Searched for: +
(1 - 14 of 14)
document
Fiore, E. (author), Bourgeois, J. (author)
Planned obsolescence is generally considered as a negative business strategy that induces replacement needs and affects attachment dynamics, as opposed to the goal of elongating product lifetime. At the present, however, an early replacement of long-lasting products is preferred in at least two cases which can be addressed during the design...
conference paper 2017
document
Rahmadhani, Andri (author), Kuipers, F.A. (author)
LoRa, an abbreviation of Long Range, is a Low-Power Wide Area Network (LPWAN) radio technology that has quickly gained popularity as a communications means for the Internet-of-Things (IoT). LoRa is typically used together with the MAC protocol LoRaWAN and operates in the license-free ISM-bands. As such, anyone is allowed to deploy their own...
conference paper 2018
document
Zhu, Q. (author), Zaidman, A.E. (author)
Physical computing, which builds interactive systems between the physical world and computers, has been widely used in a wide variety of domains and applications, e.g., the Internet of Things (IoT). Although physical computing has witnessed enormous realisations, testing these physical computing systems still face many challenges, such as...
conference paper 2018
document
Kudo, Yuta (author), Zwaan, Hugo (author), Takahashi, Toru (author), Ishiyama, Rui (author), Jonker, P.P. (author)
This paper presents a new identification system for tiny parts that have no space for applying conventional ID marking or tagging. The system marks the parts with a single dot using ink containing shiny particles. The particles in a single dot naturally form a unique pattern. The parts are then identified by matching microscopic images of...
conference paper 2018
document
Nicenboim, I. (author), Giaccardi, Elisa (author), Kuijer, Lenneke (author)
In this pictorial, we illustrate steps towards a novel approach that situates connected technologies for older people as resources. In contrast to mainstream approaches in gerontechnology that consider elderly as frail and passive, we aim to complement older people's vital competences by designing technologies that can be used in less...
conference paper 2018
document
Çetin, F.O. (author), Hernandez Ganan, C. (author), Altena, E.M. (author), Kasama, Takahiro (author), Inoue, Daisuke (author), Tamiya, Kazuki (author), Tie, Ying (author), Yoshioka, Katsunari (author), van Eeten, M.J.G. (author)
With the rise of IoT botnets, the remediation of infected devices has become a critical task. As over 87% of these devices reside in broadband networks, this task will fall primarily to consumers and the Internet Service Providers. We present the first empirical study of IoT malware cleanup in the wild -- more specifically, of removing Mirai...
conference paper 2019
document
van 't Hof, Jos (author), Karunanithi, Visweswaran (author), Speretta, S. (author), Verhoeven, C.J.M. (author), McCune, E.W. (author)
Nano-satellite IoT/M2M missions are gaining popularity in recent time. Various companies have launched their pilot missions last year in 2018 and all these companies intend to place a constellation in (V)LEO that can communicate with low power sensors on the ground (sometimes remote locations) and relay it back to the end-user who is monitoring...
conference paper 2019
document
Cozzolino, Vittorio (author), Ding, Aaron Yi (author), Ott, Jörg (author)
Detecting and reacting efficiently to road condition hazards are challenging given practical restrictions such as limited data availability and lack of infrastructure support. In this paper, we present an edge-cloud chaining solution that bridges the cloud and road infrastructures to enhance road safety. We exploit the roadside infrastructure...
conference paper 2019
document
Haus, Michael (author), Ding, Aaron Yi (author), Wang, Qing (author), Toivonen, Juhani (author), Tonetto, Leonardo (author), Tarkoma, Sasu (author), Ott, Jorg (author)
The number of deployed Internet of Things (IoT) devices is steadily increasing to manage and interact with community assets of smart cities, such as transportation systems and power plants. This may lead to degraded network performance due to the growing amount of network traffic and connections generated by various IoT devices. To tackle...
conference paper 2019
document
Shiferaw, Yonatan (author), Arora, Apoorva (author), Kuipers, F.A. (author)
LoRaWAN has emerged as a popular IoT commu- nications technology. It comes with three classes of operation: A, B, and C. Although many IoT use-cases, like Firmware-over- the-Air updates, require multicast, Class A cannot be used for that purpose. Class C can, but consumes a lot of energy. This leaves Class B. In this paper, we investigate Class...
conference paper 2020
document
Noroozian, A. (author), Turcios Rodriguez, E.R. (author), Lastdrager, Elmer (author), Kasama, Takahiro (author), van Eeten, M.J.G. (author), Hernandez Ganan, C. (author)
For the mitigation of compromised Internet of Things (IoT) devices we rely on Internet Service Providers (ISPs) and their users. Given that devices are in the hands of their subscribers, what can ISPs realistically do? This study examines the effects of ISP countermeasures on infections caused by variants of the notorious Mirai family of IoT...
conference paper 2021
document
Köylü, T.C. (author), Okkerman, Hans (author), Reinbrecht, Cezar (author), Hamdioui, S. (author), Taouil, M. (author)
Internet of things (IoT) devices are appearing in all aspects of our digital life. As such, they have become prime targets for attackers and hackers. An adequate protection against attacks is only possible when the confidentiality and integrity of the data and applications of these devices are secured. State-of-the-art solutions mostly address...
conference paper 2021
document
Ding, Aaron Yi (author), Janssen, M.F.W.H.A. (author), Crowcroft, Jon (author)
As a fast evolving domain that merges edge computing, data analytics and AI/ML, commonly referred as Edge AI, the community of Edge AI is establishing and gradually finds its way to connect with mainstream research communities of distributed systems, IoT, and embedded machine learning. Meanwhile, despite of its well-claimed potential to...
conference paper 2021
document
Köylü, T.C. (author), Caetano Garaffa, L. (author), Reinbrecht, Cezar (author), Zahedi, M.Z. (author), Hamdioui, S. (author), Taouil, M. (author)
The massive deployment of Internet of Things (IoT) devices makes them vulnerable against physical tampering attacks, such as fault injection. These kind of hardware attacks are very popular as they typically do not require complex equipment or high expertise. Hence, it is important that IoT devices are protected against them. In this work, we...
conference paper 2022
Searched for: +
(1 - 14 of 14)