Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2753476acmconferencesBook PagePublication PagesmobisysConference Proceedingsconference-collections
IoT-Sys '15: Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems
ACM2015 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
MobiSys'15: The 13th Annual International Conference on Mobile Systems, Applications, and Services Florence Italy 18 May 2015
ISBN:
978-1-4503-3502-7
Published:
18 May 2015
Sponsors:
In-Cooperation:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 27 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the Workshop on IoT challenges in Mobile and Industrial Systems -- IoT-Sys 2015.

The new IoT-Sys workshop, at its first edition, is intended to be a forum for exchanging new ideas about the challenges and symbiosis between the Internet of Things, Mobile Computing, and Industrial Systems. The workshop aims at providing a significant contribution by fostering fruitful and critical discussions between attendees in order to facilitate the growth of the main pillars of Mobile-IoT applications and Industrial-IoT systems, and, more importantly, pave the road towards networked systems of Information in IoT applications.

The workshop program includes a mix of papers on mobile computing for the IoT, communication protocols, and security issues. The program includes also a keynote speech on the Physical Web paradigm, based on the integration between the IoT and web technologies.

The workshop program includes an interesting mix of papers and talks on three broad themes: health and wellness, human and social sensing, and wireless tracking. The program includes two keynote talks, three other invited talks, and six refereed paper presentations, covering a mix of blue sky research and systems in deployment by startups. We have included a discussion period at the end of each session, with a moderator who will engage the speakers and the audience in a discussion. We have also set aside time at the end of the workshop program to discuss topics outside of the session themes, including the future direction for the workshop.

The call for papers attracted submissions from Asia, Australia, Europe, Africa, and the United States. The program committee reviewed 18 submissions with an acceptance rate of 50%.

We also encourage attendees to attend the keynote speech. These valuable and insightful talks can and will guide us to a better understanding of how the Internet of Things will be shaped in the future: The Physical Web, Roy Want (who is currently at Google, Inc.).

Skip Table Of Content Section
SESSION: Keynote Address
invited-talk
The Physical Web

The Internet of Things (IoT) is in its infancy, similar to the state of the Internet before the World Wide Web made it an indispensable tool for communication, business and entertainment. A similar revolution is needed for the IoT to become really ...

SESSION: Web of Things and Smart Environments
research-article
Open Access
Building an On-ramp for the Internet of Things

The Internet of Things (IoT) is in its infancy, similar to the state of the Internet before the World Wide Web made it an indispensable tool for communication, business and entertainment. A similar revolution is needed for the IoT to become really ...

research-article
BearLoc: A Composable Distributed Framework for Indoor Localization Systems

Many indoor localization algorithms have been proposed to enable location-based applications in indoor environments. However, these systems are monolithic and not component-based. We present BearLoc, a distributed modular framework for indoor ...

research-article
Automatic Sensor Data Stream Segmentation for Real-time Activity Prediction in Smart Spaces

Recently, human activity recognition and prediction have become important functionalities in ambient-assisted living. Activity inference algorithms detect what task a human undertakes, by analyzing the data stream pattern generated from various Internet ...

SESSION: Communication protocols for the Internet of Things
research-article
ESMRF: Enhanced Stateless Multicast RPL Forwarding For IPv6-based Low-Power and Lossy Networks

In this paper, we present the multicast-forwarding scheme called, Enhanced Stateless Multicast RPL Forwarding (ESMRF). ESMRF is a new scheme allow nodes be able to send multicast traffic up and down the Routing Protocol for Low-power and Lossy networks (...

research-article
Bird Flocking Congestion Control for CoAP/RPL/6LoWPAN Networks

This paper proposes a congestion control solution for CoAP/RPL/6LoWPAN networks. CoAP/RPL/6LoWPAN has been considered as one of the most appropriate protocol stack for industrial applications of the Internet of Things (IoT). Since IoT nodes may have ...

research-article
Old Wine in New Skins?: Revisiting the Software Architecture for IP Network Stacks on Constrained IoT Devices

In this paper, we argue that existing concepts for the design and implementation of network stacks for constrained devices do not comply with the requirements of current and upcoming Internet of Things (IoT) use cases. The IoT requires not only a ...

SESSION: IoT Application Security & Validation
research-article
Key Management Protocol with Implicit Certificates for IoT systems

This paper proposes a Key Management Protocol for mobile and industrial Internet of Things systems, targeting, at the same time, robust key negotiation, lightweight node authentication, fast re-keying, and efficient protection against replay attacks. ...

research-article
A Distributed Test System Architecture for Open-source IoT Software

In this paper, we discuss challenges that are specific to testing of open IoT software systems. The analysis reveals gaps compared to wireless sensor networks as well as embedded software. We propose a testing framework which (a) supports continuous ...

research-article
On the Feasibility of Attribute-Based Encryption on Smartphone Devices

Attribute-Based Encryption (ABE) is a powerful cryptographic tool that allows fine-grained access control over data. Due to its features, ABE has been adopted in several applications, such as encrypted storage or access control systems. Recently, ...

Contributors
  • University of Parma
  • Ericsson Inc.
  • University of Parma
  • Polytechnic University of Bari
  • University of Parma
  • INRIA Institut National de Recherche en Informatique et en Automatique

Index Terms

  1. Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Acceptance Rates

          IoT-Sys '15 Paper Acceptance Rate 9 of 18 submissions, 50%;
          Overall Acceptance Rate 9 of 18 submissions, 50%
          YearSubmittedAcceptedRate
          IoT-Sys '1518950%
          Overall18950%