875 research outputs found

    Traffic Forensics for IPv6-Based Wireless Sensor Networks and the Internet of Things

    Get PDF

    Responsibility and non-repudiation in resource-constrained Internet of Things scenarios

    Get PDF
    The proliferation and popularity of smart autonomous systems necessitates the development of methods and models for ensuring the effective identification of their owners and controllers. The aim of this paper is to critically discuss the responsibility of Things and their impact on human affairs. This starts with an in-depth analysis of IoT Characteristics such as Autonomy, Ubiquity and Pervasiveness. We argue that Things governed by a controller should have an identifiable relationship between the two parties and that authentication and non-repudiation are essential characteristics in all IoT scenarios which require trustworthy communications. However, resources can be a problem, for instance, many Things are designed to perform in low-powered hardware. Hence, we also propose a protocol to demonstrate how we can achieve the authenticity of participating Things in a connectionless and resource-constrained environment

    Internet of Things-aided Smart Grid: Technologies, Architectures, Applications, Prototypes, and Future Research Directions

    Full text link
    Traditional power grids are being transformed into Smart Grids (SGs) to address the issues in existing power system due to uni-directional information flow, energy wastage, growing energy demand, reliability and security. SGs offer bi-directional energy flow between service providers and consumers, involving power generation, transmission, distribution and utilization systems. SGs employ various devices for the monitoring, analysis and control of the grid, deployed at power plants, distribution centers and in consumers' premises in a very large number. Hence, an SG requires connectivity, automation and the tracking of such devices. This is achieved with the help of Internet of Things (IoT). IoT helps SG systems to support various network functions throughout the generation, transmission, distribution and consumption of energy by incorporating IoT devices (such as sensors, actuators and smart meters), as well as by providing the connectivity, automation and tracking for such devices. In this paper, we provide a comprehensive survey on IoT-aided SG systems, which includes the existing architectures, applications and prototypes of IoT-aided SG systems. This survey also highlights the open issues, challenges and future research directions for IoT-aided SG systems

    Experimental study of 6LoPLC for home energy management systems

    Get PDF
    © 2016 by the authors. Ubiquitous connectivity is already transforming residential dwellings into smart homes. As citizens continue to embrace the smart home paradigm, a new generation of low-rate and low-power communication systems is required to leverage the mass market presented by energy management in homes. Although Power Line Communication (PLC) technology has evolved in the last decade, the adaptation of PLC for constrained networks is not fully charted. By adapting some features of IEEE 802.15.4 and IPv6 over Low-power Wireless Personal Area Network (6LoWPAN) into power lines, this paper demonstrates a low-rate, low-power PLC system over the IPv6 network (referred to as 6LoPLC), for Home Energy Management System (HEMS) applications. The overall idea is to provide a framework for assessing various scenarios that cannot be easily investigated with the limited number of evaluation hardware available. In this respect, a network model is developed in NS-3 (Version 21) to measure several important characteristics of the designed system and then validated with experimental results obtained using the Hanadu evaluation kits. Following the good agreement between the two, the NS-3 model is utilised to investigate more complex scenarios and various use-cases, such as the effects of impulsive noise, the number of nodes and packet size on the latency and Bit Error Rate (BER) performances. We further demonstrate that for different network and application configurations, optimal data sizes exist. For instance, the results reveal that in order to guarantee 99% system reliability, the HEMS application data must not exceed 64 bytes. Finally, it is shown that with impulsive noise in a HEMS network comprising 50 appliances, provided the size of the payload does not exceed 64 bytes, monitoring and control applications incur a maximum latency of 238.117 ms and 248.959 ms, respectively; both of which are within acceptable limits

    A Novel Architectural Framework on IoT Ecosystem, Security Aspects and Mechanisms: A Comprehensive Survey

    Get PDF
    For the past few years, the Internet of Things (IoT) technology continues to not only gain popularity and importance, but also witnesses the true realization of everything being smart. With the advent of the concept of smart everything, IoT has emerged as an area of great potential and incredible growth. An IoT ecosystem centers around innovation perspective which is considered as its fundamental core. Accordingly, IoT enabling technologies such as hardware and software platforms as well as standards become the core of the IoT ecosystem. However, any large-scale technological integration such as the IoT development poses the challenge to ensure secure data transmission. Perhaps, the ubiquitous and the resource-constrained nature of IoT devices and the sensitive and private data being generated by IoT systems make them highly vulnerable to physical and cyber threats. In this paper, we re-define an IoT ecosystem from the core technologies view point. We propose a modified three layer IoT architecture by dividing the perception layer into elementary blocks based on their attributed functions. Enabling technologies, attacks and security countermeasures are classified under each layer of the proposed architecture. Additionally, to give the readers a broader perspective of the research area, we discuss the role of various state-of-the-art emerging technologies in the IoT security. We present the security aspects of the most prominent standards and other recently developed technologies for IoT which might have the potential to form the yet undefined IoT architecture. Among the technologies presented in this article, we give a special interest to one recent technology in IoT domain. This technology is named IQRF that stands for Intelligent Connectivity using Radio Frequency. It is an emerging technology for wireless packet-oriented communication that operates in sub-GHz ISM band (868 MHz) and which is intended for general use where wireless connectivity is needed, either in a mesh network or point-to-point (P2P) configuration. We also highlighted the security aspects implemented in this technology and we compare it with the other already known technologies. Moreover, a detailed discussion on the possible attacks is presented. These attacks are projected on the IoT technologies presented in this article including IQRF. In addition, lightweight security solutions, implemented in these technologies, to counter these threats in the proposed IoT ecosystem architecture are also presented. Lastly, we summarize the survey by listing out some common challenges and the future research directions in this field.publishedVersio

    Pyrazole-based analogs as potential antibacterial agents against methicillin-resistance staphylococcus aureus (MRSA) and its SAR elucidation

    Get PDF
    Methicillin-resistant Staphylococcus aureus (MRSA) is becoming lethal to humanity due to easy transmission and difficult-to-treat skin and flimsy diseases. The most threatening aspect is the rapid resistance development of MRSA to any approved antibiotics, including vancomycin. The development of new, efficient, and nontoxic drug candidate to fight against MRSA isolates is the need of the hour. The intriguing molecular structure and versatile bioactive pyrazole core attracting to development required novel antibiotics. This review presents the decade developments of pyrazole-containing derivatives with a broad antibacterial movement against diverged bacterial strains. In specific, we correlated the efficacy of structurally diversified pyrazole analogs against MRSA and discussed different angles of structure-activity relationship (SAR). The current survey highlights pyrazole hybrids' present scenario on MRSA studies, covering articles published from 2011 to 2020. This collective information may become an excellent platform to plan and develop new pyrazole-based small MRSA growth inhibitors with minimal side effects. (C) 2020 Elsevier Masson SAS. All rights reserved

    Pervasive service discovery in low-power and lossy networks

    Get PDF
    Pervasive Service Discovery (SD) in Low-power and Lossy Networks (LLNs) is expected to play a major role in realising the Internet of Things (IoT) vision. Such a vision aims to expand the current Internet to interconnect billions of miniature smart objects that sense and act on our surroundings in a way that will revolutionise the future. The pervasiveness and heterogeneity of such low-power devices requires robust, automatic, interoperable and scalable deployment and operability solutions. At the same time, the limitations of such constrained devices impose strict challenges regarding complexity, energy consumption, time-efficiency and mobility. This research contributes new lightweight solutions to facilitate automatic deployment and operability of LLNs. It mainly tackles the aforementioned challenges through the proposition of novel component-based, automatic and efficient SD solutions that ensure extensibility and adaptability to various LLN environments. Building upon such architecture, a first fully-distributed, hybrid pushpull SD solution dubbed EADP (Extensible Adaptable Discovery Protocol) is proposed based on the well-known Trickle algorithm. Motivated by EADPs’ achievements, new methods to optimise Trickle are introduced. Such methods allow Trickle to encompass a wide range of algorithms and extend its usage to new application domains. One of the new applications is concretized in the TrickleSD protocol aiming to build automatic, reliable, scalable, and time-efficient SD. To optimise the energy efficiency of TrickleSD, two mechanisms improving broadcast communication in LLNs are proposed. Finally, interoperable standards-based SD in the IoT is demonstrated, and methods combining zero-configuration operations with infrastructure-based solutions are proposed. Experimental evaluations of the above contributions reveal that it is possible to achieve automatic, cost-effective, time-efficient, lightweight, and interoperable SD in LLNs. These achievements open novel perspectives for zero-configuration capabilities in the IoT and promise to bring the ‘things’ to all people everywhere
    corecore