135 research outputs found

    A Transmission Power Self-Optimization Technique for Wireless Sensor Networks

    Get PDF

    Contribution to the integration, performance improvement, and smart management of data and resources in the Internet of Things

    Get PDF
    [SPA] Esta tesis doctoral se presenta bajo la modalidad de compendio de publicaciones.[ENG] This doctoral dissertation has been presented in the form of thesis by publication. The IoT has seen a tremendous growth in the last few years. Not only due to its potential to transform societies, but also as an enabling technology for many other technological advances. Unfortunately, the IoT is a relatively recent paradigm that lacks the maturity of other well-established (not so recent) revolutions like the internet itself or Wireless Sensor Networks; upon which the IoT is built. The presented Thesis contributes to this maturation process by researching on the underlying communication mechanisms that enable a truly ubiquitous and effective IoT. As a Thesis by compilation, 5 relevant articles are introduced and discussed. Each of such articles delve into different key aspects that, in their own way, help closing the gap between what the IoT is expected to bring and what the IoT actually brings. As thoroughly commented throughout the main text, the comprehensive approach taken in this Thesis ensures that multiple angles of the same plane --the communication plane-- are analyzed and studied. From the mathematical analysis of how electromagnetic waves propagate through complex environments to the utilization of recent Machine Learning techniques, this Thesis explore a wide range of scientific and researching tools that are shown to improve the final performance of the IoT. In the first three chapters of this document, the reader will be introduced to the current context and state-of-the-art of the IoT while, at the same time, the formal objectives of this Thesis are outlined and set into such a global context. In the next five chapters, the five corresponding articles are presented and commented. For each and every of these articles: a brief abstract, a methodology summary, a highlight on the results and contributions and final conclusions are also added. Lastly, in the two last chapters, the final conclusions and future lines of this Thesis are commented.Los artículos que componen la tesis son los siguientes: 1. R. M. Sandoval, A.-J. J. Garcia-Sanchez, F. Garcia-Sanchez, and J. Garcia-Haro, \Evaluating the More Suitable ISM Frequency Band for IoT-Based Smart Grids: A Quantitative Study of 915 MHz vs. 2400 MHz," Sensors, vol. 17, no. 1, p. 76, Dec. 2016. 2. R. M. Sandoval, A.-J. J. Garcia-Sanchez, J.-M. M. Molina-Garcia-Pardo, F. Garcia-Sanchez, and J. Garcia-Haro, \Radio-Channel Characterization of Smart Grid Substations in the 2.4-GHz ISM Band," IEEE Trans. Wirel. Commun., vol. 16, no. 2, pp. 1294{1307, Feb. 2017. 3. R. M. Sandoval, A. J. Garcia-Sanchez, and J. Garcia-Haro, \Improving RSSI-based path-loss models accuracy for critical infrastructures: A smart grid substation case-study," IEEE Trans. Ind. Informatics, vol. 14, no. 5, pp. 2230{2240, 2018. 4. R. M. Sandoval, A.-J. Garcia-Sanchez, J. Garcia-Haro, and T. M. Chen, \Optimal policy derivation for Transmission Duty-Cycle constrained LPWAN," IEEE Internet Things J., vol. 5, no. 4, pp. 1{1, Aug. 2018. 5. R. M. Sandoval, S. Canovas-Carrasco, A. Garcia-Sanchez, and J. Garcia-Haro, \Smart Usage of Multiple RAT in IoT-oriented 5G Networks: A Reinforcement Learning Approach," in 2018 ITU Kaleidoscope: Machine Learning for a 5G Future (ITU K), 2018, pp. 1-8.Escuela Internacional de Doctorado de la Universidad Politécnica de CartagenaUniversidad Politécnica de CartagenaPrograma de Doctorado en Tecnologías de la Información y las Comunicaciones por la Universidad Politécnica de Cartagen

    Application of cognitive radio based sensor network in smart grids for efficient, holistic monitoring and control.

    Get PDF
    Doctoral Degree. University of KwaZulu-Natal, Durban.This thesis is directed towards the application of cognitive radio based sensor network (CRSN) in smart grid (SG) for efficient, holistic monitoring and control. The work involves enabling of sensor network and wireless communication devices for spectra utilization via the capability of Dynamic Spectrum Access (DSA) of a cognitive radio (CR) as well as end to end communication access technology for unified monitoring and control in smart grids. Smart Grid (SG) is a new power grid paradigm that can provide predictive information and recommendations to utilities, including their suppliers, and their customers on how best to manage power delivery and consumption. SG can greatly reduce air pollution from our surrounding by renewable power sources such as wind energy, solar plants and huge hydro stations. SG also reduces electricity blackouts and surges. Communication network is the foundation for modern SG. Implementing an improved communication solution will help in addressing the problems of the existing SG. Hence, this study proposed and implemented improved CRSN model which will help to ultimately evade the inherent problems of communication network in the SG such as: energy inefficiency, interference, spectrum inefficiencies, poor quality of service (QoS), latency and throughput. To overcome these problems, the existing approach which is more predominant is the use of wireless sensor network (WSNs) for communication needs in SG. However, WSNs have low battery power, low computational complexity, low bandwidth support, and high latency or delay due to multihop transmission in existing WSN topology. Consequently, solving these problems by addressing energy efficiency, bandwidth or throughput, and latency have not been fully realized due to the limitations in the WSN and the existing network topology. Therefore, existing approach has not fully addressed the communication needs in SG. SG can be fully realized by integrating communication network technologies infrastructures into the power grid. Cognitive Radio-based Sensor Network (CRSN) is considered a feasible solution to enhance various aspects of the electric power grid such as communication with end and remote devices in real-time manner for efficient monitoring and to realize maximum benefits of a smart grid system. CRSN in SG is aimed at addressing the problem of spectrum inefficiency and interference which wireless sensor network (WSN) could not. However, numerous challenges for CRSNs are due to the harsh environmental wireless condition in a smart grid system. As a result, latency, throughput and reliability become critical issues. To overcome these challenges, lots of approaches can be adopted ranging from integration of CRSNs into SGs; proper implementation design model for SG; reliable communication access devices for SG; key immunity requirements for communication infrastructure in SG; up to communication network protocol optimization and so on. To this end, this study utilized the National Institute of Standard (NIST) framework for SG interoperability in the design of unified communication network architecture including implementation model for guaranteed quality of service (QoS) of smart grid applications. This involves virtualized network in form of multi-homing comprising low power wide area network (LPWAN) devices such as LTE CAT1/LTE-M, and TV white space band device (TVBD). Simulation and analysis show that the performance of the developed modules architecture outperforms the legacy wireless systems in terms of latency, blocking probability, and throughput in SG harsh environmental condition. In addition, the problem of multi correlation fading channels due to multi antenna channels of the sensor nodes in CRSN based SG has been addressed by the performance analysis of a moment generating function (MGF) based M-QAM error probability over Nakagami-q dual correlated fading channels with maximum ratio combiner (MRC) receiver technique which includes derivation and novel algorithmic approach. The results of the MATLAB simulation are provided as a guide for sensor node deployment in order to avoid the problem of multi correlation in CRSN based SGs. SGs application requires reliable and efficient communication with low latency in timely manner as well as adequate topology of sensor nodes deployment for guaranteed QoS. Another important requirement is the need for an optimized protocol/algorithms for energy efficiency and cross layer spectrum aware made possible for opportunistic spectrum access in the CRSN nodes. Consequently, an optimized cross layer interaction of the physical and MAC layer protocols using various novel algorithms and techniques was developed. This includes a novel energy efficient distributed heterogeneous clustered spectrum aware (EDHC- SA) multichannel sensing signal model with novel algorithm called Equilateral triangulation algorithm for guaranteed network connectivity in CRSN based SG. The simulation results further obtained confirm that EDHC-SA CRSN model outperforms conventional ZigBee WSN in terms of bit error rate (BER), end-to-end delay (latency) and energy consumption. This no doubt validates the suitability of the developed model in SG

    Structural health monitoring of offshore wind turbines: A review through the Statistical Pattern Recognition Paradigm

    Get PDF
    Offshore Wind has become the most profitable renewable energy source due to the remarkable development it has experienced in Europe over the last decade. In this paper, a review of Structural Health Monitoring Systems (SHMS) for offshore wind turbines (OWT) has been carried out considering the topic as a Statistical Pattern Recognition problem. Therefore, each one of the stages of this paradigm has been reviewed focusing on OWT application. These stages are: Operational Evaluation; Data Acquisition, Normalization and Cleansing; Feature Extraction and Information Condensation; and Statistical Model Development. It is expected that optimizing each stage, SHMS can contribute to the development of efficient Condition-Based Maintenance Strategies. Optimizing this strategy will help reduce labor costs of OWTsŚł inspection, avoid unnecessary maintenance, identify design weaknesses before failure, improve the availability of power production while preventing wind turbinesŚł overloading, therefore, maximizing the investmentsŚł return. In the forthcoming years, a growing interest in SHM technologies for OWT is expected, enhancing the potential of offshore wind farm deployments further offshore. Increasing efficiency in operational management will contribute towards achieving UKŚłs 2020 and 2050 targets, through ultimately reducing the Levelised Cost of Energy (LCOE)

    Provisioning Quality of Service of Wireless Telemedicine for E-Health Services: A Review

    Get PDF
    In general, on-line medical consultation reduces time required for medical consultation and induces improvement in the quality and efficiency of healthcare services. The scope of study includes several key features of present day e-health applications such as X-ray, ECG, video, diagnosis images and other common applications. Moreover, the provision of Quality of Service (QoS) in terms of specific medical care services in e-health, the priority set for e-health services and the support of QoS in wireless networks and techniques or methods aimed at IEEE 802.11 to secure the provision of QoS has been assessed as well. In e-health, medical services in remote places which include rustic healthcare centres, ships, ambulances and home healthcare services can be supported through the applications of e-health services such as medical databases, electronic health data and the transferring of text, video, sound and images. Given this, a proposal has been made for a multiple service wireless networking with multiple sets of priorities. In relation to the terms of an acceptable QoS level by the customers of e-health services, prioritization is an important criterion in a multi-traffic network. The requirement for QoS in medical networking of wireless broadband has paved the way for bandwidth prerequisites and the live transmission or real-time medical applications. The proposed wireless network is capable of handling medical applications for both normal and life-threatening conditions as characterized by the level of emergencies. In addition, the allocation of bandwidth and the system that controls admittance designed based on IEEE 802.16 especially for e-health services or wireless telemedicine will be discussed in this study. It has been concluded that under busy traffic conditions, the proposed architecture can used as a feasible and reliable infrastructure network for telemedicine

    Cognitive Security Framework For Heterogeneous Sensor Network Using Swarm Intelligence

    Get PDF
    Rapid development of sensor technology has led to applications ranging from academic to military in a short time span. These tiny sensors are deployed in environments where security for data or hardware cannot be guaranteed. Due to resource constraints, traditional security schemes cannot be directly applied. Unfortunately, due to minimal or no communication security schemes, the data, link and the sensor node can be easily tampered by intruder attacks. This dissertation presents a security framework applied to a sensor network that can be managed by a cohesive sensor manager. A simple framework that can support security based on situation assessment is best suited for chaotic and harsh environments. The objective of this research is designing an evolutionary algorithm with controllable parameters to solve existing and new security threats in a heterogeneous communication network. An in-depth analysis of the different threats and the security measures applied considering the resource constrained network is explored. Any framework works best, if the correlated or orthogonal performance parameters are carefully considered based on system goals and functions. Hence, a trade-off between the different performance parameters based on weights from partially ordered sets is applied to satisfy application specific requirements and security measures. The proposed novel framework controls heterogeneous sensor network requirements,and balance the resources optimally and efficiently while communicating securely using a multi-objection function. In addition, the framework can measure the affect of single or combined denial of service attacks and also predict new attacks under both cooperative and non-cooperative sensor nodes. The cognitive intuition of the framework is evaluated under different simulated real time scenarios such as Health-care monitoring, Emergency Responder, VANET, Biometric security access system, and Battlefield monitoring. The proposed three-tiered Cognitive Security Framework is capable of performing situation assessment and performs the appropriate security measures to maintain reliability and security of the system. The first tier of the proposed framework, a crosslayer cognitive security protocol defends the communication link between nodes during denial-of-Service attacks by re-routing data through secure nodes. The cognitive nature of the protocol balances resources and security making optimal decisions to obtain reachable and reliable solutions. The versatility and robustness of the protocol is justified by the results obtained in simulating health-care and emergency responder applications under Sybil and Wormhole attacks. The protocol considers metrics from each layer of the network model to obtain an optimal and feasible resource efficient solution. In the second tier, the emergent behavior of the protocol is further extended to mine information from the nodes to defend the network against denial-of-service attack using Bayesian models. The jammer attack is considered the most vulnerable attack, and therefore simulated vehicular ad-hoc network is experimented with varied types of jammer. Classification of the jammer under various attack scenarios is formulated to predict the genuineness of the attacks on the sensor nodes using receiver operating characteristics. In addition to detecting the jammer attack, a simple technique of locating the jammer under cooperative nodes is implemented. This feature enables the network in isolating the jammer or the reputation of node is affected, thus removing the malicious node from participating in future routes. Finally, a intrusion detection system using `bait\u27 architecture is analyzed where resources is traded-off for the sake of security due to sensitivity of the application. The architecture strategically enables ant agents to detect and track the intruders threateningthe network. The proposed framework is evaluated based on accuracy and speed of intrusion detection before the network is compromised. This process of detecting the intrusion earlier helps learn future attacks, but also serves as a defense countermeasure. The simulated scenarios of this dissertation show that Cognitive Security Framework isbest suited for both homogeneous and heterogeneous sensor networks

    Energy efficient wireless sensor network protocols for monitoring and prognostics of large scale systems

    Get PDF
    In this work, energy-efficient protocols for wireless sensor networks (WSN) with applications to prognostics are investigated. Both analytical methods and verification are shown for the proposed methods via either hardware experiments or simulation. This work is presented in five papers. Energy-efficiency methods for WSN include distributed algorithms for i) optimal routing, ii) adaptive scheduling, iii) adaptive transmission power and data-rate control --Abstract, page iv

    IoT and Sensor Networks in Industry and Society

    Get PDF
    The exponential progress of Information and Communication Technology (ICT) is one of the main elements that fueled the acceleration of the globalization pace. Internet of Things (IoT), Artificial Intelligence (AI) and big data analytics are some of the key players of the digital transformation that is affecting every aspect of human's daily life, from environmental monitoring to healthcare systems, from production processes to social interactions. In less than 20 years, people's everyday life has been revolutionized, and concepts such as Smart Home, Smart Grid and Smart City have become familiar also to non-technical users. The integration of embedded systems, ubiquitous Internet access, and Machine-to-Machine (M2M) communications have paved the way for paradigms such as IoT and Cyber Physical Systems (CPS) to be also introduced in high-requirement environments such as those related to industrial processes, under the forms of Industrial Internet of Things (IIoT or I2oT) and Cyber-Physical Production Systems (CPPS). As a consequence, in 2011 the German High-Tech Strategy 2020 Action Plan for Germany first envisioned the concept of Industry 4.0, which is rapidly reshaping traditional industrial processes. The term refers to the promise to be the fourth industrial revolution. Indeed, the ïŹrst industrial revolution was triggered by water and steam power. Electricity and assembly lines enabled mass production in the second industrial revolution. In the third industrial revolution, the introduction of control automation and Programmable Logic Controllers (PLCs) gave a boost to factory production. As opposed to the previous revolutions, Industry 4.0 takes advantage of Internet access, M2M communications, and deep learning not only to improve production efficiency but also to enable the so-called mass customization, i.e. the mass production of personalized products by means of modularized product design and ïŹ‚exible processes. Less than five years later, in January 2016, the Japanese 5th Science and Technology Basic Plan took a further step by introducing the concept of Super Smart Society or Society 5.0. According to this vision, in the upcoming future, scientific and technological innovation will guide our society into the next social revolution after the hunter-gatherer, agrarian, industrial, and information eras, which respectively represented the previous social revolutions. Society 5.0 is a human-centered society that fosters the simultaneous achievement of economic, environmental and social objectives, to ensure a high quality of life to all citizens. This information-enabled revolution aims to tackle today’s major challenges such as an ageing population, social inequalities, depopulation and constraints related to energy and the environment. Accordingly, the citizens will be experiencing impressive transformations into every aspect of their daily lives. This book offers an insight into the key technologies that are going to shape the future of industry and society. It is subdivided into five parts: the I Part presents a horizontal view of the main enabling technologies, whereas the II-V Parts offer a vertical perspective on four different environments. The I Part, dedicated to IoT and Sensor Network architectures, encompasses three Chapters. In Chapter 1, Peruzzi and Pozzebon analyse the literature on the subject of energy harvesting solutions for IoT monitoring systems and architectures based on Low-Power Wireless Area Networks (LPWAN). The Chapter does not limit the discussion to Long Range Wise Area Network (LoRaWAN), SigFox and Narrowband-IoT (NB-IoT) communication protocols, but it also includes other relevant solutions such as DASH7 and Long Term Evolution MAchine Type Communication (LTE-M). In Chapter 2, Hussein et al. discuss the development of an Internet of Things message protocol that supports multi-topic messaging. The Chapter further presents the implementation of a platform, which integrates the proposed communication protocol, based on Real Time Operating System. In Chapter 3, Li et al. investigate the heterogeneous task scheduling problem for data-intensive scenarios, to reduce the global task execution time, and consequently reducing data centers' energy consumption. The proposed approach aims to maximize the efficiency by comparing the cost between remote task execution and data migration. The II Part is dedicated to Industry 4.0, and includes two Chapters. In Chapter 4, Grecuccio et al. propose a solution to integrate IoT devices by leveraging a blockchain-enabled gateway based on Ethereum, so that they do not need to rely on centralized intermediaries and third-party services. As it is better explained in the paper, where the performance is evaluated in a food-chain traceability application, this solution is particularly beneficial in Industry 4.0 domains. Chapter 5, by De Fazio et al., addresses the issue of safety in workplaces by presenting a smart garment that integrates several low-power sensors to monitor environmental and biophysical parameters. This enables the detection of dangerous situations, so as to prevent or at least reduce the consequences of workers accidents. The III Part is made of two Chapters based on the topic of Smart Buildings. In Chapter 6, Petroșanu et al. review the literature about recent developments in the smart building sector, related to the use of supervised and unsupervised machine learning models of sensory data. The Chapter poses particular attention on enhanced sensing, energy efficiency, and optimal building management. In Chapter 7, Oh examines how much the education of prosumers about their energy consumption habits affects power consumption reduction and encourages energy conservation, sustainable living, and behavioral change, in residential environments. In this Chapter, energy consumption monitoring is made possible thanks to the use of smart plugs. Smart Transport is the subject of the IV Part, including three Chapters. In Chapter 8, Roveri et al. propose an approach that leverages the small world theory to control swarms of vehicles connected through Vehicle-to-Vehicle (V2V) communication protocols. Indeed, considering a queue dominated by short-range car-following dynamics, the Chapter demonstrates that safety and security are increased by the introduction of a few selected random long-range communications. In Chapter 9, Nitti et al. present a real time system to observe and analyze public transport passengers' mobility by tracking them throughout their journey on public transport vehicles. The system is based on the detection of the active Wi-Fi interfaces, through the analysis of Wi-Fi probe requests. In Chapter 10, Miler et al. discuss the development of a tool for the analysis and comparison of efficiency indicated by the integrated IT systems in the operational activities undertaken by Road Transport Enterprises (RTEs). The authors of this Chapter further provide a holistic evaluation of efficiency of telematics systems in RTE operational management. The book ends with the two Chapters of the V Part on Smart Environmental Monitoring. In Chapter 11, He et al. propose a Sea Surface Temperature Prediction (SSTP) model based on time-series similarity measure, multiple pattern learning and parameter optimization. In this strategy, the optimal parameters are determined by means of an improved Particle Swarm Optimization method. In Chapter 12, Tsipis et al. present a low-cost, WSN-based IoT system that seamlessly embeds a three-layered cloud/fog computing architecture, suitable for facilitating smart agricultural applications, especially those related to wildfire monitoring. We wish to thank all the authors that contributed to this book for their efforts. We express our gratitude to all reviewers for the volunteering support and precious feedback during the review process. We hope that this book provides valuable information and spurs meaningful discussion among researchers, engineers, businesspeople, and other experts about the role of new technologies into industry and society
    • 

    corecore