Explore PETRAS's research knowledge base of peer reviewed, multidisciplinary publications.
1. Mullagh, Louise; Jacobs, Naomi; Kwon, Nuri; Markovic, Milan; Wainwright, Ben; Chekansky, Kirsty; Cooper, Rachel: Participatory IoT Policies: A Case Study of Designing Governance at a Local Level. DRS 2022 - University of the Basque Country, Bilbao, Spain, 2022. (Type: Conference | Abstract | Links | BibTeX) @conference{conf-mullagh_participatory_2022,
title = {Participatory IoT Policies: A Case Study of Designing Governance at a Local Level},
author = {Louise Mullagh and Naomi Jacobs and Nuri Kwon and Milan Markovic and Ben Wainwright and Kirsty Chekansky and Rachel Cooper},
url = {https://abdn.pure.elsevier.com/en/publications/participatory-iot-policies-a-case-study-of-designing-governance-a},
year = {2022},
date = {2022-06-25},
booktitle = {DRS 2022 - University of the Basque Country, Bilbao, Spain},
abstract = {As IoT devices proliferate in public spaces, it is vital that adequate governance structures and policies are designed and implemented in order to enhance trust, and protect privacy and security of citizens. At a local level, smaller towns and cities that are not part of the `smart city' movement, but instead are connected through IoT devices, also need to consider how these devices are governed. This research explores how two novel methods (design fiction and walkshops) can be combined and embedded in the design of policy for IoT governance at a local level. The contribution of the work lies in wider discussions of design methods in policy making and offers a case study of how these methods can be used at a local level.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
2. Kollnig, Konrad; Shuba, Anastasia; Kleek, Max Van; Binns, Reuben; Shadbolt, Nigel: Goodbye Tracking? Impact of iOS App Tracking Transparency and Privacy Labels. In: 2022 ACM Conference on Fairness, Accountability, and Transparency, pp. 508–520, ACM, 2022, ISBN: 9781450393522. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-kollnig_goodbye_2022,
title = {Goodbye Tracking? Impact of iOS App Tracking Transparency and Privacy Labels},
author = {Konrad Kollnig and Anastasia Shuba and Max Van Kleek and Reuben Binns and Nigel Shadbolt},
doi = {10.1145/3531146.3533116},
isbn = {9781450393522},
year = {2022},
date = {2022-06-20},
booktitle = {2022 ACM Conference on Fairness, Accountability, and Transparency},
pages = {508--520},
publisher = {ACM},
abstract = {Tracking is a highly privacy-invasive data collection practice that has been ubiquitous in mobile apps for many years due to its role in supporting advertising-based revenue models. In response, Apple introduced two significant changes with iOS 14: App Tracking Transparency (ATT), a mandatory opt-in system for enabling tracking on iOS, and Privacy Nutrition Labels, which disclose what kinds of data each app processes. So far, the impact of these changes on individual privacy and control has not been well understood. This paper addresses this gap by analysing two versions of 1,759 iOS apps from the UK App Store: one version from before iOS 14 and one that has been updated to comply with the new rules.
We find that Apple's new policies, as promised, prevent the collection of the Identifier for Advertisers (IDFA), an identifier for cross-app tracking. Smaller data brokers that engage in invasive data practices will now face higher challenges in tracking users - a positive development for privacy. However, the number of tracking libraries has - on average - roughly stayed the same in the studied apps. Many apps still collect device information that can be used to track users at a group level (cohort tracking) or identify individuals probabilistically (fingerprinting). We find real-world evidence of apps computing and agreeing on a fingerprinting-derived identifier through the use of server-side code, thereby violating Apple's policies. We find that Apple itself engages in some forms of tracking and exempts invasive data practices like first-party tracking and credit scoring from its new tracking rules. We also find that the new Privacy Nutrition Labels are sometimes inaccurate and misleading, especially in less popular apps.
Overall, our observations suggest that, while Apple's changes make tracking individual users more difficult, they motivate a countermovement, and reinforce existing market power of gatekeeper companies with access to large troves of first-party data. Making the privacy properties of apps transparent through large-scale analysis remains a difficult target for independent researchers, and a key obstacle to meaningful, accountable and verifiable privacy protections.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
We find that Apple's new policies, as promised, prevent the collection of the Identifier for Advertisers (IDFA), an identifier for cross-app tracking. Smaller data brokers that engage in invasive data practices will now face higher challenges in tracking users - a positive development for privacy. However, the number of tracking libraries has - on average - roughly stayed the same in the studied apps. Many apps still collect device information that can be used to track users at a group level (cohort tracking) or identify individuals probabilistically (fingerprinting). We find real-world evidence of apps computing and agreeing on a fingerprinting-derived identifier through the use of server-side code, thereby violating Apple's policies. We find that Apple itself engages in some forms of tracking and exempts invasive data practices like first-party tracking and credit scoring from its new tracking rules. We also find that the new Privacy Nutrition Labels are sometimes inaccurate and misleading, especially in less popular apps.
Overall, our observations suggest that, while Apple's changes make tracking individual users more difficult, they motivate a countermovement, and reinforce existing market power of gatekeeper companies with access to large troves of first-party data. Making the privacy properties of apps transparent through large-scale analysis remains a difficult target for independent researchers, and a key obstacle to meaningful, accountable and verifiable privacy protections.3. Wang, Ge; Zhao, Jun; Kleek, Max Goodwin Van; Shadbolt, Nigel R.: Informing Age-Appropriate AI: Examining Principles and Practices of AI for Children. In: CHI '22: CHI Conference on Human Factors in Computing Systems, pp. 1–29, 2022. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-wang_informing_2022,
title = {Informing Age-Appropriate AI: Examining Principles and Practices of AI for Children},
author = {Ge Wang and Jun Zhao and Max Goodwin Van Kleek and Nigel R. Shadbolt},
doi = {10.1145/3491102.3502057},
year = {2022},
date = {2022-04-29},
booktitle = {CHI '22: CHI Conference on Human Factors in Computing Systems},
pages = {1--29},
abstract = {AI systems are becoming increasingly pervasive within children's devices, apps, and services. However, it is not yet well-understood how risks and ethical considerations of AI relate to children. This paper makes three contributions to this area: first, it identifies ten areas of alignment between general AI frameworks and codes for age-appropriate design for children. Then, to understand how such principles relate to real application contexts, we conducted a landscape analysis of children's AI systems, via a systematic literature review including 188 papers. This analysis revealed a wide assortment of applications, and that most systems' designs addressed only a small subset of principles among those we identified. Finally, we synthesised our findings in a framework to inform a new "Code for Age-Appropriate AI", which aims to provide timely input to emerging policies and standards, and inspire increased interactions between the AI and child-computer interaction communities.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
4. Omitola, Temitope; Waterson, Ben; Tsakalakis, Niko; Gomer, Richard; Stalla-Bourdillon, Sophie; Cherrett, Tom; Wills, Gary: Provisioning Security in a Next Generation Mobility As a Service System. In: Proceedings of the 7th International Conference on Internet of Things, Big Data and Security (IoTBDS 2022), 2022. (Type: Proceedings Article | Abstract | Links | BibTeX) @inproceedings{proc-in-omitola_provisioning_2022,
title = {Provisioning Security in a Next Generation Mobility As a Service System},
author = {Temitope Omitola and Ben Waterson and Niko Tsakalakis and Richard Gomer and Sophie Stalla-Bourdillon and Tom Cherrett and Gary Wills},
url = {https://eprints.soton.ac.uk/456004/},
year = {2022},
date = {2022-04-22},
booktitle = {Proceedings of the 7th International Conference on Internet of Things, Big Data and Security (IoTBDS 2022)},
abstract = {The urban mobility landscape is evolving at an amazing rate, with the number of mobility services growing rapidly around the world. This evolution has brought about the concept of Mobility-as-a-Service (MaaS) in providing transportation services. MaaS capitalises on the Internet of Things to provide access to seamless multi- and inter-modal mobility to the end-user. A well implemented MaaS scheme involves many stakeholders, including passengers, producing, sharing, and consuming (personal) data. In order to encourage MaaS uptake in the general population, participating stakeholders must be confident of the ensuing data privacy and security, as part of their interactions with the system. In this paper, we use STRIDE Threat Modeling framework to analyse the threats that may arise in a MaaS ecosystem. From these threats, we develop mitigations that can be used to eliminate and/or reduce such threats. This threat elicitation and their accompanying mitigations can be used as springboards to establish the necessary security to engender trust in MaaS usage.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
5. Peters, Nial; Horne, Colin; Ritchie, Matthew: ARESTOR: A Multi-role RF Sensor based on the Xilinx RFSoC. In: 18th European Radar Conference (EuRAD 2021), 2022. (Type: Proceedings Article | Abstract | BibTeX) @inproceedings{proc-in-peters_arestor_2022,
title = {ARESTOR: A Multi-role RF Sensor based on the Xilinx RFSoC},
author = {Nial Peters and Colin Horne and Matthew Ritchie},
year = {2022},
date = {2022-04-05},
booktitle = {18th European Radar Conference (EuRAD 2021)},
abstract = {In this paper we present ARESTOR, a multi-role RF sensor based on a Xilinx RFSoC device. The system is capable of operating as an active radar, passive radar and wideband Electronic Surveillance (ES) receiver. The system design, and development framework used to enable these modes of operation is summarised. Preliminary results from each of the sensing modes are presented demonstrating what is possible from each mode. Furthermore, a strategy for synchronising multiple RFSoC devices is explored and bistatic active radar measurements using two synchronised RFSoCs shown.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
6. Bâce, Mihai; Saad, Alia; Khamis, Mohamed; Schneegass, Stefan; Bulling, Andreas: PrivacyScout: Assessing Vulnerability toShoulder Surfing on Mobile Devices. In: Proceedings on Privacy Enhancing Technologies, 2022, ISBN: 2299-0984. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-bace_privacyscout_2022,
title = {PrivacyScout: Assessing Vulnerability toShoulder Surfing on Mobile Devices},
author = {Mihai B\^{a}ce and Alia Saad and Mohamed Khamis and Stefan Schneegass and Andreas Bulling},
doi = {10.2478/popets-2022-0090},
isbn = {2299-0984},
year = {2022},
date = {2022-03-16},
booktitle = {Proceedings on Privacy Enhancing Technologies},
abstract = {One approach to mitigate shoulder surfing attacks on mobile devices is to detect the presence of a bystander using the phone's front-facing camera. However, a person's face in the camera's field of view does not always indicate an attack. To overcome this limitation, in a novel data collection study (N=16), we analysed the influence of three viewing angles and four distances on the success of shoulder surfing attacks. In contrast to prior works that mainly focused on user authentication, we investigated three common types of content susceptible to shoulder surfing: text, photos, and PIN authentications. We show that the vulnerability of text and photos depends on the observer's location relative to the device, while PIN authentications are vulnerable independent of the observation location. We then present PrivacyScout - a novel method that predicts the
shoulder-surfing risk based on visual features extracted from the observer's face as captured by the front-facing camera. Finally, evaluations from our data collection study demonstrate our method's feasibility to assess the risk of a shoulder surfing attack more accurately.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
shoulder-surfing risk based on visual features extracted from the observer's face as captured by the front-facing camera. Finally, evaluations from our data collection study demonstrate our method's feasibility to assess the risk of a shoulder surfing attack more accurately.7. Junejo, Aisha Kanwal; Benkhelifa, Fatma; Wong, Boon; Mccann, Julie A.: LoRa-LiSK: A Lightweight Shared Secret Key Generation Scheme for LoRa Networks. In: vol. 9, no. 6, pp. 4110–4124, 2022. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-junejo_lora_2022,
title = {LoRa-LiSK: A Lightweight Shared Secret Key Generation Scheme for LoRa Networks},
author = {Aisha Kanwal Junejo and Fatma Benkhelifa and Boon Wong and Julie A. Mccann},
doi = {10.1109/jiot.2021.3103009},
year = {2022},
date = {2022-03-15},
volume = {9},
number = {6},
pages = {4110--4124},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Physical-layer security (PLS) schemes use the randomness of the channel parameters, namely, channel state information (CSI) and received signal strength indicator (RSSI) to generate the secret keys. There has been limited work in PLS schemes in long-range (LoRa) wide-area networks (LoRaWANs) which hinder their widespread application. Limitations observed in existing studies include the requirement of high correlation between channel parameter measurements for secret key generation in the proposed schemes and the evaluation of the schemes has only been done in either fully indoor or outdoor environments. The real-world wireless sensor networks (WSNs) and LoRa use cases might not meet both requirements thus making the current PLS schemes inappropriate for these systems. By considering the limitations found in existing PLS schemes, this article proposes LoRA-LiSK, a practical and efficient shared secret key generation scheme for LoRa networks. Our proposed LoRa-LiSK scheme consists of several preprocessing techniques (timestamp matching, two sample Kolmogorov-Smirnov tests, and a Savitzky-Golay filter), multilevel quantization, information reconciliation using Bose-Chaudhuri-Hocquenghem (BCH) codes, and finally, privacy amplification using secure hash algorithm SHA-2. The LoRa-LiSK scheme is extensively evaluated on real WSN/IoT devices in practical application scenarios: 1) indoor to outdoor and 2) LoRa static and mobile outdoor links. It outperforms existing schemes by generating keys with channel parameter measurements of low correlation values (0.2-0.6), while still essentially achieving high key generation rates, and low key disagreement rates (10%-20%). The scheme updates a key in approximately 1 h using an application profile with high transmission rate compared to 3 h reported by existing works while still respecting the duty cycle regulation. It also incurs less communication overhead compared to the existing works.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
8. Mathis, Florian; Vaniea, Kami; Khamis, Mohamed: Can I Borrow Your ATM? Using Virtual Reality for (Simulated) In Situ Authentication Research. In: 2022 IEEE Conference on Virtual Reality and 3D User Interfaces (VR), pp. 301-310, IEEE, 2022, ISBN: 978-1-6654-9617-9. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-mathis_can_2022,
title = {Can I Borrow Your ATM? Using Virtual Reality for (Simulated) In Situ Authentication Research},
author = {Florian Mathis and Kami Vaniea and Mohamed Khamis},
doi = {10.1109/vr51125.2022.00049},
isbn = {978-1-6654-9617-9},
year = {2022},
date = {2022-03-12},
booktitle = {2022 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)},
pages = {301-310},
publisher = {IEEE},
abstract = {In situ evaluations of novel authentication systems, where the system is evaluated in its intended usage context, are often infeasible due to ethical and legal constraints. Consequently, researchers evaluate their authentication systems in the lab, which questions the eco-logical validity. In this work, we explore how VR can overcome the shortcomings of authentication studies conducted in the lab and contribute towards more realistic authentication research. We built a highly realistic automated teller machine (ATM) and a VR replica to investigate through a user study (N=20) the impact of in situ evaluations on an authentication system's usability results. We evaluated and compared: Lab studies in the real world, lab studies in VR, in situ studies in the real world, and in situ studies in VR. Our findings highlight 1) VR's great potential to circumvent potential restrictions researchers experience when evaluating authentication schemes and 2) the impact of the context on an authentication system's usability evaluation results. In situ ATM authentications took longer (+24.71% in the real world, +14.17% in VR) than authentications in a traditional (VR) lab environment and elicited a higher sense of being part of an ATM authentication scenario compared to a real-world and VR-based evaluation in the lab. Our quantitative findings, along with participants' qualitative feedback, provide first evidence of increased authentication realism when using VR for in situ authentication research. We provide researchers with a novel research approach to conduct (simulated) in situ authentication re-search, discuss our findings in the light of prior works, and conclude with three key lessons to support researchers in deciding when to use VR for in situ authentication research.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
9. Jones, Bronwyn; Luger, Ewa A.: AI and Journalism. 2022. (Type: report | Abstract | Links | BibTeX) @report{jones_ai_2022,
title = {AI and Journalism},
author = {Bronwyn Jones and Ewa A. Luger},
url = {https://petras-iot.org/wp-content/uploads/2021/09/Download-the-full-AI-Journalism-Briefing-Notes-document-here.pdf},
year = {2022},
date = {2022-03-04},
institution = {PETRAS National Centre of Excellence for IoT Systems Cybersecurity},
abstract = {This briefing note gives an overview of artificial intelligence (AI) in journalism and focuses on application of AI in the news production process. It summarises the benefits gained and future opportunities identified alongside the issues observed and potential risks posed by AI in journalism. It considers the challenges to responsible, ethical and value-aligned adoption of AI by news organisations, including issues related to laws, regulations, professional norms and values and societal expectations},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
10. Kollnig, Konrad; Shuba, Anastasia; Binns, Reuben Daniel; Kleek, Max Goodwin Van; Shadbolt, Nigel R.: Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android Apps. In: vol. 2022, no. 2, pp. 6–24, 2022. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-kollnig_are_2022,
title = {Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android Apps},
author = {Konrad Kollnig and Anastasia Shuba and Reuben Daniel Binns and Max Goodwin Van Kleek and Nigel R. Shadbolt},
doi = {10.2478/popets-2022-0033},
year = {2022},
date = {2022-03-03},
volume = {2022},
number = {2},
pages = {6--24},
publisher = {Walter de Gruyter GmbH},
abstract = {While many studies have looked at privacyproperties of the Android and Google Play app ecosys-tem, comparatively much less is known about iOS andthe Apple App Store, the most widely used ecosystem inthe US. At the same time, there is increasing competi-tion around privacy between these smartphone operat-ing system providers. In this paper, we present a studyof 24k Android and iOS apps from 2020 along severaldimensions relating to user privacy. We find that third-party tracking and the sharing of unique user identifierswas widespread in apps from both ecosystems, even inapps aimed at children. In the children's category, iOSapps tended to use fewer advertising-related trackingthan their Android counterparts, but could more of-ten access children's location. Across all studied apps,our study highlights widespread potential violations ofUS, EU and UK privacy law, including 1) the use ofthird-party tracking without user consent, 2) the lackof parental consent before sharing personally identifi-able information (PII) with third-parties in children's apps, 3) the non-data-minimising configuration of track-ing libraries, 4) the sending of personal data to countrieswithout an adequate level of data protection, and 5)the continued absence of transparency around tracking,partly due to design decisions by Apple and Google.Overall, we find that neither platform is clearly bet-ter than the other for privacy across the dimensions westudied.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
11. Michalec, Ola: How to Talk about Cybersecurity of Emerging Technologies. 2022. (Type: report | Abstract | Links | BibTeX) @report{michalec_how_2022,
title = {How to Talk about Cybersecurity of Emerging Technologies},
author = {Ola Michalec},
url = {https://petras-iot.org/wp-content/uploads/2022/03/How-to-talk-about-cybersecurity-of-emerging-technologies.pdf},
year = {2022},
date = {2022-03-01},
institution = {PETRAS National Centre of Excellence for IoT Systems Cybersecurity},
abstract = {Reaching the Net Zero target is undoubtedly the biggest challenge facing the modern society. With over 76% of energy consumed in the UK originating from fossil fuels according to the Department for Business, Energy and Industrial Strategy (2021), the energy sector has a key role to play. Collectively, we need to build new capacity as well as upgrade the existing infrastructure to meet the challenge. This will be complemented by a step-change in culture: enabled by novel pricing mechanisms, a shift in social norms, or the rise of prosumption.
If adopted successfully, the advances in digital technologies will be fundamental for meeting the emission targets. From R\&D work on flexible storage and distribution of energy, through more efficient tariffs informed by smart meter analytics, to, real-time demand side response thanks to smart household appliances, each of these innovations brings a promise of novel efficiencies and insights.
However, this ongoing digital transformation proclaims the introduction of new actors, products, start-ups, and even business models. The landscape is becoming ever so complex which creates challenges for effective collaboration. If professionals across the domains like IT, engineering, energy markets, sustainability and business operations cannot find the common ground, we risk overlooking our main objectives: the delivery of sustainable, affordable, resilient, and secure energy supply to the UK residents.
Numerous standardisation and regulatory initiatives are currently being developed to support the digital transformation of the energy sector: from Ofgem's Digitalisation Strategy, Smart Appliances PAS Standard, to the Network and information Systems Security (NIS) Regulations. Finalising assurance schemes and policy enforcement will take time. In the meantime, we still need to uphold the interoperability, safety, reliability, and cybersecurity of energy systems. This is crucial for digitalisation agenda gaining widespread public support - or even - public enthusiasm. As such, we cannot take the success of digital transformation for granted. While no one can predict the future, we can still be its active co-creators},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
If adopted successfully, the advances in digital technologies will be fundamental for meeting the emission targets. From R&D work on flexible storage and distribution of energy, through more efficient tariffs informed by smart meter analytics, to, real-time demand side response thanks to smart household appliances, each of these innovations brings a promise of novel efficiencies and insights.
However, this ongoing digital transformation proclaims the introduction of new actors, products, start-ups, and even business models. The landscape is becoming ever so complex which creates challenges for effective collaboration. If professionals across the domains like IT, engineering, energy markets, sustainability and business operations cannot find the common ground, we risk overlooking our main objectives: the delivery of sustainable, affordable, resilient, and secure energy supply to the UK residents.
Numerous standardisation and regulatory initiatives are currently being developed to support the digital transformation of the energy sector: from Ofgem's Digitalisation Strategy, Smart Appliances PAS Standard, to the Network and information Systems Security (NIS) Regulations. Finalising assurance schemes and policy enforcement will take time. In the meantime, we still need to uphold the interoperability, safety, reliability, and cybersecurity of energy systems. This is crucial for digitalisation agenda gaining widespread public support - or even - public enthusiasm. As such, we cannot take the success of digital transformation for granted. While no one can predict the future, we can still be its active co-creators12. Bueff, Andreas; Papantonis, Ioannis; Simkute, Auste; Belle, Vaishak: Explainability in Machine Learning: a Pedagogical Perspective. In: 2022. (Type: Journal Article | Abstract | BibTeX) @article{art-bueff_explainability_2022,
title = {Explainability in Machine Learning: a Pedagogical Perspective},
author = {Andreas Bueff and Ioannis Papantonis and Auste Simkute and Vaishak Belle},
year = {2022},
date = {2022-02-21},
abstract = {Given the importance of integrating of explainability into machine learning, at present, there are a lack of pedagogical resources exploring this. Specifically, we have found a need for resources in explaining how one can teach the advantages of explainability in machine learning. Often pedagogical approaches in the field of machine learning focus on getting students prepared to apply various models in the real world setting, but much less attention is given to teaching students the various techniques one could employ to explain a model's decision-making process. Furthermore, explainability can benefit from a narrative structure that aids one in understanding which techniques are governed by which questions about the data. We provide a pedagogical perspective on how to structure the learning process to better impart knowledge to students and researchers in machine learning, when and how to implement various explainability techniques as well as how to interpret the results. We discuss a system of teaching explainability in machine learning, by exploring the advantages and disadvantages of various opaque and transparent machine learning models, as well as when to utilize specific explainability techniques and the various frameworks used to structure the tools for explainability. Among discussing concrete assignments, we will also discuss ways to structure potential assignments to best help students learn to use explainability as a tool alongside any given machine learning application. Data science professionals completing the course will have a birds-eye view of a rapidly developing area and will be confident to deploy machine learning more widely. A preliminary analysis on the effectiveness of a recently delivered course following the structure presented here is included as evidence supporting our pedagogical approach.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
13. Padmasiri, Heshan; Shashirangana, Jithmi; Meedeniya, Dulani; Rana, Omer; Perera, Charith: Automated License Plate Recognition for Resource-Constrained Environments. In: vol. 22, no. 4, pp. 1434, 2022, ISSN: 1424-8220. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-padmasiri_automated_2022,
title = {Automated License Plate Recognition for Resource-Constrained Environments},
author = {Heshan Padmasiri and Jithmi Shashirangana and Dulani Meedeniya and Omer Rana and Charith Perera},
doi = {10.3390/s22041434},
issn = {1424-8220},
year = {2022},
date = {2022-02-11},
volume = {22},
number = {4},
pages = {1434},
publisher = {MDPI AG},
abstract = {The incorporation of deep-learning techniques in embedded systems has enhanced the capabilities of edge computing to a great extent. However, most of these solutions rely on high-end hardware and often require a high processing capacity, which cannot be achieved with resource-constrained edge computing. This study presents a novel approach and a proof of concept for a hardware-efficient automated license plate recognition system for a constrained environment with limited resources. The proposed solution is purely implemented for low-resource edge devices and performed well for extreme illumination changes such as day and nighttime. The generalisability of the proposed models has been achieved using a novel set of neural networks for different hardware configurations based on the computational capabilities and low cost. The accuracy, energy efficiency, communication, and computational latency of the proposed models are validated using different license plate datasets in the daytime and nighttime and in real time. Meanwhile, the results obtained from the proposed study have shown competitive performance to the state-of-the-art server-grade hardware solutions as well.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
14. Adoga, Haruna Umar; Pezaros, Dimitrios P.: Network Function Virtualization and Service Function Chaining Frameworks: A Comprehensive Review of Requirements, Objectives, Implementations, and Open Research Challenges. In: vol. 14, no. 2, pp. 59, 2022. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-adoga_network_2022,
title = {Network Function Virtualization and Service Function Chaining Frameworks: A Comprehensive Review of Requirements, Objectives, Implementations, and Open Research Challenges},
author = {Haruna Umar Adoga and Dimitrios P. Pezaros},
doi = {10.3390/fi14020059},
year = {2022},
date = {2022-02-03},
volume = {14},
number = {2},
pages = {59},
publisher = {MDPI AG},
abstract = {Network slicing has become a fundamental property for next-generation networks, especially because an inherent part of 5G standardisation is the ability for service providers to migrate some or all of their network services to a virtual network infrastructure, thereby reducing both capital and operational costs. With network function virtualisation (NFV), network functions (NFs) such as firewalls, traffic load balancers, content filters, and intrusion detection systems (IDS) are either instantiated on virtual machines (VMs) or lightweight containers, often chained together to create a service function chain (SFC). In this work, we review the state-of-the-art NFV and SFC implementation frameworks and present a taxonomy of the current proposals. Our taxonomy comprises three major categories based on the primary objectives of each of the surveyed frameworks: (1) resource allocation and service orchestration, (2) performance tuning, and (3) resilience and fault recovery. We also identify some key open research challenges that require further exploration by the research community to achieve scalable, resilient, and high-performance NFV/SFC deployments in next-generation networks.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
15. Ani, Uchenna P. Daniel; Watson, Jeremy Daniel McKendrick; Tuptuk, Nilufer; Hailes, Stephen; Carr, Madeline; Maple, Carsten: Improving the Cybersecurity of Critical National Infrastructure using Modelling and Simulation. 2022. (Type: report | Abstract | Links | BibTeX) @report{ani_improving_2022,
title = {Improving the Cybersecurity of Critical National Infrastructure using Modelling and Simulation},
author = {Uchenna P. Daniel Ani and Jeremy Daniel McKendrick Watson and Nilufer Tuptuk and Stephen Hailes and Madeline Carr and Carsten Maple},
url = {https://petras-iot.org/wp-content/uploads/2022/02/Short-3-page-Policy-Briefing-here.pdf},
year = {2022},
date = {2022-02-01},
institution = {PETRAS National Centre of Excellence for IoT Systems Cybersecurity},
abstract = {This briefing note aims to improve cybersecurity by raising awareness of the importance of adopting cybersecurity modelling and simulation techniques in Critical National Infrastructure (CNI) that embody ntegrated socio-technical factors. It is based on research and synthesis following a state-of-the-art literature survey and engagement workshop with critical infrastructure stakeholders hosted by the Department for Transport (DfT) in February 2019 and a deskbased study in the ongoing (2020-2022) PETRAS Modelling for Socio-technical Security (MASS) project. Participants from academia, business and industrial sectors, and government came together to discuss the effectiveness of modelling and simulation to support the protection of modern critical infrastructure systems. The discussion also covered how government effort can support the National Cyber Security Strategy 2016-2021, and beyond. Though the focus of the initial workshop was the transport sector, the recommendations made can be applied to other CNI sectors such as Energy, Water, Defence, Chemicals, and Food},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
16. Kollnig, Konrad; Binns, Reuben Daniel; Kleek, Max Goodwin Van; Lyngs, Ulrik; Zhao, Jun; Tinsman, Claudine; Shadbolt, Nigel R.: Before and after GDPR: tracking in mobile apps. In: vol. 10, no. 4, 2021. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-kollnig_after_2021,
title = {Before and after GDPR: tracking in mobile apps},
author = {Konrad Kollnig and Reuben Daniel Binns and Max Goodwin Van Kleek and Ulrik Lyngs and Jun Zhao and Claudine Tinsman and Nigel R. Shadbolt},
doi = {10.14763/2021.4.1611},
year = {2021},
date = {2021-12-21},
volume = {10},
number = {4},
publisher = {Internet Policy Review, Alexander von Humboldt Institute for Internet and Society},
abstract = {Third-party tracking, the collection and sharing of behavioural data about individuals, is a significant and ubiquitous privacy threat in mobile apps. The EU General Data Protection Regulation (GDPR) was introduced in 2018 to protect personal data better, but there exists, thus far, limited empirical evidence about its efficacy. This paper studies tracking in nearly two million Android apps from before and after the introduction of the GDPR. Our analysis suggests that there has been limited change in the presence of third-party tracking in apps, and that the concentration of tracking capabilities among a few large gatekeeper companies persists. However, change might be imminent.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
17. Archibald, Blair; Calder, Muffy; Sevegnani, Michele; Xu, Mengwei: Probabilistic BDI Agents: Actions, Plans, and~Intentions. In: Software Engineering and Formal Methods, pp. 262–281, Springer International Publishing, 2021. (Type: Book Section | Abstract | Links | BibTeX | Altmetric) @incollection{col-in-archibald_probabilistic_2021,
title = {Probabilistic BDI Agents: Actions, Plans, and~Intentions},
author = {Blair Archibald and Muffy Calder and Michele Sevegnani and Mengwei Xu},
doi = {10.1007/978-3-030-92124-8_15},
year = {2021},
date = {2021-12-03},
booktitle = {Software Engineering and Formal Methods},
pages = {262--281},
publisher = {Springer International Publishing},
abstract = {The Belief-Desire-Intention (BDI) architecture is a popular framework for rational agents, yet most verification approaches are limited to analysing qualitative properties, for example whether an intention completes. BDI-based systems, however, operate in uncertain environments with dynamic behaviours: we may need quantitative analysis to establish properties such as the probability of eventually completing an intention. We define a probabilistic extension to the Conceptual Agent Notation (CAN) for BDI agents that supports probabilistic action outcomes, and probabilistic plan and intention selection. The semantics is executable via an encoding in Milner's bigraphs and the BigraphER tool. Quantitative analysis is conducted using PRISM. While the new semantics can be applied to any CAN program, we demonstrate the extension by comparing with standard plan and intention selection strategies (e.g. ordered or fixed schedules) and evaluating probabilistic action executions in a smart manufacturing scenario. The results show we can improve significantly the probability of intention completion, with appropriate probabilistic distribution. We also show the impact of probabilistic action outcomes can be marginal, even when the failure probabilities are large, due to the agent making smarter intention selection choices.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
18. Archibald, Blair; Kulcsár, Géza; Sevegnani, Michele: A tale of two graph models: a case study in wireless sensor networks. In: vol. 33, no. 6, pp. 1249–1277, 2021. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-archibald_tale_2021,
title = {A tale of two graph models: a case study in wireless sensor networks},
author = {Blair Archibald and G\'{e}za Kulcs\'{a}r and Michele Sevegnani},
doi = {10.1007/s00165-021-00558-z},
year = {2021},
date = {2021-12-01},
volume = {33},
number = {6},
pages = {1249--1277},
publisher = {Association for Computing Machinery (ACM)},
abstract = {Designing and reasoning about complex systems such as wireless sensor networks is hard due to highly dynamic environments: sensors are heterogeneous, battery-powered, and mobile. While formal modelling can provide rigorous mechanisms for design/reasoning, they are often viewed as difficult to use. Graph rewrite-based modelling techniques increase usability by providing an intuitive, flexible, and diagrammatic form of modelling in which graph-like structures express relationships between entities while rewriting mechanisms allow model evolution. Two major graph-based formalisms are Graph Transformation Systems (GTS) and Bigraphical Reactive Systems (BRS). While both use similar underlying structures, how they are employed in modelling is quite different. To gain a deeper understanding of GTS and BRS, and to guide future modelling, theory, and tool development, in this experience report we compare the practical modelling abilities and style of GTS and BRS when applied to topology control in WSNs. To show the value of the models, we describe how analysis may be performed in both formalisms. A comparison of the approaches shows that although the two formalisms are different, from both a theoretical and practical modelling standpoint, they are each successful in modelling topology control in WSNs. We found that GTS, while featuring a small set of entities and transformation rules, relied on entity attributes, rule application based on attribute/variable side-conditions, and imperative control flow units. BRS on the other hand, required a larger number of entities in order to both encode attributes directly in the model (via nesting) and provide tagging functionality that, when coupled with rule priorities, implements control flow. There remains promising research mapping techniques between the formalisms to further enable flexible and expressive modelling.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
19. Bhatia, Laksh; Chen, Po-Yu; Breza, Michael; Zhao, Cong; McCann, Julie A.: IRONWAN: Increasing Reliability of Overlapping Networks in LoRaWAN. In: pp. 1–1, 2021. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-bhatia_ironwan_2021,
title = {IRONWAN: Increasing Reliability of Overlapping Networks in LoRaWAN},
author = {Laksh Bhatia and Po-Yu Chen and Michael Breza and Cong Zhao and Julie A. McCann},
doi = {10.1109/jiot.2021.3125842},
year = {2021},
date = {2021-11-13},
pages = {1--1},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {LoRaWAN deployments follow an ad-hoc deployment model that has organically led to overlapping communication networks, sharing the wireless spectrum, and completely unaware of each other. LoRaWAN uses ALOHA-style communication where it is almost impossible to schedule transmission between networks belonging to different owners properly. The inability to schedule overlapping networks will cause inter-network interference, which will increase node-to-gateway message losses and gateway-to-node acknowledgement failures. This problem is likely to get worse as the number of LoRaWAN networks increase. In response to this problem, we propose IRONWAN, a wireless overlay network that shares communication resources without modifications to underlying protocols. It utilises the broadcast nature of radio communication and enables gateway-to-gateway communication to facilitate the search for failed messages and transmit failed acknowledgements already received and cached in overlapping network's gateways. IRONWAN uses two novel algorithms, a Real-time Message Inter-arrival Predictor, to highlight when a server has not received an expected uplink message. The Interference Predictor ensures that extra gateway-to-gateway communication does not negatively impact communication bandwidth. We evaluate IRONWAN on a 1000-node simulator with up to ten gateways and a 10-node testbed with 2-gateways. Results show that IRONWAN can achieve up to 12% higher packet delivery ratio (PDR) and total messages received per node while increasing the minimum PDR by up to 28%. These improvements save up to 50% node's energy. Finally, we demonstrate that IRONWAN has comparable performance to an optimal solution (wired, centralised) but with 2-32 times lower communication costs. IRONWAN also has up to 14% better PDR when compared to FLIP, a wired-distributed gateway-to-gateway protocol in certain scenarios.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
20. Archibald, Blair; Calder, Muffy; Sevegnani, Michele; Xu, Mengwei: Observable and Attention-Directing BDI Agents for Human-Autonomy Teaming. In: vol. 348, pp. 167–175, 2021. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-archibald_observable_2021,
title = {Observable and Attention-Directing BDI Agents for Human-Autonomy Teaming},
author = {Blair Archibald and Muffy Calder and Michele Sevegnani and Mengwei Xu},
doi = {10.4204/eptcs.348.12},
year = {2021},
date = {2021-10-25},
volume = {348},
pages = {167--175},
publisher = {Open Publishing Association},
abstract = {Human-autonomy teaming (HAT) scenarios feature humans and autonomous agents collaborating to meet a shared goal. For effective collaboration, the agents must be transparent and able to share important information about their operation with human teammates. We address the challenge of transparency for Belief-Desire-Intention agents defined in the Conceptual Agent Notation (CAN) language. We extend the semantics to model agents that are observable (i.e. the internal state of tasks is available), and attention-directing (i.e. specific states can be flagged to users), and provide an executable semantics via an encoding in Milner's bigraphs. Using an example of unmanned aerial vehicles, the BigraphER tool, and PRISM, we show and verify how the extensions work in practice.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
21. Chatting, David J.; Taylor, Nick; Rogers, Jon: Design for Reappearance in Smart Technologies. In: CSCW 2021 --- Designing for Data Awareness: Addressing Privacy and Security Concerns About ``Smart'' Technologies, 2021. (Type: Proceedings Article | Abstract | BibTeX) @inproceedings{proc-in-chatting_design_2021,
title = {Design for Reappearance in Smart Technologies},
author = {David J. Chatting and Nick Taylor and Jon Rogers},
year = {2021},
date = {2021-10-23},
booktitle = {CSCW 2021 --- Designing for Data Awareness: Addressing Privacy and Security Concerns About ``Smart'' Technologies},
abstract = {This short position paper outlines the REAPPEAR project, which seeks to prototype new metaphors and design patterns for smart devices allowing users to make informed decisions about privacy and security. As computers have increasingly ``disappeared'' and with it our awareness of their intent, we will ask instead how the computer might ``reappear'' in our interactions with IoT at three scales of interest: the body, the home, and the city. This is pursued through design research with the intention of producing reusable design patterns for designers and developers},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
22. Archibald, Blair; Burns, Kyle; McCreesh, Ciaran; Sevegnani, Michele: Practical Bigraphs via Subgraph Isomorphism. In: Michel, Laurent D. (Ed.): 27th International Conference on Principles and Practice of Constraint Programming (CP 2021), pp. 15:1–15:17, Schloss Dagstuhl -- Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 2021, ISSN: 1868-8969. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-archibald_practical_2021,
title = {Practical Bigraphs via Subgraph Isomorphism},
author = {Blair Archibald and Kyle Burns and Ciaran McCreesh and Michele Sevegnani},
editor = {Laurent D. Michel},
url = {https://drops.dagstuhl.de/opus/volltexte/2021/15306},
doi = {10.4230/LIPIcs.CP.2021.15},
issn = {1868-8969},
year = {2021},
date = {2021-10-15},
booktitle = {27th International Conference on Principles and Practice of Constraint Programming (CP 2021)},
volume = {210},
pages = {15:1--15:17},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f\"{u}r Informatik},
address = {Dagstuhl, Germany},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
abstract = {Bigraphs simultaneously model the spatial and non-spatial relationships between entities, and have been used for systems modelling in areas including biology, networking, and sensors. Temporal evolution can be modelled through a rewriting system, driven by a matching algorithm that identifies instances of bigraphs to be rewritten. The previous state-of-the-art matching algorithm for bigraphs with sharing is based on Boolean satisfiability (SAT), and suffers from a large encoding that limits scalability and makes it hard to support extensions. This work instead adapts a subgraph isomorphism solver that is based upon constraint programming to solve the bigraph matching problem. This approach continues to support bigraphs with sharing, is more open to other extensions and side constraints, and improves performance by over two orders of magnitude on a range of problem instances drawn from real-world mixed-reality, protocol, and conference models.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
23. Al-Nakib, Hazem Danny; Goodell, Geoffrey: Can Digital Money Replace Cash? Central Banks Are Charging Ahead. In: 2021. (Type: Journal Article | Abstract | Links | BibTeX) @article{art-al-nakib_can_2021,
title = {Can Digital Money Replace Cash? Central Banks Are Charging Ahead},
author = {Hazem Danny Al-Nakib and Geoffrey Goodell},
url = {https://www.barrons.com/articles/can-digital-money-replace-cash-central-banks-are-charging-ahead-51634242362},
year = {2021},
date = {2021-10-15},
abstract = {As governments around the world redesign the financial sector with new infrastructure and digital money, it is time to reconsider what matters. Moves by central banks to issue new digital currencies need to be scrutinized for how they affect people's rights, such as privacy, choice, and access to the economy.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
24. Radanliev, Petar; Roure, David De; Maple, Carsten; Ani, Uchenna: Methodology for Integrating Artificial Intelligence in Healthcare Systems: Learning from COVID-19 to Prepare for Disease X. In: 2021. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-radanliev_methodology_2021,
title = {Methodology for Integrating Artificial Intelligence in Healthcare Systems: Learning from COVID-19 to Prepare for Disease X},
author = {Petar Radanliev and David De Roure and Carsten Maple and Uchenna Ani},
doi = {10.1007/s43681-021-00111-x},
year = {2021},
date = {2021-10-06},
publisher = {Springer Science and Business Media LLC},
abstract = {Artificial intelligence and edge devices have been used at an increased rate in managing the COVID-19 pandemic. In this article we review the lessons learned from COVID-19 to postulate possible solutions for a Disease X event. The overall purpose of the study and the research problems investigated is the integration of artificial intelligence function in digital healthcare systems. The basic design of the study includes a systematic state-of-the-art review, followed by an evaluation of different approaches to managing global pandemics. The study design then engages with constructing a new methodology for integrating algorithms in healthcare systems, followed by analysis of the new methodology and a discussion. Action research is applied to review existing state of the art, and a qualitative case study method is used to analyse the knowledge acquired from the COVID-19 pandemic. Major trends found as a result of the study derive from the synthesis of COVID-19 knowledge, presenting new insights in the form of a conceptual methodology\textemdashthat includes six phases for managing a future Disease X event, resulting with a summary map of various problems, solutions and expected results from integrating functional AI in healthcare systems.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
25. Simkute, Auste; Luger, Ewa A.; Jones, Bronwyn; Evans, Michael; Jones, Rhianne: Explainability for experts: A design framework for making algorithms supporting expert decisions more explainable. In: vol. 7-8, pp. 100017, 2021. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-simkute_explainability_2021,
title = {Explainability for experts: A design framework for making algorithms supporting expert decisions more explainable},
author = {Auste Simkute and Ewa A. Luger and Bronwyn Jones and Michael Evans and Rhianne Jones},
doi = {10.1016/j.jrt.2021.100017},
year = {2021},
date = {2021-10-01},
volume = {7-8},
pages = {100017},
publisher = {Elsevier BV},
abstract = {Algorithmic decision support systems are widely applied in domains ranging from healthcare to journalism. To ensure that these systems are fair and accountable, it is essential that humans can maintain meaningful agency, understand and oversee algorithmic processes. Explainability is often seen as a promising mechanism for enabling human-in-the-loop, however, current approaches are ineffective and can lead to various biases. We argue that explainability should be tailored to support naturalistic decision-making and sensemaking strategies employed by domain experts and novices. Based on cognitive psychology and human factors literature review we map potential decision-making strategies dependant on expertise, risk and time dynamics and propose the conceptual Expertise, Risk and Time Explainability framework, intended to be used as explainability design guidelines. Finally, we present a worked example in journalism to illustrate the applicability of our framework in practice.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
26. Burton, Saheli Datta; Carr, Madeline: Why Consumer IoT Security Standards Should Be Legislated: The Case of Fitness or Wellness Devices. 25th EURAS Annual Standardisation Conference- Standardisation and Innovation & 11th International Conference onStandardisation and Innovation in Information Technology (SIIT)- The Past, Present and FUTURE of ICT Standardisation, 2021. (Type: Conference | Links | BibTeX) @conference{conf-burton_why_2021,
title = {Why Consumer IoT Security Standards Should Be Legislated: The Case of Fitness or Wellness Devices},
author = {Saheli Datta Burton and Madeline Carr},
url = {https://www.euras.org/img/upload/pdf/EURAS_SIIT_Online_Advance_Programme_v2.pdf},
year = {2021},
date = {2021-09-06},
booktitle = {25th EURAS Annual Standardisation Conference- Standardisation and Innovation \& 11th International Conference onStandardisation and Innovation in Information Technology (SIIT)- The Past, Present and FUTURE of ICT Standardisation},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
27. Radanliev, Petar; Roure, David Charles De: Alternative Mental Health Therapies in Prolonged Lockdowns: Narratives from Covid-19. In: vol. 11, 2021. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-radanliev_alternative_2021,
title = {Alternative Mental Health Therapies in Prolonged Lockdowns: Narratives from Covid-19},
author = {Petar Radanliev and David Charles De Roure},
doi = {10.1007/s12553-021-00581-3},
year = {2021},
date = {2021-08-07},
volume = {11},
abstract = {Identify and review alternative (home-based) therapies for prolonged lockdowns. Interdisciplinary study using multi-method approach - case study, action research, grounded theory. Only secondary data has been used in this study. Epistemological framework based on a set of digital humanities tools. The set of tools are based on publicly available, open access technological solutions, enabling generalisability of the findings. Alternative therapies can be integrated in healthcare systems as home-based solutions operating on low-cost technologies.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
28. Radanliev, Petar; Roure, David Charles De: Review of Algorithms for Artificial Intelligence on Low Memory Devices. In: vol. 9, pp. 109986–109993, 2021. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-radanliev_review_2021,
title = {Review of Algorithms for Artificial Intelligence on Low Memory Devices},
author = {Petar Radanliev and David Charles De Roure},
doi = {10.1109/access.2021.3101579},
year = {2021},
date = {2021-08-02},
volume = {9},
pages = {109986--109993},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {The aim of the article is to conceptualise a more compact and efficient version of algorithms for artificial intelligence (AI). The core objective is to construct the design for a self-optimising and self-adapting autonomous artificial intelligence (AutoAI) that can be applied for edge analytics using real-time data. The methodology is based on synthesising existing knowledge on AI (i.e., knowledge modelling, symbolic reasoning, modal logic), with novel concepts from neuromorphic engineering in combination with deep learning algorithms (i.e., reinforcement learning, neural networks, evolutionary algorithms) and data science (i.e., statistics, linear regression, Bayesian methods). Far-reaching implications are expected from the unique integration of approaches in neuromorphic engineering and edge analytics.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
29. Radanliev, Petar; Roure, David Charles De: Epistemological and Bibliometric Analysis of Ethics and Shared Responsibility-Health Policy and IoT Systems. In: vol. 13, no. 15, 2021. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-radanliev_epistemological_2021a,
title = {Epistemological and Bibliometric Analysis of Ethics and Shared Responsibility-Health Policy and IoT Systems},
author = {Petar Radanliev and David Charles De Roure},
doi = {10.3390/su13158355},
year = {2021},
date = {2021-07-26},
volume = {13},
number = {15},
abstract = {The focus in this paper is placed on shared responsibility and ethics in health policy, specific to Internet of Things (IoT) devices in healthcare systems. The article assesses how the introduction of IoT brings risks to the security of medical systems. The justification for this research emerges from the opportunities emerging from digital technologies for medical services, but also creating a range of new cyber risks in the shared healthcare infrastructure. Such concerns are often not visible to individual departments in an integrated healthcare system. In addition, many healthcare organisations do not possess cyber skills and are faced with barriers to the adoption of smart manufacturing technologies, e.g., cost. These barriers trigger ethical concerns related to responsibility of cyber risks in shared healthcare systems.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
30. Piazza, A.; Vasudevan, Srinidhi: Do you influence me? Evidence from a case study of network ties among university students in Pisa.. In: 2021. (Type: Journal Article | Abstract | BibTeX) @article{art-piazza_do_2021,
title = {Do you influence me? Evidence from a case study of network ties among university students in Pisa.},
author = {A. Piazza and Srinidhi Vasudevan},
year = {2021},
date = {2021-07-12},
abstract = {Social influence occurs when the behavior of an individual is affected by an outside force, such as other individuals. While there is growing literature on influence flows in primary and secondary school, little is known about how influence process occurs in the university. We propose taking advantage on a representative sample of advice-seeking networks at university level to assess social patterns of how individual and socio-economic characteristics influence students. We formulate and test our approach using data on cohort of students enrolled at the same master's course at an Italian University and analyse the network of interactions as potential influence conduits for their academic outcomes. By using the network autocorrelation model, we find that network interactions are a significant indicator for the outcomes. We also explore the effect of the built environment on encouraging social interactions among students and consequently their outcomes. Our results provide empirical evidence on the ongoing influence operating through a system of advice relations that explains academic outcomes in educational fields.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
31. Lakoju, Mike; Ajienka, Nemitari; Khanesar, M. Ahmadieh; Burnap, Peter; Branson, David T.: Unsupervised Learning for Product Use Activity Recognition: An Exploratory Study of a ``Chatty Device''. In: vol. 21, no. 15, pp. 4991, 2021. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-lakoju_unsupervised_2021,
title = {Unsupervised Learning for Product Use Activity Recognition: An Exploratory Study of a ``Chatty Device''},
author = {Mike Lakoju and Nemitari Ajienka and M. Ahmadieh Khanesar and Peter Burnap and David T. Branson},
doi = {10.3390/s21154991},
year = {2021},
date = {2021-07-09},
volume = {21},
number = {15},
pages = {4991},
publisher = {MDPI AG},
abstract = {To create products that are better fit for purpose, manufacturers require new methods for gaining insights into product experience in the wild at scale. "Chatty Factories" is a concept that explores the transformative potential of placing IoT-enabled data-driven systems at the core of design and manufacturing processes, aligned to the Industry 4.0 paradigm. In this paper, we propose a model that enables new forms of agile engineering product development via "chatty" products. Products relay their "experiences" from the consumer world back to designers and product engineers through the mediation provided by embedded sensors, IoT, and data-driven design tools. Our model aims to identify product "experiences" to support the insights into product use. To this end, we create an experiment to: (i) collect sensor data at 100 Hz sampling rate from a "Chatty device" (device with sensors) for six common everyday activities that drive produce experience: standing, walking, sitting, dropping and picking up of the device, placing the device stationary on a side table, and a vibrating surface; (ii) pre-process and manually label the product use activity data; (iii) compare a total of four Unsupervised Machine Learning models (three classic and the fuzzy C-means algorithm) for product use activity recognition for each unique sensor; and (iv) present and discuss our findings. The empirical results demonstrate the feasibility of applying unsupervised machine learning algorithms for clustering product use activity. The highest obtained F-measure is 0.87, and MCC of 0.84, when the Fuzzy C-means algorithm is applied for clustering, outperforming the other three algorithms applied.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
32. Akmal, Haider Ali; Coulton, Paul: More-than-Human Game Design: Playing in the Internet of Things. In: vol. 4, no. 1, 2021. (Type: Journal Article | Abstract | BibTeX) @article{art-akmal_more_2021,
title = {More-than-Human Game Design: Playing in the Internet of Things},
author = {Haider Ali Akmal and Paul Coulton},
year = {2021},
date = {2021-06-28},
volume = {4},
number = {1},
abstract = {The design of objects requiring human interaction often revolves around methods such as Human Centred Design (HCD). Whilst this is beneficial in many cases, contemporary developments of technology such as the Internet of Things (IoT), which produce assemblages of interactions, lead to the view that human centred approaches can prove problematic leading to the proposal of adopting more-than-human perspectives. This study discusses the creation of a novel board game designed to explore a more-than-human design view for IoT products and services by addressing problematic issues in relation to user data privacy and security within the IoT which arguably arise from the application of traditional HCD approaches. By embracing Object-Oriented Philosophy, The Internet of Things Board Game creates an ontographic mapping of IoT assemblages and illuminates the tiny ontologies of unique interactions occurring within these digital and physical networked spaces. Here the gameplay acts as metaphorism illustrating independent and interdependent relationships between the various 'things' in the network. The study illustrates how critical game design can help develop potential new design approaches as well as enabling users to better understand the complex digital/physical assemblages they create when utilising IoT products and services in their everyday lives.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
33. Kollnig, Konrad; Binns, Reuben Daniel; Dewitte, Pierre; Kleek, Max Goodwin Van; Wang, Ge; Omeiza, Daniel; Webb, Helena; Shadbolt, Nigel R.: A Fait Accompli? An Empirical Study into the Absence of Consent to Third-Party Tracking in Android Apps. In: USENIX Symposium on Usable Privacy and Security (SOUPS) 2021, 2021. (Type: Proceedings Article | Abstract | BibTeX) @inproceedings{proc-in-kollnig_fait_2021,
title = {A Fait Accompli? An Empirical Study into the Absence of Consent to Third-Party Tracking in Android Apps},
author = {Konrad Kollnig and Reuben Daniel Binns and Pierre Dewitte and Max Goodwin Van Kleek and Ge Wang and Daniel Omeiza and Helena Webb and Nigel R. Shadbolt},
year = {2021},
date = {2021-06-17},
booktitle = {USENIX Symposium on Usable Privacy and Security (SOUPS) 2021},
abstract = {Third-party tracking allows companies to collect users' behavioural data and track their activity across digital devices. This can put deep insights into users' private lives into the hands of strangers, and often happens without users' awareness or explicit consent. EU and UK data protection law, however, requires consent, both 1) to access and store information on users' devices and 2) to legitimate the processing of personal data as part of third-party tracking, as we analyse in this paper. This paper further investigates whether and to what extent consent is implemented in mobile apps. First, we analyse a representative sample of apps from the Google Play Store. We find that most apps engage in third-party tracking, but few obtained consent before doing so, indicating potentially widespread violations of EU and UK privacy law. Second, we examine the most common third-party tracking libraries in detail. While most acknowledge that they rely on app developers to obtain consent on their behalf, they typically fail to put in place robust measures to ensure this: disclosure of consent requirements is limited; default consent implementations are lacking; and compliance guidance is difficult to find, hard to read, and poorly maintained.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
34. Seymour, William: Is it Time Our Devices Showed a Little Respect? Informing the Design of Respectful Intelligent Systems. 2021 Conference on Privacy Engineering Practice and Respect (PEPR), 2021. (Type: Conference | Abstract | Links | BibTeX) @conference{conf-seymour_is_2021,
title = {Is it Time Our Devices Showed a Little Respect? Informing the Design of Respectful Intelligent Systems},
author = {William Seymour},
url = {https://fpf.org/wp-content/uploads/2021/06/Session-5-3-Is-it-Time-our-Devices-Showed-a-Little-Respect-by-Seymour.pdf},
year = {2021},
date = {2021-06-10},
booktitle = {2021 Conference on Privacy Engineering Practice and Respect (PEPR)},
abstract = {We often use the word respect to refer to how our systems should (and hopefully do) treat users, but what does this actually mean? In this talk we dive into a diverse variety of perspectives on what it means to respect people, exploring the role that respect plays in system design. Beginning by grounding the discussion in what respect means from a moral and social perspective, we then consider how this plays out in practice. Designers and developers might respect (or disrespect) their users through the artefacts they create, but also through the ways that systems mediate people's communications and relationships. We conclude by discussing how respect complements and extends existing design principles in HCI around identity, fairness, and accessibility, distilling out key design principles to support the design of more ethical systems.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
35. Pilling, Franziska Louise; Lindley, Joseph Galen; Akmal, Haider Ali; Coulton, Paul: Design (Non) Fiction: Deconstructing/Reconstructing the Definitional Dualism of AI. In: vol. 6, no. 1, pp. 6–32, 2021, ISSN: 2183-9271. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-pilling_design_2021,
title = {Design (Non) Fiction: Deconstructing/Reconstructing the Definitional Dualism of AI},
author = {Franziska Louise Pilling and Joseph Galen Lindley and Haider Ali Akmal and Paul Coulton},
doi = {10.24140/ijfma.v6.n1.01},
issn = {2183-9271},
year = {2021},
date = {2021-06-09},
volume = {6},
number = {1},
pages = {6--32},
abstract = {2001: A Space Odyssey (Kubrick, 1968) speculates on humanities technological ascension through the exploration of space and the ultimate transcendence of humanity galvanised by the invention of AI. Every detail of this portrayal was an exercise in World Building, with careful considerations of then state-of-the-art technology and informed predictions. Kubrick's speculative vision is comparative to the practice of Design Fiction, by suspending disbelief and leveraging a technologies emergence to question the future's sociotechnical landscape and its ramifications critically. Discovery's AI system, Hal9000, is a convincing speculation of intelligence with Kubrick's vision showcasing current and long-term aims in AI research. To this end, Hal9000 uniquely portrays Artificial General Intelligence (AGI) underpinned by visualising 'narrow' AI subproblems; thereby, simultaneously highlighting then current research agendas within AI and manifesting them into the aspirational research agenda of human-computer symbiosis. As a result of Kubrick's mastery in suspending a viewer's disbelief despite portraying a particular reality for AI, and humanities fascination with artificial life, the term AI simultaneously refers to the grand vision of AGI as well as relating to the contemporary reality of narrow AI. This confusion, along with establishing AI's ontology, are current challenges that need addressing to create effective and acceptable realisations of AI. This paper responds to the ontological confusion by reviewing and comparing Kubrick's speculative methodology to the practice of Design Fiction by unpacking Hal9000 as a diegetic prototype while defining the active threads of 'AI's Definitional Dualism'. The paper will also present a Design Fiction submerged in the reality of narrow AI and the adoption of a More-Than Human Centred Design approach to address the complexity of AI's ontology in alternative ways. Finally, this paper will also define the importance of researching the semantics of AI technology and how film and Design Fiction offer a discursive space for design research to transpire.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
36. Smart, Paul R.; Hall, Wendy; Boniface, Michael: Extended Computation: Wide Computationalism in Reverse. In: 13th ACM Web Science Conference 2021, pp. 76-79, Association for Computing Machinery, New York, NY, USA, 2021, ISBN: 9781450385251. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-smart_extended_2021a,
title = {Extended Computation: Wide Computationalism in Reverse},
author = {Paul R. Smart and Wendy Hall and Michael Boniface},
url = {https://doi.org/10.1145/3462741.3466810},
doi = {10.1145/3462741.3466810},
isbn = {9781450385251},
year = {2021},
date = {2021-06-01},
booktitle = {13th ACM Web Science Conference 2021},
pages = {76-79},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
abstract = {Arguments for extended cognition and the extended mind are typically directed at human-centred forms of cognitive extension\textemdashforms of cognitive extension in which the cognitive/mental states and processes of a given human individual are subject to a form of extended or wide realization. The same is true of debates and discussions pertaining to the possibility of Web-extended minds and Internet-based forms of cognitive extension. In this case, the focus of attention concerns the extent to which the informational and technological elements of the online environment form part of the machinery of the (individual) human mind. In this paper, we direct attention to a somewhat different form of cognitive extension. In particular, we suggest that the Web allows human individuals to be incorporated into the computational/cognitive routines of online systems. These forms of computational/cognitive extension highlight the potential of the Web and Internet to support bidirectional forms of computational/cognitive incorporation. The analysis of such bidirectional forms of incorporation broadens the scope of philosophical debates in this area, with potentially important implications for our understanding of the foundational notions of extended cognition and the extended mind.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
37. Bradbury, Matthew; Jhumka, Arshad; Watson, Tim: Trust Trackers for Computation Offloading in Edge-Based IoT Networks. In: IEEE INFOCOM 2021 - IEEE Conference on Computer Communications, IEEE, 2021. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-bradbury_trust_2021a,
title = {Trust Trackers for Computation Offloading in Edge-Based IoT Networks},
author = {Matthew Bradbury and Arshad Jhumka and Tim Watson},
doi = {10.1109/infocom42981.2021.9488844},
year = {2021},
date = {2021-05-10},
booktitle = {IEEE INFOCOM 2021 - IEEE Conference on Computer Communications},
publisher = {IEEE},
abstract = {Wireless Internet of Things (IoT) devices will be deployed to enable applications such as sensing and actuation. These devices are typically resource-constrained and are unable to perform resource-intensive computations. Therefore, these jobs need to be offloaded to resource-rich nodes at the edge of the IoT network for execution. However, the timeliness and correctness of edge nodes may not be trusted (such as during high network load or attack). In this paper, we look at the applicability of trust for successful offloading. Traditionally, trust is computed at the application level, with suitable mechanisms to adjust for factors such as recency. However, these do not work well in IoT networks due to resource constraints. We propose a novel device called Trust Tracker (denoted by Σ) that provides higher-level applications with up-to-date trust information of the resource-rich nodes. We prove impossibility results regarding computation offloading and show that Σ is necessary and sufficient for correct offloading. We show that, Σ cannot be implemented even in a synchronous network and we compute the probability of offloading to a bad node, which we show to be negligible when a majority of nodes are correct. We perform a small-scale deployment to demonstrate our approach.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
38. Burton, Saheli Datta; Tanczer, Leonie Maria; Vasudevan, Srinidhi; Hailes, Stephen; Carr, Madeline: The UK Code of Practice for Consumer IoT Cybersecurity: where we are and what next. 2021. (Type: report | Abstract | Links | BibTeX | Altmetric) @report{burton_uk_2021,
title = {The UK Code of Practice for Consumer IoT Cybersecurity: where we are and what next},
author = {Saheli Datta Burton and Leonie Maria Tanczer and Srinidhi Vasudevan and Stephen Hailes and Madeline Carr},
url = {https://discovery.ucl.ac.uk/id/eprint/10117734},
doi = {10.14324/000.rp.10117734},
year = {2021},
date = {2021-04-07},
institution = {PETRAS National Centre of Excellence for IoT Systems Cybersecurity and UCL and Department for Digital, Culture, Media \& Sport: London, UK},
abstract = {The Internet of Things (IoT) is emerging quickly in a range of consumer markets from toys to fitness (or wellness) devices to household appliances. These hold great promise for enhancing people's lives, improving our health and well-being, and streamlining or automating a range of daily functions. They also, however, introduce a range of risks including external manipulation, data breaches, surveillance, and physical harm. While consumer devices are often subject to regulation, standards or codes, these have not previously incorporated the new challenges and risks that arise in IoT consumer devices. The UK has been proactive in considering how current regulatory frameworks, best practices, guidance, and other resources can support the uptake of innovations in consumer IoT devices in a safe and secure way. Through the PETRAS Cybersecurity of the Internet of Things research hub - now the National Centre of Excellence for IoT Systems Cybersecurity, we have worked to support DCMS to develop the Code of Practice for IoT Security (CoP). Seeing this work, alongside the significant contributions from multiple stakeholders, including industry, governments and civil society, contribute to the development of an ETSI Standard was exciting and a real demonstration of the value of interdisciplinary academic teams working closely with industry and policy makers to bring about positive change. This work is not complete though. Adapting the standards, governance and policy of emerging technologies is an iterative process that requires constant reflection, evaluation, analysis and reconsideration as both the implementations develop and as our use (or misuse) of them evolves. This report picks out three issues that we feel require urgent consideration. • The use of IoT devices by perpetrators of domestic abuse is a pressing and deeply concerning problem that is largely hidden from view. Collecting data (and therefore evidence) on this is challenging for a number of reasons outlined in this section by Leonie Tanczer. There are concrete steps that both industry and the policy community could take to address the misuse of consumer IoT in this setting and we include a number of these as well as lessons from other countries. • Fitness devices are also raising concerns as they have proven easy to compromise and they reveal deeply personal information about people's bodies, their homes and their movements. While IoT medical devices are regulated, there is a grey zone between these and fitness devices that results in a regulatory gap. Saheli Datta Burton has compared these two classes of devices, the ways they are vulnerable, the ways they are used, and the steps that could further secure fitness devices for the consumer market. • Finally, children's IoT connected toys are coming under necessary scrutiny due to the implications of embedded cameras and microphones for a child's (or parent's) protection and right to privacy. These connected toys have the potential for misuse and unauthorised contact with vulnerable minors. The British Toy and Hobby Association has responded to this by offering a range of guidance notes and by interpreting the CoP but with SMEs making up the bulk of IoCT manufacturing, there is plenty more to be done to ensure that these organisations are sufficiently informed and equipped to avoid producing and marketing insecure toys. This report highlights how a weak supply-side commitment to basic cybersecurity requirements in IoT manufacturing such as inbuilt encryption, password protection before distribution, user authentication (e.g., multi-factor authentication), regular audits and assessments exacerbates the plight of domestic 'tech abuse' victims, users of fitness devices, children, and their families. A complexity of shared technological, socio-ethical, regulatory and economic imperatives with some sector-specific nuances are at the heart of low-security manufacturing across sectors. In addition to this work, our report also provides insight into how widely the UK CoP has spread since its publication in March 2018, especially its rapid development (with significant contributions of various stakeholders including industry, governments and civil society) to a technical specification (TS 103 645 in February 2019) and, recently, the ETSI EN 303 645 in June 2020. While these developments might be expected to lead to widespread adoption of related secure manufacturing practices in the EU, the infographics we provide demonstrate how widely the standards are being discussed and taken up. Tracking this is, in itself, a useful exercise as it allow us to better understand how technical standards are socialised through diverse stakeholder groups. This report is certainly not the final word on the intersection between consumer IoT and policy responses. Nor will this be the last time we return to this work. But it is an update on where we are now and where we feel we need to be heading. Developing effective policies, regulations, standards, and guidance to protect citizens and to support service providers and manufacturers in the IoT is a challenging task that calls for input from many quarters. We are delighted that we have been able to make this contribution through PETRAS and sincerely thank all of those who have read and provided feedback on it.},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
39. Aicardi, Christine; Bitsch, Lise; Burton, Saheli Datta; Evers, Kathinka; Farisco, Michele; Mahfoud, Tara; Rose, Nikolas; Rosemann, Achim; Salles, Arleen; Stahl, Bernd; Ulnicane, Inga: Opinion on Trust and Transparency in Artificial Intelligence - Ethics&Society, The Human Brain Project. 2021. (Type: Miscellaneous | Abstract | Links | BibTeX | Altmetric) @misc{misc-aicardi_opinion_2021,
title = {Opinion on Trust and Transparency in Artificial Intelligence - Ethics\&Society, The Human Brain Project},
author = {Christine Aicardi and Lise Bitsch and Saheli Datta Burton and Kathinka Evers and Michele Farisco and Tara Mahfoud and Nikolas Rose and Achim Rosemann and Arleen Salles and Bernd Stahl and Inga Ulnicane},
doi = {10.5281/ZENODO.4588648},
year = {2021},
date = {2021-03-08},
publisher = {Zenodo},
abstract = {The Ethics and Society Subproject has developed this Opinion in order to clarify lessons the Human Brain Project (HBP) can draw from the current discussion of artificial intelligence, in particular the social and ethical aspects of AI, and outline areas where it could usefully contribute. The EU and numerous other bodies are promoting and implementing a wide range of policies aimed to ensure that AI is beneficial - that it serves society. The HBP as a leading project bringing together neuroscience and ICT is in an excellent position to contribute to and to benefit from these discussions. This Opinion therefore highlights some key aspects of the discussion, shows its relevance to the HBP and develops a list of six recommendations.},
keywords = {},
pubstate = {published},
tppubtype = {misc}
}
40. Burton, Saheli Datta; Mahfoud, Tara; Aicardi, Christine; Rose, Nikolas: Clinical translation of computational brain models: understanding the salience of trust in clinician-researcher relationships. In: vol. 46, no. 1-2, pp. 138–157, 2021. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-burton_clinical_2021,
title = {Clinical translation of computational brain models: understanding the salience of trust in clinician-researcher relationships},
author = {Saheli Datta Burton and Tara Mahfoud and Christine Aicardi and Nikolas Rose},
url = {https://doi.org/10.1080%2F03080188.2020.1840223},
doi = {10.1080/03080188.2020.1840223},
year = {2021},
date = {2021-03-07},
volume = {46},
number = {1-2},
pages = {138--157},
publisher = {Informa UK Limited},
abstract = {Computational brain models use machine learning, algorithms and statistical models to harness big data for delivering disease-specific diagnosis or prognosis for individuals. While intended to support clinical decision-making, their translation into clinical practice remains challenging despite efforts to improve implementation through training clinicians and clinical staff in their use and benefits. Drawing on the specific case of neurology, we argue that existing implementation efforts are insufficient for the responsible translation of computational models. Our research based on a collective seven-year engagement with the Human Brain Project, participant observation at workshops and conferences, and expert interviews, suggests that relationships of trust between clinicians and researchers (modellers, data scientists) are essential to the meaningful translation of computational models. In particular, efforts to increase model transparency, strengthen upstream collaboration, and integrate clinicians' perspectives and tacit knowledge have the potential to reinforce trust building and increase translation of technologies that are beneficial to patients.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
41. Lakoju, Mike; Javed, Amir; Rana, Omer; Burnap, Peter; Atiba, Samuelson T.; Cherkaoui, Soumaya: "Chatty Devices" and edge-based activity classification. In: vol. 1, no. 5, 2021. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-lakoju_chatty_2021,
title = {"Chatty Devices" and edge-based activity classification},
author = {Mike Lakoju and Amir Javed and Omer Rana and Peter Burnap and Samuelson T. Atiba and Soumaya Cherkaoui},
url = {https://doi.org/10.1007%2Fs43926-021-00004-9},
doi = {10.1007/s43926-021-00004-9},
year = {2021},
date = {2021-02-24},
volume = {1},
number = {5},
publisher = {Springer Science and Business Media LLC},
abstract = {With increasing automation of manufacturing processes (focusing on technologies such as robotics and human-robot interaction), there is a realisation that the manufacturing process and the artefacts/products it produces can be better connected post-production. Built on this requirement, a "chatty" factory involves creating products which are able to send data back to the manufacturing/production environment as they are used, whilst still ensuring user privacy. The intended use of a product during design phase may different significantly from actual usage. Understanding how this data can be used to support continuous product refinement, and how the manufacturing process can be dynamically adapted based on the availability of this data provides a number of opportunities. We describe how data collected on product use can be used to: (i) classify product use; (ii) associate a label with product use using unsupervised learning\textemdashmaking use of edge-based analytics; (iii) transmission of this data to a cloud environment where labels can be compared across different products of the same type. Federated learning strategies are used on edge devices to ensure that any data captured from a product can be analysed locally (ensuring data privacy).},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
42. Radanliev, Petar; Roure, David Charles De; Page, Kevin R.; Kleek, Max Goodwin Van; Santos, Omar; Maddox, La'Treall; Burnap, Peter; Anthi, Eirini; Maple, Carsten: Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics in extreme environments – cyber risk in the colonisation of Mars. In: vol. 2, no. 3, pp. 219–230, 2021. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-radanliev_design_2020,
title = {Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics in extreme environments \textendash cyber risk in the colonisation of Mars},
author = {Petar Radanliev and David Charles De Roure and Kevin R. Page and Max Goodwin Van Kleek and Omar Santos and La'Treall Maddox and Peter Burnap and Eirini Anthi and Carsten Maple},
url = {https://doi.org/10.1007%2Fs42797-021-00025-1},
doi = {10.1007/s42797-021-00025-1},
year = {2021},
date = {2021-02-10},
volume = {2},
number = {3},
pages = {219--230},
publisher = {Springer Science and Business Media LLC},
abstract = {Multiple governmental agencies and private organisations have made commitments for the colonisation of Mars. Such colonisation requires complex systems and infrastructure that could be very costly to repair or replace in cases of cyber-attacks. This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathematical formulas to identify the best approach for developing a dynamic and self-adapting system for predictive cyber risk analytics supported with Artificial Intelligence and Machine Learning and real-time intelligence in edge computing. The paper presents a new mathematical approach for integrating concepts for cognition engine design, edge computing and Artificial Intelligence and Machine Learning to automate anomaly detection. This engine instigates a step change by applying Artificial Intelligence and Machine Learning embedded at the edge of IoT networks, to deliver safe and functional real-time intelligence for predictive cyber risk analytics. This will enhance capacities for risk analytics and assists in the creation of a comprehensive and systematic understanding of the opportunities and threats that arise when edge computing nodes are deployed, and when Artificial Intelligence and Machine Learning technologies are migrated to the periphery of the internet and into local IoT networks.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
43. Mikusz, Mateusz; Shaw, Peter; Davies, Nigel; Nurmi, Petteri; Clinch, Sarah; Trotter, Ludwig; Elhart, Ivan; Langheinrich, Marc; Friday, Adrian: A Longitudinal Study of Pervasive Display Personalisation. In: vol. 28, no. 1, pp. 1–45, 2021. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-mikusz_longitudinal_2021,
title = {A Longitudinal Study of Pervasive Display Personalisation},
author = {Mateusz Mikusz and Peter Shaw and Nigel Davies and Petteri Nurmi and Sarah Clinch and Ludwig Trotter and Ivan Elhart and Marc Langheinrich and Adrian Friday},
doi = {10.1145/3418352},
year = {2021},
date = {2021-02-01},
volume = {28},
number = {1},
pages = {1--45},
publisher = {Association for Computing Machinery (ACM)},
abstract = {Widespread sensing devices enable a world in which physical spaces become personalised in the presence of mobile users. An important example of such personalisation is the use of pervasive displays to show content that matches the requirements of proximate viewers. Despite prior work on prototype systems that use mobile devices to personalise displays, no significant attempts to trial such systems have been carried out. In this article, we report on our experiences of designing, developing and operating the world's first comprehensive display personalisation service for mobile users. Through a set of rigorous quantitative measures and 11 potential user/stakeholder interviews, we demonstrate the success of the platform in realising display personalisation, and offer a series of reflections to inform the design of future systems.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
44. Burton, Saheli Datta; Kieslich, Katharina; Paul, Katharina Theresa; Samuel, Gabrielle; Prainsack, Barbara: Rethinking value construction in biomedicine and healthcare. In: 2021. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-burton_rethinking_2021,
title = {Rethinking value construction in biomedicine and healthcare},
author = {Saheli Datta Burton and Katharina Kieslich and Katharina Theresa Paul and Gabrielle Samuel and Barbara Prainsack},
url = {https://doi.org/10.1057%2Fs41292-020-00220-6},
doi = {10.1057/s41292-020-00220-6},
year = {2021},
date = {2021-01-29},
publisher = {Springer Science and Business Media LLC},
abstract = {Despite longstanding attempts to conceptualise and measure value in biomedicine and healthcare, there is no single agreed definition of what value is. Instead, and as such, value is often taken as given or constructed in economic terms. In this paper, we argue that taking the meaning of value as given, or reverting to technocratic or economic dimensions of value, obscures the non-technical and societal dimensions of value construction and operationalisation in healthcare and biomedical practices. Through a comparative study of five cases of biomedicine and healthcare, we aim to bring out the socioeconomic and political processes that make a thing valuable for society and its implications. Our contention is that a clearer understanding of what makes something valuable (or not) is the first step towards what socially reflexive and responsible valuing of biomedicine and healthcare ought to be.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
45. Smart, Paul R.; Clowes, Robert W.: Intellectual Virtues and Internet-Extended Knowledge. In: vol. 10, pp. 7–21, 2021. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-smart_intellectual_2021,
title = {Intellectual Virtues and Internet-Extended Knowledge},
author = {Paul R. Smart and Robert W. Clowes},
doi = {10.5281/ZENODO.4451862},
year = {2021},
date = {2021-01-08},
volume = {10},
pages = {7--21},
publisher = {Zenodo},
abstract = {Arguments for the extended mind suggest the possibility of extended knowers, individuals whose epistemic standing is tied to the operation of cognitive circuits that extend beyond the bounds of skin and skull. When applied to the Internet, this idea yields the possibility of Internet-extended knowledge, a form of extended knowledge that derives from our interactions and engagements with the online environment. This, however, yields a tension: proponents of the extended mind have suggested that cognitive extension requires the automatic endorsement of bio-external content, but such a commitment appears to conflict with the need to carefully evaluate the veracity of online information. Lukas Schwengerer ("Online Intellectual Virtues and the Extended Mind") proposes a solution to this problem. He suggests that proponents of the extended mind ought to accept an alternative conception of the extended mind, one that allows for the evaluation of online content via the exercise of intellectual virtue. We highlight a number of problems with this proposal and suggest that further research (both theoretical and empirical) is required before a virtue-theoretic approach to Internet-extended knowledge can be adopted. On a more positive note, we suggest that the exercise of intellectual virtue may play an important role in the developmental emergence of Internet-extended knowers.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
46. Bhatia, Laksh; Tomić, Ivana; Fu, Anqi; Breza, Michael J.; McCann, Julie A.: Control Communication Co-Design for Wide Area Cyber-Physical Systems. In: vol. 5, no. 18, pp. 1–27, 2021. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-bhatia_control_2021,
title = {Control Communication Co-Design for Wide Area Cyber-Physical Systems},
author = {Laksh Bhatia and Ivana Tomi\'{c} and Anqi Fu and Michael J. Breza and Julie A. McCann},
url = {https://doi.org/10.1145%2F3418528},
doi = {10.1145/3418528},
year = {2021},
date = {2021-01-04},
volume = {5},
number = {18},
pages = {1--27},
publisher = {Association for Computing Machinery (ACM)},
abstract = {Wide Area Cyber-Physical Systems (WA-CPSs) are a class of control systems that integrate low-powered sensors, heterogeneous actuators, and computer controllers into large infrastructure that span multi-kilometre distances. Current wireless communication technologies are incapable of meeting the communication requirements of range and bounded delays needed for the control of WA-CPSs. To solve this problem, we use a Control Communication Co-design approach for WA-CPSs, that we refer to as the C3 approach, to design a novel Low-Power Wide Area (LPWA) MAC protocol called Ctrl-MAC and its associated event-triggered controller that can guarantee the closed-loop stability of a WA-CPS. This is the first article to show that LPWA wireless communication technologies can support the control of WA-CPSs. LPWA technologies are designed to support one-way communication for monitoring and are not appropriate for control. We present this work using an example of a water distribution network application, which we evaluate both through a co-simulator (modeling both physical and cyber subsystems) and testbed deployments. Our evaluation demonstrates full control stability, with up to 50% better packet delivery ratios and 80% less average end-to-end delays when compared to a state-of-the-art LPWA technology. We also evaluate our scheme against an idealised, wired, centralised, control architecture, and show that the controller maintains stability and the overshoots remain within bounds.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
47. Tuptuk, Nilufer; Hazell, Peter; Watson, Jeremy Daniel McKendrick; Hailes, Stephen: A Systematic Review of the State of Cyber-Security in Water Systems. In: vol. 13, no. 1, pp. 81, 2021. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-tuptuk_systematic_2021,
title = {A Systematic Review of the State of Cyber-Security in Water Systems},
author = {Nilufer Tuptuk and Peter Hazell and Jeremy Daniel McKendrick Watson and Stephen Hailes},
url = {https://doi.org/10.3390%2Fw13010081},
doi = {10.3390/w13010081},
year = {2021},
date = {2021-01-01},
volume = {13},
number = {1},
pages = {81},
publisher = {MDPI AG},
abstract = {Critical infrastructure systems are evolving from isolated bespoke systems to those that use general-purpose computing hosts, IoT sensors, edge computing, wireless networks and artificial intelligence. Although this move improves sensing and control capacity and gives better integration with business requirements, it also increases the scope for attack from malicious entities that intend to conduct industrial espionage and sabotage against these systems. In this paper, we review the state of the cyber-security research that is focused on improving the security of the water supply and wastewater collection and treatment systems that form part of the critical national infrastructure. We cover the publication statistics of the research in this area, the aspects of security being addressed, and future work required to achieve better cyber-security for water systems.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
48. Racovita, Caroline Wijnbladh Catherine Wheller Monica: COVID-19: The Internet of Things and Supply Chains. 2020. (Type: report | Abstract | Links | BibTeX) @report{racovita_covid_2020f,
title = {COVID-19: The Internet of Things and Supply Chains},
author = {Caroline Wijnbladh Catherine Wheller Monica Racovita},
url = {https://petras-iot.org/wp-content/uploads/2020/04/SUPPLYCHAINS_COVID-19_BREXIT_IoT_PETRAS_18122020_V2_PDF.pdf},
year = {2020},
date = {2020-12-18},
institution = {PETRAS National Centre of Excellence for IoT Systems Cybersecurity},
abstract = {Supply chain logistics have seen severe disruptions during the pandemic: restricting the movement of goods, labour shortages, shifts in patterns of demand, delivery delays, congestion and higher freight costs. Further challenges due to Brexit can be anticipated, in particular due to uncertain supply, increased costs due to customs duties and processing costs, and time delays at the border. IoT technologies have the potential to assist with future frictionless borders, tackling labour shortages and Brexitinduced stock-pilling, delivery of goods to consumers, and vaccine cold chain monitoring. Yet IoT technologies pose limitations, like limited battery life or lack of skilled teams to implement tailored IoT solutions, as well as cybersecurity risks},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
49. Hathal, Waleed; Cruickshank, Haitham; Sun, Zhili; Maple, Carsten: Certificateless and Lightweight Authentication Scheme for Vehicular Communication Networks. In: vol. 69, no. 12, pp. 16110–16125, 2020. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-hathal_certificateless_2020,
title = {Certificateless and Lightweight Authentication Scheme for Vehicular Communication Networks},
author = {Waleed Hathal and Haitham Cruickshank and Zhili Sun and Carsten Maple},
url = {https://doi.org/10.1109%2Ftvt.2020.3042431},
doi = {10.1109/tvt.2020.3042431},
year = {2020},
date = {2020-12-03},
volume = {69},
number = {12},
pages = {16110--16125},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Reducing the number of road accidents is a key agenda item for governments across the world. This has led to an increase in the amount of attention given to Vehicular Communication Systems (VCS), which are seen as an important technology that can offer significant improvements in road safety. Using VCS, vehicles can form a dynamic self-configuring network that enables a vehicle to communicate with other vehicles (V2V) and roadside infrastructure (V2I). However, such wireless communication channels are vulnerable to attacks, and therefore an authentication scheme for communications should be designed before the deployment. Prior work has focused on utilising digital signature approaches to achieve the security requirements, but due to the special characteristics of VCS, such approaches are not well suited for safety related applications of VCS, since they incur high communication and computation overheads. To combat this issue, we propose a certificateless and lightweight authentication scheme to provide means of secure communications for VCS. In this work we introduce authentication tokens, which replace digital certificates to reduce the burden of certificate management on a Trusted Authority (TA). In addition, the utilisation of tokens ensures that mutual authentication is achieved for V2I communication. Moreover, we employ TESLA as the underlying broadcast authentication protocol to achieve the required security goals for safety message broadcasting. According to the security analysis and extensive simulation of our scheme, the results show that it can withstands various types of attacks. Also it has better performance in term of verification delay, scalability and communication overhead compared to lightweight authentication schemes that are based on similar techniques. Therefore, the scheme is well suited for VCS},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
50. Ani, Uchenna P. Daniel; Watson, Jeremy Daniel McKendrick; Green, Benjamin; Craggs, Barnaby; Nurse, Jason R. C.: Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases. In: vol. 5, no. 2, pp. 71–119, 2020. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-ani_design_2020,
title = {Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases},
author = {Uchenna P. Daniel Ani and Jeremy Daniel McKendrick Watson and Benjamin Green and Barnaby Craggs and Jason R. C. Nurse},
doi = {10.1080/23742917.2020.1843822},
year = {2020},
date = {2020-11-23},
volume = {5},
number = {2},
pages = {71--119},
publisher = {Informa UK Limited},
abstract = {This paper presents a mapping framework for design factors and an implementation process for building credible Industrial Control Systems (ICS) security testbeds. The security and resilience of ICSs has become a critical concern to operators and governments following widely publicised cyber security events. The inability to apply conventional Information Technology security practice to ICSs further compounds challenges in adequately securing critical systems. To overcome these challenges, and do so without impacting live environments, testbeds are widely used for the exploration, development, and evaluation of security controls. However, how a testbed is designed and its attributes, can directly impact not only its viability but also its credibility. Combining systematic and thematic analysis, and the mapping of identified ICS security testbed design attributes, we propose a novel relationship map of credibility-supporting design factors (and their associated attributes) and a process implementation flow structure for ICS security testbeds. The framework and implementation process highlight the significance of demonstrating some design factors such as user/experimenter expertise, clearly defined testbed design objectives, simulation implementation approach, covered architectural components, core structural and functional characteristics covered, and evaluations to enhance confidence, trustworthiness and acceptance of ICS security testbeds as credible. These can streamline testbed requirement definition, improve design consistency and quality while reducing implementation costs.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}