Skip to main content

Showing 1–50 of 72 results for author: Perera, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.05459  [pdf

    cs.CR cs.ET

    PriviFy: Designing Tangible Interfaces for Configuring IoT Privacy Preferences

    Authors: Bayan Al Muhander, Omer Rana, Charith Perera

    Abstract: The Internet of Things (IoT) devices, such as smart speakers can collect sensitive user data, necessitating the need for users to manage their privacy preferences. However, configuring these preferences presents users with multiple challenges. Existing privacy controls often lack transparency, are hard to understand, and do not provide meaningful choices. On top of that, users struggle to locate p… ▽ More

    Submitted 8 June, 2024; originally announced June 2024.

  2. arXiv:2406.05451  [pdf

    cs.CR cs.ET

    PrivacyCube: Data Physicalization for Enhancing Privacy Awareness in IoT

    Authors: Bayan Al Muhander, Nalin Arachchilage, Yasar Majib, Mohammed Alosaimi, Omer Rana, Charith Perera

    Abstract: People are increasingly bringing Internet of Things (IoT) devices into their homes without understanding how their data is gathered, processed, and used. We describe PrivacyCube, a novel data physicalization designed to increase privacy awareness within smart home environments. PrivacyCube visualizes IoT data consumption by displaying privacy-related notices. PrivacyCube aims to assist smart home… ▽ More

    Submitted 8 June, 2024; originally announced June 2024.

  3. arXiv:2210.03520  [pdf, ps, other

    cs.CR

    Exploring the Relationships between Privacy by Design Schemes and Privacy Laws: A Comparative Analysis

    Authors: Atheer Aljeraisy, Masoud Barati, Omer Rana, Charith Perera

    Abstract: Internet of Things (IoT) applications have the potential to derive sensitive information about individuals. Therefore, developers must exercise due diligence to make sure that data are managed according to the privacy regulations and data protection laws. However, doing so can be a difficult and challenging task. Recent research has revealed that developers typically face difficulties when complyi… ▽ More

    Submitted 5 October, 2022; originally announced October 2022.

    Comments: Technical Report

  4. arXiv:2210.02650  [pdf, other

    cs.CR

    PrivacyCube: A Tangible Device for Improving Privacy Awareness in IoT

    Authors: Bayan Al Muhander, Omer Rana, Nalin Arachchilage, Charith Perera

    Abstract: Consumers increasingly bring IoT devices into their living spaces without understanding how their data is collected, processed, and used. We present PrivacyCube, a novel tangible device designed to explore the extent to which privacy awareness in smart homes can be elevated. PrivacyCube visualises IoT devices' data consumption displaying privacy-related notices. PrivacyCube aims at assisting famil… ▽ More

    Submitted 5 October, 2022; originally announced October 2022.

    Comments: In Proceedings of the 2022 IEEE/ACM Seventh International Conference on Internet-of-Things Design and Implementation (IoTDI) 2022

  5. arXiv:2210.02642  [pdf, other

    cs.SD cs.AI eess.AS

    Feasibility on Detecting Door Slamming towards Monitoring Early Signs of Domestic Violence

    Authors: Osian Morgan, Hakan Kayan, Charith Perera

    Abstract: By using low-cost microcontrollers and TinyML, we investigate the feasibility of detecting potential early warning signs of domestic violence and other anti-social behaviors within the home. We created a machine learning model to determine if a door was closed aggressively by analyzing audio data and feeding this into a convolutional neural network to classify the sample. Under test conditions, wi… ▽ More

    Submitted 5 October, 2022; originally announced October 2022.

    Comments: In Proceedings of the 2022 IEEE/ACM Seventh International Conference on Internet-of-Things Design and Implementation (IoTDI) 2022

  6. arXiv:2210.02640  [pdf, other

    cs.IR

    ForestQB: An Adaptive Query Builder to Support Wildlife Research

    Authors: Omar Mussa, Omer Rana, Benoît Goossens, Pablo Orozco-terWengel, Charith Perera

    Abstract: This paper presents ForestQB, a SPARQL query builder, to assist Bioscience and Wildlife Researchers in accessing Linked-Data. As they are unfamiliar with the Semantic Web and the data ontologies, ForestQB aims to empower them to benefit from using Linked-Data to extract valuable information without having to grasp the nature of the data and its underlying technologies. ForestQB is integrating Form… ▽ More

    Submitted 5 October, 2022; originally announced October 2022.

    Comments: In Proceedings of the 12th International Semantic Web Conference (Posters & Demonstrations Track), 2022

  7. arXiv:2210.01853  [pdf, other

    cs.CR cs.NI

    Privacy-Patterns for IoT Application Developers

    Authors: Nada Alhirabi, Stephanie Beaumont, Omer Rana, Charith Perera

    Abstract: Designing Internet of things (IoT) applications (apps) is challenging due to the heterogeneous nature of the systems on which these apps are deployed. Personal data, often classified as sensitive, may be collected and analysed by IoT apps, where data privacy laws are expected to protect such information. Various approaches already exist to support privacy-by-design (PbD) schemes, enabling develope… ▽ More

    Submitted 4 October, 2022; originally announced October 2022.

    Comments: In Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp/ISWC '22)

  8. Detecting Anomalies within Smart Buildings using Do-It-Yourself Internet of Things

    Authors: Yasar Majib, Mahmoud Barhamgi, Behzad Momahed Heravi, Sharadha Kariyawasam, Charith Perera

    Abstract: Detecting anomalies at the time of happening is vital in environments like buildings and homes to identify potential cyber-attacks. This paper discussed the various mechanisms to detect anomalies as soon as they occur. We shed light on crucial considerations when building machine learning models. We constructed and gathered data from multiple self-build (DIY) IoT devices with different in-situ sen… ▽ More

    Submitted 4 October, 2022; originally announced October 2022.

    Comments: Journal of Ambient Intelligence and Humanized Computing (2022)

    Journal ref: Journal of Ambient Intelligence and Humanized Computing (2022)

  9. arXiv:2210.01778  [pdf, other

    cs.CR cs.NI

    Semantics-based Privacy by Design for Internet of Things Applications

    Authors: Lamya Alkhariji, Suparna De, Omer Rana, Charith Perera

    Abstract: As Internet of Things (IoT) technologies become more widespread in everyday life, privacy issues are becoming more prominent. The aim of this research is to develop a personal assistant that can answer software engineers' questions about Privacy by Design (PbD) practices during the design phase of IoT system development. Semantic web technologies are used to model the knowledge underlying PbD meas… ▽ More

    Submitted 4 October, 2022; originally announced October 2022.

    Journal ref: Future Generation Computer Systems, Volume 138, January 2023, Pages 280-295

  10. arXiv:2210.01771  [pdf, other

    cs.NI

    AnoML-IoT: An End to End Re-configurable Multi-protocol Anomaly Detection Pipeline for Internet of Things

    Authors: Hakan Kayan, Yasar Majib, Wael Alsafery, Mahmoud Barhamgi, Charith Perera

    Abstract: The rapid development in ubiquitous computing has enabled the use of microcontrollers as edge devices. These devices are used to develop truly distributed IoT-based mechanisms where machine learning (ML) models are utilized. However, integrating ML models to edge devices requires an understanding of various software tools such as programming languages and domain-specific knowledge. Anomaly detecti… ▽ More

    Submitted 4 October, 2022; originally announced October 2022.

    Comments: Elsevier Internet of Things, Volume 16, 100437, December 2021

    Journal ref: Elsevier Internet of Things, Volume 16, 100437, December 2021

  11. arXiv:2210.01614  [pdf, other

    cs.NI

    Low-Cost SMS Driven Location Tracking Platform Towards Anti-Poaching Efforts

    Authors: Jack Burkett, Pablo Orozco Ter Wengel, Benoit Goossens, Omer Rana, Charith Perera

    Abstract: Throughout the world, poaching has been an ever-present threat to a vast array of species for over many decades. Traditional anti-poaching initiatives target catching the poachers. However, the challenge is far more complicated than catching individual poachers. Poaching is an industry which needs to be fully investigated. Many stakeholders are directly and indirectly involved in poaching activiti… ▽ More

    Submitted 4 October, 2022; originally announced October 2022.

    Comments: Technical Report

  12. arXiv:2101.03564  [pdf, other

    cs.CR

    Cybersecurity of Industrial Cyber-Physical Systems: A Review

    Authors: Hakan Kayan, Matthew Nunes, Omer Rana, Pete Burnap, Charith Perera

    Abstract: Industrial cyber-physical systems (ICPSs) manage critical infrastructures by controlling the processes based on the "physics" data gathered by edge sensor networks. Recent innovations in ubiquitous computing and communication technologies have prompted the rapid integration of highly interconnected systems to ICPSs. Hence, the "security by obscurity" principle provided by air-gap** is no longer… ▽ More

    Submitted 10 January, 2021; originally announced January 2021.

    Comments: 32 pages, 10 figures

  13. arXiv:2011.03747  [pdf, other

    cs.SE

    Synthesising Privacy by Design Knowledge Towards Explainable Internet of Things Application Designing in Healthcare

    Authors: Lamya Alkhariji, Nada Alhirabi, Mansour Naser Alraja, Mahmoud Barhamgi, Omer Rana, Charith Perera

    Abstract: Privacy by Design (PbD) is the most common approach followed by software developers who aim to reduce risks within their application designs, yet it remains commonplace for developers to retain little conceptual understanding of what is meant by privacy. A vision is to develop an intelligent privacy assistant to whom developers can easily ask questions in order to learn how to incorporate differen… ▽ More

    Submitted 7 November, 2020; originally announced November 2020.

    Comments: ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) (In-Print)

  14. arXiv:2006.13633  [pdf, other

    cs.HC

    Privacy-Aware Internet of Things Notices in Shared Spaces: A Survey

    Authors: Bayan Al Muhander, Jason Wiese, Omer Rana, Charith Perera

    Abstract: The balance between protecting users' privacy while providing cost-effective devices that are functional and usable is a key challenge in the burgeoning Internet of Things (IoT) industry. While in traditional desktop and mobile contexts the primary user interface is a screen, in IoT screens are rare or very small, which invalidate most of the traditional approaches. We examine how end-users intera… ▽ More

    Submitted 18 March, 2021; v1 submitted 24 June, 2020; originally announced June 2020.

  15. arXiv:2004.10781  [pdf, other

    cs.CR

    Cyberattacks and Countermeasures For In-Vehicle Networks

    Authors: Emad Aliwa, Omer Rana, Charith Perera, Peter Burnap

    Abstract: As connectivity between and within vehicles increases, so does concern about safety and security. Various automotive serial protocols are used inside vehicles such as Controller Area Network (CAN), Local Interconnect Network (LIN) and FlexRay. CAN bus is the most used in-vehicle network protocol to support exchange of vehicle parameters between Electronic Control Units (ECUs). This protocol lacks… ▽ More

    Submitted 22 April, 2020; originally announced April 2020.

  16. arXiv:2001.00975  [pdf, other

    cs.DB cs.CR cs.DC

    Privacy in Data Service Composition

    Authors: Mahmoud Barhamgi, Charith Perera, Chia-Mu Yu, Djamal Benslimane, David Camacho, Christine Bonnet

    Abstract: In modern information systems different information features, about the same individual, are often collected and managed by autonomous data collection services that may have different privacy policies. Answering many end-users' legitimate queries requires the integration of data from multiple such services. However, data integration is often hindered by the lack of a trusted entity, often called a… ▽ More

    Submitted 3 January, 2020; originally announced January 2020.

  17. arXiv:1911.06607  [pdf, other

    cs.HC cs.CR

    Context Aware Family Dynamics based Internet of Things Access Control Towards Better Child Safety

    Authors: Yasar Majib, Charith Perera

    Abstract: Today, children are increasingly connected to the Internet and consume content and services through various means. It has been a challenge for less tech-savvy parents to protect children from harmful content and services. Internet of Things (IoT) has made the situation much worse as IoT devices allow children to connect to the Internet in novel ways (e.g., connected refrigerators, TVs, and so on).… ▽ More

    Submitted 5 November, 2019; originally announced November 2019.

  18. arXiv:1911.02063  [pdf, other

    cs.NI

    Exploring the Suitability of BLE Beacons to Track Poacher Vehicles in Harsh Jungle Terrains

    Authors: Karan Juj, Charith Perera

    Abstract: Our overall aim is focused on exploring whether we could use Bluetooth Low Energy (BLE) technology to track poacher vehicles in remote and rural areas such as Sabah, in Malaysia, especially deep inside the jungle terrain with little or no communication technologies exists. Tracking technologies are currently limited to relying on satellites or cellular towers, for environments that do not permit a… ▽ More

    Submitted 5 November, 2019; originally announced November 2019.

  19. arXiv:1910.09911  [pdf, other

    cs.SE cs.HC

    Designing Security and Privacy Requirements in Internet of Things: A Survey

    Authors: Nada Alhirabi, Omer Rana, Charith Perera

    Abstract: The design and development process for the Internet of Things (IoT) applications is more complicated than that for desktop, mobile, or web applications. First, IoT applications require both software and hardware to work together across different nodes with different capabilities under different conditions. Secondly, IoT application development involves different software engineers such as desktop,… ▽ More

    Submitted 22 October, 2019; originally announced October 2019.

    Comments: 36 pages

  20. arXiv:1908.02724  [pdf

    cs.SE

    Envisioning Tool Support for Designing Privacy-Aware Internet of Thing Applications

    Authors: Charith Perera, Mahmoud Barhamgi, Massimo Vecchio

    Abstract: The design and development process for Internet of Things (IoT) applications is more complicated than for desktop, mobile, or web applications. IoT applications require both software and hardware to work together across multiple different types of nodes (e.g., microcontrollers, system-on-chips, mobile phones, miniaturised single-board computers, and cloud platforms) with different capabilities und… ▽ More

    Submitted 28 November, 2020; v1 submitted 6 August, 2019; originally announced August 2019.

  21. arXiv:1906.03524  [pdf, other

    cs.HC

    PizzaBox: Studying Internet Connected Physical Object Manipulation based Food Ordering

    Authors: Luke Jones, Charith Perera

    Abstract: This paper presents the designing and testing of PizzaBox, a 3D printed, interactive food ordering system that aims to differ from conventional food ordering systems and provide an entertaining and unique experience when ordering a pizza by incorporating underlying technologies that support ubiquitous computing. The PizzaBox has gone through both low and medium fidelity testing while working colla… ▽ More

    Submitted 8 June, 2019; originally announced June 2019.

  22. arXiv:1906.00026  [pdf, other

    cs.HC

    IoT Skullfort: Exploring the Impact of Internet Connected Cosplay

    Authors: Rhys Beckett, Charith Perera

    Abstract: In this paper, we explore the potential impact of Internet of Things (IoT) technology may have on the cosplay community. We developed a costume (an IoT Skullfort) and embedded IoT technology to enhance its capabilities and user interactions. Sensing technologies are widely used in many different wearable domains including cosplay scenarios. However, in most of these scenarios, typical interaction… ▽ More

    Submitted 8 July, 2019; v1 submitted 28 May, 2019; originally announced June 2019.

    Journal ref: Proceedings of the 2019 ACM International Joint Conference and 2019 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers

  23. arXiv:1905.11652  [pdf

    cs.HC cs.CY

    Crowdsourced Peer Learning Activity for Internet of Things Education: A Case Study

    Authors: Ahmed Hussein, Mahmoud Barhamgi, Massimo Vecchio, Charith Perera

    Abstract: Computing devices such as laptops, tablets and mobile phones have become part of our daily lives. End users increasingly know more and more information about these devices. Further, more technically savvy end users know how such devices are being built and know how to choose one over the others. However, we cannot say the same about the Internet of Things (IoT) products. Due to its infancy nature… ▽ More

    Submitted 28 May, 2019; originally announced May 2019.

  24. arXiv:1904.06705  [pdf, other

    cs.NI eess.SP

    A Spatial-Temporal Correlation Approach for Data Reduction in Cluster-Based Sensor Networks

    Authors: Gaby Bou Tayeh, Abdallah Makhoul, Charith Perera, Jacques Demerjian

    Abstract: In a resource-constrained Wireless Sensor Networks (WSNs), the optimization of the sampling and the transmission rates of each individual node is a crucial issue. A high volume of redundant data transmitted through the network will result in collisions, data loss, and energy dissipation. This paper proposes a novel data reduction scheme, that exploits the spatial-temporal correlation among sensor… ▽ More

    Submitted 14 April, 2019; originally announced April 2019.

    Journal ref: IEEE ACCESS, 2019

  25. arXiv:1904.05556  [pdf, other

    cs.CY cs.NI

    The Role of Big Data Analytics in Industrial Internet of Things

    Authors: Muhammad Habib ur Rehman, Ibrar Yaqoob, Khaled Salah, Muhammad Imran, Prem Prakash Jayaraman, Charith Perera

    Abstract: Big data production in industrial Internet of Things (IIoT) is evident due to the massive deployment of sensors and Internet of Things (IoT) devices. However, big data processing is challenging due to limited computational, networking and storage resources at IoT device-end. Big data analytics (BDA) is expected to provide operational- and customer-level intelligence in IIoT systems. Although numer… ▽ More

    Submitted 11 April, 2019; originally announced April 2019.

    Journal ref: Future Generation Computer Systems, 2019

  26. arXiv:1904.05023  [pdf

    cs.NI cs.CY

    Designing Sensing as a Service (S2aaS) Ecosystem for Internet of Things

    Authors: Charith Perera, Mahmoud Barhamgi, Suparna De, Tim Baarslag, Massimo Vecchio, Kim-Kwang Raymond Choo

    Abstract: The Internet of Things (IoT) envisions the creation of an environment where everyday objects (e.g. microwaves, fridges, cars, coffee machines, etc.) are connected to the internet and make users' lives more productive, efficient, and convenient. During this process, everyday objects capture a vast amount of data that can be used to understand individuals and their behaviours. In the current IoT eco… ▽ More

    Submitted 10 April, 2019; originally announced April 2019.

    Journal ref: IEEE Internet of Things Magazine, 2019

  27. arXiv:1904.00381  [pdf, other

    cs.NI

    Exploring the Effectiveness of Service Decomposition in Fog Computing Architecture for the Internet of Things

    Authors: Badraddin Alturki, Stephan Reiff-Marganiec, Charith Perera, Suparna De

    Abstract: The Internet of Things (IoT) aims to connect everyday physical objects to the internet. These objects will produce a significant amount of data. The traditional cloud computing architecture aims to process data in the cloud. As a result, a significant amount of data needs to be communicated to the cloud. This creates a number of challenges, such as high communication latency between the devices an… ▽ More

    Submitted 31 March, 2019; originally announced April 2019.

    Comments: IEEE TRANSACTIONS SUSTAINABLE COMPUTING, 2019

  28. arXiv:1903.12079  [pdf

    cs.CY cs.CR

    Deterrence and Prevention-based Model to Mitigate Information Security Insider Threats in Organisations

    Authors: Nader Sohrabi Safa, Carsten Maple, Steve Furnell, Muhammad Ajmal Azad, Charith Perera, Mohammad Dabbagh, Mehdi Sookhak

    Abstract: Previous studies show that information security breaches and privacy violations are important issues for organisations and people. It is acknowledged that decreasing the risk in this domain requires consideration of the technological aspects of information security alongside human aspects. Employees intentionally or unintentionally account for a significant portion of the threats to information as… ▽ More

    Submitted 15 March, 2019; originally announced March 2019.

    Journal ref: Future Generation Computer Systems (FGCS) 2019

  29. arXiv:1901.06242  [pdf

    cs.CY stat.AP stat.ML

    Data-driven Air Quality Characterisation for Urban Environments: a Case Study

    Authors: Yuchao Zhou, Suparna De, Gideon Ewa, Charith Perera, Klaus Moessner

    Abstract: The economic and social impact of poor air quality in towns and cities is increasingly being recognised, together with the need for effective ways of creating awareness of real-time air quality levels and their impact on human health. With local authority maintained monitoring stations being geographically sparse and the resultant datasets also featuring missing labels, computational data-driven m… ▽ More

    Submitted 1 December, 2018; originally announced January 2019.

    Comments: IEEE ACCESS 2018

  30. arXiv:1812.01790  [pdf, other

    cs.CR cs.DB cs.IR

    Hybrid Microaggregation for Privacy-Preserving Data Mining

    Authors: Balkis Abidi, Sadok Ben Yahia, Charith Perera

    Abstract: k-Anonymity by microaggregation is one of the most commonly used anonymization techniques. This success is owe to the achievement of a worth of interest tradeoff between information loss and identity disclosure risk. However, this method may have some drawbacks. On the disclosure limitation side, there is a lack of protection against attribute disclosure. On the data utility side, dealing with a r… ▽ More

    Submitted 4 December, 2018; originally announced December 2018.

    Comments: 16

    Journal ref: Journal of Ambient Intelligence and Humanized Computing, 2018

  31. arXiv:1809.00926  [pdf

    cs.NI cs.CY

    User-centric Privacy Engineering for the Internet of Things

    Authors: Mahmoud Barhamgi, Charith Perera, Chirine Ghedira, Djamal Benslimane

    Abstract: User privacy concerns are widely regarded as a key obstacle to the success of modern smart cyber-physical systems. In this paper, we analyse, through an example, some of the requirements that future data collection architectures of these systems should implement to provide effective privacy protection for users. Then, we give an example of how these requirements can be implemented in a smart home… ▽ More

    Submitted 4 September, 2018; originally announced September 2018.

    Comments: 12 Pages

    Journal ref: IEEE Cloud Computing, 2018

  32. arXiv:1807.09680  [pdf

    eess.SP cs.NI

    Rentable Internet of Things Infrastructure for Sensing as a Service (S2aaS)

    Authors: Charith Perera

    Abstract: Sensing as a Service (S2aaS) model [1] [2] is inspired by the traditional Everything as a service (XaaS) approaches [3]. It aims to better utilize the existing Internet of Things (IoT) infrastructure. S2aaS vision aims to create 'rentable infrastructure' where interested parties can gather IoT data by paying a fee for the infrastructure owners.

    Submitted 13 July, 2018; originally announced July 2018.

    Journal ref: IEEE Internet of Things Newsletter July 2018

  33. arXiv:1805.04007   

    cs.DC cs.AI cs.IR

    A Unified Knowledge Representation and Context-aware Recommender System in Internet of Things

    Authors: Yinhao Li, Awa Alqahtani, Ellis Solaiman, Charith Perera, Prem Prakash Jayaraman, Boualem Benatallah, Rajiv Ranjan

    Abstract: Within the rapidly develo** Internet of Things (IoT), numerous and diverse physical devices, Edge devices, Cloud infrastructure, and their quality of service requirements (QoS), need to be represented within a unified specification in order to enable rapid IoT application development, monitoring, and dynamic reconfiguration. But heterogeneities among different configuration knowledge representat… ▽ More

    Submitted 24 May, 2018; v1 submitted 10 May, 2018; originally announced May 2018.

    Comments: This paper is an incomplete draft. Therefore, I would like to withdraw it

  34. arXiv:1708.06441  [pdf, other

    cs.NI

    A Hybrid Approach for Data Analytics for Internet of Things

    Authors: Badraddin Alturki, Stephan Reiff-Marganiec, Charith Perera

    Abstract: The vision of the Internet of Things is to allow currently unconnected physical objects to be connected to the internet. There will be an extremely large number of internet connected devices that will be much more than the number of human being in the world all producing data. These data will be collected and delivered to the cloud for processing, especially with a view of finding meaningful infor… ▽ More

    Submitted 21 August, 2017; originally announced August 2017.

    Comments: Accepted to be published in the Proceedings of the 7th ACM International Conference on the Internet of Things (IoT 2017)

  35. arXiv:1708.05261  [pdf, other

    cs.CY

    Privacy Guidelines for Internet of Things: A Cheat Sheet

    Authors: Charith Perera

    Abstract: This document presents 30 different privacy guidelines that can be used to both design and assess IoT applications and IoT middleware platforms. These guidelines can be broadly categorised into eight categories, namely, MINIMIZE ( ), HIDE ( ), SEPARATE ( ), AGGREGATE ( ), INFORM ( ), CONTROL ( ), ENFORCE ( ), DEMONSTRATE ( ). This document uses the following structure to introduce the each privacy… ▽ More

    Submitted 12 August, 2017; originally announced August 2017.

    Comments: Charith Perera (2017), Privacy Guidelines for Internet of Things: A Cheat Sheet, Technical Report, Newcastle University, UK. arXiv admin note: substantial text overlap with arXiv:1609.04060

  36. arXiv:1703.07079  [pdf, other

    cs.NI

    Fog Computing for Sustainable Smart Cities: A Survey

    Authors: Charith Perera, Yongrui Qin, Julio C. Estrella, Stephan Reiff-Marganiec, Athanasios V. Vasilakos

    Abstract: The Internet of Things (IoT) aims to connect billions of smart objects to the Internet, which can bring a promising future to smart cities. These objects are expected to generate large amounts of data and send the data to the cloud for further processing, specially for knowledge discovery, in order that appropriate actions can be taken. However, in reality sensing all possible data items captured… ▽ More

    Submitted 21 March, 2017; originally announced March 2017.

    Journal ref: ACM Computing Surveys 2017

  37. arXiv:1703.04150  [pdf, other

    cs.HC

    A Contextual Investigation of Location in the Home Using Bluetooth Low Energy Beacons

    Authors: Charith Perera, Saeed Aghaee, Ramsey Faragher, Robert Harle, Alan Blackwell

    Abstract: Location sensing is a key enabling technology for Ubicomp to support contextual interaction. However, the laboratories where calibrated testing of location technologies is done are very different to the domestic situations where `context' is a problematic social construct. This study reports measurements of Bluetooth beacons, informed by laboratory studies, but done in diverse domestic settings. T… ▽ More

    Submitted 12 March, 2017; originally announced March 2017.

    Comments: Technical Report (6 Pages)

  38. arXiv:1703.03892  [pdf, other

    cs.SE

    Designing Privacy-aware Internet of Things Applications

    Authors: Charith Perera, Mahmoud Barhamgi, Arosha K. Bandara, Muhammad Ajmal, Blaine Price, Bashar Nuseibeh

    Abstract: Internet of Things (IoT) applications typically collect and analyse personal data that can be used to derive sensitive information about individuals. However, thus far, privacy concerns have not been explicitly considered in software engineering processes when designing IoT applications. The advent of behaviour driven security mechanisms, failing to address privacy concerns in the design of IoT ap… ▽ More

    Submitted 11 April, 2019; v1 submitted 10 March, 2017; originally announced March 2017.

    Comments: Information Sciences, 2019

  39. arXiv:1702.02380  [pdf

    cs.NI cs.CY

    Sensing as a Service (S2aaS): Buying and Selling IoT Data

    Authors: Charith Perera

    Abstract: The Internet of Things (IoT) [1] envisions the creation of an environment where everyday objects (e.g. microwaves, fridges, cars, coffee machines, etc.) are connected to the internet and make users' lives more convenient. It will also lead users to consume resources more efficiently.

    Submitted 8 February, 2017; originally announced February 2017.

    Comments: IEEE Internet of Things eNewsletters, November Issue, 2016

    Journal ref: IEEE Internet of Things eNewsletters, November Issue, 2016

  40. arXiv:1611.05172  [pdf, ps, other

    cs.NI

    Multi-criteria IoT Resource Discovery: A Comparative Analysis

    Authors: Luiz H. Nunes, Julio C. Estrella, Charith Perera, Stephan Reiff-Marganiec, Alexandre N. Delbem

    Abstract: The growth of real world objects with embedded and globally networked sensors allows to consolidate the Internet of Things paradigm and increase the number of applications in the domains of ubiquitous and context-aware computing. The merging between Cloud Computing and Internet of Things named Cloud of Things will be the key to handle thousands of sensors and their data. One of the main challenges… ▽ More

    Submitted 16 November, 2016; originally announced November 2016.

    Comments: Software: Practice and Experience

    Journal ref: Software: Practice and Experience 2017

  41. arXiv:1611.05170  [pdf, other

    cs.AI cs.DC

    The Effects of Relative Importance of User Constraints in Cloud of Things Resource Discovery: A Case Study

    Authors: Luiz H. Nunes, Julio C. Estrella, Alexandre C. B. Delbem, Charith Perera, Stephan Reiff-Marganiec

    Abstract: Over the last few years, the number of smart objects connected to the Internet has grown exponentially in comparison to the number of services and applications. The integration between Cloud Computing and Internet of Things, named as Cloud of Things, plays a key role in managing the connected things, their data and services. One of the main challenges in Cloud of Things is the resource discovery o… ▽ More

    Submitted 16 November, 2016; originally announced November 2016.

    Comments: Proceedings of the 9th IEEE/ACM International Conference on Utility and Cloud Computing (UCC 2016) Shaghai, China, December, 2016

    Journal ref: Proceedings of the 9th IEEE/ACM International Conference on Utility and Cloud Computing (UCC 2016) Shaghai, China, December, 2016

  42. arXiv:1609.04060  [pdf, ps

    cs.CY cs.CR cs.SE

    Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms

    Authors: Charith Perera, Ciaran McCormick, Arosha K. Bandara, Blaine A. Price, Bashar Nuseibeh

    Abstract: The Internet of Things (IoT) systems are designed and developed either as standalone applications from the ground-up or with the help of IoT middleware platforms. They are designed to support different kinds of scenarios, such as smart homes and smart cities. Thus far, privacy concerns have not been explicitly considered by IoT applications and middleware platforms. This is partly due to the lack… ▽ More

    Submitted 13 September, 2016; originally announced September 2016.

    Comments: Accepted to be published in The 6th International Conference on the Internet of Things (IoT 2016) November 7-9, 2016 in Stuttgart, Germany

    Journal ref: The 6th International Conference on the Internet of Things (IoT 2016) November 7-9, 2016 in Stuttgart, Germany

  43. arXiv:1609.03312  [pdf, other

    cs.CY cs.NI

    Valorising the IoT Databox: Creating Value for Everyone

    Authors: Charith Perera, Susan Wakenshaw, Tim Baarslag, Hamed Haddadi, Arosha Bandara, Richard Mortier, Andy Crabtree, Irene Ng, Derek McAuley, Jon Crowcroft

    Abstract: The Internet of Things (IoT) is expected to generate large amounts of heterogeneous data from diverse sources including physical sensors, user devices, and social media platforms. Over the last few years, significant attention has been focused on personal data, particularly data generated by smart wearable and smart home devices. Making personal data available for access and trade is expected to b… ▽ More

    Submitted 12 September, 2016; originally announced September 2016.

    Comments: Accepted for Transactions on Emerging Telecommunications Technologies

  44. arXiv:1606.08968  [pdf, other

    cs.NI

    A Knowledge-Based Resource Discovery for Internet of Things

    Authors: Charith Perera, Athanasios V. Vasilakos

    Abstract: In the sensing as a service paradigm, Internet of Things (IoT) Middleware platforms allow data consumers to retrieve the data they want without knowing the underlying technical details of IoT resources (i.e. sensors and data processing components). However, configuring an IoT middleware platform and retrieving data is a significant challenge for data consumers as it requires both technical knowled… ▽ More

    Submitted 29 June, 2016; originally announced June 2016.

    Comments: Knowledge-Based Systems Journal 2016. arXiv admin note: substantial text overlap with arXiv:1309.1515, arXiv:1309.1811

  45. arXiv:1606.08480  [pdf

    cs.CY cs.CR

    Privacy Knowledge Modelling for Internet of Things: A Look Back

    Authors: Charith Perera, Chang Liu, Rajiv Ranjan, Lizhe Wang, Albert Y. Zomaya

    Abstract: Internet of Things (IoT) and cloud computing together give us the ability to sense, collect, process, and analyse data so we can use them to better understand behaviours, habits, preferences and life patterns of users and lead them to consume resources more efficiently. In such knowledge discovery activities, privacy becomes a significant challenge due to the extremely personal nature of the knowl… ▽ More

    Submitted 27 June, 2016; originally announced June 2016.

    Comments: IEEE Computer Magazine 2016

  46. arXiv:1606.07935  [pdf, other

    cs.NI

    Analytics-as-a-Service in a Multi-Cloud Environment through Semantically enabled Hierarchical Data Processing

    Authors: Prem Prakash Jayaraman, Charith Perera, Dimitrios Georgakopoulos, Schahram Dustdar, Dhavalkumar Thakker, Rajiv Ranjan

    Abstract: A large number of cloud middleware platforms and tools are deployed to support a variety of Internet of Things (IoT) data analytics tasks. It is a common practice that such cloud platforms are only used by its owners to achieve their primary and predefined objectives, where raw and processed data are only consumed by them. However, allowing third parties to access processed data to achieve their o… ▽ More

    Submitted 25 June, 2016; originally announced June 2016.

    Comments: Software: Practice and Experience Journal (SPE), 2016

  47. arXiv:1606.07932  [pdf

    cs.NI

    A Distributed Sensor Data Search Platform for Internet of Things Environments

    Authors: Luiz Nunes, Julio Estrella, Luis Nakamura, Rafael de Libardi, Carlos Ferreira, Liuri Jorge, Charith Perera, Stephan Reiff-Marganiec

    Abstract: Recently, the number of devices has grown increasingly and it is hoped that, between 2015 and 2016, 20 billion devices will be connected to the Internet and this market will move around 91.5 billion dollars. The Internet of Things (IoT) is composed of small sensors and actuators embedded in objects with Internet access and will play a key role in solving many challenges faced in today's society. H… ▽ More

    Submitted 25 June, 2016; originally announced June 2016.

    Comments: International Journal of Services Computing (ISSN 2330-4472) Vol. 4, No.1, January - March, 2016

  48. arXiv:1605.05528  [pdf, other

    cs.HC

    Applying Seamful Design in Location-based Mobile Museum Applications

    Authors: Tommy Nilsson, Carl Hogsden, Charith Perera, Saeed Aghaee, David Scruton, Andreas Lund, Alan F. Blackwell

    Abstract: The application of mobile computing is currently altering patterns of our behavior to a greater degree than perhaps any other invention. In combination with the introduction of power efficient wireless communication technologies, such as Bluetooth Low Energy (BLE), designers are today increasingly empowered to shape the way we interact with our physical surroundings and thus build entirely new exp… ▽ More

    Submitted 8 June, 2016; v1 submitted 18 May, 2016; originally announced May 2016.

    Comments: Accepted for ACM Transactions on Multimedia Computing Communications and Applications

  49. Energy Efficient Location and Activity-aware On-Demand Mobile Distributed Sensing Platform for Sensing as a Service in IoT Clouds

    Authors: Charith Perera, Dumidu Talagala, Chi Harold Liu, Julio C. Estrella

    Abstract: The Internet of Things (IoT) envisions billions of sensors deployed around us and connected to the Internet, where the mobile crowd sensing technologies are widely used to collect data in different contexts of the IoT paradigm. Due to the popularity of Big Data technologies, processing and storing large volumes of data has become easier than ever. However, large scale data management tasks still r… ▽ More

    Submitted 4 January, 2016; originally announced January 2016.

    Comments: IEEE Transactions on Computational Social Systems 2016

  50. arXiv:1506.09118  [pdf

    cs.CY cs.NI

    City Data Fusion: Sensor Data Fusion in the Internet of Things

    Authors: Meisong Wang, Charith Perera, Prem Prakash Jayaraman, Miranda Zhang, Peter Strazdins, Rajiv Ranjan

    Abstract: Internet of Things (IoT) has gained substantial attention recently and play a significant role in smart city application deployments. A number of such smart city applications depend on sensor fusion capabilities in the cloud from diverse data sources. We introduce the concept of IoT and present in detail ten different parameters that govern our sensor data fusion evaluation framework. We then eval… ▽ More

    Submitted 30 June, 2015; originally announced June 2015.

    Comments: Accepted to be published in International Journal of Distributed Systems and Technologies (IJDST), 2015