Malmö University Publications
Change search
Refine search result
12345 1 - 50 of 214
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Aladwan, Mohammad N.
    et al.
    Univ Santiago de Compostela, Ctr Singular Invest Tecnoloxias Intelixentes, Santiago De Compostela 15782, Spain..
    Awaysheh, Feras M.
    Univ Santiago de Compostela, Ctr Singular Invest Tecnoloxias Intelixentes, Santiago De Compostela 15782, Spain..
    Alawadi, Sadi
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Alazab, Mamoun
    Charles Darwin Univ, Coll Engn IT & Environm, Casuarina, NT 0810, Australia..
    Pena, Tomas F.
    Univ Santiago de Compostela, Ctr Singular Invest Tecnoloxias Intelixentes, Santiago De Compostela 15782, Spain..
    Cabaleiro, Jose C.
    Univ Santiago de Compostela, Ctr Singular Invest Tecnoloxias Intelixentes, Santiago De Compostela 15782, Spain..
    TrustE-VC: Trustworthy Evaluation Framework for Industrial Connected Vehicles in the Cloud2020In: IEEE Transactions on Industrial Informatics, ISSN 1551-3203, E-ISSN 1941-0050, Vol. 16, no 9, p. 6203-6213Article in journal (Refereed)
    Abstract [en]

    The integration between cloud computing and vehicular ad hoc networks, namely, vehicular clouds (VCs), has become a significant research area. This integration was proposed to accelerate the adoption of intelligent transportation systems. The trustworthiness in VCs is expected to carry more computing capabilities that manage large-scale collected data. This trend requires a security evaluation framework that ensures data privacy protection, integrity of information, and availability of resources. To the best of our knowledge, this is the first study that proposes a robust trustworthiness evaluation of vehicular cloud for security criteria evaluation and selection. This article proposes three-level security features in order to develop effectiveness and trustworthiness in VCs. To assess and evaluate these security features, our evaluation framework consists of three main interconnected components: 1) an aggregation of the security evaluation values of the security criteria for each level; 2) a fuzzy multicriteria decision-making algorithm; and 3) a simple additive weight associated with the importance-performance analysis and performance rate to visualize the framework findings. The evaluation results of the security criteria based on the average performance rate and global weight suggest that data residency, data privacy, and data ownership are the most pressing challenges in assessing data protection in a VC environment. Overall, this article paves the way for a secure VC using an evaluation of effective security features and underscores directions and challenges facing the VC community. This article sheds light on the importance of security by design, emphasizing multiple layers of security when implementing industrial VCs.

  • 2.
    Alassadi, Abdulrahman
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Lorig, Fabian
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Holmgren, Johan
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    An Agent-based Model for Simulating Travel Patterns of Stroke Patients2021In: DIGITAL 2021: Advances on Societal Digital Transformation / [ed] Wanwan Li; Manuela Popescu, ThinkMind , 2021, p. 11-16Conference paper (Refereed)
    Abstract [en]

    For patients suffering from a stroke, the time until the start of the treatment is a crucial factor with respect to the recovery from this condition. In rural regions, transporting the patient to an adequate hospital typically delays the diagnosis and treatment of a stroke, worsening its prognosis. To reduce the time to treatment, different policies can be applied. This includes, for instance, the use of Mobile Stroke Units (MSUs), which are specialized ambulances that can provide adequate care closer to where the stroke occurred. To simulate and assess different stroke logistics policies, such as the use of MSUs, a major challenge is the realistic modeling of the patients. In this article, we present an approach for generating an artificial population of stroke patients to simulate when and where strokes occur. We apply the model to the region of Skåne, where we investigated the relevance of travel behavior on the spatial distribution of stroke patients.

    Download full text (pdf)
    fulltext
  • 3.
    Alassadi, Abdulrahman
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Lorig, Fabian
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Holmgren, Johan
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Population Generation for Agent-based Simulations of Stroke Logistics Policies: A Case Study of Stroke Patient Mobility2022In: International Journal On Advances in Life Sciences, ISSN 1942-2660, E-ISSN 1942-2660, Vol. 14, no 1&2, p. 12-21Article in journal (Refereed)
    Abstract [en]

    For acute medical conditions, for instance strokes, the time until the start of the treatment is a crucial factor to prevent a fatal outcome and to facilitate the recovery of the patient’s health. Hence, the planning and optimization of patient logistics is of high importance to ensure prompt access to healthcare facilities in case of medical emergencies. Computer simulation can be used to investigate the effects of different stroke logistics policies under realistic conditions without jeopardizing the health of the patients. The success of such policies greatly depends on the behavior of the individuals. Hence, agent-based simulation is particularly well-suited as it imitates human behavior and decision-making by means of artificial intelligence, which allows for investigating the effects of policies under different conditions. Agent-based simulation requires the generation of a realistic synthetic population, that adequately represents the population that shall be investigated such that reliable conclusions can be drawn from the simulation results. In this article, we propose a process for generating an artificial population of potential stroke patients that can be used to investigate the effects of stroke logistics policies using agent-based simulation. To illustrate how this process can be applied, we present the results from a case study in the region of Skåne in southern Sweden, where a synthetic population of stroke patients with realistic mobility behavior is simulated. 

    Download full text (pdf)
    fulltext
  • 4.
    Alawadi, Sadi
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Mera, David
    Centro Singular de Investigación en Tecnoloxías da Información (CiTIUS), Universidade de Santiago de Compostela, Santiago de Compostela, Spain.
    Fernandez-Delgado, Manuel
    Centro Singular de Investigación en Tecnoloxías da Información (CiTIUS), Universidade de Santiago de Compostela, Santiago de Compostela, Spain.
    Alkhabbas, Fahed
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Olsson, Carl Magnus
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    A comparison of machine learning algorithms for forecasting indoor temperature in smart buildings2020In: Energy Systems, Springer Verlag, ISSN 1868-3967, E-ISSN 1868-3975, Vol. 13, p. 689-705Article in journal (Refereed)
    Abstract [en]

    The international community has largely recognized that the Earth's climate is changing. Mitigating its global effects requires international actions. The European Union (EU) is leading several initiatives focused on reducing the problems. Specifically, the Climate Action tries to both decrease EU greenhouse gas emissions and improve energy efficiency by reducing the amount of primary energy consumed, and it has pointed to the development of efficient building energy management systems as key. In traditional buildings, households are responsible for continuously monitoring and controlling the installed Heating, Ventilation, and Air Conditioning (HVAC) system. Unnecessary energy consumption might occur due to, for example, forgetting devices turned on, which overwhelms users due to the need to tune the devices manually. Nowadays, smart buildings are automating this process by automatically tuning HVAC systems according to user preferences in order to improve user satisfaction and optimize energy consumption. Towards achieving this goal, in this paper, we compare 36 Machine Learning algorithms that could be used to forecast indoor temperature in a smart building. More specifically, we run experiments using real data to compare their accuracy in terms of R-coefficient and Root Mean Squared Error and their performance in terms of Friedman rank. The results reveal that the ExtraTrees regressor has obtained the highest average accuracy (0.97%) and performance (0,058%) over all horizons.

    Download full text (pdf)
    fulltext
  • 5. Al-Dhaqm, Arafat
    et al.
    Razak, Shukor Abd
    Ikuesan, Richard Adeyemi
    Kebande, Victor R.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Siddique, Kamran
    A Review of Mobile Forensic Investigation Process Models2020In: IEEE Access, E-ISSN 2169-3536, Vol. 8, p. 173359-173375Article, review/survey (Refereed)
    Abstract [en]

    Mobile Forensics (MF) field uses prescribed scientific approaches with a focus on recovering Potential Digital Evidence (PDE) from mobile devices leveraging forensic techniques. Consequently, increased proliferation, mobile-based services, and the need for new requirements have led to the development of the MF field, which has in the recent past become an area of importance. In this article, the authors take a step to conduct a review on Mobile Forensics Investigation Process Models (MFIPMs) as a step towards uncovering the MF transitions as well as identifying open and future challenges. Based on the study conducted in this article, a review of the literature revealed that there are a few MFIPMs that are designed for solving certain mobile scenarios, with a variety of concepts, investigation processes, activities, and tasks. A total of 100 MFIPMs were reviewed, to present an inclusive and up-to-date background of MFIPMs. Also, this study proposes a Harmonized Mobile Forensic Investigation Process Model (HMFIPM) for the MF field to unify and structure whole redundant investigation processes of the MF field. The paper also goes the extra mile to discuss the state of the art of mobile forensic tools, open and future challenges from a generic standpoint. The results of this study find direct relevance to forensic practitioners and researchers who could leverage the comprehensiveness of the developed processes for investigation.

    Download full text (pdf)
    fulltext
  • 6. Al-Dhaqm, Arafat
    et al.
    Shukor, Razak
    Ikuesan, Richard
    Kebande, Victor R.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP). Luleå University of Technology.
    Othman, Siti
    Face Validation of Database Forensic Investigation Metamodel2021In: Infrastructues, ISSN 2412-3811, Vol. 6, no 2, p. 1-20, article id 13Article in journal (Other academic)
    Abstract [en]

    Using a face validity approach, this paper provides a validation of the Database Forensic Investigation Metamodel (DBFIM). The DBFIM was developed to solve interoperability, heterogeneity, complexity, and ambiguity in the database forensic investigation (DBFI) field, where severalmodels were identified, collected, and reviewed to develop DBFIM. However, the developedDBFIM lacked the face validity-based approach that could ensure DBFIM’s applicability in the DBFIfield. The completeness, usefulness, and logic of the developed DBFIM needed to be validated byexperts. Therefore, the objective of this paper is to perform the validation of the developed DBFIMusing the qualitative face validity approach. The face validity method is a common way of validating metamodels through subject expert inquiry on the domain application of the metamodel to assess whether the metamodel is reasonable and compatible based on the outcomes. For this purpose,six experts were nominated and selected to validate the developed DBFIM. From the expert review,the developed DBFIM was found to be complete, coherent, logical, scalable, interoperable, and useful for the DBFI field. 

    Download full text (pdf)
    fulltext
  • 7.
    Alkhabbas, Fahed
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    An Approach to Engineer and Realize Emergent Configurations in the Internet of Things2018In: Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, ACM Digital Library, 2018, p. 448-449Conference paper (Refereed)
    Abstract [en]

    The Internet of Things (IoT) is a fast propagating technology that is expected to emerge in almost all aspects of our daily life. The IoT environment is well known for being dynamic and uncertain. Connected devices, and their software, can be discovered at runtime and might also become suddenly unavailable. The involvement of the human in the loop complicates more the scene. People's activities are stochastic and their needs are not always predictable. Therefore, coping with the dynamic IoT environment should be considered as a first class requirement when engineering IoT systems. A useful concept for supporting this effort is Emergent Configurations (ECs). An EC consists of a dynamic set of devices that cooperate temporarily to achieve a user goal. This PhD work aims to use the concept of ECs as a basis for a novel approach for realizing IoT systems. More specifically, this thesis aims at: (i) producing characterization models for IoT systems and ECs; (ii) proposing a concrete architecture and an approach for realizing ECs.

    Download full text (pdf)
    FULLTEXT01
  • 8.
    Alkhabbas, Fahed
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Realizing Emergent Configurations in the Internet of Things2020Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    The Internet of Things (IoT) is a fast-spreading technology that enables new types of services in several domains such as transportation, health, and building automation. To exploit the potential of the IoT effectively, several challenges have to be tackled, including the following ones that we study in this thesis. First, the proposed IoT visions provide a fragmented picture, leading to a lack of consensus about IoT systems and their constituents. To piece together the fragmented picture of IoT systems, we systematically identified their characteristics by analyzing existing taxonomies. More specifically, we identified seventeen characteristics of IoT systems, and grouped them into two categories, namely, elements and quality aspects of IoT systems. Moreover, we conducted a survey to identify the factors that drive the deployment decisions of IoT systems in practice. A second set of challenges concerns the environment of IoT systems that is often dynamic and uncertain. For instance, due to the mobility of users and things, the set of things available in users' environment might change suddenly. Similarly, the status of IoT systems’ deployment topologies (i.e., the deployment nodes and their interconnections) might change abruptly. Moreover, environmental conditions monitored and controlled through IoT devices, such as ambient temperature and oxygen levels, might fluctuate suddenly. The majority of existing approaches to engineer IoT systems rely on predefined processes to achieve users’ goals. Consequently, such systems have significant shortcomings in coping with dynamic and uncertain environments. To address these challenges, we used the concept of Emergent Configurations (ECs) to engineer goal-driven IoT systems. An EC is an IoT system that consists of a dynamic set of things that cooperate temporarily to achieve a user goal. To realize ECs, we proposed an abstract architectural approach, comprising an architecture and processes, as well as six novel approaches that refine the abstract approach. The developed approaches support users to achieve their goals seamlessly in arbitrary environments by enabling the dynamic formation, deployment, enactment, and self-adaptation of IoT systems. The approaches exploit different techniques and focus on different aspects of ECs. Moreover, to better support users in dynamic and uncertain environments, we investigated the automated configuration of those environments based on users' preferences. 

    Download full text (pdf)
    fulltext
    Download (jpg)
    presentationsbild
  • 9.
    Alkhabbas, Fahed
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Alawadi, Sadi
    School of Information Technology, Halmstad University,Halmstad,Sweden.
    Ayyad, Majed
    Birzeit University,Department of Computer Science,Palestine.
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    ART4FL: An Agent-Based Architectural Approach for Trustworthy Federated Learning in the IoT2023In: 2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC), Institute of Electrical and Electronics Engineers (IEEE), 2023Conference paper (Refereed)
    Abstract [en]

    The integration of the Internet of Things (IoT) and Machine Learning (ML) technologies has opened up for the development of novel types of systems and services. Federated Learning (FL) has enabled the systems to collaboratively train their ML models while preserving the privacy of the data collected by their IoT devices and objects. Several FL frameworks have been developed, however, they do not enable FL in open, distributed, and heterogeneous IoT environments. Specifically, they do not support systems that collect similar data to dynamically discover each other, communicate, and negotiate about the training terms (e.g., accuracy, communication latency, and cost). Towards bridging this gap, we propose ART4FL, an end-to-end framework that enables FL in open IoT settings. The framework enables systems' users to configure agents that participate in FL on their behalf. Those agents negotiate and make commitments (i.e., contractual agreements) to dynamically form federations. To perform FL, the framework deploys the needed services dynamically, monitors the training rounds, and calculates agents' trust scores based on the established commitments. ART4FL exploits a blockchain network to maintain the trust scores, and it provides those scores to negotiating agents' during the federations' formation phase.

  • 10.
    Alkhabbas, Fahed
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Alawadi, Sadi
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Activity Recognition and User Preference Learning for Automated Configuration of IoT Environments2020In: IoT '20: Proceedings of the 10th International Conference on the Internet of Things, New York, United States: ACM Digital Library, 2020, p. 1-8, article id 3Conference paper (Refereed)
    Abstract [en]

    Internet of Things (IoT) environments encompass different types of devices and objects that offer a wide range of services. The dynamicity and uncertainty of those environments, including the mobility of users and devices, make it hard to foresee at design time available devices, objects, and services. For the users to benefit from such environments, they should be proposed services that are relevant to the specific context and can be provided by available things. Moreover, environments should be configured automatically based on users' preferences. To address these challenges, we propose an approach that leverages Artificial Intelligence techniques to recognize users' activities and provides relevant services to support users to perform their activities. Moreover, our approach learns users' preferences and configures their environments accordingly by dynamically forming, enacting, and adapting goal-driven IoT systems. In this paper, we present a conceptual model, a multi-tier architecture, and processes of our approach. Moreover, we report about how we validated the feasibility and evaluated the scalability of the approach through a prototype that we developed and used.

  • 11.
    Alkhabbas, Fahed
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Alsadi, Mohammed
    Department of Computer Science, Norwegian University of Science and Technology, 7491 Trondheim, Norway.
    Alawadi, Sadi
    Department of Information Technology, Uppsala University, 75105 Uppsala, Sweden; Center for Applied Intelligent Systems Research, School of Information Technology, Halmstad University, 30118 Halmstad, Sweden.
    Awaysheh, Feras M
    Institute of Computer Science, Delta Research Centre, University of Tartu, 51009 Tartu, Estonia.
    Kebande, Victor R.
    Department of Computer Science (DBlekinge Institute of Technology, 37179 Karlskrona, Sweden.
    Moghaddam, Mahyar T
    The Maersk Mc-Kinney Moller Institute (MMMI), University of Southern Denmark, 5230 Odense, Denmark.
    ASSERT: A Blockchain-Based Architectural Approach for Engineering Secure Self-Adaptive IoT Systems.2022In: Sensors, E-ISSN 1424-8220, Vol. 22, no 18, article id 6842Article in journal (Refereed)
    Abstract [en]

    Internet of Things (IoT) systems are complex systems that can manage mission-critical, costly operations or the collection, storage, and processing of sensitive data. Therefore, security represents a primary concern that should be considered when engineering IoT systems. Additionally, several challenges need to be addressed, including the following ones. IoT systems' environments are dynamic and uncertain. For instance, IoT devices can be mobile or might run out of batteries, so they can become suddenly unavailable. To cope with such environments, IoT systems can be engineered as goal-driven and self-adaptive systems. A goal-driven IoT system is composed of a dynamic set of IoT devices and services that temporarily connect and cooperate to achieve a specific goal. Several approaches have been proposed to engineer goal-driven and self-adaptive IoT systems. However, none of the existing approaches enable goal-driven IoT systems to automatically detect security threats and autonomously adapt to mitigate them. Toward bridging these gaps, this paper proposes a distributed architectural Approach for engineering goal-driven IoT Systems that can autonomously SElf-adapt to secuRity Threats in their environments (ASSERT). ASSERT exploits techniques and adopts notions, such as agents, federated learning, feedback loops, and blockchain, for maintaining the systems' security and enhancing the trustworthiness of the adaptations they perform. The results of the experiments that we conducted to validate the approach's feasibility show that it performs and scales well when detecting security threats, performing autonomous security adaptations to mitigate the threats and enabling systems' constituents to learn about security threats in their environments collaboratively.

    Download full text (pdf)
    fulltext
  • 12.
    Alkhabbas, Fahed
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    De Sanctis, Martina
    Gran Sasso Sci Inst, Comp Sci Dept, Laquila, Italy..
    Bucchiarone, Antonio
    Fdn Bruno Kessler, Trento, Italy..
    Cicchetti, Antonio
    Malardalen Univ, IDT Dept, Vasteras, Sweden..
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Iovino, Ludovico
    Gran Sasso Sci Inst, Comp Sci Dept, Laquila, Italy..
    ROUTE: A Framework for Customizable Smart Mobility Planners2022In: IEEE 19TH INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE (ICSA 2022), 2022, p. 169-179Conference paper (Refereed)
    Abstract [en]

    Multimodal journey planners are used worldwide to support travelers in planning and executing their journeys. Generated travel plans usually involve local mobility service providers, consider some travelers' preferences, and provide travelers information about the routes' current status and expected delays. However, those planners cannot fully consider the special situations of individual cities when providing travel planning services. Specifically, authorities of different cities might define customizable regulations or constraints of movements in the cities (e.g., due to construction works or pandemics). Moreover, with the transformation of traditional cities into smart cities, travel planners could leverage advanced monitoring features. Finally, most planners do not consider relevant information impacting travel plans, for instance, information that might be provided by travelers (e.g., a crowded square) or by mobility service providers (e.g., changing the timetable of a bus). To address the aforementioned shortcomings, in this paper, we propose ROUTE, a framework for customizable smart mobility planners that better serve the needs of travelers, local authorities, and mobility service providers in the dynamic ecosystem of smart cities. ROUTE is composed of an architecture, a process, and a prototype developed to validate the feasibility of the framework. Experiments' results show that the framework scales well in both centralized and distributed deployment settings.

  • 13.
    Alkhabbas, Fahed
    et al.
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Martina, De Sanctis
    Spalazzese, Romina
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Bucchiarone, Antonio
    Davidsson, Paul
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Marconi, Annapaola
    Enacting Emergent Configurations in the IoT Through Domain Objects2018In: Proceedings of ICSOC 2018: Service-Oriented Computing, Springer, 2018, p. 279-294Conference paper (Refereed)
    Abstract [en]

    The Internet of Things (IoT) pervades more and more aspects of our lives and often involves many types of smart connected objects and devices. User’s IoT environment changes dynamically, e.g., due to the mobility of the user and devices. Users can fully benefit from the IoT only when they can effortlessly interact with it. To accomplish this in a dynamic and heterogenous environment, we make use of Emergent Configurations (ECs), which consist of a set of things that connect and cooperate temporarily through their functionalities, applications, and services, to achieve a user goal. In this paper, we: (i) present the IoT-FED architectural approach to enable the automated formation and enactment of ECs. IoT-FED exploits heterogeneous and independently developed things, IoT services, and applications which are modeled as Domain Objects (DOs), a service-based formalism. Additionally, we (ii) discuss the prototype we developed and the experiments run in our IoT lab, for validation purposes.

    Download full text (pdf)
    FULLTEXT01
  • 14.
    Alkhabbas, Fahed
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Murturi, Ilir
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Dustdar, Schahram
    A Goal driven Approach for Deploying Self-adaptive IoT Systems2020In: Proceedings: 2020 IEEE International Conference on Software Architecture (ICSA), Salvador, Brazil, 16-20 March 2020 / [ed] Lisa O’Conner, 2020, p. 146-156Conference paper (Refereed)
    Abstract [en]

    Engineering Internet of Things (IoT) systems is a challenging task partly due to the dynamicity and uncertainty of the environment including the involvement of the human in the loop. Users should be able to achieve their goals seamlessly in different environments, and IoT systems should be able to cope with dynamic changes. Several approaches have been proposed to enable the automated formation, enactment, and self-adaptation of goal-driven IoT systems. However, they do not address deployment issues. In this paper, we propose a goal-driven approach for deploying self-adaptive IoT systems in the Edge-Cloud continuum. Our approach supports the systems to cope with the dynamicity and uncertainty of the environment including changes in their deployment topologies, i.e., the deployment nodes and their interconnections. We describe the architecture and processes of the approach and the simulations that we conducted to validate its feasibility. The results of the simulations show that the approach scales well when generating and adapting the deployment topologies of goal-driven IoT systems in smart homes and smart buildings.

  • 15.
    Alkhabbas, Fahed
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Cerioli, Maura
    Leotta, Maurizio
    Reggio, Gianna
    On the Deployment of IoT Systems: An Industrial Survey2020In: 2020 IEEE International Conference on Software Architecture Companion (ICSA-C), 2020Conference paper (Refereed)
    Abstract [en]

    Internet of Things (IoT) systems are complex and multifaceted, and the design of their architectures needs to consider many aspects at a time. Design decisions concern, for instance, the modeling of software components and their interconnections, as well as where to deploy the components within the available hardware infrastructure in the Edge-Cloud continuum. A relevant and challenging task, in this context, is to identify optimal deployment models due to all the different aspects involved, such as extra-functional requirements of the system, heterogeneity of the hardware resources concerning their processing and storage capabilities, and constraints like legal issues and operational cost limits. To gain insights about the deployment decisions concerning IoT systems in practice, and the factors that influence those decisions, we report about an industrial survey we conducted with 66 IoT architects from 18 countries across the world. Each participant filled in a questionnaire that comprises 15 questions. By analyzing the collected data, we have two main findings: (i) architects rely on the Cloud more than the Edge for deploying the software components of IoT systems, in the majority of the IoT application domains; and (ii) the main factors driving deployment decisions are four: reliability, performance, security, and cost.

  • 16.
    Alkhabbas, Fahed
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    An Agent-based Approach to Realize Emergent Configurationsin the Internet of Things2020In: Electronics, E-ISSN 2079-9292, Vol. 9, no 9, article id 1347Article in journal (Refereed)
    Abstract [en]

    The Internet of Things (IoT) has enabled physical objects and devices, often referred to as things, to connect and communicate. This has opened up for the development of novel types of services that improve the quality of our daily lives. The dynamicity and uncertainty of IoT environments, including the mobility of users and devices, make it hard to foresee at design time available things and services. Further, users should be able to achieve their goals seamlessly in arbitrary environments. To address these challenges, we exploit Artificial Intelligence (AI) to engineer smart IoT systems that can achieve user goals and cope with the dynamicity and uncertainty of their environments. More specifically, the main contribution of this paper is an approach that leverages the notion of Belief-Desire-Intention agents and Machine Learning (ML) techniques to realize Emergent Configurations (ECs) in the IoT. An EC is an IoT system composed of a dynamic set of things that connect and cooperate temporarily to achieve a user goal. The approach enables the distributed formation, enactment, adaptation of ECs, and conflict resolution among them. We present a conceptual model of the entities of the approach, its underlying processes, and the guidelines for using it. Moreover, we report about the simulations conducted to validate the feasibility of the approach and evaluate its scalability. View Full-Text

    Download full text (pdf)
    fulltext
  • 17.
    Alkhabbas, Fahed
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Characterizing Internet of Things Systems through Taxonomies: A Systematic Mapping Study2019In: Internet of Things: Engineering Cyber Physical Human Systems, E-ISSN 2542-6605, Vol. 7, article id 100084Article, review/survey (Refereed)
    Abstract [en]

    During the last decade, a large number of different definitions and taxonomies of Internet of Things (IoT) systems have been proposed. This has resulted in a fragmented picture and a lack of consensus about IoT systems and their constituents. To provide a better understanding of this issue and a way forward, we have conducted a Systematic Mapping Study (SMS) of existing IoT System taxonomies. In addition, we propose a characterization of IoT systems synthesized from the existing taxonomies, which provides a more holistic view of IoT systems than previous taxonomies. It includes seventeen characteristics, divided into two groups: elements and quality aspects. Finally, by analyzing the results of the SMS, we draw future research directions.

  • 18.
    Alkhabbas, Fahed
    et al.
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Spalazzese, Romina
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Davidsson, Paul
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    ECo-IoT: An Architectural Approach for Realizing Emergent Configurations in the Internet of Things2018In: Software Architecture: Proceeding of 12th European Conference on Software Architecture, ECSA 2018, Springer, 2018, p. 86-102Conference paper (Refereed)
    Abstract [en]

    The rapid proliferation of the Internet of Things (IoT) is changing the way we live our everyday life and the society in general. New devices get connected to the Internet every day and, similarly, new IoT services and applications exploiting them are developed across a wide range of domains. The IoT environment typically is very dynamic, devices might suddenly become unavailable and new ones might appear. Similarly, users enter and/or leave the IoT environment while being interested in fulfilling their individual needs. These key aspects must be considered while designing and realizing IoT systems. In this paper we propose ECo-IoT, an architectural approach to enable the automated formation and adaptation of Emergent Configurations (ECs) in the IoT. An EC is formed by a set of things, with their services, functionalities, and applications, to realize a user goal. ECs are adapted in response to (un)foreseen context changes e.g., changes in available things or due to changing or evolving user goals. In the paper, we describe: (i) an architecture and a process for realizing ECs; and (ii) a prototype we implemented for (iii) the validation of ECo-IoT through an IoT scenario that we use throughout the paper.

    Download full text (pdf)
    FULLTEXT01
  • 19.
    Alkhabbas, Fahed
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Human-Centric Emergent Configurations: Supporting the User Through Self-configuring IoT Systems2021In: Advances in Neuroergonomics and Cognitive Engineering: Proceedings of the AHFE 2021 Virtual Conferences on Neuroergonomics and Cognitive Engineering, Industrial Cognitive Ergonomics and Engineering Psychology, and Cognitive Computing and Internet of Things, July 25-29, 2021, USA / [ed] Hasan Ayaz; Umer Asgher; Lucas Paletta, Springer, 2021, p. 411-418Conference paper (Refereed)
    Abstract [en]

    The Internet of Things (IoT) is revolutionizing our environments with novel types of services and applications by exploiting the large number of diverse connected things. One of the main challenges in the IoT is to engineer systems to support human users to achieve their goals in dynamic and uncertain environments. For instance, the mobility of both users and devices makes it infeasible to always foresee the available things in the users’ current environments. Moreover, users’ activities and/or goals might change suddenly. To support users in such environments, we developed an initial approach that exploits the notion of Emergent Configurations (ECs) and mixed initiative techniques to engineer self-configuring IoT systems. An EC is a goal-driven IoT system composed of a dynamic set of temporarily connecting and cooperating things. ECs are more flexible and usable than IoT systems whose constituents and interfaces are fully specified at design time

  • 20.
    Aminoff, Hedvig
    et al.
    Biomedical Engineering and Health Systems, KTH Royal Institute of Technology, Stockholm, Sweden.
    Meijer, Sebastiaan
    Biomedical Engineering and Health Systems, KTH Royal Institute of Technology, Stockholm, Sweden.
    Arnelo, Urban
    Division of Surgery, CLINTEC, Karolinska Institutet, Stockholm, Sweden; Department of Surgical and Perioperative Sciences, Surgery, Umeå University, Umeå, Sweden.
    Frennert, Susanne
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Telemedicine for Remote Surgical Guidance in Endoscopic Retrograde Cholangiopancreatography: Mixed Methods Study of Practitioner Attitudes2021In: JMIR Formative Research, E-ISSN 2561-326X, Vol. 5, no 1, article id e20692Article in journal (Refereed)
    Abstract [en]

    BACKGROUND: Telemedicine innovations are rarely adopted into routine health care, the reasons for which are not well understood. Teleguidance, a promising service for remote surgical guidance during endoscopic retrograde cholangiopancreatography (ERCP) was due to be scaled up, but there were concerns that user attitudes might influence adoption.

    OBJECTIVE: Our objective was to gain a deeper understanding of ERCP practitioners' attitudes toward teleguidance. These findings could inform the implementation process and future evaluations.

    METHODS: We conducted semistructured interviews with ERCP staff about challenges during work and beliefs about teleguidance. Theoretical constructs from the technology acceptance model (TAM) guided the thematic analysis. Our findings became input to a 16-item questionnaire, investigating surgeons' beliefs about teleguidance's contribution to performance and factors that might interact with implementation.

    RESULTS: Results from 20 interviews with ERCP staff from 5 hospitals were used to adapt a TAM questionnaire, exchanging the standard "Ease of Use" items for "Compatibility and Implementation Climate." In total, 23 ERCP specialists from 15 ERCP clinics responded to the questionnaire: 9 novices (<500 ERCP procedures) and 14 experts (>500 ERCP procedures). The average agreement ratings for usefulness items were 64% (~9/14) among experts and 75% (~7/9) among novices. The average agreement ratings for compatibility items were somewhat lower (experts 64% [~9/14], novices 69% [~6/9]). The averages have been calculated from the sum of several items and therefore, they only approximate the actual values. While 11 of the 14 experts (79%) and 8 of the 9 novices (89%) agreed that teleguidance could improve overall quality and patient safety during ERCP procedures, only 8 of the 14 experts (57%) and 6 of the 9 novices (67%) agreed that teleguidance would not create new patient safety risks. Only 5 of the 14 experts (36%) and 3 of the 9 novices (33%) were convinced that video and image transmission would function well. Similarly, only 6 of the 14 experts (43%) and 6 of the 9 novices (67%) agreed that administration would work smoothly. There were no statistically significant differences between the experts and novices on any of the 16 items (P<.05).

    CONCLUSIONS: Both novices and experts in ERCP procedures had concerns that teleguidance might disrupt existing work practices. However, novices were generally more positive toward teleguidance than experts, especially with regard to the possibility of developing technical skills and work practices. While newly trained specialists were the main target for teleguidance, the experts were also intended users. As experts are more likely to be key decision makers, their attitudes may have a greater relative impact on adoption. We present suggestions to address these concerns. We conclude that using the TAM as a conceptual framework can support user-centered inquiry into telemedicine design and implementation by connecting qualitative findings to well-known analytical themes.

    Download full text (pdf)
    fulltext
  • 21.
    Amouzad Mahdiraji, Saeid
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    On the Use of Simulation and Optimization for the Analysis and Planning of Prehospital Stroke Care2022Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Immediate treatment is of extreme importance for stroke patients. However, providing fast enough treatment for stroke patients is far from trivial, mainly due to logistical challenges and difficulties in diagnosing the correct stroke type. One way to reduce the time to treatment is to use so-called Mobile Stroke Units (MSUs), which allows to diagnose and provide treatment for stroke patients already at the patient scene. A well-designed stroke transport policy is vital to improve the access to treatment for stroke patients. Simulation and mathematical optimization are useful approaches for assessing and optimizing stroke transport policies, without endangering the health of the patients.

    The main purpose of this thesis is to contribute to improving the situation for stroke patients and to reducing the social impacts of stroke. The aim is to study how to use simulation and optimization to achieve improved analysis and planning of prehospital stroke care. In particular, we focus on assessing the potential use of MSUs in a geographic area. In this thesis, optimization is used to identify the optimal locations of MSUs, and simulation is used to assess different stroke transport policies, including MSU locations. The results of this thesis aim to support public health authorities when making decisions in the prehospital stroke care domain.

    In order to fulfill the aim of this thesis, we develop and analyze a number of different simulation and optimization models. First, we propose a macro-level simulation model, an average time to treatment estimation model, used to estimate the expected time to treatment for different parts of a geographic region. Using the proposed model, we generate two different MSU scenarios to explore the potential benefits of employing MSUs in Sweden’s southern healthcare region (SHR).  

    Second, we present an optimization model to identify the best placement of MSUs while making a trade-off between the efficiency and equity perspectives, providing maximum population coverage and equal service for all patients, respectively. The trade-off function used in the model makes use of the concepts of weighted average time to treatment to model efficiency and the time difference between the expected time to treatment for different geographical areas to model equity. In a scenario study applied in the SHR, we evaluate our optimization model by comparing the current situation with three MSU scenarios, including 1, 2, and 3 MSUs.

    Third, we present a micro-level discrete event simulation model to assess stroke transport policies, including MSUs, allowing us to model the behaviors of individual entities, such as patients and emergency vehicles, over time. We generate a synthetic set of stroke patients using a Poisson distribution, used as input in a scenario study.

    Finally, we present a modeling framework with reusable components, which aims to facilitate the construction of discrete event simulation models in the emergency medical services domain. The framework consists of a number of generic activities, which can be used to represent healthcare chains modeled in the form of flowcharts. As the framework includes activities and policies modeled on the general level, the framework can be used to create models only by providing input data and a care chain specification. We evaluate the framework by using it to build a model for simulating EMS activities related to the complex case of acute stroke.

    Download full text (pdf)
    Comprehensive summary
    Download (jpg)
    presentationsbild
  • 22.
    Amouzad Mahdiraji, Saeid
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Holmgren, Johan
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Alshaban, Ala’a
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Mihailescu, Radu-Casian
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Petersson, Jesper
    Lund University; Region Skåne.
    Al Fatah, Jabir
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    A Framework for Constructing Discrete Event Simulation Models for Emergency Medical Service Policy Analysis2022In: Procedia Computer Science, E-ISSN 1877-0509, Vol. 210, p. 133-140Article in journal (Refereed)
    Abstract [en]

    Constructing simulation models can be a complex and time-consuming task, in particular if the models are constructed from scratch or if a general-purpose simulation modeling tool is used. In this paper, we propose a model construction framework, which aims to simplify the process of constructing discrete event simulation models for emergency medical service (EMS) policy analysis. The main building blocks used in the framework are a set of general activities that can be used to represent different EMS care chains modeled as flowcharts. The framework allows to build models only by specifying input data, including demographic and statistical data, and providing a care chain of activities and decisions. In a case study, we evaluated the framework by using it to construct a model for the simulation of the EMS activities related to acute stroke. Our evaluation shows that the predefined activities included in the framework are sufficient to build a simulation model for the rather complex case of acute stroke.

    Download full text (pdf)
    fulltext
  • 23.
    Amouzad Mahdiraji, Saeid
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Holmgren, Johan
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Mihailescu, Radu-Casian
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Petersson, Jesper
    Region Skåne; Lund University.
    A Micro-Level Simulation Model for Analyzing the Use of MSUs in Southern Sweden2022In: Procedia Computer Science, E-ISSN 1877-0509, Vol. 198, p. 132-139Article in journal (Refereed)
    Abstract [en]

    A mobile stroke unit (MSU) is a special type of ambulance, where stroke patients can be diagnosed and provided intravenous treatment, hence allowing to cut down the time to treatment for stroke patients. We present a discrete event simulation (DES) model to study the potential benefits of using MSUs in the southern health care region of Sweden (SHR). We included the activities and actions used in the SHR for stroke patient transportation as events in the DES model, and we generated a synthetic set of stroke patients as input for the simulation model. In a scenario study, we compared two scenarios, including three MSUs each, with the current situation, having only regular ambulances. We also performed a sensitivity analysis to further evaluate the presented DES model. For both MSU scenarios, our simulation results indicate that the average time to treatment is expected to decrease for the whole region and for each municipality of SHR. For example, the average time to treatment in the SHR is reduced from 1.31h in the baseline scenario to 1.20h and 1.23h for the two MSU scenarios. In addition, the share of stroke patients who are expected to receive treatment within one hour is increased by a factor of about 3 for both MSU scenarios.

    Download full text (pdf)
    fulltext
  • 24.
    Ashouri, Majid
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Towards Supporting IoT System Designers in Edge Computing Deployment Decisions2021Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    The rapidly evolving Internet of Things (IoT) systems demands addressing new requirements. This particularly needs efficient deployment of IoT systems to meet the quality requirements such as latency, energy consumption, privacy, and bandwidth utilization. The increasing availability of computational resources close to the edge has prompted the idea of using these for distributed computing and storage, known as edge computing. Edge computing may help and complement cloud computing to facilitate deployment of IoT systems and improve their quality. However, deciding where to deploy the various application components is not a straightforward task, and IoT system designer should be supported for the decision.

    To support the designers, in this thesis we focused on the system qualities, and aimed for three main contributions. First, by reviewing the literature, we identified the relevant and most used qualities and metrics. Moreover, to analyse how computer simulation can be used as a supporting tool, we investigated the edge computing simulators, and in particular the metrics they provide for modeling and analyzing IoT systems in edge computing. Finally, we introduced a method to represent how multiple qualities can be considered in the decision. In particular, we considered distributing Deep Neural Network layers as a use case and raked the deployment options by measuring the relevant metrics via simulation.

    Download full text (pdf)
    fulltext
    Download (jpg)
    presentationsbild
  • 25. Ashouri, Majid
    et al.
    Davidsson, Paul
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Spalazzese, Romina
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Cloud, Edge, or Both? Towards Decision Support for Designing IoT Applications2018In: 2018 Fifth International Conference on Internet of Things: Systems, Management and Security, 2018Conference paper (Other academic)
    Abstract [en]

    The rapidly evolving Internet of Things (IoT) includes applications which might generate a huge amount of data, this requires appropriate platforms and support methods. Cloud computing offers attractive computational and storage solutions to cope with these issues. However, sending to centralized servers all the data generated at the edge of the network causes latency, energy consumption, and high bandwidth demand. Performing some computations at the edge of the network, known as Edge computing, and using a hybrid Edge-Cloud architecture can help addressing these challenges. While such architecture may provide new opportunities to distribute IoT applications, making optimal decisions regarding where to deploy the different application components is not an easy and straightforward task for designers. Supporting designers’ decisions by considering key quality attributes impacting them in an Edge-Cloud architecture has not been investigated yet. In this paper, we: explore the importance of decision support for the designers, discuss how different attributes impact the decisions, and describe the required steps toward a decision support framework for IoT application designers.

    Download full text (pdf)
    FULLTEXT01
  • 26.
    Ashouri, Majid
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Quality attributes in edge computing for the Internet of Things: A systematic mapping study2021In: Internet of Things: Engineering Cyber Physical Human Systems, E-ISSN 2542-6605, Vol. 13, article id 100346Article in journal (Refereed)
    Abstract [en]

    Many Internet of Things (IoT) systems generate a massive amount of data needing to be processed and stored efficiently. Cloud computing solutions are often used to handle these tasks. However, the increasing availability of computational resources close to the edge has prompted the idea of using these for distributed computing and storage. Edge computing may help to improve IoT systems regarding important quality attributes like latency, energy consumption, privacy, and bandwidth utilization. However, deciding where to deploy the various application components is not a straightforward task. This is largely due to the trade-offs between the quality attributes relevant for the application. We have performed a systematic mapping study of 98 articles to investigate which quality attributes have been used in the literature for assessing IoT systems using edge computing. The analysis shows that time behavior and resource utilization are the most frequently used quality attributes; further, response time, turnaround time, and energy consumption are the most used metrics for quantifying these quality attributes. Moreover, simulation is the main tool used for the assessments, and the studied trade-offs are mainly between only two qualities. Finally, we identified a number of research gaps that need further study.

    Download full text (pdf)
    fulltext
  • 27.
    Ashouri, Majid
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Lorig, Fabian
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Svorobej, Sergej
    Analyzing Distributed Deep Neural Network Deployment on Edge and Cloud Nodes in IoT Systems2020In: IEEE International Conference on Edge Computing (EDGE), Virtual conference, October 18–24, 2020., 2020, p. 59-66Conference paper (Refereed)
    Abstract [en]

    For the efficient execution of Deep Neural Networks (DNN) in the Internet of Things, computation tasks can be distributed and deployed on edge nodes. In contrast to deploying all computation to the cloud, the use of Distributed DNN (DDNN) often results in a reduced amount of data that is sent through the network and thus might increase the overall performance of the system. However, finding an appropriate deployment scenario is often a complex task and requires considering several criteria. In this paper, we introduce a multi-criteria decision-making method based on the Analytical Hierarchy Process for the comparison and selection of deployment alternatives. We use the RECAP simulation framework to model and simulate DDNN deployments on different scales to provide a comprehensive assessment of deployments to system designers. In a case study, we apply the method to a smart city scenario where different distributions and deployments of a DNN are analyzed and compared.

  • 28.
    Autili, Marco
    et al.
    Dipartimento di Ingegneria e Scienze dell'Informazione e Matematica, Università degli Studi dell'Aquila, Via Vetoio, 67100 L'Aquila, Italy.
    Inverardi, Paola
    Dipartimento di Ingegneria e Scienze dell'Informazione e Matematica, Università degli Studi dell'Aquila, Via Vetoio, 67100 L'Aquila, Italy.
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Tivoli, Massimo
    Dipartimento di Ingegneria e Scienze dell'Informazione e Matematica, Università degli Studi dell'Aquila, Via Vetoio, 67100 L'Aquila, Italy.
    Mignosi, Filippo
    Dipartimento di Ingegneria e Scienze dell'Informazione e Matematica, Università degli Studi dell'Aquila, Via Vetoio, 67100 L'Aquila, Italy; Dipartimento di Matematica e Informatica, Università degli Studi di Palermo, Via Archirafi 34, 90123 Palermo, Italy.
    Automated synthesis of application-layer connectors from automata-based specifications2019In: Journal of computer and system sciences (Print), ISSN 0022-0000, E-ISSN 1090-2724, Vol. 104, p. 17-40Article in journal (Refereed)
    Abstract [en]

    Ubiquitous and Pervasive Computing, and the Internet of Things, promote dynamic interaction among heterogeneous systems. To achieve this vision, interoperability among heterogeneous systems represents a key enabler, and mediators are often built to solve protocol mismatches. Many approaches propose the synthesis of mediators. Unfortunately, a rigorous characterization of the concept of interoperability is still lacking, hence making hard to assess their applicability and soundness. In this paper, we provide a framework for the synthesis of mediators that allows us to: (i) characterize the conditions for the mediator existence and correctness; and (ii) establish the applicability boundaries of the synthesis method.

  • 29.
    Bajones, Markus
    et al.
    TU Wien, Vienna, Austria..
    Fischinger, David
    TU Wien, Vienna, Austria..
    Weiss, Astrid
    TU Wien, Vienna, Austria..
    De La Puente, Paloma
    Univ Politecn Madrid, Madrid, Spain..
    Wolf, Daniel
    TU Wien, Vienna, Austria..
    Vincze, Markus
    TU Wien, Vienna, Austria..
    Koertner, Tobias
    Acad Aging Res, Vienna, Austria..
    Weninger, Markus
    Acad Aging Res, Vienna, Austria..
    Papoutsakis, Konstantinos
    FORTH, Iraklion, Greece..
    Michel, Damien
    FORTH, Iraklion, Greece..
    Qammaz, Ammar
    FORTH, Iraklion, Greece..
    Panteleris, Paschalis
    FORTH, Iraklion, Greece..
    Foukarakis, Michalis
    FORTH, Iraklion, Greece..
    Adami, Ilia
    FORTH, Iraklion, Greece..
    Ioannidi, Danae
    FORTH, Iraklion, Greece..
    Leonidis, Asterios
    FORTH, Iraklion, Greece..
    Antona, Margherita
    FORTH, Iraklion, Greece..
    Argyros, Antonis
    FORTH, Iraklion, Greece..
    Mayer, Peter
    TU Wien, Vienna, Austria..
    Panek, Paul
    TU Wien, Vienna, Austria..
    Eftring, Hakan
    Lund Univ, Lund, Sweden..
    Frennert, Susanne
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP). Malmo Univ, Malmo, Sweden..
    Results of Field Trials with a Mobile Service Robot for Older Adults in 16 Private Households2019In: ACM Transactions on Human-Robot Interaction, E-ISSN 2573-9522, Vol. 9, no 2, p. 10:1-10:27, article id 10Article in journal (Refereed)
    Abstract [en]

    In this article, we present results obtained from field trials with the Hobbit robotic platform, an assistive, social service robot aiming at enabling prolonged independent living of older adults in their own homes. Our main contribution lies within the detailed results on perceived safety, usability, and acceptance from field trials with autonomous robots in real homes of older users. In these field trials, we studied how 16 older adults (75 plus) lived with autonomously interacting service robots over multiple weeks. Robots have been employed for periods of months previously in home environments for older people, and some have been tested with manipulation abilities, but this is the first time a study has tested a robot in private homes that provided the combination of manipulation abilities, autonomous navigation, and nonscheduled interaction for an extended period of time. This article aims to explore how older adults interact with such a robot in their private homes. Our results show that all users interacted with Hobbit daily, rated most functions as well working, and reported that they believe that Hobbit will be part of future elderly care. We show that Hobbit's adaptive behavior approach towards the user increasingly eased the interaction between the users and the robot. Our trials reveal the necessity to move into actual users' homes, as only there, we encounter real-world challenges and demonstrate issues such as misinterpretation of actions during non-scripted human-robot interaction.

    Download full text (pdf)
    fulltext
  • 30.
    Banda, Laurence
    et al.
    Wits Business School (WBS), University of the Witwatersrand (Wits), Johannesburg, South Africa.
    Mjumo, Mzyece
    Wits Business School (WBS), University of the Witwatersrand (Wits), Johannesburg, South Africa.
    Mekuria, Fisseha
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP). Wits Business School (WBS), University of the Witwatersrand (Wits), Johannesburg, South Africa.
    Business Models for 5G and Future Mobile Network Operators2022In: 2022 IEEE Future Networks World Forum (FNWF), IEEE, 2022, article id M17754Conference paper (Refereed)
    Abstract [en]

    Emerging 5G and future networks (5GFNs) will change the mobile communication business ecosystem by introducing multi-service wireless applications with diverse specifications. These smart and future-oriented wireless networks are intended to address not only consumer-based smartphone applications, but also the needs of various vertical industry markets (e.g., education, energy, healthcare, transportation, manufacturing, agriculture, and so forth). 5GFNs are aimed at attaining economic value for all key stakeholders, including customers, mobile network operators (MNOs), equipment vendors, public institutions, private enterprises, digital business start-ups and various third parties. This paper discusses business model options for 5GFNs from the MNOs’ perspective.  We describe current MNOs’ business models and their shortcomings. Thereafter, we present emerging business models for 5GFNs which MNOs should consider when rolling out these networks.  

  • 31. Baudin, Katarina
    et al.
    Gustafsson, Christine
    Frennert, Susanne
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Views of Swedish Elder Care Personnel on Ongoing Digital Transformation: Cross-Sectional Study2020In: Journal of Medical Internet Research, ISSN 1438-8871, E-ISSN 1438-8871, Vol. 22, no 6, article id e15450Article in journal (Refereed)
    Abstract [en]

    BACKGROUND: Swedish municipalities are facing demographic challenges due to the growing number of older people and the resulting increased need for health care services. Welfare technologies are being launched as possible solutions for meeting some of these challenges.

    OBJECTIVE: The aim of this study was to explore the perception, experimentation, evaluation, and procurement of welfare technology practices among professionals working in municipal elder care in relation to their gender, age, and profession.

    METHODS: Data for this explorative cross-sectional study were collected from 393 responses to a web-based survey on municipal elder care in Sweden. Chi square tests were performed to determine the associations.

    RESULTS: The results revealed gender, age, and professional differences in perspectives of municipal elder care workers. Differences were particularly evident in attitudes toward technology, both the use of technology in general and in the workplace, and involvement and participation in decision making regarding the procurement of new welfare technologies. Men (37/53, 70%) expressed a more positive attitude toward and curiosity regarding new technologies than women (157/336, 46.7%) (P=.03). Regarding age, the younger respondents (18-24 years old) perceived the digital transformation in the workplace as "too slow" (4/4, 100%), whereas the majority of older respondents (65-74 years old) perceived it as happening at the "right pace" (4/7, 57%). The elder care personnel felt encouraged by management to explore and experiment with new welfare technologies, but never did so either for management or with patients. Even though the majority of the respondents were women, more men (4/7, 57%) were involved in the procurement process for welfare technology devices and solutions than women (98/336, 29.2%) (P<.001).

    CONCLUSIONS: Personnel working within municipal elder care were generally very positive toward new technologies. However, both gender and age differences may influence these perspectives such as the personnel's resistance to welfare technology and patients' participation in welfare technology usage and deployment. Different levels of participation in the decision-making process regarding new technology deployment may negatively affect the overall digital transformation within municipal elder care.

    Download full text (pdf)
    fulltext
  • 32.
    Brondin, Anna
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Nordström, Marcus
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Olsson, Carl Magnus
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Salvi, Dario
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Open source step counter algorithm for wearable devices2020In: Companion Proceedings of the 10th International Conference on the Internet of Things (IoT 2020), New York, United States: ACM Digital Library, 2020, article id 6Conference paper (Refereed)
    Abstract [en]

    Commercial wearable devices and fitness trackers are commonly sold as black boxes of which little is known about their accuracy. This poses serious issues especially in health-related contexts such as clinical research, where transparency about accuracy and reliability are paramount.

    We present a validated algorithm for computing step counting that is optimised for use in constrained computing environments. Released as open source, the algorithm is based on the windowed peak detection approach, which has previously shown high accuracy on smartphones. The algorithm is optimised to run on a programmable smartwatch (Pine Time) and tested on 10 subjects in 8 scenarios, with varying varying positions of the wearable and walking paces.

    Our approach achieves a 89% average accuracy, with the highest average accuracy when walking outdoor (98%) and the lowest in a slow-walk scenario (77%). This result can be compared with the built-in step counter of the smartwatch (Bosch BMA421), which yielded a 94% average accuracy for the same use cases. Our work thus shows that an open-source approach for extracting physical activity data from wearable devices is possible and achieves an accuracy comparable to the one produced by proprietary embedded algorithms.

    Download full text (pdf)
    fulltext
  • 33.
    Bugeja, Joseph
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    On Privacy and Security in Smart Connected Homes2021Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    The growth and presence of heterogeneous sensor-equipped Internet-connected devices inside the home can increase efficiency and quality of life for the residents. Simultaneously, these devices continuously collect, process, and transmit data about the residents and their daily lifestyle activities to unknown parties outside the home. Such data can be sensitive and personal, leading to increasingly intimate insights into private lives. This data allows for the implementation of services, personalization support, and benefits offered by smart home technologies. Alas, there has been a surge of cyberattacks on connected home devices that essentially compromise privacy and security of the residents.

    Providing privacy and security is a critical issue in smart connected homes. Many residents are concerned about unauthorized access into their homes and about the privacy of their data. However, it is typically challenging to implement privacy and security in a smart connected home because of its heterogeneity of devices, the dynamic nature of the home network, and the fact that it is always connected to the Internet, amongst other things. As the numbers and types of smart home devices are increasing rapidly, so are the risks with these devices. Concurrently, it is also becoming increasingly challenging to gain a deeper understand- ing of the smart home. Such understanding is necessary to build a more privacy-preserving and secure smart connected home. Likewise, it is needed as a precursor to perform a comprehensive privacy and security analysis of the smart home.

    In this dissertation, we render a comprehensive description and account of the smart connected home that can be used for conducting risk analysis. In doing so, we organize the underlying smart home devices ac- cording to their functionality, identify their data-collecting capabilities, and survey the data types being collected by them. Such is done using the technical specification of commercial devices, including their privacy policies. This description is then leveraged for identifying threats and for analyzing risks present in smart connected homes. Such is done by analyzing both scholarly literature and examples from the industry, and leveraging formal modeling. Additionally, we identify malicious threat agents and mitigations that are relevant to smart connected homes. This is performed without limiting the research and results to a particular configuration and type of smart home.

    This research led to three main findings. First, the majority of the surveyed commercial devices are collecting instances of sensitive and personal data but are prone to critical vulnerabilities. Second, there is a shortage of scientific models that capture the complexity and heterogeneity of real-world smart home deployments, especially those intended for privacy risk analysis. Finally, despite the increasing regulations and attention to privacy and security, there is a lack of proactive and integrative approaches intended to safeguard privacy and security of the residents. We contributed to addressing these three findings by developing a framework and models that enable early identification of threats, better planning for risk management scenarios, and mitigation of potential impacts caused by attacks before they reach the homes and compromise the lives of the residents.

    Overall, the scientific contributions presented in this dissertation help deepen the understanding and reasoning about privacy and security concerns affecting smart connected homes, and contributes to advancing the research in the area of risk analysis as applied to such systems.

    Download full text (pdf)
    comprehensive summary
    Download (jpg)
    preview image
  • 34.
    Bugeja, Joseph
    et al.
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Davidsson, Paul
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Jacobsson, Andreas
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Functional Classification and Quantitative Analysis of Smart Connected Home Devices2018In: 2018 Global Internet of Things Summit (GIoTS), Institute of Electrical and Electronics Engineers (IEEE), 2018, p. 144-149Conference paper (Refereed)
    Abstract [en]

    The home environment is rapidly becoming more complex with the introduction of numerous and heterogeneous Internet of Things devices. This development into smart connected homes brings with it challenges when it comes to gaining a deeper understanding of the home environment as a socio-technical system. A better understanding of the home is essential to build robust, resilient, and secure smart home systems. In this regard, we developed a novel method for classifying smart home devices in a logical and coherent manner according to their functionality. Unlike other approaches, we build the categorization empirically by mining the technical specifications of 1,193 commercial devices. Moreover, we identify twelve capabilities that can be used to characterize home devices. Alongside the classification, we also quantitatively analyze the entire spectrum of commercial smart home devices in accordance to their functionality and capabilities. Overall, the categorization and analysis provide a foundation for identifying opportunities of generalizations and common solutions for the smart home.

    Download full text (pdf)
    FULLTEXT01
  • 35.
    Bugeja, Joseph
    et al.
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Jacobsson, Andreas
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    On the Design of a Privacy-Centered Data Lifecycle for Smart Living Spaces2020In: Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19--23, 2019, Revised Selected Papers / [ed] Michael Friedewald, Melek Önen, Eva Lievens, Stephan Krenn, and Samuel Fricker, Springer, 2020, 576, p. 126-141Chapter in book (Refereed)
    Abstract [en]

    Many living spaces, such as homes, are becoming smarter and connected by using Internet of Things (IoT) technologies. Such systems should ideally be privacy-centered by design given the sensitive and personal data they commonly deal with. Nonetheless, few systematic methodologies exist that deal with privacy threats affecting IoT-based systems. In this paper, we capture the generic function of an IoT system to model privacy so that threats affecting such contexts can be identified and categorized at system design stage. In effect, we integrate an extension to so called Data Flow Diagrams (DFD) in the model, which provides the means to handle the privacy-specific threats in IoT systems. To demonstrate the usefulness of the model, we apply it to the design of a realistic use-case involving Facebook Portal. We use that as a means to elicit the privacy threats and mitigations that can be adopted therein. Overall, we believe that the proposed extension and categorization of privacy threats provide a useful addition to IoT practitioners and researchers in support for the adoption of sound privacy-centered principles in the early stages of the smart living design process.

  • 36.
    Bugeja, Joseph
    et al.
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Jacobsson, Andreas
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    A Privacy-Centered System Model for Smart Connected Homes2020In: 2020 IEEE International Conference on Pervasive Computing and Communications Workshops: PerCom Workshops, IEEE, 2020Conference paper (Refereed)
    Abstract [en]

    Smart connected homes are integrated with heterogeneous Internet-connected devices interacting with the physical environment and human users. While they have become an established research area, there is no common understanding of what composes such a pervasive environment making it challenging to perform a scientific analysis of the domain. This is especially evident when it comes to discourse about privacy threats. Recognizing this, we aim to describe a generic smart connected home, including the data it deals with in a novel privacy-centered system model. Such is done using concepts borrowed from the theory of Contextual Integrity. Furthermore, we represent privacy threats formally using the proposed model. To illustrate the usage of the model, we apply it to the design of an ambient-assisted living use-case and demonstrate how it can be used for identifying and analyzing the privacy threats directed to smart connected homes.

  • 37.
    Bugeja, Joseph
    et al.
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Jacobsson, Andreas
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Davidsson, Paul
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    An Empirical Analysis of Smart Connected Home Data2018In: Internet of Things – ICIOT 2018, Springer, 2018, p. 134-149Conference paper (Refereed)
    Abstract [en]

    The increasing presence of heterogeneous Internet of Things devices inside the home brings with it added convenience and value to the householders. At the same time, these devices tend to be Internet-connected and continuously monitor and collect data about the residents and their daily lifestyle activities. Such data can be of a sensitive nature, given that the house is the place where privacy is naturally expected. To gain insight into this state of affairs, we empirically investigate the privacy policies of 87 different categories of commercial smart home devices in terms of data being collected. This is done using a combination of manual and data mining techniques. The overall contribution of this work is a model that identifies and categorizes smart connected home data in terms of its collection mode, collection method, and collection phase. Our findings bring up several implications for smart connected home privacy, which include the need for better security controls to safeguard the privacy of the householders.

  • 38.
    Bugeja, Joseph
    et al.
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Jacobsson, Andreas
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Is Your Home Becoming a Spy?: A Data-Centered Analysis and Classification of Smart Connected Home Systems2020In: IoT '20: Proceedings of the 10th International Conference on the Internet of Things, New York, United States: ACM Digital Library, 2020, article id 17Conference paper (Refereed)
    Abstract [en]

    Smart connected home systems bring different privacy challenges to residents. The contribution of this paper is a novel privacy grounded classification of smart connected home systems that is focused on personal data exposure. This classification is built empirically through k-means cluster analysis from the technical specification of 81 commercial Internet of Things (IoT) systems as featured in PrivacyNotIncluded – an online database of consumer IoT systems. The attained classification helps us better understand the privacy implications and what is at stake with different smart connected home systems. Furthermore, we survey the entire spectrum of analyzed systems for their data collection capabilities. Systems were classified into four tiers: app-based accessors, watchers, location harvesters, and listeners, based on the sensing data the systems collect. Our findings indicate that being surveilled inside your home is a realistic threat, particularly, as the majority of the surveyed in-home IoT systems are installed with cameras, microphones, and location trackers. Finally, we identify research directions and suggest some best practices to mitigate the threat of in-house surveillance.

  • 39.
    Bugeja, Joseph
    et al.
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Jacobsson, Andreas
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    PRASH: A Framework for Privacy Risk Analysis of Smart Homes.2021In: Sensors, E-ISSN 1424-8220, Vol. 21, no 19, article id 6399Article in journal (Refereed)
    Abstract [en]

    Smart homes promise to improve the quality of life of residents. However, they collect vasts amounts of personal and sensitive data, making privacy protection critically important. We propose a framework, called PRASH, for modeling and analyzing the privacy risks of smart homes. It is composed of three modules: a system model, a threat model, and a set of privacy metrics, which together are used for calculating the privacy risk exposure of a smart home system. By representing a smart home through a formal specification, PRASH allows for early identification of threats, better planning for risk management scenarios, and mitigation of potential impacts caused by attacks before they compromise the lives of residents. To demonstrate the capabilities of PRASH, an executable version of the smart home system configuration was generated using the proposed formal specification, which was then analyzed to find potential attack paths while also mitigating the impacts of those attacks. Thereby, we add important contributions to the body of knowledge on the mitigations of threat agents violating the privacy of users in their homes. Overall, the use of PRASH will help residents to preserve their right to privacy in the face of the emerging challenges affecting smart homes.

    Download full text (pdf)
    fulltext
  • 40.
    Bugeja, Joseph
    et al.
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Jacobsson, Andreas
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Davidsson, Paul
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Smart Connected Homes2018In: Internet of Things A to Z: Technologies and Applications / [ed] Qusay F. Hassan, John Wiley & Sons, 2018, p. 359-384Chapter in book (Other academic)
  • 41.
    Bugeja, Joseph
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Jacobsson, Andreas
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    The Ethical Smart Home: Perspectives and Guidelines2022In: IEEE Security and Privacy, ISSN 1540-7993, E-ISSN 1558-4046, Vol. 20, no 1, p. 72-80Article in journal (Refereed)
  • 42.
    Bugeja, Joseph
    et al.
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Jacobsson, Andreas
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    On the Analysis of Semantic Denial-of-Service Attacks Affecting Smart Living Devices2020In: Intelligent Computing: Proceedings of the 2020 Computing Conference / [ed] Kohei Arai, Supriya Kapoor, Rahul Bhatia, Springer, 2020, Vol. 2Conference paper (Refereed)
    Abstract [en]

    With the interconnectedness of heterogeneous IoT devices being deployed in smart living spaces, it is imperative to assure that connected devices are resilient against Denial-of-Service (DoS) attacks. DoS attacks may cause economic damage but may also jeopardize the life of individuals, e.g., in a smart home healthcare environment since there might be situations (e.g., heart attacks), when urgent and timely actions are crucial. To achieve a better understanding of the DoS attack scenario in the ever so private home environment, we conduct a vulnerability assessment of five commercial-off-the-shelf IoT devices: a gaming console, media player, lighting system, connected TV, and IP camera, that are typically found in a smart living space. This study was conducted using an automated vulnerability scanner – Open Vulnerability Assessment System (OpenVAS) – and focuses on semantic DoS attacks. The results of the conducted experiment indicate that the majority of the tested devices are prone to DoS attacks, in particular those caused by a failure to manage exceptional conditions, leading to a total compromise of their availability. To understand the root causes for successful attacks, we analyze the payload code, identify the weaknesses exploited, and propose some mitigations that can be adopted by smart living developers and consumers.

  • 43.
    Bugeja, Joseph
    et al.
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Jönsson, Désirée
    Jacobsson, Andreas
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    An Investigation of Vulnerabilities in Smart Connected Cameras2018In: 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), IEEE, 2018, p. 656-661Conference paper (Refereed)
    Abstract [en]

    The Internet of Things is enabling innovative ser-vices promising added convenience and value in various domains such as the smart home. Increasingly, households, office envi-ronments and cities, are being fitted with smart camera systems aimed to enhance the security of citizens. At the same time, sev-eral systems being deployed suffer from weak security implemen-tations. Recognizing this, and to understand the extent of this situation, in this study we perform a global vulnerability assess-ment using the Shodan search engine and the Common Vulnera-bilities and Exposures database. This is done to detect smart con-nected cameras exposed on the Internet alongside their sensitive, potentially private, data being broadcasted. Furthermore, we discuss whether the discovered data can be used to compromise the safety and privacy of individuals, and identify some mitiga-tions that can be adopted. The results indicate that a significant number of smart cameras are indeed prone to diverse security and privacy vulnerabilities.

    Download full text (pdf)
    FULLTEXT01
  • 44.
    Bugeja, Joseph
    et al.
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Persson, Jan A.
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    A Data-Centric Anomaly-Based Detection System for Interactive Machine Learning Setups2022In: Proceedings of the 18th International Conference on Web Information Systems and Technologies - WEBIST, SciTePress, 2022, p. 182-189Conference paper (Refereed)
    Abstract [en]

    A major concern in the use of Internet of Things (IoT) technologies in general is their reliability in the presence of security threats and cyberattacks. Particularly, there is a growing recognition that IoT environments featuring virtual sensing and interactive machine learning may be subject to additional vulnerabilities when compared to traditional networks and classical batch learning settings. Partly, this is as adversaries could more easily manipulate the user feedback channel with malicious content. To this end, we propose a data-centric anomaly-based detection system, based on machine learning, that facilitates the process of identifying anomalies, particularly those related to poisoning integrity attacks targeting the user feedback channel of interactive machine learning setups. We demonstrate the capabilities of the proposed system in a case study involving a smart campus setup consisting of different smart devices, namely, a smart camera, a climate sensmitter, smart lighting, a smart phone, and a user feedback channel over which users could furnish labels to improve detection of correct system states, namely, activity types happening inside a room. Our results indicate that anomalies targeting the user feedback channel can be accurately detected at 98% using the Random Forest classifier.

    Download full text (pdf)
    fulltext
  • 45.
    Bugeja, Joseph
    et al.
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Vogel, Bahtijar
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Jacobsson, Andreas
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Varshney, Rimpu
    Department of Security & Enterprise, Sony Mobile Communications, Lund, Sweden.
    IoTSM: An End-to-end Security Model for IoT Ecosystems2019In: 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), IEEE, 2019Conference paper (Refereed)
    Abstract [en]

    The Internet of Things (IoT) market is growing rapidly, allowing continuous evolution of new technologies. Alongside this development, most IoT devices are easy to compromise, as security is often not a prioritized characteristic. This paper proposes a novel IoT Security Model (IoTSM) that can be used by organizations to formulate and implement a strategy for developing end-to-end IoT security. IoTSM is grounded by the Software Assurance Maturity Model (SAMM) framework, however it expands it with new security practices and empirical data gathered from IoT practitioners. Moreover, we generalize the model into a conceptual framework. This approach allows the formal analysis for security in general and evaluates an organization’s security practices. Overall, our proposed approach can help researchers, practitioners, and IoT organizations, to discourse about IoT security from an end-to-end perspective.

  • 46. Bækgaard, Per
    et al.
    Jalaliniya, Shahram
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Hansen, John Paulin
    Pupillary measurement during an assembly task2019In: Applied Ergonomics, ISSN 0003-6870, E-ISSN 1872-9126, Vol. 75, p. 99-107Article in journal (Refereed)
    Abstract [en]

    We conducted an empirical study of 57 children using a printed Booklet and a digital Tablet instruction for LEGO construction while they wore a head-mounted gaze tracker. Booklets caused a particularly strong pupil dilation when encountered as the first media. Subjective responses confirmed the booklet to be more difficult to use. The children who were least productive and asked for assistance more often had a significantly different pupil pattern than the rest. Our findings suggest that it is possible to collect pupil size data in unconstrained work scenarios, providing insight to task effort and difficulties.

  • 47.
    Caramaschi, Sara
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP). Department of Electronics, Information and Bioengineering, Politecnico di Milano, 20133 Milan, Italy.
    Papini, Gabriele B.
    Department of Patient Care & Monitoring, Philips Research, 5656 AE Eindhoven, The Netherlands;Department of Electrical Engineering, Eindhoven University of Technology, 5612 AZ Eindhoven, The Netherlands.
    Caiani, Enrico G.
    Department of Electronics, Information and Bioengineering, Politecnico di Milano, 20133 Milan, Italy;Istituto Auxologico Italiano, IRCCS, S. Luca Hospital, 20149 Milan, Italy.
    Device Orientation Independent Human Activity Recognition Model for Patient Monitoring Based on Triaxial Acceleration2023In: Applied Sciences, E-ISSN 2076-3417, Vol. 13, no 7, p. 4175-4175Article in journal (Refereed)
    Abstract [en]

    Tracking a person’s activities is relevant in a variety of contexts, from health and group-specific assessments, such as elderly care, to fitness tracking and human–computer interaction. In a clinical context, sensor-based activity tracking could help monitor patients’ progress or deterioration during their hospitalization time. However, during routine hospital care, devices could face displacements in their position and orientation caused by incorrect device application, patients’ physical peculiarities, or patients’ day-to-day free movement. These aspects can significantly reduce algorithms’ performances. In this work, we investigated how shifts in orientation could impact Human Activity Recognition (HAR) classification. To reach this purpose, we propose an HAR model based on a single three-axis accelerometer that can be located anywhere on the participant’s trunk, capable of recognizing activities from multiple movement patterns, and, thanks to data augmentation, can deal with device displacement. Developed models were trained and validated using acceleration measurements acquired in fifteen participants, and tested on twenty-four participants, of which twenty were from a different study protocol for external validation. The obtained results highlight the impact of changes in device orientation on a HAR algorithm and the potential of simple wearable sensor data augmentation for tackling this challenge. When applying small rotations (<20 degrees), the error of the baseline non-augmented model steeply increased. On the contrary, even when considering rotations ranging from 0 to 180 along the frontal axis, our model reached a f1-score of 0.85±0.110.85±0.11 against a baseline model f1-score equal to 0.49±0.120.49±0.12.

    Download full text (pdf)
    fulltext
  • 48. Casserfelt, Karl
    et al.
    Mihailescu, Radu-Casian
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    An investigation of transfer learning for deep architectures in group activity recognition2019In: 2019 IEEE International Conference On Pervasive Computing and Communications Workshops (Percom Workshops), IEEE, 2019, p. 58-64Conference paper (Refereed)
    Abstract [en]

    Pervasive technologies permeating our immediate surroundings provide a wide variety of means for sensing and actuating in our environment, having a great potential to impact the way we live, but also how we work. In this paper, we address the problem of activity recognition in office environments, as a means for inferring contextual information in order to automatically and proactively assists people in their daily activities. To this end we employ state-of-the-art image processing techniques and evaluate their capabilities in a real-world setup. Traditional machine learning is characterized by instances where both the training and test data share the same distribution. When this is not the case, the performance of the learned model is deteriorated. However, often times, the data is expensive or difficult to collect and label. It is therefore important to develop techniques that are able to make the best possible use of existing data sets from related domains, relative to the target domain. To this end, we further investigate in this work transfer learning techniques in deep learning architectures for the task of activity recognition in office settings. We provide herein a solution model that attains a 94% accuracy under the right conditions.

  • 49. Cheng, Kang
    et al.
    Ye, Ning
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Wang, Ruchuan
    In-Air Gesture Interaction: Real Time Hand Posture Recognition Using Passive RFID Tags2019In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 94460-94472Article in journal (Refereed)
    Abstract [en]

    In-air gesture interaction enables a natural communication between a man and a machine with its clear semantics and humane mode of operation. In this paper, we propose a real-time recognition system on multiple gestures in the air. It uses the commodity off-the-shelf (COTS) reader with three antennas to detect the radio frequency (RF) signals of the passive radio frequency identification (RFID) Tags attached to the fingers. The idea derives from the crucial insight that the sequential phase profile of the backscatter RF signals is a reliable and well-regulated indicator insinuating space-time situation of the tagged object, which presents a close interdependency with tag's movements and positions. The KL divergence is utilized to extract the dynamic gesture segment by confirming the endpoints of the data flow. To achieve the template matching and classification, we bring in the dynamic time warping (DTW) and k-nearest neighbors (KNN) for similarity scores calculation and appropriate gesture recognition. The experiment results show that the recognition rates for static and dynamic gestures can reach 85% and 90%, respectively. Moreover, it can maintain satisfying performance under different situations, such as diverse antenna-to-user distances and being hidden from view by nonconducting obstacles.

    Download full text (pdf)
    FULLTEXT01
  • 50.
    Cuartielles Ruiz, David
    et al.
    Malmö University, Faculty of Culture and Society (KS), School of Arts and Communication (K3). Malmö University, Internet of Things and People (IOTAP).
    García Sáez, César
    Independent researcher.
    From Hacking to Making: The Commodification of Spanish DIY Spaces Since the 1990s2020In: Digital Culture & Society, ISSN 2364-2114, E-ISSN 2364-2122, Vol. 6, no 1, p. 85-106Article in journal (Refereed)
    Abstract [en]

    This article explores the history of contemporary Spanish Do-It-Yourself (DIY) spaces (hacklabs, hackerspaces, fab labs, makerspaces and after-school academies) and the growth of each type since the 1990s. The development of these types of spaces is reflected against the commodification and commoditisation of DIY in Spain. The article argues that the removal of the political layer of the early Spanish DIY techno-tactical movements allowed a higher degree of dissemination within society in general, while reducing the emancipatory poten-tial of these new spaces. However, the analysis of the degree of com-modification and commoditisation of types of spaces in relation to the amount of spaces per type shows an anomaly for makerspaces. The authors reflect upon this anomaly and whether a data set enlarge-ment could correct it. For their analysis, the authors constructed a data set of events of the Spanish DIY history through the design of an ad hoc mixed method. Tracing events and spaces could not be done in a simple way due to the long time span of the study: older spaces existed in the pre-social network days, and new ones exist only in dedicated platforms for niche communities of practice. This method of tracing events and spaces is another contribution of the article as it could be used to make similar causality analyses of historical data in other case studies.

12345 1 - 50 of 214
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf