样式: 排序: IF: - GO 导出 标记为已读
-
Privacy-preserving pedestrian tracking with path image inpainting and 3D point cloud features Pervasive Mob. Comput. (IF 4.3) Pub Date : 2024-03-11 Masakazu Ohno, Riki Ukyo, Tatsuya Amano, Hamada Rizk, Hirozumi Yamaguchi
Tracking pedestrian flow in large public areas is vital, yet ensuring privacy is paramount. Traditional visual-based tracking systems are raising concerns for potentially obtaining persistent and permanent identifiers that can compromise individual identities. Moreover, in areas such as the vicinity of restrooms, any form of data acquisition capturing human behavior should be refrained from, making
-
A framework for offloading and migration of serverless functions in the Edge-Cloud Continuum Pervasive Mob. Comput. (IF 4.3) Pub Date : 2024-03-08 Gabriele Russo Russo, Valeria Cardellini, Francesco Lo Presti
Function-as-a-Service (FaaS) has emerged as an evolution of traditional Cloud service models, allowing users to define and execute pieces of codes (i.e., functions) in a serverless manner, with the provider taking care of most operational issues. With the unending growth of resource availability in the Edge-to-Cloud Continuum, there is increasing interest in adopting FaaS near the Edge as well, to
-
Inferring in-air gestures in complex indoor environment with less supervision Pervasive Mob. Comput. (IF 4.3) Pub Date : 2024-03-08 Zhongkai Deng, Qizhen Zhou, Jianchun Xing, Qiliang Yang, Yin Chen, Hu Zhang, Zhaoyi Chen, Deyu Deng, Yixin Mo, Bowei Feng
People have high demands for comfort and technology in indoor environments. Gestures, as a natural and friendly human computer interaction (HCI) method, have received widespread attention and have been the subject of many research studies. Traditional approaches are based on wearable devices and cameras, which can be cumbersome to operate and infringe upon users’ privacy. Millimeter-wave (mmWave) radar
-
An evaluation of heart rate monitoring with in-ear microphones under motion Pervasive Mob. Comput. (IF 4.3) Pub Date : 2024-03-07 Kayla-Jade Butkow, Ting Dang, Andrea Ferlini, Dong Ma, Yang Liu, Cecilia Mascolo
With the soaring adoption of in-ear wearables, the research community has started investigating suitable in-ear heart rate detection systems. Heart rate is a key physiological marker of cardiovascular health and physical fitness. Continuous and reliable heart rate monitoring with wearable devices has therefore gained increasing attention in recent years. Existing heart rate detection systems in wearables
-
Role of IoT technologies in big data management systems: A review and Smart Grid case study Pervasive Mob. Comput. (IF 4.3) Pub Date : 2024-02-29 A.R. Al-Ali, Ragini Gupta, Imran Zualkernan, Sajal K. Das
Empowered by Internet of Things (IoT) and cloud computing platforms, the concept of smart cities is making a transition from conceptual models to development and implementation phases. Multiple smart city initiatives and services such as Smart Grid and Smart Meters have emerged that have led to the accumulation of massive amounts of energy big data. Big data is typically characterized by five distinct
-
LICAPA: Lightweight collective attestation for physical attacks detection in highly dynamic networks Pervasive Mob. Comput. (IF 4.3) Pub Date : 2024-02-21 Ziyu Wang, Cong Sun
UAVs or vehicular networks have been extensively used in different domains. Such a system network consists of various heterogeneous and mobile devices operating autonomously and cooperatively to provide flexible services. However, ensuring devices’ runtime integrity has always been critical to such highly dynamic and disruptive networks. Collective attestation is a popular technique in ensuring service
-
-
TODO: Task Offloading Decision Optimizer for the efficient provision of offloading schemes Pervasive Mob. Comput. (IF 4.3) Pub Date : 2024-02-10 Shilin Chen, Xingwang Wang, Yafeng Sun
As the volume of data stored on local devices increases, users turn to edge devices to help with processing tasks. Developing offloading schemes is challenging due to the varying configurations of edge devices and user preferences. While traditional methods provide schemes for offloading in various scenarios, they face unavoidable challenges, including the requirement to manage device workloads in
-
PSO based Amorphous algorithm to reduce localization error in Wireless Sensor Network Pervasive Mob. Comput. (IF 4.3) Pub Date : 2024-02-10 Pujasuman Tripathy, P.M. Khilar
In recent years, localizing or identifying the position of unknown sensor nodes has become an essential problem in Wireless Sensor Networks (WSN). The improvement in localization accuracy leads to obtaining the exact location of the dumb node. Among all localization algorithms, Amorphous localization is highly suggested for usage in many application domains due to its simplicity, viability, low cost
-
Efficient and secure heterogeneous online/offline signcryption for wireless body area network Pervasive Mob. Comput. (IF 4.3) Pub Date : 2024-02-10 Huihui Zhu, Chunhua Jin, Yongliang Xu, Guanhua Chen, Liqing Chen
As a special Internet of Things (IoT) application, the wireless body area network (WBAN) has gained widespread attention by medical institutions. However, existing schemes for WBAN data transmission lack heterogeneity support across certificateless cryptosystem (CLC) and public key infrastructure (PKI), resulting in issues like key escrow or complicated certificate management. In addition, for performance
-
A novel IoT trust model leveraging fully distributed behavioral fingerprinting and secure delegation Pervasive Mob. Comput. (IF 4.3) Pub Date : 2024-02-08 Marco Arazzi, Serena Nicolazzo, Antonino Nocera
The pervasiveness and high number of Internet of Things (IoT) applications in people’s daily lives make this context a very critical attack surface for cyber threats. The high heterogeneity of involved entities, both in terms of hardware and software characteristics, does not allow the definition of uniform, global, and efficient security solutions. Therefore, researchers have started to investigate
-
Reinforcement learning-based load balancing for heavy traffic Internet of Things Pervasive Mob. Comput. (IF 4.3) Pub Date : 2024-02-08 Jianjun Lei, Jie Liu
Aiming to large-scale data transmission requirements of resource-constrained IoT (Internet of Things) devices, the routing protocol for low power lossy network (RPL) is expected to handle the load imbalance and high energy consumption in heavy traffic scenarios. This paper proposes a novel PL routing optimization lgorithm based on deep einforcement earning (referred to as RARL), which employs the centralized
-
Optimization of mobility sampling in dynamic networks using predictive wavelet analysis Pervasive Mob. Comput. (IF 4.3) Pub Date : 2024-02-03 Peppino Fazio, Miralem Mehic, Floriano De Rango, Mauro Tropea, Miroslav Voznak
In the last decade, the investigation of mobility features has gained enormous significance in many scenarios as a result of the significant diffusion and deployment of mobile devices covered by high-speed technologies (e.g., 5G). Many contributions in the literature have attempted to discover mobility properties, but most studies are based on the time features of the mobility process. No study has
-
B2auth: A contextual fine-grained behavioral biometric authentication framework for real-world deployment Pervasive Mob. Comput. (IF 4.3) Pub Date : 2024-01-24 Ahmed Mahfouz, Ahmed Hamdy, Mohamed Alaa Eldin, Tarek M. Mahmoud
Several behavioral biometric authentication frameworks have been proposed to authenticate smartphone users based on the analysis of sensors and services. These authentication frameworks verify the user identity by extracting a set of behavioral traits such as touch, sensors and keystroke dynamics, and use machine learning and deep learning techniques to develop the authentication models. Unfortunately
-
-
Computation and communication efficient approach for federated learning based urban sensing applications against inference attacks Pervasive Mob. Comput. (IF 4.3) Pub Date : 2024-01-09 Ayshika Kapoor, Dheeraj Kumar
Federated learning based participatory sensing has gained much attention lately for the vital task of urban sensing due to privacy and security issues in conventional machine learning. However, inference attacks by the honest-but-curious application server or a malicious adversary can leak the personal attributes of the participants, such as their home and workplace locations, routines, and habits
-
Sensor-based agitation prediction in institutionalized people with dementia A systematic review Pervasive Mob. Comput. (IF 4.3) Pub Date : 2024-01-07 Jan Kleine Deters, Sarah Janus, Jair A. Lima Silva, Heinrich J. Wörtche, Sytse U. Zuidema
Early detection of agitation in individuals with dementia can lead to timely interventions, preventing the worsening of situations and enhancing their quality of life. The emergence of multi-modal sensing and advances in artificial intelligence make it feasible to explore and apply technology for this goal. We conducted a literature review to understand the current technical developments and challenges
-
A provably secure and practical end-to-end authentication scheme for tactile Industrial Internet of Things Pervasive Mob. Comput. (IF 4.3) Pub Date : 2024-01-06 Yimin Guo, Yajun Guo, Ping Xiong, Fan Yang, Chengde Zhang
In the Industrial Internet of Things (IIoT), haptic control of machines or robots can be managed remotely. However, with the emergence of Tactile Industrial Internet of Things (TIIoT), the transmission of haptic data over public channels has raised security and privacy concerns. In such an environment, mutual authentication between haptic users and remotely controlled entities is crucial to prevent
-
A Transfer Learning and Explainable Solution to Detect mpox from Smartphones images Pervasive Mob. Comput. (IF 4.3) Pub Date : 2024-01-06 Mattia Giovanni Campana, Marco Colussi, Franca Delmastro, Sergio Mascetti, Elena Pagani
Monkeypox (mpox) virus has become a “public health emergency of international concern” in the last few months, as declared by the World Health Organization, especially for low-income countries. A symptom of mpox infection is the appearance of rashes and skin eruptions, which can lead people to seek medical advice. A technology that might help perform a preliminary screening based on the aspect of skin
-
Blockchain-based access control architecture for multi-domain environments Pervasive Mob. Comput. (IF 4.3) Pub Date : 2024-01-06 Zhiqiang Du, Yunliang Li, Yanfang Fu, Xianghan Zheng
Numerous users from diverse domains access information and perform various operations in multi-domain environments. These users have complex permissions that increase the risk of identity falsification, unauthorized access, and privacy breaches during cross-domain interactions. Consequently, implementing an access control architecture to prevent users from engaging in illicit activities is imperative
-
SMARTCOPE: Smartphone Change Of Possession Evaluation for continuous authentication Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-12-23 Nicholas Cariello, Seth Levine, Gang Zhou, Blair Hoplight, Paolo Gasti, Kiran S. Balagani
The goal of continuous smartphone authentication is to detect when the adversary has gained possession of the user’s device post-login. This is achieved by triggering re-authentication at fixed, frequent intervals. However, these intervals do not take into account external information that might indicate that the impostor has gained physical access to the user’s device. Continuous smartphone authentication
-
A New Lightweight Routing Protocol for Internet of Mobile Things Based on Low Power and Lossy Network Using a Fuzzy-Logic Method Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-12-20 Zahra Ghanbari, Nima Jafari Navimipour, Mehdi Hosseinzadeh, Hassan Shakeri, Aso Darwesh
The IoT devices with embedded mobile devices create the Internet of Mobile Things (IoMT) paradigm. Mobility is not supported by the routing protocol for low-power and lossy networks (RPL) created for static networks. IoMT has raised routing challenges such as link failure, instability, energy depletion, packet loss, and handover delay in the network. In this context, IoMT Fuzzy-based RPL (IoMT-FRPL)
-
Energy consumption of smartphones and IoT devices when using different versions of the HTTP protocol Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-12-18 Chiara Caiazza, Valerio Luconi, Alessio Vecchio
HTTP is frequently used by smartphones and IoT devices to access information and Web services. Nowadays, HTTP is used in three major versions, each introducing significant changes with respect to the previous one. We evaluated the energy consumption of the major versions of the HTTP protocol when used in the communication between energy-constrained devices and cloud-based or edge-based services. Experimental
-
PDCHAR: Human activity recognition via multi-sensor wearable networks using two-channel convolutional neural networks Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-12-13 Yvxuan Ren, Dandan Zhu, Kai Tong, Lulu Xv, Zhengtai Wang, Lixin Kang, Jinguo Chai
-
Tracking people across ultra populated indoor spaces by matching unreliable Wi-Fi signals with disconnected video feeds Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-11-23 Hai Truong, Dheryta Jaisinghani, Shubham Jain, Arunesh Sinha, JeongGil Ko, Rajesh Balan
Tracking in dense indoor environments where several thousands of people move around is an extremely challenging problem. In this paper, we present a system — DenseTrack for tracking people in such environments. DenseTrack leverages data from the sensing modalities that are already present in these environments — Wi-Fi (from enterprise network deployments) and Video (from surveillance cameras). We combine
-
Hybrid machine learning model for malware analysis in android apps Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-11-08 Saba Bashir, Farwa Maqbool, Farhan Hassan Khan, Asif Sohail Abid
Android smartphones have been widely adopted across the globe. They have the capability to access private and confidential information resulting in these devices being targeted by malware devisers. The dramatic escalation of assaults build an awareness to create a robust system that detects the occurrence of malicious actions in Android applications. The malware exposure study consists of static and
-
DA-HAR: Dual adversarial network for environment-independent WiFi human activity recognition Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-10-27 Long Sheng, Yue Chen, Shuli Ning, Shengpeng Wang, Bin Lian, Zhongcheng Wei
As the cornerstone of the development of emerging integrated sensing and communication, human activity recognition technology based on WiFi signals has been extensively studied. However, the existing activity sensing models will suffer serious performance degradation when applied to new scenarios due to the influence of environmental dynamics. To address this issue, we present an environment-independent
-
MRIM: Lightweight saliency-based mixed-resolution imaging for low-power pervasive vision Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-10-27 Ji-Yan Wu, Vithurson Subasharan, Tuan Tran, Kasun Gamlath, Archan Misra
While many pervasive computing applications increasingly utilize real-time context extracted from a vision sensing infrastructure, the high energy overhead of DNN-based vision sensing pipelines remains a challenge for sustainable in-the-wild deployment. One common approach to reducing such energy overheads is the capture and transmission of lower-resolution images to an edge node (where the DNN inferencing
-
Efficient concept drift handling for batch android malware detection models Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-10-20 Borja Molina-Coronado, Usue Mori, Alexander Mendiburu, Jose Miguel-Alonso
The rapidly evolving nature of Android apps poses a significant challenge to static batch machine learning algorithms employed in malware detection systems, as they quickly become obsolete. Despite this challenge, the existing literature pays limited attention to addressing this issue, with many advanced Android malware detection approaches, such as Drebin, DroidDet and MaMaDroid, relying on static
-
Lightweight accurate trigger to reduce power consumption in sensor-based continuous human activity recognition Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-10-05 Emanuele Lattanzi, Lorenzo Calisti, Paolo Capellacci
Wearable devices have become increasingly popular in recent years, and they offer a great opportunity for sensor-based continuous human activity recognition in real-world scenarios. However, one of the major challenges is their limited battery life. In this study, we propose an energy-aware human activity recognition framework for wearable devices based on a lightweight accurate trigger. The trigger
-
Energy–Aware security protocol for IoT devices Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-10-01 Malak Barari, Ramzi Saifan
Internet of Things (IoT) has permeated various aspects of modern life, from smart homes to factories and even gardens. In the coming years, number of IoT devices is expected to surpass that of computers, laptops, mobile phones, and tablets. However, many of these devices are small and operate on batteries, making energy efficiency a significant challenge. This challenge affects all aspects of IoT,
-
Behavioural patterns discovery for lifestyle analysis from egocentric photo-streams Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-09-27 Martín Menchón, Estefania Talavera, José Massa, Petia Radeva
Automatic tools for the analysis of human behaviour are very important when aiming to understand the lifestyle of people. Egocentric wearable cameras allow the capture of images during long periods of time and in this way bring objective evidence of the experiences of the user. In this paper, we propose a novel framework to discover behavioural patterns following an unsupervised greedy approach based
-
A model for automatic selection of IoT services in ambient assisted living for the elderly Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-09-25 Luca Sabatucci, Massimo Cossentino, Claudia Di Napoli, Angelo Susi
Context: Engineering Ambient Assisted Living applications for the elderly is challenging due to the diversity and rapid changes of both end users’ needs and technological environment equipment. Objective: Assistive applications can be provided as combinations of functionalities provided by IoT devices. With the pervasive availability of functionally equivalent IoT devices, they should be selected according
-
A dynamic group key agreement scheme for UAV networks based on blockchain Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-09-19 Jie Zhou, Ming Luo, Lixin Song, Jinlin Hu
In mobile ad hoc networks (MANETs), group communication is an important communication mode, and group key agreement technology is the key to ensure the security of group communication. Due to the influence of node movement, topology change and network congestion in MANETs, the traditional group key agreement technology has many security and performance problems, such as node authentication, access
-
A puf-based three-party authentication key establishment scheme for fog-enabled smart home Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-09-18 Huan Yang, Yajun Guo, Yimin Guo
With the rise of Internet of Things (IoT), the smart home is another emerging concept and application of IoT, where security and private data of devices are important. In this paper, fog computing is applied to the smart home environment, where fog can provide many smart features and services to the smart home. Fog computing has many advantages, such as low latency and real-time interaction. However
-
The geodesic mutual visibility problem: Oblivious robots on grids and trees Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-09-11 Serafino Cicerone, Alessia Di Fonso, Gabriele Di Stefano, Alfredo Navarra
The Mutual Visibility is a well-known problem in the context of mobile robots. For a set of n robots disposed in the Euclidean plane, it asks for moving the robots without collisions so as to achieve a placement ensuring that no three robots are collinear. For robots moving on graphs, we consider the Geodesic Mutual Visibility (GMV) problem. Robots move along the edges of the graph, without collisions
-
-
Automated, ecologic assessment of frailty using a wrist-worn device Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-08-23 Domenico Minici, Guglielmo Cola, Giulia Perfetti, Sofia Espinoza Tofalos, Mauro Di Bari, Marco Avvenuti
The COVID-19 pandemic has considerably shifted the focus of scientific research, speeding up the process of digitizing medical monitoring. Wearable technology is already widely used in medical research, as it has the potential to monitor the user’s physical activity in daily life. This study aims to explore in-home collected wearable-derived signals for frailty status assessment. A sample of 35 subjects
-
FogLBS: Utilizing fog computing for providing mobile Location-Based Services to mobile customers Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-08-14 Mariam Orabi, Zaher Al Aghbari, Ibrahim Kamel
The growth of Location-Based Services (LBSs) has been made possible by the widespread use of GPS-enabled devices. Some important LBSs require the ability to quickly process moving spatial-keyword queries over moving objects, such as when a moving customer is looking for a nearby mobile fuel delivery service. While there have been solutions proposed for scenarios where either the queries or the objects
-
Transferrable contextual feature clusters for parking occupancy prediction Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-08-09 Wei Shao, Yu Zhang, Pengfei Xiao, Kyle Kai Qin, Mohammad Saiedur Rahaman, Jeffrey Chan, Bin Guo, Andy Song, Flora D. Salim
Recently, real-time parking availability prediction has attracted much attention since the rapid development of sensor technologies and urbanisation. Most existing works have applied various models to predict long and short-term parking occupancy using historical records. However, historical records are not available for many real-world scenarios, such as new urban areas, where parking lots are fast
-
Secure and efficient blockchain-based consensus scheme for MWSNs with clustered architecture Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-08-02 Weiwei Qi, Yu Xia, Pan Zhu, Shushu Zhang, Liucun Zhu, Shanjun Zhang
Blockchain has proven in sensor networks as a distributed solution for transparent and secure storage, which allows its application in mobile wireless sensor networks (MWSNs). The consensus mechanism, an essential aspect of blockchain technology, must concern the high mobility, resource-constrained nature, and weak physical defenses of sensor nodes in MWSNs. To secure MWSN data storage in clustered
-
An efficient heterogeneous signcryption scheme for internet of things Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-07-19 Penghui Zhou, Chunhua Jin, Zhiwei Chen, Guanhua Chen, Lanfang Wang
In today’s world, Internet of Things (IoT) has penetrated every aspect of us. The security of IoT is challenging because of the open nature of wireless communication and limited resources of sensor nodes (SNs). In this paper, we propose an efficient heterogeneous signcryption scheme from IoT to an Internet server, in which the server is in a public key infrastructure (PKI) environment, while the IoT
-
Wireless power transfer with unmanned aerial vehicles: State of the art and open challenges Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-07-05 Tamoghna Ojha, Theofanis P. Raptis, Andrea Passarella, Marco Conti
Wireless power transfer (WPT) techniques are emerging as a fundamental component of next-generation energy management in mobile networks. In this context, the use of UAVs opens many possibilities, either using them as mobile energy storage devices to recharge IoT nodes, or to prolong their operation time via smart charging themselves at ground stations. This paper surveys the recent literature on WPT
-
Online continual learning for human activity recognition Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-06-24 Martin Schiemer, Lei Fang, Simon Dobson, Juan Ye
Sensor-based human activity recognition (HAR), with the ability to recognise human activities from wearable or embedded sensors, has been playing an important role in many applications including personal health monitoring, smart home, and manufacturing. The real-world, long-term deployment of these HAR systems drives a critical research question: how to evolve the HAR model automatically over time
-
Embedded federated learning over a LoRa mesh network Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-06-22 Nil Llisterri Giménez, Joan Miquel Solé, Felix Freitag
In on-device training of machine learning models on microcontrollers a neural network is trained on the device. A specific approach for collaborative on-device training is federated learning. In this paper, we propose embedded federated learning on microcontroller boards using the communication capacity of a LoRa mesh network. We apply a dual board design: The machine learning application that contains
-
IoT systems with multi-tier, distributed intelligence: From architecture to prototype Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-06-22 Nada GabAllah, Ibrahim Farrag, Ramy Khalil, Hossam Sharara, Tamer ElBatt
In this paper, we propose an architecture, design and build a prototype of a novel IoT system with intelligence, distributed at multiple tiers including the network edge. Our proposed architecture hosts a modular, three-tier IoT system including the edge, gateway (fog) and cloud tiers. The proposed system relies on data acquired by edge devices to realize a distributed machine learning model and achieve
-
SmartSPEC: A framework to generate customizable, semantics-based smart space datasets Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-06-12 Andrew Chio, Daokun Jiang, Peeyush Gupta, Georgios Bouloukakis, Roberto Yus, Sharad Mehrotra, Nalini Venkatasubramanian
This paper presents SmartSPEC, an approach to generate customizable synthetic smart space datasets using sensorized spaces in which people and events are embedded. Smart space datasets are critical to design, deploy and evaluate systems and applications under issues of heterogeneity, scalability and robustness, leading to cost-effective operation which improves the safety, comfort and convenience experienced
-
Balancing local vs. remote state allocation for micro-services in the cloud–edge continuum Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-06-08 Carlo Puliafito, Claudio Cicconetti, Marco Conti, Enzo Mingozzi, Andrea Passarella
In the world of cloud technologies, serverless computing has now settled as a stable and promising resident. This gives a cloud provider the flexibility to provide its users with both Platform-as-a-Service (PaaS), i.e., the back-end application runs in a dedicated container, or Function-as-a-Service (FaaS), i.e., the back-end logic is offered as elementary functions that are invoked by the client applications
-
Fog-ROCL: A Fog based RSU Optimum Configuration and Localization in VANETs Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-06-01 Rehab Shahin, Sherif M. Saif, Ali A. El-Moursy, Hazem M. Abbas, Salwa M. Nassar
Intelligent Transportation Systems (ITS) are one of the pillars of smart cities that enable smart traffic and smart mobility. Vehicular Ad-hoc Networks (VANETs) are utilized as platforms for ITS applications. In VANETs, vehicles collect relevant information from sensors and exchange information about road conditions and traffic status with each other and with roadside units (RSUs). Roadside units facilitate
-
A cooperative MEC framework based on multi-UAV and AP to minimize weighted energy consumption Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-05-26 Qiang Tang, Chuan Liu, Linjiang Li, Shiming He, Jin Wang
In this paper, a cooperative MEC system with multi-UAV and a ground access point (AP) is considered, in which UAVs can act as both a computing platform to help Internet of Things devices (IoTDs) deal with their computing tasks and a relay platform to offload some of the task data from IoTDs to the AP with higher computing ability. We aim to minimize the weighted overall energy consumption of UAVs and
-
Deep learning based speed bumps detection and characterization using smartphone sensors Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-05-16 Amir Salman, Adnan Noor Mian
In recent years lot of research has been done on road surface anomaly detection due to the widespread availability of smartphones, pre-equipped with diverse sensors. The existing literature is mainly focused on speed bump, pot-hole and man-hole and does not provide any information about the type of bumps. Speed bumps have four major types i.e. sinusoidal-profile, flat-top, thermoplastic and round-top
-
HED-FL: A hierarchical, energy efficient, and dynamic approach for edge Federated Learning Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-05-13 Floriano De Rango, Antonio Guerrieri, Pierfrancesco Raimondo, Giandomenico Spezzano
The increasing data produced by IoT devices and the need to harness intelligence in our environments impose the shift of computing and intelligence at the edge, leading to a novel computing paradigm called Edge Intelligence/Edge AI. This paradigm combines Artificial Intelligence and Edge Computing, enables the deployment of machine learning algorithms to the edge, where data is generated, and is able
-
BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-05-10 Matteo Cardaioli, Mauro Conti, Gabriele Orazi, Pier Paolo Tricomi, Gene Tsudik
Authentication and de-authentication phases should occur at the beginning and end of secure user sessions, respectively. A secure session requires the user to pass the former, but the latter is often underestimated or ignored. Unattended or dangling sessions expose users to well-known Lunchtime Attacks. To mitigate this threat, researchers focused on automated de-authentication systems, either as a
-
CitySpec with shield: A secure intelligent assistant for requirement formalization Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-05-09 Zirong Chen, Isaac Li, Haoxiang Zhang, Sarah Preum, John A. Stankovic, Meiyi Ma
An increasing number of monitoring systems have been developed in smart cities to ensure that a city’s real-time operations satisfy safety and performance requirements. However, many existing city requirements are written in English with missing, inaccurate, or ambiguous information. There is a high demand for assisting city policymakers in converting human-specified requirements to machine-understandable
-
Deadline-aware multi-objective IoT services placement optimization in fog environment using parallel FFD-genetic algorithm Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-05-06 Fatemeh Saadian, Homayun Motameni, Mehdi Golsorkhtabaramiri
Nowadays, Internet of things has become as an inevitable aspect of humans’ IT-based life. A huge number of geo-distributed IoT enabled devices such as smart phones, smart cameras, health care systems, vehicles, etc. are connected to the Internet and manage users’ applications. The IoT applications are generally time sensitive, so that giving them up to Cloud and receiving the response may violate their
-
Sustainable fixed wireless access with blockchain secured software defined network Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-05-06 Müge Erel-Özçevı̇k
Recently, there has been a tremendous increase in the number of service providers offering Fixed Wireless Access (FWA). The main goal of service providers is to offer guaranteed service (GB/month) for all contents by meeting sustainability Key Performance Indicators (KPIs): cost-efficiency and security. To minimize the risk of physical deployment and handle partial recovery, network slicing between
-
Are you talking to me? An Audio Augmented Reality conversational guide for cultural heritage Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-05-02 Michalis Tsepapadakis, Damianos Gavalas
Augmented Reality (AR) technologies are increasingly utilized as a means of stimulating immersive experiences to cultural site visitors, mainly through visual superimposition of interactive digital elements onto the physical world. Recent research has investigated the use of Audio AR (AAR) in heritage sites, wherein visitors listen to spatially registered sound which could be attributed to ‘talking’
-
Reinforcement learning for autonomous vehicle movements in wireless multimedia applications Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-04-27 Haitham Afifi, Arunselvan Ramaswamy, Holger Karl
We develop a Deep Reinforcement Learning (DeepRL)-based, multi-agent algorithm to efficiently control autonomous vehicles that are typically used within the context of Wireless Sensor Networks (WSNs), in order to boost application performance. As an application example, we consider wireless acoustic sensor networks where a group of speakers move inside a room. In a traditional setup, microphones cannot
-
HCALA: Hyperelliptic curve-based anonymous lightweight authentication scheme for Internet of Drones Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-04-25 Aymen Dia Eddine Berini, Mohamed Amine Ferrag, Brahim Farou, Hamid Seridi
A drone is often called an ”Unmanned Aerial Vehicle” or UAV. It is utilized in various civilian and military applications, including agriculture, surveillance, and delivery of packages. A promising idea for enhancing the safety and quality of drone flight is to build the Internet of Drones (IoD), in which drones are used to collect sensitive data, which is then communicated in real-time to external
-
TR-ReFloc: A TR-based Framework for Recovering Missed RSS for WiFi indoor positioning in the offline and online phase Pervasive Mob. Comput. (IF 4.3) Pub Date : 2023-04-19 Jianli Zhao, Liang Li, Mengdie Zhang, Hao Li, ChunXiu Li
The research on WiFi-based fingerprint positioning has become an important topic in the field of indoor positioning due to its low-cost deployment and widespread applications. However, received signal strength (RSS) from access points (APs) may be missed due to factors such as Green WiFi or AP malfunctions. Traditional approach often set the missed RSS to a predetermined default value, which may not