27,357 research outputs found

    Over-the-air software updates in the internet of things : an overview of key principles

    Get PDF
    Due to the fast pace at which IoT is evolving, there is an increasing need to support over-theair software updates for security updates, bug fixes, and software extensions. To this end, multiple over-the-air techniques have been proposed, each covering a specific aspect of the update process, such as (partial) code updates, data dissemination, and security. However, each technique introduces overhead, especially in terms of energy consumption, thereby impacting the operational lifetime of the battery constrained devices. Until now, a comprehensive overview describing the different update steps and quantifying the impact of each step is missing in the scientific literature, making it hard to assess the overall feasibility of an over-the-air update. To remedy this, our article analyzes which parts of an IoT operating system are most updated after device deployment, proposes a step-by-step approach to integrate software updates in IoT solutions, and quantifies the energy cost of each of the involved steps. The results show that besides the obvious dissemination cost, other phases such as security also introduce a significant overhead. For instance, a typical firmware update requires 135.026 mJ, of which the main portions are data dissemination (63.11 percent) and encryption (5.29 percent). However, when modular updates are used instead, the energy cost (e.g., for a MAC update) is reduced to 26.743 mJ (48.69 percent for data dissemination and 26.47 percent for encryption)

    Fuzzy TOPSIS-based Secure Neighbor Discovery Mechanism for Improving Reliable Data Dissemination in Wireless Sensor Networks

    Get PDF
    Wireless Sensor Networks (WSNs) being an indispensable entity of the Internet of Things (IoT) are found to be more and more widely utilized for the rapid advent of IoT environment. The reliability of data dissemination in the IoT environment completely depends on the secure neighbor discovery mechanism that are utilized for effective and efficient communication among the sensor nodes. Secure neighbor discovery mechanisms that significantly determine trustworthy sensor nodes are essential for maintaining potential connectivity and sustaining reliable data delivery in the energy-constrained self organizing WSN. In this paper, Fuzzy Technique of Order Preference Similarity to the Ideal Solution (TOPSIS)-based Secure Neighbor Discovery Mechanism (FTOPSIS-SNDM) is proposed for estimating the trust of each sensor node in the established routing path for the objective of enhancing reliable data delivery in WSNs. This proposed FTOPSIS-SNDM is proposed as an attempt to integrate the merits of Fuzzy Set Theory (FST) and TOPSIS-based Multi-criteria Decision Making (MCDM) approach, since the discovery of secure neighbors involves the exchange of imprecise data and uncertain behavior of sensor nodes. This secure neighbor is also influenced by the factors of packet forwarding potential, delay, distance from the Base Station (BS) and residual energy, which in turn depends on multiple constraints that could be possibly included into the process of secure neighbor discovery. The simulation investigations of the proposed FTOPSIS-SNDM confirmed its predominance over the benchmarked approaches in terms of throughput, energy consumption, network latency, communication overhead for varying number of genuine and malicious neighboring sensor nodes in network

    A Novel Framework for Software Defined Wireless Body Area Network

    Full text link
    Software Defined Networking (SDN) has gained huge popularity in replacing traditional network by offering flexible and dynamic network management. It has drawn significant attention of the researchers from both academia and industries. Particularly, incorporating SDN in Wireless Body Area Network (WBAN) applications indicates promising benefits in terms of dealing with challenges like traffic management, authentication, energy efficiency etc. while enhancing administrative control. This paper presents a novel framework for Software Defined WBAN (SDWBAN), which brings the concept of SDN technology into WBAN applications. By decoupling the control plane from data plane and having more programmatic control would assist to overcome the current lacking and challenges of WBAN. Therefore, we provide a conceptual framework for SDWBAN with packet flow model and a future direction of research pertaining to SDWBAN.Comment: Presented on 8th International Conference on Intelligent Systems, Modelling and Simulatio

    Third Revolution Digital Technology in Disaster Early Warning

    Get PDF
    Networking societies with electronic based technologies can change social morphology, where key social structures and activities are organized around electronically processed information networks. The application of information and communications technologies (ICT) has been shown to have a positive impact across the emergency or disaster lifecycle. For example, utility of mobile, internet and social network technology, commercial and amateur radio networks, television and video networks and open access technologies for processing data and distributing information can be highlighted. Early warning is the key function during an emergency. Early warning system is an interrelated set of hazard warning, risk assessment, communication and preparedness activities that enable individuals, communities, businesses and others to take timely action to reduce their risks. Third revolution digital technology with semantic features such as standard protocols can facilitate standard data exchange therefore proactive decision making. As a result, people belong to any given hierarchy can access the information simultaneously and make decisions on their own challenging the traditional power relations. Within this context, this paper attempts to explore the use of third revolution digital technology for improving early warning
    • …
    corecore