Explore PETRAS's research knowledge base of peer reviewed, multidisciplinary publications.
251. Lustgarten, Paulina; Vine, Scott Le: Public priorities and consumer preferences for selected attributes of automated vehicles. In: vol. 26, no. 1, pp. 72–79, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-lustgarten_public_2017,
title = {Public priorities and consumer preferences for selected attributes of automated vehicles},
author = {Paulina Lustgarten and Scott Le Vine},
url = {https://doi.org/10.1007%2Fs40534-017-0147-5},
doi = {10.1007/s40534-017-0147-5},
year = {2017},
date = {2017-11-16},
volume = {26},
number = {1},
pages = {72--79},
publisher = {Springer Science and Business Media LLC},
abstract = {Public opinion and consumer preferences are among the various constraints on the rollout of automated cars, as they will affect the decision-making of both automotive industry actors and public-sector regulators. This study contributes to the growing body of the literature regarding this issue, through a moderate-scale survey (n = 370) that incorporated both prioritization/attitudinal questions (regarding public opinion) and a stated-preference module (to identify consumer preferences). The survey protocol includes a stated-preference approach to investigate consumers' preferences for the possibility of very high rates of speed in automated cars on long-distance journeys. We found separately identifiable effects for average travel speeds (manifested as journey duration) and maximum travel speed in the stated-preference scenarios. In the 'prioritization' component of the survey, respondents ranked having the 'highest possible level of safety' as the single most important benefit that they would like automated cars to deliver, ahead of benefits such as being able to performing activities while traveling or having traffic congestion reduced. This result has consequences for the car-following distances that are programmed into the control algorithms of automated cars. Documenting this finding is important, as decisions must be made in the near future by driving-algorithm designers, public-sector regulators, and ultimately the judiciary regarding the guidelines for acceptable automated driving-behavior instructions.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
252. Berthelot, Melissa; Yang, Guang-Zhong; Lo, Benny P. L.: A Self-Calibrated Tissue Viability Sensor for Free Flap Monitoring. In: vol. 22, no. 1, pp. 5–14, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-berthelot_self_2018,
title = {A Self-Calibrated Tissue Viability Sensor for Free Flap Monitoring},
author = {Melissa Berthelot and Guang-Zhong Yang and Benny P. L. Lo},
url = {https://doi.org/10.1109%2Fjbhi.2017.2773998},
doi = {10.1109/jbhi.2017.2773998},
year = {2017},
date = {2017-11-15},
volume = {22},
number = {1},
pages = {5--14},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {In fasciocutaneous free flap surgery, close postoperative monitoring is crucial for detecting flap failure, as around 10% of cases require additional surgery due to compromised anastomosis. Different biochemical and biophysical techniques have been developed for continuous flap monitoring, however, they all have shortcoming in terms of reliability, elevated cost, potential risks to the patient, and inability to adapt to the patient's phenotype. A wearable wireless device based on near infrared spectroscopy has been developed for continuous blood flow and perfusion monitoring by quantifying tissue oxygen saturation (StO 2 ). This miniaturized and low-cost device is designed for postoperative monitoring of flap viability. With self-calibration, the device can adapt itself to the characteristics of the patients' skin such as tone and thickness. An extensive study was conducted with 32 volunteers. The experimental results show that the device can obtain reliable StO 2 measurements across different phenotypes (age, sex, skin tone, and thickness). To assess its ability to detect flap failure, the sensor was tested in a pilot animal study. Free groin flaps were performed on 16 Sprague Dawley rats. Results demonstrate the accuracy of the sensor in assessing flap viability and identifying the origin of failure (venous or arterial thrombosis).},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
253. Taddeo, Mariarosaria: Trusting Digital Technologies Correctly. In: vol. 27, no. 4, pp. 565–568, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-taddeo_trusting_2017,
title = {Trusting Digital Technologies Correctly},
author = {Mariarosaria Taddeo},
url = {https://doi.org/10.1007%2Fs11023-017-9450-5},
doi = {10.1007/s11023-017-9450-5},
year = {2017},
date = {2017-11-15},
volume = {27},
number = {4},
pages = {565--568},
publisher = {Springer Science and Business Media LLC},
abstract = {Trust is a facilitator of interactions among the members of a system, would these be human agents, artificial agents or a combination of both (a hybrid system). Elsewhere, I argued that the occurrences of trust are related to, and affect, pre-existing relations, like purchasing, negotiation, communication, and delegation (Taddeo 2010a, 2010b). Trust is not to be considered a relation itself but a property of relations, something that changes the way relations occur. Consider, for example, a case of communication. Alice talks to Bob and she informs him that the grocery store down the road is closed for the day, as Bob trusts Alice he believes her and decides not to walk to the shop to double check, instead he starts searching for an alternative place for his grocery. Between Alice and Bob there is a first-order relation, the communication, which ranges over the two agents, and there is the second-order property of trust that ranges over the first-order-relation and affects the way it occurs.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
254. Zhu, Huanzhou; He, Ligang; Fu, Songling; Li, Rui; Han, Xie; Fu, Zhangjie; Hu, Yongjian; Li, Chang-Tsun: WolfPath: Accelerating Iterative Traversing-Based Graph Processing Algorithms on GPU. In: vol. 47, no. 4, pp. 644–667, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-zhu_wolfpath_2017,
title = {WolfPath: Accelerating Iterative Traversing-Based Graph Processing Algorithms on GPU},
author = {Huanzhou Zhu and Ligang He and Songling Fu and Rui Li and Xie Han and Zhangjie Fu and Yongjian Hu and Chang-Tsun Li},
url = {https://doi.org/10.1007%2Fs10766-017-0533-y},
doi = {10.1007/s10766-017-0533-y},
year = {2017},
date = {2017-11-14},
volume = {47},
number = {4},
pages = {644--667},
publisher = {Springer Science and Business Media LLC},
abstract = {There is the significant interest nowadays in developing the frameworks of parallelizing the processing for the large graphs such as social networks, Web graphs, etc. Most parallel graph processing frameworks employ iterative processing model. However, by benchmarking the state-of-art GPU-based graph processing frameworks, we observed that the performance of iterative traversing-based graph algorithms (such as Bread First Search, Single Source Shortest Path and so on) on GPU is limited by the frequent data exchange between host and GPU. In order to tackle the problem, we develop a GPU-based graph framework called WolfPath to accelerate the processing of iterative traversing-based graph processing algorithms. In WolfPath, the iterative process is guided by the graph diameter to eliminate the frequent data exchange between host and GPU. To accomplish this goal, WolfPath proposes a data structure called Layered Edge list to represent the graph, from which the graph diameter is known before the start of graph processing. In order to enhance the applicability of our WolfPath framework, a graph preprocessing algorithm is also developed in this work to convert any graph into the format of the Layered Edge list. We conducted extensive experiments to verify the effectiveness of WolfPath. The experimental results show that WolfPath achieves significant speedup over the state-of-art GPU-based in-memory and out-of-memory graph processing frameworks.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
255. Heinis, Thomas; Ailamaki, Anastasia: Data Infrastructure for Medical Research. In: vol. 8, no. 3, pp. 131–238, 2017, ISSN: 1931-7891. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-heinis_data_2017,
title = {Data Infrastructure for Medical Research},
author = {Thomas Heinis and Anastasia Ailamaki},
url = {https://doi.org/10.1561%2F1900000050},
doi = {10.1561/1900000050},
issn = {1931-7891},
year = {2017},
date = {2017-11-08},
volume = {8},
number = {3},
pages = {131--238},
publisher = {Now Publishers},
abstract = {While we are witnessing rapid growth in data across the sciences and in many applications, this growth is particularly remarkable in the medical domain, be it because of higher resolution instruments and diagnostic tools (e.g. MRI), new sources of structured data like activity trackers, the wide-spread use of electronic health records and many others. The sheer volume of the data is not, however, the only challenge to be faced when using medical data for research. Other crucial challenges include data heterogeneity, data quality, data privacy and so on. In this article, we review solutions addressing these challenges by discussing the current state of the art in the areas of data integration, data cleaning, data privacy, scalable data access and processing in the context of medical data. The techniques and tools we present will give practitioners - computer scientists and medical researchers alike - a starting point to understand the challenges and solutions and ultimately to analyse medical data and gain better and quicker insights.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
256. Wilson, Duncan; McCann, Julie A.; Rogers, Yvonne: Capstone Report 2016--2017. 2017. (Type: report | Abstract | Links | BibTeX) @report{wilson_capstone_2017,
title = {Capstone Report 2016--2017},
author = {Duncan Wilson and Julie A. McCann and Yvonne Rogers},
url = {http://cities.io/icri2018.pdf},
year = {2017},
date = {2017-11-01},
institution = {Intel Collaborative Research Institute for Sustainable Connected Cities},
abstract = {ICRI Urban IoT
An overview of the Intel Collaborative Research Institute contextualises our research focus and provides the background to the Intel ICRI / ISTC programme.
Research + Living Labs
Our work focused on the challenges of developing novel IoT technologies and testing them in situ, in the harsh environment of the city.
People + Publications
A summary of the people who have contributed to projects conducted in the ICRI and the many publications generated as a result of their research.
Reflections
Observations from the initial 3 year Discovery Phase of the ICRI and the final 2 year Capstone project.},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
An overview of the Intel Collaborative Research Institute contextualises our research focus and provides the background to the Intel ICRI / ISTC programme.
Research + Living Labs
Our work focused on the challenges of developing novel IoT technologies and testing them in situ, in the harsh environment of the city.
People + Publications
A summary of the people who have contributed to projects conducted in the ICRI and the many publications generated as a result of their research.
Reflections
Observations from the initial 3 year Discovery Phase of the ICRI and the final 2 year Capstone project.257. Bobba, Rakesh B.; Rashid, Awais: CPS-SPC 2017: Third Workshop on Cyber-Physical Systems Security and Privacy. In: CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-bobba_cps_2017,
title = {CPS-SPC 2017: Third Workshop on Cyber-Physical Systems Security and Privacy},
author = {Rakesh B. Bobba and Awais Rashid},
url = {https://doi.org/10.1145%2F3133956.3137051},
doi = {10.1145/3133956.3137051},
year = {2017},
date = {2017-10-30},
booktitle = {CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security},
publisher = {ACM},
abstract = {Cyber-Physical Systems (CPS) are becoming increasingly critical for the well-being of society (e.g., electricity generation and distribution, water treatment, implantable medical devices etc.). While the convergence of computing, communications and physical control in such systems provides benefits in terms of efficiency and convenience, the attack surface resulting from this convergence poses unique security and privacy challenges. These systems represent the new frontier for cyber risk. CPS-SPC is an annual forum, in its 3rd edition this year, that aims to provide a focal point for the research community to begin addressing the security and privacy challenges of CPS in a comprehensive and multidisciplinary manner and, in tandem with other efforts, build a comprehensive research road map.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
258. Floridi, Luciano: Infraethics—on the Conditions of Possibility of Morality. In: vol. 30, no. 4, pp. 391–394, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-floridi_infraethicson_2017,
title = {Infraethics\textemdashon the Conditions of Possibility of Morality},
author = {Luciano Floridi},
url = {https://doi.org/10.1007%2Fs13347-017-0291-1},
doi = {10.1007/s13347-017-0291-1},
year = {2017},
date = {2017-10-30},
volume = {30},
number = {4},
pages = {391--394},
publisher = {Springer Science and Business Media LLC},
abstract = {It is a sign of our times that, when politicians speak of infrastructure nowadays, they often have in mind information and communication technologies (ICTs). They are not wrong. From success in business to cyber-conflicts, what makes contemporary societies work depends increasingly on bits rather than atoms. Depending on their digital infrastructures, societies may grow and prosper. And it is their ICTs that often represent one of their weakest sides, in terms of cyber security. We know all this. What is less obvious, and philosophically more interesting, is that ICTs also seem to have unveiled a new sort of equation.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
259. Zhang, Jun; Cormode, Graham; Procopiuc, Cecilia Magdalena; Srivastava, Divesh; Xiao, Xiaokui: PrivBayes: Private Data Release via Bayesian Networks. In: vol. 42, no. 4, pp. 1–41, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-zhang_privbayes_2017,
title = {PrivBayes: Private Data Release via Bayesian Networks},
author = {Jun Zhang and Graham Cormode and Cecilia Magdalena Procopiuc and Divesh Srivastava and Xiaokui Xiao},
url = {https://doi.org/10.1145%2F3134428},
doi = {10.1145/3134428},
year = {2017},
date = {2017-10-27},
volume = {42},
number = {4},
pages = {1--41},
publisher = {Association for Computing Machinery (ACM)},
abstract = {Privacy-preserving data publishing is an important problem that has been the focus of extensive study. The state-of-the-art solution for this problem is differential privacy, which offers a strong degree of privacy protection without making restrictive assumptions about the adversary. Existing techniques using differential privacy, however, cannot effectively handle the publication of high-dimensional data. In particular, when the input dataset contains a large number of attributes, existing methods require injecting a prohibitive amount of noise compared to the signal in the data, which renders the published data next to useless.
To address the deficiency of the existing methods, this paper presents PrivBayes, a differentially private method for releasing high-dimensional data. Given a dataset D, PrivBayes first constructs a Bayesian network N, which (i) provides a succinct model of the correlations among the attributes in D and (ii) allows us to approximate the distribution of data in D using a set P of low-dimensional marginals of D. After that, PrivBayes injects noise into each marginal in P to ensure differential privacy and then uses the noisy marginals and the Bayesian network to construct an approximation of the data distribution in D. Finally, PrivBayes samples tuples from the approximate distribution to construct a synthetic dataset, and then releases the synthetic data. Intuitively, PrivBayes circumvents the curse of dimensionality, as it injects noise into the low-dimensional marginals in P instead of the high-dimensional dataset D. Private construction of Bayesian networks turns out to be significantly challenging, and we introduce a novel approach that uses a surrogate function for mutual information to build the model more accurately. We experimentally evaluate PrivBayes on real data and demonstrate that it significantly outperforms existing solutions in terms of accuracy.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
To address the deficiency of the existing methods, this paper presents PrivBayes, a differentially private method for releasing high-dimensional data. Given a dataset D, PrivBayes first constructs a Bayesian network N, which (i) provides a succinct model of the correlations among the attributes in D and (ii) allows us to approximate the distribution of data in D using a set P of low-dimensional marginals of D. After that, PrivBayes injects noise into each marginal in P to ensure differential privacy and then uses the noisy marginals and the Bayesian network to construct an approximation of the data distribution in D. Finally, PrivBayes samples tuples from the approximate distribution to construct a synthetic dataset, and then releases the synthetic data. Intuitively, PrivBayes circumvents the curse of dimensionality, as it injects noise into the low-dimensional marginals in P instead of the high-dimensional dataset D. Private construction of Bayesian networks turns out to be significantly challenging, and we introduce a novel approach that uses a surrogate function for mutual information to build the model more accurately. We experimentally evaluate PrivBayes on real data and demonstrate that it significantly outperforms existing solutions in terms of accuracy.260. Vine, Scott Le; Kong, You; Liu, Xiaobo; Polak, John W.: Vehicle automation and freeway `pipeline' capacity in the context of legal standards of care. In: vol. 46, no. 4, pp. 1215–1244, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-vine_vehicle_2017,
title = {Vehicle automation and freeway `pipeline' capacity in the context of legal standards of care},
author = {Scott Le Vine and You Kong and Xiaobo Liu and John W. Polak},
url = {https://doi.org/10.1007%2Fs11116-017-9825-8},
doi = {10.1007/s11116-017-9825-8},
year = {2017},
date = {2017-10-20},
volume = {46},
number = {4},
pages = {1215--1244},
publisher = {Springer Science and Business Media LLC},
abstract = {The study evaluates, in the context of freeway segments, the interaction between automated cars' kinematic capabilities and the standard legal requirement for the operator of an automobile to not strike items that are in its path (known as the 'Assured Clear Distance Ahead' criterion). The objective is to characterize the impacts of ACDA-compliant driving behavior on the system-level indicator of roadway-network capacity. We assess the barriers to automated cars operating non-ACDA-compliant driving strategies, develop a straightforward ACDA-compliant automated-driving model to analytically estimate freeway 'pipeline' capacity, compare this behavior to human drivers, and interpret quantitative findings which are based on a range of rationally-specified parameter values and explicitly account for kinematic uncertainty. We demonstrate that automated cars pursuing ACDA-compliant driving strategies would have distinctive "fundamental diagrams" (relationships between speed and flow). Our results suggest that such automated-driving strategies (under a baseline set of assumptions) would sustain higher flow rates at free-flow speeds than human drivers, however at higher traffic volumes the rate of degradation in speed due to congestion would be steeper. ACDA-compliant automated cars also would have a higher level of maximum-achievable throughput, though the impact on maximum throughput at free-flow speed depends on the specific interpretation of ACDA. We also present a novel quantification of the tradeoff between freeway-capacity and various degrees of safety (one failure in 100,000 events, one failure in 1,000,000, etc.) that explicitly accounts for the irreducible uncertainty in emergency braking performance, by drawing on empirical distributions of braking distance testing. Finally, we assess the vulnerability of ACDA-compliant automated cars to lateral 'cut-ins' by vehicles making lane changes. The paper concludes with a brief discussion of policy questions and research needs.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
261. Li, Chang-Tsun; Lin, Xufeng: A fast source-oriented image clustering method for digital forensics. In: vol. 2017, no. 1, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-li_fast_2017,
title = {A fast source-oriented image clustering method for digital forensics},
author = {Chang-Tsun Li and Xufeng Lin},
url = {https://doi.org/10.1186%2Fs13640-017-0217-y},
doi = {10.1186/s13640-017-0217-y},
year = {2017},
date = {2017-10-16},
volume = {2017},
number = {1},
publisher = {Springer Science and Business Media LLC},
abstract = {We present in this paper an algorithm that is capable of clustering images taken by an unknown number of unknown digital cameras into groups, such that each contains only images taken by the same source camera. It first extracts a sensor pattern noise (SPN) from each image, which serves as the fingerprint of the camera that has taken the image. The image clustering is performed based on the pairwise correlations between camera fingerprints extracted from images. During this process, each SPN is treated as a random variable and a Markov random field (MRF) approach is employed to iteratively assign a class label to each SPN (i.e., random variable). The clustering process requires no a priori knowledge about the dataset from the user. A concise yet effective cost function is formulated to allow different "neighbors" different voting power in determining the class label of the image in question depending on their similarities. Comparative experiments were carried out on the Dresden image database to demonstrate the advantages of the proposed clustering algorithm.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
262. Nurse, Jason R. C.; Creese, Sadie; Roure, David Charles De: Security Risk Assessment in Internet of Things Systems. In: vol. 19, no. 5, pp. 20–26, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-nurse_security_2017,
title = {Security Risk Assessment in Internet of Things Systems},
author = {Jason R. C. Nurse and Sadie Creese and David Charles De Roure},
url = {https://doi.org/10.1109%2Fmitp.2017.3680959},
doi = {10.1109/mitp.2017.3680959},
year = {2017},
date = {2017-10-04},
volume = {19},
number = {5},
pages = {20--26},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Information security risk assessment methods have served us well over the past two decades. They have provided a tool for organizations and governments to use in protecting themselves against pertinent risks. As the complexity, pervasiveness, and automation of technology systems increases and cyberspace matures, particularly with the Internet of Things (IoT), there is a strong argument that we will need new approaches to assess risk and build trust. The challenge with simply extending existing assessment methodologies to IoT systems is that we could be blind to new risks arising in such ecosystems. These risks could be related to the high degrees of connectivity present or the coupling of digital, cyber-physical, and social systems. This article makes the case for new methodologies to assess risk in this context that consider the dynamics and uniqueness of the IoT while maintaining the rigor of best practice in risk assessment.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
263. Jia, Ning; Sanchez, Victor; Li, Chang-Tsun: Learning optimised representations for view-invariant gait recognition. In: 2017 IEEE International Joint Conference on Biometrics (IJCB), IEEE, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-jia_learning_2017,
title = {Learning optimised representations for view-invariant gait recognition},
author = {Ning Jia and Victor Sanchez and Chang-Tsun Li},
url = {https://doi.org/10.1109%2Fbtas.2017.8272769},
doi = {10.1109/btas.2017.8272769},
year = {2017},
date = {2017-10-01},
booktitle = {2017 IEEE International Joint Conference on Biometrics (IJCB)},
publisher = {IEEE},
abstract = {Gait recognition can be performed without subject cooperation under harsh conditions, thus it is an important tool in forensic gait analysis, security control, and other commercial applications. One critical issue that prevents gait recognition systems from being widely accepted is the performance drop when the camera viewpoint varies between the registered templates and the query data. In this paper, we explore the potential of combining feature optimisers and representations learned by convolutional neural networks (CNN) to achieve efficient view-invariant gait recognition. The experimental results indicate that CNN learns highly discriminative representations across moderate view variations, and these representations can be further improved using view-invariant feature selectors, achieving a high matching accuracy across views.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
264. Wakenshaw, Susan Y. L.; Masi, Donato; Micillo, Rosario; Godsell, Janet; Maple, Carsten: The Internet of Things' potential to achieve supply chain integration: a case study. In: 21st Annual CIM Symposium - Globalisation 2.0, pp. 147–157, Cambridge, UK, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX) @inproceedings{proc-in-wakenshaw_internet_2017,
title = {The Internet of Things' potential to achieve supply chain integration: a case study},
author = {Susan Y. L. Wakenshaw and Donato Masi and Rosario Micillo and Janet Godsell and Carsten Maple},
url = {https://www.ifm.eng.cam.ac.uk/uploads/Events/CIM_Symposium/CIM Symposium 2017 Proceedings.pdf},
year = {2017},
date = {2017-09-28},
booktitle = {21st Annual CIM Symposium - Globalisation 2.0},
pages = {147--157},
address = {Cambridge, UK},
abstract = {Construction industry has a lower productivity if compared to manufacturing and several researchers related the issues of productivity to the low levels ofsupply chain integration. Internet of Things (IoT) recently emerged as a promising solution for the achievement of higher levels of supply chain integration. However, the link between IoT and supply chain integration has not been adequately investigated, and a comprehensive analysis of the mechanisms enabling higher levels of integration is missing. In the light if this gap, this paper explores the potential of Internet of Things for the achievement of supply chain integration, assuming a supply chain perspective. The results of an in depth case study in an infrastructure firm show that the full exploitation of the potential of IoT at a supply chain level requires the proper implementation of the key supply chain management principles.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
265. Tomić, Ivana; McCann, Julie A.: A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols. In: vol. 4, no. 6, pp. 1910–1923, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-tomic_survey_2017a,
title = {A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols},
author = {Ivana Tomi\'{c} and Julie A. McCann},
url = {https://doi.org/10.1109%2Fjiot.2017.2749883},
doi = {10.1109/jiot.2017.2749883},
year = {2017},
date = {2017-09-07},
volume = {4},
number = {6},
pages = {1910--1923},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {The increasing pervasiveness of wireless sensor networks (WSNs) in diverse application domains including critical infrastructure systems, sets an extremely high security bar in the design of WSN systems to exploit their full benefits, increasing trust while avoiding loss. Nevertheless, a combination of resource restrictions and the physical exposure of sensor devices inevitably cause such networks to be vulnerable to security threats, both external and internal. While several researchers have provided a set of open problems and challenges in WSN security and privacy, there is a gap in the systematic study of the security implications arising from the nature of existing communication protocols in WSNs. Therefore, we have carried out a deep-dive into the main security mechanisms and their effects on the most popular protocols and standards used in WSN deployments, i.e., IEEE 802.15.4, Berkeley media access control for low-power sensor networks, IPv6 over low-power wireless personal area networks, outing protocol for routing protocol for low-power and lossy networks (RPL), backpressure collection protocol, collection tree protocol, and constrained application protocol, where potential security threats and existing countermeasures are discussed at each layer of WSN stack. This paper culminates in a deeper analysis of network layer attacks deployed against the RPL routing protocol. We quantify the impact of individual attacks on the performance of a network using the Cooja network simulator. Finally, we discuss new research opportunities in network layer security and how to use Cooja as a benchmark for developing new defenses for WSN systems.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
266. Lindley, Joseph Galen; Coulton, Paul; Cooper, Rachel: Why the Internet of Things needs Object Orientated Ontology. In: vol. 20, no. sup1, pp. S2846–S2857, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-lindley_why_2017,
title = {Why the Internet of Things needs Object Orientated Ontology},
author = {Joseph Galen Lindley and Paul Coulton and Rachel Cooper},
url = {https://doi.org/10.1080%2F14606925.2017.1352796},
doi = {10.1080/14606925.2017.1352796},
year = {2017},
date = {2017-09-06},
volume = {20},
number = {sup1},
pages = {S2846--S2857},
publisher = {Informa UK Limited},
abstract = {The Internet of Things (IoT) is a network of connected devices with inputs and outputs operating in, and on, the physical world. The network is simultaneously fed by, and feeds into, data streams flowing across digital-physical boundaries, connecting sensors, servers, actuators, devices, and people. 'Things' of all types, lightbulbs, doorbells, kettles and cars, discretely-but-visibly do their jobs. Meanwhile in the unseen digital domain, where data swirls imperceptible to humans, the atmosphere is thick with the rapidly-moving data packets and content that constitute inter-machine chatter. Contrasting the visible calm in the physical world with obscured bedlam in the digital otherworld sets the scene for the argument we present in this paper. Applying Object Orientated Ontology, IoT designers may reimagine data, devices, and users, as equally significant actants in a flat ontology. In this paper, we exemplify our arguments by creating a Design Fiction around a reimagined 'smart kettle'.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
267. Wakenshaw, Susan Y. L.; Dhamotharan, Lalitha; Ignatius, Joshua; Ng, Irene C. L.; Ma, Xiao; Chen, Daqiang; Maple, Carsten: Privacy, vulnerability, and willingness to share: an empirical investigation using latent growth curve model. In: Data for Policy Conference, 2017. (Type: Proceedings Article | BibTeX) @inproceedings{proc-in-wakenshaw_privacy_2017,
title = {Privacy, vulnerability, and willingness to share: an empirical investigation using latent growth curve model},
author = {Susan Y. L. Wakenshaw and Lalitha Dhamotharan and Joshua Ignatius and Irene C. L. Ng and Xiao Ma and Daqiang Chen and Carsten Maple},
year = {2017},
date = {2017-09-06},
booktitle = {Data for Policy Conference},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
268. Wakenshaw, Susan Y. L.; Maple, Carsten; Chen, Daqiang; Micillo, Rosario: An IoT-enabled Supply Chain Integration Framework: Empirical Case Studies. In: Advances in Manufacturing Technology XXXI, pp. 263–268, IOS Press, London, UK, 2017, ISBN: 978-1-61499-792-4-263. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-wakenshaw_iot_2017,
title = {An IoT-enabled Supply Chain Integration Framework: Empirical Case Studies},
author = {Susan Y. L. Wakenshaw and Carsten Maple and Daqiang Chen and Rosario Micillo},
url = {https://ebooks.iospress.nl/publication/47038},
doi = {10.3233/978-1-61499-792-4-263},
isbn = {978-1-61499-792-4-263},
year = {2017},
date = {2017-09-05},
booktitle = {Advances in Manufacturing Technology XXXI},
volume = {6},
pages = {263--268},
publisher = {IOS Press},
address = {London, UK},
series = {Advances in Transdisciplinary Engineering},
abstract = {Supply chain integration is crucial for supply chain performance, particularly in industry 4.0. With the proliferation of Internet of Things (IoT) and the use of cyber-physical systems, supply chain integration needs to be greatly enhanced. In this paper, we explore supply integration (process and application) in the supply chain network enabled by IoT. Using the case study method, we investigate technical and business applications of IoT in supply chains and how it can interface with the process integration within the CPFR reference model. The project is ongoing and here we report the preliminary findings.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
269. Mukisa, Sarah Schulz; Rashid, Awais: Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study. In: 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW), IEEE, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-mukisa_challenges_2017,
title = {Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study},
author = {Sarah Schulz Mukisa and Awais Rashid},
url = {https://doi.org/10.1109%2Frew.2017.48},
doi = {10.1109/rew.2017.48},
year = {2017},
date = {2017-09-04},
booktitle = {2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)},
publisher = {IEEE},
abstract = {There has been a surge in the deployment of Vehicle-to-Vehicle or Vehicle-to-Infrastucture (V2X) telematics in recent years. One of the promising revenue streams in the telematic ecosystem is the use of diagnostic data to provide insurance relevant information. The use of telematic insurance requires the collection of a vast amount of vehicular data. Some of this data is clearly indicated in the web sites of the insurance companies. However, most insurance companies do not inform users of the data being collected and the purpose of the collected data. In this paper, we report on the results of an exploratory study of the top 5 telematic insurance or black box insurance companies in the UK. We analyse the data collected by telematic insurance companies, compare the privacy policies given on the companies' website, model privacy requirements and give an insight into privacy requirements engineering in V2X telematic insurance applications.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
270. Choi, Dong-Wan; Pei, Jian; Heinis, Thomas: Efficient mining of regional movement patterns in semantic trajectories. In: vol. 10, no. 13, pp. 2073–2084, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-choi_efficient_2017,
title = {Efficient mining of regional movement patterns in semantic trajectories},
author = {Dong-Wan Choi and Jian Pei and Thomas Heinis},
url = {https://doi.org/10.14778%2F3151106.3151111},
doi = {10.14778/3151106.3151111},
year = {2017},
date = {2017-09-01},
volume = {10},
number = {13},
pages = {2073--2084},
publisher = {VLDB Endowment},
abstract = {Semantic trajectory pattern mining is becoming more and more important with the rapidly growing volumes of semantically rich trajectory data. Extracting sequential patterns in semantic trajectories plays a key role in understanding semantic behaviour of human movement, which can widely be used in many applications such as location-based advertising, road capacity optimisation, and urban planning. However, most of existing works on semantic trajectory pattern mining focus on the entire spatial area, leading to missing some locally significant patterns within a region. Based on this motivation, this paper studies a regional semantic trajectory pattern mining problem, aiming at identifying all the regional sequential patterns in semantic trajectories. Specifically, we propose a new density scheme to quantify the frequency of a particular pattern in space, and thereby formulate a new mining problem of finding all the regions in which such a pattern densely occurs. For the proposed problem, we develop an efficient mining algorithm, called RegMiner (\underline{Reg}ional Semantic Trajectory Pattern \underline{Miner}), which effectively reveals movement patterns that are locally frequent in such a region but not necessarily dominant in the entire space. Our empirical study using real trajectory data shows that RegMiner finds many interesting local patterns that are hard to find by a state-of-the-art global pattern mining scheme, and it also runs several orders of magnitude faster than the global pattern mining algorithm.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
271. Lindley, Joseph Galen; Coulton, Paul; Akmal, Haider Ali; Knowles, Brandin Hanson: Anticipating GDPR in Smart Homes Through Fictional Conversational Objects. N/A, 2017. (Type: Conference | Abstract | Links | BibTeX) @conference{conf-lindley_anticipating_2017,
title = {Anticipating GDPR in Smart Homes Through Fictional Conversational Objects},
author = {Joseph Galen Lindley and Paul Coulton and Haider Ali Akmal and Brandin Hanson Knowles},
url = {https://eprints.lancs.ac.uk/id/eprint/87438/1/Anticipating_GDPR_in_Smart_Homes_Through_Fictional_Conversational_Objects.pdf},
year = {2017},
date = {2017-08-30},
booktitle = {N/A},
abstract = {The incoming General Data Protection Regulation framework will profoundly affect the way which connected devices - the constituents of the so-called 'Internet of Things' - are designed and implemented. In this paper we introduce the metaphor 'IoT as constellation', a proposal grounded in Object Oriented Ontology, that aims to help designers create GDPR-compliant products which appreciate and respond to the data-mediated dependencies and interconnections of the Internet of Things. In particular we focus on voice-mediated interactions within IoT-enabled smart home contexts. To explore this space we apply the speculative design method Design Fiction to: (1) demonstrate how IoT as constellations may be applied in design practice; (2) promote Design Fiction as a viable prototyping mechanism for such conceptual frameworks; (3) forward proposals for how to approach GDPRcompliant, and Human Centered, design for the IoT.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
272. Kitchin, Rob; Lauriault, Tracey P.; McArdle, Gavin (Ed.): Data and the City. Routledge, 2017, ISBN: 9781315407388. (Type: Book | Abstract | Links | BibTeX | Altmetric) @book{bk-kitchin_data_2017,
title = {Data and the City},
editor = {Rob Kitchin and Tracey P. Lauriault and Gavin McArdle},
url = {https://doi.org/10.4324%2F9781315407388},
doi = {10.4324/9781315407388},
isbn = {9781315407388},
year = {2017},
date = {2017-08-25},
publisher = {Routledge},
abstract = {There is a long history of governments, businesses, science and citizens producing and utilizing data in order to monitor, regulate, profit from and make sense of the urban world. Recently, we have entered the age of big data, and now many aspects of everyday urban life are being captured as data and city management is mediated through data-driven technologies.
Data and the City is the first edited collection to provide an interdisciplinary analysis of how this new era of urban big data is reshaping how we come to know and govern cities, and the implications of such a transformation. This book looks at the creation of real-time cities and data-driven urbanism and considers the relationships at play. By taking a philosophical, political, practical and technical approach to urban data, the authors analyse the ways in which data is produced and framed within socio-technical systems. They then examine the constellation of existing and emerging urban data technologies. The volume concludes by considering the social and political ramifications of data-driven urbanism, questioning whom it serves and for what ends.
This book, the companion volume to 2016's Code and the City, offers the first critical reflection on the relationship between data, data practices and the city, and how we come to know and understand cities through data. It will be crucial reading for those who wish to understand and conceptualize urban big data, data-driven urbanism and the development of smart cities.},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
Data and the City is the first edited collection to provide an interdisciplinary analysis of how this new era of urban big data is reshaping how we come to know and govern cities, and the implications of such a transformation. This book looks at the creation of real-time cities and data-driven urbanism and considers the relationships at play. By taking a philosophical, political, practical and technical approach to urban data, the authors analyse the ways in which data is produced and framed within socio-technical systems. They then examine the constellation of existing and emerging urban data technologies. The volume concludes by considering the social and political ramifications of data-driven urbanism, questioning whom it serves and for what ends.
This book, the companion volume to 2016's Code and the City, offers the first critical reflection on the relationship between data, data practices and the city, and how we come to know and understand cities through data. It will be crucial reading for those who wish to understand and conceptualize urban big data, data-driven urbanism and the development of smart cities.273. Maple, Carsten: Security and privacy in the internet of things. In: vol. 2, no. 2, pp. 155–184, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-maple_security_2017,
title = {Security and privacy in the internet of things},
author = {Carsten Maple},
url = {https://doi.org/10.1080%2F23738871.2017.1366536},
doi = {10.1080/23738871.2017.1366536},
year = {2017},
date = {2017-08-24},
volume = {2},
number = {2},
pages = {155--184},
publisher = {Informa UK Limited},
abstract = {The internet of things (IoT) is a technology that has the capacity to revolutionise the way that we live, in sectors ranging from transport to health, from entertainment to our interactions with government. This fantastic opportunity also presents a number of significant challenges. The growth in the number of devices and the speed of that growth presents challenges to our security and freedoms as we battle to develop policies, standards, and governance that shape this development without stifling innovation. This paper discusses the evolution of the IoT, its various definitions, and some of its key application areas. Security and privacy considerations and challenges that lie ahead are discussed both generally and in the context of these applications.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
274. Lei, Ao; Cruickshank, Haitham; Cao, Yue; Asuquo, Philip; Ogah, Chibueze P. Anyigor; Sun, Zhili: Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems. In: vol. 4, no. 6, pp. 1832–1843, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-lei_blockchain_2017,
title = {Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems},
author = {Ao Lei and Haitham Cruickshank and Yue Cao and Philip Asuquo and Chibueze P. Anyigor Ogah and Zhili Sun},
url = {https://doi.org/10.1109%2Fjiot.2017.2740569},
doi = {10.1109/jiot.2017.2740569},
year = {2017},
date = {2017-08-15},
volume = {4},
number = {6},
pages = {1832--1843},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {As modern vehicle and communication technologies advanced apace, people begin to believe that the Intelligent Transportation System (ITS) would be achievable in one decade. ITS introduces information technology to the transportation infrastructures and aims to improve road safety and traffic efficiency. However, security is still a main concern in vehicular communication systems (VCSs). This can be addressed through secured group broadcast. Therefore, secure key management schemes are considered as a critical technique for network security. In this paper, we propose a framework for providing secure key management within the heterogeneous network. The security managers (SMs) play a key role in the framework by capturing the vehicle departure information, encapsulating block to transport keys and then executing rekeying to vehicles within the same security domain. The first part of this framework is a novel network topology based on a decentralized blockchain structure. The blockchain concept is proposed to simplify the distributed key management in heterogeneous VCS domains. The second part of the framework uses the dynamic transaction collection period to further reduce the key transfer time during vehicles handover. Extensive simulations and analysis show the effectiveness and efficiency of the proposed framework, in which the blockchain structure performs better in term of key transfer time than the structure with a central manager, while the dynamic scheme allows SMs to flexibly fit various traffic levels.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
275. Bradbury, Matthew; Jhumka, Arshad: A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks. In: 2017 IEEE Trustcom/BigDataSE/ICESS, IEEE, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-bradbury_optimal_2017,
title = {A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks},
author = {Matthew Bradbury and Arshad Jhumka},
url = {https://doi.org/10.1109%2Ftrustcom%2Fbigdatase%2Ficess.2017.265},
doi = {10.1109/trustcom/bigdatase/icess.2017.265},
year = {2017},
date = {2017-08-01},
booktitle = {2017 IEEE Trustcom/BigDataSE/ICESS},
publisher = {IEEE},
abstract = {As interest in using Wireless Sensor Networks (WSNs) for deployments in scenarios such as asset monitoring increases, the need to consider security and privacy issues also becomes greater. One such issue is that of Source Location Privacy (SLP) where the location of a source in the network needs to be kept secret from a malicious attacker. Many techniques have been proposed to provide SLP against an eavesdropping attacker. Most techniques work by first developing an algorithm followed by extensive performance validation. Differently, in this paper, we model the SLP problem as an Integer Linear Programming optimization problem. Using the IBM ILOG CPLEX optimiser, we obtain an optimal solution to provide SLP. However, that solution is centralised (i.e., requires network-wide knowledge) making the solution unsuitable for WSNs. Therefore, we develop a distributed version of the solution and evaluate the level of privacy provided by it. The solution is hybrid in nature, in that it uses both spatial and temporal redundancy to provide SLP. Results from extensive simulations using the TOSSIM WSN simulator indicate a 1% capture ratio is achievable as a trade-off for an increase in the delivery latency.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
276. Zhang, Bingsheng; Zhou, Hong-Sheng: Brief Announcement: Statement Voting and Liquid Democracy. In: PODC '17: Proceedings of the ACM Symposium on Principles of Distributed Computing, ACM, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-zhang_brief_2017,
title = {Brief Announcement: Statement Voting and Liquid Democracy},
author = {Bingsheng Zhang and Hong-Sheng Zhou},
url = {https://doi.org/10.1145%2F3087801.3087868},
doi = {10.1145/3087801.3087868},
year = {2017},
date = {2017-07-25},
booktitle = {PODC '17: Proceedings of the ACM Symposium on Principles of Distributed Computing},
publisher = {ACM},
abstract = {The existing (election) voting systems, e.g., representative democracy, have many limitations and often fail to serve the best interest of the people in collective decision making. To address this issue, the concept of liquid democracy has been emerging as an alternative decision-making model to make better use of "the wisdom of crowds". Very recently, a few liquid democracy implementations, e.g. Google Votes and Decentralized Autonomous Organization (DAO), are released; however, those systems only focus on the functionality aspect, as no privacy/anonymity is considered. In this work, we, for the first time, provide a rigorous study of liquid democracy under the Universal Composability (UC) frame- work. In the literature, liquid democracy was achieved via two separate stages -- delegation and voting. We propose an efficient liquid democracy e-voting scheme that uni es these two stages. At the core of our design is a new voting concept called statement voting, which can be viewed as a natural extension of the conventional voting approaches. We remark that our statement voting can be extended to enable more complex voting and generic ledger-based non-interactive multi-party computation. We believe that the statement voting concept opens a door for constructing a new class of e-voting schemes.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
277. Lundbæk, Leif-Nissen; D'Iddio, Andrea Callia; Huth, Michael: Centrally Governed Blockchains: Optimizing Security, Cost, and Availability. In: Models, Algorithms, Logics and Tools, pp. 578–599, Springer International Publishing, 2017. (Type: Book Section | Abstract | Links | BibTeX | Altmetric) @incollection{col-in-lundbaek_centrally_2017,
title = {Centrally Governed Blockchains: Optimizing Security, Cost, and Availability},
author = {Leif-Nissen Lundb\aek and Andrea Callia D'Iddio and Michael Huth},
url = {https://doi.org/10.1007%2F978-3-319-63121-9_29},
doi = {10.1007/978-3-319-63121-9_29},
year = {2017},
date = {2017-07-25},
booktitle = {Models, Algorithms, Logics and Tools},
pages = {578--599},
publisher = {Springer International Publishing},
abstract = {We propose the formal study of blockchains that are owned and controlled by organizations and that neither create cryptocurrencies nor provide incentives to solvers of cryptographic puzzles. We view such approaches as frameworks in which system parts, such as the cryptographic puzzle, may be instantiated with different technology. Owners of such a blockchain procure puzzle solvers as resources they control, and use a mathematical model to compute optimal parameters for the cryptographic puzzle mechanism or other parts of the blockchain. We illustrate this approach with a use case in which blockchains record hashes of financial process transactions to increase their trustworthiness and that of their audits. For Proof of Work as cryptographic puzzle, we develop a detailed mathematical model to derive MINLP optimization problems for computing optimal Proof of Work configuration parameters that trade off potentially conflicting aspects such as availability, resiliency, security, and cost in this governed setting. We demonstrate the utility of such a mining calculus by applying it on some instances of this problem. We hope that our work may facilitate the creation of domain-specific blockchains for a wide range of applications such as trustworthy information in Internet of Things systems and bespoke improvements of legacy financial services.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
278. Mittelstadt, Brent Daniel: Ethics of the health-related internet of things: a narrative review. In: vol. 19, no. 3, pp. 157–175, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-mittelstadt_ethics_2017,
title = {Ethics of the health-related internet of things: a narrative review},
author = {Brent Daniel Mittelstadt},
url = {https://doi.org/10.1007%2Fs10676-017-9426-4},
doi = {10.1007/s10676-017-9426-4},
year = {2017},
date = {2017-07-04},
volume = {19},
number = {3},
pages = {157--175},
publisher = {Springer Science and Business Media LLC},
abstract = {The internet of things is increasingly spreading into the domain of medical and social care. Internet-enabled devices for monitoring and managing the health and well-being of users outside of traditional medical institutions have rapidly become common tools to support healthcare. Health-related internet of things (H-IoT) technologies increasingly play a key role in health management, for purposes including disease prevention, real-time tele-monitoring of patient's functions, testing of treatments, fitness and well-being monitoring, medication dispensation, and health research data collection. H-IoT promises many benefits for health and healthcare. However, it also raises a host of ethical problems stemming from the inherent risks of Internet enabled devices, the sensitivity of health-related data, and their impact on the delivery of healthcare. This paper maps the main ethical problems that have been identified by the relevant literature and identifies key themes in the on-going debate on ethical problems concerning H-IoT.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
279. Mittelstadt, Brent Daniel: Designing the Health-related Internet of Things: Ethical Principles and Guidelines. In: vol. 8, no. 3, pp. 77, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-mittelstadt_designing_2017,
title = {Designing the Health-related Internet of Things: Ethical Principles and Guidelines},
author = {Brent Daniel Mittelstadt},
url = {https://doi.org/10.3390%2Finfo8030077},
doi = {10.3390/info8030077},
year = {2017},
date = {2017-07-01},
volume = {8},
number = {3},
pages = {77},
publisher = {MDPI AG},
abstract = {The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT) increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and consumers may be rapid. However, a host of ethical concerns are also raised that must be addressed. The inherent sensitivity of health-related data being generated and latent risks of Internet-enabled devices pose serious challenges. Users, already in a vulnerable position as patients, face a seemingly impossible task to retain control over their data due to the scale, scope and complexity of systems that create, aggregate, and analyse personal health data. In response, the H-IoT must be designed to be technologically robust and scientifically reliable, while also remaining ethically responsible, trustworthy, and respectful of user rights and interests. To assist developers of the H-IoT, this paper describes nine principles and nine guidelines for ethical design of H-IoT devices and data protocols.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
280. Brass, Irina; Sowell, Jesse; Carr, Madeline; Blackstock, Jason J.: The Role of Transnational Expert Associations in Governing the Cybersecurity Risks of the Internet of Things. In: 3rd International Conference on Public Policy (ICPP3), 2017. (Type: Proceedings Article | Abstract | Links | BibTeX) @inproceedings{proc-in-brass_role_2017,
title = {The Role of Transnational Expert Associations in Governing the Cybersecurity Risks of the Internet of Things},
author = {Irina Brass and Jesse Sowell and Madeline Carr and Jason J. Blackstock},
url = {https://www.ippapublicpolicy.org//file/paper/59530f6763ae8.pdf},
year = {2017},
date = {2017-06-28},
booktitle = {3rd International Conference on Public Policy (ICPP3)},
institution = {University College London, Stanford University, Cardiff University},
abstract = {The benefits and challenges of the Internet of Things (IoT) are increasingly capturing the attention of policy-makers, the media and the wider public. On the one hand, IoT is perceived as enabling societal and economic progress by facilitating customised and efficient production processes (industrial IoT), enabling forward planning by uncovering structural weaknesses in critical infrastructure (transport, energy) or responding to the challenges of an ageing population through personalised medicine and increased mobility (health, autonomous vehicles). On the other hand, the long-term public acceptance of IoT will be challenged by the increasing number of cyberattacks originating from IoT endpoint devices and the challenges of monitoring and enforcing basic security policies on these devices. These security vulnerabilities expose fundamental concerns about the stability of the IoT ecosystem and raise questions about the appropriate security safeguards necessary to limit abuse.
Through an analysis of the Mirai distributed denial of service (DDoS) attacks on KrebsonSecurity, OVH and Dyn using compromised IoT endpoint devices (routers, CCTVs and TV sets connected to the Internet), this paper investigates the unique cybersecurity risks and uncertainties that are emerging from the growth of IoT. There are two distinguishing characteristics of IoT botnets. The first is the higher potential utilization rate of permanently switched on, "connected" things. The second is that infections are more durable given the lack of or limited capacity of these devices to incorporate security features in their hardware as well as control and lifetime vulnerability management in their software. The result is a malware infrastructure that is more reliable for abusive activities than conventional botnets.
A key problem here is that agreeing on a single standard for minimum security specifications for IoT endpoints has proven challenging at both domestic and international level. In order to move forward, this paper proposes a new conceptual framework for understanding and evaluating the role of transnational expert associations, such as the Message, Malware, and Mobile Anti-Abuse Working Group (M3AAWG) and the Anti-Phishing Working Group (APWG) in developing transnational IoT security standards and monitoring regimes. In particular, we argue that participants in groups like M3AAWG and APWG form expert communities effectively positioned to develop unique decision-making frameworks and to document information security processes for monitoring and mitigating the cybersecurity risks associated with the growth of IoT. The paper draws upon the literature on "transnational private regulation" (Cafaggi 2012, Scott et al 2011) and "global private governance" (Mattli and B\"{u}the 2011, Mattli and Woods 2009) to highlight the growing role of expert communities of ICT manufacturers and network operators in providing best practice, information sharing and monitoring capacity in order to respond to the unique cybersecurity challenges of IoT in the absence of top-down regulatory regimes.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Through an analysis of the Mirai distributed denial of service (DDoS) attacks on KrebsonSecurity, OVH and Dyn using compromised IoT endpoint devices (routers, CCTVs and TV sets connected to the Internet), this paper investigates the unique cybersecurity risks and uncertainties that are emerging from the growth of IoT. There are two distinguishing characteristics of IoT botnets. The first is the higher potential utilization rate of permanently switched on, "connected" things. The second is that infections are more durable given the lack of or limited capacity of these devices to incorporate security features in their hardware as well as control and lifetime vulnerability management in their software. The result is a malware infrastructure that is more reliable for abusive activities than conventional botnets.
A key problem here is that agreeing on a single standard for minimum security specifications for IoT endpoints has proven challenging at both domestic and international level. In order to move forward, this paper proposes a new conceptual framework for understanding and evaluating the role of transnational expert associations, such as the Message, Malware, and Mobile Anti-Abuse Working Group (M3AAWG) and the Anti-Phishing Working Group (APWG) in developing transnational IoT security standards and monitoring regimes. In particular, we argue that participants in groups like M3AAWG and APWG form expert communities effectively positioned to develop unique decision-making frameworks and to document information security processes for monitoring and mitigating the cybersecurity risks associated with the growth of IoT. The paper draws upon the literature on "transnational private regulation" (Cafaggi 2012, Scott et al 2011) and "global private governance" (Mattli and Büthe 2011, Mattli and Woods 2009) to highlight the growing role of expert communities of ICT manufacturers and network operators in providing best practice, information sharing and monitoring capacity in order to respond to the unique cybersecurity challenges of IoT in the absence of top-down regulatory regimes.281. Ng, Irene C. L.; Wakenshaw, Susan Y. L.; Taillard, Marie: Hub of All Things: creating a shared purpose service ecosystem. In: 26th Frontiers in Service Conference 2017, 2017. (Type: Proceedings Article | BibTeX) @inproceedings{proc-in-ng_hub_2017,
title = {Hub of All Things: creating a shared purpose service ecosystem},
author = {Irene C. L. Ng and Susan Y. L. Wakenshaw and Marie Taillard},
year = {2017},
date = {2017-06-22},
booktitle = {26th Frontiers in Service Conference 2017},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
282. Brass, Irina: Cybersecurity and Liability in Autonomous and Intelligent Transport. BSI Standards Matter, 2017. (Type: Conference | Links | BibTeX) @conference{conf-brass_cybersecurity_2017,
title = {Cybersecurity and Liability in Autonomous and Intelligent Transport},
author = {Irina Brass},
url = {https://www.bsigroup.com/Documents/about-bsi/standards_matter/bsi_standards_matter_speakers_final.pdf},
year = {2017},
date = {2017-06-22},
booktitle = {BSI Standards Matter},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
283. Katsaros, Konstantinos; Dianati, Mehrdad: A cost-effective SCTP extension for hybrid vehicular networks. In: vol. 2, no. 2, pp. 18–29, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-katsaros_cost_2017,
title = {A cost-effective SCTP extension for hybrid vehicular networks},
author = {Konstantinos Katsaros and Mehrdad Dianati},
url = {https://doi.org/10.1007%2Fs41650-017-0021-y},
doi = {10.1007/s41650-017-0021-y},
year = {2017},
date = {2017-06-22},
volume = {2},
number = {2},
pages = {18--29},
publisher = {Springer Science and Business Media LLC},
abstract = {Connected vehicles are promoted with the use of different communication technologies for diverse applications and services. There is an ongoing debate in the research and industry communities whether short range communications based on IEEE 802.11p or cellular based on 3GPP LTE should be used for vehicular communications. We propose a mechanism to utilise both short range and cellular communications simultaneously in a cost efficient way while providing the required quality of service to the users. A host connected to multiple networks is referred to as a multi-homed node and SCTP (Stream Control Transmission Protocol) is an IETF standard which supports multi-homing. We propose an extension to SCTP that takes into account not only path quality but also the cost of using each network. It is shown that the combination of QoS and cost information increases economic benefits for provider and end-users, while providing increased packet throughput.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
284. Bureš, Tomáš; Weyns, Danny; Schmer, Bradley; Tovar, Eduardo; Boden, Eric; Gabor, Thomas; Gerostathopoulos, Ilias; Gupta, Pragya Kirti; Kang, Eunsuk; Knauss, Alessia; Patel, Pankesh; Rashid, Awais; Ruchkin, Ivan; Sukkerd, Roykrong; Tsigkanos, Christos: Software Engineering for Smart Cyber-Physical Systems. In: vol. 42, no. 2, pp. 19–24, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-bures_software_2017,
title = {Software Engineering for Smart Cyber-Physical Systems},
author = {Tom\'{a}\v{s} Bure\v{s} and Danny Weyns and Bradley Schmer and Eduardo Tovar and Eric Boden and Thomas Gabor and Ilias Gerostathopoulos and Pragya Kirti Gupta and Eunsuk Kang and Alessia Knauss and Pankesh Patel and Awais Rashid and Ivan Ruchkin and Roykrong Sukkerd and Christos Tsigkanos},
url = {https://doi.org/10.1145%2F3089649.3089656},
doi = {10.1145/3089649.3089656},
year = {2017},
date = {2017-06-12},
volume = {42},
number = {2},
pages = {19--24},
publisher = {Association for Computing Machinery (ACM)},
abstract = {Smart Cyber--Physical Systems (sCPS) are modern CPS systems that are engineered to seamlessly integrate a large number of computation and physical components; they need to control entities in their environment in a smart and collective way to achieve a high degree of effectiveness and efficiency. At the same time, these systems are supposed to be safe and secure, deal with environment dynamicity and uncertainty, cope with external threats, and optimize their behavior to achieve the best possible outcome. This "smartness" typically stems from highly cooperative behavior, self--awareness, self--adaptation, and selfoptimization. Most of the "smartness" is implemented in software, which makes the software one of the most complex and most critical constituents of sCPS. As the specifics of sCPS render traditional software engineering approaches not directly applicable, new and innovative approaches to software engineering of sCPS need to be sought. This paper reports on the results of the Second International Workshop on Software Engineering for Smart Cyber--Physical Systems (SEsCPS 2016), which specifically focuses on challenges and promising solutions in the area of software engineering for sCPS.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
285. Nissen, Bettina; Symons, Kate; Tallyn, Ella; Speed, Chris; Maxwell, Deborah; Vines, John: New Value Transactions: Understanding and Designing for Distributed Autonomous Organisations. In: DIS '17 Companion: Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems, ACM, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-nissen_new_2017,
title = {New Value Transactions: Understanding and Designing for Distributed Autonomous Organisations},
author = {Bettina Nissen and Kate Symons and Ella Tallyn and Chris Speed and Deborah Maxwell and John Vines},
url = {https://doi.org/10.1145%2F3064857.3064862},
doi = {10.1145/3064857.3064862},
year = {2017},
date = {2017-06-10},
booktitle = {DIS '17 Companion: Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems},
publisher = {ACM},
abstract = {New digital technologies such as Blockchain and smart contracting are rapidly changing the face of value exchange, and present exciting new opportunities for designers. This one-day workshop will explore the implications of emerging and future technologies using the lens of Distributed Autonomous Organisations (DAOs). DAOs introduce the principle that products and services may soon be owned and managed collectively and not by one person or authority, thus challenging traditional concepts of user communities, ownership and power. The HCI community has recently explored issues related to finance, money and collaborative practice; however, the implications of these emerging but rapidly ascending distributed organisations has not been examined. This one-day participatory workshop will combine presentations, case studies and group work sessions to understand, develop and critique these new forms of distributed power and ownership, and to practically explore how to design interactive products and services which enable, challenge or disrupt these emerging models.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
286. Stead, Michael Robert; Coulton, Paul: Old, Sick And No Health Insurance. Will You Need a Permit to Use Your Home-made Health Wearable?. In: DIS '17 Companion: Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems, ACM, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-stead_old_2017,
title = {Old, Sick And No Health Insurance. Will You Need a Permit to Use Your Home-made Health Wearable?},
author = {Michael Robert Stead and Paul Coulton},
url = {https://doi.org/10.1145%2F3064857.3079127},
doi = {10.1145/3064857.3079127},
year = {2017},
date = {2017-06-10},
booktitle = {DIS '17 Companion: Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems},
publisher = {ACM},
abstract = {We posit that as aging populations grow, so too will the demand for wearable devices that help people manage their chronic health conditions autonomously, at home, without medical supervision. Although healthcare providers are now integrating wearables into frontline services, the regulatory journey from consumer use to patient use for these devices is complex and oft protracted due to strict legislation. Through the creation of a design fiction -- HealthBand -- we explore how open source and crowd-funded wearables might impact future health product legislation. We argue that the generated artefacts co-construct a world in which HealthBand could plausibly exist, and in turn can help audiences engage more explicitly with the fiction's broader debates. Further, if future health wearables are to be adopted, HCI and design researchers must not focus solely on creating prototypes but also engage with regulatory change. We assert design fictions that build worlds like HealthBand have a role in highlighting the changes required.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
287. Coulton, Paul; Lindley, Joseph Galen: Vapourworlds and Design Fiction: The Role of Intentionality. In: vol. 20, no. sup1, pp. S4632–S4642, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-coulton_vapourworlds_2017,
title = {Vapourworlds and Design Fiction: The Role of Intentionality},
author = {Paul Coulton and Joseph Galen Lindley},
doi = {10.1080/14606925.2017.1352960},
year = {2017},
date = {2017-06-06},
volume = {20},
number = {sup1},
pages = {S4632--S4642},
publisher = {Informa UK Limited},
abstract = {There is a long tradition of designers creating visions of technological futures. We contrast the properties of two related types of future envisionment, whose commonality is using `world building' to showcase or prototype technological concepts. We consider commercial visions that depict potential future products within possible future worlds, and by extending the concept of Vapourware we term these `Vapourworlds'. We contrast Vapourworlds with Design Fictions, a class of envisionment that inherits qualities of criticality and exploration from its familial antecedents' radical design and critical design. By comparing these two approaches we intend to shed light on both. Superficially these world building endeavours appear similar, yet under the surface an underlying difference in intentionality permeates the substance of both practices. We conclude with a position that by highlighting the contrasts between these practices, mutually beneficial insights become apparent.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
288. Kirton, Jack; Bradbury, Matthew; Jhumka, Arshad: Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), IEEE, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-kirton_source_2017,
title = {Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks},
author = {Jack Kirton and Matthew Bradbury and Arshad Jhumka},
url = {https://doi.org/10.1109%2Ficdcs.2017.171},
doi = {10.1109/icdcs.2017.171},
year = {2017},
date = {2017-06-05},
booktitle = {2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)},
publisher = {IEEE},
abstract = {Source location privacy (SLP) is an important property for the class of asset monitoring problems in wireless sensor networks (WSNs). SLP aims to prevent an attacker from finding a valuable asset when a WSN node is broadcasting information due to the detection of the asset. Most SLP techniques focus at the routing level, with typically high message overhead. The objective of this paper is to investigate the novel problem of developing a TDMA MAC schedule that can provide SLP. We make a number of important contributions: (i) we develop a novel formalisation of a class of eavesdropping attackers and provide novel formalisations of SLP-aware data aggregation schedules (DAS), (ii) we present a decision procedure to verify whether a DAS schedule is SLP-aware, that returns a counterexample if the schedule is not, similar to model checking, and (iii) we develop a 3-stage distributed algorithm that transforms an initial DAS algorithm into a corresponding SLP-aware schedule against a specific class of eavesdroppers. Our simulation results show that the resulting SLP-aware DAS protocol reduces the capture ratio by 50% at the expense of negligable message overhead.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
289. Wachter, Sandra; Mittelstadt, Brent Daniel; Floridi, Luciano: Transparent, explainable, and accountable AI for robotics. In: vol. 2, no. 6, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-wachter_transparent_2017,
title = {Transparent, explainable, and accountable AI for robotics},
author = {Sandra Wachter and Brent Daniel Mittelstadt and Luciano Floridi},
url = {https://doi.org/10.1126%2Fscirobotics.aan6080},
doi = {10.1126/scirobotics.aan6080},
year = {2017},
date = {2017-05-31},
volume = {2},
number = {6},
publisher = {American Association for the Advancement of Science (AAAS)},
abstract = {To create fair and accountable AI and robotics, we need precise regulation and better methods to certify, explain, and audit inscrutable systems.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
290. Aldrich, Richard J.: Strategic culture as a constraint: intelligence analysis, memory and organizational learning in the social sciences and history. In: vol. 32, no. 5, pp. 625–635, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-aldrich_strategic_2017,
title = {Strategic culture as a constraint: intelligence analysis, memory and organizational learning in the social sciences and history},
author = {Richard J. Aldrich},
url = {https://doi.org/10.1080%2F02684527.2017.1310977},
doi = {10.1080/02684527.2017.1310977},
year = {2017},
date = {2017-05-22},
volume = {32},
number = {5},
pages = {625--635},
publisher = {Informa UK Limited},
abstract = {Academics working on intelligence failure are famous for their pessimism. This paper is more optimistic and sees strategic culture as helpfully constraining the likely options of our enemies. It suggests that there is a wealth of innovative work here that we might exploit here to assist with strategic estimates and argues that it is puzzling that we have not tried to harness it before in a more programmatic way. It examines sets of different but related ideas about notions of strategic culture, historical analogies and social learning that have been developed by leading political scientists and then asks what they might contribute to improved intelligence analysis.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
291. Anthonysamy, Pauline; Rashid, Awais; Chitchyan, Ruzanna: Privacy Requirements: Present & Future. In: 2017 IEEE/ACM 39th International Conference on Software Engineering: Software Engineering in Society Track (ICSE-SEIS), IEEE, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-anthonysamy_privacy_2017,
title = {Privacy Requirements: Present \& Future},
author = {Pauline Anthonysamy and Awais Rashid and Ruzanna Chitchyan},
url = {https://doi.org/10.1109%2Ficse-seis.2017.3},
doi = {10.1109/icse-seis.2017.3},
year = {2017},
date = {2017-05-20},
booktitle = {2017 IEEE/ACM 39th International Conference on Software Engineering: Software Engineering in Society Track (ICSE-SEIS)},
publisher = {IEEE},
abstract = {Software systems are increasingly open, handle large amounts of personal or other sensitive data and are intricately linked with the daily lives of individuals and communities. This poses a range of privacy requirements. Such privacy requirements are typically treated as instances of requirements pertaining to compliance, traceability, access control, verification or usability. Though important, such approaches assume that the scope for the privacy requirements can be established a priori and that such scope does not vary drastically once the system is deployed. User data and information, however, exists in an open, hyper-connected and potentially "unbounded" environment. Furthermore, "privacy requirements - present"and "privacy requirements - future" may differ significantly as the privacy implications are often emergent a posteriori. Effective treatment of privacy requirements, therefore, requires techniques and approaches that fit with the inherent openness and fluidity of the environment through which user data and information flows. This paper surveys state of the art and presents some potential directions in the way privacy requirements should be treated. We reflect on the limitations of existing approaches with regards to unbounded privacy requirements and highlight a set of key challenges for requirements engineering research with regards to managing privacy in such unbounded settings.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
292. Lundbæk, Leif-Nissen; D'Iddio, Andrea Callia; Huth, Michael: Optimizing Governed Blockchains for Financial Process Authentications. In: arxiv:1612.00407, 2017. (Type: Journal Article | Abstract | Links | BibTeX) @article{art-lundbaek_optimizing_2016,
title = {Optimizing Governed Blockchains for Financial Process Authentications},
author = {Leif-Nissen Lundb\aek and Andrea Callia D'Iddio and Michael Huth},
url = {http://arxiv.org/abs/1612.00407v2},
year = {2017},
date = {2017-05-16},
journal = {arxiv:1612.00407},
abstract = {We propose the formal study of governed blockchains that are owned and controlled by organizations and that neither create cryptocurrencies nor provide any incentives to solvers of cryptographic puzzles. We view such approaches as frameworks in which system parts, such as the cryptographic puzzle, may be instantiated with different technology. Owners of such a blockchain procure puzzle solvers as resources they control, and use a mathematical model to compute optimal parameters for the cryptographic puzzle mechanism or other parts of the blockchain. We illustrate this approach with a use case in which blockchains record hashes of financial process transactions to increase their trustworthiness and that of their audits. For Proof of Work as cryptographic puzzle, we develop a detailed mathematical model to derive MINLP optimization problems for computing optimal Proof of Work configuration parameters that trade off potentially conflicting aspects such as availability, resiliency, security, and cost in this governed setting. We demonstrate the utility of such a mining calculus by solving some instances of this problem. This experimental validation is strengthened by statistical experiments that confirm the validity of random variables used in formulating our mathematical model. We hope that our work may facilitate the creation of domain-specific blockchains for a wide range of applications such as trustworthy information in Internet of Things systems and bespoke improvements of legacy financial services.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
293. Zhang, Ruizhe; Ravi, Daniele; Yang, Guang-Zhong; Lo, Benny P. L.: A personalized air quality sensing system - a preliminary study on assessing the air quality of London underground stations. In: 2017 IEEE 14th International Conference on Wearable and Implantable Body Sensor Networks (BSN), IEEE, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-zhang_personalized_2017,
title = {A personalized air quality sensing system - a preliminary study on assessing the air quality of London underground stations},
author = {Ruizhe Zhang and Daniele Ravi and Guang-Zhong Yang and Benny P. L. Lo},
url = {https://doi.org/10.1109%2Fbsn.2017.7936020},
doi = {10.1109/bsn.2017.7936020},
year = {2017},
date = {2017-05-09},
booktitle = {2017 IEEE 14th International Conference on Wearable and Implantable Body Sensor Networks (BSN)},
publisher = {IEEE},
abstract = {Recent studies have shown that air pollution has a negative impact on people's health, especially for patients with respiratory and cardiac diseases (e.g. COPD, asthma, ischemic heart disease). Although there are already many air quality monitoring stations in major cities, such as London, these stations are sparsely located, and the periodic collection of information is insufficient to provide the granularity needed to assess the environmental risk for an individual (e.g. to avoid exacerbation). Wearable devices, on the other hand, are more suitable in this context, providing a better estimation of the air quality in the proximity of the person. Therefore, relevant warnings and information on health risks can be provided in real-time. As a proof of concept, we have developed a wearable sensor for continuous monitoring of air quality around the user, and a preliminary study was conducted to validate the sensor and assess the air quality in London underground stations. Based on the PM2.5 (particulate matter with a diameter of 2.5 μm), temperature and location information, a model is generated for predicting the air quality of each station at different times. Our preliminary results have shown that there are significant differences in air quality among stations and metro lines. It also demonstrates that wearable sensors can provide necessary information for users to make travel arrangements that minimize their exposure to polluted air.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
294. Berthelot, Melissa; Yang, Guang-Zhong; Lo, Benny P. L.: Preliminary study for hemodynamics monitoring using a wearable device network. In: 2017 IEEE 14th International Conference on Wearable and Implantable Body Sensor Networks (BSN), IEEE, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-berthelot_preliminary_2017,
title = {Preliminary study for hemodynamics monitoring using a wearable device network},
author = {Melissa Berthelot and Guang-Zhong Yang and Benny P. L. Lo},
url = {https://doi.org/10.1109%2Fbsn.2017.7936021},
doi = {10.1109/bsn.2017.7936021},
year = {2017},
date = {2017-05-09},
booktitle = {2017 IEEE 14th International Conference on Wearable and Implantable Body Sensor Networks (BSN)},
publisher = {IEEE},
abstract = {Blood flow, posture and phenotype (such as age, sex, smoking habit or physical activity) are closely related to vascular health. Episodic monitoring of the vascular system in clinical setting can lead to late diagnose. Inexpensive wearable devices for continuous monitoring of vascular parameters have been widely used, however, they often have limitations in data interpretation: changes in the environment setting can significantly affect the meaning of the results. This paper proposes a low cost networked body worn sensors for real-time analysis of hemodynamics and reports preliminary results on the relation between blood flow (measured through pulse arrival time (PAT)), the effect of postures and age ranges based on experiments with 13 volunteers of different age ranges (<;25 years old and >50 years old). Standing, supine and sitting postures were investigated while photoplethysmograph (PPG) sensors were placed at different locations (ear, wrist and ankle). Results show the PAT changes according to the investigated locations and postures for both age group. Also, the average PAT values of the older group are generally higher than those of the younger group. In the older group, the average PAT value is higher for the supine posture than that of the sitting posture which is itself higher than that of the standing posture. In the younger group, the average PAT is higher in supine than that of the sitting and standing postures which have similar average PAT values. This indicates that hemodynamics vary with posture and age.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
295. Sun, Yingnan; Wong, Charence; Yang, Guang-Zhong; Lo, Benny P. L.: Secure key generation using gait features for Body Sensor Networks. In: 2017 IEEE 14th International Conference on Wearable and Implantable Body Sensor Networks (BSN), IEEE, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-sun_secure_2017,
title = {Secure key generation using gait features for Body Sensor Networks},
author = {Yingnan Sun and Charence Wong and Guang-Zhong Yang and Benny P. L. Lo},
url = {https://doi.org/10.1109%2Fbsn.2017.7936042},
doi = {10.1109/bsn.2017.7936042},
year = {2017},
date = {2017-05-09},
booktitle = {2017 IEEE 14th International Conference on Wearable and Implantable Body Sensor Networks (BSN)},
publisher = {IEEE},
abstract = {With increasing popularity of wearable and Body Sensor Networks technologies, there is a growing concern on the security and data protection of such low-power pervasive devices. With very limited computational power, BSN sensors often cannot provide the necessary data protection to collect and process sensitive personal information. Since conventional network security schemes are too computationally demanding for miniaturized BSN sensors, new methods of securing BSNs have proposed, in which Biometric Cryptosystem (BCS) appears to be an effective solution. With regards to BCS security solutions, physiological traits, such as an individual's face, iris, fingerprint, electrocardiogram (ECG), and photoplethysmogram (PPG) have been widely exploited. However, behavioural traits such as gait are rarely studied. In this paper, a novel lightweight symmetric key generation scheme based on the timing information of gait is proposed. By extracting similar timing information from gait acceleration signals simultaneously from body worn sensors, symmetric keys can be generated on all the sensor nodes at the same time. Based on the characteristics of generated keys and BSNs, a fuzzy commitment based key distribution scheme is also developed to distribute the keys amongst the sensor nodes.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
296. Lindley, Joseph Galen; Coulton, Paul: On the Internet Everybody Knows You're a Whatchamacallit (or a Thing). In: CHI 2017 Workshop: Making home: asserting agency in the age of IoT - Denver, United States, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX) @inproceedings{proc-in-lindley_internet_2017,
title = {On the Internet Everybody Knows You're a Whatchamacallit (or a Thing)},
author = {Joseph Galen Lindley and Paul Coulton},
url = {http://makinghome.org/chi2017/},
year = {2017},
date = {2017-05-06},
booktitle = {CHI 2017 Workshop: Making home: asserting agency in the age of IoT - Denver, United States},
abstract = {The Internet of Things (IoT) is fed by, and feeds into, flowing data streams. Through these flows, servers, sensors, humans and alike are networked together, data and networks mediating between physical and digital realms. "Things" of all types, toys, lights and kettles, are tangible. On-view-but-unheard, they do their jobs. All the while, in the unseen digital domain, data flow, gush, and bubble, for the most part imperceptible to the human contingent of the allencompassingmenagerie of stuff. Here in the kingdom of TCP/IP, the atmosphere is thick, packets of intermachine chatter commute back and forth around the network stacks, a tidal race of datagrams pulsate, whilst somewhere - far away? - a 2D image is painted on a 3D screen. "Connected!" Chirps the dialog box. The poetic tension betwixt an apparent calm in the physical world, and an obscured complexity in the digital otherworld, sets the scene for the argument we presentin this paper: The IoT's objects, entities, or stuff makes up constellations; Human Centered Design methods are constrained by IoT constellations' complexity and multiplicity; by building from Object Orientated Ontology, IoT designers may cast multiple data, devices, corporations, and humans as equally significant "actants" in a flat ontology. Here we pose this argument and propose ways to explore it.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
297. Pschetz, Larissa; Tallyn, Ella; Gianni, Rory; Speed, Chris: Bitbarista: Exploring Perceptions of Data Transactions in the Internet of Things. In: CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, ACM, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-pschetz_bitbarista_2017,
title = {Bitbarista: Exploring Perceptions of Data Transactions in the Internet of Things},
author = {Larissa Pschetz and Ella Tallyn and Rory Gianni and Chris Speed},
url = {https://doi.org/10.1145%2F3025453.3025878},
doi = {10.1145/3025453.3025878},
year = {2017},
date = {2017-05-02},
booktitle = {CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
abstract = {We are surrounded by a proliferation of connected devices performing increasingly complex data transactions. Traditional design methods tend to simplify or conceal this complexity to improve ease of use. However, the hidden nature of data is causing increasing discomfort. This paper presents BitBarista, a coffee machine designed to explore perceptions of data processes in the Internet of Things. BitBarista reveals social, environmental, qualitative and economic aspects of coffee supply chains. It allows people to choose a source of future coffee beans, situating their choices within the pool of decisions previously made. In doing so, it attempts to engage them in the transactions that are required to produce coffee. Initial studies of BitBarista with 42 participants reveal challenges of designing for connected systems, particularly in terms of perceptions of data gathering and sharing, as well as assumptions generated by current models of consumption. A discussion is followed by a series of suggestions for increasing positive attitudes towards data use in interactive systems.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
298. Bradbury, Matthew; Jhumka, Arshad: Understanding source location privacy protocols in sensor networks via perturbation of time series. In: IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, IEEE, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-bradbury_understanding_2017,
title = {Understanding source location privacy protocols in sensor networks via perturbation of time series},
author = {Matthew Bradbury and Arshad Jhumka},
url = {https://doi.org/10.1109%2Finfocom.2017.8057122},
doi = {10.1109/infocom.2017.8057122},
year = {2017},
date = {2017-05-01},
booktitle = {IEEE INFOCOM 2017 - IEEE Conference on Computer Communications},
publisher = {IEEE},
abstract = {Source location privacy (SLP) is becoming an important property for a large class of security-critical wireless sensor network applications such as monitoring and tracking. Much of the previous work on SLP has focused on the development of various protocols to enhance the level of SLP imparted to the network, under various attacker models and other conditions. Other work has focused on analysing the level of SLP being imparted by a specific protocol. In this paper, we adopt a different approach where we model the attacker movement as a time series and use information theoretic concepts to infer the properties of a routing protocol that imparts high levels of SLP. We propose the notion of a properly competing path that causes an attacker to "stall" when moving towards the source. This concept provides the basis for developing a perturbation model, similar to those in privacy-preserving data mining. We then show how to use properly competing paths to develop properties of an SLP-aware routing protocol. Further, we show how different SLP-aware routing protocols can be obtained through different instantiations of the framework. Those instantiations are obtained based on a notion of information loss achieved through the use of the perturbation model proposed.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
299. Lundbæk, Leif-Nissen; Huth, Michael: Oligarchic Control of Business-to-Business Blockchains. In: 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), IEEE, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-lundbaek_oligarchic_2017,
title = {Oligarchic Control of Business-to-Business Blockchains},
author = {Leif-Nissen Lundb\aek and Michael Huth},
url = {https://doi.org/10.1109%2Feurospw.2017.53},
doi = {10.1109/eurospw.2017.53},
year = {2017},
date = {2017-04-26},
booktitle = {2017 IEEE European Symposium on Security and Privacy Workshops (EuroS\&PW)},
publisher = {IEEE},
abstract = {The innovative ideas behind blockchain offer exciting perspectives in research and development of electronic distributed ledger technologies. Bitcoin introduced an "eventual consistency" blockchain with the apparent intent of providing an open and inclusive system for secure, anonymous, yet cost-effective financial transactions based on peer-to-peer computing. It uses Proof ofWork as a cryptographic puzzle to control growth of a chain and to strengthen the resiliency of a chain against subsequent rewrite attempts. Commercial sectors and the public sector have realized the potential of this technical approach, and we now see a number of blockchains that may be called private, closed or permissioned - and that may eschew the values inherent in the design of Bitcoin type systems. From a value-neutral research perspective, there are no clear definitions of blockchain attributes such as "private" or "permissioned", nor is there typically a good understanding of the trust assumptions that clients must make when using such services - for example in systems that do not rely on Proof of Work but on a limited and controlled set of consensus-creating agents. We believe that more research in this direction could establish firm foundations for domain-specific or coalition-specific blockchains, and that such underpinnings would offer novel trust architectures beyond those provided by completely open/public blockchains and third-party operated, closed/private blockchains.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
300. Seymour, William: Social Acceptability and Respectful Smart Assistants. In: CHI'18 Workshops: (Un)Acceptable!?! --- Re-thinking the Social Acceptability of Emerging Technologies, 2017. (Type: Proceedings Article | Abstract | BibTeX) @inproceedings{proc-in-seymour_social_2017,
title = {Social Acceptability and Respectful Smart Assistants},
author = {William Seymour},
year = {2017},
date = {2017-04-21},
booktitle = {CHI'18 Workshops: (Un)Acceptable!?! --- Re-thinking the Social Acceptability of Emerging Technologies},
abstract = {Underneath the friendly facade, do you feel like there is something sinister going on with Siri? This paper highlights some of the problems with modern smart assistants, particularly in the way that they construct a relationship with their users which is manifestly different to the technical and legal realities. The notion of respect is offered as a means of conceptualising the types of interactions we might want with such devices in the future and identifying flaws in the current iteration of smart assistants.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}