16 research outputs found

    Demonstrating MQTT+: An advanced broker for data filtering, processing and aggregation

    Get PDF
    The Message Queueing Telemetry Transport (MQTT) publish/subscribe protocol is the de facto standard at the application layer for IoT, M2M and wireless sensor networks applications. This demonstration showcases MQTT+, an advanced version of MQTT which provides an enhanced protocol syntax and enriches the broker with data filtering, processing and aggregation functionalities. Such features are ideal in all those applications in which edge devices are interested in performing processing operations over the data published by multiple clients, where using the original MQTT protocol would result in unacceptably high network bandwidth usage and energy consumption for the edge devices. MQTT+ is implemented starting from an open source MQTT broker and evaluated in different application scenarios which are demonstrated live using the Node-RED IoT prototyping framework

    On the (over)-Reactions and the Stability of a 6TiSCH Network in an Indoor Environment

    Get PDF
    International audienceIndustrial networks differ from others kinds of networks because they require real-time performance in order to meet strict requirements. With the rise of low-power wireless standards, the industrial applications have started to use wireless communications in order to reduce deployment and management costs. IEEE802.15.4-TSCH represents currently a promising standard relying on a strict schedule of the transmissions to provide strong guarantees. However, the radio environment still exhibits time-variable characteristics. Thus, the network has to provision sufficient resource (bandwidth) to cope with the worst case while still achieving high energy efficiency. The 6TiSCH IETF working group defines a stack to tune dynamically the TSCH schedule. In this paper, we analyze in depth the stability and the convergence of a 6TiSCH network in an indoor testbed. We identify the main causes of instabilities, and we propose solutions to address each of them. We show that our solutions improve significantly the stability

    Energy savvy network joining strategies for energy harvesting powered TSCH nodes

    Get PDF
    This is the author accepted manuscript. The final version is available from IEEE via the DOI in this recordThis paper presents methods that enable batteryless energy harvesting powered Time Synchronized Channel Hopping (TSCH) wireless sensor nodes to join a network with less energy wastage. Network joining of TSCH nodes is a very power hungry yet inevitable process to form a working wireless sensor network (WSN). Since the energy level from energy harvesting is scarce, energy passive methods are essential. A duty-cycled network joining process in combination with an appropriate capacitor size is proposed here as they are among the factors that can be easily controlled without extra energy. When a node joins the network in a duty-cycled manner, other nodes may join the network during the gap time, which reduces energy wastage of the nodes in waiting. With an appropriate capacitor size, the capacitor can be charged up within a reasonable time and power up the node for a sufficiently long time, which increases the probability to complete the network joining process of the node. With the combination of a join duty cycle of 50% with a 100 mF capacitor, a WSN was successfully formed by two energy harvesting powered wireless sensor nodes in one network joining attempt.Engineering and Physical Sciences Research Council (EPSRC

    Measuring Power Relations Among Locations From Mobility Data

    Get PDF
    International audienceKey location identification in cities is central in human mobility investigation as well as for societal problem comprehension. In this context, we propose a methodology to quantify the power of point-of-interests (POIs) in their vicinity, in terms of impact and independence-the first work in the literature (to the best of our knowledge). Different from literature , we consider the flow of people in our analysis, instead of the number of neighbor POIs or their structural locations in the city. Thus, we first modeled POI's visits using the multiflow graph model where each POI is a node and the transitions of users among POIs are a weighted direct edge. Using this multiflow graph model, we compute the attract, support and independence powers. The attract power and support power measure how many visits a POI gather from and disseminate over its neighborhood, respectively. Moreover, the independence power captures the capacity of POI to receive visitors independently from other POIs. Using a dataset describing the mobility of individuals in the Dartmouth College campus, we identify a slight dependence among buildings as well as the tendency of people to be mostly stationary in few buildings with short transit periods among them

    Exploiting Mobile Social Networks from Temporal Perspective:A Survey

    Get PDF
    With the popularity of smart mobile devices, information exchange between users has become more and more frequent, and Mobile Social Networks (MSNs) have attracted significant attention in many research areas. Nowadays, discovering social relationships among people, as well as detecting the evolution of community have become hotly discussed topics in MSNs. One of the major features of MSNs is that the network topology changes over time. Therefore, it is not accurate to depict the social relationships of people based on a static network. In this paper, we present a survey of this emerging field from a temporal perspective. The state-of-the-art research of MSNs is reviewed with focus on four aspects: social property, time-varying graph, temporal social property, and temporal social properties-based applications. Some important open issues with respect to MSNs are discussed

    A Tutorial and Review on Flight Control Co-Simulation Using Matlab/Simulink and Flight Simulators

    Get PDF
    Flight testing in a realistic three-dimensional virtual environment is increasingly being considered a safe and cost-effective way of evaluating aircraft models and their control systems. The paper starts by reviewing and comparing the most popular personal computer-based flight simulators that have been successfully interfaced to date with the MathWorks software. This co-simulation approach allows combining the strengths of Matlab toolboxes for functions including navigation, control, and sensor modeling with the advanced simulation and scene rendering capabilities of dedicated flight simulation software. This approach can then be used to validate aircraft models, control algorithms, flight handling chatacteristics, or perform model identification from flight data. There is, however, a lack of sufficiently detailed step-by-step flight co-simulation tutorials, and there have also been few attempts to evaluate more than one flight co-simulation approach at a time. We, therefore, demonstrate our own step-by-step co-simulation implementations using Simulink with three different flight simulators: Xplane, FlightGear, and Alphalink’s virtual flight test environment (VFTE). All three co-simulations employ a real-time user datagram protocol (UDP) for data communication, and each approach has advantages depending on the aircraft type. In the case of a Cessna-172 general aviation aircraft, a Simulink co-simulation with Xplane demonstrates successful virtual flight tests with accurate simultaneous tracking of altitude and speed reference changes while maintaining roll stability under arbitrary wind conditions that present challenges in the single propeller Cessna. For a medium endurance Rascal-110 unmanned aerial vehicle (UAV), Simulink is interfaced with FlightGear and with QGroundControl using the MAVlink protocol, which allows to accurately follow the lateral UAV path on a map, and this setup is used to evaluate the validity of Matlab-based six degrees of freedom UAV models. For a smaller ZOHD Nano Talon miniature aerial vehicle (MAV), Simulink is interfaced with the VFTE, which was specifically designed for this MAV, and with QGroundControl for the testing of advanced H-infinity observer-based autopilots using a software-in-the-loop (SIL) simulation to achieve robust low altitude flight under windy conditions. This is then finally extended to hardware-in-the-loop (HIL) implementation on the Nano Talon MAV using a controller area network (CAN) databus and a Pixhawk-4 mini autopilot with simulated sensor models

    Assessing Large-Scale Power Relations Among Locations From Mobility Data

    Get PDF
    International audienceThe pervasiveness of smartphones has shaped our lives, social norms, and the structure that dictates human behavior. They now directly influence how individuals demand resources or interact with network services. From this scenario, identifying key locations in cities is fundamental for the investigation of human mobility and also for the understanding of social problems. In this context, we propose the first graph-based methodology in the literature to quantify the power of point-of-interests (POIs) over its vicinity by means of user mobility trajectories. Different from literature, we consider the flow of people in our analysis, instead of the number of neighbor POIs or their structural locations in the city. Thus, we modeled POI's visits using the multiflow graph model where each POI is a node and the transitions of users among POIs are a weighted direct edge. Using this multiflow graph model, we compute the attract, support, and independence powers. The attract power and support power measure how many visits a POI gathers from and disseminate over its neighborhood, respectively. Moreover, the independence power captures the capacity of a POI to receive visitors independently from other POIs. We tested our methodology on well-known university campus mobility datasets and validated on Location-Based Social Networks (LBSNs) datasets from various cities around the world. Our findings show that in university campus: (i) buildings have low support power and attract power; (ii) people tend to move over a few buildings and spend most of their time in the same building; and (iii) there is a slight dependence among buildings, even those with high independence power receive user visits from other buildings on campus. Globally, we reveal that: (i) our metrics capture places that impact the number of visits in their neighborhood; (ii) cities in the same continent have similar independence patterns; and (iii) places with a high number of visitation and city central areas are the regions with the highest degree of independence

    A trust model using edge nodes and cuckoo filter for securing vanet under nlos conditions

    Get PDF
    Trust, as a key element of security, has a vital role in securing vehicular ad-hoc networks (VANETs). Malicious and selfish nodes by generating inaccurate information, have undesirable impacts on the trustworthiness of the VANET environment. Obstacles also have a negative impact on data trustworthiness by restricting direct communication between nodes. In this study, a trust model based on plausibility, experience, and type of vehicle is presented to cope with inaccurate, incomplete and uncertainty data under both line of sight (LoS) and none-line of sight (NLoS) conditions. In addition, a model using the k-nearest neighbor (kNN) classification algorithm based on feature similarity and symmetry is developed to detect the NLoS condition. Radio signal strength indicator (RSSI), packet reception rate (PDR) and the distance between two vehicle nodes are the features used in the proposed kNN algorithm. Moreover, due to the big data generated in VANET, secure communication between vehicle and edge node is designed using the Cuckoo filter. All obtained results are validated through well-known evaluation measures such as precision, recall, overall accuracy, and communication overhead. The results indicate that the proposed trust model has a better performance as compared to the attack-resistant trust management (ART) scheme and weighted voting (WV) approach. Additionally, the proposed trust model outperforms both ART and WV approaches under diffierent patterns of attack such as a simple attack, opinion tampering attack, and cunning attack. Monte-Carlo simulation results also prove validity of the proposed trust model

    Indoor localization utilizing existing infrastructure in smart homes : a thesis by publications presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Computer and Electronics Engineering, Massey University, Albany, New Zealand

    Get PDF
    Listed in 2019 Dean's List of Exceptional ThesesIndoor positioning system (IPS) have received significant interest from the research community over the past decade. However, this has not eventuated into widespread adoption of IPS and few commercial solutions exist. Integration into Smart Homes could allow for secondary services including location-based services, targeted user experiences and intrusion detection, to be enabled using the existing underlying infrastructure. Since New Zealand has an aging population, we must ensure that the elderly are well looked after. An IPS solution could detect whether a person has been immobile for an extended period and alert medical personnel. A major shortcoming of existing IPS is their reliance on end-users to undertake a significant infrastructure investment to facilitate the localization tasks. An IPS that does not require extensive installation and calibration procedures, could potentially see significant uptake from end users. In order to expedite the widespread adoption of IPS technology, this thesis focuses on four major areas of improvement, namely: infrastructure reuse, reduced node density, algorithm improvement and reduced end user calibration requirements. The work presented demonstrates the feasibility of utilizing existing wireless and lighting infrastructure for positioning and implements novel spring-relaxation and potential fields-based localization approaches that allow for robust target tracking, with minimal calibration requirements. The developed novel localization algorithms are benchmarked against the existing state of the art and show superior performance
    corecore