576 research outputs found

    A Customizable IoT Platform Developed Using Low-Code

    Get PDF
    In nowadays’ societies and businesses’ ecosystems of acceleration, it is of most importance the digitalization of the formers. In this sense, Internet of Things (IoT) emerges to connect devices to the internet, allowing the access to large amounts of data and, through its analysis, to act upon it. An IoT platform allows, among others, to manage IoT devices. Nonetheless, its development is still a complex and expensive process that requires high technical knowledge. To accelerate developments when building IoT applications, this thesis proposes the use of Low-Code platforms, such as Outsystems. To improve the user experience, an embedded customizable dashboard is included in the platform. To achieve this, a reusable Forge component was built and is currently available for download and in use by the community. This component allows to provide drag and drop functionalities to both web and mobile applications. In this case, it will allow the reordering of dashboard cards to personalize dashboards. Another component that enables barcode/qr code reading by Zebra devices is also included in this thesis. To assess the developed IoT platform, an IoT device prototype was created, using an Arduino with an ESP module, as well as a set of sensors and actuators that communicate with the IoT platform via the Message Queuing Telemetry Transport (MQTT) protocol.No ecossistema de aceleração em que a sociedade e as indústrias se encontram actualmente, é da maior importância a rápida digitalização das mesmas. O conceito de Internet of Things (IoT) surge então para conectar uma grande diversidade de dispositivos à internet, possibilitando o acesso a uma grande quantidade de dados e, aquando da análise dos mesmos, optimizar um conjunto de operações. Plataformas IoT são ferramentas bastante úteis em projectos IoT. Estas permitem, entre outros, a gestão de dispositivos IoT, no entanto, o seu desenvolvimento é um processo complexo e demorado que requer elevados orçamentos e conhecimentos técnicos. Para acelerar o desenvolvimento deste tipo de plataformas, esta dissertação propõe o uso plataformas de desenvolvimento Low-Code, nomeadamente Outsystems. Para melhorar a experiência de utilizador, neste trabalho é proposta uma plataforma IoT com dashboards personalizáveis, utilizando uma arquitetura modular. Para tal, foi desenvolvido um componente reutilizável, publicado na Forge e que está atualmente disponível e a ser utilizado pela comunidade. O mesmo permite adicionar a funcionalidade de drag and drop em aplicações web e mobile. Neste caso, o componente permite arrastar cartões, de forma a personalizar dashboards. Um outro componente que permite a leitura de códigos qr/de barras foi também desenvolvido e encontra-se disponível para download. Para validar a plataforma desenvolvida, foi criado um protótipo de um dispositivo IoT, utilizando um Arduino com um módulo ESP e um conjunto de sensores e atuadores, que comunica com a plataforma através do protocolo MQTT

    Physical cyber-security algorithm for wireless sensor networks

    Get PDF
    Today, the wireless sensor network (WSN) plays an important role in our daily life. In addition, it is used in many applications such as military, medical, greenhouse, and transport. Due to the sending data between its nodes or to the base station requires a connection link, the sensor nodes can be exposed to the many attacks that exploit the weaknesses of the network. One of the most important types of these attacks is the denial of service (DoS). DoS attack exhausts the system's resources that lead the system to be out of service. In this paper, a cyber-security algorithm is proposed for physical level of WSN that adopts message queuing telemetry transport (MQTT) protocol for data transmission and networking. This algorithm predicts the DoS attacks at the first time of happening to be isolated from the WSN. It includes three stages of detecting the attack, predicting the effects of this attack and preventing the attacks by excluding the predicted nodes from the WSN. We applied a type of DoS attack that is a DoS injection attack (DoSIA) on the network protocol. The proposed algorithm is tested by adopting three case studies to cover the most common cases of attacks. The experiment results show the superior of the proposed algorithm in detecting and solving the cyber-attacks

    A Microservices e-Health System for Ecological Frailty Assessment Using Wearables

    Get PDF
    The population in developed countries is aging and this fact results in high elderly health costs, as well as a decrease in the number of active working members to support these costs. This could lead to a collapse of the current systems. One of the first insights of the decline in elderly people is frailty, which could be decelerated if it is detected at an early stage. Nowadays, health professionals measure frailty manually through questionnaires and tests of strength or gait focused on the physical dimension. Sensors are increasingly used to measure and monitor different e-health indicators while the user is performing Basic Activities of Daily Life (BADL). In this paper, we present a system based on microservices architecture, which collects sensory data while the older adults perform Instrumental ADLs (IADLs) in combination with BADLs. IADLs involve physical dimension, but also cognitive and social dimensions. With the sensory data we built a machine learning model to assess frailty status which outperforms the previous works that only used BADLs. Our model is accurate, ecological, non-intrusive, flexible and can help health professionals to automatically detect frailty.Ministry of Economy and Competitiveness from Spain MINECO/FEDER MAT2017-85999PEuropean Union (EU) MINECO/FEDER MAT2017-85999PRegional Government of Andalusia Research Fund from Spain A-BIO-157-UGR-1

    Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications

    Get PDF
    Digital certificates are regarded as the most secure and scalable way of implementing authentication services in the Internet today. They are used by most popular security protocols, including Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The lifecycle management of digital certificates relies on centralized Certification Authority (CA)-based Public Key Infrastructures (PKIs). However, the implementation of PKIs and certificate lifecycle management procedures in Industrial Internet of Things (IIoT) environments presents some challenges, mainly due to the high resource consumption that they imply and the lack of trust in the centralized CAs. This paper identifies and describes the main challenges to implement certificate-based public key cryptography in IIoT environments and it surveys the alternative approaches proposed so far in the literature to address these challenges. Most proposals rely on the introduction of a Trusted Third Party to aid the IIoT devices in tasks that exceed their capacity. The proposed alternatives are complementary and their application depends on the specific challenge to solve, the application scenario, and the capacities of the involved IIoT devices. This paper revisits all these alternatives in light of industrial communication models, identifying their strengths and weaknesses, and providing an in-depth comparative analysis.This work was financially supported by the European commission through ECSEL-JU 2018 program under the COMP4DRONES project (grant agreement N∘ 826610), with national financing from France, Spain, Italy, Netherlands, Austria, Czech, Belgium and Latvia. It was also partially supported by the Ayudas Cervera para Centros Tecnológicos grant of the Spanish Centre for the Development of Industrial Technology (CDTI) under the project EGIDA (CER-20191012), and in part by the Department of Economic Development and Competitiveness of the Basque Government through the project TRUSTIND—Creating Trust in the Industrial Digital Transformation (KK-2020/00054)

    IoT-based digital twin for energy cyber-physical systems: design and implementation

    Get PDF
    With the emergence of distributed energy resources (DERs), with their associated communication and control complexities, there is a need for an efficient platform that can digest all the incoming data and ensure the reliable operation of the power system. The digital twin (DT) is a new concept that can unleash tremendous opportunities and can be used at the different control and security levels of power systems. This paper provides a methodology for the modelling of the implementation of energy cyber-physical systems (ECPSs) that can be used for multiple applications. Two DT types are introduced to cover the high-bandwidth and the low-bandwidth applications that need centric oversight decision making. The concept of the digital twin is validated and tested using Amazon Web Services (AWS) as a cloud host that can incorporate physical and data models as well as being able to receive live measurements from the different actual power and control entities. The experimental results demonstrate the feasibility of the real-time implementation of the DT for the ECPS based on internet of things (IoT) and cloud computing technologies. The normalized mean-square error for the low-bandwidth DT case was 3.7%. In the case of a high-bandwidth DT, the proposed method showed superior performance in reconstructing the voltage estimates, with 98.2% accuracy from only the controllers’ states

    Tool Wear Prediction Upgrade Kit for Legacy CNC Milling Machines in the Shop Floor

    Get PDF
    The operation of CNC milling is expensive because of the cost-intensive use of cutting tools. The wear and tear of CNC tools influence the tool lifetime. Today’s machines are not capable of accurately estimating the tool abrasion during the machining process. Therefore, manufacturers rely on reactive maintenance, a tool change after breakage, or a preventive maintenance approach, a tool change according to predefined tool specifications. In either case, maintenance costs are high due to a loss of machine utilization or premature tool change. To find the optimal point of tool change, it is necessary to monitor CNC process parameters during machining and use advanced data analytics to predict the tool abrasion. However, data science expertise is limited in small-medium sized manufacturing companies. The long operating life of machines often does not justify investments in new machines before the end of operating life. The publication describes a cost-efficient approach to upgrade legacy CNC machines with a Tool Wear Prediction Upgrade Kit. A practical solution is presented with a holistic hardware/software setup, including edge device, and multiple sensors. The prediction of tool wear is based on machine learning. The user interface visualizes the machine condition for the maintenance personnel in the shop floor. The approach is conceptualized and discussed based on industry requirements. Future work is outlined

    Safety and Security oriented design for reliable Industrial IoT applications based on WSNs

    Full text link
    [EN] Internet of Things based technologies are enabling the digital transformation in many sectors. However, in order to use this type of solutions, such as wireless sensor networks, in scenarios like transport, industry or smart cities, the deployed networks must meet sensible safety and security requirements. This article describes a Wireless Sensor Network design that applies multi-layered mechanisms and tools to ensure security, safety and reliability while maintaining usability in Rail and Industrial IoT scenarios. The proposed solution provides guidelines for choosing the best implementations given usual restrictions, offering a modular stack so it can be combined with other solutions.This work has been supported by the SCOTT project (Secure COnnected Trustable Things) (www.scottproject.eu), which has received funding from the Electronic Component Systems for European Leadership Joint Undertaking under grant agreement No 737422. This Joint Undertaking receives support from the European Union's Horizon 2020 research and innovation programme, and from Austria, Spain, Finland, Ireland, Sweden, Germany, Poland, Portugal, Netherlands, Belgium and Norway. It has also been funded by Generalitat Valenciana through the ¿Instituto Valenciano de Competitividad Empresarial ¿ IVACE¿, and by the MCyU (Spanish Ministry of Science and Universities) under the project ATLAS (PGC2018-094151-BI00), which is partially funded by AEI, FEDER and EU.Vera-Pérez, J.; Todoli Ferrandis, D.; Sempere Paya, VM.; Ponce Tortajada, R.; Mujica, G.; Portilla, J. (2019). Safety and Security oriented design for reliable Industrial IoT applications based on WSNs. IEEE. 1774-1781. https://doi.org/10.1109/ETFA.2019.8869204S1774178
    corecore