Recommending Privacy Settings for Internet-Of-Things

Total Page:16

File Type:pdf, Size:1020Kb

Recommending Privacy Settings for Internet-Of-Things Clemson University TigerPrints All Dissertations Dissertations December 2019 Recommending Privacy Settings for Internet-of-Things Yangyang He Clemson University, [email protected] Follow this and additional works at: https://tigerprints.clemson.edu/all_dissertations Recommended Citation He, Yangyang, "Recommending Privacy Settings for Internet-of-Things" (2019). All Dissertations. 2528. https://tigerprints.clemson.edu/all_dissertations/2528 This Dissertation is brought to you for free and open access by the Dissertations at TigerPrints. It has been accepted for inclusion in All Dissertations by an authorized administrator of TigerPrints. For more information, please contact [email protected]. Recommending Privacy Settings for Internet-of-Things A Dissertation Presented to the Graduate School of Clemson University In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy Computer Science by Yang He December 2019 Accepted by: Dr. Bart P. Knijnenburg, Committee Chair Dr. Larry F. Hodges Dr. Alexander Herzog Dr. Ilaria Torre Abstract Privacy concerns have been identified as an important barrier to the growth of IoT. These concerns are exacerbated by the complexity of manually setting privacy preferences for numerous different IoT devices. Hence, there is a demand to solve the following, urgent research question: How can we help users simplify the task of managing privacy settings for IoT devices in a user-friendly manner so that they can make good privacy decisions? To solve this problem in the IoT domain, a more fundamental understanding of the logic behind IoT users' privacy decisions in different IoT contexts is needed. We, therefore, conducted a series of studies to contextualize the IoT users' decision-making characteristics and designed a set of privacy-setting interfaces to help them manage their privacy settings in various IoT contexts based on the deeper understanding of users' privacy decision behaviors. In this dissertation, we first present three studies on recommending privacy settings for different IoT environments, namely general/public IoT, household IoT, and fitness IoT, respectively. We developed and utilized a \data-driven" approach in these three studies|We first use statistical analysis and machine learning techniques on the collected user data to gain the underlying insights of IoT users' privacy decision behavior and then create a set of \smart" privacy defaults/profiles based on these insights. Finally, we design a set of interfaces to incorporate these privacy default/profiles. Users can apply these smart defaults/profiles by either a single click or by answering a few related questions. The biggest limitation of these three studies is that the proposed interfaces have not been tested, so we do not know what level of complexity (both in terms of the user interface and the in terms of the profiles) is most suitable. Thus, in the last study, we address this limitation by conducting a user study to evaluate the new interfaces of recommending privacy settings for household IoT users. The results show that our proposed user interfaces for setting household IoT privacy settings can improve users' satisfaction. Our research can benefit IoT users, manufacturers, ii Yang He Dissertation and researchers, privacy-setting interface designers and anyone who wants to adopt IoT devices by providing interfaces that put their most prominent concerns in the forefront and that make it easier to set settings that match their preferences. iii Dedication To my wife Mandy, my parents, and my friends in recognition of their undying support! iv Acknowledgments First and foremost, I would like to express immense gratitude to my advisor, Dr. Bart Knijnenburg, for his support, patience, and understanding during the past four years. Second, I would like to thank my committee members, Dr. Larry Hodges, Dr. Alexander Herzog, and Dr. Ilaria Torre, for their help and suggestions they provided on my research. Third, I want to thank Paritosh, Reza, and Byron for their friendship and inspiration. Last but not least, I want to thank my parents and my wife Mandy who have supported me throughout this long journey. Financial support was provided by Clemson University, NSF grants 1640664 and CNS- 1126344, and a gift from Samsung Research America. v Outline Abstract ............................................. ii Dedication............................................ iv Acknowledgments ....................................... v List of Tables ..........................................viii List of Figures.......................................... ix 1 Introduction......................................... 1 2 IoT technology and IoT Acceptance........................... 5 2.1 IoT Technology....................................... 6 2.2 Model the Acceptance of IoT............................... 7 2.3 Summary .......................................... 10 3 Privacy setting technologies in IoT ...........................11 3.1 Privacy Preference..................................... 11 3.2 Privacy in IoT ....................................... 12 3.3 Existing Privacy Setting Models ............................. 13 3.4 Privacy-Setting Interfaces................................. 15 3.5 Privacy Prediction ..................................... 15 3.6 Summary .......................................... 17 4 Recommending Privacy Settings for General/Public IoT..............18 4.1 Introduction......................................... 18 4.2 Dataset and design..................................... 20 4.3 Statistical Analysis..................................... 22 4.4 Predicting users' behaviors (original work)........................ 23 4.5 Privacy shortcuts (original work)............................. 33 4.6 Discussion and Limitations ................................ 35 4.7 Summary .......................................... 36 5 Recommending Privacy Settings for Household IoT.................37 5.1 Introduction......................................... 37 5.2 Experiment Setup ..................................... 38 5.3 Statistical Analysis..................................... 46 5.4 Privacy-Setting Prototype Design............................. 47 5.5 Predicting users' behaviors (original work)........................ 49 5.6 Privacy-Setting Prototype Design Using Machine Learning Results (original work) . 66 5.7 Limitations ......................................... 71 vi Yang He Dissertation 5.8 Summary .......................................... 72 6 Recommending Privacy Settings for Fitness IoT...................73 6.1 Introduction......................................... 73 6.2 Data Model......................................... 74 6.3 Dataset ........................................... 77 6.4 Predicting users' Preference (partial original work)................... 78 6.5 Profile Prediction (partial original work)......................... 82 6.6 Privacy-setting Recommendations (partial original work)................ 89 6.7 Validation.......................................... 91 6.8 Summary .......................................... 92 7 Evaluate the Household IoT Privacy-setting Profiles and User Interfaces . .100 7.1 Introduction......................................... 100 7.2 Study Design........................................ 101 7.3 Experimental setup..................................... 105 7.4 Results............................................ 106 7.5 Discussion.......................................... 113 8 Conclusion..........................................116 Bibliography...........................................117 Appendices ...........................................128 vii List of Tables 4.1 Parameters used in the experiment............................ 21 4.2 Comparison of clustering approaches........................... 25 4.3 Confusion matrix for the overall prediction ....................... 25 4.4 Drill down of the Overall Prediction tree for `who' = `Own device'.......... 27 5.1 Parameters used to construct the information-sharing scenarios............. 42 5.2 Comparison of clustering approaches (highest parsimony and highest accuracy) . 50 5.3 Confusion matrix for the One Rule prediction...................... 51 5.4 Confusion matrix for the overall prediction ....................... 53 7.1 Factor Items in Trimmed CFA Model .......................... 108 A1 Table of Accuracies. .................................... 130 viii List of Figures 2.1 The factors that affecting users' adoptions of IoT found in our study......... 9 2.2 Trust Chain......................................... 10 4.1 From Left, Screen 1 shows three default settings, Screen 2,3 and 4 shows layered interface........................................... 24 4.2 The Overall Prediction decision tree. Further drill down for `who' = `Own device' is provided in Table 4.4.................................... 26 4.3 Attitude-based clustering: 2-cluster tree. ........................ 28 4.4 Attitude-based clustering: 3-cluster tree......................... 28 4.5 The Flow Chart for Fit-based Clustering......................... 30 4.6 Fit-based clustering: 3-cluster tree. Further drill down is hidden for space reasons. 31 4.7 Accuracy of our clustering approaches .......................... 32 4.8 Two types of profile choice interfaces........................... 34 5.1 Example of one of the thirteen scenarios presented to the participants. 41 5.2 Attention check questions asked to participants..................... 43 5.3 Transcript of video shown to participants if they failed
Recommended publications
  • Internet of Things: a Scientometric Review
    S S symmetry Article Internet of Things: A Scientometric Review Juan Ruiz-Rosero 1,* ID , Gustavo Ramirez-Gonzalez 1 ID , Jennifer M. Williams 2 ID , Huaping Liu 2, Rahul Khanna 3 ID and Greeshma Pisharody 3 ID 1 Departamento de Telemática, Universidad del Cauca, Popayán, Cauca 190002, Colombia; [email protected] 2 School of Electrical Engineering and Computer Science, Oregon State University, Corvallis, OR 97331, USA; [email protected] (J.M.W.); [email protected] (H.L.) 3 Intel Corporation, 2111 NE 25th Ave., Hillsboro, OR 97124, USA; [email protected] (R.K.); [email protected] (G.P.) * Correspondence: [email protected]; Tel.: +57-(2)-820-9900 Received: 31 August 2017; Accepted: 23 November 2017; Published: 6 December 2017 Abstract: Internet of Things (IoT) is connecting billions of devices to the Internet. These IoT devices chain sensing, computation, and communication techniques, which facilitates remote data collection and analysis. wireless sensor networks (WSN) connect sensing devices together on a local network, thereby eliminating wires, which generate a large number of samples, creating a big data challenge. This IoT paradigm has gained traction in recent years, yielding extensive research from an increasing variety of perspectives, including scientific reviews. These reviews cover surveys related to IoT vision, enabling technologies, applications, key features, co-word and cluster analysis, and future directions. Nevertheless, we lack an IoT scientometrics review that uses scientific databases to perform a quantitative analysis. This paper develops a scientometric review about IoT over a data set of 19,035 documents published over a period of 15 years (2002–2016) in two main scientific databases (Clarivate Web of Science and Scopus).
    [Show full text]
  • Business Process Management & Enterprise Architecture Track
    BIO - Bioinformatics Track Track Co-Chairs: Juan Manuel Corchado, University of Salamanca, Spain Paola Lecca, University of Trento, Italy Dan Tulpan, University of Guelph, Canada An Insight into Biological Data Mining based on Rarity and Correlation as Constraints .............................1 Souad Bouasker, University of Tunis ElManar, Tunisia Drug Target Discovery Using Knowledge Graph Embeddings .........................................................................9 Sameh K. Mohamed, Insight Centre for Data Analytics, Ireland Aayah Nounu, University of Bristol, UK Vit Novacek, INSIGHT @ NUI Galway, Ireland Ensemble Feature Selectin for Biomarker Discovery in Mass Spectrometry-based Metabolomics ............17 Aliasghar Shahrjooihaghighi, University of Louisville, USA Hichem Frigui, University of Louisville, USA Xiang Zhang, University of Louisville, USA Xiaoli Wei, University of Louisville, USA Biyun Shi, University of Louisville, USA Craig J. McClain, University of Louisville, USA Molecule Specific Normalization for Protein and Metabolite Biomarker Discovery ....................................23 Ameni Trabelsi, University of Louisville, USA Biyun Shi, University of Louisville, USA Xiaoli Wei, University of Louisville, USA HICHEM FRIGUI, University of Louisville, USA Xiang Zhang, University of Louisville, USA Aliasghar Shahrajooihaghighi, University of Louisville, USA Craig McClain, University of Louisville, USA BPMEA - Business Process Management & Enterprise Architecture Track Track Co-Chairs: Marco Brambilla, Politecnico di
    [Show full text]
  • Privacy and the Internet of Things
    CENTER FOR LONG-TERM CYBERSECURITY CLTC OCCASIONAL WHITE PAPER SERIES Privacy and the Internet of Things EMERGING FRAMEWORKS FOR POLICY AND DESIGN GILAD ROSNER AND ERIN KENNEALLY CLTC OCCASIONAL WHITE PAPER SERIES Privacy and the Internet of Things EMERGING FRAMEWORKS FOR POLICY AND DESIGN GILAD ROSNER, PH.D. Founder, IoT Privacy Forum ERIN KENNEALLY, J.D. Cyber Security Division, Science & Technology Directorate, U.S. Department of Homeland Security (Author contributions to this work were done in her personal capacity. The views expressed are her own and do not necessarily represent the views of the Department of Homeland Security or the United States Government.) CENTER FOR LONG-TERM CYBERSECURITY iv PRIVACY AND THE INTERNET OF THINGS Contents Executive Summary 2 Acknowledgments 4 Internet of Things 101 5 Key Privacy Risks and Challenges 6 A Shift from Online to Offline Data Collection 7 Diminishment of Private Spaces 8 Bodily and Emotional Privacy 9 Choice and Meaningful Consent 10 Regulatory Issues Specific to the IoT 12 Emerging Frameworks and Strategies 13 Omnibus Privacy Policy 13 Improved User Control and Management 14 Identity Management 15 Notification 16 Summary 18 Conclusion 19 Endnotes 20 About the Authors 22 1 PRIVACY AND THE INTERNET OF THINGS Executive Summary The proliferation of network-connected devices, also known as the “Internet of Things” (IoT), offers unprecedented opportunities for consumers and businesses. Yet devices such as fitness trackers, personal home assistants (e.g., Amazon Echo, Google Home), and digital appliances are changing the nature of privacy as they operate silently in the background while transmitting data about a broad range of human activities and behaviors.
    [Show full text]
  • The Privacy Paradox and the Internet-Of-Things Meredydd Williams, Jason R
    1 The Perfect Storm: The Privacy Paradox and the Internet-of-Things Meredydd Williams, Jason R. C. Nurse and Sadie Creese Department of Computer Science University of Oxford Oxford, UK ffi[email protected] Abstract—Privacy is a concept found throughout human his- and colleagues discovered that individuals neglect privacy tory and opinion polls suggest that the public value this principle. concerns while making purchases [9]. Researchers found that However, while many individuals claim to care about privacy, 74% of US respondents had location-based services enabled, they are often perceived to express behaviour to the contrary. This phenomenon is known as the Privacy Paradox and its exchanging sensitive information for convenience [10]. This existence has been validated through numerous psychological, presents the ‘Privacy Paradox’ [11], where individuals claim to economic and computer science studies. Several contributory value their privacy but appear to not act accordingly. Previous factors have been suggested including user interface design, risk work has suggested that a number of factors, including user salience, social norms and default configurations. We posit that interface design [12], risk salience [13] and privacy settings the further proliferation of the Internet-of-Things (IoT) will aggravate many of these factors, posing even greater risks to [14], can exacerbate this disparity between claim and action. individuals’ privacy. This paper explores the evolution of both The Internet-of-Things (IoT) promises to be the digital the paradox and the IoT, discusses how privacy risk might alter revolution of the twenty-first century [15]. It has the potential over the coming years, and suggests further research required to connect together a vast number of ubiquitous components, to address a reasonable balance.
    [Show full text]
  • Exploring Internet of Things, Mobile Computing and Ubiquitous Computing in Computer Science Education: a Systematic Mapping Study
    www.ijtes.net Exploring Internet of Things, Mobile Computing and Ubiquitous Computing in Computer Science Education: A Systematic Mapping Study Olga Fragou1, Anna Mavroudi2 1Hellenic Open University, Greece 2Νorwegian University of Science & Technology, Norway To cite this article: Fragou, O. & Mavroudi, A. (2020). Exploring internet of things, mobile computing and ubiquitous computing in computer science education: A systematic mapping study. International Journal of Technology in Education and Science (IJTES), 4(1), 72-85. The International Journal of Technology in Education and Science (IJTES) is a peer-reviewed scholarly online journal. This article may be used for research, teaching, and private study purposes. Authors alone are responsible for the contents of their articles. The journal owns the copyright of the articles. The publisher shall not be liable for any loss, actions, claims, proceedings, demand, or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of the research material. All authors are requested to disclose any actual or potential conflict of interest including any financial, personal or other relationships with other people or organizations regarding the submitted work. International Journal of Technology in Education and Science Volume 4, Issue 1, Winter 2020 ISSN: 2651-5369 Exploring Internet of Things, Mobile Computing and Ubiquitous Computing in Computer Science Education: A Systematic Mapping Study Olga Fragou, Anna Mavroudi Article Info Abstract Article History Ubiquitous computing, mobile computing and the Internet of Things (UMI) have been widely used in several application areas. To date, methods and techniques Received: for the application of these technologies in real life situations have continued to 17 June 2019 emerge; however, their use in education settings focusing on existing practices remain largely underexplored.
    [Show full text]
  • Internet of Nano-Things, Things and Everything: Future Growth Trends
    future internet Review Internet of Nano-Things, Things and Everything: Future Growth Trends Mahdi H. Miraz 1 ID , Maaruf Ali 2, Peter S. Excell 3,* and Richard Picking 3 1 Centre for Financial Regulation and Economic Development (CFRED), The Chinese University of Hong Kong, Sha Tin, Hong Kong, China; [email protected] 2 International Association of Educators and Researchers (IAER), Kemp House, 160 City Road, London EC1V 2NX, UK; [email protected] 3 Faculty of Art, Science and Technology, Wrexham Glyndwrˆ University, Wrexham LL11 2AW, UK; [email protected] * Correspondence: [email protected]; Tel.: +44-797-480-6644 Received: 22 June 2018; Accepted: 25 July 2018; Published: 28 July 2018 Abstract: The current statuses and future promises of the Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano-Things (IoNT) are extensively reviewed and a summarized survey is presented. The analysis clearly distinguishes between IoT and IoE, which are wrongly considered to be the same by many commentators. After evaluating the current trends of advancement in the fields of IoT, IoE and IoNT, this paper identifies the 21 most significant current and future challenges as well as scenarios for the possible future expansion of their applications. Despite possible negative aspects of these developments, there are grounds for general optimism about the coming technologies. Certainly, many tedious tasks can be taken over by IoT devices. However, the dangers of criminal and other nefarious activities, plus those of hardware and software errors, pose major challenges that are a priority for further research. Major specific priority issues for research are identified.
    [Show full text]
  • A Survey of Social Media Users Privacy Settings & Information Disclosure
    Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2016 A survey of social media users privacy settings & information disclosure Mashael Aljohani Security & Forensic Research Group, Auckland University of Technology Alastair Nisbet Security & Forensic Research Group, Auckland University of Technology Kelly Blincoe Security & Forensic Research Group, Auckland University of Technology Follow this and additional works at: https://ro.ecu.edu.au/ism Part of the Communication Technology and New Media Commons, and the Information Security Commons DOI: 10.4225/75/58a693deee893 Aljohani, M., Nisbet, A., & Blincoe, K. (2016). A survey of social media users privacy settings & information disclosure. In Johnstone, M. (Ed.). (2016). The Proceedings of 14th Australian Information Security Management Conference, 5-6 December, 2016, Edith Cowan University, Perth, Western Australia. (pp.67-75). This Conference Proceeding is posted at Research Online. https://ro.ecu.edu.au/ism/198 A SURVEY OF SOCIAL MEDIA USERS PRIVACY SETTINGS & INFORMATION DISCLOSURE Mashael Aljohani1,2, Alastair Nisbet1,2, Kelly Blincoe2, 1Security & Forensic Research Group, 2Auckland University of Technology Auckland, New Zealand [email protected], [email protected], [email protected] Abstract This research utilises a comprehensive survey to ascertain the level of social networking site personal information disclosure by members at the time of joining the membership and their subsequent postings to the sites. Areas examined are the type of information they reveal, their level of knowledge and awareness regarding how their information is protected by SNSs and the awareness of risks that over-sharing may pose. Additionally, this research studies the effect of gender, age, education, and level of privacy concern on the amount and kind of personal information disclosure and privacy settings applied.
    [Show full text]
  • Advancing the Industrial Internet of Things
    Advancing the Industrial Internet of Things An Industrial Internet Consortium and oneM2M™ Joint Whitepaper Authors Amar Deol (Huawei), Ken Figueredo (InterDigital Inc.), Shi-Wan Lin (Yo-i), Brett Murphy (RTI), Dale Seed (Convida Wireless), Jason Yin (Huawei) Editors Shi-Wan Lin (Yo-i) and Ken Figueredo (InterDigital Inc.) Contributors1 Josef Blanz (Qualcomm), Omar Elloumi (Nokia), Rajive Joshi (RTI), Peter Klement (XMPro), Sam Bhattarai (Toshiba), Atte Lansisalmi (Nokia) and Chuck Byers (IIC) 2019-12-12 1 Individuals who have provided valuable comments and inputs that have substantially improved the quality of this whitepaper. - i - 1 Context for Collaboration .................................................................................................. 1 2 Organizational Overviews ................................................................................................. 2 2.1 Overview of the IIC .............................................................................................................. 2 2.2 Overview of oneM2MTM....................................................................................................... 3 3 Alignment Between IIRA and oneM2M Architecture Frameworks ...................................... 6 3.1 IIC’s IIRA .............................................................................................................................. 7 3.2 oneM2M Architecture and Common Services Layer .............................................................. 9 3.2.1 Common Service Layer Functions
    [Show full text]
  • Case Studies in Iot -Smart-Home Solutions Pedagogical Perspective
    Case Studies in IoT -Smart-Home Solutions Pedagogical Perspective with Industrial Applications and some latest Developments Hans-Petter Halvorsen, Alexander Jonsaas, Saba Mylvaganam, Josef Timmerberg, Jean-Marc Thiriet To cite this version: Hans-Petter Halvorsen, Alexander Jonsaas, Saba Mylvaganam, Josef Timmerberg, Jean-Marc Thiriet. Case Studies in IoT -Smart-Home Solutions Pedagogical Perspective with Industrial Applications and some latest Developments. EAEEIE 2017 - 27th EAEEIE Annual Conference on Innovation in Education for Electrical and Information Engineering, Jun 2017, Grenoble, France. hal-01658856 HAL Id: hal-01658856 https://hal.archives-ouvertes.fr/hal-01658856 Submitted on 7 Dec 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Case Studies in IoT - Smart-Home Solutions Pedagogical Perspective with Industrial Applications and some latest Developments Hans-Petter Halvorsen, Alexander Jonsaas, Saba Josef Timmerberg Mylvaganam Jade University of Applied Sciences, D-26389 Wilhelmshaven, [email protected] ; Faculty of Technology, Department
    [Show full text]
  • Modeling and Analyzing Privacy in Social Networks
    Session: Research Track - Privacy SACMAT’18, June 13-15, 2018, Indianapolis, IN, USA My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks Lingjing Yu1;2, Sri Mounica Motipalli3, Dongwon Lee4, Peng Liu4, Heng Xu4, Qingyun Liu1;2, Jianlong Tan1;2, and Bo Luo3 1 Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China 2 University of Chinese Academy of Sciences, Beijing, China 3 Department of Electrical Engineering and Computer Science, The University of Kansas, USA 4 School of Information Science and Technology, The Pennsylvania State University, USA [email protected],[email protected],[email protected],[email protected], [email protected],[email protected],[email protected],[email protected] ABSTRACT 1 INTRODUCTION With the dramatically increasing participation in online social net- In recent years, many online social network services (SNSs) such as works (OSNs), huge amount of private information becomes avail- Facebook have become extremely popular, attracting a large num- able on such sites. It is critical to preserve users’ privacy without ber of users to generate and share diverse (personal) contents. With preventing them from socialization and sharing. Unfortunately, ex- the advancement of information retrieval and search techniques, on isting solutions fall short meeting such requirements. We argue the other hand, it has become easier to do web-scale identification that the key component of OSN privacy protection is protecting and extraction of users’ personal information from SNSs. There- (sensitive) content – privacy as having the ability to control informa- fore, malicious or curious users could take an advantage of these tion dissemination.
    [Show full text]
  • Indoor Air Quality Monitoring Sensor for the Web of Things †
    Proceedings Indoor Air Quality Monitoring Sensor for the Web of Things † Daniel Ibaseta 1, Julio Molleda 2,*, Fidel Díez 1 and Juan C. Granda 2 1 CTIC Technological Centre, 33203 Gijón, Spain; [email protected] (D.I.); [email protected] (F.D.) 2 Department of Computer Science and Engineering, University of Oviedo, 33204 Gijón, Spain; [email protected] * Correspondence: [email protected]; Tel.: +34-985-182-518 † Presented at 2nd International Research Conference on Sustainable Energy Engineering, Materials and Environment, Mieres, Spain, 25–27 July 2018. Published: 14 November 2018 Abstract: Many Internet of Things platforms use dedicated software coupled with proprietary devices and interfaces, creating silo solutions with no interoperability. The Web of Things paradigm promotes using open Web standards to connect physical objects to the Internet through an application layer. In this paper, we propose a low-cost, indoor air quality monitoring sensor implementing a minimal servient building block recommended by the Web of Things Working Group of the World Wide Web Consortium. The proposed sensor runs a Web server on a low-power system-on-chip microcontroller, which provides temperature, relative humidity and carbon dioxide measurements to the Internet through a REST API. Any client on the Internet able to manage the HTTP protocol may access this sensor, making it compatible with any air quality monitoring platform that uses HTTP. Keywords: IoT; WoT; REST API; air quality monitoring; SoC microcontroller 1. Introduction Embedded computing and low-power wireless communication provide physical objects with Internet connectivity, forming the Internet of Things (IoT) [1]. The IoT offers services that lay at the core of many fields, such as smart homes, smart cities, smart industries and smart agriculture.
    [Show full text]
  • Table of Contents
    Table of Contents Scroll to the title and select a Blue link to open a paper. After viewing the paper, use the bookmarks to the left to return to the beginning of the Table of Contents. Theme: AI and Agents BIO - Bioinformatics Track Track Co-Chairs: Paola Lecca, University of Trento, Italy Dan Tulpan, University of Guelph, Canada Juan Manuel Corchado, University of Salamanca, Spain Track Editorial ..................................................................................................................................................... 1 An Insight into Biological Data Mining based on Rarity and Correlation as Constraints ........................... 3 Souad Bouasker, University of Tunis ElManar, Tunisia Sadok Ben Yahia, Tallinn University of Technology, Estonia Gayo Diallo, University of Bordeaux, France Drug Target Discovery using Knowledge Graph Embeddings ..................................................................... 11 Sameh K. Mohamed, National University of Ireland Galway, Ireland Aayah Nounu, University of Bristol, UK Vit Nováček, National University of Ireland Galway, Ireland Ensemble Feature Selectin for Biomarker Discovery in Mass Spectrometry-based Metabolomics .......... 19 AliAsghar ShahrjooiHaghighi, University of Louisville, USA Hichem Frigui, University of Louisville, USA Xiang Zhang, University of Louisville, USA Xiaoli Wei, University of Louisville, USA Biyun Shi, University of Louisville, USA Craig J. McClain, University of Louisville, USA Molecule Specific Normalization for Protein and Metabolite Biomarker
    [Show full text]