875 research outputs found
Responsibility and non-repudiation in resource-constrained Internet of Things scenarios
The proliferation and popularity of smart
autonomous systems necessitates the development
of methods and models for ensuring the effective
identification of their owners and controllers. The aim
of this paper is to critically discuss the responsibility of
Things and their impact on human affairs. This starts
with an in-depth analysis of IoT Characteristics such
as Autonomy, Ubiquity and Pervasiveness. We argue
that Things governed by a controller should have an
identifiable relationship between the two parties and
that authentication and non-repudiation are essential
characteristics in all IoT scenarios which require
trustworthy communications. However, resources can
be a problem, for instance, many Things are designed
to perform in low-powered hardware. Hence, we also
propose a protocol to demonstrate how we can achieve the
authenticity of participating Things in a connectionless
and resource-constrained environment
Internet of Things-aided Smart Grid: Technologies, Architectures, Applications, Prototypes, and Future Research Directions
Traditional power grids are being transformed into Smart Grids (SGs) to
address the issues in existing power system due to uni-directional information
flow, energy wastage, growing energy demand, reliability and security. SGs
offer bi-directional energy flow between service providers and consumers,
involving power generation, transmission, distribution and utilization systems.
SGs employ various devices for the monitoring, analysis and control of the
grid, deployed at power plants, distribution centers and in consumers' premises
in a very large number. Hence, an SG requires connectivity, automation and the
tracking of such devices. This is achieved with the help of Internet of Things
(IoT). IoT helps SG systems to support various network functions throughout the
generation, transmission, distribution and consumption of energy by
incorporating IoT devices (such as sensors, actuators and smart meters), as
well as by providing the connectivity, automation and tracking for such
devices. In this paper, we provide a comprehensive survey on IoT-aided SG
systems, which includes the existing architectures, applications and prototypes
of IoT-aided SG systems. This survey also highlights the open issues,
challenges and future research directions for IoT-aided SG systems
Experimental study of 6LoPLC for home energy management systems
© 2016 by the authors. Ubiquitous connectivity is already transforming residential dwellings into smart homes. As citizens continue to embrace the smart home paradigm, a new generation of low-rate and low-power communication systems is required to leverage the mass market presented by energy management in homes. Although Power Line Communication (PLC) technology has evolved in the last decade, the adaptation of PLC for constrained networks is not fully charted. By adapting some features of IEEE 802.15.4 and IPv6 over Low-power Wireless Personal Area Network (6LoWPAN) into power lines, this paper demonstrates a low-rate, low-power PLC system over the IPv6 network (referred to as 6LoPLC), for Home Energy Management System (HEMS) applications. The overall idea is to provide a framework for assessing various scenarios that cannot be easily investigated with the limited number of evaluation hardware available. In this respect, a network model is developed in NS-3 (Version 21) to measure several important characteristics of the designed system and then validated with experimental results obtained using the Hanadu evaluation kits. Following the good agreement between the two, the NS-3 model is utilised to investigate more complex scenarios and various use-cases, such as the effects of impulsive noise, the number of nodes and packet size on the latency and Bit Error Rate (BER) performances. We further demonstrate that for different network and application configurations, optimal data sizes exist. For instance, the results reveal that in order to guarantee 99% system reliability, the HEMS application data must not exceed 64 bytes. Finally, it is shown that with impulsive noise in a HEMS network comprising 50 appliances, provided the size of the payload does not exceed 64 bytes, monitoring and control applications incur a maximum latency of 238.117 ms and 248.959 ms, respectively; both of which are within acceptable limits
A Novel Architectural Framework on IoT Ecosystem, Security Aspects and Mechanisms: A Comprehensive Survey
For the past few years, the Internet of Things (IoT) technology continues to not only gain popularity and importance, but also witnesses the true realization of everything being smart. With the advent of the concept of smart everything, IoT has emerged as an area of great potential and incredible growth. An IoT ecosystem centers around innovation perspective which is considered as its fundamental core. Accordingly, IoT enabling technologies such as hardware and software platforms as well as standards become the core of the IoT ecosystem. However, any large-scale technological integration such as the IoT development poses the challenge to ensure secure data transmission. Perhaps, the ubiquitous and the resource-constrained nature of IoT devices and the sensitive and private data being generated by IoT systems make them highly vulnerable to physical and cyber threats. In this paper, we re-define an IoT ecosystem from the core technologies view point. We propose a modified three layer IoT architecture by dividing the perception layer into elementary blocks based on their attributed functions. Enabling technologies, attacks and security countermeasures are classified under each layer of the proposed architecture. Additionally, to give the readers a broader perspective of the research area, we discuss the role of various state-of-the-art emerging technologies in the IoT security. We present the security aspects of the most prominent standards and other recently developed technologies for IoT which might have the potential to form the yet undefined IoT architecture. Among the technologies presented in this article, we give a special interest to one recent technology in IoT domain. This technology is named IQRF that stands for Intelligent Connectivity using Radio Frequency. It is an emerging technology for wireless packet-oriented communication that operates in sub-GHz ISM band (868 MHz) and which is intended for general use where wireless connectivity is needed, either in a mesh network or point-to-point (P2P) configuration. We also highlighted the security aspects implemented in this technology and we compare it with the other already known technologies. Moreover, a detailed discussion on the possible attacks is presented. These attacks are projected on the IoT technologies presented in this article including IQRF. In addition, lightweight security solutions, implemented in these technologies, to counter these threats in the proposed IoT ecosystem architecture are also presented. Lastly, we summarize the survey by listing out some common challenges and the future research directions in this field.publishedVersio
Recommended from our members
A lightweight framework for secure life-logging in smart environments
As the world becomes an interconnected network where objects and humans interact with each other, new challenges and threats appear in the ecosystem. In this interconnected world, smart objects have an important role in giving users the chance for life-logging in smart environments. However, smart devices have several limitations with regards to memory, resources and computation power, hindering the opportunity to apply well-established security algorithms and techniques for secure life-logging on the Internet of Things (IoT) domain. The need for secure and trustworthy life-logging in smart environments is vital, thus, a lightweight approach has to be considered to overcome the constraints of smart objects. The purpose of this paper is to present in details the current topics of life-logging in smart environments, while describing interconnection issues, security threats and suggesting a lightweight framework for ensuring security, privacy and trustworthy life-logging. In order to investigate the efficiency of the lightweight framework and the impact of the security attacks on energy consumption, an experimental test-bed was developed including two interconnected users and one smart attacker, who attempts to intercept transmitted messages or interfere with the communication link. Several mitigation factors, such as power control, channel assignment and AES-128 encryption were pplied for secure life-logging. Finally, research into the degradation of the consumed energy regarding the described intrusions is presented
Pyrazole-based analogs as potential antibacterial agents against methicillin-resistance staphylococcus aureus (MRSA) and its SAR elucidation
Methicillin-resistant Staphylococcus aureus (MRSA) is becoming lethal to humanity due to easy transmission and difficult-to-treat skin and flimsy diseases. The most threatening aspect is the rapid resistance development of MRSA to any approved antibiotics, including vancomycin. The development of new, efficient, and nontoxic drug candidate to fight against MRSA isolates is the need of the hour. The intriguing molecular structure and versatile bioactive pyrazole core attracting to development required novel antibiotics. This review presents the decade developments of pyrazole-containing derivatives with a broad antibacterial movement against diverged bacterial strains. In specific, we correlated the efficacy of structurally diversified pyrazole analogs against MRSA and discussed different angles of structure-activity relationship (SAR). The current survey highlights pyrazole hybrids' present scenario on MRSA studies, covering articles published from 2011 to 2020. This collective information may become an excellent platform to plan and develop new pyrazole-based small MRSA growth inhibitors with minimal side effects. (C) 2020 Elsevier Masson SAS. All rights reserved
Pervasive service discovery in low-power and lossy networks
Pervasive Service Discovery (SD) in Low-power and Lossy Networks (LLNs) is expected to play a major role in realising the Internet of Things (IoT) vision. Such a vision aims to expand the current Internet to interconnect billions of miniature smart objects that sense and act on our surroundings in a way that will revolutionise the future. The pervasiveness and heterogeneity of such low-power devices requires robust, automatic, interoperable and scalable deployment and operability solutions. At the same time, the limitations of such constrained devices impose strict challenges regarding complexity, energy consumption, time-efficiency and mobility.
This research contributes new lightweight solutions to facilitate automatic deployment and operability of LLNs. It mainly tackles the aforementioned challenges through the proposition of novel component-based, automatic and efficient SD solutions that ensure extensibility and adaptability to various LLN environments. Building upon such architecture, a first fully-distributed, hybrid pushpull SD solution dubbed EADP (Extensible Adaptable Discovery Protocol) is proposed based on the well-known Trickle algorithm. Motivated by EADPs’ achievements, new methods to optimise Trickle are introduced. Such methods allow Trickle to encompass a wide range of algorithms and extend its usage to new application domains. One of the new applications is concretized in the TrickleSD protocol aiming to build automatic, reliable, scalable, and time-efficient SD. To optimise the energy efficiency of TrickleSD, two mechanisms improving broadcast communication in LLNs are proposed. Finally, interoperable standards-based SD in the IoT is demonstrated, and methods combining zero-configuration operations with infrastructure-based solutions are proposed.
Experimental evaluations of the above contributions reveal that it is possible to achieve automatic, cost-effective, time-efficient, lightweight, and interoperable SD in LLNs. These achievements open novel perspectives for zero-configuration capabilities in the IoT and promise to bring the ‘things’ to all people everywhere
- …