2019 22th International Conference on Information Fusion (FUSION)
As many Internet of Things devices rely on batteries, reducing energy consumption where battery r... more As many Internet of Things devices rely on batteries, reducing energy consumption where battery replacement may be a problem may extend their lifetime and possible applications. This problem may be hindering the expansion of IoT devices usage in some applications. In this paper, we propose three data prediction and aggregation techniques to be applied to sensor readings and avoid unnecessary communication between a sensor node and Sink, so as to save energy and reduce network traffic. Since we have limited memory and processing capacity within sensors, this proposed approach collects data, compare the readings with expected value from one of the three techniques, and if the monitored data is within an ex-ante defined and acceptable range, no data transmission is necessary - the Sink would infer the actual reading within a uncertainty margin. Otherwise, last reading and estimated trend is transmitted and both sensor node and Sink are synchronized. The proposed techniques are (i) constant; (ii) linear; and (iii) using machine learning (Weightless Neural Network). We discuss pros and cons of each technique depending on the characteristics of the monitored data, taking into consideration the number of times the sensor reading had to be sent to Sink, and the average difference between estimated and actual reading.
Shared Sensor and Actuator Networks (SSAN) represent a new design trend in the field of Wireless ... more Shared Sensor and Actuator Networks (SSAN) represent a new design trend in the field of Wireless Sensor Networks (WSNs) that allows the sensing and communication infrastructure to be shared among multiple applications submitted by different users, instead of the original application-specific WSN design. In this paper, with the goal of fully utilising the network infrastructure and inspired by a service-oriented architecture, we modeled applications as sets of primitive services to be provided by sensor nodes. By using such approach, sensor nodes can perform different roles according to the services they offer and it is possible to identify common services required by different applications so that leveraging service sharing and optimizing the use of the network resources. With these premises, we propose an adaptive service selection and allocation algorithm called SERAPH that can efficiently utilise the underlying heterogeneous hardware resources, and yet provide the desired QoS level for multiple applications. Experimental results show that SERAPH provides competitive performance regarding energy efficiency, making it a promising task allocation algorithm for SSANs.
International Journal of Distributed Sensor Networks, 2015
In recent years, we have witnessed the emergence of Shared Sensor Networks (SSNs) as a core compo... more In recent years, we have witnessed the emergence of Shared Sensor Networks (SSNs) as a core component of cyber-physical systems for diverse applications. As Wireless Sensor and Actuator Networks (WSANs) design starts shifting from application-specific platforms to shared system infrastructures, a pressing research challenge is security. In scenarios involving unprotected hostile outdoor areas, SSNs are prone to different types of attacks that can compromise reliability, integrity, and availability of the sensor data traffic and sensor lifetime as well. In this work we propose a Dynamic Security System to be applied in the shared sensor network context. Its basic feature is the nodes neighborhood monitoring and collaboration (through the use of the Byzantine algorithm) to identify an attack and enhance security. The proposed security system is dynamic since it is able to manage the availability, integrity, and confidentiality of multiple applications according to the current executio...
2015 International Wireless Communications and Mobile Computing Conference (IWCMC), 2015
This paper proposes a framework for embedding a software watermark using obfuscation and tamper-p... more This paper proposes a framework for embedding a software watermark using obfuscation and tamper-proofing techniques, called SensorWatermark in order to inhibit piracy of embedded software in sensor nodes in a WSN. The watermark scheme proposed is characterized as an ordered sequence of obfuscations and guards implemented in the software, where such sequence identifies the software author. SensorWatermark is able to correctly identify the author from the embedded watermark and does not affect negatively the constrained resources of a sensor device. Finally, SensorWatermark is resilient and stealthy to certain attacks, as demonstrated in the experiments.
One of the main challenges in the field of Wireless Sensor Networks (WSN) is related to the secur... more One of the main challenges in the field of Wireless Sensor Networks (WSN) is related to the security of their nodes. This is because such nodes, called sensors, are arranged in unprotected areas where they are vulnerable to capture, reverse engineer and tamper with by malicious people (attackers). Once such sensors are captured, an attacker can distribute the software code or even use the code in his projects without being traceable. In this context we propose a "code obfuscation-based software watermarking framework" for protecting the authorship of the software embedded in the sensors, and thereby discouraging the theft of intellectual property. The proposed software watermarking framework is defined as a sequence of code obfuscations, which makes, simultaneously, the code more difficult to analyze and the watermark more difficult to be located and removed, because the watermark is interleaved with other software instructions. Experiments were performed for measuring the...
Abstract Internet of things (IoT) is envisioned as the interconnection of the Internet with sensi... more Abstract Internet of things (IoT) is envisioned as the interconnection of the Internet with sensing and actuating devices. IoT systems are usually designed to collect massive amounts of data from multiple and possibly conflicting sources. Nevertheless, data must be refined before being stored in a repository, so as information can be correctly extracted for further uses. Knowledge fusion is an important technique to identify and eliminate erroneous data from compromised sources or any mistakes that might have occurred during the extraction process. We propose a new multisensor knowledge fusion heuristic (MKFH) for IoT supporting the knowledge extraction and transfer needed to further knowledge management, also discuss the role of reinforcement learning over integration on a multi-application wireless sensor/actuator network (WSAN). Results shows that the proposed multisensor knowledge fusion heuristic is compatible with the IoT paradigm and enhances integration.
This paper proposes a clustering algorithm tailored for multiple applications in Wireless Sensor ... more This paper proposes a clustering algorithm tailored for multiple applications in Wireless Sensor and Actuator Networks (WSANs) called Clustering Algorithm for Multiple Applications in a WSAN (CAMAW). CAMAW is an application aware clustering algorithm, since besides sharing the WSAN infrastructure with multiple applications simultaneously, it clusters the nodes according to each application requirements. The main benefits of using CAMAW are: (i) it is an energy-efficiency algorithm for WSANs since it reduces data traffic, by multiplexing data of a same monitoring type for several applications and (ii) is a dynamic clustering algorithm because it organizes WSAN in groups faces the arrival and the departure of running applications at runtime. CAMAW outperforms the traditional clustering algorithms regarding network lifetime in all considered scenarios.
17th International Conference on Information Fusion (FUSION), 2014
Recent years have witnessed the emergence of the Shared Sensor and Actuator Networks (SSANs), whi... more Recent years have witnessed the emergence of the Shared Sensor and Actuator Networks (SSANs), which instead of assuming an application-specific design, allow the sensing and communication infrastructure to be shared among multiple applications. With an increasing number of sharing applications, a growing amount of sensor-generated data will be produced, from which useful information can be extracted. However, wireless sensors and actuators commonly rely on batteries as their energy sources, whose replacement is undesirable or unfeasible. Therefore, in order to reduce the amount of data to be transmitted in the wireless channel, thus saving energy, Multisensor Data Fusion Methods (MDF) can be employed. MDF can also enhance data accuracy in the SSAN scenario and make inferences that are not feasible from a single sensor or data source. Existing MDFs are currently utilized following an application-specific design for the network. We present an adaptation of well-known MDFs to deal with...
2017 IEEE 14th International Conference on Networking, Sensing and Control (ICNSC), 2017
While wireless sensor networks (WSNs) have been traditionally tasked with single applications, we... more While wireless sensor networks (WSNs) have been traditionally tasked with single applications, we have witnessed the emergence of multiapplication paradigms in the sensor network field such as Shared Sensor Networks and Virtual Sensor Networks. As the number of applications in a WSN increases, it also increases the WSN complexity and the amount of required transmitted messages. A major requirement in these networks is to save energy in order to extend their operational lifetime. Among the methods employed to extend network lifetime, Multisensor data fusion (MDF) is one of the most widely used. This technique can be very important when applied in a heterogeneous network (a common case for multiapplication WSNs). In a heterogeneous network data streams may come from very different contexts and may have distinct representations. Traditional MDFs are not able to identify these different contexts, since they are designed using an application-specific design for the network. In order to o...
Este texto tem como objetivo analisar em que medida as características socioeconômicas dos indiví... more Este texto tem como objetivo analisar em que medida as características socioeconômicas dos indivíduos influenciam as chances de óbito pela Covid-19. Dois conjuntos de dados foram combinados para atingir esse objetivo: os registros individuais de pessoas infectadas com coronavírus no estado do Rio de Janeiro e a Relação Anual de Informações Sociais (Rais), que contém diversas informações socioeconômicas sobre trabalhadores formais do estado. A partir dessas informações, foi possível estimar modelos logísticos para avaliar o efeito de variáveis como sexo, idade, renda, raça/cor, escolaridade, ocupação e atividade econômica sobre o risco de morte pela Covid-19. Os resultados indicam que alguns grupos de trabalhadores têm mais risco de morrer dessa doença do que outros: trabalhadores empregados em estabelecimentos de saúde e segurança pública apresentam, respectivamente, um risco de morrer 2,46 e 2,25 vezes maior do que aqueles empregados em outras atividades. Os resultados também mostr...
2020 IEEE 23rd International Conference on Information Fusion (FUSION), 2020
The UFRJ Nautilus is a student-driven engineering project team at Federal University of Rio de Ja... more The UFRJ Nautilus is a student-driven engineering project team at Federal University of Rio de Janeiro, focused on building and designing AUVs to compete in the AUSVI RoboSub Competition. There are several challenges on developing an AUV: location, computer vision, filters, collect and evaluate data from several sensors. The priority of the team was deliver a robot capable of localizing it self on a pool, with more reliability from all hardware and mechanical systems. We have developed a echo-localization algorithm based on the traditional beamforming that considers both time and frequency in order to have a faster and less power intensive procedure, Simulation showed that our algorithm achieved those objectives.
2019 22th International Conference on Information Fusion (FUSION), 2019
The increase of Internet of Things has insert many challenges on networks studies. This kind of n... more The increase of Internet of Things has insert many challenges on networks studies. This kind of network suffer with problems like wide traffic, fault and monitoring problems. Regarding this, the concept of trust has gained increasing attention on academia by its comprehensiveness through the nodes behavior such as energy consumption, data transmission, and processing time. If a node has a different behavior from its neighbours it can be considered an anomalous node. In this paper, we propose a method for identifying if nodes are anomalous, using only their own monitored data by computing trust values for each node. Also, a data compression method is applied to help reduce the network traffic. This method is capable of signaling and separating anomalous data coming from different nodes in order to maintain the lowest possible interference level due to errors, frauds or malicious attacks. Our objective is to avoid errors in a posterior phase. For trust measurement we have used Subject...
2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2017
While wireless sensor networks (WSNs) have been traditionally tasked with single applications, in... more While wireless sensor networks (WSNs) have been traditionally tasked with single applications, in recent years we have witnessed the emergence of WSNs that allow the sensing and communication infrastructure to be shared among multiple applications thus optimizing the use of resources. With an increasing number of sharing applications, a growing amount of sensor-generated data will be produced, from which useful information can be extracted. However, wireless sensors and actuators commonly rely on batteries as their energy sources, whose replacement is undesirable or unfeasible. Therefore, in order to reduce the amount of data to be transmitted in the wireless channel, thus saving energy, Multisensor Data Fusion Methods (MDF) can be employed. MDF can also enhance data accuracy in the multiapplication scenario and make inferences that are not feasible from a single sensor or data source. As the application data ranges overlap it becomes more complex to identify the origin of each data...
The unexpected growth of the world population and the exodus from rural areas to the city lead to... more The unexpected growth of the world population and the exodus from rural areas to the city lead to a food insecurity concern. Also, a strike of truck drivers caused significant impacts on the distribution of food in the city of Rio de Janeiro and other cities in the country. The unexpected growth of the population and the strike of truck drivers incident are examples of food insecurity in many cities in the country. To address the food insecurity problem, solutions guided by the Internet of Things paradigm such as smart farms have been gaining increasing attention. However, food production in smart farms is still a challenge. To surpass this challenge, a possible solution is to map the information regarding the producers of the state of Rio de Janeiro, and analyze this data together with other sources, reducing the difficulties in the distribution of food products, and allowing information exchange, for the development of sustainable cultivation. In this paper, a small analysis of th...
2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2018
The trend in the design of wireless sensor networks (WSNs) has recently shifted from an applicati... more The trend in the design of wireless sensor networks (WSNs) has recently shifted from an application-specific approach to a virtualization and resource-sharing view. Current WSNs allow the sensing and communication infrastructure to be shared among multiple applications thus optimizing the use of resources. However, as the number of applications sharing the WSN infrastructure grows, storing and analyzing requirements of all applications at the network level becomes unfeasible. To tackle this challenge, in this paper we proposed a multisensor data fusion method that requires no knowledge of the application specific requirements. For performing the analysis of the data, in our proposal we leverage concepts of the area of pattern recognition to create abstract sensors based on intervals in the monitored data. Considering that sensed data have a measuring range, given by their maximum and minimum values, our proposed methods group the data samples in abstract sensors based on density and...
2020 International Symposium on Networks, Computers and Communications (ISNCC), 2020
The adoption of the Internet of Things (IoT) technologies in healthcare lead to the Healthcare 4.... more The adoption of the Internet of Things (IoT) technologies in healthcare lead to the Healthcare 4.0 paradigm. In this paradigm, Remote Health Monitoring (RHM) applications emerge to provide continuous monitoring of patient’s health conditions. But RHM applications traditionally present high rates of false alarms. This disturbance is caused by many factors, from the high sensibility of the equipments to real variations in the monitored vital signs not related to emergencies of health degradation. Hence, this work proposes a system for detection and evaluation of medical emergencies, using Wireless Body Sensor Network as its network infrastructure, able to distinguish real emergencies from other cases by considering a risk estimation from each sampled data. Experiments showed that the proposed system can reach an average accuracy rate of 93.0% and detection rate of 87.2%, and an energy consumption profile feasible to WBSN contexts.
2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2019
Wireless sensor network (WSN) design has moved towards scenarios with multiple applications, allo... more Wireless sensor network (WSN) design has moved towards scenarios with multiple applications, allowing several concurrent applications to share sensing and communication resources. The new multiapplication paradigm made earlier WSN limitations such as limited processing power and energy supply even more challenging. Several studies have tackled the challenge of extending the operational lifetime of WSNs and a promising approach is applying Multisensor data fusion (MDF). MDF denotes a set of methods to enable synergistic combination of sensing data from multiple sources, augmenting the quality of the inferences performed from such data. As a secondary benefit, MDF decreases the number of messages transmitted in the network, thus the energy spent in communication, prolonging the WSN lifetime. MDF techniques can be applied at different levels regarding the complexity and semantics of input and output data used in the process. To date, most of the approaches for WSNs dealt with low-level...
2019 22th International Conference on Information Fusion (FUSION)
As many Internet of Things devices rely on batteries, reducing energy consumption where battery r... more As many Internet of Things devices rely on batteries, reducing energy consumption where battery replacement may be a problem may extend their lifetime and possible applications. This problem may be hindering the expansion of IoT devices usage in some applications. In this paper, we propose three data prediction and aggregation techniques to be applied to sensor readings and avoid unnecessary communication between a sensor node and Sink, so as to save energy and reduce network traffic. Since we have limited memory and processing capacity within sensors, this proposed approach collects data, compare the readings with expected value from one of the three techniques, and if the monitored data is within an ex-ante defined and acceptable range, no data transmission is necessary - the Sink would infer the actual reading within a uncertainty margin. Otherwise, last reading and estimated trend is transmitted and both sensor node and Sink are synchronized. The proposed techniques are (i) constant; (ii) linear; and (iii) using machine learning (Weightless Neural Network). We discuss pros and cons of each technique depending on the characteristics of the monitored data, taking into consideration the number of times the sensor reading had to be sent to Sink, and the average difference between estimated and actual reading.
Shared Sensor and Actuator Networks (SSAN) represent a new design trend in the field of Wireless ... more Shared Sensor and Actuator Networks (SSAN) represent a new design trend in the field of Wireless Sensor Networks (WSNs) that allows the sensing and communication infrastructure to be shared among multiple applications submitted by different users, instead of the original application-specific WSN design. In this paper, with the goal of fully utilising the network infrastructure and inspired by a service-oriented architecture, we modeled applications as sets of primitive services to be provided by sensor nodes. By using such approach, sensor nodes can perform different roles according to the services they offer and it is possible to identify common services required by different applications so that leveraging service sharing and optimizing the use of the network resources. With these premises, we propose an adaptive service selection and allocation algorithm called SERAPH that can efficiently utilise the underlying heterogeneous hardware resources, and yet provide the desired QoS level for multiple applications. Experimental results show that SERAPH provides competitive performance regarding energy efficiency, making it a promising task allocation algorithm for SSANs.
International Journal of Distributed Sensor Networks, 2015
In recent years, we have witnessed the emergence of Shared Sensor Networks (SSNs) as a core compo... more In recent years, we have witnessed the emergence of Shared Sensor Networks (SSNs) as a core component of cyber-physical systems for diverse applications. As Wireless Sensor and Actuator Networks (WSANs) design starts shifting from application-specific platforms to shared system infrastructures, a pressing research challenge is security. In scenarios involving unprotected hostile outdoor areas, SSNs are prone to different types of attacks that can compromise reliability, integrity, and availability of the sensor data traffic and sensor lifetime as well. In this work we propose a Dynamic Security System to be applied in the shared sensor network context. Its basic feature is the nodes neighborhood monitoring and collaboration (through the use of the Byzantine algorithm) to identify an attack and enhance security. The proposed security system is dynamic since it is able to manage the availability, integrity, and confidentiality of multiple applications according to the current executio...
2015 International Wireless Communications and Mobile Computing Conference (IWCMC), 2015
This paper proposes a framework for embedding a software watermark using obfuscation and tamper-p... more This paper proposes a framework for embedding a software watermark using obfuscation and tamper-proofing techniques, called SensorWatermark in order to inhibit piracy of embedded software in sensor nodes in a WSN. The watermark scheme proposed is characterized as an ordered sequence of obfuscations and guards implemented in the software, where such sequence identifies the software author. SensorWatermark is able to correctly identify the author from the embedded watermark and does not affect negatively the constrained resources of a sensor device. Finally, SensorWatermark is resilient and stealthy to certain attacks, as demonstrated in the experiments.
One of the main challenges in the field of Wireless Sensor Networks (WSN) is related to the secur... more One of the main challenges in the field of Wireless Sensor Networks (WSN) is related to the security of their nodes. This is because such nodes, called sensors, are arranged in unprotected areas where they are vulnerable to capture, reverse engineer and tamper with by malicious people (attackers). Once such sensors are captured, an attacker can distribute the software code or even use the code in his projects without being traceable. In this context we propose a "code obfuscation-based software watermarking framework" for protecting the authorship of the software embedded in the sensors, and thereby discouraging the theft of intellectual property. The proposed software watermarking framework is defined as a sequence of code obfuscations, which makes, simultaneously, the code more difficult to analyze and the watermark more difficult to be located and removed, because the watermark is interleaved with other software instructions. Experiments were performed for measuring the...
Abstract Internet of things (IoT) is envisioned as the interconnection of the Internet with sensi... more Abstract Internet of things (IoT) is envisioned as the interconnection of the Internet with sensing and actuating devices. IoT systems are usually designed to collect massive amounts of data from multiple and possibly conflicting sources. Nevertheless, data must be refined before being stored in a repository, so as information can be correctly extracted for further uses. Knowledge fusion is an important technique to identify and eliminate erroneous data from compromised sources or any mistakes that might have occurred during the extraction process. We propose a new multisensor knowledge fusion heuristic (MKFH) for IoT supporting the knowledge extraction and transfer needed to further knowledge management, also discuss the role of reinforcement learning over integration on a multi-application wireless sensor/actuator network (WSAN). Results shows that the proposed multisensor knowledge fusion heuristic is compatible with the IoT paradigm and enhances integration.
This paper proposes a clustering algorithm tailored for multiple applications in Wireless Sensor ... more This paper proposes a clustering algorithm tailored for multiple applications in Wireless Sensor and Actuator Networks (WSANs) called Clustering Algorithm for Multiple Applications in a WSAN (CAMAW). CAMAW is an application aware clustering algorithm, since besides sharing the WSAN infrastructure with multiple applications simultaneously, it clusters the nodes according to each application requirements. The main benefits of using CAMAW are: (i) it is an energy-efficiency algorithm for WSANs since it reduces data traffic, by multiplexing data of a same monitoring type for several applications and (ii) is a dynamic clustering algorithm because it organizes WSAN in groups faces the arrival and the departure of running applications at runtime. CAMAW outperforms the traditional clustering algorithms regarding network lifetime in all considered scenarios.
17th International Conference on Information Fusion (FUSION), 2014
Recent years have witnessed the emergence of the Shared Sensor and Actuator Networks (SSANs), whi... more Recent years have witnessed the emergence of the Shared Sensor and Actuator Networks (SSANs), which instead of assuming an application-specific design, allow the sensing and communication infrastructure to be shared among multiple applications. With an increasing number of sharing applications, a growing amount of sensor-generated data will be produced, from which useful information can be extracted. However, wireless sensors and actuators commonly rely on batteries as their energy sources, whose replacement is undesirable or unfeasible. Therefore, in order to reduce the amount of data to be transmitted in the wireless channel, thus saving energy, Multisensor Data Fusion Methods (MDF) can be employed. MDF can also enhance data accuracy in the SSAN scenario and make inferences that are not feasible from a single sensor or data source. Existing MDFs are currently utilized following an application-specific design for the network. We present an adaptation of well-known MDFs to deal with...
2017 IEEE 14th International Conference on Networking, Sensing and Control (ICNSC), 2017
While wireless sensor networks (WSNs) have been traditionally tasked with single applications, we... more While wireless sensor networks (WSNs) have been traditionally tasked with single applications, we have witnessed the emergence of multiapplication paradigms in the sensor network field such as Shared Sensor Networks and Virtual Sensor Networks. As the number of applications in a WSN increases, it also increases the WSN complexity and the amount of required transmitted messages. A major requirement in these networks is to save energy in order to extend their operational lifetime. Among the methods employed to extend network lifetime, Multisensor data fusion (MDF) is one of the most widely used. This technique can be very important when applied in a heterogeneous network (a common case for multiapplication WSNs). In a heterogeneous network data streams may come from very different contexts and may have distinct representations. Traditional MDFs are not able to identify these different contexts, since they are designed using an application-specific design for the network. In order to o...
Este texto tem como objetivo analisar em que medida as características socioeconômicas dos indiví... more Este texto tem como objetivo analisar em que medida as características socioeconômicas dos indivíduos influenciam as chances de óbito pela Covid-19. Dois conjuntos de dados foram combinados para atingir esse objetivo: os registros individuais de pessoas infectadas com coronavírus no estado do Rio de Janeiro e a Relação Anual de Informações Sociais (Rais), que contém diversas informações socioeconômicas sobre trabalhadores formais do estado. A partir dessas informações, foi possível estimar modelos logísticos para avaliar o efeito de variáveis como sexo, idade, renda, raça/cor, escolaridade, ocupação e atividade econômica sobre o risco de morte pela Covid-19. Os resultados indicam que alguns grupos de trabalhadores têm mais risco de morrer dessa doença do que outros: trabalhadores empregados em estabelecimentos de saúde e segurança pública apresentam, respectivamente, um risco de morrer 2,46 e 2,25 vezes maior do que aqueles empregados em outras atividades. Os resultados também mostr...
2020 IEEE 23rd International Conference on Information Fusion (FUSION), 2020
The UFRJ Nautilus is a student-driven engineering project team at Federal University of Rio de Ja... more The UFRJ Nautilus is a student-driven engineering project team at Federal University of Rio de Janeiro, focused on building and designing AUVs to compete in the AUSVI RoboSub Competition. There are several challenges on developing an AUV: location, computer vision, filters, collect and evaluate data from several sensors. The priority of the team was deliver a robot capable of localizing it self on a pool, with more reliability from all hardware and mechanical systems. We have developed a echo-localization algorithm based on the traditional beamforming that considers both time and frequency in order to have a faster and less power intensive procedure, Simulation showed that our algorithm achieved those objectives.
2019 22th International Conference on Information Fusion (FUSION), 2019
The increase of Internet of Things has insert many challenges on networks studies. This kind of n... more The increase of Internet of Things has insert many challenges on networks studies. This kind of network suffer with problems like wide traffic, fault and monitoring problems. Regarding this, the concept of trust has gained increasing attention on academia by its comprehensiveness through the nodes behavior such as energy consumption, data transmission, and processing time. If a node has a different behavior from its neighbours it can be considered an anomalous node. In this paper, we propose a method for identifying if nodes are anomalous, using only their own monitored data by computing trust values for each node. Also, a data compression method is applied to help reduce the network traffic. This method is capable of signaling and separating anomalous data coming from different nodes in order to maintain the lowest possible interference level due to errors, frauds or malicious attacks. Our objective is to avoid errors in a posterior phase. For trust measurement we have used Subject...
2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2017
While wireless sensor networks (WSNs) have been traditionally tasked with single applications, in... more While wireless sensor networks (WSNs) have been traditionally tasked with single applications, in recent years we have witnessed the emergence of WSNs that allow the sensing and communication infrastructure to be shared among multiple applications thus optimizing the use of resources. With an increasing number of sharing applications, a growing amount of sensor-generated data will be produced, from which useful information can be extracted. However, wireless sensors and actuators commonly rely on batteries as their energy sources, whose replacement is undesirable or unfeasible. Therefore, in order to reduce the amount of data to be transmitted in the wireless channel, thus saving energy, Multisensor Data Fusion Methods (MDF) can be employed. MDF can also enhance data accuracy in the multiapplication scenario and make inferences that are not feasible from a single sensor or data source. As the application data ranges overlap it becomes more complex to identify the origin of each data...
The unexpected growth of the world population and the exodus from rural areas to the city lead to... more The unexpected growth of the world population and the exodus from rural areas to the city lead to a food insecurity concern. Also, a strike of truck drivers caused significant impacts on the distribution of food in the city of Rio de Janeiro and other cities in the country. The unexpected growth of the population and the strike of truck drivers incident are examples of food insecurity in many cities in the country. To address the food insecurity problem, solutions guided by the Internet of Things paradigm such as smart farms have been gaining increasing attention. However, food production in smart farms is still a challenge. To surpass this challenge, a possible solution is to map the information regarding the producers of the state of Rio de Janeiro, and analyze this data together with other sources, reducing the difficulties in the distribution of food products, and allowing information exchange, for the development of sustainable cultivation. In this paper, a small analysis of th...
2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2018
The trend in the design of wireless sensor networks (WSNs) has recently shifted from an applicati... more The trend in the design of wireless sensor networks (WSNs) has recently shifted from an application-specific approach to a virtualization and resource-sharing view. Current WSNs allow the sensing and communication infrastructure to be shared among multiple applications thus optimizing the use of resources. However, as the number of applications sharing the WSN infrastructure grows, storing and analyzing requirements of all applications at the network level becomes unfeasible. To tackle this challenge, in this paper we proposed a multisensor data fusion method that requires no knowledge of the application specific requirements. For performing the analysis of the data, in our proposal we leverage concepts of the area of pattern recognition to create abstract sensors based on intervals in the monitored data. Considering that sensed data have a measuring range, given by their maximum and minimum values, our proposed methods group the data samples in abstract sensors based on density and...
2020 International Symposium on Networks, Computers and Communications (ISNCC), 2020
The adoption of the Internet of Things (IoT) technologies in healthcare lead to the Healthcare 4.... more The adoption of the Internet of Things (IoT) technologies in healthcare lead to the Healthcare 4.0 paradigm. In this paradigm, Remote Health Monitoring (RHM) applications emerge to provide continuous monitoring of patient’s health conditions. But RHM applications traditionally present high rates of false alarms. This disturbance is caused by many factors, from the high sensibility of the equipments to real variations in the monitored vital signs not related to emergencies of health degradation. Hence, this work proposes a system for detection and evaluation of medical emergencies, using Wireless Body Sensor Network as its network infrastructure, able to distinguish real emergencies from other cases by considering a risk estimation from each sampled data. Experiments showed that the proposed system can reach an average accuracy rate of 93.0% and detection rate of 87.2%, and an energy consumption profile feasible to WBSN contexts.
2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2019
Wireless sensor network (WSN) design has moved towards scenarios with multiple applications, allo... more Wireless sensor network (WSN) design has moved towards scenarios with multiple applications, allowing several concurrent applications to share sensing and communication resources. The new multiapplication paradigm made earlier WSN limitations such as limited processing power and energy supply even more challenging. Several studies have tackled the challenge of extending the operational lifetime of WSNs and a promising approach is applying Multisensor data fusion (MDF). MDF denotes a set of methods to enable synergistic combination of sensing data from multiple sources, augmenting the quality of the inferences performed from such data. As a secondary benefit, MDF decreases the number of messages transmitted in the network, thus the energy spent in communication, prolonging the WSN lifetime. MDF techniques can be applied at different levels regarding the complexity and semantics of input and output data used in the process. To date, most of the approaches for WSNs dealt with low-level...
Uploads
Papers by Claudio de Farias