25
P R O C E E D I N G S 2021 TRON Symposium TRONSHOW December 8-10, 2021 Tokyo, Japan Technical Paper Session Organizer: TRON Forum Co-sponsor: collaboration Hub for University and Business (cHUB), Faculty of Information Networking for Innovation And Design (INIAD), Toyo University / Institute of Infrastructure Application of Ubiquitous Computing (IAUC), Interfaculty Initiative in Information Studies, The University of Tokyo Technical Co-Sponsor: IEEE Consumer Technology Society

Technical Paper Session - tronshow.org

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Technical Paper Session - tronshow.org

P R O C E E D I N G S 2021 TRON Symposium −TRONSHOW−

December 8-10, 2021

Tokyo, Japan

Technical Paper Session

Organizer: TRON Forum

Co-sponsor: collaboration Hub for University and Business (cHUB),

Faculty of Information Networking for Innovation And

Design (INIAD), Toyo University / Institute of

Infrastructure Application of Ubiquitous Computing

(IAUC), Interfaculty Initiative in Information Studies, The

University of Tokyo

Technical Co-Sponsor: IEEE Consumer Technology Society

Page 2: Technical Paper Session - tronshow.org

Proceedings of 2021 TRON Symposium -TRONSHOW-

Tokyo Midtown, Tokyo, Japan

December 8-10, 2021

Published by TRON Forum

ISBN 978-4-89362-375-1

Part Number: CFP2164X-USB

Copyright 2021 @TRON Forum

It is prohibited by law to copy, duplicate, reproduce or translate all or any part of this document by any means, including electronic, mechanical,

optical or chemical, without written permission.

The names of hardware and software products mentioned in this book are trademarks or registered trademarks of the respective companies.

TRON, ITRON, μITRON, BTRON, CTRON, MTRON, and eTRON are not the names of particular commercial products or product line. T-Kernel, T-

Kernel 2.0, T-Kernel 3.0, T-Kernel 2.0 Extension, μT-Kernel, μT-Kernel 2.0, μT-Kernel 3.0, MP T-Kernel, T-Kernel Standard Extension, TRON Safe

Kernel, IoT-Engine and IoT Aggregator are the names of open real-time OS specifications and/or computer system architectures that TRON Forum

has been promoting.

Page 3: Technical Paper Session - tronshow.org

Proceedings of 2O21 TRON Symposium -TRONSHOW-

Table of Contents

TRON Symposium Outline

Greeting from the Chair of Technical Program Committee

Papers

TRON 2021: 2021 TRON Symposium (TRONSHOW)

S1: Paper session

Chaired by Fahim Khan (Toyo University, Japan)

01:30 pm: Arrhythmia Classification Using EFFICIENTNET-V2 with 2-D Scalogram

Image Representation

Reza Fuad Rachmadi (Institut Teknologi Sepuluh Nopember, Indonesia); Supeno Mardi Susiki

Nugroho (Sepuluh Nopember Institute Of Technology, Indonesia); Muhammad Furqon (Sepuluh

Nopember Institute of Technology Surabaya, Indonesia); Arief Kurniawan (Institut Teknologi

Sepuluh Nopember, Indonesia); I Ketut Eddy Purnama (Institut Teknologi Sepuluh Nopember,

Indonesia); Mpu Aji (Sepuluh Nopember Institute of Technology Surabaya, Indonesia)

01:45 pm: Harnessing IoT Technology for the Development of Wearable Contact

Tracing Solutions

Rex Acharya (Sam Houston State University, USA); Amar A Rasheed (Sam Houston State

University, USA); Hacer Varol (Stephen F. Austin State University, USA); Mohamed Baza (College

of Charleston, USA); Louanne Mozer Sallo (Sam Houston State University, USA); Rabi Mahapatr

(Texas A&M University, USA)

Page 4: Technical Paper Session - tronshow.org

Appendix

Technical Program Committee, and other staff members

The total program of 2021 TRON Symposium -TRONSHOW-

Page 5: Technical Paper Session - tronshow.org

ISBN978-4-89362-375-1 (C) 2021 TRON Forum

Arrhythmia Classification Using EFFICIENTNET-V2 with 2-D Scalogram Image Representation

1st Muhammad Furqon Dept. of Electrical Engineering Faculty of Intelligent Electrical

and Informatics Technology Institut Teknologi Sepuluh Nopember

Surabaya, Indonesia 60111 [email protected]

4th Arief Kurniawan Department of Computer Engineering Faculty of Intelligent Electrical and

Informatics Technology Institut Teknologi Sepuluh Nopember Surabaya, Indonesia 60111

[email protected]

2nd Supeno Mardi Susiki Nugroho Department of Computer Engineering Faculty of Intelligent Electrical and

Informatics Technology Institut Teknologi Sepuluh Nopember Surabaya, Indonesia 60111

[email protected]

5th I Ketut Eddy Purnama Department of Computer Engineering Faculty of Intelligent Electrical and

Informatics Technology Institut Teknologi Sepuluh Nopember Surabaya, Indonesia 60111

[email protected]

3rd Reza Fuad Rachmadi Department of Computer Engineering Faculty of Intelligent Electrical and

Informatics Technology Institut Teknologi Sepuluh Nopember Surabaya, Indonesia 60111

[email protected]

6th Mpu Hambyah Syah Bagaskara Aji Department of Computer Engineering Faculty of Intelligent Electrical and

Informatics Technology Institut Teknologi Sepuluh Nopember Surabaya, Indonesia 60111 [email protected]

Abstract—Cardiovascular disease is part of global death's main cause. It is the term for all types of diseases that affect the heart or blood vessels. Heart disease is a type of cardiovascular disease. It can be detected early by examining the arrhythmia presence. Arrhythmia is an abnormal heart rhythm that is commonly diagnosed and evaluated by analyzing electrocardiogram (ECG) signals. In classical techniques, a cardiologist/ clinician used an electrocardiogram (ECG) to monitor the heart rate and rhythm of patients then read the journal activity of patients to diagnose the presence of arrhythmias and to develop appropriate treatment plans. However, The classical techniques take time and effort. The development of arrhythmias diagnosis, toward computational processes, such as arrhythmias detection and classification by using machine learning and deep learning. A convolutional neural network (CNN) is a popular method used to classify arrhythmia. Dataset pre-processing was also considered to achieve the best performance models. MIT-BIH Arrhythmia Database was used as our dataset. Our study used the EfficientNet-V2 which is a type of convolutional neural network to perform the classification of five types of arrhythmias. In pre-processing, the ECG signal was cut each 1 second (360 data), signal augmentation is applied to balance the amount of data in each class, and then the Continues Wavelet Transform (CWT) is employed to transform the ECG signal into a scalogram. The dataset is then distributed into subsets by using modulo operation to get variants of data in each subset. The colormap is applied to convert scalograms into RGB images. By this scheme, our study achieved superior accuracy than the existing method, with an accuracy rate of 99.97%.

Keywords— arrhythmia, Continues Wavelet Transform (CWT), scalogram, colormap, EfficientNet-V2.

I. INTRODUCTION Cardiovascular (CVD) is mentioned by WHO (World

Health Organization) as the leading cause of global death. An estimated 32% of the world's population or 17.9 million people died from CVDs in 2019. Out of the 17 million of those who died are being under the age of 70. Early detection of cardiovascular disease is important for management with counseling and effective treatment [1]. It can be detected by examining the presence of arrhythmias. Arrhythmia is an abnormal heartbeat rhythm, which is analyzed in an electrocardiogram (ECG) signal [2]. The heartbeat rhythm

classification is a crucial step for arrhythmia diagnosis during electrocardiographic (ECG) analysis [3]. In the clinical setting, a cardiologist/ clinician uses an ECG to monitor the patient's heart rate and rhythm and reads the patient's activity journal to diagnose the presence of an arrhythmia. The classical clinic setting, on the other hand, needs time and expert review [4]. To solve this problem, computerized-based analysis has been applied [5]. The disruption of digital technology has led researchers to develop cardiac detection methods based on machine learning by using feature extraction such as morphological features and RR interval [6,7]. To classify heartbeats based on ECG signals, some algorithm was proposed, such as particle swarm optimization (PSO), rule-based rough sets, support machine vector (SVM), linear discriminant analysis (LDA), neural network [8], and Extreme Learning Machine (ELM) [9] which has good performance.

However, the ECG waveform and their morphological characteristics of each patient have different variations, and at different times taken, the ECG signal of patients will be different. The fixed features used in these methods have low accuracy in distinguishing arrhythmias of different patients. Recently, deep learning-based methods have attracted more attention because they can automatically extract discriminant features from the training data. Studies [10,11] showed that deep learning-based methods have provided significant performance in medical image analysis, and several studies [12-15] have also showed that they can extract more abstract features and resolve variations between patients in ECG classification.

The other problem of ECG classification is different frequency components even noise composed in ECG signal which difficult to extract discriminant features by a deep learning based method. The known method to solve this problem is to transform the ECG signal into a time-frequency domain to avoid the effects of aliasing of different frequencies components. As the authors know, Short-Time Fourier Transform (STFT) [16], High-Order Synchro squeezing Transform (FSSTH) [17] and Wavelet Transform (WT) [18, 30] are widely used time-frequency techniques. In some studies, WT provides better time-frequency domain analysis results than STFT [19,20]. The output of wavelet

Page 6: Technical Paper Session - tronshow.org

transformation are wavelet coefficients, then they are arranged to form a scalogram (coefficient value). The conversion of scalogram into RGB images make the classification easier. The way of the coefficient values are mapped into colors has an influence on the visual interpretation of the RGB Images. The selection of the appropriate colormap is an important step of data exploration. The color mapping is used to represent ECG signals from the scalogram (coefficient value) to RGB images. How data are represented visually has a powerful effect on how the structure in those data is perceived and analyzes interpretation of the data [21]. Dataset pre-processing and distribution also play an important role in training performance. For developing machine learning and deep learning model, it is common to split the dataset into training and testing sets to protect the model against unexpected issues that can arise due to overfitting [22].

Motivated by these challenges and the many pieces of information that could potentially be used to improve the performance of the cardiac arrhythmia classification on electrocardiogram, the authors developed an automatic arrhythmia classification method based on setting in pre-processing including employing Continuous Wavelet Transform (CWT) to convert ECG signal into scalogram, after then used a modulo operation to divide the dataset into subsets to get variants of data in each subset. The colormap was applied to convert the scalogram into RGB images and classified the 2D RGB diagrams. The Convolutional Neural Network (CNN) is used to perform the training and classification process. The EffecientNet-V2 architecture was chosen as a convolutional neural network (CNN) model to classify the types of arrhythmias in this term of study. Our method achieved an accuracy rate of 99.97%.

II. DESIGN AND IMPLEMENTATION This research study is implementing some techniques in

the pre-processing dataset and used EfficientNet-V2 to classify arrhythmia into 5 classes, including Fusion of Ventricular and Normal (FVN), Left Bundle Branch Block (LBBB), Normal Beat (NOR), Premature Ventricular Contraction (PVC), Right Bundle Branch Block (RBBB). Our study aims at the pre-processing of arrhythmia dataset, where the 1D ECG signals will be converted into 2D scalogram RGB images, and then fed the images into EfficientNet-V2 to classify the types of arrhythmias. The diagram block of the proposed system shows in Figure 1.

Fig. 1 Diagram Block of the Proposed System.

A. Preprocessing - Signal Segmentation The dataset was obtained from the MIT-BIH Arrhythmia

Database (https://physionet.org). These include 48 records with 30 minutes of each record (650,000 data) and frequency 360 Hz. It is used as data in the training process, validation process, and testing process. The dataset of ECG signal is cut for 1 second with a fixed-size of 360 data by taking 180 samples before and after the R-peak. The type of arrhythmic disease is known as a label at the annotation point in the dataset. The cut Signals are shown in Figure 2.

(a)

(b)

(c)

(d)

(e)

Fig. 2. ECG Signals, (a). FVN, (b). LBBB, (c). Normal Beat, (d). PVC, (e). RBBB.

Page 7: Technical Paper Session - tronshow.org

The number of samples in each class has different values, Table I shows the type and number of samples from arrhythmia dataset.

TABLE I Type and samples of arrhythmia.

Arrythmia Number of Samples

FVN 802

LBBB 8071

NOR 75011

RBBB 7255

PVC 7129

B. Preprocessing - Dataset Augmentation and Partition As shown in Table I, FVN has the least amount of data

(802 data). Augmentation was applied to increase the variation of the data by manipulating the transformation of the data for the balance of the dataset and avoiding overfitting of the model trained [31,32,33]. The process of augmentation in FVN is shifting the middle point (R-peak) ± 5 samples to the right and ± 5 samples to the left of each data and has result 8020 total sample data. In the end, PVC has the fewest samples of the classes (7129 data). To balance the class of our dataset, samples of PVC are used as a reference for equalizing the amount of all classes data. The dataset's partition into three subsets, with a split ratio: 80% of the training set, 10% of the validation set, and 10% of the testing set. Table II shows the partition of ECG signal samples for the dataset.

TABLE II Partition of ECG Samples After Augmentation.

Arrythmia Dataset

Total Testing Training Validation

FVN 713 5703 713 7129

LBBB 713 5703 713 7129

NOR 713 5703 713 7129

RBBB 713 5703 713 7129

PVC 713 5703 713 7129

C. Preprocessing - Dataset Distribution The study [2] used MIT-Dataset with spectrogram as

representation of Frequency Spectrum from ECG signal and CNN as classification. It classified five classes of arrhythmia. The total data of each class is 7129. It used the split ratio of the dataset with the following: 80% of set Training, 10% of set Validation, and 10% of set Testing. There are several methods of distributing data into a subset of testing, training, and validation. To the best of our knowledge, one of them is by using random/shuffle in partition data into subsets [39,40]. In the study [2], they distributed the data into the subset of testing, training, and validation by regular partition. They divide the data from range 0 to 712 into the testing sets (713 data), then the data from range 713 to 6415 as the training sets (5703 data), and data from range 6416 to 7128 as validation sets (713). Instead of using the same method, the

authors try to divide data into subsets by using the modulo operation. The distribution of data into subsets of testing and validation used modulus by 9 and for the subsets of training used modulus by 3. Figure 3 shows the diagram block of distribution data into subsets.

Fig. 3 Diagram Block of data distribution into subsets using a modulo

operation.

The distribution of data on the subsets for each class with the modulo operation was shown in Table III.

TABLE III Distribution of Data into Subsets of Each Class.

Subset Data Total Data Testing Set 0, 9, 18, . . ., 6408 713 Training Set 2, 3, 4, . . ., 7128 5703 Validation Set 1, 10, 19, . . ., 6409 713

Figure 4 shows an example how the ECG plot (before

transformed into scalogram RGB images) distributed to the training subset of the FVN class using the modulo operation.

Fig. 4 Sets of Data from FVN Class used modulo operation distribution.

To compare the used of modulo operation in distributing data into subsets, the authors also applied the distribution method such as the study [2]. The diagram block of distribution data into subsets with regular partition was shown in Figure 5.

Page 8: Technical Paper Session - tronshow.org

Fig. 5 Diagram Block of data distribution with regular partition.

The distribution of data on the subsets for each class with regular partition was shown in Table IV.

Table IV Distribution of Data into Subsets with Regular Partition.

Subset Data Total Data Testing Set 0, 1, 2, . . ., 712 713 Training Set 713, 714, 715, . . ., 6415 5703 Validation Set 6416, 6417, 6418, . . ., 7128 713

In the Figure 6 showed the example of ECG plot data in the subsets of training from FVN class before transformed into scalogram RGB images with regular partition.

Fig. 6 Sets of data from FVN class used regular partition.

D. Preprocessing - Transformation of ECG Signal into Scalogram

The Time-frequency domain was used to facilitate feature

extraction. In this study, the ECG signal was transformed using Continuous Wavelet Transform (CWT) to decomposed signals in the time-frequency domain. Continuous Wavelet Transform (CWT) is defined as:

𝐶𝐶𝑎𝑎(𝑏𝑏) =1√𝑎𝑎

� 𝑥𝑥(𝑡𝑡) .𝜑𝜑 �𝑡𝑡 − 𝑏𝑏𝑎𝑎

� 𝑑𝑑𝑡𝑡∞

−∞ (1)

where a is the scale of parameter, b is the translation parameter, and φ(t) is the wavelet function (mother wavelet). The scale can be converted to frequency by:

𝐹𝐹 =𝐹𝐹𝐶𝐶 ∗ 𝑓𝑓𝑠𝑠𝑎𝑎

(2)

where Fc is the center frequency of the mother wavelet, fs is the sampling frequency of signal x(t) [4].

In this study, continuous wavelets transform has been implemented, and the authors experimented with some different mothers of wavelets, such as morlet (morl), complex morlet (cmor0.2-1.8), frequency B-spline wavelets (fbsp2-0.9-0.5), Gaus8, Gaus4, and mexican hat wavelets (mexh) [38].

The Morlet wavelet (morl) are defined as:

𝜑𝜑(𝑡𝑡) = exp − 𝑡𝑡2

2 cos(5𝑡𝑡) (3) While the complex morlet wavelet (cmorB-C) is given by:

𝜑𝜑(𝑡𝑡) = 1

√𝜋𝜋𝜋𝜋 exp − 𝑡𝑡

2

𝐵𝐵 exp j2π𝐶𝐶𝑡𝑡 (4)

Where B is the bandwidth and C is the center frequency. In this study, the authors set a complex-valued Morlet wavelet with a bandwidth parameter (B) of 0.2 and a center frequency (C) of 1.8.

Another one is frequency B-spline wavelets (fbspM-B-C) which are defined as:

𝜑𝜑(𝑡𝑡) = √𝜋𝜋 �sin �𝜋𝜋𝜋𝜋 𝑡𝑡

𝑀𝑀�

𝜋𝜋𝜋𝜋 𝑡𝑡𝑀𝑀

𝑀𝑀

exp 2jπ𝐶𝐶𝑡𝑡 (5)

Where M is the spline order, B is the bandwidth and C is the center frequency. In this study, the authors set the spline order (M) of 2, with a bandwidth parameter (B) of 0.9 and a center frequency (C) of 0.5.

For the Gaussian wavelets (gausP) correspond to the following wavelets:

𝜑𝜑(𝑡𝑡) = 𝐶𝐶 exp −𝑡𝑡2 (6) Where P is an integer between 1 and 8 corresponds to the

order derivative of the gaussian wavelet. The authors employ order 4 and order 8 of the Gaussian wavelet [38].

And the mexican hat wavelets (mexh) are defined as:

𝜑𝜑(𝑡𝑡) = 2

√3 √𝜋𝜋4 exp − 𝑡𝑡2

2 (1 − 𝑡𝑡2) (7)

Different Continuous Wavelet Transform (CWT) scale factors were used to obtain the signal wavelet coefficient at different scales. These wavelet coefficients can be represented as 2D ECG scalogram signals in the time-frequency domain. The last is to convert the wavelet coefficient of the scalogram into corresponding images with pseudo-color processing. Figure 7 are the results of the ECG signal in 2D images representation.

(a)

(b)

Fig. 7 (a). Scalogram image of Normal Beat, (b). Scalogram image of FVN

Page 9: Technical Paper Session - tronshow.org

E. Preprocessing - Color Mapping Continuous Wavelet Transform (CWT) is utilized to

transform One-Dimensional electrocardiogram signals (1D-ECG) into corresponding images. It has output wavelet coefficients, and they are arranged to form a scalogram. The wavelet coefficients (scalogram) were converted into images by using pseudo-color with some different types of colormaps.

In this study, the authors convert ECG scalograms using some different types of colormaps to find the corresponding colormaps for our scalogram. The following colormap is Jet, Viridis, Paired, Pastel2, HSV, Tab 20c, Turbo, Inferno [41]. Different colormap representations for Normal Beat are shown in Figure 8, and for FVN is shown in Figure 9.

Jet

Turbo

Viridis

Inferno

Paired

Pastel2

HSV

Tab20c

Fig. 8. Scalogram of Normal Beat in different colormap

Jet

Turbo

Viridis

Inferno

Paired

Pastel2

HSV

Tab20c

Fig. 9. Scalogram of FVN in different colormap

F. EfficientNet-V2 A convolutional neural network (CNN) is a deep learning-

based algorithm which widely used to detect or classify arrhythmias [23]. The EfficientNet-V2 is the type of convolutional neural network algorithm, new series, and has a faster training speed and better parameter efficiency than the last family of EfficientNet (EfficientNet-V1). The previous version (EfficientNet-V1) also has been used to handle ECG data [42]. However, the EfficientNet-V2 model was developed with the combination of training-aware neural architecture search and scaling, to jointly optimize training speed and parameter efficiency. The model was searched from the search space enriched with new operations such as Fused-MBConv [27].

III. DISCUSSION This section presents the result of our experiment, and the

design system analyzes. Tests were carried out to determine the error rate and draw a conclusion from the system proposed. There are three implementations and tests carried out, including:

1. The result of using different mother wavelet implementations.

2. The result of the used modulo operation on data distribution into subsets.

3. The result of different colormap (CMAP) implementation.

In this section of the experiment, training and validation were performed by efficientnetv2-b0 model, 1k checkpoints, and (224 x 224) input images. The number of epochs [35] is 100 and 64 of batch size [36]. The early stopping function is used to stop the training process when the performance saturates or begins degrading [37]. At the end of this section, the report of the best-performed model in this study is presented.

A. Testing the used of different mother of wavelet This part presents the result from the use of different

mother wavelets in ECG signal time-frequency transformation. The jet colormap was applied to uniform the scalogram RGB images representation. In this experiment, the 1D ECG signals were transformed into a scalogram (wavelets coefficient) by using different mother wavelets, and then the scalogram (wavelets coefficient) was converted into 2D RGB images by using a jet colormap. The mother wavelet shown in Figure 10 includes (a). Mexican Hat Wavelet (mexh), (b). Morlet Wavelet (morl), (c). Gaussian Wavelet (gaus8), (d). Complex Morlet Wavelet (cmor0.2-1.8), (e). Gaussian Wavelet (gaus4), and (f). Frequency B-Spline Wavelet.

(a)

(b)

(c)

(d)

(e)

(f)

Fig. 10. Wavelet Functions.

Table V shows accuracy detection from each class with a different wavelet. The mexican hat achieved a superior result than other wavelets.

Page 10: Technical Paper Session - tronshow.org

Table V Accuracy detection from each class with different wavelet

Wavelet Accuracy (%) Acc.

Rate (%) FVN LBBB NOR PVC RBBB

Mexican Hat 100 99.86 100 100 100 99.97

Morlet 99.86 99.72 100 99.16 99.72 99.69

Gaus8 99.86 99.44 100 99.16 99.86 99.66 Complex Morlet 99.86 99.30 100 99.16 99.86 99.64

Gaus4 99.72 99.16 100 99.30 99.72 99.58

B-Spline 99.72 99.02 100 98.74 99.72 99.44

B. Testing result in different colormap In this part, we used the mexican hat (mexh) as the mother

wavelet to transform the ECG signals into a scalogram, so all the experimental data used the same transformation method. The different colormap was applied in this experiment to present the effect of using different colormaps as the representation of wavelet coefficient (ECG signal in time-frequency) in RGB Diagrams. Table 6 shows the type of colormap and accuracy in each class of arrhythmia. The authors used some different types of colormaps, with the following: Jet colormap, Turbo colormap, Viridis colormap, Inverno colormap, Paired colormap, Pastel2 colormap, HSV colormap, and Tab 20c colormap. The code and type of colormap can find in matplotlib library [41].

Table VI Colormap and accuracy of arrhythmias

CMAP Accuracy (%) Acc.

Rate (%) FVN LBBB NOR PVC RBBB

Jet 100 99.86 100 100 100 99.97

Turbo 99.72 99.72 100 99.16 100 99.72

Viridis 100 99.58 100 99.16 99.72 99.69

Inverno 99.72 99.72 100 99.16 99.72 99.66

Paired 99.86 99.30 100 99.02 99.86 99.61

Pastel2 100 99.86 100 98.32 99.72 99.58

HSV 99.58 99.58 100 98.88 99.72 99.55

Tab 20c 99.86 99.30 100 98.32 99.72 99.44

C. Testing the result of using modulo operation in data distribution. This part presents the result of the experiment which used

modulo operation and regular partition in distributing data into subsets of training, validation, and testing. The data distribution is shown in Table III and Table IV. In this experiment, the authors used the mexican hat (mexh) as the mother wavelet to uniform the experimental data in the scalogram representation. Then used three types of colormaps and two models of data distribution (used modulo operation and regular partition). The result of the used modulo operation in dataset distribution achieved better accuracy than regular

partition. Table VII shows the accuracy rate of this experiment.

Table VII Accuracy detection with Variants and Regular of data distribution.

Dataset Partition

Accuracy (%) Acc. Rate (%) FVN LBBB NOR PVC RBBB

Jet with Variants 100 99.86 100 100 100 99.97

Jet regular 74.33 99.86 100 97.33 99.72 94.25

Viridis with Variants

100 99.58 100 99.16 99.72 99.69

Viridis regular 73.49 100 100 98.18 99.72 94.28

Hsv with Variants 99.58 99.58 100 98.88 99.72 99.55

Hsv regular 67.04 99.86 100 96.77 99.44 92.62

Table VII shows the use of modulo partition in data

distribution (Jet with Variants, Viridis with Variants, Hsv with Variants) and the regular partition (Jet Regular, Viridis Regular, Hsv Regular) in the same colormap representation. The use of jet as colormap with variants distribution achieved an accuracy rate of 99.97%. The use of Viridis as colormap with variants distribution achieved an accuracy rate of 99.69% (this part was presented in ICAST2021 [34]), and the use of HSV as colormap with variants distribution achieved an accuracy rate of 99.55%. However the use of jet as colormap with regular partition achieved an accuracy rate of 94.25%, the use of Viridis as colormap with regular partition achieved an accuracy rate of 94.28%, and the use of HSV as colormap with regular partition achieved an accuracy rate of 92.62%.

D. The report of the best-performed model in this study. This part describes the best method obtained from the

result of our experiments. After conducting an experiment with different mother of wavelets to transform the ECG signals into scalogram (wavelet coefficient), then used the different colormap to convert the scalogram (wavelet coefficient) into RGB images and distributed the data into subsets by using modulo operation and regular partition method. Finally, we found the best combination model that can improve the accuracy results of the arrhythmia classification. By experimenting with several different mother wavelets, the best results were obtained by mexican hat as the mother of wavelets. In the experiment with different colormap representations, the best result is achieved by jet colormap, and the best method in distributing data into a subset of training, testing, and validation is achieved using modulo operation.

Our study was performed by efficientnetv2-b0 model, with 1k checkpoints, and (224 x 224) input images. The number of epochs was set to 100 and used 64 of batch size. Early stopping function is applied. The testing is carried out

Page 11: Technical Paper Session - tronshow.org

using a dataset with the pre-processing method (ECG Signals Transformed by Mexican hat and jet colormap), with a total of 5703 training samples, 713 validation samples, and 713 testing samples (distributed by modulo operation). The best accuracy result of our study is 99.97%. The graph of accuracy and loss value are shown in Figure 11.

(a)

(b)

Fig. 11 (a). Graph of Accuracy Value, (b). Graph of Loss Value

In our study, the best performance was achieved by using Mexican hat (mexh) as wavelet, variants in data distribution into subsets of training, validation, and testing, and jet as a colormap. With this schema, our proposed method approaches an accuracy rate of 99.97% with the following details FVN class correctly detecting 713 samples (100%), LBBB class as many as 712 samples (99.86%), Normal class as many as 713 samples (100%), PVC class as many as 713 samples (100%), and RBBB class as many as 713 samples (100%). The confusion matrix of arrhythmia classification was shown in Figure 12.

Fig. 12 Confusion Matrix from Testing Result.

The confusion matrix in Figure 12 shows the arrhythmia classification on the test set. The total number of samples in each class is indicated inside parenthesis. Numbers inside blocks are the number of samples classified in each category. To evaluate the model from our study in more depth, we perform calculations of precision, recall, and F1-score. Precision is used to measure the degree of precision/accuracy of the model in terms of the values predicted positive, how many of them are positive. The precision is defined as:

Precision =𝑇𝑇𝑇𝑇

𝑇𝑇𝑇𝑇 + 𝐹𝐹𝑇𝑇 (8)

Where TP is True Positive, and FP is False Positive. Recall is used to measure the degree of accuracy of the model of predicting the actual positives with respect to the values which are positive. The recall is defined as:

Recall =𝑇𝑇𝑇𝑇

𝑇𝑇𝑇𝑇 + 𝐹𝐹𝐹𝐹 (9)

Where TP is True Positive, and FN is False Negative. F1-Score is used to seek balance between, previously mentioned metrics, Precision and Recall. The F1-Score is defined as:

F1 − Score = 2 xPrecision x Recall

Precision + Recall (10)

The result of Precision, recall, and F1-Score from our study is shown in Table VIII.

Table VIII Classification Report of Our Proposed Method.

Class Precision Recall F1-score

FVN 1.0000 1.0000 1.0000

LBBB 1.0000 0.9986 0.9993

Normal 0.9986 1.0000 0.9993

PVC 1.0000 1.0000 1.0000

RBBB 1.0000 1.0000 1.0000

Accuracy 0.9997

In this study, the authors also compared the classification accuracy result with existing method. Table IX compares the classification accuracy between the existing work and our method.

Page 12: Technical Paper Session - tronshow.org

Table IX The classification accuracy of existing works and our method.

It is difficult to choose the best comparison method. It is only possible to compare reports that classified the same type of arrhythmias and the same number of classes from the same data set [2]. We can only report the average accuracy from elated studies.

IV. CONCLUSION This study used the EfficientNet-V2 method to perform

the classification of five arrhythmias, including FVN, LBBB, Normal, RBBB, and PVC. The ECG database was obtained from MIT-BIH Arrhythmia Database. The ECG signal was cut each 1 second (360 data). Continuous Wavelet Transform (CWT) is employed to transform the 1D-ECG signal into a scalogram (wavelet coefficient). The dataset was distributed with a modulo operation to get variants in each subset. The colormap is applied to convert scalograms into RGB images. From the results of the tests that have been carried out, several conclusions can be drawn as follows:

1. Mexican hat (mexh) wavelet was achieved a superior accuracy rate among our testing mother wavelets.

2. The use of modulo operation in distribution of datasets, has an impact on accuracy rate. The subset with variant of data (distributed with modulo operation) achieved better accuracy than regular partition distribution.

3. The jet colormap achieved a superior accuracy rate among our testing colormaps.

This study achieved superior accuracy results than previous studies [2] with an accuracy rate of 99.97%. This method can consider used in arrythmia classification system in the future.

ACKNOWLEDGMENT The authors would like to thank the Computer Engineering

department Faculty of Intelligent Electrical and Informatics Technology (F_ELECTICS- ITS) for supporting this research.

REFERENCES [1] World Health Organisation, “Cardiovascular Diseases (cvds),” 2019,

https://www.who.int/en/news-room/fact-sheets/detail/cardiovascular-diseases-(cvds), Last accessed on 2021-10-30.

[2] A. Kurniawan et al., “Arrhythmia Classification on Electrocardiogram Signal Using Convolution Neural Network Based on Frequency Spectrum,” 2020 International Conference on Computer Engineering, Network, and Intelligent Multimedia (CENIM), 2020, pp. 29-33.

[3] A. Y. Hannun et al., “Cardiologist-level arrhythmia detection and classification in ambulatory electrocardiograms using a deep neural network,” Nature medicine, vol. 25, 2019, pp. 65-69.

[4] T. Wang et al., "Automatic ECG Classification Using Continuous Wavelet Transform and Convolutional Neural Network," Entropy (Basel), 2021, 23:119.

[5] E. Svennberg et al., “Safe automatic one-lead electrocardiogram analysis in screening for atrial fibrillation,” EP Europace, vol. 19, 2017, pp. 1449–1453.

[6] M. Shen et al., “Atrial Fibrillation Detection Algorithm Based on Manual Extraction Features and Automatic Extraction Features,” IOP Conference Series: Earth and Environmental Science, vol. 428, 7th Annual International Conference on Geo-Spatial Knowledge and Intelligence 20–21 December 2019, Guangzhou, China.

[7] S. Sahoo et al., “Machine Learning Approach to Detect Cardiac Arrhythmias in ECG Signals: A Survey,” IRBM 41, 2020, pp. 185–194

[8] U. Satija, B. Ramkumar and M. S. Manikandan, "A New Automated Signal Quality-Aware ECG Beat Classification Method for Unsupervised ECG Diagnosis Environments," in IEEE Sensors Journal, vol. 19, no. 1, pp. 277-286, 1 Jan.1, 2019.

[9] Yuefan Xu, Sen Zhang, Zhengtao Cao, Qinqin Chen, Wendong Xiao, "Extreme Learning Machine for Heartbeat Classification with Hybrid Time-Domain and Wavelet Time-Frequency Features", Journal of Healthcare Engineering, vol. 2021, Article ID 6674695, 12 pages, 2021.

Ref. Dataset Class Pre-processing

Method Accuracy

(%) Segmentation Transformation

A. Kurniawan [2] MIT-BIH Normal, RBBB, LBBB, FVN, PVC. Signal was cut into pieces for 1 second (360 data)

Spectrograms using Overlap STFT

CNN 98.60

T. Wang [4] MIT-BIH AAMI Classes (N, V, S, F) Signal was cut into pieces for 200 data

Scalogram Using CWT CNN 98.74

J. Huang [24] MIT-BIH Normal, RBBB, LBBB, PVC, APC. Signal was cut into pieces for 10 second

Spectrograms using STFT CNN 99.00

A. Ullah [25] MIT-BIH PVC, PAB, RBBB, LBBB, APC, VFW, VEB. - Spectrograms

using STFT CNN 99.11

M. Naz [26] MIT-BIH, CUDB Ventricular arrhythmias (VA)

Signal slice into 1,024-sized segment

Reshaped into 32 x 32 binary images

AlexNet, VGG-16 Inception-v3 + Cubic SVM

97.60

Enbiao Jing [28] MIT-BIH Ventricular ectopic (V) Signal sliced each 3 seconds long

Daubechies Wavelet (db8) ResNet-18 96.50

M. Wu [29] MIT-BIH Normal, RBBB, LBBB, PVC, APC. Signal was cut into pieces for 360 data

- CNN 97.41

Our method MIT-BIH Normal, RBBB, LBBB, FVN, PVC. Signal was cut into pieces for 1 second (360 data)

RGB Images Scalogram Using CWT and Color mapping

EfficientNet-V2 99.97

Page 13: Technical Paper Session - tronshow.org

[10] I. Irmakci, S. M. Anwar, D. A. Torigian and U. Bagci, "Deep Learning for Musculoskeletal Image Analysis," 2019 53rd Asilomar Conference on Signals, Systems, and Computers, 2019, pp. 1481-1485.

[11] S. M. Anwar et al., ”Medical image analysis using convolutional neural networks: A review,” J. Med. Syst., 2018, 42, 226.

[12] M. Salem, S. Taheri and J. Yuan, "ECG Arrhythmia Classification Using Transfer Learning from 2- Dimensional Deep CNN Features," 2018 IEEE Biomedical Circuits and Systems Conference (BioCAS), 2018, pp. 1-4.

[13] Ö. Yıldırım et al., “Arrhythmia detection using deep convolutional neural network with long duration ECG signals,” Comput. Biol. Med., 2018, vol. 102, pp. 411–420.

[14] Y. Wu et al., “A comparison of 1-D and 2-D deep convolutional neural networks in ECG classification,” Conference proceedings : Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society, Annual Conference 2018, 2018, pp. 324-327.

[15] J. Zhao, X. Mao, and L. Chen, “Speech emotion recognition using deep 1D & 2D CNN LSTM networks,” Biomedical Signal Processing and Control, vol. 47, pp. 312–323, Jan. 2019.

[16] T.Virtanen, E. Vincent, S. Gannot, “Time-frequency processing - Spectral properties,” Audio source separation and speech enhancement, Wiley, 2018, 978-1-119-27989-1. hal-01881426.

[17] P. Bing, W. Liu and Z. Zhang, "DeepCEDNet: An Efficient Deep Convolutional Encoder-Decoder Networks for ECG Signal Enhancement," in IEEE Access, vol. 9, pp. 56699-56708, 2021.

[18] Barmase, Swapnil, S. Das and S. Mukhopadhyay, “Wavelet Transform-Based Analysis of QRS complex in ECG Signals,” ArXiv abs/1311.6460, 2013.

[19] P. S. Addison, ‘‘Introduction to redundancy rules: the continuous wavelet transform comes of age,’’ Philos. Trans. Ser. A, Math. Phys. Eng. Sci., vol. 376, Aug. 2018, Art. no. 20170258. [Online]. Available: doi: 10.1098/rsta.2017.0258.

[20] M. Guo, X. Zeng, D. Chen and N. Yang, "Deep-Learning-Based Earth Fault Detection Using Continuous Wavelet Transform and Convolutional Neural Network in Resonant Grounding Distribution Systems," in IEEE Sensors Journal, vol. 18, no. 3, pp. 1291-1300, 1 Feb.1, 2018, doi: 10.1109/JSEN.2017.2776238.

[21] Rogowitz, Bernice E. et al., “How not to lie with visualization,” Computers in Physics 10, 1996, pp. 268-273.

[22] V. R. Joseph and A. Vakayil, Split: An optimal method for data splitting, arXiv preprint arXiv:2012.10945, 2020.

[23] Ali Haider Khan, Muzammil Hussain, Muhammad Kamran Malik, "Arrhythmia Classification Techniques Using Deep Neural Network", Complexity, vol. 2021.

[24] J. Huang, B. Chen, B. Yao and W. He, "ECG Arrhythmia Classification Using STFT-Based Spectrogram and Convolutional Neural Network," in IEEE Access, vol. 7, pp. 92871-92880, 2019.

[25] A. Ullah, S. M. Anwar, M. Bilal, and R. M. Mehmood, “Classification of Arrhythmia by Using Deep Learning with 2-D ECG Spectral Image Representation,” Remote Sensing, vol. 12, no. 10, p. 1685, May 2020.

[26] M. Naz et al., “From ECG signals to images: a transformation based approach for deep learning,” PeerJ. Computer science, vol. 7 e386, 10 Feb. 2021.

[27] M. Tan, Q. V. Le, “EfficientNetV2: Smaller Models and Faster Training,” arXiv:2104.00298v1 [cs.CV], 2021.

[28] Enbiao Jing, Haiyang Zhang, ZhiGang Li, Yazhi Liu, Zhanlin Ji, Ivan Ganchev, "ECG Heartbeat Classification Based on an Improved ResNet-18 Model", Computational and Mathematical Methods in Medicine, vol. 2021, Article ID 6649970, 13 pages, 2021.

[29] M. Wu et al., “A Study on Arrhythmia via ECG Signal Classification Using the Convolutional Neural Network,” Frontiers in computational neuroscience, vol. 14 564015, 5 Jan. 2021.

[30] Z. Zhao et al., "Noise Rejection for Wearable ECGs Using Modified Frequency Slice Wavelet Transform and Convolutional Neural Networks," in IEEE Access, vol. 7, pp. 34060-34067, 2019.

[31] P. Cau et al., “A novel data augmentation method to enhance deep neural networks for detection of atrial fibrillation,” Biomedical Signal Process and Control, vol. 56 101675, 2020.

[32] S. Alladi, “Augmenting Electrocardiogram Datasets using Generative Adversarial Networks,” MSc Thesis, Faculty of The Graduate School of The University of Minnesota, 2020. [Online]. Available:https://irvlab.cs.umn.edu/sites/irvlab.dl.umn.edu/files/santhosh_thesis_final.pdf

[33] P. Silva et al., “Towards better heartbeat segmentation with deep learning classification,” Sci Rep 10, 20701, 2020. [Online]. Available: https://doi.org/10.1038/s41598-020-77745-0

[34] Muhammad Furqon et al., “Classification of Arrhythmia by Using EFFICIENTNETV2 with 2-D Electrocardiogram Spectral Image Representation,” The 16th International Student Conference on Advanced Science and Technology (ICAST 2021), no. 10-4, 2021.

[35] K. Kaur, R. Dhir and K. Kumar, "Transfer Learning approach for analysis of epochs on Handwritten Digit Classification," 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC), 2021, pp. 456-458, doi: 10.1109/ICSCCC51823.2021.9478102.

[36] G. Beatty, E. Kochis and M. Bloodgood, "Impact of Batch Size on Stopping Active Learning for Text Classification," 2018 IEEE 12th International Conference on Semantic Computing (ICSC), 2018, pp. 306-307, doi: 10.1109/ICSC.2018.00059.

[37] C. Corneanu, M. Madadi, S. Escalera and A. Martinez, "Explainable Early Stopping for Action Unit Recognition," 2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020), 2020, pp. 693-699, doi: 10.1109/FG47880.2020.00080.

[38] Lee et al., “PyWavelets: A Python package for wavelet analysis. Journal of Open Source Software,” 2019, 4(36), 1237, https://doi.org/10.21105/joss.01237.

[39] Qi Meng et al., “Convergence analysis of distributed stochastic gradient descent with shuffling,” Neurocomputing, vol. 337, pp. 46-57, 2019, doi: 10.1016/j.neucom.2019.01.037.

[40] L. Fassina et al., “A Random Shuffle Method to Expand a Narrow Dataset and Overcome the Associated Challenges in a Clinical Study: A Heart Failure Cohort Example,” Frontiers in Cardiovascular Medicine, vol. 7, pp. 263, 2020, doi: 10.3389/fcvm.2020.599923.

[41] J. D. Hunter, "Matplotlib: A 2D Graphics Environment," Computing in Science & Engineering, vol. 9, no. 3, pp. 90-95, 2007.

[42] N. Nonaka and J. Seita, "Electrocardiogram Classification by Modified EfficientNet With Data Augmentation," 2020 Computing in Cardiology, 2020, pp. 1-4, doi: 10.22489/CinC.2020.063.

Page 14: Technical Paper Session - tronshow.org

ISBN978-4-89362-375-1 (C) 2021 TRON Forum

HARNESSING IOT TECHNOLOGY FOR THE

DEVELOPMENT OF WEARABLE CONTACT

TRACING SOLUTIONS

Acharya Rex

Dept. of Computer Science

Sam Houston State University

Huntsville, TX, USA

[email protected]

Baza Mohamed

Dept. of Computer Science

College of Charleston

Charleston, SC, USA

[email protected]

Rasheed Amar

Dept. of Computer Science

Sam Houston State University

Huntsville, TX, USA

[email protected]

Mozer-Sallo Louanne

Dept. of Computer Science

Sam Houston State University

Huntsville, TX, USA

[email protected]

Varol Hacer

Dept. of Physics, Engineering, and

Astronomy

Stephen F. Austin State University

Nacogdoches, TX, USA

[email protected]

Mahapatra Rabi

Dept. of Computer Science and

Engineering

Texas A&M University

College Station, TX, USA

[email protected]

Abstract— Advancements in mobile computing and

embedded system technologies show superiority in controlling

the transmission of a virus during the COVID-19 pandemic.

They provide rapid contact data compared to manual contact

tracing and medical monitoring methodologies. Data tracing

capabilities were achieved by existing technologies via the

utilization of smartphone-based exposure notifications systems

and proximity sensing tools based on Bluetooth/GPS. Such

systems lack user privacy and data anonymization capabilities,

it also requires that users have continuous access to

smartphones. This paper proposes the development of a

lightweight wearable prototype for contact tracing. The

proposed system is based on the deployment of an IoT

development board, incorporated with a Bluetooth chipset for

proximity sensing. To overcome the problem of user-to-

smartphone accessibility, the processing of contact data by the

exposure notification system has been migrated from mobile

computing to a contact tracer management server that is

managed by the community. Daily contact exposures to the virus

are recorded by each user’s contact tracing system and stored

in the user’s blockchain. Data integrity and immunity against

data injection attacks were achieved via the implementation of

lightweight block chaining and validation schemes. Data

anonymization was also supported via the utilization of the

onboard AES crypto engine. Meanwhile, support for user

anonymity was incorporated into the proposed system through

the implementation of an anonymous authentication protocol

based on the Zero-Knowledge Proof (ZKP) approach. Finally,

we have analyzed the performance of the system in terms of

power consumption under various systems settings, such as

encryption key size and the required number of ZKP validation

attempts per authentication session.

Keywords—IoT, Zero-Knowledge Proof, Contact tracing

I. INTRODUCTION

The latest Coronavirus pandemic has reshaped the way we

do business, a new era of workplace that supports a healthy

workforce and business operations continuities has been

established. Technologies that support contact tracing

capability [1], [2], [3] and automated social distancing

tracking have become an integral part of today’s work

environment. Two existing technologies that offer

comprehensive solutions for incorporating contact tracing

services into today’s workplace are (i) proximity tracking

technology [4] (ii) GPS-enabled technology [5]. Both

technologies rely on users’ accessibility to existing resources,

such as smartphones and cellular communication

availabilities. These technologies utilize the sensing

capability of a smartphone to compute proximity and identify

any exposure to an individual with COVID-19 positive. They

use Bluetooth and GPS features to measure individual-to-

individual proximity.

Contact tracing solutions based on proximity tracking

tools have been implemented in several countries. Such

technologies are effective to decrease manual contact

processing, accelerating the identification of positive cases

within a community, and helping facilitate rapid

dissemination of contact tracing data to individuals.

Additionally, temporal data augmented with proximity

sensing data could be fully utilized by contact tracer

management systems to locate, detect, and rapidly isolate

areas within communities and workplaces that have a high

exposure rate to the virus.

Although, empirical data that investigates the

performance of these technologies shows the usefulness and

effectiveness of such systems. They still have some of the

following disadvantages:

Socioeconomic and technology acquisition biases. Users

need to have access to a smartphone and cellular data

communication services. Individuals require to know

how to install and run apps.

The optimal result could not be achieved without the

support of widespread adaptions of these contact tracer

technologies by everyone in a community.

All individuals in a community or a workforce must

maintain continuous access to their smartphone devices

and cellular communication services.

Specific functions on the smartphone must be always

enabled to provide accurate contact tracing results. This

includes Bluetooth and GPS features. The latter might

create conflict with other applications settings,

specifically settings related to user privacy and location

sharing.

Data privacy, data confidentiality, and unauthorized

access. Sensitive user data including user’s location data

Page 15: Technical Paper Session - tronshow.org

are shared with an online contact tracer management

system. Users’ temporal data stored on the management

systems could be comprised and utilized to track user

locations [6], [7].

This research effort presents a wearable IoT platform that

enables contact tracing among individuals of a community

while preserving users’ data privacy and users’ anonymity. In

addition to providing users’ anonymity and data privacy, data

integrity for contacts exposure was achieved through the

integration of a block chaining approach. The proposed

system offers a cost-effective, energy-efficient, and phone-

independent contact tracing mobile solution. It provides

contact tracing capability for the workspace that cell service

is inaccessible (e.g., underground mining field, offshore oil

and gas operations, etc.). Unlike existing smartphone-based

exposure notification systems, the proposed technology will

be able to provide contact tracing services for controlled

communities and workspace. Specifically, monitoring

employees’ and workers’ exposure to the virus in their

workplaces, factories, students, and staff members in

educational institutions, and including senior home

communities.

Our main contribution in this paper is the development of

a wearable IoT-based prototype that is capable of tracking

user daily contacts and determining possible exposures to the

virus within a community or a workplace (see Fig. 1). The

proposed system is capable of logging hundreds of contact

tracing data using the device's internal memory. We utilize a

proximity sensing approach that makes use of the device’s

built-in Bluetooth feature to generate contact tracing data. A

user of the system will be able to discover possible exposure

to the virus by streaming the device's daily logs into an online

management tracer system. In this research, we have

considered an online contact tracer management system that

is capable of obtaining daily health status related to Covid-19

positive cases in a community/ workplace. Data collected via

the IoT-based tracer system is cross-referenced with data

obtained via the online contact tracer management system.

An exposure notification system is implemented to alert the

user for any possible exposure to the virus that occurred

during the last 24 hours.

The following technological capabilities were

implemented and integrated into the proposed IoT system:

User Anonymity: A lightweight interactive Zero-

Knowledge Proof scheme [8] is developed and

implemented on the proposed testbed. The scheme

supports the non-disclosure of devices’ IDs during data

generation. Devices’ IDs were obfuscated via the ZKP

scheme to provide resiliency against the device’s

spoofing attacks.

Anonymous Community Based Authentication: We

achieve anonymous authentication among users in a

community through the support of the ZKP scheme.

Devices’ IDs are used by the ZKP scheme to establish

unique authentication parameters for each device

deployed in the community. During devices’ contacts,

two devices will be able to authenticate each other

without revealing their authentication parameters.

Data Privacy: Resiliency against device-specific attacks

is supported in the proposed system. We have considered

the case where a malicious actor will be able to map a

unique ZKP parameter to a specific user in a community

(e.g., utilizing ZKP proofs data during device

authentication for device identification). Captured

information could be used to induce the current health

status of a user under attack and whether he/she is Covid-

19 positive/ negative.

To prevent the above attack, devices’ IDs are randomly

assigned by an online contact tracer management system

daily. This will present the attacker with a moving target.

Data Confidentiality: Contact tracing data is protected

via the utilization of AES encryption/Decryption engine.

Data computed during proximity exposure were ciphered

using the onboard AES-128, AES-192, or AES-256

encryption/decryption engine. The encrypted data is then

stored in the device’s internal memory. AES

encryption/decryption keys are preloaded into users’

devices before deployment. AES encryption/decryption

keys are shared with the online contact tracer

management system.

Data Integrity via Block Chaining Approach: To

maintain data integrity, we have developed and

implemented a lightweight block chaining scheme [9].

The proposed scheme uses a similar approach to the

blockchain when generating contacts tracing data blocks.

In our implementation, each block i was developed using

the device ��� , timestamps �� , Hash of the last block in

the chain �� , user’s health status related to Covid-19

{��� ∈ | � �1, 0�� , where ��� � 1 indicate the

user is Covid-19 positive and ��� � 0 refers to Covid-

19 negative. Blocks are hashed via SHA-256 and stored

in the device's internal memory.

We have analyzed the performance of the proposed

system by measuring the device’s power consumption during

runtime under various encryption/decryption key lengths. We

have estimated the device’s dynamic power dissipation with

predefined ZKP protocol configuration parameters.

This paper is organized as follows: Section II provides

preliminaries and related works. Section III describes

hardware components that are used to design and implement

Fig. 1 Contact tracing in a workplace

Contact tracing

Page 16: Technical Paper Session - tronshow.org

the proposed contact tracing system. Section IV presents

threat models. Section V introduces security primitives and

techniques used to support user anonymity and

authentication, data privacy, data anonymization, and data

integrity. Section VI describes the performance analysis of

the proposed system under various device settings. Section

VII concludes the paper and describes future research

directions.

II. PRELIMINARIES AND RELATED WORKS

This section introduces two main techniques which are

fully designed and implemented on the proposed testbed (i)

an interactive ZKP protocol (ii) a lightweight block chaining

scheme.

A. The Interactive ZKP Protocol

Zero-Knowledge Proof [8],[9], [10] is an interactive

scheme that allows two systems, one called the prover P, and

the other system is called the Verifier V. ZKP system enables

a system acting as prover to prove his identity many times to

a verifier V using polynomial validation approach. ZKP

system prohibited a verifier V from misrepresenting himself

as a prover to someone else. During the ZKP approach,

multiple proofs are computed by the prover and

communicated to the verifier. The number of proofs that are

required for successful validations is predefined in the ZKP

protocol. ZKP system offers a tradeoff between scheme

efficiency and security requirements. For each system

participating in the ZKP protocol, a secret key �� is

established and �� � ������ � is computed and published

over the network where m is chosen to be the product of two

large prime numbers of the form 4� + 3. In the ZKP scheme,

�� serves as wittiness for whether a certain number is a

quadratic residue or quadratic non-residue (��� �) without

revealing a signal bit of information related to the secret key

�� . In this research, anonymous authentication and user

privacy were achieved via the implementation of ZKP on an

IoT development board. Dynamically assigned devices’ IDs

were established via the deployment of ZKP secret keying

information.

ZKP provides a lightweight identification mechanism, it

is suitable for power-limited devices, smart card

technologies, and IoT platforms. For a preselected set of ZKP

configuration parameters, the ZKP protocol will be able to

reach about two orders of magnitude of the processing speed

of an RSA-based authentication scheme. Section V provides

a full description of the implemented ZKP scheme. It presents

how the ZKP system can be used to support authentication

and user anonymity for the proposed wearable contact tracer

platform.

B. Chaining Technique for Data Blocks

Blockchain is a decentralized system [11], [12], [17-20]

that’s composed of shared and immutable public or private

ledgers. Transaction records are computed and stored on

public/private ledgers. Blocks or transaction records are

timestamped, encrypted, and linked together. Each block is

linked to the previous block in the chain through the

implementation of a cryptographic hash function. Since

blocks are cryptographically linked together in the chain, it

makes the system immutable against data injection and data

modification attacks. To support resiliency against data

injection and data modification attacks on the proposed

system, we have adopted a blockchain-based approach. In

this research effort, contact tracer management servers will

act as private ledgers. Blocks generated from each user’s

device will be timestamped, secured, and cryptographically

bonded to the previous data block. The timestamp of a block

is calculated based on the recording of the time for which two

devices become close to each other. In the proposed system,

a user's daily contact exposure data will be added to the user

contact’s tracing blockchain. Users’ blockchains are stored

and maintained by the contact tracer management system.

Daily contact exposure data blocks are recorded by the user’s

blockchain. A user’s blockchain captures all contact exposure

blocks that occurred within a 14-days period, which is based

on the Covid-19 virus incubation period. Users’ blockchains

are dynamically updated by the private ledger (contact tracer

management system). Users’ blockchains are verified daily

to capture contact exposure data blocks that might be expired

within the last 14-days. All expired contact exposure data

blocks will be removed from the user’s blockchain, the

blockchain will get updated by the contact tracer management

system.

In this paper, a lightweight blocks chaining algorithm is

implemented on the proposed testbed. A total of 1000 daily

contact exposure data blocks can be generated and logged

into the device's internal memory. To ensure the integrity of

users’ chains, new data blocks will be verified by the private

ledger via reconstruction of the blocks before adding them to

the chains. The contact tracer management systems will

recompute each block transmitted from the user’s contact

tracing device using the block raw data and a hash value of

the previous block in the chain. Section V illustrates the

proposed implementation for the block chaining technique.

III. HARDWARE AND SOFTWARE DEVELOPMENT TOOLS FOR

THE PROPOSED TESTBED

A. Hardware and Data Acquisition Tool

Bluetooth Module for Proximity Sensing: We achieved

proximity sensing exposure measurement capability

through the integration of the PmodBT2 Bluetooth

module. PmodBT2 module [13] employs the Roving

Network RN-42. It is compatible with Bluetooth

2.1/2.0/1.2/1.0. The module provides wireless

capabilities based on Class 2 low power Bluetooth radio

Streaming of data blocks and proximity sensing

measurement features is provided by the PmodBT2

module. Data transmitted via the PmodBT2 is secured by

a 128-bit hardware-based encryption engine. As

illustrated in figure 2, we have utilized the 12-pin port

with a UART interface to achieve serial communication

between the IoT development board and the PmodBT2

module.

IoT Development Board: The proposed contact tracing

device (see Fig. 2) will be based on the deployment

Freedom-K64 development board. FRDM-K64

development board [14] was selected to develop our

proposed system due to being an ultra-low-cost

development board.

Page 17: Technical Paper Session - tronshow.org

The board is capable of supporting multiple serial

communication ports which enables rapid prototyping

and integration for the development of IoT technologies

[21]. In addition to serial communication, the board

comes integrated with 6-axis digital accelerometer and

magnetometer sensing engine. The storage capability is

another attractive feature for us to consider when

developing the contact tracing system. Storage is

expandable through the integration of a microSD card

slot, which means data blocks generated during contact

exposure could be logged into the device's flash memory.

Meanwhile, connectivity for the FRDM-K64 is

supported using the onboard Ethernet port and headers

for the integration of Bluetooth or a 2.4 G radio module.

In this research, our testbed is based on Kintetis K24-120

MHz with 256KB SRAM Microcontroller based on the

Arm Cortex-M4 Core. Block generations, hash value

computation based on SHA-256, and storing of blocks

information will be handled via the proposed FRDM-

K64 development board. Techniques that enable the

chaining and generation of new data blocks are

developed and deployed on the proposed IoT

development platform.

Dynamic Power Consumption Measurement Platform:

To measure the performance of the proposed system, we

have measured the device’s power consumption during

runtime. Power consumption data were collected under

various configuration parameters of the ZKP protocol

and different sizes of the encryption keys. We have used

a power profiling and power optimization system for

measuring our testbed’s power consumption during

runtime. Power Profiler Kit II (PPK2) [16] is a current

measurement tool for embedded development. The kit

provides us with power debugging capability to estimate

the battery lifetime of the Device Under Test (DUT). The

PPK2 was able to supply and measure the current of the

proposed DUT. It has a programable voltage regulator

with 0.8V to 5V supply voltage and up to 1A current

supply. PPK2 ensures a current range between 200nA to

1A and with a resolution that varies between 100nA and

1mA.

B. Software Development Tools

Mbed OS [15] provides us with a rich development

environment for coding a deploying energy-efficient and

computational-constrained solutions. It enables rapid

prototyping for new technologies deployed on low-ended

devices. Since the wearable contact tracing solution proposed

herein must be capable of logging and streaming hundreds of

data blocks daily, our system must be able to provide energy-

efficient computation and at a lower device cost.

Anonymous authentication based on the ZKP protocol and

chaining and generation of the user’s data block was designed

and developed using embedded C/C++. Algorithms proposed

in this research were developed with the support of the Mbed

OS open-source operating system for the IoT Cortex-M

development board. The application that implements contact

tracing on the proposed testbed was coded using the Arm

Mbed OS APIs. We have utilized the Arm Mbed online

toolset for software development and deployment.

IV. THREAT MODELS

The proposed contact tracing system was incorporated

with multiple defense mechanisms that protect the following

threat models:

Device Cloning Attacks: A user’s contact tracing device

that is captured by a malicious actor is replicated during

these attacks. Contact exposures daily logged including

the device’s ID can be copied to create multiple clones

of the compromised device. Clone devices could be

placed in areas where human traffic flow is high (e.g.,

dining halls, classrooms, meeting rooms, etc.). Using of

cloned devices enables a malicious actor of injecting

faulty data into the user’s contact tracing data logs,

making the system unreliable. Additional to injecting

false data, a cloned device could be optimized by the

adversary to perform replay attacks. We achieved

PmodBT2 (Bluetooth module) pinout [13] FRDM-K64 development board pinout

Fig. 2: Contact Tracing development platform

Page 18: Technical Paper Session - tronshow.org

resiliency against device cloning attacks via the

development of a block chaining approach. Contact

exposure data blocks captured during the day are

validated one by one and inserted into the user’s

blockchain by the contact tracer management system.

Data generated from the last contact exposure is

concatenated with a hash of the previous block. The

latter is hashed by the contact tracer management system

and loaded into the device’s internal memory. Section V

provides a full description of the implemented block

chaining algorithm.

Device Spoofing Attacks: We have considered the case

where an adversary spoofs a device ID to inject false

contact tracing data into other users’ blockchains. To

prevent such attacks, the proposed testbed is integrated

with a mechanism that allows each device to be assigned

to a unique ID. Devices’ software IDs are randomly

chosen from a pool of precomputed IDs. In addition to

randomly assigned device software IDs. Contact Tracing

devices are randomly picked by users to prevent users’

tagging based on hardware ID discovery. Assignments

of random device’s ID provide the adversary with a

moving target with a probability of guessing the correct

device’s ID of 1/n where n represents the pool size. We

assumed " ≫ $, where k indicates the total number of

contact tracer systems deployed in a community.

Data Modification Attacks: Data blocks that captured the

contact exposure between two users are vulnerable to

data modification attacks. An attacker will be able to

modify the data in transit. To protect against data

modification attacks, data blocks were stored in each

device's internal memory in encrypted form. We have

utilized the AES-256 encryption engine to provide data

privacy and resiliency against data modifications.

V. THE PROPOSED SECURITY SCHEMES

The following security schemes were developed and

deployed on the proposed testbed:

A. User Anonymity and Authentication

We achieve users’ anonymity via the implementation of a

lightweight interactive ZKP approach. To prevent users from

identifying other users in the community, the following

cryptographic techniques were developed:

User Anonymity: Users’ devices IDs are dynamically

chosen from a pool of precomputed IDs. To prevent a

malicious actor from identifying a subject based on

discovering his/her device hardware ID or Bluetooth

MAC address. We have considered the case where

contact tracing devices are assigned randomly to users

daily. Before devices assignments, software-based IDs

are computed and preloaded into each user contact tracer

system by the contact tracer management system. To

defend against spoofing attacks, devices IDs are updated

daily.

Anonymous authentication: An authentication protocol

was developed and implemented on the proposed

testbed. The protocol enables two users’ devices to

communicate with each other without revealing their

identification information. To prevent the disclosure of

devices IDs during the contact exposures data process,

IDs were used by the ZKP protocol to compute ZKP

proofs. In the proposed protocol, a device IDj is

composed of concatenating m-secrets,

�%,�||, … , ||�',� .During the ZKP protocol initialization

phase, a pool of n-devices IDs is computed by the contact

tracer management system. In the proposed system, we

have considered " ≫ $ , where k refers to the total

number of contact tracing devices deployed in a

community. Quadratic residues mod N for each valid

device’s IDj is computed by the contact tracer

management system. Computed quadratic residues for

daily assigned devices’ IDs are published to each contact

tracing device. The following steps will take place during

the ZKP protocol initialization phase:

( � ±��*��� �)

+,� � ( ∙ . ��,∗01

01

*��� �)

(� � +,� ∙ . 2∗,�01

01

*��� �)

Binary vector (b0, …, b

m-1)

Fig. 3: ZKP protocol for anonymous authentication and

systems intialization

2

1

3

4

�2%%, … , 2%'�

32�%, … , 2�'4 325%, … , 25'4

326%, … , 26'4

32%%, … , 2%'4 32�%, … , 2�'4 325%, … , 25'4

326%, … , 26'4 …

3�%,� , … , �',� 4 3�%,7 , … , �',7 4

Assigned secrets

for device x

Assigned witnesses

Assigned secrets

for device y

Contact Tracer server

with blockchain

Contact exposure

ZKP

Authentication

Distribution of

device’s IDs

Devices are randomly

assigned by the server

�8 ��� ��� �9 ��7 ��: ;<8 ;<9

=� � >?�*;<8)

=7 � >?:*;<9)

@� � �*;<8||�*;<��)

@7 � �*;<9||�*;<�7) ��7

���

Fig. 4: Data exchanges during contact exposure

Data

block

Page 19: Technical Paper Session - tronshow.org

The contact tracer management system randomly

chooses an ID pool of n-precomputed IDs for each

device deployed in the community (see Fig. 3). Each

device IDj is composed of m-secrets.

Multiplicative inverses of modular squares for each

of the m-secrets for a device IDj is computed as 2�,� �±1/��,��*��� �) for i =1, …, m;

For every assigned device IDj, witnesses 2�,% ,

…,2�,' are computed for the m-secrets.

For k number of devices deployed, IDs witnesses’ �2%%, … , 2%'�, �2�%, … , 2�'�, … . , �26% , … , 26'� are

published and stored into each user device.

When two users’ devices are near each other, the two

devices rely on the ZKP protocol for anonymous

authentication. To achieve mutual authentication, the ZKP

protocol will be executed twice. During a single ZKP session,

one device will act as a prover and the second device will act

as a verifier. A prover tries to prove his identity to the verifier

by effectively supporting evidence that it holds the correct set

of m-secrets. A device that was acting as a prover during the

first ZKP session will be serving as a verifier during the

second ZKP session. The following steps are performed

during a single authentication session:

1. A device acting as a prover generates a random value

( � ±��*��� �) and send the value R to the

verifier.

2. The verifier node produces a randomly generated

binary string of m-bits, one bit per secret �∗,�. It sends

the binary string to the prover.

3. A device acting as the prover computes the response

+,� � ( ∙ ∏ �∗,�0D0D *��� �) and transmits the +,�

to the verifier.

4. The verifier solves and verifies that (� � +,� ∙∏ 2∗,�0D0D *��� �)

5. The above steps will be iterated E times, where 1≤G ≤ E . Parameter E represents the total number of

ZKP iterations required to authenticate a device.

Since each device’s ID is being randomly chosen from a

pool of precomputed IDs. These daily updates of the devices’

IDs will prevent a malicious actor from utilizing the ZKP

witness data used during the authentication process to learn

the identity of another system in the community.

B. Data Privacy

The proposed system support data privacy through the

deployment of an AES encryption/decryption scheme. AES

encryption along with the device ID is randomly assigned by

the contact tracer management system. Data related to Covid-

19 infection status will be encrypted by each user’s tracing

device using the onboard AES encryption engine. Encrypted

data will be transmitted to other users’ devices during a

contact exposure process. User’s devices won’t be able the

learn the virus infection status of other users in the

community. The proposed system ensured that each user will

only be able to learn whether he/she was exposed to the virus

or not while keeping users’ with Covid-19 infection status

protected. This will prevent a malicious actor in a community

from injecting or modifying the health statuses of other users

in the community.

C. Chaining of Data Blocks

The proposed system was integrated with a lightweight

block chaining scheme. The onboard block chaining scheme

provides full immunity against data modification and data

injection attacks. The scheme also supports resiliency against

device replication and data replays attacks.

Contact Exposure: During the contact exposure process,

two devices, such as x and y securely exchange data blocks

related to the users’ virus infection status. The following steps

were implemented for secure data exchange between two

devices (see Fig. 4):

1. Device x generates a data block ;<8 . Block ;<8 is

composed of the device IDx, Timestamp �8, a hash of

the last block ;<� , and the user’s virus infection status

{��� ∈ | � �1, 0��, where value 1 indicates the

user is Covid-19 positive and value 0 refers to Covid-

19 negative. Similarly, device y with IDy generates a

block ;<9 .

2. Device x computes =� � >?�*;<8) , where =

represents a block ;<8 encrypted with an AES-256

encryption key H� .it’s also computes @� ��*;<8||�*;<��), where @� is a hash of the current

block ;<8 concatenated with a hash value of the last

block. Similarly, device y computes @7, =7.

3. Devices x and y exchange their computed values IDx,

=�, @�, IDy, @7, =7 with each other.

Detection Mechanism for Coronavirus Exposure: In the

proposed system, identification of possible exposure to the

novel Coronavirus was achieved through the implementation

of the block chaining approach. We have considered the

utilization of a contact tracer management server to store

direct person-to-person contact activities of users. To ensure

the integrity of the tracing process, we have adopted a block

chaining methodology. Direct person-to-person events were

captured via the deployment of user-specific blockchains.

Each user’s blockchain was implemented to keep all tracing

events that were collected during the last 14 days. The

chaining of the blocks provides full immunity against data

modification and data injection attacks. Detection for replay

attacks was also incorporated into the proposed system. For

example, when user x made direct contact with other users

(e.g., users y and z) in the community, contact exposure data

blocks are generated and stored in the user’s x contact tracing

device. Hash values of the blocks are computed and verified

using blockchains for users (users y and z) who had

established close contact with the user’s x. Data blocks were

examined to ensure no block duplicates will be inserted into

the user’s blockchain. The following protocol was

implemented into the proposed testbed to protect against

block replication attacks, including data modification and

data injection threats. Data blocks collected during user x

exposure to users y and z are verified with users y and x

blockchains. During the data exchanges process between user

x and the contact tracer management system.

Page 20: Technical Paper Session - tronshow.org

• User x sends =7, @7, =I, and @I to the contact tracer

management system.

• The contact tracer management system recomputed @7

by (i) decrypting =7 to obtain data block ;<7 ��?:*=7) (ii) accessing user y’s blockchain to extract

the last block ;<�7 (iii) Computing @7J ��*;<7||�*;<�7) (iv) comparing if @7J= @7 , then the

new block @7 is added to user x’s blockchain.

Similarly, @I is verified using user z’s blockchain

before adding the new block to user x’s blockchain.

• After adding all contact tracing blocks into user x’s

blockchain, the newly computed last block in the chain

is sent by the contact tracer management system to

user x.

One shortcoming of the above protocol is that it is still

vulnerable to replay attacks. For example, if user y’s contact

tracer device was not deployed in the community during the

last 24-hour. A malicious actor can still utilize a user’s y data

block to inject false data into other users’ blockchains. Since

the last block in user’s y blockchain remain the same from the

last contact exposure event in which user y had made direct

contact with other users in the community. To overcome the

above vulnerability, we have enhanced the resiliency of the

proposed protocol against block replication by injecting a

random dummy block to the user’s blockchain every time a

user’s contact tracing device is not deployed in the

community during the last 24-hours. With the enhanced

protocol, users’ blockchains are updated daily to prevent an

adversary from using clone devices to inject replicated blocks

to other users’ blockchains. Finally, in the case of hardware

/software failure of the contact tracer device, daily recorded

contact tracing data will not be encoded into the user

blockchain, and hence contact exposure information might be

irretrievable. To mitigate this issue, the blockchain server can

conduct daily maintenance operations by using users’

blockchains to identify missing data blocks. Users'

blockchains are compared with each other to detect missing

blocks.

Fig 5. The proposed testbed with the power measurement tool

VI. PERFORMANCE ANALYSIS OF THE PROPOSED SYSTEM

We have analyzed the performance of the proposed

system by measuring the device power consumption under

various configuration parameters, encryption key sizes, and

several ZKP validation attempts, E. Power consumption data

were collected in a lab environment. In our power analysis,

the effect of data retransmission on the overall device’s

power consumption due to communication noise was

considered in this paper. In the proposed testbed (see Fig. 5),

we have utilized the Power Profiler Kit II platform and nRF

connect framework, specifically the power profiler app to

measure the power consumption of the proposed testbed. Fig.

5. Illustrates our system set up to capture the device’s power

consumption under different settings. In this research, two

contact tracing platforms were employed, each device was

loaded with a set of data that is randomly generated during

the device initialization phase. To measure the device’s

power consumption, we run the Power Profiler Kit II in

ampere meter mode, in which it supplies 3.3v regulated

voltage to one of the devices. Since each device is required to

establish mutual authentication with other devices in the

community before the exchange of contact exposure data,

power consumption related to the authentication process is

critical in determining the system's overall performance. We

have analyzed the device’s power consumption when acting

as a prover and verifier during the ZKP authentication

process. Fig. 6a shows the power consumption signals in the

time domain for a device acting as a verifier and prover. Fig.

6b presents the kernel density functions of the device power

consumption for both verifier and prover with E � 5. The device power consumption data were collected during

the contact exposure process. We tested the proposed system

under various AES encryption engines. We have measured

the device’s power consumption during sending and

receiving data. Fig 7a illustrates the kernel density function

estimation for the device’s power consumption during data

reception with AES-128, AES-192, and AES-256 encryption

engines. Fig 7b presents the k-density estimation for the

device power consumption when transmitting data during the

contact exposure process. Power consumption data were

collected under various encryption engines (AES-128, AES-

192, and AES-256). Finally, we have measured the device’s

total power consumption for a single contact exposure with

AES-128 data encryption, including power consumed during

the ZKP-based authentication scheme. Fig. 8 presents the

total power consumption signals for a device sending and

receiving data.

Table I presents the device average power consumption

during contact exposure and ZKP-based authentication.

Table I: Device peak and average power consumption during contact

exposure and authentication with various AES implementation

Schemes

Device power consumption

Average power

consumption

(W)

ZKP Authentication

ZKP verifier 0.127914

ZKP Prover 0.110483

Data exchange

during the contact

exposure

process

Sending data with AES-128 0.105976

Sending data with AES-192 0.099672

Sending data with AES-256 0.098703

Receiving data with AES-128 0.166063

Receiving data with AES-192 0.167604

Receiving data with AES-256 0.167632

PPK2

Contact tracing device

Power

measurement tool

Page 21: Technical Paper Session - tronshow.org

Fig. 7: Device’s power consumption during sending and receiving under various AES encryption engines (AES-128, AES-192, AES-256)

Fig.6: Device’s power consumption during ZKP-based authentication

a b

a b

Fig. 8: Device’s total power consumption during contact exposure and ZKP-based authentication with AES-128

ZKP prover Device receiving data

Device sending data ZKP verifier

Page 22: Technical Paper Session - tronshow.org

VII. CONCLUSION AND FUTURE WORKS

This research proposed the development of a lightweight

contact tracing solution that monitored a person's daily

exposure to the coronavirus in the workplace. The

proposed testbed is capable of offering data privacy, user

anonymity, data integrity, and undependability from

smartphone solutions. Data privacy was implemented into

the proposed system via the deployment of various AES-

based encryption engines. Data accessibility was only

supported via the contact tracer management server,

restricting users of the system from learning other users’

private data. User anonymity and anonymous

authentication were integrated into the proposed testbed by

incorporating an anonymous authentication protocol based

on ZKP. To ensure that ZKP authentication parameters

cannot be utilized by a malicious actor to discover users’

identities, ZKP authentication parameters were randomly

assigned by the contact tracer management system daily.

Immunity against data injection and data modification

attacks were also supported by the proposed testbed. We

have implemented a block chaining algorithm, where

contact exposure data are encoded into the blockchain.

Data blocks that capture the person's exposure to the virus

are stored in a blockchain. Data blocks generated during

the contact exposure process are verified by the user’s

blockchain before they get added. The latter ensures

resiliency against data injection and data replay attacks.

Finally, we have analyzed the performance of the proposed

testbed by measuring the device's dynamic power

consumption while executing ZKP authentication schemes

and contact exposure protocols. Power measurement data

were collected under various AES encryption/decryption

engines (AES-128, AES-192, AES256). Also, we have

measured the device power dissipation during ZKP

authentication when a device acts as a verifier and as a

prover. In this research, we have utilized proximity sensing

based on Bluetooth capability to detect direct contact.

Future work will address the computational complexity of

the proposed blockchain algorithm. We will further

investigate the performance of the system under a various

number of users. on the integration of a new proximity

sensing solution that is based on Ultra-Wideband (UWB)

technology to provide highly accurate distance

measurement when determining possible exposure to the

virus

VIII. ACKNOWLEDGEMENT

This work was supported by the FAST 2021 summer grant,

Sam Houston State University.

IX. REFERENCES [1] Apple, and Google. "Exposure Notifications: Using Technology to

Help Public Health Authorities Fight COVID-19." (2021).

[2] E. Lee, K. Park, D. J. Park, J. Kim and C. Jo, "Locally Testable

Privacy-Preserving Contact Tracing Protocol Without Exposing Secret Seed," 2021 IEEE International Conference on Consumer

Electronics (ICCE), 2021, pp. 1-5, doi:

10.1109/ICCE50685.2021.9427587.

[3] N. Ahmed et al., "A Survey of COVID-19 Contact Tracing Apps," in IEEE Access, vol. 8, pp. 134577-134601, 2020, doi:

10.1109/ACCESS.2020.3010226.

[4] D. J. Leith and S. Farrell, "Coronavirus contact tracing: Evaluating

the potential of using Bluetooth received signal strength for

proximity detection", May 2020, [online] Available:

https://www.scss.tcd.ie/Doug.Leith/pubs/bluetoothrssistudy.pdf.

[5] J. Berglund, "Tracking COVID-19: There’s an App for That," in IEEE Pulse, vol. 11, no. 4, pp. 14-17, July-Aug. 2020, doi:

10.1109/MPULS.2020.3008356.

[6] P. H. O’Neill, T. Ryan-Mosley and B. Johnson, "A flood of

coronavirus apps are tracking us. Now it’s time to keep track of them", MIT Technol Rev, May 2020, [online] Available:

https://www.technologyreview.com/2020/05/07/1000961/launchin

g-mittr-covid-tracing-tracker/.

[7] A. Hekmati, G. Ramachandran and B. Krishnamachari, "CONTAIN Privacy-oriented Contact Tracing Protocols for Epidemics," 2021

IFIP/IEEE International Symposium on Integrated Network

Management (IM), 2021, pp. 872-877.

[8] A. Fiat and A. Shamir, "How To Prove Yourself: Practical Solutions To Identification and Signature Problems", Proceeding of CRYPTO

1986.

[9] A. A. Rasheed, R. N. Mahapatra, C. Varol and N. Karpoor, "Exploiting Zero Knowledge Proof and Blockchain Towards the

Enforcement of Anonymity, Data Integrity and Privacy (ADIP) on

IoT," in IEEE Transactions on Emerging Topics in Computing, doi: 10.1109/TETC.2021.3099701.

[10] A. Rasheed, R. R. Hashemi, A. Bagabas, J. Young, C. Badri and K.

Patel, "Configurable Anonymous Authentication Schemes For The Internet of Things (IoT)," 2019 IEEE International Conference on

RFID (RFID), 2019, pp. 1-8, doi: 10.1109/RFID.2019.8719256.

[11] H. T. T. Truong, M. Almeida, G. Karame and C. Soriente, "Towards

Secure and Decentralized Sharing of IoT Data," 2019 IEEE International Conference on Blockchain (Blockchain), 2019, pp.

176-183, doi: 10.1109/Blockchain.2019.00031.

[12] Christidis, Konstantinos, and Michael Devetsikiotis. "Blockchains

and smart contracts for the internet of things." Ieee Access 4 (2016): 2292-2303.

[13] Pmod BT2 Available: https://digilent.com/shop/pmod-bt2-

bluetooth-interface/

[14] FRDM-K64F Platform|Freedom Development Board|Kinetis MCUs

| NXP Semiconductors. Available: https://www.nxp.com/design/development-boards/freedom-

development-boards/mcu-boards/freedom-development-platform-

for-kinetis-k64-k63-and-k24-mcus:FRDM-K64F

[15] Mbed Operating System. Available: https://os.mbed.com

[16] Power Profiler Kit II. Available: https://www.nordicsemi.com/Products/Development-

hardware/Power-Profiler-Kit-2

[17] J. Song, J. Nang and J. Jang, "Design of Anomaly Detection and

Visualization Tool for IoT Blockchain," 2018 International Conference on Computational Science and Computational

Intelligence (CSCI), 2018, pp. 1464-1465, doi:

10.1109/CSCI46756.2018.00292.

[18] V. A. Gasimov and S. K. Aliyeva, "Using blockchain technology to ensure security in the cloud and IoT environment," 2021 3rd

International Congress on Human-Computer Interaction,

Optimization and Robotic Applications (HORA), 2021, pp. 1-5, doi: 10.1109/HORA52670.2021.9461397.

[19] S. Malik, V. Dedeoglu, S. S. Kanhere and R. Jurdak, "TrustChain:

Trust Management in Blockchain and IoT Supported Supply

Chains," 2019 IEEE International Conference on Blockchain (Blockchain), 2019, pp. 184-193, doi:

10.1109/Blockchain.2019.00032.

[20] A. K. Singh and N. Kushwaha, "Software and Hardware Security of

IoT," 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), 2021, pp. 1-5, doi:

10.1109/IEMTRONICS52119.2021.9422651.

[21] D. Balsamo, A. Elboreini, B. M. Al-Hashimi and G. V. Merrett,

"Exploring ARM mbed support for transient computing in energy harvesting IoT systems," 2017 7th IEEE International Workshop on

Advances in Sensors and Interfaces (IWASI), 2017, pp. 115-120,

doi: 10.1109/IWASI.2017.7974230.

Page 23: Technical Paper Session - tronshow.org

Appendix

Technical Program Committee, and other staff members

Chair

Dr. Ken Sakamura, Professor and Dean of INIAD, Toyo University, Chair of TRON Forum

Vice Chairs:

Dr. Tomohiro Hase,

Professor, Ryukoku University, Japan,

Board Member, IEEE Consumer Electronics Society

Members of TPC (Alphabetical order of the family name):

• Muhamed Fauzi Bin Abbas Singapore Institute of Technology

• Heikki Ailisto VTT Technical Research Centre of Finland

• Yasuhito Asano INIAD, Toyo University

• Alessandro Bassi Alessandro Bassi Consulting

• Alex Galis University College London

• Masahiro Bessho INIAD, Toyo University

• Mu-Yen Chen National Taichung University of Science and Technology

• Kwek Chin Wee Republic Polytechnic

• Stephan Haller The Bern University of Applied Sciences

• Chiaki Ishikawa YRP Ubiquitous Networking Laboratory

• Tomonari Kamba INIAD, Toyo University

• Shindo Katsunori YRP Ubiquitous Networking Laboratory

• M. Fahim Ferdous Khan INIAD, Toyo University

• Ryoichi Kawahara INIAD, Toyo University

• Jee-Eun Kim INIAD, Toyo University

• Tatu Koljonen VTT Technical Research Centre of Finland

• Akira Matsui Personal Media Corporation

• Akihiro Nakao The University of Tokyo

• Takako NONAKA Shonan Institute of Technology

Page 24: Technical Paper Session - tronshow.org

• Alok Prakash Nanyang Technological University

• George Roussos Birkbeck College, University of London

• Kentaro Shimizu The University of Tokyo

• Toru Shimizu INIAD, Toyo University

• Amiruddin Bin Jaafar Sidek Custommedia

• Mohit Sindhwani Quantum Inventions

• Juha-Pekka Soininen VTT Technical Research Centre of Finland

• Thambipillai Srikanthan Nanyang Technological University

• Kazuya Sumikoshi YRP Ubiquitous Networking Laboratory

• Junpei Tsuji INIAD, Toyo University

• Takeshi Yashiro INIAD, Toyo University

• Kenji Yoshigoe Embry-Riddle Aeronautical University

• Takeshi Ogasawara INIAD, Toyo University

• Ge Hangli The University of Tokyo

Publication co-chairs:

• Chiaki Ishikawa • Masahiro Bessho • Takeshi Yashiro • Toshihisa Muto

Publicity Chair:

• Chiaki Ishikawa

The total program of 2021 TRON Symposium -TRONSHOW- Please see the following URLs: https://www.tronshow.org/index-e.html https://www.tron.org/tronshow/2021/regist/schedule/?lang=en (technical sessions)

Page 25: Technical Paper Session - tronshow.org

www.tronshow.org

Proceedings of 2021 TRON Symposium -TRONSHOW- ISBN 978-4-89362-375-1