Publications

Flexible Internet-of-Things Platform using Docker

It is common for Internet of Things (IoT) devices to behave as client and servers. As IoT devices require various features based on their roles in a service, IoT manufacturers are facing difficulties in composing various IoT features in a device. Containers are helpful to IoT devices managing required features and orchestrating its behavior through [...]

By | November 21st, 2017|Publications|0 Comments

Hairspring: Online graph processing middleware for temporal networks

The researches of temporal graph have been conducted in interdisciplinary fields and applied to various kinds of networks; online social network, cell biology network, neural network, ecological network, etc. However, processing and understanding the networks would be complicated for application developers due to their high velocity and volume. Also, the heterogeneity of the networks incurs [...]

By | November 21st, 2017|Publications|0 Comments

A Workload Prediction Approach using Models Stacking based on Recurrent Neural Network and Autoencoder

Workload prediction in computing systems like Cloud and Grid is an essential prerequisite for successful load balancing and achieving service-level agreements. However, since workloads in different systems and architectures have varied characteristics, providing an accurate single prediction model can be very challenging. Therefore, in this paper we have designed and implemented a model of stacking [...]

By | November 21st, 2017|Publications|0 Comments

The Privacy Exposure Problem in Mobile Location-based Services

Mobile location-based services (LBSs) empowered by mobile crowdsourcing provide users with context- aware intelligent services based on user locations. As smartphones are capable of collecting and disseminating massive user location-embedded sensing information, privacy preservation for mobile users has become a crucial issue. This paper proposes a metric called privacy exposure to quantify the notion of [...]

By | November 21st, 2017|Publications|0 Comments

Leverage a Trust Service Platform for Data Usage Control in Smart City

In the Internet of Thing, data is almost collected, aggregated and analyzed without human intervention by machine-to-machine communications resulting in raising serious challenges on access control. Particularly in Smart City ecosystems in which multi-modal data comes from heterogeneous sources, data owners cannot imagine how their data is used to extract sensitive information. Thus, there is [...]

By | November 21st, 2017|Publications|0 Comments

We Hear Your Activities through Wi-Fi Signals

In this paper, we focus on the problem of human activity recognition without identification of the individuals in a scene. We consider using Wi-Fi signals to detect certain human mobility behaviors such as stationary, walking, or running. The main objective is to successfully detect these behaviors for the individuals and based on that enable detection [...]

By | November 21st, 2017|Publications|0 Comments

Toward a Trust Evaluation Mechanism in the Social Internet of Things

In the blooming era of the Internet of Things (IoT), trust has been accepted as a vital factor for provisioning secure, reliable, seamless communications and services. However, a large number of challenges still remain unsolved due to the ambiguity of the concept of trust as well as the variety of divergent trust models in different [...]

By | November 21st, 2017|Publications|0 Comments

Study on Enhancing National Defense Security Based on RFID and Internet of Things Technology

Radio-frequency identification (RFID) is being used in various fields as a technology for identifying objects (people, things etc.) using radio frequencies. In the past, there was an attempt to apply RFID into national defence, but failed to spread RFID in the defence field because of some limitations of RFID in a specific situation (e.g., low [...]

By | November 21st, 2017|Publications|0 Comments

Security Requirements and Strategies based on RFID and IoT Technology for National Defense

There were some limitations to use a RFID in the field of national defense. In this paper, in order to overcome the limitation of the RFID and enhance national defense security, we adopt the Internet of Things (IoT). We analyze the security requirements for the RFID and IoT, and propose two scenarios, which can be [...]

By | November 21st, 2017|Publications|0 Comments

A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP

Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP) connectivity may be frequently disrupted and power [...]

By | November 21st, 2017|Publications|0 Comments