16 research outputs found

    Using SCHC for an optimized protocol stack in multimodal LPWAN solutions

    Get PDF
    Low Power Wide Area Networks (LPWANs) are formed out of cheap, small, interconnected devices which operate in the sub-GHz domain. The last couple of years, many communication technologies arose in this domain, each with its own characteristics. In order to satisfy more diverse requirements, devices are now equipped with multiple LPWAN radio technologies, which requires the use of a unified protocol stack independent of the underlying LPWAN technology. With its 2128 addresses available and its ability to operate over different link layer technologies, the IPv6 protocol stack would be the ideal candidate. However, many LPWAN configurations do not allow standardized IP/UDP communication, sometimes acquiring more header overhead than there is room for the actual payload. Recently, a new initiative to directly connect constrained devices over IP was initiated by the LPWAN working group of the Internet Engineering Task Force (IETF). This work resulted in the Static Context Header Compression or SCHC mechanism. This header compression mechanism is able to compress the overhead of these internet protocols up to 95%. In order to comply with the IPv6 Maximum Transfer Unit (MTU) of 1280 bytes, a fragmentation mechanism is also included. In this work, we validate the benefits of using SCHC for multimodal LPWAN solutions and show its implementation feasibility on such constrained devices

    ICNLoWPAN -- Named-Data Networking for Low Power IoT Networks

    Full text link
    Information Centric Networking is considered a promising communication technology for the constrained IoT, but NDN was designed only for standard network infrastructure. In this paper, we design and evaluate an NDN convergence layer for low power lossy links that (1) augments the NDN stateful forwarding with a highly efficient name eliding, (2) devises stateless compression schemes for standard NDN use cases, (3) adapts NDN packets to the small MTU size of IEEE 802.15.4, and (4) generates compatibility with 6LoWPAN so that IPv6 and NDN can coexist on the same LoWPAN links. Our findings indicate that stateful compression can reduce the size of NDN data packets by more than 70% in realistic examples. Our experiments show that for common use cases ICNLoWPAN saves 33% of transmission resources over NDN, and about 20% over 6LoWPAN

    Minimal IPv6 over the TSCH Mode of IEEE 802.15.4e (6TiSCH) Configuration

    Get PDF
    International audienceThis document describes a minimal mode of operation for an IPv6 over the TSCH mode of IEEE 802.15.4e (6TiSCH) network. This minimal mode of operation specifies the baseline set of protocols that need to be supported and the recommended configurations and modes of operation sufficient to enable a 6TiSCH functional network. 6TiSCH provides IPv6 connectivity over a Time-Slotted Channel Hopping (TSCH) mesh composed of IEEE Std 802.15.4 TSCH links. This minimal mode uses a collection of protocols with the respective configurations, including the IPv6 Low-Power Wireless Personal Area Network (6LoWPAN) framework, enabling interoperable IPv6 connectivity over IEEE Std 802.15.4 TSCH. This minimal configuration provides the necessary bandwidth for network and security bootstrapping and defines the proper link between the IETF protocols that interface to IEEE Std 802.15.4 TSCH. This minimal mode of operation should be implemented by all 6TiSCH-compliant devices

    Is Fragmentation a Threat to the Success of the Internet of Things?

    Full text link
    The current revolution in collaborating distributed things is seen as the first phase of IoT to develop various services. Such collaboration is threatened by the fragmentation found in the industry nowadays as it brings challenges stemming from the difficulty to integrate diverse technologies in system. Diverse networking technologies induce interoperability issues, hence, limiting the possibility of reusing the data to develop new services. Different aspects of handling data collection must be available to provide interoperability to the diverse objects interacting; however, such approaches are challenged as they bring substantial performance impairments in settings with the increasing number of collaborating devices/technologies.Comment: 16 pages, 2 figures, Internet of Things Journal (http://ieee-iotj.org

    Resilient IoT Network for short-range data transmission

    Get PDF
    The current trends predict an increase of Internet of Things (IoT) devices to the billionths, changing the everyday life of the human race everywhere around the world. However, in order to work reliably these devices will require a means of communication that leverages current technologies allowing them to transmit data at short distances. The ubiquity of Bluetooth Low Energy (BLE) alongside the solid foundations of IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) will enable the creation of vast networks of interconnected devices in a reliable and transparent way. Nevertheless the validation of such technologies combination is key before the large deployment of such networks can be started. This work validated such a setup, proving that the reliable communication between devices using 6LoWPAN over BLE can be achieved. The project obtained promising results in terms of transparency between this stack and more traditional Internet Protocol (IP) stacks for multiple distances. The conclusions obtained open the possibility for real world scenario testing and small scale deployment for further validation of 6LoWPAN over BLE.As tendências actuais prevêm um aumento de dispositivos de IoT para a ordem dos milhares de milhão, provocando mudanças no dia a dia de pessoas por todo o mundo. Contudo, para garantir que estes dispositivos funcionam de forma ável, irão necessitar de um meio de comunicação que alavanque as technologias actuais de forma a permitir a comunicação a curtas distâncias. A ubiquidade do BLE combinado com as bases sólidas do 6LoWPAN irão possibilitar a criação de vastas redes de dispositivos ligados entre si de forma con ável e transparente. Contudo a validação desta combinação de tecnologias é essencial antes da implantação em larga escala destes sistemas. Este trabalho validou esta combinação de tecnologias, provando que comunicação entre dispositivos utilizando 6LoWPAN sobre BLE é possível. Este projecto obteve resultados promissores em termos de transparências entre esta e stacks mais tradicionais de protocolos de internet. As conclusões obtidas abrem a possibilidade de testes em cenários reais e de instalação de pequenas redes para maior validação de 6LoWPAN sobre BLE

    Internet of Things From Hype to Reality

    Get PDF
    The Internet of Things (IoT) has gained significant mindshare, let alone attention, in academia and the industry especially over the past few years. The reasons behind this interest are the potential capabilities that IoT promises to offer. On the personal level, it paints a picture of a future world where all the things in our ambient environment are connected to the Internet and seamlessly communicate with each other to operate intelligently. The ultimate goal is to enable objects around us to efficiently sense our surroundings, inexpensively communicate, and ultimately create a better environment for us: one where everyday objects act based on what we need and like without explicit instructions

    Impacto das comunicações M2M em redes celulares de telecomunicações

    Get PDF
    Mestrado em Engenharia Electrónica e de TelecomunicaçõesAs comunicações Máquina-Máquina (M2M) apresentam um crescimento muito significativo e algumas projeções apontam para que esta tendência se acentue drasticamente ao longo dos próximos anos. O tráfego gerado por este tipo de comunicações tem caraterísticas muito diferentes do tráfego de dados, ou voz, que atualmente circula nas redes celulares de telecomunicações. Assim, é fundamental estudar as caraterísticas dos tipos de tráfego associados com comunicações M2M, por forma a compreender os efeitos que tais caraterísticas podem provocar nas redes celulares de telecomunicações. Esta dissertação procura identificar e estudar algumas das caraterísticas do tráfego M2M, com especial enfoque na sinalização gerada por serviços M2M. Como resultado principal deste trabalho surge o desenvolvimento de modelos que permitem a construção de uma ferramenta analítica de orquestração de serviços e análise de rede. Esta ferramenta permite orquestrar serviços e modelar padrões de tráfego numa rede UMTS, possibilitando uma análise simultânea aos efeitos produzidos no segmento core da mesma rede. Ao longo deste trabalho procura-se que a abordagem aos problemas apresentados permita que os resultados obtidos sejam válidos, ou adaptáveis, num âmbito mais abrangente do que apenas as comunicações M2M.Machine to Machine (M2M) communications present significant growth and some projections indicate that this trend is going to increase dramatically over the coming years. The traffic generated by this type of communication has very different characteristics when compared to data or voice traffic currently going through cellular telecommunications networks. Thus, it is essential to study the characteristics of traffic associated with M2M communications in order to understand the effects that its features can imply to cellular telecommunications networks. This dissertation tries to identify and study some of the characteristics of M2M traffic, with particular focus on signaling generated by M2M services. A number of models, that enable the development of an analytic tool for service orchestration and network analysis, are presented. This tool enables service orchestration and traffic modeling on a UMTS network, with simultaneous visualization of the impacts on the core of such network. The work presented in this document seeks to approach the problems at study in ways ensuring that its outcomes are valid for a wider scope than just M2M communications

    Cybersecurity Detection System for IoT

    Get PDF

    Designing and Deploying Internet of Things Applications in the Industry: An Empirical Investigation

    Get PDF
    RÉSUMÉ : L’Internet des objets (IdO) a pour objectif de permettre la connectivité à presque tous les objets trouvés dans l’espace physique. Il étend la connectivité aux objets de tous les jours et o˙re la possibilité de surveiller, de suivre, de se connecter et d’intéragir plus eÿcacement avec les actifs industriels. Dans l’industrie de nos jours, les réseaux de capteurs connectés surveillent les mouvements logistiques, fabriquent des machines et aident les organisations à améliorer leur eÿcacité et à réduire les coûts. Cependant, la conception et l’implémentation d’un réseau IdO restent, aujourd’hui, une tâche particulièrement diÿcile. Nous constatons un haut niveau de fragmentation dans le paysage de l’IdO, les développeurs se complaig-nent régulièrement de la diÿculté à intégrer diverses technologies avec des divers objets trouvés dans les systèmes IdO et l’absence des directives et/ou des pratiques claires pour le développement et le déploiement d’application IdO sûres et eÿcaces. Par conséquent, analyser et comprendre les problèmes liés au développement et au déploiement de l’IdO sont primordiaux pour permettre à l’industrie d’exploiter son plein potentiel. Dans cette thèse, nous examinons les interactions des spécialistes de l’IdO sur le sites Web populaire, Stack Overflow et Stack Exchange, afin de comprendre les défis et les problèmes auxquels ils sont confrontés lors du développement et du déploiement de di˙érentes appli-cations de l’IdO. Ensuite, nous examinons le manque d’interopérabilité entre les techniques développées pour l’IdO, nous étudions les défis que leur intégration pose et nous fournissons des directives aux praticiens intéressés par la connexion des réseaux et des dispositifs de l’IdO pour développer divers services et applications. D’autre part, la sécurité étant essen-tielle au succès de cette technologie, nous étudions les di˙érentes menaces et défis de sécurité sur les di˙érentes couches de l’architecture des systèmes de l’IdO et nous proposons des contre-mesures. Enfin, nous menons une série d’expériences qui vise à comprendre les avantages et les incon-vénients des déploiements ’serverful’ et ’serverless’ des applications de l’IdO afin de fournir aux praticiens des directives et des recommandations fondées sur des éléments probants relatifs à de tels déploiements. Les résultats présentés représentent une étape très importante vers une profonde compréhension de ces technologies très prometteuses. Nous estimons que nos recommandations et nos suggestions aideront les praticiens et les bâtisseurs technologiques à améliorer la qualité des logiciels et des systèmes de l’IdO. Nous espérons que nos résultats pourront aider les communautés et les consortiums de l’IdO à établir des normes et des directives pour le développement, la maintenance, et l’évolution des logiciels de l’IdO.----------ABSTRACT : Internet of Things (IoT) aims to bring connectivity to almost every object found in the phys-ical space. It extends connectivity to everyday things, opens up the possibility to monitor, track, connect, and interact with industrial assets more eÿciently. In the industry nowadays, we can see connected sensor networks monitor logistics movements, manufacturing machines, and help organizations improve their eÿciency and reduce costs as well. However, designing and implementing an IoT network today is still a very challenging task. We are witnessing a high level of fragmentation in the IoT landscape and developers regularly complain about the diÿculty to integrate diverse technologies of various objects found in IoT systems, and the lack of clear guidelines and–or practices for developing and deploying safe and eÿcient IoT applications. Therefore, analyzing and understanding issues related to the development and deployment of the Internet of Things is utterly important to allow the industry to utilize its fullest potential. In this thesis, we examine IoT practitioners’ discussions on the popular Q&A websites, Stack Overflow and Stack Exchange, to understand the challenges and issues that they face when developing and deploying di˙erent IoT applications. Next, we examine the lack of interoper-ability among technologies developed for IoT and study the challenges that their integration poses and provide guidelines for practitioners interested in connecting IoT networks and de-vices to develop various services and applications. Since security issues are center to the success of this technology, we also investigate di˙erent security threats and challenges across di˙erent layers of the architecture of IoT systems and propose countermeasures. Finally, we conduct a series of experiments to understand the advantages and trade-o˙s of serverful and serverless deployments of IoT applications in order to provide practitioners with evidence-based guidelines and recommendations on such deployments. The results presented in this thesis represent a first important step towards a deep understanding of these very promising technologies. We believe that our recommendations and suggestions will help practitioners and technology builders improve the quality of IoT software and systems. We also hope that our results can help IoT communities and consortia establish standards and guidelines for the development, maintenance, and evolution of IoT software and systems
    corecore