11 research outputs found

    MARGOT: Dynamic IoT Resource Discovery for HADR Environments

    Get PDF
    Smart City services leverage sophisticated IT architectures whose assets are deployed in dynamic and heterogeneous computing and communication scenarios. Those services are particularly interesting for Humanitarian Assistance and Disaster Relief (HADR) operations in urban environments, which could improve Situation Awareness by exploiting the Smart City IT infrastructure. To this end, an enabling requirement is the discovery of the available Internet-of-Things (IoT) resources, including sensors, actuators, services, and computing resources, based on a variety of criteria, such as geographical location, proximity, type of device, type of capability, coverage, resource availability, and communication topology / quality of network links. To date, no single standard has emerged that has been widely adopted to solve the discovery challenge. Instead, a variety of different standards have been proposed and cities have either adopted one that is convenient or reinvented a new standard just for themselves. Therefore, enabling discovery across different standards and administrative domains is a fundamental requirement to enable HADR operations in Smart Cities. To address these challenges, we developed MARGOT (Multi-domain Asynchronous Gateway Of Things), a comprehensive solution for resource discovery in Smart City environments that implements a distributed and federated architecture and supports a wide range of discovery protocols

    THE INTERNET OF THINGS (IOT) IN DISASTER RESPONSE

    Get PDF
    Disaster management is a complex practice that relies on access to and the usability of critical information to develop strategies for effective decision-making. The emergence of wearable internet of things (IoT) technology has attracted the interests of several major industries, making it one of the fastest-growing technologies to date. This thesis asks, How can disaster management incorporate wearable IoT technology in operations and decision-making practices in disaster response? How IoT is applied in other prominent industries, including construction, manufacturing and distribution, the Department of Defense, and public safety, provides a basis for furthering its application to challenges affecting agency coordination. The critical needs of disaster intelligence in the context of hurricanes, structural collapses, and wildfires are scrutinized to identify gaps that wearable technology could address in terms of information-sharing in multi-agency coordination and the decision-making practices that routinely occur in disaster response. Last, the specifics of wearable technology from the perspective of the private consumer and commercial industry illustrate its potential to improve disaster response but also acknowledge certain limitations including technical capabilities and information privacy and security.Civilian, Virginia Beach Fire Department / FEMA - USAR VATF-2Approved for public release. Distribution is unlimited

    Internet of Things : technologies and applications in healthcare management and manufacturing

    Get PDF
    L'Internet des Objets (ou IoT) s'appuie sur des objets connectés dotés de capteurs et technologies capables d'échanger des données entre eux de manière indépendante. Ces nouvelles technologies offrent aux entreprises et à toutes les organisations des moyens pour l’acquisition et le traitement intelligent de l’information (Industrie 4.0) pour demeurer compétitives. Ce mémoire vise à analyser la contribution de l'IoT dans les soins de santé et production, mettant l'accent sur l'Industrie 4.0 et la maintenance prédictive, particulièrement en maintenance, sur la base d’oeuvres littéraires récentes publiées au cours de la dernière décennie. L’objectif principal de ce mémoire est de comprendre l'IoT, d’exposer ses potentiels et sa stratégie de déploiement dans différents domaines d’applications. Même, le but est de comprendre que l'IoT ne se limite pas à l'application de la maintenance des systèmes de production mais aussi du bien-être des patients, c'est pourquoi j'ai choisi ces deux domaines importants où l'IoT peut être appliqué (santé et production) pour ce travail de recherche. Cette thèse aidera à explorer comment l'IoT transforme le système de santé. J'explique comment l'IoT offre de grandes avancées dans ce système. Je donne quelques exemples où ses concepts souhaiteraient être implémentés pour améliorer la qualité des soins des patients et quelques études récentes. Outre, je clarifie l'impact de l’Industrie 4.0 sur la production, notamment en maintenance, en lien avec la maintenance prédictive rendue possible par l’IoT. Je fournis une vue d'ensemble de l'Industrie 4.0 et de la maintenance prédictive. J’aborde les fonctionnalités de l'Industrie 4.0 et présente ses technologies de pilotage susceptibles d'améliorer les domaines de processus de production, tels que la réduction des temps d'immobilisation, les coûts de service, etc. J'attire l'attention sur les implications de la maintenance prédictive dans l’Industrie 4.0 en décrivant son fonctionnement et comment les fabricants peuvent l'exécuter efficacement, avec des exemples à l'appui.The Internet of Things (or IoT) relies on connected objects embedded with sensors and other technologies capable of exchanging data with each other independently. These new technologies provide businesses and all organizations with the means to acquire and intelligently process information (Industry 4.0) to remain competitive. This thesis aims to analyze the contribution of IoT in healthcare and manufacturing, with a focus on Industry 4.0 and Predictive Maintenance, specifically in maintenance, based on recent literary works published over the last decade. The main purpose of this thesis is to understand what IoT is, to highlight its potentials and its deployment strategy in various areas of application. Similarly, the goal is to understand that IoT is not limited to the application of the maintenance of production systems but also of patients’ wellbeing which is the reason why I selected these two important areas where IoT can be applied (healthcare and manufacturing) for this research work. This thesis will help explore how IoT is transforming the healthcare system. I explain how IoT offers great advances in the healthcare system. I give some examples of where its concepts would like to be implemented to improve the quality of care of patients and some recent studies. In addition, I clarify the impact of Industry 4.0 in manufacturing especially in maintenance, in connection with predictive maintenance made possible by IoT. I provide an overview of Industry 4.0 and predictive maintenance. I discuss the capabilities of Industry 4.0 and present its driving technologies that can improve all areas of production processes such as reducing downtime, service costs , etc. Moreover, I draw attention to the implications of predictive maintenance in Industry 4.0 by describing how it works and how manufacturers can run it effectively, with supporting examples

    Drones, Signals, and the Techno-Colonisation of Landscape

    Get PDF
    This research project is a cross-disciplinary, creative practice-led investigation that interrogates increasing military interest in the electromagnetic spectrum (EMS). The project’s central argument is that painted visualisations of normally invisible aspects of contemporary EMS-enabled warfare can reveal useful, novel, and speculative but informed perspectives that contribute to debates about war and technology. It pays particular attention to how visualising normally invisible signals reveals an insidious techno-colonisation of our extended environment from Earth to orbiting satellites

    Authentication Protocols for Internet of Things: A Comprehensive Survey

    Get PDF
    In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1) Machine to Machine Communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) Internet of Sensors (IoS). Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed

    Securing the Edges of IoT Networks: a Scalable SIP DDoS Defense Framework with VNF, SDN, and Blockchain

    Get PDF
    An unintended consequence of the global deployment of IoT devices is that they provide a fertile breeding ground for IoT botnets. An adversary can take advantage of an IoT botnet to launch DDoS attacks against telecommunication services. Due to the magnitude of such an attack, legacy security systems are not able to provide adequate protection. The impact ranges from loss of revenue for businesses to endangering public safety. This risk has prompted academia, government, and industry to reevaluate the existing de- fence model. The current model relies on point solutions and the assumption that adversaries and their attacks are readily identifiable. But adversaries have challenged this assumption, building a botnet from thousands of hijacked IoT devices to launch DDoS attacks. With bot- net DDoS attacks there are no clear boundary where the attacks originate and what defensive measures to use. The research question is: in what ways programmable networks could defend against Session Initiation Protocol (SIP) Distributed Denial-of-Service (DDoS) flooding attacks from IoT botnets? My significant and original contribution to the knowledge is a scalable and collaborative defence framework that secures the edges of IoT networks with Virtual Network Function (VNF), Software-Defined Networking (SDN), and Blockchain technology to prevent, detect, and mitigate SIP DDoS flooding attacks from IoT botnets. Successful experiments were performed using VNF, SDN, and Blockchain. Three kinds of SIP attacks (scan, brute force, and DDoS) were launched against a VNF running on a virtual switch and each was successfully detected and mitigated. The SDN controller gathers threat intelligence from the switch where the attacks originate and installs them as packet filtering rules on all switches in the organisation. With the switches synchronised, the same botnet outbreak is prevented from attacking other parts of the organisation. A distributed application scales this framework further by writing the threat intelligence to a smart contract on the Ethereum Blockchain so that it is available for external organisations. The receiving organisation retrieves the threat intelligence from the smart contract and installs them as packet filtering rules on their switches. In this collaborative framework, attack detection/mitigation efforts by one organisation can be leveraged as attack prevention efforts by other organisations in the community
    corecore