4,443 research outputs found

    Mobile Device Background Sensors: Authentication vs Privacy

    Get PDF
    The increasing number of mobile devices in recent years has caused the collection of a large amount of personal information that needs to be protected. To this aim, behavioural biometrics has become very popular. But, what is the discriminative power of mobile behavioural biometrics in real scenarios? With the success of Deep Learning (DL), architectures based on Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs), such as Long Short-Term Memory (LSTM), have shown improvements compared to traditional machine learning methods. However, these DL architectures still have limitations that need to be addressed. In response, new DL architectures like Transformers have emerged. The question is, can these new Transformers outperform previous biometric approaches? To answers to these questions, this thesis focuses on behavioural biometric authentication with data acquired from mobile background sensors (i.e., accelerometers and gyroscopes). In addition, to the best of our knowledge, this is the first thesis that explores and proposes novel behavioural biometric systems based on Transformers, achieving state-of-the-art results in gait, swipe, and keystroke biometrics. The adoption of biometrics requires a balance between security and privacy. Biometric modalities provide a unique and inherently personal approach for authentication. Nevertheless, biometrics also give rise to concerns regarding the invasion of personal privacy. According to the General Data Protection Regulation (GDPR) introduced by the European Union, personal data such as biometric data are sensitive and must be used and protected properly. This thesis analyses the impact of sensitive data in the performance of biometric systems and proposes a novel unsupervised privacy-preserving approach. The research conducted in this thesis makes significant contributions, including: i) a comprehensive review of the privacy vulnerabilities of mobile device sensors, covering metrics for quantifying privacy in relation to sensitive data, along with protection methods for safeguarding sensitive information; ii) an analysis of authentication systems for behavioural biometrics on mobile devices (i.e., gait, swipe, and keystroke), being the first thesis that explores the potential of Transformers for behavioural biometrics, introducing novel architectures that outperform the state of the art; and iii) a novel privacy-preserving approach for mobile biometric gait verification using unsupervised learning techniques, ensuring the protection of sensitive data during the verification process

    An agent-based approach for energy-efficient sensor networks in logistics

    Get PDF
    As part of the fourth industrial revolution, logistics processes are augmented with connected information systems to improve their reliability and sustainability. Above all, customers can analyse process data obtained from the networked logistics operations to reduce costs and increase margins. The logistics of managing liquid goods is particularly challenging due to the strict transport temperature requirements involving monitoring via sensors attached to containers. However, these sensors transmit much redundant information that, at times, does not provide additional value to the customer, while consuming the limited energy stored in the sensor batteries. This paper aims to explore and study alternative approaches for location tracking and state monitoring in the context of liquid goods logistics. This problem is addressed by using a combination of data-driven sensing and agent-based modelling techniques. The simulation results show that the longest life span of batteries is achieved when most sensors are put into sleep mode yielding an increase of ×21.7 and ×3.7 for two typical routing scenarios. However, to allow for situations in which high quality sensor data is required to make decisions, agents need to be made aware of the life cycle phase of individual containers. Key contributions include (1) an agent-based approach for modelling the dynamics of liquid goods logistics to enable monitoring and detect inefficiencies (2) the development and analysis of three sensor usage strategies for reducing the energy consumption, and (3) an evaluation of the trade-offs between energy consumption and location tracking precision for timely decision making in resource constrained monitoring systems

    Trust Management of Tiny Federated Learning in Internet of Unmanned Aerial Vehicles

    Get PDF
    Lightweight training and distributed tiny data storage in local model will lead to the severe challenge of convergence for tiny federated learning (FL). Achieving fast convergence in tiny FL is crucial for many emerging applications in Internet of Unmanned Aerial Vehicles (IUAVs) networks. Excessive information exchange between UAVs and IoT devices could lead to security risks and data breaches, while insufficient information can slow down the learning process and negatively system performance experience due to significant computational and communication constraints in tiny FL hardware system. This paper proposes a trusting, low latency, and energy-efficient tiny wireless FL framework with blockchain (TBWFL) for IUAV systems. We develop a quantifiable model to determine the trustworthiness of IoT devices in IUAV networks. This model incorporates the time spent in communication, computation, and block production with a decay function in each round of FL at the UAVs. Then it combines the trust information from different UAVs, considering their credibility of trust recommendation. We formulate the TBWFL as an optimization problem that balances trustworthiness, learning speed, and energy consumption for IoT devices with diverse computing and energy capabilities. We decompose the complex optimization problem into three sub-problems for improved local accuracy, fast learning, trust verification, and energy efficiency of IoT devices. Our extensive experiments show that TBWFL offers higher trustworthiness, faster convergence, and lower energy consumption than the existing state-of-the-art FL scheme

    From abuse to trust and back again

    Get PDF
    oai:westminsterresearch.westminster.ac.uk:w7qv

    Modern computing: Vision and challenges

    Get PDF
    Over the past six decades, the computing systems field has experienced significant transformations, profoundly impacting society with transformational developments, such as the Internet and the commodification of computing. Underpinned by technological advancements, computer systems, far from being static, have been continuously evolving and adapting to cover multifaceted societal niches. This has led to new paradigms such as cloud, fog, edge computing, and the Internet of Things (IoT), which offer fresh economic and creative opportunities. Nevertheless, this rapid change poses complex research challenges, especially in maximizing potential and enhancing functionality. As such, to maintain an economical level of performance that meets ever-tighter requirements, one must understand the drivers of new model emergence and expansion, and how contemporary challenges differ from past ones. To that end, this article investigates and assesses the factors influencing the evolution of computing systems, covering established systems and architectures as well as newer developments, such as serverless computing, quantum computing, and on-device AI on edge devices. Trends emerge when one traces technological trajectory, which includes the rapid obsolescence of frameworks due to business and technical constraints, a move towards specialized systems and models, and varying approaches to centralized and decentralized control. This comprehensive review of modern computing systems looks ahead to the future of research in the field, highlighting key challenges and emerging trends, and underscoring their importance in cost-effectively driving technological progress

    Functional Nanomaterials and Polymer Nanocomposites: Current Uses and Potential Applications

    Get PDF
    This book covers a broad range of subjects, from smart nanoparticles and polymer nanocomposite synthesis and the study of their fundamental properties to the fabrication and characterization of devices and emerging technologies with smart nanoparticles and polymer integration

    Reliable Sensor Intelligence in Resource Constrained and Unreliable Environment

    Get PDF
    The objective of this research is to design a sensor intelligence that is reliable in a resource constrained, unreliable environment. There are various sources of variations and uncertainty involved in intelligent sensor system, so it is critical to build reliable sensor intelligence. Many prior works seek to design reliable sensor intelligence by developing robust and reliable task. This thesis suggests that along with improving task itself, task reliability quantification based early warning can further improve sensor intelligence. DNN based early warning generator quantifies task reliability based on spatiotemporal characteristics of input, and the early warning controls sensor parameters and avoids system failure. This thesis presents an early warning generator that predicts task failure due to sensor hardware induced input corruption and controls the sensor operation. Moreover, lightweight uncertainty estimator is presented to take account of DNN model uncertainty in task reliability quantification without prohibitive computation from stochastic DNN. Cross-layer uncertainty estimation is also discussed to consider the effect of PIM variations.Ph.D
    corecore