93 research outputs found

    Leveraging Resources on Anonymous Mobile Edge Nodes

    Get PDF
    Smart devices have become an essential component in the life of mankind. The quick rise of smartphones, IoTs, and wearable devices enabled applications that were not possible few years ago, e.g., health monitoring and online banking. Meanwhile, smart sensing laid the infrastructure for smart homes and smart cities. The intrusive nature of smart devices granted access to huge amounts of raw data. Researchers seized the moment with complex algorithms and data models to process the data over the cloud and extract as much information as possible. However, the pace and amount of data generation, in addition to, networking protocols transmitting data to cloud servers failed short in touching more than 20% of what was generated on the edge of the network. On the other hand, smart devices carry a large set of resources, e.g., CPU, memory, and camera, that sit idle most of the time. Studies showed that for plenty of the time resources are either idle, e.g., sleeping and eating, or underutilized, e.g. inertial sensors during phone calls. These findings articulate a problem in processing large data sets, while having idle resources in the close proximity. In this dissertation, we propose harvesting underutilized edge resources then use them in processing the huge data generated, and currently wasted, through applications running at the edge of the network. We propose flipping the concept of cloud computing, instead of sending massive amounts of data for processing over the cloud, we distribute lightweight applications to process data on users\u27 smart devices. We envision this approach to enhance the network\u27s bandwidth, grant access to larger datasets, provide low latency responses, and more importantly involve up-to-date user\u27s contextual information in processing. However, such benefits come with a set of challenges: How to locate suitable resources? How to match resources with data providers? How to inform resources what to do? and When? How to orchestrate applications\u27 execution on multiple devices? and How to communicate between devices on the edge? Communication between devices at the edge has different parameters in terms of device mobility, topology, and data rate. Standard protocols, e.g., Wi-Fi or Bluetooth, were not designed for edge computing, hence, does not offer a perfect match. Edge computing requires a lightweight protocol that provides quick device discovery, decent data rate, and multicasting to devices in the proximity. Bluetooth features wide acceptance within the IoT community, however, the low data rate and unicast communication limits its use on the edge. Despite being the most suitable communication protocol for edge computing and unlike other protocols, Bluetooth has a closed source code that blocks lower layer in front of all forms of research study, enhancement, and customization. Hence, we offer an open source version of Bluetooth and then customize it for edge computing applications. In this dissertation, we propose Leveraging Resources on Anonymous Mobile Edge Nodes (LAMEN), a three-tier framework where edge devices are clustered by proximities. On having an application to execute, LAMEN clusters discover and allocate resources, share application\u27s executable with resources, and estimate incentives for each participating resource. In a cluster, a single head node, i.e., mediator, is responsible for resource discovery and allocation. Mediators orchestrate cluster resources and present them as a virtually large homogeneous resource. For example, two devices each offering either a camera or a speaker are presented outside the cluster as a single device with both camera and speaker, this can be extended to any combination of resources. Then, mediator handles applications\u27 distribution within a cluster as needed. Also, we provide a communication protocol that is customizable to the edge environment and application\u27s need. Pushing lightweight applications that end devices can execute over their locally generated data have the following benefits: First, avoid sharing user data with cloud server, which is a privacy concern for many of them; Second, introduce mediators as a local cloud controller closer to the edge; Third, hide the user\u27s identity behind mediators; and Finally, enhance bandwidth utilization by keeping raw data at the edge and transmitting processed information. Our evaluation shows an optimized resource lookup and application assignment schemes. In addition to, scalability in handling networks with large number of devices. In order to overcome the communication challenges, we provide an open source communication protocol that we customize for edge computing applications, however, it can be used beyond the scope of LAMEN. Finally, we present three applications to show how LAMEN enables various application domains on the edge of the network. In summary, we propose a framework to orchestrate underutilized resources at the edge of the network towards processing data that are generated in their proximity. Using the approaches explained later in the dissertation, we show how LAMEN enhances the performance of applications and enables a new set of applications that were not feasible

    Robustness, Security and Privacy in Location-Based Services for Future IoT : A Survey

    Get PDF
    Internet of Things (IoT) connects sensing devices to the Internet for the purpose of exchanging information. Location information is one of the most crucial pieces of information required to achieve intelligent and context-aware IoT systems. Recently, positioning and localization functions have been realized in a large amount of IoT systems. However, security and privacy threats related to positioning in IoT have not been sufficiently addressed so far. In this paper, we survey solutions for improving the robustness, security, and privacy of location-based services in IoT systems. First, we provide an in-depth evaluation of the threats and solutions related to both global navigation satellite system (GNSS) and non-GNSS-based solutions. Second, we describe certain cryptographic solutions for security and privacy of positioning and location-based services in IoT. Finally, we discuss the state-of-the-art of policy regulations regarding security of positioning solutions and legal instruments to location data privacy in detail. This survey paper addresses a broad range of security and privacy aspects in IoT-based positioning and localization from both technical and legal points of view and aims to give insight and recommendations for future IoT systems providing more robust, secure, and privacy-preserving location-based services.Peer reviewe

    Distributed Data Management in Vehicular Networks Using Mobile Agents

    Get PDF
    En los últimos años, las tecnologías de la información y las comunicaciones se han incorporado al mundo de la automoción gracias a sus avances, y han permitido la creación de dispositivos cada vez más pequeños y potentes. De esta forma, los vehículos pueden ahora incorporar por un precio asequible equipos informáticos y de comunicaciones.En este escenario, los vehículos que circulan por una determinada zona (como una ciudad o una autopista) pueden comunicarse entre ellos usando dispositivos inalámbricos que les permiten intercambiar información con otros vehículos cercanos, formando así una red vehicular ad hoc, o VANET (Vehicular Ad hoc Network). En este tipo de redes, las comunicaciones se establecen con conexiones punto a punto por medio de dispositivos tipo Wi-Fi, que permiten la comunicación con otros del mismo tipo dentro de su alcance, sin que sea necesaria la existencia previa de una infraestructura de comunicaciones como ocurre con las tecnologías de telefonía móvil (como 3G/4G), que además requieren de una suscripción y el pago de una tarifa para poder usarlas.Cada vehículo puede enviar información y recibirla de diversos orígenes, como el propio vehículo (por medio de los sensores que lleva incorporados), otros vehículos que se encuentran cerca, así como de la infraestructura de tráfico presente en las carreteras (como semáforos, señales, paneles electrónicos de información, cámaras de vigilancia, etc.). Todos estas fuentes pueden transmitir datos de diversa índole, como información de interés para los conductores (por ejemplo, atascos de tráfico o accidentes en la vía), o de cualquier otro tipo, mientras sea posible digitalizarla y enviarla a través de una red.Todos esos datos pueden ser almacenados localmente en los ordenadores que llevan los vehículos a medida que son recibidos, y sería muy interesante poder sacarles partido por medio de alguna aplicación que los explotara. Por ejemplo, podrían utilizarse los vehículos como plataformas móviles de sensores que obtengan datos de los lugares por los que viajan. Otro ejemplo de aplicación sería la de ayudar a encontrar plazas de aparcamiento libres en una zona de una ciudad, usando la información que suministrarían los vehículos que dejan una plaza libre.Con este fin, en esta tesis se ha desarrollado una propuesta de la gestión de datos basada en el uso de agentes móviles para poder hacer uso de la información presente en una VANET de forma eficiente y flexible. Esta no es una tarea trivial, ya que los datos se encuentran dispersos entre los vehículos que forman la red, y dichos vehículos están constantemente moviéndose y cambiando de posición. Esto hace que las conexiones de red establecidas entre ellos sean inestables y de corta duración, ya que están constantemente creándose y destruyéndose a medida que los vehículos entran y salen del alcance de sus comunicaciones debido a sus movimientos.En un escenario tan complicado, la aproximación que proponemos permite que los datos sean localizados, y que se puedan hacer consultas sobre ellos y transmitirlos de un sitio cualquiera de la VANET a otro, usando estrategias multi-salto que se adaptan a las siempre cambiantes posiciones de los vehículos. Esto es posible gracias a la utilización de agentes móviles para el procesamiento de datos, ya que cuentan con una serie de propiedades (como su movilidad, autonomía, adaptabilidad, o inteligencia), que hace que sean una elección muy apropiada para este tipo de entorno móvil y con un elevado grado de incertidumbre.La solución propuesta ha sido extensamente evaluada y probada por medio de simulaciones, que demuestran su buen rendimiento y fiabilidad en redes vehiculares con diferentes condiciones y en diversos escenarios.<br /

    Radicalization of Airspace Security: Prospects and Botheration of Drone Defense System Technology

    Get PDF
    The development of a comprehensive and decisive drone defense integrated control system that can provide maximum security is crucial for maintaining territorial integrity and accelerating smart aerial mobility to sustain the emerging drone transportation system (DTS) for priority-based logistics and mobile communication. This study explores recent developments in the design of robust drone defense control systems that can observe and respond not only to drone attacks inside and outside a facility but also to equipment data such as CCTV security control on the ground and security sensors in the facility at a glance. Also, it considered DDS strategies, schema, and innovative security setups in different regions. Finally, open research issues in DDs designs are discussed, and useful recommendations are provided. Effective means for drone source authentication, delivery package verification, operator authorization, and dynamic scenario-specific engagement are solicited for comprehensive DDS design for maximum security Received: 2023-03-07 Revised: 2023-04-2

    Energy-efficient Transitional Near-* Computing

    Get PDF
    Studies have shown that communication networks, devices accessing the Internet, and data centers account for 4.6% of the worldwide electricity consumption. Although data centers, core network equipment, and mobile devices are getting more energy-efficient, the amount of data that is being processed, transferred, and stored is vastly increasing. Recent computer paradigms, such as fog and edge computing, try to improve this situation by processing data near the user, the network, the devices, and the data itself. In this thesis, these trends are summarized under the new term near-* or near-everything computing. Furthermore, a novel paradigm designed to increase the energy efficiency of near-* computing is proposed: transitional computing. It transfers multi-mechanism transitions, a recently developed paradigm for a highly adaptable future Internet, from the field of communication systems to computing systems. Moreover, three types of novel transitions are introduced to achieve gains in energy efficiency in near-* environments, spanning from private Infrastructure-as-a-Service (IaaS) clouds, Software-defined Wireless Networks (SDWNs) at the edge of the network, Disruption-Tolerant Information-Centric Networks (DTN-ICNs) involving mobile devices, sensors, edge devices as well as programmable components on a mobile System-on-a-Chip (SoC). Finally, the novel idea of transitional near-* computing for emergency response applications is presented to assist rescuers and affected persons during an emergency event or a disaster, although connections to cloud services and social networks might be disturbed by network outages, and network bandwidth and battery power of mobile devices might be limited

    Crowdsourcing Based WiFi Radio Map Management with Magnetic Landmark and PDR

    Get PDF
    학위논문 (석사)-- 서울대학교 대학원 : 전기·컴퓨터공학부, 2015. 8. 권태경.모바일 디바이스를 이용하는 사용자들이 급격하게 늘어나면서 사용자의 위치나 상황에 알맞은 서비스를 제공하기 위한 위치 기반 서비스(LBS, Location Based Service)가 활발하게 연구되고 있다. 실외에서는 GPS 신호를 이용하여 신뢰성 있는 측위 서비스가 가능한 반면, 실내에서는 GPS 신호를 수신하기에 어려움이 있어, 다른 측위 자원들을 활용하여 측위를 수행한다. WiFi는 고속 무선통신을 위하여 많은 AP들이 존재 실내에 많이 설치가 되어 있어서, 서비스 지역에서의 라디오맵을 수집하는 핑거프린팅(Fingerprinting) 기법을 활용할 경우 안정적인 성능을 보인다 [1][2]. 하지만, 시간이 지남에 따라 환경적인 요인에 의해서 신호의 특성이 변할 수 있기 때문에, 지속적으로 전체 서비스 지역의 라디오맵을 재수집하는 등의 관리가 필요하다. 본 논문에서는 이러한 문제를 해결하기 위하여 크라우드소싱을 기반으로 WiFi 라디오맵을 지속적으로 관리하기 위한 시스템을 제안한다. 사용자들의 위치에서 관찰한 핑거프린트를 이용하여 라디오맵의 양상이 변하는 것을 감지하여 최종적으로 업데이트까지 수행한다. 사용자의 추정된 위치를 기반으로 라디오맵의 관리를 수행하기 때문에 라디오맵의 오염이 발생할 수 있다. 이러한 오염을 최소화하기 위해서 PDR 및 지자기 랜드마크 기법을 활용하여 신뢰성 있는 사용자 위치 추정을 할 수 있다.Recently, the portion of people using smartphone are continuously increasing, applications of location-based services (LBS) have been exploding to release and studied. Outdoor positioning may not be a big deal by exploiting triangulation of GPS signals, which offers reliable service in general. However, in indoor, GPS signal does not reachable inside of building or not enough to estimating a position with triangulation. Therefore, other sensor modules should be used to indoor localization. As WiFi is popular wireless communication technology, a lot of APs (Access Points) are deployed in building. For example, average of observable APs on a scan is about 36.8 in Seoul station located in South Korea. Thus, WIFi may be a good source of estimating position due to its technological infrastructure. WiFi fingerprinting schemes has a good performance when it comes to performing positioning at initial site survey moment. Localization accuracy depends on radio map similarity of positioning moment. Therefore, continuous survey of radio map is required to accurate localization. In this paper, motivated by these limitation, we suggest crowdsourcing based WiFi radio map management system. Users observe WiFi APs information to estimating position and transfer the fingerprint (estimated position and corresponding AP information) to fingerprint management server. Then, the server manages reported fingerprints to add/delete/change to radio map. Because management of fingerprints is based on estimated position, however, the radio map could be polluted by un-accurate position. Therefore, we adapt landmark by using magnetic field sequence to calibrate users position. Moreover, PDR (Pedestrian dead-reckoning) trajectory coordinates reported by user are used to scoring quality of radio map. Finally, our system reduce the cost of continuous site survey.제 1장 서 론 8 제 1절 연구의 배경 8 제 2절 논문의 구성 13 제 2장 WiFi 신호에 대한 분석 14 제 1절 비컨 프레임 14 제 2절 무선 신호 손실 14 제 3절 문제 정의 및 해결 18 제 3장 크라우드소싱 기반 라디오맵 관리 시스템 20 제 1절 구조 및 시스템 20 1. 초기 라디오맵 구축 20 2. 클라이언트 21 3. 서버 23 제 2절 측위 환경 변화 감지 23 4. AP 제거 감지 26 5. AP 변화 감지 27 제 3절 랜드마크를 이용한 에러 보정 28 제 4절 라디오맵 품질 추정 30 제 4장 시스템 분석 및 평가 33 제 1절 데이터 수집 33 제 2절 시뮬레이션 설정 34 1. 초기 라디오맵 구축 34 2. 이동 및 센서 시뮬레이션 34 3. AP 추가/제거/변화 시뮬레이션 35 제 3절 성능 평가 36 1. 랜드마크 효용성 36 2. AP 양상 변화 감지 성능 38 3. 라디오맵 품질 추정 성능 41 제 5장 결 론 43 참고 문헌 44 Abstract 47Maste

    Napredna (edge computing) softverska arhitektura za upravljanje resursima i unutrašnje pozicioniranje

    Get PDF
    In Part I, this thesis aims to shed light on IoT and edge com-puting systems and accompanying computing and architectural paradigms, their definition, areas of application, and common use-cases, as well as operational, business, economical, social challenges and benefits. It illustrates modern needs and requests in building IoT systems and current State-of-The-Art (SoTA) approaches to designing them. Additionally, it discusses the security and privacy topics of IoT and edge computing systems. It also encompasses research, design, and implementation of an MQTT-based Resource Management Framework for Edge Com-puting systems that handle: resource management, failover detection and handover administration, logical and physical workload balancing and protection, and monitoring of physical and logical system resources designed for a real-world IoT platform. The thesis offers insights into modern requests for such frameworks, current SoTA approaches, and offer a solution in the form of a software framework, with minimal implementation and communication overhead. In Part II, the thesis elaborates on IPS, their definition, deploy-ment types, commonly used positioning techniques, areas of application, and common use-cases, as well as operational, business, economic, social challenges, and benefits. It specifically discusses designing IPS for the typical IoT infrastructure. It offers insights to modern IPS requests, current SoTA in solving them, and under-line original approaches from this thesis. It elaborates on the research, design and authors’ implementation of an IPS for the IoT – Bluetooth LowEnergyMicrolocation Asset Tracking (BLEMAT), including its software engines (collections of software components) for: indoor positioning, occupancy detection, visualization, pattern discovery and prediction, geofencing, movement pattern detection, visualization, discovery and prediction, social dynamics analysis, and indoor floor plan layout detection.Deo I teze ima je za cilj da rasvetli IoT i edge computing računarske sisteme i prateće računarske paradigme softverskih arhitektura, njihovu definiciju, područja primene i slučajeve uobičajene upotrebe, kao i operativne, poslovne, ekonomske, i socijalne izazove i koristi. Teza ilustruje savremene potrebe i zahtevi u izgradnji IoT sistema i najsavremeniji pristupi u njihovom dizajniranju. Raspravlja se o temama bezbednosti i privatnosti u IoT i edge computing računarskim sistemima. Kao još jedan glavni zadatak, teza je obuhvata istraživanje, dizajn i implementaciju softverske arhitekture za upravljanje resursima zasnovanim na MQTT komunikacionom protokolu za edge computing računarske sisteme koja se bavi: upravljanjem resursima, detekcijom prestanka rada upravljačkih algoritama i administracijom primopredaje tj. transporta upravljačkih algoritama, i logičkim i fizičkim balansiranjem i zaštitom radnog opterećenja sistema. Diskutuju se savremeni zahtevi za takve softverske arhitekture, trenutni pristupi. Na kraju, prikazuje se rešenje sa minimalnim troškovima implementacije i  komunikacije. Deo II teze ima za cilj da objasni sisteme za unutrašnje pozicioniranje, njihovu definiciju, vrste primene, najčešće korišćene tehnike pozicioniranja, područja primene i uobičajene slučajeve upotrebe, kao i operativne, poslovne, ekonomske, i socijalne izazove i koristi. Posebno se diskutuje o dizajniranju ovakvih sistema za tipičnu IoT infrastrukturu. Nudi se uvid u savremene zahteve sisteme za unutrašnje pozicioniranje, trenutne pristupe u rešavanju istih, i naglašeni su originalni pristupe iz ove teze. Dalje je fokus na istraživanju, dizajniranju i implementaciji sistema za unutrašnje pozicioniranje (BLEMAT), uključujući njegove softverske podsisteme (kolekcije softverskih komponenti) za: pozicioniranje u zatvorenom prostoru, detekciju zauzeća prostorija, vizualizaciju, otkrivanje i predviđanje obrazaca kretanja, geofencing, vizualizaciju i analizu društvene dinamike i detekciju rasporeda prostorija unutrašnjeg prostora
    corecore