17 research outputs found
Towards efficient support for massive Internet of Things over cellular networks
The usage of Internet of Things (IoT) devices over cellular networks is seeing tremendous
growth in recent years, and that growth in only expected to increase in the near
future. While existing 4G and 5G cellular networks offer several desirable features for
this type of applications, their design has historically focused on accommodating traditional
mobile devices (e.g. smartphones). As IoT devices have very different characteristics
and use cases, they create a range of problems to current networks which often
struggle to accommodate them at scale. Although newer cellular network technologies,
such as Narrowband-IoT (NB-IoT), were designed to focus on the IoT characteristics,
they were extensively based on 4G and 5G networks to preserve interoperability, and
decrease their deployment cost. As such, several inefficiencies of 4G/5G were also
carried over to the newer technologies.
This thesis focuses on identifying the core issues that hinder the large scale deployment
of IoT over cellular networks, and proposes novel protocols to largely alleviate
them. We find that the most significant challenges arise mainly in three distinct areas:
connection establishment, network resource utilisation and device energy efficiency.
Specifically, we make the following contributions. First, we focus on the connection
establishment process and argue that the current procedures, when used by IoT devices,
result in increased numbers of collisions, network outages and a signalling overhead
that is disproportionate to the size of the data transmitted, and the connection duration
of IoT devices. Therefore, we propose two mechanisms to alleviate these inefficiencies.
Our first mechanism, named ASPIS, focuses on both the number of collisions
and the signalling overhead simultaneously, and provides enhancements to increase the
number of successful IoT connections, without disrupting existing background traffic.
Our second mechanism focuses specifically on the collisions at the connection establishment
process, and used a novel approach with Reinforcement Learning, to decrease
their number and allow a larger number of IoT devices to access the network with fewer
attempts.
Second, we propose a new multicasting mechanism to reduce network resource
utilisation in NB-IoT networks, by delivering common content (e.g. firmware updates)
to multiple similar devices simultaneously. Notably, our mechanism is both more efficient
during multicast data transmission, but also frees up resources that would otherwise
be perpetually reserved for multicast signalling under the existing scheme.
Finally, we focus on energy efficiency and propose novel protocols that are designed
for the unique usage characteristics of NB-IoT devices, in order to reduce the
device power consumption. Towards this end, we perform a detailed energy consumption
analysis, which we use as a basis to develop an energy consumption model for
realistic energy consumption assessment. We then take the insights from our analysis,
and propose optimisations to significantly reduce the energy consumption of IoT
devices, and assess their performance
On the inference of user paths from anonymized mobility data
Using the plethora of apps on smartphones and
tablets entails giving them access to different types of privacy
sensitive information, including the device’s location. This can
potentially compromise user privacy when app providers share
user data with third parties (e.g., advertisers) for monetization
purposes. In this paper, we focus on the interface for data
sharing between app providers and third parties, and devise
an attack that can break the strongest form of the commonly
used anonymization method for protecting the privacy of users.
More specifically, we develop a mechanism called
Comber
that given completely anonymized mobility data (without any
pseudonyms) as input is able to identify different users and
their respective paths in the data.
Comber
exploits the obser-
vation that the distribution of speeds is typically similar among
different users and incorporates a generic, empirically derived
histogram of user speeds to identify the users and disentangle
their paths.
Comber
also benefits from two optimizations that
allow it to reduce the path inference time for large datasets. We
use two real datasets with mobile user location traces (Mobile
Data Challenge and GeoLife) for evaluating the effectiveness
of
Comber
and show that it can infer paths with greater than
90% accuracy with both these dataset
Privacy-enhancing Aggregation of Internet of Things Data via Sensors Grouping
Big data collection practices using Internet of Things (IoT) pervasive
technologies are often privacy-intrusive and result in surveillance, profiling,
and discriminatory actions over citizens that in turn undermine the
participation of citizens to the development of sustainable smart cities.
Nevertheless, real-time data analytics and aggregate information from IoT
devices open up tremendous opportunities for managing smart city
infrastructures. The privacy-enhancing aggregation of distributed sensor data,
such as residential energy consumption or traffic information, is the research
focus of this paper. Citizens have the option to choose their privacy level by
reducing the quality of the shared data at a cost of a lower accuracy in data
analytics services. A baseline scenario is considered in which IoT sensor data
are shared directly with an untrustworthy central aggregator. A grouping
mechanism is introduced that improves privacy by sharing data aggregated first
at a group level compared as opposed to sharing data directly to the central
aggregator. Group-level aggregation obfuscates sensor data of individuals, in a
similar fashion as differential privacy and homomorphic encryption schemes,
thus inference of privacy-sensitive information from single sensors becomes
computationally harder compared to the baseline scenario. The proposed system
is evaluated using real-world data from two smart city pilot projects. Privacy
under grouping increases, while preserving the accuracy of the baseline
scenario. Intra-group influences of privacy by one group member on the other
ones are measured and fairness on privacy is found to be maximized between
group members with similar privacy choices. Several grouping strategies are
compared. Grouping by proximity of privacy choices provides the highest privacy
gains. The implications of the strategy on the design of incentives mechanisms
are discussed