48,450 research outputs found

    The Contiki-NG open source operating system for next generation IoT devices

    Get PDF
    Contiki-NG (Next Generation) is an open source, cross-platform operating system for severely constrained wireless embedded devices. It focuses on dependable (reliable and secure) low-power communications and standardised protocols, such as 6LoWPAN, IPv6, 6TiSCH, RPL, and CoAP. Its primary aims are to (i) facilitate rapid prototyping and evaluation of Internet of Things research ideas, (ii) reduce time-to-market for Internet of Things applications, and (iii) provide an easy-to-use platform for teaching embedded systems-related courses in higher education. Contiki-NG started as a fork of the Contiki OS and retains many of its original features. In this paper, we discuss the motivation behind the creation of Contiki-NG, present the most recent version (v4.7), and highlight the impact of Contiki-NG through specific examples

    Management of solar energy in microgrids using IoT-based dependable control

    Full text link
    © 2017 IEEE. Solar energy generation requires efficient monitoring and management in moving towards technologies for net-zero energy buildings. This paper presents a dependable control system based on the Internet of Things (IoT) to control and manage the energy flow of renewable energy collected by solar panels within a microgrid. Data for optimal control include not only measurements from local sensors but also meteorological information retrieved in real-time from online sources. For system fault tolerance across the whole distributed control system featuring multiple controllers, dependable controllers are developed to control and optimise the tracking performance of photovoltaic arrays to maximally capture solar radiation and maintain system resilience and reliability in real time despite failures of one or more redundant controllers due to a problem with communication, hardware or cybersecurity. Experimental results have been obtained to evaluate the validity of the proposed approach

    A Survey on Trust Management Mechanism for Internet of Things

    Get PDF
    The Internet is populated with billions of electronic contraptions that have turned into a piece of our texture. Trust administration assumes an essential part in IoT for dependable information combination and reliable information, qualified administrations with setting � mindfulness, and improved client protection and data security.In network arrangement reliable information handling in remote sensor systems is a quickly rising examination theme. In remote sensor arrange calculation is regularly considerably less vitality devouring than correspondence. Reliability of sensor information is most critical part when detecting undertaking done in remote sensor arrange. In this paper we discuss about the trust management mechanism, wireless sensor network, Internet of Things architecture, and also give the literature survey of some papers

    Estimation of satellite link’s fade margin using non-meteorological technique and worst month analysis

    Get PDF
    Satellite technology is shifting to higher frequencies such as Q or V-band to cater to greater bandwidth and higher data rates applications such as videoconferencing, internet of things (IoT) and telemedicine. The main challenge in deploying high-frequency bands in heavy precipitation areas is severe rain attenuation. In this paper, a frequency scaling technique was developed to estimate the fade margin at a higher frequency. The worst month analysis was also conducted since the analysis is also important in determining dependable fade margin. The result was evaluated and analyzed using root mean square error (RMSE) and percentage error. The proposed model offers the smallest RMSE and lowest percentage error when compared to all existing prediction models. A dependable fade margin acquired from high-accuracy rain attenuation estimation is very important. This is to apply the best mitigation technique in overcoming rain attenuation in the satellite-Earth link so that, the best system performance can be delivered

    Transforming Public Health Data Management in IoMT Networks Based on Innovative Offloading Scheme

    Get PDF
    Healthcare platform monitoring IoT-oriented technologies constitute the idea of Internet of Medical Things (IoMT) in public health and medical services. The amount and quality of created data have a substantial influence on data management and privacy compute offloading solutions are unable to keep up with the growing needs of the health industry, especially when fast and dependable communication was needed. The study suggests a unique approach called Mutated Barnacles Mating Optimization (MBMO) for assisting the data management issues in IoMT systems. The suggested MBMO framework successfully addresses problems that are common in the medical industry by using a data offloading technique. To overcome the issues of discrete tasks and resource allocation, guarantees the needs of dependable and efficient communication. We implemented Java software. The evaluation of the performance step encompasses several measures, such as energy consumption (J/ms) and Time delay (ms)model to assess the efficiency of the suggested forecasting algorithm. We performed an assessment of comparison with other established approaches results indicate that the suggested model produces superior results for assisting the data management issues in IoMT systems

    SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices

    Full text link
    The simplicity of deployment and perpetual operation of energy harvesting devices provides a compelling proposition for a new class of edge devices for the Internet of Things. In particular, Computational Radio Frequency Identification (CRFID) devices are an emerging class of battery-free, computational, sensing enhanced devices that harvest all of their energy for operation. Despite wireless connectivity and powering, secure wireless firmware updates remains an open challenge for CRFID devices due to: intermittent powering, limited computational capabilities, and the absence of a supervisory operating system. We present, for the first time, a secure wireless code dissemination (SecuCode) mechanism for CRFIDs by entangling a device intrinsic hardware security primitive Static Random Access Memory Physical Unclonable Function (SRAM PUF) to a firmware update protocol. The design of SecuCode: i) overcomes the resource-constrained and intermittently powered nature of the CRFID devices; ii) is fully compatible with existing communication protocols employed by CRFID devices in particular, ISO-18000-6C protocol; and ii) is built upon a standard and industry compliant firmware compilation and update method realized by extending a recent framework for firmware updates provided by Texas Instruments. We build an end-to-end SecuCode implementation and conduct extensive experiments to demonstrate standards compliance, evaluate performance and security.Comment: Accepted to the IEEE Transactions on Dependable and Secure Computin
    corecore