2,185 research outputs found

    Future wireless applications for a networked city: services for visitors and residents

    Get PDF
    Future wireless networks will offer near-ubiquitous high-bandwidth communications to mobile users. In addition, the accurate position of users will be known, either through network services or via additional sensing devices such as GPS. These characteristics of future mobile environments will enable the development of location-aware and, more generally, context-sensitive applications. In an attempt to explore the system, application, and user issues associated with the development and deployment of such applications, we began to develop the Lancaster GUIDE system in early 1997, finishing the first phase of the project in 1999. In its entirety, GUIDE comprises a citywide wireless network based on 802.11, a context-sensitive tour guide application with, crucially, significant content, and a set of supporting distributed systems services. Uniquely in the field, GUIDE has been evaluated using members of the general public, and we have gained significant experience in the design of usable context-sensitive applications. We focus on the applications and supporting infrastructure that will form part of GUIDE II, the successor to the GUIDE system. These developments are designed to expand GUIDE outside the tour guide domain, and to provide applications and services for residents of the city of Lancaster, offering a vision of the future mobile environments that will emerge once ubiquitous high-bandwidth coverage is available in most cities

    Routing and Mobility on IPv6 over LoWPAN

    Get PDF
    The IoT means a world-wide network of interconnected objects based on standard communication protocols. An object in this context is a quotidian physical device augmented with sensing/actuating, processing, storing and communication capabilities. These objects must be able to interact with the surrounding environment where they are placed and to cooperate with neighbouring objects in order to accomplish a common objective. The IoT objects have also the capabilities of converting the sensed data into automated instructions and communicating them to other objects through the communication networks, avoiding the human intervention in several tasks. Most of IoT deployments are based on small devices with restricted computational resources and energy constraints. For this reason, initially the scientific community did not consider the use of IP protocol suite in this scenarios because there was the perception that it was too heavy to the available resources on such devices. Meanwhile, the scientific community and the industry started to rethink about the use of IP protocol suite in all IoT devices and now it is considered as the solution to provide connectivity between the IoT devices, independently of the Layer 2 protocol in use, and to connect them to the Internet. Despite the use of IP suite protocol in all devices and the amount of solutions proposed, many open issues remain unsolved in order to reach a seamless integration between the IoT and the Internet and to provide the conditions to IoT service widespread. This thesis addressed the challenges associated with the interconnectivity between the Internet and the IoT devices and with the security aspects of the IoT. In the interconnectivity between the IoT devices and the Internet the problem is how to provide valuable information to the Internet connected devices, independently of the supported IP protocol version, without being necessary accessed directly to the IoT nodes. In order to solve this problem, solutions based on Representational state transfer (REST) web services and IPv4 to IPv6 dual stack transition mechanism were proposed and evaluated. The REST web service and the transition mechanism runs only at the border router without penalizing the IoT constrained devices. The mitigation of the effects of internal and external security attacks minimizing the overhead imposed on the IoT devices is the security challenge addressed in this thesis. Three different solutions were proposed. The first is a mechanism to prevent remotely initiated transport level Denial of Service attacks that avoids the use of inefficient and hard to manage traditional firewalls. It is based on filtering at the border router the traffic received from the Internet and destined to the IoT network according to the conditions announced by each IoT device. The second is a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. The third is a network admission control framework that prevents IoT unauthorized nodes to communicate with IoT authorized nodes or with the Internet, which drastically reduces the number of possible security attacks. The network admission control was also exploited as a management mechanism as it can be used to manage the network size in terms of number of nodes, making the network more manageable, increasing its reliability and extending its lifetime.A IoT (Internet of Things) tem suscitado o interesse tanto da comunidade acadĂ©mica como da indĂșstria, uma vez que os campos de aplicação sĂŁo inĂșmeros assim como os potenciais ganhos que podem ser obtidos atravĂ©s do uso deste tipo de tecnologia. A IoT significa uma rede global de objetos ligados entre si atravĂ©s de uma rede de comunicaçÔes baseada em protocolos standard. Neste contexto, um objeto Ă© um objeto fĂ­sico do dia a dia ao qual foi adicionada a capacidade de medir e de atuar sobre variĂĄveis fĂ­sicas, de processar e armazenar dados e de comunicar. Estes objetos tĂȘm a capacidade de interagir com o meio ambiente envolvente e de cooperar com outros objetos vizinhos de forma a atingirem um objetivo comum. Estes objetos tambĂ©m tĂȘm a capacidade de converter os dados lidos em instruçÔes e de as comunicar a outros objetos atravĂ©s da rede de comunicaçÔes, evitando desta forma a intervenção humana em diversas tarefas. A maior parte das concretizaçÔes de sistemas IoT sĂŁo baseados em pequenos dispositivos autĂłnomos com restriçÔes ao nĂ­vel dos recursos computacionais e de retenção de energia. Por esta razĂŁo, inicialmente a comunidade cientĂ­fica nĂŁo considerou adequado o uso da pilha protocolar IP neste tipo de dispositivos, uma vez que havia a perceção de que era muito pesada para os recursos computacionais disponĂ­veis. Entretanto, a comunidade cientĂ­fica e a indĂșstria retomaram a discussĂŁo acerca dos benefĂ­cios do uso da pilha protocolar em todos os dispositivos da IoT e atualmente Ă© considerada a solução para estabelecer a conetividade entre os dispositivos IoT independentemente do protocolo da camada dois em uso e para os ligar Ă  Internet. Apesar do uso da pilha protocolar IP em todos os dispositivos e da quantidade de soluçÔes propostas, sĂŁo vĂĄrios os problemas por resolver no que concerne Ă  integração contĂ­nua e sem interrupçÔes da IoT na Internet e de criar as condiçÔes para a adoção generalizada deste tipo de tecnologias. Esta tese versa sobre os desafios associados Ă  integração da IoT na Internet e dos aspetos de segurança da IoT. Relativamente Ă  integração da IoT na Internet o problema Ă© como fornecer informação vĂĄlida aos dispositivos ligados Ă  Internet, independentemente da versĂŁo do protocolo IP em uso, evitando o acesso direto aos dispositivos IoT. Para a resolução deste problema foram propostas e avaliadas soluçÔes baseadas em web services REST e em mecanismos de transição IPv4 para IPv6 do tipo pilha dupla (dual stack). O web service e o mecanismo de transição sĂŁo suportados apenas no router de fronteira, sem penalizar os dispositivos IoT. No que concerne Ă  segurança, o problema Ă© mitigar os efeitos dos ataques de segurança internos e externos iniciados local e remotamente. Foram propostas trĂȘs soluçÔes diferentes, a primeira Ă© um mecanismo que minimiza os efeitos dos ataques de negação de serviço com origem na Internet e que evita o uso de mecanismos de firewalls ineficientes e de gestĂŁo complexa. Este mecanismo filtra no router de fronteira o trĂĄfego com origem na Internet Ă© destinado Ă  IoT de acordo com as condiçÔes anunciadas por cada um dos dispositivos IoT da rede. A segunda solução, Ă© uma framework de network admission control que controla quais os dispositivos que podem aceder Ă  rede com base na autorização administrativa e que aplica polĂ­ticas de conformidade relativas Ă  segurança aos dispositivos autorizados. A terceira Ă© um mecanismo de network admission control para redes 6LoWPAN que evita que dispositivos nĂŁo autorizados comuniquem com outros dispositivos legĂ­timos e com a Internet o que reduz drasticamente o nĂșmero de ataques Ă  segurança. Este mecanismo tambĂ©m foi explorado como um mecanismo de gestĂŁo uma vez que pode ser utilizado a dimensĂŁo da rede quanto ao nĂșmero de dispositivos, tornando-a mais fĂĄcil de gerir e aumentando a sua fiabilidade e o seu tempo de vida

    IoT Applications Computing

    Get PDF
    The evolution of emerging and innovative technologies based on Industry 4.0 concepts are transforming society and industry into a fully digitized and networked globe. Sensing, communications, and computing embedded with ambient intelligence are at the heart of the Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Industry 4.0 technologies with expanding applications in manufacturing, transportation, health, building automation, agriculture, and the environment. It is expected that the emerging technology clusters of ambient intelligence computing will not only transform modern industry but also advance societal health and wellness, as well as and make the environment more sustainable. This book uses an interdisciplinary approach to explain the complex issue of scientific and technological innovations largely based on intelligent computing

    Survey and Systematization of Secure Device Pairing

    Full text link
    Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices. Comparison and assessment of SDP schemes is troublesome, because each scheme makes different assumptions about out-of-band channels and adversary models, and are driven by their particular use-cases. A conceptual model that facilitates meaningful comparison among SDP schemes is missing. We provide such a model. In this article, we survey and analyze a wide range of SDP schemes that are described in the literature, including a number that have been adopted as standards. A system model and consistent terminology for SDP schemes are built on the foundation of this survey, which are then used to classify existing SDP schemes into a taxonomy that, for the first time, enables their meaningful comparison and analysis.The existing SDP schemes are analyzed using this model, revealing common systemic security weaknesses among the surveyed SDP schemes that should become priority areas for future SDP research, such as improving the integration of privacy requirements into the design of SDP schemes. Our results allow SDP scheme designers to create schemes that are more easily comparable with one another, and to assist the prevention of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications Surveys & Tutorials 2017 (Volume: PP, Issue: 99

    Enhancing the efficiency of electricity utilization through home energy management systems within the smart grid framework

    Get PDF
    The concept behind smart grids is the aggregation of “intelligence” into the grid, whether through communication systems technologies that allow broadcast/data reception in real-time, or through monitoring and systems control in an autonomous way. With respect to the technological advancements, in recent years there has been a significant increment in devices and new strategies for the implementation of smart buildings/homes, due to the growing awareness of society in relation to environmental concerns and higher energy costs, so that energy efficiency improvements can provide real gains within modern society. In this perspective, the end-users are seen as active players with the ability to manage their energy resources, for example, microproduction units, domestic loads, electric vehicles and their participation in demand response events. This thesis is focused on identifying application areas where such technologies could bring benefits for their applicability, such as the case of wireless networks, considering the positive and negative points of each protocol available in the market. Moreover, this thesis provides an evaluation of dynamic prices of electricity and peak power, using as an example a system with electric vehicles and energy storage, supported by mixed-integer linear programming, within residential energy management. This thesis will also develop a power measuring prototype designed to process and determine the main electrical measurements and quantify the electrical load connected to a low voltage alternating current system. Finally, two cases studies are proposed regarding the application of model predictive control and thermal regulation for domestic applications with cooling requirements, allowing to minimize energy consumption, considering the restrictions of demand, load and acclimatization in the system
    • 

    corecore