Communication between connected objects in the Internet of Things (IoT) often requires secure and reliable authentication mechanisms to verify identities of entities and prevent unauthorized access ...to sensitive data and resources. Unlike other domains, IoT offers several advantages and opportunities, such as the ability to collect real-time data through numerous sensors. These data contains valuable information about the environment and other objects that, if used, can significantly enhance authentication processes. In this paper, we propose a novel idea to building opportunistic sensor-based authentication factors by leveraging existing IoT sensors in a system of systems approach. The objective is to highlight the promising prospects of opportunistic authentication factors in enhancing IoT security. We claim that sensors can be utilized to create additional authentication factors, thereby reinforcing existing object-to-object authentication mechanisms. By integrating these opportunistic sensor-based authentication factors into multi-factor authentication schemes, IoT security can be substantially improved. We demonstrate the feasibility and effectivenness of our idea through illustrative experiments in a parking entry scenario, involving both mobile robots and cars, achieving high identification accuracy. We highlight the potential of this novel method to improve IoT security and suggest future research directions for formalizing and comparing our approach with existing techniques.
Full text
Available for:
IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
This paper proposes a new implementation and evaluation in a real-world environment of a bio-inspired predictive navigation model for mobility control, suitable especially for assistance of visually ...impaired people and autonomous mobile systems. This bio-inspired model relies on the interactions between formal models of three types of neurons identified in the mammals’ brain implied in navigation tasks, namely place cells, grid cells, and head direction cells, to construct a topological model of the environment under the form of a decentralized navigation graph. Previously tested in virtual environments, this model demonstrated a high tolerance to motion drift, making possible to map large environments without the need to correct it to handle such drifts, and robustness to environment changes. The presented implementation is based on a stereoscopic camera, and is evaluated on its possibilities to map and guide a person or an autonomous mobile robot in an unknown real environment. The evaluation results confirm the effectiveness of the proposed bio-inspired navigation model to build a path map, localize and guide a person through this path. The model predictions remain robust to environment changes, and allow to estimate traveled distances with an error rate below 3% over test paths, up to 100m. The tests performed on a robotic platform also demonstrated the pertinence of navigation data produced by this navigation model to guide an autonomous system. These results open the way toward efficient wearable assistive devices for visually impaired people independent navigation.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
3.
An Avatar Architecture for the Web of Things Mrissa, Michael; Medini, Lionel; Jamont, Jean-Paul ...
IEEE internet computing,
2015-Mar.-Apr., 2015-3-00, 20150301, 2015-03, Volume:
19, Issue:
2
Journal Article
Peer reviewed
The Web of Things extends the Internet of Things by leveraging Web-based languages and protocols to access and control each physical object. In this article, the authors summarize ongoing work ...promoting the concept of an avatar as a new virtual abstraction to extend physical objects on the Web. An avatar is an extensible and distributed runtime environment endowed with an autonomous behavior. Avatars rely on Web languages, protocols, and reason about semantic annotations to dynamically drive connected objects, exploit their capabilities, and expose user-understandable functionalities as Web services. Avatars are also able to collaborate together to achieve complex tasks.
In the real world, the assumption that, once generated, a pervasive system of systems and the services it provides will remain static is false. Systems can leave or enter, and service availability in ...systems can change along with the environmental conditions. The dynamic composition and adaptation of pervasive systems of systems enable them to expand their functionality through leverage resources in the user vicinity. Most of the adaptation approaches based on ad hoc networks use service adaptation created from scratch. That is, each time the environment changes, the system starts the composition process over again, resulting in the depletion of system resources and network capacity. We present a protocol for dynamic composition of a pervasive system of systems and their services in ad hoc networks. Our proposal uses a dynamic and distributed constraint satisfaction approach to establish the pervasive-system-of-systems requirements. In this paper, we deal with spatial and temporal constraints. However, any other kind of restriction, for instance, quality, can be addressed in the same manner. Additionally, a heuristic allowing recomposing services based on the identification of service components disqualified due to the dynamism of the environment is presented. Thus, the adaptation of services is not necessarily done from scratch. Finally, we present simulations that show the performance of our proposal regarding the nearest work in the state of the art, both in time and in number of messages consumed for adapting services.
Wireless instrumentation systems are a collection of resource-constrained nodes in charge of sensing, processing, and transmitting data. They are often battery powered, and consequently, subject to ...energy constraints. Since communication is the most energy-consuming task, efforts have to be made during the routing process in order to maximize the network lifespan and avoid network partitioning. In this context, the multi-wireless-agent communication (MWAC) model provides a self-organization process for managing communication in this kind of instrumentation system. Given an organization and a node, MWAC determines a single path to route messages to the destination. This may cause congestions for large data flows. This paper introduces antMWAC, a model designed to improve MWAC. Ant colony optimization is used to balance the traffic load on wireless nodes and insure a multipath routing. Ants interact with nodes to make the communication more efficient. The cooperation between them is increased to find a tradeoff between new path discovering and path reinforcement. The aim is to allow the nodes exploiting the information routed by ants and modifying ant decision parameters. Experiments show that antMWAC diversifies the nodes participating in routing operations, reducing node congestion.
A cyber-physical system (CPS) is a system with integrated computational and physical abilities. Deriving the notion of cyber-physical collective (CPC) from a social view of CPS, we consider the nodes ...of a CPS as individuals (agents) that interact to overcome their limits in the collective. When CPC agents are able to move in their environment, the CPC is considered as a Mobile CPC (MCPC). The interactions of the agents give rise to the appearance of a phenomenon collectively generated by the agents of the CPC that we call a collective product. This phenomenon is not recorded as “a whole” in the CPC because an agent has only a partial view of its environment. This paper presents COPE (COllective Product Exploitation), an approach that allows one MCPC to exploit the collective product of another one. The approach is based on the deployment of meta-agents in both systems. A meta-agent is an agent that is external to a MCPC but is associated with one of its agents. Each meta-agent is able to monitor the agent with which it is associated and can fake its perceptions to influence its behavior. The meta-agents deployed in the system from which the collective product emerges provide indicators related to this product. Utilizing these indicators, the meta-agents deployed in the other system can act on the agents in order to adapt the global dynamics of the whole system. The proposed coupling approach is evaluated in a “fire detection and control” use case. It allows a system of UAVs to use the collective product of a network of sensors to monitor the fire.
As the number of connected objects increases, there is a need to offer rich user experience and facilitate communication between physical objects with Web-based solutions. Our work relies on the ...notion of avatar to extend an object on the Web. We herein propose a model for the avatar to expose functionalities based on the capabilities objects offer. We motivate our work with a temperature regulation scenario and we evaluate the applicability of our proposal with an implementation.
Communication between connected objects in the Internet of Things (IoT) often requires secure and reliable authentication mechanisms to verify identities of entities and prevent unauthorized access ...to sensitive data and resources. Unlike other domains, IoT offers several advantages and opportunities, such as the ability to collect real-time data through numerous sensors. These data contains valuable information about the environment and other objects that, if used, can significantly enhance authentication processes. In this paper, we propose a novel idea to building opportunistic sensor-based authentication factors by leveraging existing IoT sensors in a system of systems approach. The objective is to highlight the promising prospects of opportunistic authentication factors in enhancing IoT security. We claim that sensors can be utilized to create additional authentication factors, thereby reinforcing existing object-to-object authentication mechanisms. By integrating these opportunistic sensor-based authentication factors into multi-factor authentication schemes, IoT security can be substantially improved. We demonstrate the feasibility and effectivenness of our idea through illustrative experiments in a parking entry scenario, involving both mobile robots and cars, achieving high identification accuracy. We highlight the potential of this novel method to improve IoT security and suggest future research directions for formalizing and comparing our approach with existing techniques.
Un système multi-agent est un ensemble d’agents qui collaborent et réalisent ensemble une production collective. Nous nous intéressons à des systèmes dont les agents n’ont qu’une vision partielle de ...leur collectif et des productions qu’ils génèrent. La coopération entre systèmes multi-agents peut permettre l’exploitation mutuelle des productions de chacun des collectifs plutôt que d’exploiter individuellement les savoir-faire des agents de chacun. Elle peut aider les collectifs à réaliser leurs propres productions ou à les renforcer. Nous proposons un modèle pour faire coopérer des collectifs distribués et préexistants en évitant de perturber leur fonctionnement nominal. Pour cela, nous insérons des sondes virtuelles dans chaque collectif pour observer et influencer les agents afin de permettre la coopération par utilisation de productions collectives. L’approche proposée est évaluée sur un scénario dans lequel un réseau de capteurs et un réseau de drones conçus et déployés séparément sont mis en coopération. A multiagent system is a set of agents which collaborate and realize a collective product. We are interested by teams where agents have only a partial view on their team and of the collective products they generate. Teams cooperation allows them to exploit each other collective products, instead of exploiting individually the skills of agents from each team. This cooperation can help each team to realize or to enhance its own products. We propose a model to allow the cooperation of distributed preexisting teams by avoiding the disturbance of the initial functioning of each team. To meet this constraint, we insert virtual probes into each team to observe and to influence the agents in order to allow their cooperation by using collective products. The proposed approach is evaluated on a scenario where a sensor network and a drone network need to cooperate while designed and deployed separately.