Tethys: Collecting Sensor Data Without Infrastructure or Trust
نویسندگان
چکیده
Careful resource monitoring is necessary to understand usage patterns and set conservation goals in an institutional setting. Sensor systems provide data to measure consumption and evaluate the effectiveness of active interventions. However, deploying sensing systems can be difficult when infrastructure support is limited. This paper describes the process of designing Tethys, a wireless water flow sensor that collects data at perfixture granularity without dependence on existing infrastructure and trusted gateways. Rather than rely on electrical infrastructure, Tethys implements energy harvesting to allow for long term deployment. To avoid dependence on existing network infrastructure, Tethys crowdsources the data collection process to residents’ smartphones acting as gateways. These gateways are untrusted and unreliable, so Tethys implements end-to-end reliability and security between the sensing device and a cloud backend. We present initial findings from a deployment in undergraduate residential halls. Our results demonstrate that Tethys can capture meaningful patterns in shower use. For instance, visible water conservation signs are statistically correlated with shorter mean shower length (p < 0.05) and are a potential area for future studies.
منابع مشابه
Public Key Infrastructures for Trust and Authentication in the IoT
The Internet of Things is a global infrastructure of smart electronic devices embedded with sensors with the purpose of collecting, processing, exchanging and delivering data. One of the main requirements of the IoT is that all the connected objects are available at any time. Since the complexity of this network constantly grows, security and privacy are vital for its development. The focus of ...
متن کاملA Practical Platform for Combining Sensor-measurement from Body Sensor Networks with Flexible Human-provided Tagging
Recent developments in wearable sensor technologies allow for collecting various information about the person in different conditions. This data is often of limited use without proper interpretation provided by human experts. We propose a practical platform that collects long-term data from multiple body and ambient sensors along with humanprovided tagging in practical and mobile conditions. We...
متن کاملReputation and Trust Mathematical Approach for Wireless Sensor Networks
In Wireless Sensor Networks (WSNs), these sensor nodes cooperate with each other to form a network without using any infrastructure. WSNs has a wide application. But the security of WSNs is still an important issue. Some existing approaches mainly rely on cryptography to ensure data authentication and integrity. These approaches only address part of the problem of security in WSNs. However, the...
متن کاملSecuring Wireless Sensor Networks with Public Key Techniques
A secure protocol for spontaneous wireless ad hoc networks which uses an hybrid symmetric/ asymmetric scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will be used to encrypt the data. Trust is based on the first visual contact between users. Our proposal is a complete self-configured secure protocol that is able to create the network...
متن کاملEnhanced Beta Trust Model for Identifying Insider Attacks in Wireless Sensor Networks
Wireless sensor networks (WSN) are more prone to insider and outsider attacks as the sensor nodes are deployed in open environment for collecting data. The traditional cryptography based security mechanisms such as authentication and authorization are able to sort out issues of outside attacker, but they are not effective against insider attacks. Trust based approaches are used to defend agains...
متن کامل