4.8 Article

An Internet of Things Framework for Smart Energy in Buildings: Designs, Prototype, and Experiments

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 2, 期 6, 页码 527-537

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2015.2413397

关键词

Energy efficiency; intelligent buildings; Internet of Things (IoT); location-based networked control; multiscale energy-proportionality; smart energy

向作者/读者索取更多资源

Smart energy in buildings is an important research area of Internet of Things (IoT). As important parts of the smart grids, the energy efficiency of buildings is vital for the environment and global sustainability. Using a LEED-gold-certificated green office building, we built a unique IoT experimental testbed for our energy efficiency and building intelligence research. We first monitor and collect 1-year-long building energy usage data and then systematically evaluate and analyze them. The results show that due to the centralized and static building controls, the actual running of green buildings may not be energy efficient even though they may be green by design. Inspired by energy proportional computing in modern computers, we propose an IoT framework with smart location-based automated and networked energy control, which uses smartphone platform and cloud-computing technologies to enable multiscale energy proportionality including building-, user-, and organizational-level energy proportionality. We further build a proof-of-concept IoT network and control system prototype and carried out real-world experiments, which demonstrate the effectiveness of the proposed solution. We envision that the broad application of the proposed solution has not only led to significant economic benefits in term of energy saving, improving home/office network intelligence, but also bought in a huge social implication in terms of global sustainability.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Telecommunications

DTN-Balance: A Forwarding-Capacity and Forwarding-Queue Aware Routing for Self-organizing DTNs

Weitao Wang, Yuebin Bai, Peng Feng, Jun Huang, Mo Sha, Jianpei Tantai

Summary: The paper presents a new DTN routing algorithm called DTN-Balance, which takes into account the forwarding capacity and queue of relay nodes for better load distribution in the network. By defining a message forwarding utility metric and incorporating small world theory, the algorithm significantly increases routing efficiency. Simulation results on real DTN traces show that the algorithm offers excellent forwarding efficiency despite a slight decrease in throughput.

WIRELESS PERSONAL COMMUNICATIONS (2021)

Article Construction & Building Technology

Application of data-driven attack detection framework for secure operation in smart buildings

Mariam Elnour, Nader Meskin, Khaled Khan, Raj Jain

Summary: This paper presents an analysis of the security of the HVAC system using a TRNSYS model and a data-driven attack detection strategy. Three schemes were investigated, including PCA feature extraction and 1D CNN-based encoder for temporal feature extraction, showing promising capabilities in attack detection with high reliability and low computational cost compared to standard machine-learning approaches.

SUSTAINABLE CITIES AND SOCIETY (2021)

Article Computer Science, Information Systems

Factors Affecting the Performance of Sub-1 GHz IoT Wireless Networks

Zebo Yang, Ali Ghubaish, Devrim Unal, Raj Jain

Summary: This study explores the impact of real-world environments on wireless network performance, finding that factors related to path and weather have the greatest influence. A comprehensive checklist of these factors is provided, which is believed to be beneficial for both academics and industrial practitioners in the field of wireless IoT systems.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2021)

Review Computer Science, Information Systems

Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security

Ali Ghubaish, Tara Salman, Maede Zolanvari, Devrim Unal, Abdulla Al-Ali, Raj Jain

Summary: The advancements in Internet of Things (IoT) technologies have transformed the healthcare industry through remote patient monitoring, enhancing patient care efficiency. Yet, the security of these systems remains a major challenge, requiring robust measures to safeguard data.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Multidisciplinary Sciences

HVAC system attack detection dataset

Mariam Elnour, Nader Meskin, Khaled Khan, Raj Jain

Summary: This paper presents a dataset of a 12-zone HVAC system collected from a simulation model to support research in the cybersecurity of HVAC systems in smart buildings. It aims to facilitate the validation of attack detection and mitigation strategies, benchmark different data-driven algorithms, and study the impact of attacks on HVAC systems.

DATA IN BRIEF (2021)

Article Computer Science, Information Systems

Enabling Cross-technology Communication from LoRa to ZigBee via Payload Encoding in Sub-1 GHz Bands

Junyang Shi, Di Mu, Mo Sha

Summary: Low-power wireless mesh networks (LPWMNs) are widely used in wireless monitoring and control applications. Recent studies show that adding low-power wide-area network radios such as LoRa effectively overcomes the limitations of LPWMNs. However, users are reluctant to embrace this new communication approach due to the cost of hardware modification.

ACM TRANSACTIONS ON SENSOR NETWORKS (2022)

Article Computer Science, Information Systems

TRUST XAI: Model-Agnostic Explanations for AI With a Case Study on IIoT Security

Maede Zolanvari, Zebo Yang, Khaled Khan, Raj Jain, Nader Meskin

Summary: Despite the challenges in generating trust, explainable AI (XAI) has emerged to address the black box nature of artificial intelligence (AI). In this study, a universal XAI model called TRUST was proposed, which is model-agnostic, high performing, and suitable for numerical applications. The TRUST model utilizes statistical theory to model the AI's outputs and provides explanations by ranking influential variables and determining the likelihood of new samples belonging to each class using multimodal Gaussian distributions (MMG). Results from a case study on IIoT cybersecurity demonstrate TRUST's effectiveness with an average success rate of 98% and superiority over the popular XAI model LIME in terms of performance, speed, and explainability.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Enabling Cross-technology Communication from LoRa to ZigBee in the 2.4 GHz Band

Junyang Shi, Xingjian Chen, Mo Sha

Summary: IEEE 802.15.4-based wireless sensor-actuator networks play a significant role in improving industrial efficiency, but managing large and complex networks is difficult. This article presents a solution for enabling cross-technology communication from LoRa to ZigBee, providing reliable communication with high throughput and low bit error rate.

ACM TRANSACTIONS ON SENSOR NETWORKS (2022)

Article Computer Science, Artificial Intelligence

Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach

Lav Gupta, Tara Salman, Ali Ghubaish, Devrim Unal, Abdulla Khalid Al-Ali, Raj Jain

Summary: This paper presents MUSE, a system of deep hierarchical stacked neural networks for timely and accurate detection of malicious activity in healthcare networks. By merging and aggregating trained edge cloud models, a partly pre-trained core cloud model can be constructed, leading to faster training times and high accuracy in detecting attacks on dataflows.

APPLIED SOFT COMPUTING (2022)

Article Computer Science, Hardware & Architecture

Revealing Smart Selective Jamming Attacks in WirelessHART Networks

Xia Cheng, Junyang Shi, Mo Sha, Linke Guo

Summary: This paper presents a new threat to WirelessHART networks, smart selective jamming attacks, which can greatly reduce network reliability without being easily detected.

IEEE-ACM TRANSACTIONS ON NETWORKING (2023)

Article Computer Science, Information Systems

A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems

Mariam Elnour, Mohammad Noorizadeh, Mohammad Shakerpour, Nader Meskin, Khaled Khan, Raj Jain

Summary: This work presents a distributed, machine learning based attack detection and mitigation framework for sensor false data injection cyber-physical attacks in industrial control systems. The framework is developed using the system's standard operational data and validated using a hybrid testbed of a reverse osmosis plant. The proposed solution can be adopted in the existing industrial control systems and demonstrated effective performance in real-time detection and mitigation of actual cyber-physical attacks.

IEEE ACCESS (2023)

Article Computer Science, Information Systems

A Survey of Important Issues in Quantum Computing and Communications

Zebo Yang, Maede Zolanvari, Raj Jain

Summary: Driven by rapid progress in quantum hardware, academia and industry have engaged in a fierce race for quantum technologies. Quantum computers have achieved hundreds of qubits and quantum annealers have reached thousands of qubits. This article provides an introduction to quantum computing and communications from a computer science perspective, reviewing key milestones and recent advances. It categorizes the key elements of a quantum Internet into four important issues: quantum computers, quantum networks, quantum cryptography, and quantum machine learning. Additionally, the article discusses barriers, research directions, and trends.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2023)

Proceedings Paper Computer Science, Information Systems

TrafficSpy: Disaggregating VPN-encrypted IoT Network Traffic for User Privacy Inference

Qi Li, Keyang Yu, Dong Chen, Mo Sha, Long Cheng

Summary: As more and more people use IoT devices to monitor and control their environments, the security and privacy of these devices become a growing concern. One recent research reveals that VPN-encrypted IoT network traffic is not anonymous and can be disaggregated into individual device traffic, potentially exposing sensitive user information. To investigate this privacy threat, researchers develop a new smart home traffic disaggregator called TrafficSpy, which accurately disaggregates VPN traffic into device-level data. However, this disaggregated data is susceptible to further attacks that can reveal user sensitive information. TrafficSpy represents both a serious privacy threat and a potentially valuable tool for smart home monitoring and automation.

2022 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) (2022)

Proceedings Paper Computer Science, Hardware & Architecture

Localizing Campus Shuttles from One Single Base Station Using LoRa Link Characteristics

Junyang Shi, Mo Sha

Summary: This paper presents a novel approach to localize a campus shuttle using the LoRa link characteristics measured by a single base station and deep learning. Experimental results demonstrate that the proposed solution achieves high accuracy without requiring new hardware and introducing additional communication overhead.

2022 31ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2022) (2022)

Article Computer Science, Information Systems

Flow-based intrusion detection algorithm for supervisory control and data acquisition systems: A real-time approach

Marcio Andrey Teixeira, Maede Zolanvari, Khaled M. Khan, Raj Jain, Nader Meskin

Summary: Intrusion detection in SCADA systems is crucial, but current approaches lack representative datasets and real-time adaptability. This study presents a flow-based dataset and a deep learning-based IDS for SCADA systems. Experimental results show the model can detect cyberattacks in real time.

IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS (2021)

暂无数据