47 research outputs found

    Performance Evaluation of end-to-end security protocols in an Internet of Things

    Get PDF
    Wireless Sensor Networks are destined to play a fundamental role in the next-generation Internet, which will be characterized by the Machine-to-Machine paradigm, according to which, embedded devices will actively exchange information, thus enabling the development of innovative applications. It will contribute to assert the concept of Internet of Things, where end-to-end security represents a key issue. In such context, it is very important to understand which protocols are able to provide the right level of security without burdening the limited resources of constrained networks. This paper presents a performance comparison between two of the most widely used security protocols: IPSec and DTLS. We provide the analysis of their impact on the resources of embedded devices. For this purpose, we have modified existing implementations of both protocols to make them properly run on our hardware platforms, and we have performed an extensive experimental evaluation study. The achieved results are not a consequence of a classical simulation campaign, but they have been obtained in a real scenario that uses software and hardware typical of the current technological developments. Therefore, they can help network designers to identify the most appropriate secure mechanism for end-to-end IP communications involving constrained devices

    Computation of SAR in Human Eye and Pregnant Woman Using Different Simulation Tools

    Get PDF
    Electromagnetic modeling of large scale problems arising from complex geometries, such as the human body or the specific organ, is generally undertaken by numerical methods implemented in simulation software packages. The structures involving high discretization density (mainly based on Magnetic Resonance Imaging and handled by Finite Difference Time Domain method) consume tremendously high computational cost. On the other hand, oversimplified numerical models may result in significantly less accuracy. The aim of this work was to investigate how detailed numerical model could be created using standard personal computer. Two rather complex cases of exposure were analyzed: human eye and pregnant woman exposed to radiofrequency electromagnetic radiation. The SAR distribution, peak localized 10g-averaged SAR and volume-averaged SAR in these models were determined using two software packages based on different numerical methods: FEKO software based on Finite Element Method and SEMCAD X software based on Finite Difference Time Domain method. The obtained results were compared to the results arising from other scientific studies which included the models of different complexity solved by different numerical methods

    MULTIMEDIA ON GEOGRAPHIC NETWORK

    Get PDF
    In this thesis we investigate the topic of the multimedia contents distribution on a geo- graphic network which is a rarefied and huge field. First of all we have to classify the main parts necessary in the multimedia distribution on a geographic network. The main aspects of a geographic network that will be highlighted in this thesis are: the mechanism used to retrieve the sources of the multimedia content; in the case of the peer-to-peer network on geographic network one of the most important mechanism is the query flooding protocol. The kind of overlay network (peer-to-peer) used to distribute the multimedia content. The usage of this overlay network in a multicast network. The security of the overlay network over a geographic network. Therefore the first topic which is investigated in this thesis is the query flooding protocol that can be used in any kind of query operation on a peer-to-peer network. For this protocol we achieve an analytical model through a complex analysis of the proxies network. In this analysis we can see how the proxies permit an improvement in the performance with respect to the routing operations in a generic network of routers. Moreover we address a simple formulation and framework about the performance of the network with and without layer 7 (proxy) and we apply them in three different types of scenarios to show the advantages achieved with the usage of proxies instead of routers. Through the query flooding operation, each peer of the peer-to-peer network can achieve the list of the peers that hold the desired multimedia content. In a multimedia content dis- tribution system, after the previous step in which the list of the peers that hold the desired multimedia content is retrieved, it is necessary to establish the kind of peer-to-peer network used to distribute this multimedia content to the peers that require it. Therefore the second aspect analysed in this thesis, is how the peer-to-peer network is built so that it is possible to provide the multimedia content to the vast majority of peers (that require this content) with the minimum delay. The construction of the peer-to-peer networks used for the distribution of the multimedia contents is not a very investigated field. Thus in this thesis we produce new algorithms used to build peer-to-peer networks in an incremental way on asymmetric and radio channel and we establish which algorithm is better with respect to the maximum delay of the network, the maximization of the number of peers accepted in the network and the minimization of the bit error probability of each peer of the peer-to-peer network. In this thesis, we propose an usage of the overlay network (peer-to-peer network) in a multicast network. We introduce an innovative mechanism that exploits the peer-to-peer network to make reliable a standard unreliable multicast network. Moreover we present an analytical model for this innovative mechanism. Finally the last aspect of a geographic network is the security of the communications among a group of peers. Thus to ensure the maximum level of security with secure commu- nications among a group of three or more peers, in this thesis we propose a new protocol, based on the Massey Omura protocol, which can allow the communications among the peers of a peer-to-peer network in a secure way. Moreover we present the security prob- lems of this Massey Omura Multiple Users Protocol and how it is possible to avoid these issues through a specific encryption function and a specific decryption function by chang- ing the encryption and decryption keys of each peer when the source peer changes. Finally we present a new cryptography protocol which we use to share the decryption shared key that is used in the Massey Omura Multiple Users Protocol

    Analysis of Patterns and Similarities in Service Tickets using Natural Language Processing

    Get PDF
    In this paper we propose an approach for classifying documents, embedding documents into feature vectors and using these embeddings for finding similarities between them. Our chosen domain for applying this method is the IT-Service Support branch, where the documents we try to analyse are support tickets and the potential of classifying and finding patterns between tickets is huge for optimizing the service process. We aim to tackle the problem with multiple methods of text classification and recognition, and data analysis, followed by comparison and interpretation of the results. Following our previous work in this field, we propose further means of validating our models, so we can describe and visualize several methods of feature extraction and recognition for service tickets that help the business process for Service Support

    Cost-Effective Implementation of a Temperature Traceability System Based on Smart RFID Tags and IoT Services

    Full text link
    [EN] This paper presents the design and validation of a traceability system, based on radio frequency identification (RFID) technology and Internet of Things (IoT) services, intended to address the interconnection and cost-implementation problems typical in traceability systems. The RFID layer integrates temperature sensors into RFID tags, to track and trace food conditions during transportation. The IoT paradigm makes it possible to connect multiple systems to the same platform, addressing interconnection problems between different technology providers. The cost-implementation issues are addressed following the Data as a Service (DaaS) billing scheme, where users pay for the data they consume and not the installed equipment, avoiding the big initial investment that these high-tech solutions commonly require. The developed system is validated in two case scenarios, one carried out in controlled laboratory conditions, monitoring chopped pumpkin. Another case, carried out in a real scenario, monitors oranges sent from Valencia, Spain to Cork, Ireland.Urbano, O.; Perles, A.; Pedraza, C.; Rubio-Arraez, S.; CastellĂł GĂłmez, ML.; Ortolá Ortolá, MD.; Mercado Romero, R. (2020). Cost-Effective Implementation of a Temperature Traceability System Based on Smart RFID Tags and IoT Services. Sensors. 20(4):1-19. https://doi.org/10.3390/s20041163119204Aung, M. M., & Chang, Y. S. (2014). Traceability in a food supply chain: Safety and quality perspectives. Food Control, 39, 172-184. doi:10.1016/j.foodcont.2013.11.007Bosona, T., & Gebresenbet, G. (2013). Food traceability as an integral part of logistics management in food and agricultural supply chain. Food Control, 33(1), 32-48. doi:10.1016/j.foodcont.2013.02.004Bechini, A., Cimino, M. G. C. A., Marcelloni, F., & Tomasi, A. (2008). Patterns and technologies for enabling supply chain traceability through collaborative e-business. Information and Software Technology, 50(4), 342-359. doi:10.1016/j.infsof.2007.02.017Badia-Melis, R., Mishra, P., & Ruiz-GarcĂ­a, L. (2015). Food traceability: New trends and recent advances. A review. Food Control, 57, 393-401. doi:10.1016/j.foodcont.2015.05.005Timestrip Visual Indicators of Time and Temperaturehttps://timestrip.com/Storøy, J., Thakur, M., & Olsen, P. (2013). The TraceFood Framework – Principles and guidelines for implementing traceability in food value chains. Journal of Food Engineering, 115(1), 41-48. doi:10.1016/j.jfoodeng.2012.09.018Pizzuti, T., Mirabelli, G., Sanz-Bobi, M. A., & GomĂ©z-GonzalĂ©z, F. (2014). Food Track & Trace ontology for helping the food traceability control. Journal of Food Engineering, 120, 17-30. doi:10.1016/j.jfoodeng.2013.07.017Landt, J. (2005). The history of RFID. IEEE Potentials, 24(4), 8-11. doi:10.1109/mp.2005.1549751Costa, C., Antonucci, F., Pallottino, F., Aguzzi, J., Sarriá, D., & Menesatti, P. (2012). A Review on Agri-food Supply Chain Traceability by Means of RFID Technology. Food and Bioprocess Technology, 6(2), 353-366. doi:10.1007/s11947-012-0958-7Mainetti, L., Mele, F., Patrono, L., Simone, F., Stefanizzi, M. L., & Vergallo, R. (2013). An RFID-Based Tracing and Tracking System for the Fresh Vegetables Supply Chain. International Journal of Antennas and Propagation, 2013, 1-15. doi:10.1155/2013/531364Figorilli, S., Antonucci, F., Costa, C., Pallottino, F., Raso, L., Castiglione, M., … Menesatti, P. (2018). A Blockchain Implementation Prototype for the Electronic Open Source Traceability of Wood along the Whole Supply Chain. Sensors, 18(9), 3133. doi:10.3390/s18093133Aguzzi, J., Sbragaglia, V., Sarriá, D., GarcĂ­a, J. A., Costa, C., RĂ­o, J. del, … SardĂ , F. (2011). A New Laboratory Radio Frequency Identification (RFID) System for Behavioural Tracking of Marine Organisms. Sensors, 11(10), 9532-9548. doi:10.3390/s111009532Donelli, M. (2018). An RFID-Based Sensor for Masonry Crack Monitoring. Sensors, 18(12), 4485. doi:10.3390/s18124485De Souza, P., Marendy, P., Barbosa, K., Budi, S., Hirsch, P., Nikolic, N., … Davie, A. (2018). Low-Cost Electronic Tagging System for Bee Monitoring. Sensors, 18(7), 2124. doi:10.3390/s18072124Corchia, L., Monti, G., & Tarricone, L. (2019). A Frequency Signature RFID Chipless Tag for Wearable Applications. Sensors, 19(3), 494. doi:10.3390/s19030494Zuffanelli, S., Aguila, P., Zamora, G., Paredes, F., Martin, F., & Bonache, J. (2016). A High-Gain Passive UHF-RFID Tag with Increased Read Range. Sensors, 16(7), 1150. doi:10.3390/s16071150Monteleone, S., Sampaio, M., & Maia, R. F. (2017). A novel deployment of smart Cold Chain system using 2G-RFID-Sys temperature monitoring in medicine Cold Chain based on Internet of Things. 2017 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI). doi:10.1109/soli.2017.8120995Zou, Z., Chen, Q., Uysal, I., & Zheng, L. (2014). Radio frequency identification enabled wireless sensing for intelligent food logistics. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 372(2017), 20130313. doi:10.1098/rsta.2013.0313Azzarelli, J. M., Mirica, K. A., Ravnsbæk, J. B., & Swager, T. M. (2014). Wireless gas detection with a smartphone via rf communication. Proceedings of the National Academy of Sciences, 111(51), 18162-18166. doi:10.1073/pnas.1415403111Pies, M., Hajovsky, R., & Ozana, S. (2014). Wireless measurement of carbon monoxide concentration. 2014 14th International Conference on Control, Automation and Systems (ICCAS 2014). doi:10.1109/iccas.2014.6987843Azzara, A., Bocchino, S., Pagano, P., Pellerano, G., & Petracca, M. (2013). Middleware solutions in WSN: The IoT oriented approach in the ICSI project. 2013 21st International Conference on Software, Telecommunications and Computer Networks - (SoftCOM 2013). doi:10.1109/softcom.2013.6671886Ribeiro, A. R. L., Silva, F. C. S., Freitas, L. C., Costa, J. C., & FrancĂŞs, C. R. (2005). SensorBus. Proceedings of the 3rd international IFIP/ACM Latin American conference on Networking - LANC ’05. doi:10.1145/1168117.1168119Sulc, V., Kuchta, R., & Vrba, R. (2010). IQRF Smart House - A Case Study. 2010 Third International Conference on Advances in Mesh Networks. doi:10.1109/mesh.2010.17Porkodi, R., & Bhuvaneswari, V. (2014). The Internet of Things (IoT) Applications and Communication Enabling Technology Standards: An Overview. 2014 International Conference on Intelligent Computing Applications. doi:10.1109/icica.2014.73EPC Radio-Frequency Identity Protocols. Generation-2 UHF RFIDhttps://www.gs1.org/sites/default/files/docs/epc/uhfc1g2_2_0_0_standard_20131101.pdfUusitalo, M. (2006). Global Vision for the Future Wireless World from the WWRF. IEEE Vehicular Technology Magazine>, 1(2), 4-8. doi:10.1109/mvt.2006.283570Sung, J., Lopez, T. S., & Kim, D. (2007). The EPC Sensor Network for RFID and WSN Integration Infrastructure. Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW’07). doi:10.1109/percomw.2007.113Chunxiao Fan, Zhigang Wen, Fan Wang, & Yuexin Wu. (2011). A middleware of Internet of Things (IoT) based on ZigBee and RFID. IET International Conference on Communication Technology and Application (ICCTA 2011). doi:10.1049/cp.2011.0765Centenaro, M., Vangelista, L., Zanella, A., & Zorzi, M. (2016). Long-range communications in unlicensed bands: the rising stars in the IoT and smart city scenarios. IEEE Wireless Communications, 23(5), 60-67. doi:10.1109/mwc.2016.7721743Hai Liu, Bolic, M., Nayak, A., & Stojmenovic, I. (2008). Taxonomy and Challenges of the Integration of RFID and Wireless Sensor Networks. IEEE Network, 22(6), 26-35. doi:10.1109/mnet.2008.4694171Bertolini, M., Bevilacqua, M., & Massini, R. (2006). FMECA approach to product traceability in the food industry. Food Control, 17(2), 137-145. doi:10.1016/j.foodcont.2004.09.013Zhang, M., & Li, P. (2012). RFID Application Strategy in Agri-Food Supply Chain Based on Safety and Benefit Analysis. Physics Procedia, 25, 636-642. doi:10.1016/j.phpro.2012.03.137Engels, D. W., Kang, Y. S., & Wang, J. (2013). On security with the new Gen2 RFID security framework. 2013 IEEE International Conference on RFID (RFID). doi:10.1109/rfid.2013.6548148SINIEV: Un Centro Inteligente De Control De Tránsito Y Transporte Que BeneficiarĂ­a A Todo El PaĂ­shttps://revistadelogistica.com/actualidad/siniev-un-centro-inteligente-de-control-de-transito-y-transporte-que-beneficiara-a-todo-el-pais/Tentzeris, M. M., Kim, S., Traille, A., Aubert, H., Yoshihiro, K., Georgiadis, A., & Collado, A. (2013). Inkjet-printed RFID-enabled sensors on paper for IoT and “Smart Skin” applications. ICECom 2013. doi:10.1109/icecom.2013.6684749Vega, F., Pantoja, J., Morales, S., Urbano, O., Arevalo, A., Muskus, E., … Hernandez, N. (2016). An IoT-based open platform for monitoring non-ionizing radiation levels in Colombia. 2016 IEEE Colombian Conference on Communications and Computing (COLCOM). doi:10.1109/colcomcon.2016.7516379Yang, K., & Jia, X. (2011). Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web, 15(4), 409-428. doi:10.1007/s11280-011-0138-0Alfian, G., Rhee, J., Ahn, H., Lee, J., Farooq, U., Ijaz, M. F., & Syaekhoni, M. A. (2017). Integration of RFID, wireless sensor networks, and data mining in an e-pedigree food traceability system. Journal of Food Engineering, 212, 65-75. doi:10.1016/j.jfoodeng.2017.05.008Chen, R.-Y. (2015). Autonomous tracing system for backward design in food supply chain. Food Control, 51, 70-84. doi:10.1016/j.foodcont.2014.11.004Song, J., Wei, Q., Wang, X., Li, D., Liu, C., Zhang, M., & Meng, L. (2018). Degradation of carotenoids in dehydrated pumpkins as affected by different storage conditions. Food Research International, 107, 130-136. doi:10.1016/j.foodres.2018.02.024Montesano, D., Rocchetti, G., Putnik, P., & Lucini, L. (2018). Bioactive profile of pumpkin: an overview on terpenoids and their health-promoting properties. Current Opinion in Food Science, 22, 81-87. doi:10.1016/j.cofs.2018.02.003Rubio-Arraez, S., Capella, J. V., CastellĂł, M. L., & Ortolá, M. D. (2016). Physicochemical characteristics of citrus jelly with non cariogenic and functional sweeteners. Journal of Food Science and Technology, 53(10), 3642-3650. doi:10.1007/s13197-016-2319-4Carmona, L., AlquĂ©zar, B., Marques, V. V., & Peña, L. (2017). Anthocyanin biosynthesis and accumulation in blood oranges during postharvest storage at different low temperatures. Food Chemistry, 237, 7-14. doi:10.1016/j.foodchem.2017.05.07

    On the Application of the Raspberry Pi as an Advanced Acoustic Sensor Network for Noise Monitoring

    Get PDF
    The concept of Smart Cities and the monitoring of environmental parameters is an area of research that has attracted scientific attention during the last decade. These environmental parameters are well-known as important factors in their affection towards people. Massive monitoring of this kind of parameters in cities is an expensive and complex task. Recent technologies of low-cost computing and low-power devices have opened researchers to a wide and more accessible research field, developing monitoring devices for deploying Wireless Sensor Networks. Gathering information from them, improved urban plans could be carried out and the information could help citizens. In this work, the prototyping of a low-cost acoustic sensor based on the Raspberry Pi platform for its use in the analysis of the sound field is described. The device is also connected to the cloud to share results in real time. The computation resources of the Raspberry Pi allow treating high quality audio for calculating acoustic parameters. A pilot test was carried out with the installation of two acoustic devices in the refurbishment works of a neighbourhood. In this deployment, the evaluation of these devices through long-term measurements was carried out, obtaining several acoustic parameters in real time for its broadcasting and study. This test has shown the Raspberry Pi as a powerful and affordable computing core of a low-cost device, but also the pilot test has served as a query tool for the inhabitants of the neighbourhood to be more aware about the noise in their own place of residence.IngenierĂ­a, Industria y ConstrucciĂł

    An Architecture for Anonymous Mobile Coupons in a Large Network

    Get PDF

    Integration of Clouds to Industrial Communication Networks

    Get PDF
    Cloud computing, owing to its ubiquitousness, scalability and on-demand ac- cess, has transformed into many traditional sectors, such as telecommunication and manufacturing production. As the Fifth Generation Wireless Specifica- tions (5G) emerges, the demand on ubiquitous and re-configurable computing resources for handling tremendous traffic from omnipresent mobile devices has been put forward. And therein lies the adaption of cloud-native model in service delivery of telecommunication networks. However, it takes phased approaches to successfully transform the traditional Telco infrastructure to a softwarized model, especially for Radio Access Networks (RANs), which, as of now, mostly relies on purpose-built Digital Signal Processors (DSPs) for computing and processing tasks.On the other hand, Industry 4.0 is leading the digital transformation in manufacturing sectors, wherein the industrial networks is evolving towards wireless connectivity and the automation process managements are shifting to clouds. However, such integration may introduce unwanted disturbances to critical industrial automation processes. This leads to challenges to guaran- tee the performance of critical applications under the integration of different systems.In the work presented in this thesis, we mainly explore the feasibility of inte- grating wireless communication, industrial networks and cloud computing. We have mainly investigated the delay-inhibited challenges and the performance impacts of using cloud-native models for critical applications. We design a solution, targeting at diminishing the performance degradation caused by the integration of cloud computing

    NILM techniques for intelligent home energy management and ambient assisted living: a review

    Get PDF
    The ongoing deployment of smart meters and different commercial devices has made electricity disaggregation feasible in buildings and households, based on a single measure of the current and, sometimes, of the voltage. Energy disaggregation is intended to separate the total power consumption into specific appliance loads, which can be achieved by applying Non-Intrusive Load Monitoring (NILM) techniques with a minimum invasion of privacy. NILM techniques are becoming more and more widespread in recent years, as a consequence of the interest companies and consumers have in efficient energy consumption and management. This work presents a detailed review of NILM methods, focusing particularly on recent proposals and their applications, particularly in the areas of Home Energy Management Systems (HEMS) and Ambient Assisted Living (AAL), where the ability to determine the on/off status of certain devices can provide key information for making further decisions. As well as complementing previous reviews on the NILM field and providing a discussion of the applications of NILM in HEMS and AAL, this paper provides guidelines for future research in these topics.Agência financiadora: Programa Operacional Portugal 2020 and Programa Operacional Regional do Algarve 01/SAICT/2018/39578 Fundação para a Ciência e Tecnologia through IDMEC, under LAETA: SFRH/BSAB/142998/2018 SFRH/BSAB/142997/2018 UID/EMS/50022/2019 Junta de Comunidades de Castilla-La-Mancha, Spain: SBPLY/17/180501/000392 Spanish Ministry of Economy, Industry and Competitiveness (SOC-PLC project): TEC2015-64835-C3-2-R MINECO/FEDERinfo:eu-repo/semantics/publishedVersio

    Alogorithms for fast implementation of high efficiency video coding

    Get PDF
    Recently, there is higher demand for video content in multimedia communication, which leads to increased requirements for storage and bandwidth posed to internet service providers. Due to this, it became necessary for the telecommunication standardization sector of the International Telecommunication Union (ITU-T) to launch a new video compression standard that would address the twin challenges of lowering both digital file sizes in storage media and transmission bandwidths in networks. The High Efficiency Video Compression (HEVC) also known as H.265 standard was launched in November 2013 to address these challenges. This new standard was able to cut down, by 50%, on existing media file sizes and bandwidths but its computational complexity leads to about 400% delay in HEVC video encoding. This study proposes a solution to the above problem based on three key areas of the HEVC. Firstly, two fast motion estimation algorithms are proposed based on triangle and pentagon structures to implement motion estimation and compensation in a shorter time. Secondly, an enhanced and optimized inter-prediction mode selection is proposed. Thirdly, an enhanced intra-prediction mode scheme with reduced latency is suggested. Based on the test model of the HEVC reference software, each individual algorithm manages to reduce the encoding time across all video classes by an average of 20-30%, with a best reduction of 70%, at a negligible loss in coding efficiency and video quality degradation. In practice, these algorithms would be able to enhance the performance of the HEVC compression standard, and enable higher resolution and higher frame rate video encoding as compared to the stateof- the-art technique
    corecore