134 research outputs found

    LoRaWAN geo-tracking using map matching and compass sensor fusion

    Get PDF
    In contrast to accurate GPS-based localization, approaches to localize within LoRaWAN networks offer the advantages of being low power and low cost. This targets a very different set of use cases and applications on the market where accuracy is not the main considered metric. The localization is performed by the Time Difference of Arrival (TDoA) method and provides discrete position estimates on a map. An accurate "tracking-on-demand" mode for retrieving lost and stolen assets is important. To enable this mode, we propose deploying an e-compass in the mobile LoRa node, which frequently communicates directional information via the payload of the LoRaWAN uplink messages. Fusing this additional information with raw TDoA estimates in a map matching algorithm enables us to estimate the node location with a much increased accuracy. It is shown that this sensor fusion technique outperforms raw TDoA at the cost of only embedding a low-cost e-compass. For driving, cycling, and walking trajectories, we obtained minimal improvements of 65, 76, and 82% on the median errors which were reduced from 206 to 68 m, 197 to 47 m, and 175 to 31 m, respectively. The energy impact of adding an e-compass is limited: energy consumption increases by only 10% compared to traditional LoRa localization, resulting in a solution that is still 14 times more energy-efficient than a GPS-over-LoRa solution

    Implementing Efficient and Multi-Hop Image Acquisition In Remote Monitoring IoT systems using LoRa Technology

    Get PDF
    Remote sensing or monitoring through the deployment of wireless sensor networks (WSNs) is considered an economical and convenient manner in which to collect information without cumbersome human intervention. Unfortunately, due to challenging deployment conditions, such as large geographic area, and lack of electricity and network infrastructure, designing such wireless sensor networks for large-scale farms or forests is difficult and expensive. Many WSN-appropriate wireless technologies, such as Wi-Fi, Bluetooth, Zigbee and 6LoWPAN, have been widely adopted in remote sensing. The performance of these technologies, however, is not sufficient for use across large areas. Generally, as the geographical scope expands, more devices need to be employed to expand network coverage, so the number and cost of devices in wireless sensor networks will increase dramatically. Besides, this type of deployment usually not only has a high probability of failure and high transmission costs, but also imposes additional overhead on system management and maintenance. LoRa is an emerging physical layer standard for long range wireless communication. By utilizing chirp spread spectrum modulation, LoRa features a long communication range and broad signal coverage. At the same time, LoRa also has low power consumption. Thus, LoRa outperforms similar technologies in terms of hardware cost, power consumption and radio coverage. It is also considered to be one of the promising solutions for the future of the Internet of Things (IoT). As the research and development of LoRa are still in its early stages, it lacks sufficient support for multi-packet transport and complex deployment topologies. Therefore, LoRa is not able to further expand its network coverage and efficiently support big data transfers like other conventional technologies. Besides, due to the smaller payload and data rate in LoRa physical design, it is more challenging to implement these features in LoRa. These shortcomings limit the potential for LoRa to be used in more productive application scenarios. This thesis addresses the problem of multi-packet and multi-hop transmission using LoRa by proposing two novel protocols, namely Multi-Packet LoRa (MPLR) and Multi-Hop LoRa (MHLR). LoRa's ability to transmit large messages is first evaluated in this thesis, and then the protocols are well designed and implemented to enrich LoRa's possibilities in image transmission applications and multi-hop topologies. MPLR introduces a reliable transport mechanism for multi-packet sensory data, making its network not limited to the transmission of small sensor data only. In collaboration with a data channel reservation technique, MPLR is able to greatly mitigate data collisions caused by the increased transmission time in laboratory experiments. MHLR realizes efficient routing in LoRa multi-hop transmission by utilizing the power of machine learning. The results of both indoor and outdoor experiments show that the machine learning based routing is effective in wireless sensor networks

    IoT for measurements and measurements for IoT

    Get PDF
    The thesis is framed in the broad strand of the Internet of Things, providing two parallel paths. On one hand, it deals with the identification of operational scenarios in which the IoT paradigm could be innovative and preferable to pre-existing solutions, discussing in detail a couple of applications. On the other hand, the thesis presents methodologies to assess the performance of technologies and related enabling protocols for IoT systems, focusing mainly on metrics and parameters related to the functioning of the physical layer of the systems

    Measuring trustworthiness of image data in the internet of things environment

    Get PDF
    Internet of Things (IoT) image sensors generate huge volumes of digital images every day. However, easy availability and usability of photo editing tools, the vulnerability in communication channels and malicious software have made forgery attacks on image sensor data effortless and thus expose IoT systems to cyberattacks. In IoT applications such as smart cities and surveillance systems, the smooth operation depends on sensors’ sharing data with other sensors of identical or different types. Therefore, a sensor must be able to rely on the data it receives from other sensors; in other words, data must be trustworthy. Sensors deployed in IoT applications are usually limited to low processing and battery power, which prohibits the use of complex cryptography and security mechanism and the adoption of universal security standards by IoT device manufacturers. Hence, estimating the trust of the image sensor data is a defensive solution as these data are used for critical decision-making processes. To our knowledge, only one published work has estimated the trustworthiness of digital images applied to forensic applications. However, that study’s method depends on machine learning prediction scores returned by existing forensic models, which limits its usage where underlying forensics models require different approaches (e.g., machine learning predictions, statistical methods, digital signature, perceptual image hash). Multi-type sensor data correlation and context awareness can improve the trust measurement, which is absent in that study’s model. To address these issues, novel techniques are introduced to accurately estimate the trustworthiness of IoT image sensor data with the aid of complementary non-imagery (numeric) data-generating sensors monitoring the same environment. The trust estimation models run in edge devices, relieving sensors from computationally intensive tasks. First, to detect local image forgery (splicing and copy-move attacks), an innovative image forgery detection method is proposed based on Discrete Cosine Transformation (DCT), Local Binary Pattern (LBP) and a new feature extraction method using the mean operator. Using Support Vector Machine (SVM), the proposed method is extensively tested on four well-known publicly available greyscale and colour image forgery datasets and on an IoT-based image forgery dataset that we built. Experimental results reveal the superiority of our proposed method over recent state-of-the-art methods in terms of widely used performance metrics and computational time and demonstrate robustness against low availability of forged training samples. Second, a robust trust estimation framework for IoT image data is proposed, leveraging numeric data-generating sensors deployed in the same area of interest (AoI) in an indoor environment. As low-cost sensors allow many IoT applications to use multiple types of sensors to observe the same AoI, the complementary numeric data of one sensor can be exploited to measure the trust value of another image sensor’s data. A theoretical model is developed using Shannon’s entropy to derive the uncertainty associated with an observed event and Dempster-Shafer theory (DST) for decision fusion. The proposed model’s efficacy in estimating the trust score of image sensor data is analysed by observing a fire event using IoT image and temperature sensor data in an indoor residential setup under different scenarios. The proposed model produces highly accurate trust scores in all scenarios with authentic and forged image data. Finally, as the outdoor environment varies dynamically due to different natural factors (e.g., lighting condition variations in day and night, presence of different objects, smoke, fog, rain, shadow in the scene), a novel trust framework is proposed that is suitable for the outdoor environments with these contextual variations. A transfer learning approach is adopted to derive the decision about an observation from image sensor data, while also a statistical approach is used to derive the decision about the same observation from numeric data generated from other sensors deployed in the same AoI. These decisions are then fused using CertainLogic and compared with DST-based fusion. A testbed was set up using Raspberry Pi microprocessor, image sensor, temperature sensor, edge device, LoRa nodes, LoRaWAN gateway and servers to evaluate the proposed techniques. The results show that CertainLogic is more suitable for measuring the trustworthiness of image sensor data in an outdoor environment.Doctor of Philosoph

    Acoustic Event Detection System

    Get PDF
    Hlavním cílem této práce je vytvořit systém schopný detekce, klasifikace a lokalizace střelby. Systém se skládá z dedikované desky a serverové aplikace. Systém detekuje zvukové události a jako první krok vyfiltruje události, které nejsou střelba. Následně jsou klíčové vlastnosti nahrávky extrahovány pomocí Mel-Frequency Cepstral Coefficients. Na vektoru klíčových vlastností je dále provedena klasifikace použitého kalibru zbraně, kterou provádí metoda podpůrných vektorů (Support-Vector Machine). Lokalizace střelby je prováděna na zvukových událostech, ke kterým je připojena velmi přesná časová značka (timestamp) a pozice měřícího přístroje (uzlu). Data shromážděná z jednotlivých zařízení jsou použita pro řešení lokalizačního problému na základě změřeného času zaznamenání (Time of Arrival Localization Problem). Pro jeho řešení jsou popsány dvě různé metody, lišící se dle počtu měřících zařízení, které danou událost detekovaly. Vytvořená serverová aplikace je nejen schopna řešit lokalizační úlohu popsanou výše, ale také poskytuje vizualizaci s administrací uživatelů, uzlů a zpráv uzlů. Navržená deska je schopna získat svou pozici spolu s přesnou časovou značkou události a odeslat všechny potřebné informace pomocí LoRaWan sítě na server. Na desce je naimplementován jak detekční, tak klasifikační algoritmus. Navíc deska nabízí rozhraní ve formě příkazové řádky pro nastavení parametrů aplikace, jako jsou například koeficienty detekčního algoritmu.The main goal of the thesis is to create a system capable of gunshot detection, classification, and localization. The detection system consists of a specialized board and a server application. At first, the gunshot detection algorithm is executed for filtration of non-gunshot events. Afterwards, the features are extracted by Mel-Frequency Cepstral Coefficients. The feature vector is then passed to the gunshot classification, performed through Support Vector Machine. The localization task is executed on precisely timestamped acoustic events that are coupled with position of the measuring devices (nodes) on the server. The aggregated data are utilized for solving the Time of Arrival Localization Problem. Two different methods are described based on the number of nodes that detected the event. The created server application solves the localization task as mentioned above but also offers visualization and administration of users, nodes, and node’s messages. The proposed board is able to acquire position with precise timestamping and send the required information through LoRaWAN network to the server. The board implements detection and classification algorithms and also offers a command line interface for setting the firmware’s parameters such as detection algorithms’ coefficients

    Distributed scheduling algorithms for LoRa-based wide area cyber-physical systems

    Get PDF
    Low Power Wide Area Networks (LPWAN) are a class of wireless communication protocols that work over long distances, consume low power and support low datarates. LPWANs have been designed for monitoring applications, with sparse communication from nodes to servers and sparser from servers to nodes. Inspite of their initial design, LPWANs have the potential to target applications with higher and stricter requirements like those of Cyber-Physical Systems (CPS). Due to their long-range capabilities, LPWANs can specifically target CPS applications distributed over a wide-area, which is referred to as Wide-Area CPS (WA-CPS). Augmenting WA-CPSs with wireless communication would allow for more flexible, low-cost and easily maintainable deployment. However, wireless communications come with problems like reduced reliability and unpredictable latencies, making them harder to use for CPSs. With this intention, this thesis explores the use of LPWANs, specifically LoRa, to meet the communication and control requirements of WA-CPSs. The thesis focuses on using LoRa due to its high resilience to noise, several communication parameters to choose from and a freely modifiable communication stack and servers making it ideal for research and deployment. However, LoRaWAN suffers from low reliability due to its ALOHA channel access method. The thesis posits that "Distributed algorithms would increase the protocol's reliability allowing it to meet the requirements of WA-CPSs". Three different application scenarios are explored in this thesis that leverage unexplored aspects of LoRa to meet their requirements. The application scenarios are delay-tolerant vehicular networks, multi-stakeholder WA-CPS deployments and water distribution networks. The systems use novel algorithms to facilitate communication between the nodes and gateways to ensure a highly reliable system. The results outperform state-of-art techniques to prove that LoRa is currently under-utilised and can be used for CPS applications.Open Acces

    IoT Transmission Technologies for Distributed Measurement Systems in Critical Environments

    Get PDF
    Distributed measurement systems are spread in the most diverse application scenarios, and Internet of Things (IoT) transmission equipment is usually the enabling technologies for such measurement systems that need to feature wireless connectivity to ensure pervasiveness. Because wireless measurement systems have been deployed for the last years even in critical environments, assessing transmission technologies performances in such contexts is fundamental. Indeed, they are the most challenging ones for wireless data transmission due to their intrinsic attenuation capabilities. Several scenarios in which measurement systems can be deployed are analysed. Firstly, marine contexts are treated by considering above-the-sea wireless links. Such setting can be experienced in whichever application requiring remote monitoring of facilities and assets that are offshore installed. Some instances are offshore sea farming plants, or remote video monitoring systems installed on seamark buoys. Secondly, wireless communications taking place from the underground to the aboveground are covered. This scenario is typical of precision agriculture applications, where the accurate measurement of underground physical parameters is needed to be remotely sent to optimise crops reducing the wastefulness of fundamental resources (e.g., irrigation water). Thirdly, wireless communications occurring from the underwater to the abovewater are addressed. Such situation is inevitable for all those infrastructures monitoring conservation status of underwater species like algae, seaweeds and reef. Then, wireless links happening traversing metal surfaces and structures are tackled. Such context is commonly encountered in asset tracking and monitoring (e.g., containers), or in smart metering applications (e.g., utility meters). Lastly, sundry harsh environments that are typical of industrial monitoring (e.g., vibrating machineries, harsh temperature and humidity rooms, corrosive atmospheres) are tested to validate pervasive measurement infrastructures even in such contexts that are usually experienced in Industrial Internet of Things (IIoT) applications. The performances of wireless measurement systems in such scenarios are tested by sorting out ad-hoc measurement campaigns. Finally, IoT measurement infrastructures respectively deployed in above-the-sea and underground-to-aboveground settings are described to provide real applications in which such facilities can be effectively installed. Nonetheless, the aforementioned application scenarios are only some amid their sundry variety. Indeed, nowadays distributed pervasive measurement systems have to be thought in a broad way, resulting in countless instances: predictive maintenance, smart healthcare, smart cities, industrial monitoring, or smart agriculture, etc. This Thesis aims at showing distributed measurement systems in critical environments to set up pervasive monitoring infrastructures that are enabled by IoT transmission technologies. At first, they are presented, and then the harsh environments are introduced, along with the relative theoretical analysis modelling path loss in such conditions. It must be underlined that this Thesis aims neither at finding better path loss models with respect to the existing ones, nor at improving them. Indeed, path loss models are exploited as they are, in order to derive estimates of losses to understand the effectiveness of the deployed infrastructure. In fact, some transmission tests in those contexts are described, along with providing examples of these types of applications in the field, showing the measurement infrastructures and the relative critical environments serving as deployment sites. The scientific relevance of this Thesis is evident since, at the moment, the literature lacks a comparative study like this, showing both transmission performances in critical environments, and the deployment of real IoT distributed wireless measurement systems in such contexts
    corecore