6,813 research outputs found
Recommended from our members
iSEA: IoT-based smartphone energy assistant for prompting energy-aware behaviors in commercial buildings
Providing personalized energy-use information to individual occupants enables the adoption of energy-aware behaviors in commercial buildings. However, the implementation of individualized feedback still remains challenging due to the difficulties in collecting personalized data, tracking personal behaviors, and delivering personalized tailored information to individual occupants. Nowadays, the Internet of Things (IoT) technologies are used in a variety of applications including real-time monitoring, control, and decision-making due to the flexibility of these technologies for fusing different data streams. In this paper, we propose a novel IoT-based smartphone energy assistant (iSEA) framework which prompts energy-aware behaviors in commercial buildings. iSEA tracks individual occupants through tracking their smartphones, uses a deep learning approach to identify their energy usage, and delivers personalized tailored feedback to impact their usage. iSEA particularly uses an energy-use efficiency index (EEI) to understand behaviors and categorize them into efficient and inefficient behaviors. The iSEA architecture includes four layers: physical, cloud, service, and communication. The results of implementing iSEA in a commercial building with ten occupants over a twelve-week duration demonstrate the validity of this approach in enhancing individualized energy-use behaviors. An average of 34% energy savings was measured by tracking occupants’ EEI by the end of the experimental period. In addition, the results demonstrate that commercial building occupants often ignore controlling over lighting systems at their departure events that leads to wasting energy during non-working hours. By utilizing the existing IoT devices in commercial buildings, iSEA significantly contributes to support research efforts into sensing and enhancing energy-aware behaviors at minimal costs
EC-IoT : an easy configuration framework for constrained IoT devices
Connected devices offer tremendous opportunities. However, their configuration and control remains a major challenge in order to reach widespread adoption by less technically skilled people. Over the past few years, a lot of attention has been given to improve the configuration process of constrained devices with limited resources, such as available memory and absence of a user interface. Still, a major deficiency is the lack of a streamlined, standardized configuration process. In this paper we propose EC-IoT, a novel configuration framework for constrained IoT devices. The proposed framework makes use of open standards, leveraging upon the Constrained Application Protocol (CoAP), an application protocol that enables HTTP-like RESTful interactions with constrained devices. To validate the proposed approach, we present a prototype implementation of the EC-IoT framework and assess its scalability.The research from DEWI project (www.dewi-project.eu)
leading to these results has received funding from the
ARTEMIS Joint Undertaking under grant agreement n
621353 and from the agency for Flanders Innovation &
Entrepreneurship (VLAIO). The research from the ITEA2
FUSE-IT project (13023) leading to these results has re-
ceived funding from the agency for Flanders Innovation &
Entrepreneurship (VLAIO)
Survey on wireless technology trade-offs for the industrial internet of things
Aside from vast deployment cost reduction, Industrial Wireless Sensor and Actuator Networks (IWSAN) introduce a new level of industrial connectivity. Wireless connection of sensors and actuators in industrial environments not only enables wireless monitoring and actuation, it also enables coordination of production stages, connecting mobile robots and autonomous transport vehicles, as well as localization and tracking of assets. All these opportunities already inspired the development of many wireless technologies in an effort to fully enable Industry 4.0. However, different technologies significantly differ in performance and capabilities, none being capable of supporting all industrial use cases. When designing a network solution, one must be aware of the capabilities and the trade-offs that prospective technologies have. This paper evaluates the technologies potentially suitable for IWSAN solutions covering an entire industrial site with limited infrastructure cost and discusses their trade-offs in an effort to provide information for choosing the most suitable technology for the use case of interest. The comparative discussion presented in this paper aims to enable engineers to choose the most suitable wireless technology for their specific IWSAN deployment
On the feasibility of attribute-based encryption on Internet of Things devices
Attribute-based encryption (ABE) could be an effective cryptographic tool for the secure management of Internet of Things (IoT) devices, but its feasibility in the IoT has been under-investigated thus far. This article explores such feasibility for well-known IoT platforms, namely, Intel Galileo Gen 2, Intel Edison, Raspberry pi 1 model B, and Raspberry pi zero, and concludes that adopting ABE in the IoT is indeed feasible
UniquID: A Quest to Reconcile Identity Access Management and the Internet of Things
The Internet of Things (IoT) has caused a revolutionary paradigm shift in
computer networking. After decades of human-centered routines, where devices
were merely tools that enabled human beings to authenticate themselves and
perform activities, we are now dealing with a device-centered paradigm: the
devices themselves are actors, not just tools for people. Conventional identity
access management (IAM) frameworks were not designed to handle the challenges
of IoT. Trying to use traditional IAM systems to reconcile heterogeneous
devices and complex federations of online services (e.g., IoT sensors and cloud
computing solutions) adds a cumbersome architectural layer that can become hard
to maintain and act as a single point of failure. In this paper, we propose
UniquID, a blockchain-based solution that overcomes the need for centralized
IAM architectures while providing scalability and robustness. We also present
the experimental results of a proof-of-concept UniquID enrolment network, and
we discuss two different use-cases that show the considerable value of a
blockchain-based IAM.Comment: 15 pages, 10 figure
Eavesdropping Whilst You're Shopping: Balancing Personalisation and Privacy in Connected Retail Spaces
Physical retailers, who once led the way in tracking with loyalty cards and
`reverse appends', now lag behind online competitors. Yet we might be seeing
these tables turn, as many increasingly deploy technologies ranging from simple
sensors to advanced emotion detection systems, even enabling them to tailor
prices and shopping experiences on a per-customer basis. Here, we examine these
in-store tracking technologies in the retail context, and evaluate them from
both technical and regulatory standpoints. We first introduce the relevant
technologies in context, before considering privacy impacts, the current
remedies individuals might seek through technology and the law, and those
remedies' limitations. To illustrate challenging tensions in this space we
consider the feasibility of technical and legal approaches to both a) the
recent `Go' store concept from Amazon which requires fine-grained, multi-modal
tracking to function as a shop, and b) current challenges in opting in or out
of increasingly pervasive passive Wi-Fi tracking. The `Go' store presents
significant challenges with its legality in Europe significantly unclear and
unilateral, technical measures to avoid biometric tracking likely ineffective.
In the case of MAC addresses, we see a difficult-to-reconcile clash between
privacy-as-confidentiality and privacy-as-control, and suggest a technical
framework which might help balance the two. Significant challenges exist when
seeking to balance personalisation with privacy, and researchers must work
together, including across the boundaries of preferred privacy definitions, to
come up with solutions that draw on both technology and the legal frameworks to
provide effective and proportionate protection. Retailers, simultaneously, must
ensure that their tracking is not just legal, but worthy of the trust of
concerned data subjects.Comment: 10 pages, 1 figure, Proceedings of the PETRAS/IoTUK/IET Living in the
Internet of Things Conference, London, United Kingdom, 28-29 March 201
Integration of Wi-Fi mobile nodes in a Web of Things Testbed
Abstract The Internet of Things (IoT) is supposed to connect billions of devices to the Internet through IP-based communications. The main goal is to foster a rapid deployment of Web-enabled everyday objects, allowing end users to manage and control smart things in a simple way, by using Web browsers. This paper focuses on the integration of Wi-Fi nodes, hosting HTTP resources, into a Web of Things Testbed (WoTT). The main novelty of the proposed approach is that the WoTT integrates new nodes by using only standard mechanisms, allowing end-users to interact with all Smart Objects without worrying about protocol-specific details
- …