84 research outputs found
A Comprehensive Approach to WSN-Based ITS Applications: A Survey
In order to perform sensing tasks, most current Intelligent Transportation Systems (ITS) rely on expensive sensors, which offer only limited functionality. A more recent trend consists of using Wireless Sensor Networks (WSN) for such purpose, which reduces the required investment and enables the development of new collaborative and intelligent applications that further contribute to improve both driving safety and traffic efficiency. This paper surveys the application of WSNs to such ITS scenarios, tackling the main issues that may arise when developing these systems. The paper is divided into sections which address different matters including vehicle detection and classification as well as the selection of appropriate communication protocols, network architecture, topology and some important design parameters. In addition, in line with the multiplicity of different technologies that take part in ITS, it does not consider WSNs just as stand-alone systems, but also as key components of heterogeneous systems cooperating along with other technologies employed in vehicular scenarios
Routing and Mobility on IPv6 over LoWPAN
The IoT means a world-wide network of interconnected objects based on standard communication
protocols. An object in this context is a quotidian physical device augmented with
sensing/actuating, processing, storing and communication capabilities. These objects must be
able to interact with the surrounding environment where they are placed and to cooperate with
neighbouring objects in order to accomplish a common objective. The IoT objects have also the
capabilities of converting the sensed data into automated instructions and communicating them
to other objects through the communication networks, avoiding the human intervention in several
tasks. Most of IoT deployments are based on small devices with restricted computational
resources and energy constraints. For this reason, initially the scientific community did not
consider the use of IP protocol suite in this scenarios because there was the perception that it
was too heavy to the available resources on such devices. Meanwhile, the scientific community
and the industry started to rethink about the use of IP protocol suite in all IoT devices and now
it is considered as the solution to provide connectivity between the IoT devices, independently
of the Layer 2 protocol in use, and to connect them to the Internet. Despite the use of IP suite
protocol in all devices and the amount of solutions proposed, many open issues remain unsolved
in order to reach a seamless integration between the IoT and the Internet and to provide the
conditions to IoT service widespread. This thesis addressed the challenges associated with the
interconnectivity between the Internet and the IoT devices and with the security aspects of
the IoT. In the interconnectivity between the IoT devices and the Internet the problem is how
to provide valuable information to the Internet connected devices, independently of the supported
IP protocol version, without being necessary accessed directly to the IoT nodes. In order
to solve this problem, solutions based on Representational state transfer (REST) web services
and IPv4 to IPv6 dual stack transition mechanism were proposed and evaluated. The REST web
service and the transition mechanism runs only at the border router without penalizing the IoT
constrained devices. The mitigation of the effects of internal and external security attacks
minimizing the overhead imposed on the IoT devices is the security challenge addressed in this
thesis. Three different solutions were proposed. The first is a mechanism to prevent remotely
initiated transport level Denial of Service attacks that avoids the use of inefficient and hard to
manage traditional firewalls. It is based on filtering at the border router the traffic received
from the Internet and destined to the IoT network according to the conditions announced by
each IoT device. The second is a network access security framework that can be used to control
the nodes that have access to the network, based on administrative approval, and to enforce
security compliance to the authorized nodes. The third is a network admission control framework
that prevents IoT unauthorized nodes to communicate with IoT authorized nodes or with
the Internet, which drastically reduces the number of possible security attacks. The network
admission control was also exploited as a management mechanism as it can be used to manage
the network size in terms of number of nodes, making the network more manageable, increasing
its reliability and extending its lifetime.A IoT (Internet of Things) tem suscitado o interesse tanto da comunidade académica como
da indústria, uma vez que os campos de aplicação são inúmeros assim como os potenciais ganhos
que podem ser obtidos através do uso deste tipo de tecnologia. A IoT significa uma rede
global de objetos ligados entre si através de uma rede de comunicações baseada em protocolos
standard. Neste contexto, um objeto Ă© um objeto fĂsico do dia a dia ao qual foi adicionada a
capacidade de medir e de atuar sobre variáveis fĂsicas, de processar e armazenar dados e de
comunicar. Estes objetos tĂŞm a capacidade de interagir com o meio ambiente envolvente e de
cooperar com outros objetos vizinhos de forma a atingirem um objetivo comum. Estes objetos
também têm a capacidade de converter os dados lidos em instruções e de as comunicar a outros
objetos através da rede de comunicações, evitando desta forma a intervenção humana em
diversas tarefas. A maior parte das concretizações de sistemas IoT são baseados em pequenos
dispositivos autĂłnomos com restrições ao nĂvel dos recursos computacionais e de retenção de
energia. Por esta razĂŁo, inicialmente a comunidade cientĂfica nĂŁo considerou adequado o uso
da pilha protocolar IP neste tipo de dispositivos, uma vez que havia a perceção de que era muito
pesada para os recursos computacionais disponĂveis. Entretanto, a comunidade cientĂfica e a
indĂşstria retomaram a discussĂŁo acerca dos benefĂcios do uso da pilha protocolar em todos os
dispositivos da IoT e atualmente é considerada a solução para estabelecer a conetividade entre
os dispositivos IoT independentemente do protocolo da camada dois em uso e para os ligar Ă
Internet. Apesar do uso da pilha protocolar IP em todos os dispositivos e da quantidade de
soluções propostas, sĂŁo vários os problemas por resolver no que concerne Ă integração contĂnua
e sem interrupções da IoT na Internet e de criar as condições para a adoção generalizada deste
tipo de tecnologias.
Esta tese versa sobre os desafios associados à integração da IoT na Internet e dos aspetos de
segurança da IoT. Relativamente à integração da IoT na Internet o problema é como fornecer
informação válida aos dispositivos ligados à Internet, independentemente da versão do protocolo
IP em uso, evitando o acesso direto aos dispositivos IoT. Para a resolução deste problema foram
propostas e avaliadas soluções baseadas em web services REST e em mecanismos de transição
IPv4 para IPv6 do tipo pilha dupla (dual stack). O web service e o mecanismo de transição são
suportados apenas no router de fronteira, sem penalizar os dispositivos IoT. No que concerne
à segurança, o problema é mitigar os efeitos dos ataques de segurança internos e externos
iniciados local e remotamente. Foram propostas três soluções diferentes, a primeira é um
mecanismo que minimiza os efeitos dos ataques de negação de serviço com origem na Internet e
que evita o uso de mecanismos de firewalls ineficientes e de gestĂŁo complexa. Este mecanismo
filtra no router de fronteira o tráfego com origem na Internet é destinado à IoT de acordo
com as condições anunciadas por cada um dos dispositivos IoT da rede. A segunda solução,
Ă© uma framework de network admission control que controla quais os dispositivos que podem
aceder Ă rede com base na autorização administrativa e que aplica polĂticas de conformidade
relativas à segurança aos dispositivos autorizados. A terceira é um mecanismo de network
admission control para redes 6LoWPAN que evita que dispositivos nĂŁo autorizados comuniquem
com outros dispositivos legĂtimos e com a Internet o que reduz drasticamente o nĂşmero de
ataques à segurança. Este mecanismo também foi explorado como um mecanismo de gestão uma
vez que pode ser utilizado a dimensĂŁo da rede quanto ao nĂşmero de dispositivos, tornando-a
mais fácil de gerir e aumentando a sua fiabilidade e o seu tempo de vida
Contribution to the integration, performance improvement, and smart management of data and resources in the Internet of Things
[SPA] Esta tesis doctoral se presenta bajo la modalidad de compendio de publicaciones.[ENG] This doctoral dissertation has been presented in the form of thesis by publication. The IoT has seen a tremendous growth in the last few years. Not only due to its potential to transform societies, but also as an enabling technology for many other technological advances. Unfortunately, the IoT is a relatively recent paradigm that lacks the maturity of other well-established (not so recent) revolutions like the internet itself or Wireless Sensor Networks; upon which the IoT is built. The presented Thesis contributes to this maturation process by researching on the underlying communication mechanisms that enable a truly ubiquitous and effective IoT. As a Thesis by compilation, 5 relevant articles are introduced and discussed. Each of such articles delve into different key aspects that, in their own way, help closing the gap between what the IoT is expected to bring and what the IoT actually brings. As thoroughly commented throughout the main text, the comprehensive approach taken in this Thesis ensures that multiple angles of the same plane --the communication plane-- are analyzed and studied. From the mathematical analysis of how electromagnetic waves propagate through complex environments to the utilization of recent Machine Learning techniques, this Thesis explore a wide range of scientific and researching tools that are shown to improve the final performance of the IoT. In the first three chapters of this document, the reader will be introduced to the current context and state-of-the-art of the IoT while, at the same time, the formal objectives of this Thesis are outlined and set into such a global context. In the next five chapters, the five corresponding articles are presented and commented. For each and every of these articles: a brief abstract, a methodology summary, a highlight on the results and contributions and final conclusions are also added. Lastly, in the two last chapters, the final conclusions and future lines of this Thesis are commented.Los artĂculos que componen la tesis son los siguientes: 1. R. M. Sandoval, A.-J. J. Garcia-Sanchez, F. Garcia-Sanchez, and J. Garcia-Haro, \Evaluating the More Suitable ISM Frequency Band for IoT-Based Smart Grids: A Quantitative Study of 915 MHz vs. 2400 MHz," Sensors, vol. 17, no. 1, p. 76, Dec. 2016. 2. R. M. Sandoval, A.-J. J. Garcia-Sanchez, J.-M. M. Molina-Garcia-Pardo, F. Garcia-Sanchez, and J. Garcia-Haro, \Radio-Channel Characterization of Smart Grid Substations in the 2.4-GHz ISM Band," IEEE Trans. Wirel. Commun., vol. 16, no. 2, pp. 1294{1307, Feb. 2017. 3. R. M. Sandoval, A. J. Garcia-Sanchez, and J. Garcia-Haro, \Improving RSSI-based path-loss models accuracy for critical infrastructures: A smart grid substation case-study," IEEE Trans. Ind. Informatics, vol. 14, no. 5, pp. 2230{2240, 2018. 4. R. M. Sandoval, A.-J. Garcia-Sanchez, J. Garcia-Haro, and T. M. Chen, \Optimal policy derivation for Transmission Duty-Cycle constrained LPWAN," IEEE Internet Things J., vol. 5, no. 4, pp. 1{1, Aug. 2018. 5. R. M. Sandoval, S. Canovas-Carrasco, A. Garcia-Sanchez, and J. Garcia-Haro, \Smart Usage of Multiple RAT in IoT-oriented 5G Networks: A Reinforcement Learning Approach," in 2018 ITU Kaleidoscope: Machine Learning for a 5G Future (ITU K), 2018, pp. 1-8.Escuela Internacional de Doctorado de la Universidad PolitĂ©cnica de CartagenaUniversidad PolitĂ©cnica de CartagenaPrograma de Doctorado en TecnologĂas de la InformaciĂłn y las Comunicaciones por la Universidad PolitĂ©cnica de Cartagen
Building the Future Internet through FIRE
The Internet as we know it today is the result of a continuous activity for improving network communications, end user services, computational processes and also information technology infrastructures. The Internet has become a critical infrastructure for the human-being by offering complex networking services and end-user applications that all together have transformed all aspects, mainly economical, of our lives. Recently, with the advent of new paradigms and the progress in wireless technology, sensor networks and information systems and also the inexorable shift towards everything connected paradigm, first as known as the Internet of Things and lately envisioning into the Internet of Everything, a data-driven society has been created. In a data-driven society, productivity, knowledge, and experience are dependent on increasingly open, dynamic, interdependent and complex Internet services. The challenge for the Internet of the Future design is to build robust enabling technologies, implement and deploy adaptive systems, to create business opportunities considering increasing uncertainties and emergent systemic behaviors where humans and machines seamlessly cooperate
Test and evaluation of a prototyped sensor-camera network for persistent intelligence, surveillance, and reconnaissance in support of tactical coalition networking environments
This thesis investigated the feasibility of deploying an integrated sensor-camera network in military and law enforcement applications. The system was built using entirely commercial-off-the-shelf technologies. The prototype used the unattended ground sensors combined with digital video surveillance cameras to provide accurate real-time situational awareness, persistent intelligence and remote security. A robust testing and evaluation plan was created to measure the system's performance based on specific metrics. The tests focused primarily on the capabilities of the sensor aspect of the network. Tests were conducted to determine the maximum detection range, probabilities of detection, maximum communications range, and battery life. Mathematical models were created to assist network planners. Additionally, the prototyped system was tested through field exercises as part of the Naval Postgraduate School's Coalition Operating Area Surveillance and Targeting System field demonstrations in California and northern Thailand. Although the sensing capabilities exceeded the minimum metrics, the system was not suitable for use in military applications. However, the prototyped network would work well in less demanding law enforcement environments. Additionally, the feasibility and the need to develop an integrated sensor-camera network were demonstrated.http://archive.org/details/testndevaluation109452780US Navy (USN) author.Approved for public release; distribution is unlimited
Connected Vehicles: Solutions and Challenges
Abstract-Providing various wireless connectivities for vehicles enables the communication between vehicles and their internal and external environments. Such a connected vehicle solution is expected to be the next frontier for automotive revolution and the key to the evolution to next generation intelligent transportation systems (ITSs). Moreover, connected vehicles are also the building blocks of emerging Internet of Vehicles (IoV). Extensive research activities and numerous industrial initiatives have paved the way for the coming era of connected vehicles. In this paper, we focus on wireless technologies and potential challenges to provide vehicle-to-x connectivity. In particular, we discuss the challenges and review the state-of-the-art wireless solutions for vehicle-to-sensor, vehicleto-vehicle, vehicle-to-Internet, and vehicle-to-road infrastructure connectivities. We also identify future research issues for building connected vehicles
- …