skip to main content
10.1145/3152141.3152389acmconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
research-article

A dynamic decision fusion middleware for trustworthy context-aware IoT applications

Published: 11 December 2017 Publication History

Abstract

Internet of Things (IoT) devices offer new sources of contextual information, which can be leveraged by applications to make smart decisions. However, due to the decentralized and heterogeneous nature of such devices - each only having a partial view of their surroundings - there is an inherent risk of uncertain, unreliable and inconsistent observations. This is a serious concern for applications making security related decisions, such as context-aware authentication. We propose and evaluate a middleware for IoT that provides trustworthy context for a collaborative authentication use case. It abstracts a dynamic and distributed fusion scheme that extends the Chair-Varshney (CV) optimal decision fusion rule such that it can be used in a highly dynamic IoT environment. We compare performance and cost trade-offs against regular CV. Experimental evaluation demonstrates that our solution outperforms CV with 10% in a highly dynamic IoT environments, with the ability to detect and mitigate unreliable sensors.

References

[1]
F. Castanedo. 2013. A review of data fusion techniques. The Scientific World Journal 2013 (2013).
[2]
S. Chabridon, A. Bouzeghoub, A. Ahmed-Nacer, P. Marie, and T. Desprats. 2017. Unified Modeling of Quality of Context and Quality of Situation for Context-Aware Applications in the Internet of Things. Springer, Cham, 370--374.
[3]
S. Chabridon, R. Laborde, T. Desprats, A. Oglaza, P. Marie, and S. M. Marquez. 2014. A survey on addressing privacy together with quality of context for context management in the Internet of Things. annals of telecommunications - annales des télécommunications 69, 1 (2014), 47--62.
[4]
Z. Chair and P. K. Varshney. 1986. Optimal Data Fusion in Multiple Sensor Detection Systems. IEEE Trans. Aerospace Electron. Systems AES-22, 1 (Jan 1986).
[5]
L. Fridman, A. Stolerman, S. Acharya, P. Brennan, P. Juola, R. Greenstadt, and M. Kam. 2015. Multi-modal decision fusion for continuous authentication. Computers & Electrical Engineering 41 (2015), 142 -- 156.
[6]
L. Fridman, S. Weber, R. Greenstadt, and M. Kam. 2017. Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location. IEEE Systems Journal 11, 2 (June 2017), 513--521.
[7]
K. Guan, S. Dehnie, L. Gharai, R. Ghanadan, and S. Kumar. 2009. Trust management for distributed decision fusion in sensor networks. In 2009 12th International Conference on Information Fusion. 1933--1941.
[8]
T. Van hamme, V. Rimmer, D. Preuveneers, W. Joosen, M. A. Mustafa, A. Abidin, and Enrique A. Rúa. 2017. Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities. (2017).
[9]
J. R. Hoyos, J. García-Molina, J. A. Botía, and D. Preuveneers. 2016. A model-driven approach for quality of context in pervasive systems. Computers & Electrical Engineering 55 (2016), 39 -- 58.
[10]
Davy Preuveneers and Wouter Joosen. 2015. SmartAuth: Dynamic Context Fingerprinting for Continuous User Authentication. In Proceedings of the 30th Annual ACM Symposium on Applied Computing (SAC '15). ACM, New York, NY, USA, 2185--2191.
[11]
M. A. Razzaque, M. Milojevic-Jevric, A. Palade, and S. Clarke. 2016. Middleware for Internet of Things: A Survey. IEEE Internet of Things Journal 3, 1 (Feb 2016), 70--95.
[12]
Jan Spooren, Davy Preuveneers, and Wouter Joosen. 2017. Leveraging battery usage from mobile devices for active authentication. Mobile Information Systems 2017 (March 2017), 1--14. https://lirias.kuleuven.be/handle/123456789/576326
[13]
K. Veeramachaneni, L. Osadciw, A. Ross, and N. Srinivas. 2008. Decision-level fusion strategies for correlated biometric classifiers. In 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. 1--6.
[14]
Edwin B. Wilson. 1927. Probable Inference, the Law of Succession, and Statistical Inference. J. Amer. Statist. Assoc. 22, 158 (1927), 209--212.
[15]
L. D. Xu, W. He, and S. Li. 2014. Internet of Things in Industries: A Survey. IEEE Transactions on Industrial Informatics 10, 4 (Nov 2014), 2233--2243.

Cited By

View all
  • (2022)Systematic Review of Authentication and Authorization Advancements for the Internet of ThingsSensors10.3390/s2204136122:4(1361)Online publication date: 10-Feb-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
M4IoT '17: Proceedings of the 4th Workshop on Middleware and Applications for the Internet of Things
December 2017
27 pages
ISBN:9781450351706
DOI:10.1145/3152141
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

  • USENIX Assoc: USENIX Assoc
  • IFIP

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 December 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. decision fusion
  2. middleware
  3. quality of context

Qualifiers

  • Research-article

Funding Sources

Conference

Middleware '17
Sponsor:
Middleware '17: 18th International Middleware Conference
December 11 - 15, 2017
Nevada, Las Vegas

Acceptance Rates

Overall Acceptance Rate 10 of 18 submissions, 56%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Systematic Review of Authentication and Authorization Advancements for the Internet of ThingsSensors10.3390/s2204136122:4(1361)Online publication date: 10-Feb-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media