ABCDEFGHIJKLMNOPQRSTUVWXYZ
1
The 1st Annual Nelms Workshop on
Women in IoT (WiT): Leading Through Change Student Poster Presentation Directory
2
Poster TitleSession ChairAuthor(s)AbstractZoom LinkPresentation TimeYouTube LinkRate Presentation
3
Mobility Management for V2X–IoT Communications
Janise McNairAmina Gharsallah We live in the Internet of Things (IoT) era. In IoT ecosystem, every object around us can be connected using some kind of network to every other object, and they have the capability to send and receive data from them. IoT triggers a large range of use cases. One interesting and prominent use case is Vehicle-to-Everything (V2X) communications, which aim at revolutionizing the travelling experience. The connected vehicles enable communication between the vehicle and its surroundings via the IoT. However, due to the special features in mobility, such as high mobility, frequent topology changes, it is particularly important to design an efficient mobility management mechanism for V2X–IoT communications, which is one of the most important components for Intelligent Transport Systems (ITS) and autonomous vehicles. In our work, we propose a novel multi-criteria handover mechanism to select the best Radio Access Technology (RAT) for V2X–IoT communications. Simulation results show that our mechanism satisfy the service continuity requirements while decreasing the V2X handover failure rate and the handover delay.Janise McNair is inviting you to a scheduled Zoom meeting.

Topic: WIoT Poster Session 1
Time: Oct 12, 2020 04:00 PM Eastern Time (US and Canada)

Join Zoom Meeting
https://ufl.zoom.us/j/99631321517?pwd=M3ZIMXdRMXNrVGl4Y3BoTmI4NHc2dz09

Meeting ID: 996 3132 1517
Passcode: 100366
One tap mobile
+13126266799,,99631321517# US (Chicago)
+16465588656,,99631321517# US (New York)

Dial by your location
+1 312 626 6799 US (Chicago)
+1 646 558 8656 US (New York)
+1 301 715 8592 US (Germantown)
+1 346 248 7799 US (Houston)
+1 669 900 6833 US (San Jose)
+1 253 215 8782 US (Tacoma)
Meeting ID: 996 3132 1517
Find your local number: https://ufl.zoom.us/u/aesZhbnkDe

Join by SIP
99631321517@zoomcrc.com

Join by H.323
162.255.37.11 (US West)
162.255.36.11 (US East)
115.114.131.7 (India Mumbai)
115.114.115.7 (India Hyderabad)
213.19.144.110 (Amsterdam Netherlands)
213.244.140.110 (Germany)
103.122.166.55 (Australia)
149.137.40.110 (Singapore)
64.211.144.160 (Brazil)
69.174.57.160 (Canada)
207.226.132.110 (Japan)
Meeting ID: 996 3132 1517
Passcode: 100366

Join by Skype for Business
https://ufl.zoom.us/skype/99631321517
4:15PM - 4:35PMhttps://youtu.be/dVQUhmeZmFEProvide a Rating
4
IoT Hardware Security Threat Detection: Using Side-Channel Technique For K-12 StudentsJanise McNairSarah Alzahrani, Olalekan Oyekunle, and Dr. Sanchita Mal-SarkarAs one of the single most prominent and promising novelties in technology, the Internet of Things (IoT) creates a profoundly new era for the Internet. It has garnered much attention from both academic and industry circles. IoT seamlessly connects digital and physical worlds through the exchange of large amounts of data. The IoT functions largely from machine to machine (M2M) in resource constrained environments without human intervention. Given that we are operating in an environment of billions of communicating, error-prone, and potentially malicious devices, we need to assess how to protect diverse and complex computer systems operated by potentially naïve users. Establishing security at all layers of IoT architecture will require a holistic and comprehensive system level approach which includes network, software, and hardware security. Our research emphasizes on IoT hardware security by securing the chip embedded in IoT devices. Hardware security plays an important role in ensuring trust, integrity, and authenticity of integrated circuits and electronics. IC production is often outsourced to off-shore facilities for economic reasons. This opens opportunities for insertion of malicious design alterations in the foundry, referred to as hardware Trojan attacks, to cause logical and physical malfunction. In our experiment, we attempt to ensure that only authorized users can access the system. Each user is authenticated using his username (x) and password, some function of username f(x). We have demonstrated how side-channel analysis techniques can be used to detect hardware Trojan inserted by the adversary. The purpose of this research is to encourage high school students, particularly minority and female students, in Science and Technology to promote diversity and bridge the gender gap in STEM.Janise McNair is inviting you to a scheduled Zoom meeting.

Topic: WIoT Poster Session 1
Time: Oct 12, 2020 04:00 PM Eastern Time (US and Canada)

Join Zoom Meeting
https://ufl.zoom.us/j/99631321517?pwd=M3ZIMXdRMXNrVGl4Y3BoTmI4NHc2dz09

Meeting ID: 996 3132 1517
Passcode: 100366
One tap mobile
+13126266799,,99631321517# US (Chicago)
+16465588656,,99631321517# US (New York)

Dial by your location
+1 312 626 6799 US (Chicago)
+1 646 558 8656 US (New York)
+1 301 715 8592 US (Germantown)
+1 346 248 7799 US (Houston)
+1 669 900 6833 US (San Jose)
+1 253 215 8782 US (Tacoma)
Meeting ID: 996 3132 1517
Find your local number: https://ufl.zoom.us/u/aesZhbnkDe

Join by SIP
99631321517@zoomcrc.com

Join by H.323
162.255.37.11 (US West)
162.255.36.11 (US East)
115.114.131.7 (India Mumbai)
115.114.115.7 (India Hyderabad)
213.19.144.110 (Amsterdam Netherlands)
213.244.140.110 (Germany)
103.122.166.55 (Australia)
149.137.40.110 (Singapore)
64.211.144.160 (Brazil)
69.174.57.160 (Canada)
207.226.132.110 (Japan)
Meeting ID: 996 3132 1517
Passcode: 100366

Join by Skype for Business
https://ufl.zoom.us/skype/99631321517

4:40PM - 5:00PMhttps://youtu.be/_4pOy_YUpyIProvide a Rating
5
Risk-aware DER management framework with real-time DER security evaluation Damla TurgutYaodan Hu, Xiaochen Xian and Yier Jin With the increase of Distributed Energy Resource (DER) penetration, DERs’ impacts on grid performance are no longer neglectable. Instead of isolating DERs from the grid, the new code has required DERs to assist grid control. The communication capability of DERs enhances the flexibility of grid control. At the meantime, due to the limited computation resources and the poor security-in-design of DERs, the security of DERs has been greatly concerned. In this presentation, we consider a scenario in which DERs are coordinated by a control center and an attacker capable of spoofing multiple DER reports, e.g., solar power generation. We propose to implement security defenses at the control center and present a security risk-aware framework for DER management. A statistical model is built to collectively estimate DER reliability by combining offline static data and real-time observations. The offline data indicates how likely a device will be attacked while the real-time data indicates how likely a device is attacked given the offline data. The online estimated DER reliability score is further incorporated into the optimization of grid support function to address security concerns.Damla Turgut is inviting you to a scheduled Zoom meeting.

Topic: Women In IoT (WIT) Workshop 2020 - Student Poster Session
Time: Oct 12, 2020 04:00 PM Eastern Time (US and Canada)

Join Zoom Meeting
https://ucf.zoom.us/j/93650058890

Meeting ID: 936 5005 8890
One tap mobile
+13126266799,,93650058890# US (Chicago)
+19292056099,,93650058890# US (New York)

Dial by your location
+1 312 626 6799 US (Chicago)
+1 929 205 6099 US (New York)
+1 301 715 8592 US (Germantown)
+1 346 248 7799 US (Houston)
+1 669 900 6833 US (San Jose)
+1 253 215 8782 US (Tacoma)
Meeting ID: 936 5005 8890

Join by SIP
93650058890@zoomcrc.com

Join by H.323
162.255.37.11 (US West)
162.255.36.11 (US East)
115.114.131.7 (India Mumbai)
115.114.115.7 (India Hyderabad)
213.19.144.110 (Amsterdam Netherlands)
213.244.140.110 (Germany)
103.122.166.55 (Australia)
149.137.40.110 (Singapore)
64.211.144.160 (Brazil)
69.174.57.160 (Canada)
207.226.132.110 (Japan)
Meeting ID: 936 5005 8890

Join by Skype for Business
https://ucf.zoom.us/skype/93650058890
4:15PM - 4:35PMhttps://youtu.be/dgcQ610kxCYProvide a Rating
6
An Internet-of-Things Approach to Food Security Damla TurgutDivy Chhibber, Aditi Tripathi and Sandip Ray Food insecurity refers to lack of access to safe, nutritious and adequate food. Despite significant growth in food production over the last decade, food security remains a global, societal problem. e.g., in 2018, an estimated 11.1% of US households were food insecure. A critical contributor to food insecurity is food waste. In the state of Florida, about 2.8 million people are subjected to hunger; however, studies have shown that pre-consumer and post-consumer food loss and waste leads to almost 40% produced not eaten. An obvious approach to significantly ameliorate food waste is to donate surplus foods. While food banks/pantries help address immediate food access needs, the current food donation system is inefficient and complex, involving too many hand-offs.
In this project, we present a system for streamlining food donation through a virtualization infrastructure that connects prospective food donors to food insecure communities through a match-making process. The approach is inspired by ride-share applications, but accounts for the quirks and complexities of the food distribution supply chain. The solution includes a smartphone application supported by a cloud-based infrastructure management backend, with extendible interfaces for seamlessly connecting smart IoT tracking devices to automatically identify food consumption patterns as well as data analytics engines to predict donation needs. Unlike traditional donation, the approach enables informed, precision donation to communities with targeted needs, and facilitates close engagement of the donor. Our approach provides a compelling instance of the potential for Internet-of-Things technologies to address global societal problems, and possible directions to harness its capabilities.
Damla Turgut is inviting you to a scheduled Zoom meeting.

Topic: Women In IoT (WIT) Workshop 2020 - Student Poster Session
Time: Oct 12, 2020 04:00 PM Eastern Time (US and Canada)

Join Zoom Meeting
https://ucf.zoom.us/j/93650058890

Meeting ID: 936 5005 8890
One tap mobile
+13126266799,,93650058890# US (Chicago)
+19292056099,,93650058890# US (New York)

Dial by your location
+1 312 626 6799 US (Chicago)
+1 929 205 6099 US (New York)
+1 301 715 8592 US (Germantown)
+1 346 248 7799 US (Houston)
+1 669 900 6833 US (San Jose)
+1 253 215 8782 US (Tacoma)
Meeting ID: 936 5005 8890

Join by SIP
93650058890@zoomcrc.com

Join by H.323
162.255.37.11 (US West)
162.255.36.11 (US East)
115.114.131.7 (India Mumbai)
115.114.115.7 (India Hyderabad)
213.19.144.110 (Amsterdam Netherlands)
213.244.140.110 (Germany)
103.122.166.55 (Australia)
149.137.40.110 (Singapore)
64.211.144.160 (Brazil)
69.174.57.160 (Canada)
207.226.132.110 (Japan)
Meeting ID: 936 5005 8890

Join by Skype for Business
https://ucf.zoom.us/skype/93650058890
4:40PM - 5:00PMhttps://youtu.be/3QwqmixawpcProvide a Rating
7
Security of Cooperative Adaptive Cruise Control Against Attacks on Vehicular Communication and Sensor Systems Liting HuSrivalli Boddupalli and Sandip Ray Cooperative Adaptive Cruise Control (CACC) is an autonomous driving application that enables a vehicle V to follow a preceding vehicle P safely and efficiently. It extends traditional Adaptive Cruise Control (ACC) available in current automobiles. In CACC, P informs V of its intent to accelerate or brake through vehicle-to-vehicle (V2V) communication, which is accounted for in V’s driving decision computation, in addition to their relative velocity and positions obtained through sensory inputs. CACC is an integral component of several advanced connected autonomous vehicle (CAV) applications, including platooning and cooperative on-ramp merging.

Obviously, CACC depends critically on the fidelity of the V2V communication and sensory inputs; a compromise can lead to catastrophic road accidents and drastic degradation of transportation infrastructure efficiency. Unfortunately, current implementations are susceptible to a wide range of attacks, including data mutation and fabrication, masquerade, Denial-of-Service, etc. Furthermore, traditional approaches for mitigating such attacks cannot be directly applied given the constraints of vehicular platform and real-time requirements.

We present what we believe is the first comprehensive resiliency framework for CACC that enables real-time detection and mitigation of attacks on V2V and sensor systems. Unlike other related approaches, our approach can address the spectrum of attacks within a uniform foundation. We are also developing to our knowledge one of the most complete experimental setup for evaluation of such resiliency in CAV applications, based on a taxonomy of adversaries capturing the attack spectrum. We show how to perform such evaluations on CACC using data from a physical automotive research simulator.
Liting Hu is inviting you to a scheduled Zoom meeting.

Topic: Liting Hu's Personal Meeting Room

Join Zoom Meeting
https://fiu.zoom.us/j/9987922006

Meeting ID: 998 792 2006
One tap mobile
+16468769923,,9987922006# US (New York)
+13017158592,,9987922006# US (Germantown)

Dial by your location
+1 646 876 9923 US (New York)
+1 301 715 8592 US (Germantown)
+1 312 626 6799 US (Chicago)
+1 669 900 6833 US (San Jose)
+1 253 215 8782 US (Tacoma)
+1 346 248 7799 US (Houston)
Meeting ID: 998 792 2006
Find your local number: https://fiu.zoom.us/u/acDbJwUtdC

Join by SIP
9987922006@zoomcrc.com

Join by H.323
162.255.37.11 (US West)
162.255.36.11 (US East)
115.114.131.7 (India Mumbai)
115.114.115.7 (India Hyderabad)
213.19.144.110 (Amsterdam Netherlands)
213.244.140.110 (Germany)
103.122.166.55 (Australia)
209.9.211.110 (Hong Kong SAR)
64.211.144.160 (Brazil)
69.174.57.160 (Canada)
207.226.132.110 (Japan)
Meeting ID: 998 792 2006
4:15PM - 4:35PMhttps://youtu.be/DoG7Vtf7QYwProvide a Rating
8
Towards a Privacy-Preserving Emergency Detection System via Channel State Information Liting HuMohamed Ebraheem, Sayde King and Tempestt Neal In the United States, more than 29% of older adult citizens live alone, many of whom struggle with various health issues. Senior citizens who suffer from heart disease or similar health problems, may be unlikely to receive timely medical attention in case of heart attack or stroke due to their inability to report the incident. Therefore, emergency detection systems are of high importance, especially for this vulnerable population. Due to the pervasive nature of IoT devices and the reliance of these devices on WiFi infrastructure, a novel way to achieve such an emergency detection system has emerged in a privacy-preserving manner. Prior work approached tasks like activity recognition and fall detection with visual information such as RGB videos and images or other private information (i.e., smartphone app data, sensors) that has been perceived as intrusive or privacy-concerning to users. WiFi sensing capabilities like Channel State Information (CSI) provide a novel modality to re-investigate familiar tasks through a new lens. By using existing infrastructure and commercial off the shelf devices (e.g., router, laptop), CSI offers a means to perform the same classification tasks in an unobtrusive manner, without interruption to the user. In this work, we exploit the ability of WiFi's CSI to detect spatial changes in closed environments. Applying transfer learning, we train a ResNet with the ToiFall dataset, a CSI dataset consisting of 7 activities (i.e., falling forward, falling left, falling right, sit, stand, walk, and empty), using only half of the information originally provided for every training instance, thus, requiring only one receiving device, rather than the original two receiving nodes. Our proposed method achieves 90% accuracy for activity recognition.Liting Hu is inviting you to a scheduled Zoom meeting.

Topic: Liting Hu's Personal Meeting Room

Join Zoom Meeting
https://fiu.zoom.us/j/9987922006

Meeting ID: 998 792 2006
One tap mobile
+16468769923,,9987922006# US (New York)
+13017158592,,9987922006# US (Germantown)

Dial by your location
+1 646 876 9923 US (New York)
+1 301 715 8592 US (Germantown)
+1 312 626 6799 US (Chicago)
+1 669 900 6833 US (San Jose)
+1 253 215 8782 US (Tacoma)
+1 346 248 7799 US (Houston)
Meeting ID: 998 792 2006
Find your local number: https://fiu.zoom.us/u/acDbJwUtdC

Join by SIP
9987922006@zoomcrc.com

Join by H.323
162.255.37.11 (US West)
162.255.36.11 (US East)
115.114.131.7 (India Mumbai)
115.114.115.7 (India Hyderabad)
213.19.144.110 (Amsterdam Netherlands)
213.244.140.110 (Germany)
103.122.166.55 (Australia)
209.9.211.110 (Hong Kong SAR)
64.211.144.160 (Brazil)
69.174.57.160 (Canada)
207.226.132.110 (Japan)
Meeting ID: 998 792 2006
4:40PM - 5:00PMhttps://youtu.be/uY2IEtgrHccProvide a Rating
9
Real-Time Security Assurance in Connected Autonomous Vehicular Platoon against V2V attacks My ThaiAshwini Hegde, Srivalli Boddupalli and Sandip Ray Connected autonomous vehicular (CAV) platooning is a cooperative driving application that enables a group of vehicles to closely follow each other in a safe and fuel-efficient manner. The vehicle at the front of the platoon acts as the leader and coordinates the movements of the following vehicles. The coordination is managed through vehicle-to-vehicle (V2V) communication. Consequently, it is critical for the application that it is resilient to adversarial manipulation of the V2V messages, such as message mutation, corruption, or delivery prevention. For instance, if a V2V message from the leader can be corrupted such that the braking directive is mutated into an accelerating directive, the consequence can be a fatal collision.
We propose a novel architecture to achieve the above resiliency through real-time detection and mitigation of V2V attacks on platooning through machine learning and statistical analysis. Unlike the existing solutions, our approach meets strict timing constraints and can provide holistic resiliency of the entire platoon against the spectrum of V2V attacks.
To demonstrate our approach, we are using a representative hybrid platooning implementation in which a vehicle receives V2V communication both from the leader and from the preceding vehicle. We have developed a methodology to systematically explore the spectrum of attacks on this platoon model, which accounts for V2V adversaries compromising the safety and efficiency both of individual vehicles as well as the entire platoon. Using this methodology, we are performing extensive evaluation of the efficacy of our resiliency framework against a comprehensive set of V2V attacks on platooning.
Join Zoom Meeting
https://ufl.zoom.us/j/93101200810?pwd=d0F2d2paMWZOVEoxMUp4SDJXT1NEQT09

Meeting ID: 931 0120 0810
Passcode: 014250
4:15PM - 4:35PMhttps://youtu.be/YqqWEn3ITD4Provide a Rating
10
Automatic Assessment of Infant Sleep Safety Using Video-Based IoT for SUID Prevention My ThaiDanielle Tchuinkou Kwadjo and Christophe Bobda Sudden Unexpected Infant Death (SUID) is the leading cause of infant mortality in the US among children aged from 1 month to 1 year old. To assess injury prevention behavior, we propose a wireless safety monitoring system that can monitor a baby's sleep environment 24x7. Our approach relies on a latency-sensitive system made up of the edge device and the cloud platform connected through a virtual wireless network provided by the external 4G shield. The edge device stands for smart-camera with the camera device connected to an FPGA board. An efficient, cost-effective architecture for semantic segmentation within the board, capable of recognizing safe and unsafe environments, is implemented, along with a euclidian video magnifier to detect baby's vital signs. An event is triggered and forwarded to the parents and/or caregiver when the extracted knowledge is critical. The expected accuracy is over 71% for a baby monitor intended to be a non-invasive, low cost, and efficient solution. Since the camera frame only focuses on the cradle, there is no concern about losing sight of the baby, which will result in monitoring failure. As future work, we intend to increase our database size to improve the overall accuracy.Join Zoom Meeting
https://ufl.zoom.us/j/93101200810?pwd=d0F2d2paMWZOVEoxMUp4SDJXT1NEQT09

Meeting ID: 931 0120 0810
Passcode: 014250
4:40PM - 5:00PMhttps://youtu.be/t_Pji9KoabkProvide a Rating
11
Analyzing System Software Components using API Model Guided Symbolic Execution Tempestt NealTuba Yavuz and Yihang Bai Analyzing real-world software is challenging due to complexity of the software frameworks or APIs they depend on. In this paper, we present a tool, PROMPT, that facilitates the analysis of software components using API model guided symbolic execution. PROMPT has a specification component, PROSE, that lets users define an API model, which consists of a set of data constraints and life-cycle rules that define control-flow constraints among sequentially composed API functions. Given a PROSE model and a software component, PROMPT symbolically executes the component while enforcing
the specified API model. PROMPT has been implemented on top of the KLEE symbolic execution engine and has been applied to Linux device drivers from the video, sound, and network subsystems and to some vulnerable components of BlueZ, the implementation of the Bluetooth protocol stack for the Linux kernel. PROMPT detected two new and four known memory vulnerabilities in some of the analyzed system software components.
Tempestt Neal is inviting you to a scheduled Zoom meeting.

Topic: WiT Poster Session 5
Time: Oct 12, 2020 04:00 PM Eastern Time (US and Canada)

Join Zoom Meeting
https://us02web.zoom.us/j/83594037044?pwd=VlNybG9TUzZmMUJ1ekQxODI1OGdQQT09

Meeting ID: 835 9403 7044
Passcode: 3jFw8h

4:15PM - 4:35PMhttps://youtu.be/FNjoNuHBZ2oProvide a Rating
12
Improving AR/VR experiences with deep learning Tempestt NealSharare Zehtabian, Siavash Khodadadeh, Ladislau Boloni and Damla Turgut In the near future, augmented/virtual reality (AR/VR) characters might be used for tasks in the home that are currently performed through cell phones or laptop computers - ranging from checking the weather or news to performing banking, visiting a doctor, or going to school. Instead of a keyboard or touch screen interface, the user will interact with a virtual or real person, visualized life-size, with high quality through large screens or AR/VR devices. User satisfaction for such applications depends on delivering high-quality content with minimum latency. In this poster we describe a technique where we predict the user's future requests, use the prediction to prefetch the data from the network, cache it on a local device and show it to the user at the right time with minimum latency and maximum quality.

We describe a deep learning technique to predict the AR/VR experiences that the users are most likely to access at a specific time of the day and develop several different caching techniques. We rely on real-world smart home datasets, augmented with synthetic data created to match the essential attributes of the real-world data. We evaluate the proposed prediction methods and calculate the user's experience scores in terms of caching costs and user satisfaction. Finally, we compare our results with other baselines such as random caching, caching everything, and oracle. We found that our predictive approaches outperform the baselines, the difference being especially significant for the high-quality format deliveries.
Tempestt Neal is inviting you to a scheduled Zoom meeting.

Topic: WiT Poster Session 5
Time: Oct 12, 2020 04:00 PM Eastern Time (US and Canada)

Join Zoom Meeting
https://us02web.zoom.us/j/83594037044?pwd=VlNybG9TUzZmMUJ1ekQxODI1OGdQQT09

Meeting ID: 835 9403 7044
Passcode: 3jFw8h

4:40PM - 5:00PMhttps://youtu.be/ow9m1aF0HWMProvide a Rating
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100