752 research outputs found

    Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms

    Get PDF
    The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different areassuch as seamless platform integration, context based cognitive network integration,new mobile sensor/actuator network paradigms, things identification(addressing, naming in IoT) and dynamic things discoverability and manyothers. The IoRT represents new convergence challenges and their need to be addressed, in one side the programmability and the communication ofmultiple heterogeneous mobile/autonomous/robotic things for cooperating,their coordination, configuration, exchange of information, security, safetyand protection. Developments in IoT heterogeneous parallel processing/communication and dynamic systems based on parallelism and concurrencyrequire new ideas for integrating the intelligent “devices”, collaborativerobots (COBOTS), into IoT applications. Dynamic maintainability, selfhealing,self-repair of resources, changing resource state, (re-) configurationand context based IoT systems for service implementation and integrationwith IoT network service composition are of paramount importance whennew “cognitive devices” are becoming active participants in IoT applications.This chapter aims to be an overview of the IoRT concept, technologies,architectures and applications and to provide a comprehensive coverage offuture challenges, developments and applications

    Pay as You Go: A Generic Crypto Tolling Architecture

    Full text link
    The imminent pervasive adoption of vehicular communication, based on dedicated short-range technology (ETSI ITS G5 or IEEE WAVE), 5G, or both, will foster a richer service ecosystem for vehicular applications. The appearance of new cryptography based solutions envisaging digital identity and currency exchange are set to stem new approaches for existing and future challenges. This paper presents a novel tolling architecture that harnesses the availability of 5G C-V2X connectivity for open road tolling using smartphones, IOTA as the digital currency and Hyperledger Indy for identity validation. An experimental feasibility analysis is used to validate the proposed architecture for secure, private and convenient electronic toll payment

    New Waves of IoT Technologies Research – Transcending Intelligence and Senses at the Edge to Create Multi Experience Environments

    Get PDF
    The next wave of Internet of Things (IoT) and Industrial Internet of Things (IIoT) brings new technological developments that incorporate radical advances in Artificial Intelligence (AI), edge computing processing, new sensing capabilities, more security protection and autonomous functions accelerating progress towards the ability for IoT systems to self-develop, self-maintain and self-optimise. The emergence of hyper autonomous IoT applications with enhanced sensing, distributed intelligence, edge processing and connectivity, combined with human augmentation, has the potential to power the transformation and optimisation of industrial sectors and to change the innovation landscape. This chapter is reviewing the most recent advances in the next wave of the IoT by looking not only at the technology enabling the IoT but also at the platforms and smart data aspects that will bring intelligence, sustainability, dependability, autonomy, and will support human-centric solutions.acceptedVersio

    Blockchain and SDN Architecture for Spectrum Management in Cellular Networks

    Get PDF
    Whereas 4G LTE networks have brought about an increase in data rates of mobile networks, they are unable to meet the capacity demands of future networks. Specifically, the centralized nature of the evolved packet core (EPC) makes the network non-scalable to match the exponential increase in number of wireless devices in addition to the complexities of diverse service requirements. The SDN concept has recently attracted a lot of research interest as a viable proposition for bringing about programmability and ease of network management while also offering flexibility for innovative network designs. However, current SDN implementations are not adapted to support business agreements that foster interoperability among mobile network operators (MNOs). This paper is an extended version of our earlier work and we intend to present a unified SDN and blockchain architecture with enhanced spectrum management features for enabling seamless user roaming capabilities between MNOs. Our simulation results show that users can experience no disruption in service with very minimal delay as they traverse between operators

    A comprehensive survey of V2X cybersecurity mechanisms and future research paths

    Get PDF
    Recent advancements in vehicle-to-everything (V2X) communication have notably improved existing transport systems by enabling increased connectivity and driving autonomy levels. The remarkable benefits of V2X connectivity come inadvertently with challenges which involve security vulnerabilities and breaches. Addressing security concerns is essential for seamless and safe operation of mission-critical V2X use cases. This paper surveys current literature on V2X security and provides a systematic and comprehensive review of the most relevant security enhancements to date. An in-depth classification of V2X attacks is first performed according to key security and privacy requirements. Our methodology resumes with a taxonomy of security mechanisms based on their proactive/reactive defensive approach, which helps identify strengths and limitations of state-of-the-art countermeasures for V2X attacks. In addition, this paper delves into the potential of emerging security approaches leveraging artificial intelligence tools to meet security objectives. Promising data-driven solutions tailored to tackle security, privacy and trust issues are thoroughly discussed along with new threat vectors introduced inevitably by these enablers. The lessons learned from the detailed review of existing works are also compiled and highlighted. We conclude this survey with a structured synthesis of open challenges and future research directions to foster contributions in this prominent field.This work is supported by the H2020-INSPIRE-5Gplus project (under Grant agreement No. 871808), the ”Ministerio de Asuntos Económicos y Transformacion Digital” and the European Union-NextGenerationEU in the frameworks of the ”Plan de Recuperación, Transformación y Resiliencia” and of the ”Mecanismo de Recuperación y Resiliencia” under references TSI-063000-2021-39/40/41, and the CHIST-ERA-17-BDSI-003 FIREMAN project funded by the Spanish National Foundation (Grant PCI2019-103780).Peer ReviewedPostprint (published version

    Robust, Resilient and Reliable Architecture for V2X Communication

    Get PDF
    The new developments in mobile edge computing (MEC) and vehicle-to-everything (V2X) communications has positioned 5G and beyond in a strong position to answer the market need towards future emerging intelligent transportation systems and smart city applications. The major attractive features of V2X communication is the inherent ability to adapt to any type of network, device, or data, and to ensure robustness, resilience and reliability of the network, which is challenging to realize. In this work, we propose to drive these further these features by proposing a novel robust, resilient and reliable architecture for V2X communication based on harnessing MEC and blockchain technology. A three stage computing service is proposed. Firstly, a hierarchcial computing architecture is deployed spanning over the vehicular network that constitutes cloud computing (CC), edge computing (EC), fog computing (FC) nodes. The resources and data bases can migrate from the high capacity cloud services (furthest away from the individual node of the network) to the edge (medium) and low level fog node, according to computing service requirements. Secondly, the resource allocation filters the data according to its significance, and rank the nodes according to their usability, and selects the network technology according to their physical channel characteristics. Thirdly, we propose a blockchain-based transaction service that ensures reliability. We discussed two use cases for experimental analysis, plug- in electric vehicles in smart grid scenarios, and massive IoT data services for autonomous cars. The results show that car connectivity prediction is accurate 98% of the times, where 92% more data blocks are added using micro-blockchain solution compared to the public blockchain, where it is able to reduce the time to sign and compute the proof-of-work (PoW), and deliver a low-overhead Proof-of-Stake (PoS) consensus mechanism. This approach can be considered a strong candidate architecture for future V2X, and with more general application for everything- to-everything (X2X) communications
    corecore