-
Federated Kalman Filter for Secure IoT-based Device Monitoring Services
Authors:
Marc Jayson Baucas,
Petros Spachos
Abstract:
Device monitoring services have increased in popularity with the evolution of recent technology and the continuously increased number of Internet of Things (IoT) devices. Among the popular services are the ones that use device location information. However, these services run into privacy issues due to the nature of data collection and transmission. In this work, we introduce a platform incorporat…
▽ More
Device monitoring services have increased in popularity with the evolution of recent technology and the continuously increased number of Internet of Things (IoT) devices. Among the popular services are the ones that use device location information. However, these services run into privacy issues due to the nature of data collection and transmission. In this work, we introduce a platform incorporating Federated Kalman Filter (FKF) with a federated learning approach and private blockchain technology for privacy preservation. We analyze the accuracy of the proposed design against a standard Kalman Filter (KF) implementation of localization based on the Received Signal Strength Indicator (RSSI). The experimental results reveal significant potential for improved data estimation for RSSI-based localization in device monitoring.
△ Less
Submitted 3 April, 2023;
originally announced April 2023.
-
Public Key Reinforced Blockchain Platform for Fog-IoT Network System Administration
Authors:
Marc Jayson Baucas,
Petros~Spachos,
Konstantinos Plataniotis
Abstract:
The number of embedded devices that connect to a wireless network has been growing for the past decade. This interaction creates a network of Internet of Things (IoT) devices where data travel continuously. With the increase of devices and the need for the network to extend via fog computing, we have fog-based IoT networks. However, with more endpoints introduced to it, the network becomes open to…
▽ More
The number of embedded devices that connect to a wireless network has been growing for the past decade. This interaction creates a network of Internet of Things (IoT) devices where data travel continuously. With the increase of devices and the need for the network to extend via fog computing, we have fog-based IoT networks. However, with more endpoints introduced to it, the network becomes open to malicious attackers. This work attempts to protect fog-based IoT networks by creating a platform that secures the endpoints through public-key encryption. The servers are allowed to mask the data packets shared within the network. To be able to track all of the encryption processes, we incorporated the use of permissioned blockchains. This technology completes the security layer by providing an immutable and automated data structure to function as a hyper ledger for the network. Each data transaction incorporates a handshake mechanism with the use of a public key pair. This design guarantees that only devices that have proper access through the keys can use the network. Hence, management is made convenient and secure. The implementation of this platform is through a wireless server-client architecture to simulate the data transactions between devices. The conducted qualitative tests provide an in-depth feasibility investigation on the network's levels of security. The results show the validity of the design as a means of fortifying the network against endpoint attacks.
△ Less
Submitted 11 August, 2021;
originally announced August 2021.
-
Internet-of-Things Devices and Assistive Technologies for Healthcare: Applications, Challenges, and Opportunities
Authors:
Marc Jayson Baucas,
Petros Spachos,
Stefano Gregori
Abstract:
Medical conditions and cases are growing at a rapid pace, where physical space is starting to be constrained. Hospitals and clinics no longer have the ability to accommodate large numbers of incoming patients. It is clear that the current state of the health industry needs to improve its valuable and limited resources. The evolution of the Internet of Things (IoT) devices along with assistive tech…
▽ More
Medical conditions and cases are growing at a rapid pace, where physical space is starting to be constrained. Hospitals and clinics no longer have the ability to accommodate large numbers of incoming patients. It is clear that the current state of the health industry needs to improve its valuable and limited resources. The evolution of the Internet of Things (IoT) devices along with assistive technologies can alleviate the problem in healthcare, by being a convenient and easy means of accessing healthcare services wirelessly. There is a plethora of IoT devices and potential applications that can take advantage of the unique characteristics that these technologies can offer. However, at the same time, these services pose novel challenges that need to be properly addressed. In this article, we review some popular categories of IoT-based applications for healthcare along with their devices. Then, we describe the challenges and discuss how research can properly address the open issues and improve the already existing implementations in healthcare. Further possible solutions are also discussed to show their potential in being viable solutions for future healthcare applications
△ Less
Submitted 11 July, 2021;
originally announced July 2021.
-
IoT-based Smart Home Device Monitor Using Private Blockchain Technology and Localization
Authors:
Marc Jayson Baucas,
Stephen Andrew Gadsden,
Petros Spachos
Abstract:
Internet of Things (IoT)-based smart home applications are rising in popularity. However, this trend attracts malicious activity, which causes cost-efficient security to be in high demand. This paper proposes a low-end design that reinforces the security of a home network. It uses private blockchain technology and localization via RSSI-based trilateration. We investigated the benefits of private b…
▽ More
Internet of Things (IoT)-based smart home applications are rising in popularity. However, this trend attracts malicious activity, which causes cost-efficient security to be in high demand. This paper proposes a low-end design that reinforces the security of a home network. It uses private blockchain technology and localization via RSSI-based trilateration. We investigated the benefits of private blockchains over their public counterpart, and we improve the precision of the localization algorithm by testing it against different wireless technologies. The results conclude that using a private blockchain with a WiFi-based communication system produces the most efficient iteration of the proposed design.
△ Less
Submitted 29 March, 2021;
originally announced March 2021.
-
Using Cloud and Fog Computing for Large Scale IoT-based Urban Sound Classification
Authors:
Marc Jayson Baucas,
Petros Spachos
Abstract:
The Internet of Things (IoT) has become the forefront of bridging different technologies together. It brings rise to online computational services that make mundane tasks convenient. However, the volume of devices connecting to the network started to increase. In turn, services that thrived on centralized storage are being strained and overloaded. As applications and software advances, processing…
▽ More
The Internet of Things (IoT) has become the forefront of bridging different technologies together. It brings rise to online computational services that make mundane tasks convenient. However, the volume of devices connecting to the network started to increase. In turn, services that thrived on centralized storage are being strained and overloaded. As applications and software advances, processing and computational power become a concern to technology companies. With data risks and large numbers of connected devices, cloud computing has become outdated. Devices are forced to commit unnecessary expenses to stay relevant in the market due to the increase in software complexity. This need for change resulted in the introduction of edge computing. Edge computing distributes the computational strain between the server and the devices. This contribution allows the cloud to accommodate more users and devices are no longer in need to make significant changes to their design every so often. Many real-time applications have evolved to require high amounts of processing power to execute. For example, sound classification comes with massive computational needs due to its affiliation with neural networks and deep learning. This paper aims to create a feasible and deployable real-time sound classification system. There were three configurations tested in this paper. The results of our experiments show that cloud computing and edge computing alone cannot cater to a technological market that is exponentially growing in size and complexity. However, the same results show promise in finding optimal configurations in terms of a combination of end device power consumption, application runtime and server latency to systems instead of focusing on a single model. Overall, it is better to take into consideration the strengths and weaknesses of each computing architecture.
△ Less
Submitted 16 October, 2019;
originally announced October 2019.