The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wrist-worn sensors have increased in popularity in health care settings. As the use of wrist-worn sensors increases, a better understanding is needed of how to detect changes in behavior as well as an ability to quantify such changes. We introduce a statistical method to address this need. In this study, we used Fitbit Charge Heart Rate devices with two separate populations to continuously record...
The U.S. Census Bureau reports that the U.S. population of people aged 65 and up will grow more than double in between 2010 and 2050. The market for remote patient monitoring is expected to grow from $10.6 billion in 2012 to $21.2 billion in 2017. This growing societal and economical needs revitalize the work on technology-assisted proactive and preventive health monitoring in smart home environments...
Shoulder surfing or adversarial eavesdropping to infer users' keystrokes on physical QWERTY keyboards continues to be a serious privacy threat. Despite this, practical and efficient countermeasures against such attacks are still lacking. In this paper, we propose keyboard randomization as a simple, yet effective, countermeasure against various types of keystroke inference attacks. Our proposal consists...
Currently, personal assistant systems, run on smartphones and use natural language interfaces. However, these systems rely mostly on the web for finding information. Mobile and wearable devices can collect an enormous amount of contextual personal data such as sleep and physical activities. These information objects and their applications are known as quantified-self, mobile health or personal informatics,...
In this paper, we present a novel application, HeatWatch, which predicts heatstroke and prevents heatstroke by ensuring users breaking and water intake. The application estimates user's core temperature based on human thermal model and vital sensors equipped with smart watches. We also designed the application tracks user's water intake by assuming to apply existing activity recognition technique...
Sensors are important components in the Internet of Things (IoT) that encompass a wide spectrum of applications from healthcare to monitoring critical infrastructure. Securely gathering sensor measurements by adopting traditional cryptographic mechanisms is fraught with vulnerabilities emanating from the inability to safeguard secrets on edge devices, often in adversarial environments, where appropriate...
Secure wireless communication based applications in IoT typically require very short sessions. Stream ciphers constitute a popular choice for ensuring security of data communications in such applications. To keep the cost, complexity and energy expenditure in the implementation of such stream cipher algorithms low, the short duration of the wireless communication sessions are often exploited by using...
The Wireless Sensor Networks (WSN) are important part of Internet of Things. And one of the important requirements of WSN is to ensure that the data exchanged within these networks is secured. Since WSNs consist of resource constrained devices, it is crucial to investigate new, lightweight security solutions, which ensure fast computations, reduced energy consumption and desired level of security...
With the various technological advances, mobile devices are not just being used as a means to make voice calls; but are being used to accomplish a variety of tasks. Mobile devices are being envisioned to practically accomplish any task which could be done on a computer. This is hurdled by the limited computational resources available with the mobile devices due to their portable size. With the mobile...
Modern power grid has evolved from a passive network into an application of Internet of Things with numerous interconnected elements and users. In this environment, household users greatly benefit from a prediction algorithm that estimates their future power demand to help them control off-grid generation, battery storage, and power consumption. In particular, household power consumption prediction...
Internet of Things (IoT) security and privacy remain a major challenge, mainly due to the massive scale and distributed nature of IoT networks. Blockchain-based approaches provide decentralized security and privacy, yet they involve significant energy, delay, and computational overhead that is not suitable for most resource-constrained IoT devices. In our previous work, we presented a lightweight...
Internet of Things is a connected ecosystem where everyday objects have network connectivity allowing them to do data transfers. This scenario often involves a gateway for enabling the communication between things which are connected to the internet. Gateways run multiple network based services in them which are often visible to any device in the same network. It acts as the entry point for the traffic...
The proliferation of consumer Internet of Things (IoT) devices offers as many convenient benefits as it poses significant vulnerabilities. Patching or otherwise mitigating these vulnerabilities will be difficult for the existing home security ecosystem. This paper proposes a central security manager that is built on top of the smarthome's hub or gateway router and positioned to intercept all traffic...
In order to efficiently support the Machine-to-Machine (M2M) and Internet of Things (IoT) applications, a new amendment for the Wi-Fi standard known as IEEE 802.11ah is introduced. In 802.11ah (or Wi-Fi HaLow), several enhanced MAC features are added in order to provide scalability for a large number of stations, increase the range of operation, while at the same time reduce the energy consumption...
The Internet of Things (IoT) promises to allow everyday objects to connect to the Internet and seamlessly interact with users and other machines. Essential for the IoT to function is a reliable Internet connection. In 2016 the International Telecommunication Union reports 3.9 billion people - 53% of the world's population are not using the Internet [1]. Projects like Loon (X) and Aquila (Facebook)...
The Internet of Things (IoT) has brought increased sensing, monitoring and actuation capabilities to several domains including residential buildings. Residential energy management methods can leverage these capabilities and devise smarter solutions. This requires processing and reasoning data constantly generated by various IoT devices. In this paper, we use a hierarchical system model for IoT-based...
Emerging ride-on-demand services (e.g., Uber or Uber-like) are vying to penetrate into the market of traditional taxi service, and they are ubiquitous in the nature, by using smart mobile devices like on-car GPS and mobile phone. These ubiquitous services are also beneficial for the environment by increasing the utilization of cars and improving travel efficiency. Through collaboration with a leading...
Due to the highly predictable daily movements of citizens in urban areas, mobile traffic shows repetitive patterns with spatio-temporal variations. This phenomenon is known as Tidal Effect analogy to the rise and fall of the sea levels. Recognizing and defining traffic load patterns at the base station thus plays a vital role in traffic engineering, network design and load balancing since it represents...
The advent of state-of-the-art telecommunication devices like smartphones has led to a considerable increase in the amount of electronic communication exchanged. While the improved availability increases personal flexibility—reducing rigidity in time and place of communication—it comes at a price. The ‘anytime, anyplace’-accessibility, which has become the norm in today's (working) society, can cause...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.