311 research outputs found

    IoT on Shared Vehicles

    Get PDF
    Nowadays the need of people to have the power to control everything is increasing. Due to the technological evolution together with the Internet of things, this is already possible. In this context, the shared vehicles are a good example. With just one click people can use a vehicle from a vehicle sharing eet anywhere, anytime. During the realization of this project the uMDC was developed. It is a small device capable of managing and controlling di erent types of vehicles, with the main focus being the electric bicycles. As a nal conclusion of the project, the results obtained with the uMDC have proved very attractive. During its integration in the electric bicycles, the system was capable of controlling the bicycle's di erent components, as required for the rst prototype.Hoje em dia, a necessidade das pessoas terem controlo sobre tudo está a aumentar. Devido á evolução tecnológica juntamente com a Internet das coisas, isso já é possível. Neste contexto, os veículos partilhados são um bom exemplo disso. Com um simples clique, as pessoas podem usufruir e uma viatura de uma frota de veículos partilhados em qualquer lugar, a qualquer hora. Durante a realização deste projeto, foi desenvolvido o uMDC. Um pequeno ispositivo capaz de gerir e controlar diferentes tipos de veículos, sendo o foco principal as bicicletas elétricas. No nal deste projeto, os resultados obtidos com o uMDC foram bastante satisfatórios. Durante a sua integração nas bicicletas elétricas, o sistema foi capaz de controlar diferentes componentes das mesmas, como requerido para primeiro protótipo

    Decentralized Identity and Access Management Framework for Internet of Things Devices

    Get PDF
    The emerging Internet of Things (IoT) domain is about connecting people and devices and systems together via sensors and actuators, to collect meaningful information from the devices surrounding environment and take actions to enhance productivity and efficiency. The proliferation of IoT devices from around few billion devices today to over 25 billion in the next few years spanning over heterogeneous networks defines a new paradigm shift for many industrial and smart connectivity applications. The existing IoT networks faces a number of operational challenges linked to devices management and the capability of devices’ mutual authentication and authorization. While significant progress has been made in adopting existing connectivity and management frameworks, most of these frameworks are designed to work for unconstrained devices connected in centralized networks. On the other hand, IoT devices are constrained devices with tendency to work and operate in decentralized and peer-to-peer arrangement. This tendency towards peer-to-peer service exchange resulted that many of the existing frameworks fails to address the main challenges faced by the need to offer ownership of devices and the generated data to the actual users. Moreover, the diversified list of devices and offered services impose that more granular access control mechanisms are required to limit the exposure of the devices to external threats and provide finer access control policies under control of the device owner without the need for a middleman. This work addresses these challenges by utilizing the concepts of decentralization introduced in Distributed Ledger (DLT) technologies and capability of automating business flows through smart contracts. The proposed work utilizes the concepts of decentralized identifiers (DIDs) for establishing a decentralized devices identity management framework and exploits Blockchain tokenization through both fungible and non-fungible tokens (NFTs) to build a self-controlled and self-contained access control policy based on capability-based access control model (CapBAC). The defined framework provides a layered approach that builds on identity management as the foundation to enable authentication and authorization processes and establish a mechanism for accounting through the adoption of standardized DLT tokenization structure. The proposed framework is demonstrated through implementing a number of use cases that addresses issues related identity management in industries that suffer losses in billions of dollars due to counterfeiting and lack of global and immutable identity records. The framework extension to support applications for building verifiable data paths in the application layer were addressed through two simple examples. The system has been analyzed in the case of issuing authorization tokens where it is expected that DLT consensus mechanisms will introduce major performance hurdles. A proof of concept emulating establishing concurrent connections to a single device presented no timed-out requests at 200 concurrent connections and a rise in the timed-out requests ratio to 5% at 600 connections. The analysis showed also that a considerable overhead in the data link budget of 10.4% is recorded due to the use of self-contained policy token which is a trade-off between building self-contained access tokens with no middleman and link cost

    USING BLOCKCHAIN TO SUPPORT PROVENANCE IN THE INTERNET OF THINGS

    Get PDF
    The Internet of Things (IoT) has gained traction in all sectors and pervades all spheres of our lives. With statistics projecting an increase in the number of devices by 87% as well as increase in security concerns, traceability within this IoT will become a major problem. As more devices communicate with each other via the Internet, it will be crucial to determine the origins of requests and responses. Being able to store records related to the life cycle of requests and responses in an immutable form will provide documentary evidence that will help to establish transparency and accountability within the IoT. Previous works employed provenance techniques to address this problem but focuses on the request perspective. However, little or nothing has been done regarding the response perspective. Consequently, this thesis proposes and develops a blockchain-based provenance system to trace bi-directionally the sources of requests and responses in the IoT. This is achieved through the investigation of historical communication records. Furthermore, a performance evaluation of the system is provided. The results show that the developed system is scalable under real-world setting

    Raamistik mobiilsete asjade veebile

    Get PDF
    Internet on oma arengus läbi aastate jõudnud järgmisse evolutsioonietappi - asjade internetti (ingl Internet of Things, lüh IoT). IoT ei tähista ühtainsat tehnoloogiat, see võimaldab eri seadmeil - arvutid, mobiiltelefonid, autod, kodumasinad, loomad, virtuaalsensorid, jne - omavahel üle Interneti suhelda, vajamata seejuures pidevat inimesepoolset seadistamist ja juhtimist. Mobiilseadmetest nagu näiteks nutitelefon ja tahvelarvuti on saanud meie igapäevased kaaslased ning oma mitmekülgse võimekusega on nad motiveerinud teadustegevust mobiilse IoT vallas. Nutitelefonid kätkevad endas võimekaid protsessoreid ja 3G/4G tehnoloogiatel põhinevaid internetiühendusi. Kuid kui kasutada seadmeid järjepanu täisvõimekusel, tühjeneb mobiili aku kiirelt. Doktoritöö esitleb energiasäästlikku, kergekaalulist mobiilsete veebiteenuste raamistikku anduriandmete kogumiseks, kasutades kergemaid, energiasäästlikumaid suhtlustprotokolle, mis on IoT keskkonnale sobilikumad. Doktoritöö käsitleb põhjalikult energia kokkuhoidu mobiilteenuste majutamisel. Töö käigus loodud raamistikud on kontseptsiooni tõestamiseks katsetatud mitmetes juhtumiuuringutes päris seadmetega.The Internet has evolved, over the years, from just being the Internet to become the Internet of Things (IoT), the next step in its evolution. IoT is not a single technology and it enables about everything from computers, mobile phones, cars, appliances, animals, virtual sensors, etc. that connect and interact with each other over the Internet to function free from human interaction. Mobile devices like the Smartphone and tablet PC have now become essential to everyday life and with extended capabilities have motivated research related to the mobile Internet of Things. Although, the recently developed Smartphones enjoy the high performance and high speed 3G/4G mobile Internet data transmission services, such high speed performances quickly drain the battery power of the mobile device. This thesis presents an energy efficient lightweight mobile Web service provisioning framework for mobile sensing utilizing the protocols that were designed for the constrained IoT environment. Lightweight protocols provide an energy efficient way of communication. Finally, this thesis highlights the energy conservation of the mobile Web service provisioning, the developed framework, extensively. Several case studies with the use of the proposed framework were implemented on real devices and has been thoroughly tested as a proof-of-concept.https://www.ester.ee/record=b522498

    Intelligent Personal Assistants Solutions in Ubiquitous Environments in the Context of Internet of Things

    Get PDF
    Internet of Things (IoT) will create the opportunity to develop new types of businesses. Every tangible object, biologic or not, will be identified by a unique address, creating a common network composed by billions of devices. Those devices will have different requirements, creating the necessity of finding new mechanisms to satisfy the needs of all the entities within the network. This is one of the main problems that all the scientific community should address in order to make Internet of Things the Future Internet. Currently, IoT is used in a lot of projects involving Wireless Sensor Networks (WSNs). Sensors are generally cheap and small devices able to generate useful information from physical indicators. They can be used on smart home scenarios, or even on healthcare environments, turning sensors into useful devices to accomplish the goals of many use case scenarios. Sensors and other devices with some reasoning capabilities, like smart objects, can be used to create smart environments. The interaction between the objects in those scenarios and humans can be eased by the inclusion of Intelligent Personal Assistants (IPAs). Currently, IPAs have good reasoning capabilities, improving the assistance they give to their owners. Artificial intelligence (AI), new learning mechanisms, and the evolution assisted in speech technology also contributed to this improvement. The integration of IPAs in IoT scenarios can become a case of great success. IPAs will comprehend the behavior of their owners not only through direct interactions, but also by the interactions they have with other objects in the environment. This may create ubiquitous communication scenarios where humans act as passive elements, being adequately informed of all the aspects of interest that surrounds them. The communication between IPAs and other objects in their surrounding environment may use gateways for traffic forwarding. On ubiquitous environments devices can be mobile or static. For example, in smart home scenarios, objects are generally static, being always on the same position. In mobile health scenarios, objects can move from one place to another. To turn IPAs useful on all types of environments, static and mobile gateways should be developed. On this dissertation, a novel mobile gateway solution for an IPA platform inserted on an IoT context is proposed. A mobile health scenario was chosen. Then, a Body Sensor Network (BSN) is always monitoring a person, giving the real time feedback of his/her health status to another person responsible by him (designated caretaker). On this scenario, a mobile gateway is needed to forward the traffic between the BSN and the IPA of the caretaker. Therefore, the IPA is able to give warnings about the health status of the person under monitoring, in real time. The proposed system is evaluated, demonstrated, and validated through a prototype, where the more important aspects for IPAs and IoT networks are considered

    A Study on Sanctuary and Seclusion Issues in Internet-of-Things

    Get PDF
    Internet-of-Things (IoT) are everywhere in our daily life. They are used in our homes, in hospitals, deployed outside to control and report the changes in environment, prevent fires, and many more beneficial functionality. However, all those benefits can come of huge risks of seclusion loss and sanctuary issues. To secure the IoT devices, many research works have been con-ducted to countermeasure those problems and find a better way to eliminate those risks, or at least minimize their effects on the user�s seclusion and sanctuary requirements. The study consists of four segments. The first segment will explore the most relevant limitations of IoT devices and their solutions. The second one will present the classification of IoT attacks. The next segment will focus on the mechanisms and architectures for authentication and access control. The last segment will analyze the sanctuary issues in different layers

    Tools and Technologies for the Development of Cyber-Physical Systems

    Get PDF
    Smart grid is a new revolution in the energy sector in which the aging utility grid will be replaced with a grid that supports two-way communication between customers and the utility company. There are two popular smart-grid reference architectures. NIST (National Institute for Standards and Technology) has drafted a reference architecture in which seven domains and actors have been identified. The second reference architecture is elaborated by ETSI (European Telecommunications Standards Institute), which is an extension of the NIST model where a new domain named distributed energy resources has been added. This chapter aims at identifying the use of IoT and IoT-enabled technologies in the design of a secure smart grid using the ETSI reference model. Based on the discussion and analysis in the chapter, the authors offer two collaborative and development frameworks. One framework draws parallels' between IoT and smart grids and the second one between smart grids and edge computing. These frameworks can be used to broaden collaboration between the stakeholders and identify research gaps. </p

    A role-based software architecture to support mobile service computing in IoT scenarios

    Get PDF
    The interaction among components of an IoT-based system usually requires using low latency or real time for message delivery, depending on the application needs and the quality of the communication links among the components. Moreover, in some cases, this interaction should consider the use of communication links with poor or uncertain Quality of Service (QoS). Research efforts in communication support for IoT scenarios have overlooked the challenge of providing real-time interaction support in unstable links, making these systems use dedicated networks that are expensive and usually limited in terms of physical coverage and robustness. This paper presents an alternative to address such a communication challenge, through the use of a model that allows soft real-time interaction among components of an IoT-based system. The behavior of the proposed model was validated using state machine theory, opening an opportunity to explore a whole new branch of smart distributed solutions and to extend the state-of-the-art and the-state-of-the-practice in this particular IoT study scenario.Peer ReviewedPostprint (published version
    corecore