35 research outputs found

    Design and implementation of multicast listener discovery protocol on constrained devices

    Get PDF
    Para la aplicación y apoyo del uso de IPv6 en 6LoWPANs (Low-power Wireless Personal Area Networks), ha habido numerosas investigaciones y se han desarrollado protocolos y mecanismos estandarizados. Sin embargo para la comunicación multicast en estas redes, el tema esta aún bastante abierto a la investigación. La comunicación multicast permite conectar routers con hosts preseleccionados por grupos. La comunicación multicast es muy beneficiosa para aplicaciones con dispositivos con recursos limitados ya que ahorra energía y ancho de banda. A continuación mostramos posibles ejemplos de estas aplicaciones, la iluminación de un edificio organizada por plantas, una red de sensores de temperatura organizados por áreas y un largo número de aplicaciones basadas en la comunicación de un punto a varios puntos preseleccionados. El grupo de investigación de la universidad de Aalto (Finlandia) llamado MAMMoTH (Massive Scale Machine-to-Machine Service) tiene como uno de sus objetivos construir un protocolo multicast para dispositivos con recursos limitados. Para el desarrollo de este protocolo, es necesario un protocolo de encaminamiento multicast y un protocolo de gestión de grupos multicast. Este último, es el protocolo que he desarrollado como “research assistant” para mi proyecto final de carrera. En este proyecto final de carrera, se ha diseñado, implementado y evaluado el protocolo MLD para dispositivos con recursos limitados. MLD permite a un router IPv6 gestionar grupos multicast. No obstante, el uso de MLD en LoWPANs tiene varios problemas como la definición del area local, el tamaño de los paquete y la complejidad del comportamiento del router. El protocolo ha sido implementado en Contiki, un sistema operativo para desarrollar para el “Internet of Things”. Contiki permite conectar sistemas pequeños de poco coste con poca potencia a Internet. Hemos ampliado la pila TCP/IP de Contiki para respaldar MLD. El protocolo ha sido evaluado y analizado sobre un simulador en diferentes topologías para validar el funcionamiento. Del mismo modo, también se ha verificado que el tamaño del objeto creado no ocupaba más memoria de la disponible en los dispositivos Z1 Zolertia

    A Real-Time Positioning System of Manufacturing Carriers Deploying Wireless MEMS Accelerometers and Gyroscopes

    Get PDF
    Modern manufacturing systems face ever-increasing pressure to maximize efficiency of production processes, minimize downtime due to unexpected deviations from normal operation, and maintain agility in dynamic market conditions. Detailed, real-time asset tracking is essential for achieving these goals. Pallets are widely-used for transporting raw materials, intermediate products, and final products in automated assembly and manufacturing lines. A sophisticated pallet monitoring system can provide possibilities for optimizing pallet routing in real time, enable dynamic scheduling changes, and historical traceability required for error diagnosis and repair. Traditionally, pallets are monitored by networks of sensors, such as RFID readers or proximity sensors to collect location data. These sensor networks are rarely dense enough to provide precise continuous data about pallet location. Real-time pallet tracking data is thus limited to recording timestamps at static checkpoints. This thesis presents an asset-aware management tool for continuous pallet location monitoring based on event logs obtained from intelligent wireless devices embedded in each pallet. Each wireless device, equipped with a 3-axis accelerometer and a 3-axis gyroscope, provides accurate information about pallet movement. The raw sensor data is pre-processed into an event stream, which is sent to a server over a 6LoWPAN network. The software developed in this research implements an algorithm for processing event logs to determine exact pallet location using artificial intelligence techniques. Calculated pallet position can be provided to high-level enterprise systems, and to manufacturing execution systems for use in scheduling, routing, and visualization of the production line. Designing the SCADA system was also part of this thesis. The solution was successfully deployed in the FASTory, a 12-cell light assembly line in the Factory Automation Systems and Technologies Laboratory (FAST-lab.) at Tampere University of Technology, as part of eSONIA, a European Commission-cofunded research project on using service-enabled embedded devices for realizing an asset-aware, self-recovering plant. The proposed solution demonstrates a novel approach for continuous, real-time pallet location tracking based on wireless sensors

    Wireless communication technologies for the Internet of Things

    Get PDF
    Internet of Things (IoT) is the inter-networking paradigm based on many processes such as identifying, sensing, networking and computation. An IoT technology stack provides seamless connectivity between various physical and virtual objects. The increasing number of IoT applications leads to the issue of transmitting, storing, and processing a large amount of data. Therefore, it is necessary to enable a system capable to handle the growing traffic requirements with the required level of QoS (Quality of Service). IoT devices become more complex due to the various components such as sensors and network interfaces. The IoT environment is often demanding for mobile power source, QoS, mobility, reliability, security, and other requirements. Therefore, new IoT technologies are required to overcome some of these issues. In recent years new wireless communication technologies are being developed to support the development of new IoT applications. This paper provides an overview of some of the most widely used wireless communication technologies used for IoT applications

    Experimental study of 6LoPLC for home energy management systems

    Get PDF
    © 2016 by the authors. Ubiquitous connectivity is already transforming residential dwellings into smart homes. As citizens continue to embrace the smart home paradigm, a new generation of low-rate and low-power communication systems is required to leverage the mass market presented by energy management in homes. Although Power Line Communication (PLC) technology has evolved in the last decade, the adaptation of PLC for constrained networks is not fully charted. By adapting some features of IEEE 802.15.4 and IPv6 over Low-power Wireless Personal Area Network (6LoWPAN) into power lines, this paper demonstrates a low-rate, low-power PLC system over the IPv6 network (referred to as 6LoPLC), for Home Energy Management System (HEMS) applications. The overall idea is to provide a framework for assessing various scenarios that cannot be easily investigated with the limited number of evaluation hardware available. In this respect, a network model is developed in NS-3 (Version 21) to measure several important characteristics of the designed system and then validated with experimental results obtained using the Hanadu evaluation kits. Following the good agreement between the two, the NS-3 model is utilised to investigate more complex scenarios and various use-cases, such as the effects of impulsive noise, the number of nodes and packet size on the latency and Bit Error Rate (BER) performances. We further demonstrate that for different network and application configurations, optimal data sizes exist. For instance, the results reveal that in order to guarantee 99% system reliability, the HEMS application data must not exceed 64 bytes. Finally, it is shown that with impulsive noise in a HEMS network comprising 50 appliances, provided the size of the payload does not exceed 64 bytes, monitoring and control applications incur a maximum latency of 238.117 ms and 248.959 ms, respectively; both of which are within acceptable limits

    Development of a multicast routing protocol for low power and lossy networks

    Get PDF
    The Internet of things (IoT) is a new paradigm that has been gaining popularity in recent years. As the name "Internet of things" suggests, things surrounding us will be able to interact with each other and also connect to the Internet, thus forming a worldwide network of connected objects. The number of potential applications of this concept is huge and indudes various domains such as home environment, transportation, healthcare and so on. To enable the Internet of things, different technologies and standards have been proposed. Among them, the IP for Smart Objects (IPSO) alliance promotes the use of Internet Protocol (IP) as the network technology for IoT. The Internet Engineering Task Force (IETF), as part of its IoT related activities, has been working on using IPv6 to connect devices in low power wireless personal area networks (LoWPANs). The devices operating in LoWPANs are constrained on resources such as memory, processing power and sometimes energy (in case, they are operating on battery). Hence protocols designed for such networks have to consider the limitations of the devices. There has been considerable research done to design protocols that enable and support IPv6 in LoWPANs. However, there is not much effort in the area of multicast communication. There are various scenarios where efficient multicast communication would be beneficial. For example, consider a group of lights in a room that can be controlled by an actuator. In such scenarios, well designed multicast protocols would be useful in saving resources of the nodes. In this thesis, we design and implement a multicast routing protocol for low power and lossy networks. The protocol is implemented on Contiki OS, an operating system developed for the Internet of things. In addition, we test this protocol using Cooja, a cross-layer simulator developed for Contiki OS

    Actas da 10ª Conferência sobre Redes de Computadores

    Get PDF
    Universidade do MinhoCCTCCentro AlgoritmiCisco SystemsIEEE Portugal Sectio

    A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology

    Get PDF
    International audienceMobility has the advantage of enlarging WSN applications. However, proposing a mobility support protocol in Wireless Sensor Networks (WSNs) represents a significant challenge. In this paper, we propose a survey on the mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology. This technology enables to connect IP sensor devices to other IP networks without any need for gateways. We highlight the advantages and drawbacks with performances issues of each studied solution. Then, in order to select a typical classification of mobility management protocols in WSNs, we provide some classification criteria and approaches on which these protocols are based. Finally, we present a comparative study of the existing protocols in terms of the required performances for this network type

    Routing and Mobility on IPv6 over LoWPAN

    Get PDF
    The IoT means a world-wide network of interconnected objects based on standard communication protocols. An object in this context is a quotidian physical device augmented with sensing/actuating, processing, storing and communication capabilities. These objects must be able to interact with the surrounding environment where they are placed and to cooperate with neighbouring objects in order to accomplish a common objective. The IoT objects have also the capabilities of converting the sensed data into automated instructions and communicating them to other objects through the communication networks, avoiding the human intervention in several tasks. Most of IoT deployments are based on small devices with restricted computational resources and energy constraints. For this reason, initially the scientific community did not consider the use of IP protocol suite in this scenarios because there was the perception that it was too heavy to the available resources on such devices. Meanwhile, the scientific community and the industry started to rethink about the use of IP protocol suite in all IoT devices and now it is considered as the solution to provide connectivity between the IoT devices, independently of the Layer 2 protocol in use, and to connect them to the Internet. Despite the use of IP suite protocol in all devices and the amount of solutions proposed, many open issues remain unsolved in order to reach a seamless integration between the IoT and the Internet and to provide the conditions to IoT service widespread. This thesis addressed the challenges associated with the interconnectivity between the Internet and the IoT devices and with the security aspects of the IoT. In the interconnectivity between the IoT devices and the Internet the problem is how to provide valuable information to the Internet connected devices, independently of the supported IP protocol version, without being necessary accessed directly to the IoT nodes. In order to solve this problem, solutions based on Representational state transfer (REST) web services and IPv4 to IPv6 dual stack transition mechanism were proposed and evaluated. The REST web service and the transition mechanism runs only at the border router without penalizing the IoT constrained devices. The mitigation of the effects of internal and external security attacks minimizing the overhead imposed on the IoT devices is the security challenge addressed in this thesis. Three different solutions were proposed. The first is a mechanism to prevent remotely initiated transport level Denial of Service attacks that avoids the use of inefficient and hard to manage traditional firewalls. It is based on filtering at the border router the traffic received from the Internet and destined to the IoT network according to the conditions announced by each IoT device. The second is a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. The third is a network admission control framework that prevents IoT unauthorized nodes to communicate with IoT authorized nodes or with the Internet, which drastically reduces the number of possible security attacks. The network admission control was also exploited as a management mechanism as it can be used to manage the network size in terms of number of nodes, making the network more manageable, increasing its reliability and extending its lifetime.A IoT (Internet of Things) tem suscitado o interesse tanto da comunidade académica como da indústria, uma vez que os campos de aplicação são inúmeros assim como os potenciais ganhos que podem ser obtidos através do uso deste tipo de tecnologia. A IoT significa uma rede global de objetos ligados entre si através de uma rede de comunicações baseada em protocolos standard. Neste contexto, um objeto é um objeto físico do dia a dia ao qual foi adicionada a capacidade de medir e de atuar sobre variáveis físicas, de processar e armazenar dados e de comunicar. Estes objetos têm a capacidade de interagir com o meio ambiente envolvente e de cooperar com outros objetos vizinhos de forma a atingirem um objetivo comum. Estes objetos também têm a capacidade de converter os dados lidos em instruções e de as comunicar a outros objetos através da rede de comunicações, evitando desta forma a intervenção humana em diversas tarefas. A maior parte das concretizações de sistemas IoT são baseados em pequenos dispositivos autónomos com restrições ao nível dos recursos computacionais e de retenção de energia. Por esta razão, inicialmente a comunidade científica não considerou adequado o uso da pilha protocolar IP neste tipo de dispositivos, uma vez que havia a perceção de que era muito pesada para os recursos computacionais disponíveis. Entretanto, a comunidade científica e a indústria retomaram a discussão acerca dos benefícios do uso da pilha protocolar em todos os dispositivos da IoT e atualmente é considerada a solução para estabelecer a conetividade entre os dispositivos IoT independentemente do protocolo da camada dois em uso e para os ligar à Internet. Apesar do uso da pilha protocolar IP em todos os dispositivos e da quantidade de soluções propostas, são vários os problemas por resolver no que concerne à integração contínua e sem interrupções da IoT na Internet e de criar as condições para a adoção generalizada deste tipo de tecnologias. Esta tese versa sobre os desafios associados à integração da IoT na Internet e dos aspetos de segurança da IoT. Relativamente à integração da IoT na Internet o problema é como fornecer informação válida aos dispositivos ligados à Internet, independentemente da versão do protocolo IP em uso, evitando o acesso direto aos dispositivos IoT. Para a resolução deste problema foram propostas e avaliadas soluções baseadas em web services REST e em mecanismos de transição IPv4 para IPv6 do tipo pilha dupla (dual stack). O web service e o mecanismo de transição são suportados apenas no router de fronteira, sem penalizar os dispositivos IoT. No que concerne à segurança, o problema é mitigar os efeitos dos ataques de segurança internos e externos iniciados local e remotamente. Foram propostas três soluções diferentes, a primeira é um mecanismo que minimiza os efeitos dos ataques de negação de serviço com origem na Internet e que evita o uso de mecanismos de firewalls ineficientes e de gestão complexa. Este mecanismo filtra no router de fronteira o tráfego com origem na Internet é destinado à IoT de acordo com as condições anunciadas por cada um dos dispositivos IoT da rede. A segunda solução, é uma framework de network admission control que controla quais os dispositivos que podem aceder à rede com base na autorização administrativa e que aplica políticas de conformidade relativas à segurança aos dispositivos autorizados. A terceira é um mecanismo de network admission control para redes 6LoWPAN que evita que dispositivos não autorizados comuniquem com outros dispositivos legítimos e com a Internet o que reduz drasticamente o número de ataques à segurança. Este mecanismo também foi explorado como um mecanismo de gestão uma vez que pode ser utilizado a dimensão da rede quanto ao número de dispositivos, tornando-a mais fácil de gerir e aumentando a sua fiabilidade e o seu tempo de vida
    corecore