Adaptive low-power wireless sensor network architecture for smart street furniture-based crowd and environmental measurements
- Authors: Nassar, Mohammed , Luxford, Len , Cole, Peter , Oatley, Giles , Koutsakis, Polychronis , IEEE
- Date: 2019
- Type: Text , Conference proceedings
- Relation: 2019 IEEE 20th International Symposium on a World of Wireless, Mobile and Multimedia Networks
- Full Text: false
- Reviewed:
- Description: Street furniture such as bins, seats and bus shelters can become "smart" with the inclusion of wireless sensor nodes, which consist of environmental sensors, wireless modules, processors and microcontrollers. One of the most crucial challenges for smart street furniture is how to manage power consumption efficiently without affecting data freshness. In this work, we propose a novel Wireless Sensor Network (WSN) architecture for smart street furniture. Unlike existing WSNs which are based on a one-way communication model between wireless sensor nodes and the server, the proposed architecture employs a two-way communication model and a dynamic adaptation of the time interval of measurements to balance between power consumption and data updates. Our approach also provides a real-time low-power design for wireless sensor nodes which efficiently communicate the updated data instead of sending the same data on a regular basis. To the best of our knowledge, this is the first work in the relevant literature which extends the functionality of the wireless module in wireless sensor nodes to act not only as a station sending environmental data but also as soft Access Point (AP), sensing MAC addresses and WiFi signal strengths from surrounding WiFi-enabled devices. We have conducted experiments on the Murdoch University campus and our results show that our proposal improves lifetime of wireless sensor nodes up to 293% compared to static architectures similar to the ones that have been proposed in the literature. Moreover, network bandwidth is improved up to 38% without affecting data freshness. Finally, storage space for the database at the server is reduced up to 99%.
- Description: E1
Development and bench-marking of agoraphilic navigation algorithm in dynamic environment
- Authors: Hewawasam, Hasitha , Ibrahim, Yousef , Kahandawa, Gayan , Choudhury, Tanveer , IEEE
- Date: 2019
- Type: Text , Book chapter
- Relation: 2019 IEEE 28th International Symposium on Industrial Electronics p. 1156-1161
- Full Text: false
- Reviewed:
- Description: This paper presents a summary of research which was conducted in developing a new human-like navigation methodology based on the Agoraphilic algorithm. This new methodology is capable of maneuvering robots in both static and dynamically clutter unknown environments. The Agoraphilic algorithm is an "optimistic" navigation algorithm. The algorithm is based on free space attraction rather than repulsion of obstacles for navigation. Therefore, this algorithm directs robots to follow the free space leading to the goal instead of avoiding obstacles. This approach has eliminated many draw backs of the traditional APF algorithm. However, the major limitation of the previously developed Agoraphilic algorithm could only deal with static environment. The new proposed algorithm has successfully extended the capacity of Agoraphilic algorithm to deal with environment cluttered with dynamic obstacles. The new Agoraphilic algorithm uses a tracking and prediction methodology to estimate the path of unknown moving objects. The estimated locations of the moving objects are combined with static object locations in the robot's visible region to generate time-varying free space attractive forces. These time varying forces maneuver the robot to the goal in dynamically cluttered unknown environment without collusions. To demonstrate the algorithm's ability, several simulations were performed. Furthermore, the new algorithm was tested and bench-marked against other APF published work under similar environment and conditions. The comparative results are discussed and showed the effectiveness of the new Algoraphilic navigation algorithm.
Mobile malware detection : an analysis of deep learning model
- Authors: Khoda, Mahbub , Kamruzzaman, Joarder , Gondal, Iqbal , Imam, Tasadduq , Rahman, Ashfaqur , IEEE
- Date: 2019
- Type: Text , Book chapter
- Relation: 2019 IEEE International Conference on Industrial Technology p. 1161-1166
- Full Text: false
- Reviewed:
- Description: Due to its widespread use, with numerous applications deployed everyday, smartphones have become an inevitable target of the malware developers. This huge number of applications renders manual inspection of codes infeasible; as such, researchers have proposed several malware detection techniques based on automatic machine learning tools. Deep learning has gained a lot of attention from the malware researchers due to its ability of capture complex relationships among inputs and outputs. However, deep learning models depend largely on several hyper-parameters (i.e., learning rate, batch size, dropout rate). Hence, it is of utmost importance to analyze the effect of these parameters on classifier performance. In this paper, we systematically studied the effect of these parameters along with the effect of network architecture. We showed that building arbitrary deep networks does not always improve classifier performance. We also determined the combination of hyper-parameters that yields best result. This study will be useful in building better deep neural network based model for malware classification.
Vulnerability modelling for hybrid IT systems
- Authors: Ur-Rehman, Attiq , Gondal, Iqbal , Kamruzzuman, Joarder , Jolfaei, Alireza , IEEE
- Date: 2019
- Type: Text , Book chapter
- Relation: 2019 IEEE International Conference on Industrial Technology p. 1186-1191
- Full Text: false
- Reviewed:
- Description: Common vulnerability scoring system (CVSS) is an industry standard that can assess the vulnerability of nodes in traditional computer systems. The metrics computed by CVSS would determine critical nodes and attack paths. However, traditional IT security models would not fit IoT embedded networks due to distinct nature and unique characteristics of IoT systems. This paper analyses the application of CVSS for IoT embedded systems and proposes an improved vulnerability scoring system based on CVSS v3 framework. The proposed framework, named CVSSIoT, is applied to a realistic IT supply chain system and the results are compared with the actual vulnerabilities from the national vulnerability database. The comparison result validates the proposed model. CVSSIoT is not only effective, simple and capable of vulnerability evaluation for traditional IT system, but also exploits unique characteristics of IoT devices.