A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Deployment of an IoT Solution for Early Behavior Change Detection
[chapter]
2019
Lecture Notes in Computer Science
This paper presents an experiment deployment of an Internet of Thing solution for the continuous monitoring and detection of elderly people's behavior changes. ...
The objective is to help geriatricians detect sedentary lifestyle and health-related problems at an early stage. ...
We would like to thank all the participants who accepted to be part of this experimentation and all our collaborating geriatricians and professional and informal caregivers. ...
doi:10.1007/978-3-030-32785-9_3
fatcat:caszd6gj6bbm5dhhufkczf2d4y
Pilot Site Deployment of an IoT Solution for Older Adults' Early Behavior Change Detection
2020
Sensors
This paper exhibits a proof-of-concept pilot site deployment of an Internet of Thing (IoT) solution for the continuous monitoring and detection of older adults' behavior changes. ...
The objective is to help geriatricians detect sedentary lifestyle and health-related problems at an early stage. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s20071888
pmid:32235310
fatcat:wsualaa23nhsflbvyqevuditke
Connected Cows: Utilizing Fog and Cloud Analytics toward Data-Driven Decisions for Smart Dairy Farming
2019
IEEE Internet of Things Magazine
animal behavior for early detection of lameness as opposed to a one-size-fits-all approach. • Results clearly suggest that once monitored, the behavioral changes when animals are ill can be mapped to ...
conclusIon We have outlined the key design principles used in the development of our IoT solution aimed at early detection of lameness in dairy cattle. ...
doi:10.1109/iotm.0001.1900045
fatcat:l4cxstrfhndhxeuxsk2e2vzkie
Handling a trillion (unfixable) flaws on a billion devices
2015
Proceedings of the 14th ACM Workshop on Hot Topics in Networks - HotNets-XIV
We argue that the network will have to play a critical role in securing IoT deployments. ...
While IoT has huge potential for societal impact, it comes with a number of key security challenges-IoT devices can become the entry points into critical infrastructures and can be exploited to leak sensitive ...
Proof of Concept As a preliminary proof-of-concept, we have developed an early prototype of IoTSec. ...
doi:10.1145/2834050.2834095
dblp:conf/hotnets/YuSSAX15
fatcat:56gb3q4jk5fw5f5tv32e7gwddu
Smart Communities Internet of Things
[article]
2016
arXiv
pre-print
In this white paper, we discuss the benefits and challenges of cyber-technologies within "Smart Cities", especially the IoT (Internet of Things) for smart communities, which means considering the benefits ...
and challenges of IoT cyber-technologies on smart cities physical infrastructures and their human stakeholders. ...
(a) major need to have sensors/actuators architecture in place which can take feedback and change behaviors if it is sensing frequency, type of data or functional behaviors. ...
arXiv:1604.02028v1
fatcat:vlkcirrlhnfldpu5ira3fdwy2a
Towards Model-Driven Simulation of the Internet of Things
[chapter]
2016
Advances in Intelligent Systems and Computing
Heterogeneity and distribution scale speak for the complexity of such systems and call for a careful analysis prior to any deployment on target environments. ...
In this paper we introduce a model-driven approach for the analysis of IoT applications via simulation. ...
If an issue is detected in the behavior of the application (e.g., a missed state change or a signal not sent), it is possible to analyze the cause in detail by visualizing the internals of each node. ...
doi:10.1007/978-3-319-29643-2_2
fatcat:ep5xf4f55bb6tkhzs3sovmigqi
MODELS FOR ENERGY EFFICIENCY IMPROVEMENT BY USING MOBILE TECHNOLOGIES AND Internet of things
2018
Journal of Electrical Engineering and Information Technologies
smart Internet of Things (IoT) solutions and information and communication technology (ICT). ...
A b s t r a c t: As the telecom industry is looking for new opportunities to improve its commercial potential by introduction 5G technology, energy industry is rising as potential area for deployment of ...
with no spectrum fee to decrease the cost of deployment of new IoT solutions. ...
doi:10.51466/jeeit1831-2091b
fatcat:62rd2qpronbyhp7zf2lehdpdve
Early Detection Of Mirai-Like IoT Bots In Large-Scale Networks Through Sub-Sampled Packet Traffic Analysis
[article]
2019
arXiv
pre-print
The prospective deployment of our bot detection solution is discussed next along with the countermeasures which can be taken post detection. ...
We analyze the unique signatures of the Mirai malware to identify its presence in an IoT device. ...
Liang Zhenkai (SoC, NUS) for helping us with some of the initial ideas used in this paper and Dr. Min Suk Kang (SoC, NUS) for providing comments on our manuscript. ...
arXiv:1901.04805v3
fatcat:q6pggttllzbgnc7xcgfuke7jxe
IOT - LIVESTOCK MONITORING AND MANAGEMENT SYSTEM
2021
International Journal of Engineering Applied Sciences and Technology
The IOT framework provides IOT solutions in a wide range of domains and applications in farming, livestock, and agricultural front. ...
With the IOT stack, with appropriate sensors for determining geographical boundaries, assets, interoperability, re-usability and functionality, the technical use-case is described in terms of entity/informational ...
With the insight available, the system would alert for conductivity problems so we can detect diseases in an early stage and take actions which would inturn, avoid losses in terms of milk production or ...
doi:10.33564/ijeast.2021.v05i09.042
fatcat:qhtqxdblu5fkvbo755wg7j2ioa
Optimal Deployments of Defense Mechanisms for the Internet of Things
2018
2018 International Workshop on Secure Internet of Things (SIoT)
Internet of Things (IoT) devices can be exploited by the attackers as entry points to break into the IoT networks without early detection. ...
In this work, we propose a novel approach to generate the strategic deployment of adaptive deception technology and the patch management solution for the IoT under a budget constraint. ...
The function q : Y p → {0, 1} describes an integer value of the patch solution for each type of IoT nodes in the network. ...
doi:10.1109/siot.2018.00008
dblp:conf/siot/GeCKK18
fatcat:vny757tp4vd3dfgzwsdsg7ux3e
Deep Semisupervised Learning-Based Network Anomaly Detection in Heterogeneous Information Systems
2022
Computers Materials & Continua
The proposed approach is based on a deep recurrent autoencoder that learns time series of normal network behavior and detects notable network anomalies. ...
With the massive number of connected devices, opportunities for potential network attacks are nearly unlimited. ...
Acknowledgement: The authors are thankful to the administration of the Lviv Polytechnic National University and the Technical University of Kosice for providing the necessary equipment to conduct this ...
doi:10.32604/cmc.2022.018773
fatcat:itxfgifm5rgrhiqpqqjc5ckfmu
High-performance, platform-independent DDoS detection for IoT ecosystems
2019
2019 IEEE 44th Conference on Local Computer Networks (LCN)
Our solution was compared against two widespread coarse-grained detection techniques, showing detection delays under 5ms, an overall accuracy of 93 − 95% and a bandwidth overhead of less than 1%. ...
Most Distributed Denial of Service (DDoS) detection and mitigation strategies for Internet of Things (IoT) are based on a remote cloud server or purpose-built middlebox executing complex intrusion detection ...
However, in an IoT environment, the cost of a purpose-built ecosystem to detect and mitigate DDoS poses complex deployment and operational challenges, for instance, if early detection and high-speed processing ...
doi:10.1109/lcn44214.2019.8990862
dblp:conf/lcn/Santoyo-Gonzalez19
fatcat:4pdvs67fajc2dihudorzvdrob4
DEA: Anomaly Detection in Smart Environments using Artificial Intelligence
2019
Latin American Network Operations and Management Symposium
network and detecting out of order behaviors (different from the behavior pattern). ...
The IoT devices are subject to anomalous behavior, due to security vulnerabilities or malfunction. ...
ACKNOWLEDGMENT The authors would like to thank RNP and Microsoft for their financial support. ...
dblp:conf/lanoms/MoreiraMCGSN19
fatcat:ua5fi63whjflvixfkkkmol2heq
Classification of device behaviour in internet of things infrastructures
2017
Proceedings of the 1st International Conference on Internet of Things and Machine Learning - IML '17
Implementation methodologies and results of ongoing work to realise this new IoT cyber-security technique for threat detection are presented. ...
A novel approach to security detection using streaming data analytics to classify and detect security threats in their early stages is proposed. ...
ACKNOWLEDGMENTS The authors would like to acknowledge the generous support of the Learning and Innovation Center (LINC) at the Institute of Technology Blanchardstown, Dublin. ...
doi:10.1145/3109761.3109791
dblp:conf/iml/FerrandoS17
fatcat:up3hco7jhbdpbnuaj2hmea75ue
Fog Orchestration for Internet of Things Services
2017
IEEE Internet Computing
This article provides an overview of the core issues, challenges and future research directions in Fog-enabled orchestration for IoT services. ...
Additionally, we present early experiences of an orchestration scenario, demonstrating the feasibility and initial results of using a distributed genetic algorithm in this context. ...
To address this problem, an alternative approach is the use of an IoT service orchestration system to determine and select the best IoT appliances for dynamic composition of holistic workflows for more ...
doi:10.1109/mic.2017.36
fatcat:5rvkwbrvj5cb5bamhlnztrwqy4
« Previous
Showing results 1 — 15 out of 5,896 results