese Characters

Laser Printer Source Forensics for Arbitrary Chinese Characters Laser Printer Source Forensics for Arbitrary Chinese Characters Xiangwei Kong, Xin gang You,, Bo Wang, Shize Shang and Linjie Shen Information Security Research Center, Dalian University of Technology,

More information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information Xin Yuan Wei Zheng Department of Computer Science, Florida State University, Tallahassee, FL 330 {xyuan,zheng}@cs.fsu.edu

More information

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network EasyChair Preprint 78 A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network Yuzhou Liu and Wuwen Lai EasyChair preprints are intended for rapid dissemination of research results and

More information

Research and application on the smart home based on component technologies and Internet of Things

Research and application on the smart home based on component technologies and Internet of Things Available online at www.sciencedirect.com Procedia Engineering 15 (2011) 2087 2092 Advanced in Control Engineering and Information Science Research and application on the smart home based on component

More information

EXTENDED TABLE OF CONTENTS

EXTENDED TABLE OF CONTENTS EXTENDED TABLE OF CONTENTS Preface OUTLINE AND SUBJECT OF THIS BOOK DEFINING UC THE SIGNIFICANCE OF UC THE CHALLENGES OF UC THE FOCUS ON REAL TIME ENTERPRISES THE S.C.A.L.E. CLASSIFICATION USED IN THIS

More information

Privacy, Technology and Economics in the 5G Environment

Privacy, Technology and Economics in the 5G Environment Privacy, Technology and Economics in the 5G Environment S A M A N T K H A J U R I A A S S I S T P R O F E S S O R, C M I K N U D E R I K S K O U B Y P R O F E S S O R, D I R E C T O R C M I S K O U B Y

More information

Issues in Information Systems Volume 16, Issue IV, pp , 2015

Issues in Information Systems Volume 16, Issue IV, pp , 2015 INTERNET OF THINGS-BASED HEALTH MONITORING AND MANAGEMENT DOMAIN-SPECIFIC ARCHITECTURE PATTERN Robert E. Samuel, Widener University, robert.samuel@ieee.org Dennis Connolly, Univ of Connecticut, dennis.connolly@cloudwhere.com

More information

Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain

Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain This fiche is part of the wider roadmap for cross-cutting KETs activities Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain Cross-cutting

More information

Pervasive Services Engineering for SOAs

Pervasive Services Engineering for SOAs Pervasive Services Engineering for SOAs Dhaminda Abeywickrama (supervised by Sita Ramakrishnan) Clayton School of Information Technology, Monash University, Australia dhaminda.abeywickrama@infotech.monash.edu.au

More information

Cooperative Spectrum Sensing in Cognitive Radio

Cooperative Spectrum Sensing in Cognitive Radio Cooperative Spectrum Sensing in Cognitive Radio Project of the Course : Software Defined Radio Isfahan University of Technology Spring 2010 Paria Rezaeinia Zahra Ashouri 1/54 OUTLINE Introduction Cognitive

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 4, April 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Novel Approach

More information

Social Network Analysis and Its Developments

Social Network Analysis and Its Developments 2013 International Conference on Advances in Social Science, Humanities, and Management (ASSHM 2013) Social Network Analysis and Its Developments DENG Xiaoxiao 1 MAO Guojun 2 1 Macau University of Science

More information

Design of intelligent vehicle control system based on machine visual

Design of intelligent vehicle control system based on machine visual Advances in Engineering Research (AER), volume 117 2nd Annual International Conference on Electronics, Electrical Engineering and Information Science (EEEIS 2016) Design of intelligent vehicle control

More information

UMTS to WLAN Handover based on A Priori Knowledge of the Networks

UMTS to WLAN Handover based on A Priori Knowledge of the Networks UMTS to WLAN based on A Priori Knowledge of the Networks Mylène Pischella, Franck Lebeugle, Sana Ben Jamaa FRANCE TELECOM Division R&D 38 rue du Général Leclerc -92794 Issy les Moulineaux - FRANCE mylene.pischella@francetelecom.com

More information

Modeling Connectivity of Inter-Vehicle Communication Systems with Road-Side Stations

Modeling Connectivity of Inter-Vehicle Communication Systems with Road-Side Stations Modeling Connectivity of Inter-Vehicle Communication Systems with Road-Side Stations Wen-Long Jin* and Hong-Jun Wang Department of Automation, University of Science and Technology of China, P.R. China

More information

Feasibility Tests for Visible Light Communication Scheme with Various LEDs

Feasibility Tests for Visible Light Communication Scheme with Various LEDs Feasibility Tests for Visible Light Communication Scheme with Various LEDs Dongsung Kim, Hoyeon Jung, Chungjo Yu, Dongjun Seo, Biao Zhou, Youngok Kim Department of Electronics Engineering, Kwangwoon University,

More information

Designing for an Internet of Humans

Designing for an Internet of Humans Designing for an Internet of Humans The Route to Adoption of IoT Paul Grace pjg@it-innovation.soton.ac.uk 24 March 2017 IT Innovation Centre The IT Innovation Centre is an applied research centre advancing

More information

From Information Technology to Mobile Information Technology: Applications in Hospitality and Tourism

From Information Technology to Mobile Information Technology: Applications in Hospitality and Tourism From Information Technology to Mobile Information Technology: Applications in Hospitality and Tourism Sunny Sun, Rob Law, Markus Schuckert *, Deniz Kucukusta, and Basak Denizi Guillet all School of Hotel

More information

ScienceDirect. An Integrated Xbee arduino And Differential Evolution Approach for Localization in Wireless Sensor Networks

ScienceDirect. An Integrated Xbee arduino And Differential Evolution Approach for Localization in Wireless Sensor Networks Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 48 (2015 ) 447 453 International Conference on Intelligent Computing, Communication & Convergence (ICCC-2015) (ICCC-2014)

More information

Improve the Management of Pharmaceutical Inventory by Using an IoT Based Information System

Improve the Management of Pharmaceutical Inventory by Using an IoT Based Information System Improve the Management of Pharmaceutical by Using an IoT Based Information System Yu-Tso Chen and Hao-Yun Chang Abstract The gradual development of medical technology advances the better medical industry

More information

An IoT Based Real-Time Environmental Monitoring System Using Arduino and Cloud Service

An IoT Based Real-Time Environmental Monitoring System Using Arduino and Cloud Service Engineering, Technology & Applied Science Research Vol. 8, No. 4, 2018, 3238-3242 3238 An IoT Based Real-Time Environmental Monitoring System Using Arduino and Cloud Service Saima Zafar Emerging Sciences,

More information

Durham Research Online

Durham Research Online Durham Research Online Deposited in DRO: 29 August 2017 Version of attached le: Accepted Version Peer-review status of attached le: Not peer-reviewed Citation for published item: Chiu, Wei-Yu and Sun,

More information

A Survey on Smart City using IoT (Internet of Things)

A Survey on Smart City using IoT (Internet of Things) A Survey on Smart City using IoT (Internet of Things) Akshay Kadam 1, Vineet Ovhal 2, Anita Paradhi 3, Kunal Dhage 4 U.G. Student, Department of Computer Engineering, SKNCOE, Pune, Maharashtra, India 1234

More information