5,896 Hits in 5.8 sec

Deployment of an IoT Solution for Early Behavior Change Detection [chapter]

Hamdi Aloulou, Mounir Mokhtari, Bessam Abdulrazak
2019 Lecture Notes in Computer Science  
This paper presents an experiment deployment of an Internet of Thing solution for the continuous monitoring and detection of elderly people's behavior changes.  ...  The objective is to help geriatricians detect sedentary lifestyle and health-related problems at an early stage.  ...  We would like to thank all the participants who accepted to be part of this experimentation and all our collaborating geriatricians and professional and informal caregivers.  ... 
doi:10.1007/978-3-030-32785-9_3 fatcat:caszd6gj6bbm5dhhufkczf2d4y

Pilot Site Deployment of an IoT Solution for Older Adults' Early Behavior Change Detection

Hamdi Aloulou, Mounir Mokhtari, Bessam Abdulrazak
2020 Sensors  
This paper exhibits a proof-of-concept pilot site deployment of an Internet of Thing (IoT) solution for the continuous monitoring and detection of older adults' behavior changes.  ...  The objective is to help geriatricians detect sedentary lifestyle and health-related problems at an early stage.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s20071888 pmid:32235310 fatcat:wsualaa23nhsflbvyqevuditke

Connected Cows: Utilizing Fog and Cloud Analytics toward Data-Driven Decisions for Smart Dairy Farming

Mohit Taneja, Nikita Jalodia, Paul Malone, John Byabazaire, Alan Davy, Cristian Olariu
2019 IEEE Internet of Things Magazine  
animal behavior for early detection of lameness as opposed to a one-size-fits-all approach. • Results clearly suggest that once monitored, the behavioral changes when animals are ill can be mapped to  ...  conclusIon We have outlined the key design principles used in the development of our IoT solution aimed at early detection of lameness in dairy cattle.  ... 
doi:10.1109/iotm.0001.1900045 fatcat:l4cxstrfhndhxeuxsk2e2vzkie

Handling a trillion (unfixable) flaws on a billion devices

Tianlong Yu, Vyas Sekar, Srinivasan Seshan, Yuvraj Agarwal, Chenren Xu
2015 Proceedings of the 14th ACM Workshop on Hot Topics in Networks - HotNets-XIV  
We argue that the network will have to play a critical role in securing IoT deployments.  ...  While IoT has huge potential for societal impact, it comes with a number of key security challenges-IoT devices can become the entry points into critical infrastructures and can be exploited to leak sensitive  ...  Proof of Concept As a preliminary proof-of-concept, we have developed an early prototype of IoTSec.  ... 
doi:10.1145/2834050.2834095 dblp:conf/hotnets/YuSSAX15 fatcat:56gb3q4jk5fw5f5tv32e7gwddu

Smart Communities Internet of Things [article]

Klara Nahrstedt, Daniel Lopresti, Ben Zorn, Ann W. Drobnis, Beth Mynatt, Shwetak Patel, Helen V. Wright
2016 arXiv   pre-print
In this white paper, we discuss the benefits and challenges of cyber-technologies within "Smart Cities", especially the IoT (Internet of Things) for smart communities, which means considering the benefits  ...  and challenges of IoT cyber-technologies on smart cities physical infrastructures and their human stakeholders.  ...  (a) major need to have sensors/actuators architecture in place which can take feedback and change behaviors if it is sensing frequency, type of data or functional behaviors.  ... 
arXiv:1604.02028v1 fatcat:vlkcirrlhnfldpu5ira3fdwy2a

Towards Model-Driven Simulation of the Internet of Things [chapter]

Mihal Brumbulli, Emmanuel Gaudin
2016 Advances in Intelligent Systems and Computing  
Heterogeneity and distribution scale speak for the complexity of such systems and call for a careful analysis prior to any deployment on target environments.  ...  In this paper we introduce a model-driven approach for the analysis of IoT applications via simulation.  ...  If an issue is detected in the behavior of the application (e.g., a missed state change or a signal not sent), it is possible to analyze the cause in detail by visualizing the internals of each node.  ... 
doi:10.1007/978-3-319-29643-2_2 fatcat:ep5xf4f55bb6tkhzs3sovmigqi


Igor Bimbiloski
2018 Journal of Electrical Engineering and Information Technologies  
smart Internet of Things (IoT) solutions and information and communication technology (ICT).  ...  A b s t r a c t: As the telecom industry is looking for new opportunities to improve its commercial potential by introduction 5G technology, energy industry is rising as potential area for deployment of  ...  with no spectrum fee to decrease the cost of deployment of new IoT solutions.  ... 
doi:10.51466/jeeit1831-2091b fatcat:62rd2qpronbyhp7zf2lehdpdve

Early Detection Of Mirai-Like IoT Bots In Large-Scale Networks Through Sub-Sampled Packet Traffic Analysis [article]

Ayush Kumar, Teng Joon Lim
2019 arXiv   pre-print
The prospective deployment of our bot detection solution is discussed next along with the countermeasures which can be taken post detection.  ...  We analyze the unique signatures of the Mirai malware to identify its presence in an IoT device.  ...  Liang Zhenkai (SoC, NUS) for helping us with some of the initial ideas used in this paper and Dr. Min Suk Kang (SoC, NUS) for providing comments on our manuscript.  ... 
arXiv:1901.04805v3 fatcat:q6pggttllzbgnc7xcgfuke7jxe


Justin Ophir Isaac
2021 International Journal of Engineering Applied Sciences and Technology  
The IOT framework provides IOT solutions in a wide range of domains and applications in farming, livestock, and agricultural front.  ...  With the IOT stack, with appropriate sensors for determining geographical boundaries, assets, interoperability, re-usability and functionality, the technical use-case is described in terms of entity/informational  ...  With the insight available, the system would alert for conductivity problems so we can detect diseases in an early stage and take actions which would inturn, avoid losses in terms of milk production or  ... 
doi:10.33564/ijeast.2021.v05i09.042 fatcat:qhtqxdblu5fkvbo755wg7j2ioa

Optimal Deployments of Defense Mechanisms for the Internet of Things

Mengmeng Ge, Jin-Hee Cho, Charles A. Kamhoua, Dong Seong Kim
2018 2018 International Workshop on Secure Internet of Things (SIoT)  
Internet of Things (IoT) devices can be exploited by the attackers as entry points to break into the IoT networks without early detection.  ...  In this work, we propose a novel approach to generate the strategic deployment of adaptive deception technology and the patch management solution for the IoT under a budget constraint.  ...  The function q : Y p → {0, 1} describes an integer value of the patch solution for each type of IoT nodes in the network.  ... 
doi:10.1109/siot.2018.00008 dblp:conf/siot/GeCKK18 fatcat:vny757tp4vd3dfgzwsdsg7ux3e

Deep Semisupervised Learning-Based Network Anomaly Detection in Heterogeneous Information Systems

Nazarii Lutsiv, Taras Maksymyuk, Mykola Beshley, Orest Lavriv, Volodymyr Andrushchak, Anatoliy Sachenko, Liberios Vokorokos, Juraj Gazda
2022 Computers Materials & Continua  
The proposed approach is based on a deep recurrent autoencoder that learns time series of normal network behavior and detects notable network anomalies.  ...  With the massive number of connected devices, opportunities for potential network attacks are nearly unlimited.  ...  Acknowledgement: The authors are thankful to the administration of the Lviv Polytechnic National University and the Technical University of Kosice for providing the necessary equipment to conduct this  ... 
doi:10.32604/cmc.2022.018773 fatcat:itxfgifm5rgrhiqpqqjc5ckfmu

High-performance, platform-independent DDoS detection for IoT ecosystems

Alejandro Santoyo-Gonzalez, Cristina Cervello-Pastor, Dimitrios P. Pezaros
2019 2019 IEEE 44th Conference on Local Computer Networks (LCN)  
Our solution was compared against two widespread coarse-grained detection techniques, showing detection delays under 5ms, an overall accuracy of 93 − 95% and a bandwidth overhead of less than 1%.  ...  Most Distributed Denial of Service (DDoS) detection and mitigation strategies for Internet of Things (IoT) are based on a remote cloud server or purpose-built middlebox executing complex intrusion detection  ...  However, in an IoT environment, the cost of a purpose-built ecosystem to detect and mitigate DDoS poses complex deployment and operational challenges, for instance, if early detection and high-speed processing  ... 
doi:10.1109/lcn44214.2019.8990862 dblp:conf/lcn/Santoyo-Gonzalez19 fatcat:4pdvs67fajc2dihudorzvdrob4

DEA: Anomaly Detection in Smart Environments using Artificial Intelligence

Diego A. B. Moreira, Humberto P. Marques, Joaquim Celestino Jr., Rafael L. Gomes, Aldri Santos, Michele Nogueira
2019 Latin American Network Operations and Management Symposium  
network and detecting out of order behaviors (different from the behavior pattern).  ...  The IoT devices are subject to anomalous behavior, due to security vulnerabilities or malfunction.  ...  ACKNOWLEDGMENT The authors would like to thank RNP and Microsoft for their financial support.  ... 
dblp:conf/lanoms/MoreiraMCGSN19 fatcat:ua5fi63whjflvixfkkkmol2heq

Classification of device behaviour in internet of things infrastructures

Roman Ferrando, Paul Stacey
2017 Proceedings of the 1st International Conference on Internet of Things and Machine Learning - IML '17  
Implementation methodologies and results of ongoing work to realise this new IoT cyber-security technique for threat detection are presented.  ...  A novel approach to security detection using streaming data analytics to classify and detect security threats in their early stages is proposed.  ...  ACKNOWLEDGMENTS The authors would like to acknowledge the generous support of the Learning and Innovation Center (LINC) at the Institute of Technology Blanchardstown, Dublin.  ... 
doi:10.1145/3109761.3109791 dblp:conf/iml/FerrandoS17 fatcat:up3hco7jhbdpbnuaj2hmea75ue

Fog Orchestration for Internet of Things Services

Zhenyu Wen, Renyu Yang, Peter Garraghan, Tao Lin, Jie Xu, Michael Rovatsos
2017 IEEE Internet Computing  
This article provides an overview of the core issues, challenges and future research directions in Fog-enabled orchestration for IoT services.  ...  Additionally, we present early experiences of an orchestration scenario, demonstrating the feasibility and initial results of using a distributed genetic algorithm in this context.  ...  To address this problem, an alternative approach is the use of an IoT service orchestration system to determine and select the best IoT appliances for dynamic composition of holistic workflows for more  ... 
doi:10.1109/mic.2017.36 fatcat:5rvkwbrvj5cb5bamhlnztrwqy4
« Previous Showing results 1 — 15 out of 5,896 results