337 research outputs found

    The support of multipath routing in IPv6-based internet of things

    Get PDF
    The development of IPv6-based network architectures for Internet of Things (IoT) systems is a feasible approach to widen the horizon for more effective applications, but remains a challenge. Network routing needs to be effectively addressed in such environments of scarce computational and energy resources. The Internet Engineering Task Force (IETF) specified the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to provide a basic IPv6-based routing framework for IoT networks. However, the RPL design has the potential of extending its functionality to a further limit and incorporating the support of advanced routing mechanisms. These include multipath routing which has opened the doors for great improvements towards efficient energy balancing, load distribution, and even more. This paper fulfilled a need for an effective review of recent advancements in Internet of Things (IoT) networking. In particular, it presented an effective review and provided a taxonomy of the different multipath routing solutions enhancing the RPL protocol. The aim was to discover its current state and outline the importance of integrating such a mechanism into RPL to revive its potentiality to a wider range of IoT applications. This paper also discussed the latest research findings and provided some insights into plausible follow-up researches

    Stratégies d'ancêtre commun pour les réseaux RPL multi-chemins

    Get PDF
    National audienceThe IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) networks is designed for Internet of Things (IoT) networks to generate routes between devices with minimal processing. This protocol creates a DODAG (Destination Oriented Directed Acyclic Graph) network topology through the use of DODAG Information Object (DIO) control packets. The DODAG routes the data packets upstream to the destination device. In order to obtain a reliable network, we implement Packet Replication and Elimination (PRE) to perform multi-path data transmission via multiple parent devices. However, there is no standard way to select an alternative path. This document presents three types of Alternative Parent (AP) selection following a braided model. We focus on analyzing its performance in terms of delay and compromise between network traffic and reliability.Le protocole de routage IPv6 pour les réseaux à faible puissance et fort taux de pertes (RPL) est conçu pour les réseaux Internet des objets (IoT) afin de générer des itinéraires entre les appareils avec un traitement minimal. Ce protocole crée une topologie de réseau DODAG (Destination Oriented Directed Acyclic Graph) grâce à l'utilisation de paquets de contrôle DODAG Information Object (DIO). Le DODAG achemine les paquets de données en amont vers le périphérique de destination. Afin d'obtenir un réseau fiable, nous implémentons la réplication et l'élimination des paquets (PRE) pour effectuer une transmission de données à chemins multiples via plusieurs périphériques parents. Cependant, il n'existe aucun moyen standard de sélectionner un chemin alternatif. Ce document présente trois types de sélection de parent alternatif (AP) suivant un modèle triangulaire. Nous nous concentrons sur l'analyse de ses performances en termes de retard et de compromis entre trafic réseau et fiabilité

    ON-PATH DEPLOYMENT OF CONTAINERS FOR LOW-LATENCY HIGH-AVAILABILITY RELIABLE AND AVAILABLE WIRELESS (RAW) COMMUNICATION

    Get PDF
    In an industrial environment, a manufacturing plant is composed of, among other things, sensors, actuators, and controllers that form control loops. Such elements are often referred to as a programmable logic controller (PLC). Techniques are presented herein that allow manufacturing plants to achieve decreased latency and increased reliability by placing the PLCs in a sensor-controller-actuator system closer to each other while minimizing the deployment cost to the extent possible. This is achieved by deploying PLCs as moving containers in an access point (AP) for, as an example, wireless manufacturing plants. Aspects of the presented techniques dynamically deploy PLC applications and roam them in locations such that the number of hops between a sensor’s output, the control logic (e.g., a PLC), and an actuator’s input may be kept at a minimum to achieve the lowest latency and jitter and the maximum reliability. Further aspects of the presented techniques leverage elements of the Internet Engineering Task Force (IETF) Reliable and Available Wireless (RAW) initiative, a Path Computation Element (PCE), a Path Selection Engine (PSE), etc

    A dense neural network approach for detecting clone ID attacks on the RPL protocol of the IoT

    Get PDF
    At present, new data sharing technologies, such as those used in the Internet of Things (IoT) paradigm, are being extensively adopted. For this reason, intelligent security controls have become imperative. According to good practices and security information standards, particularly those regarding security in depth, several defensive layers are required to protect information assets. Within the context of IoT cyber-attacks, it is fundamental to continuously adapt new detection mechanisms for growing IoT threats, specifically for those becoming more sophisticated within mesh networks, such as identity theft and cloning. Therefore, current applications, such as Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and Security Information and Event Management Systems (SIEM), are becoming inadequate for accurately handling novel security incidents, due to their signature-based detection procedures using the matching and flagging of anomalous patterns. This project focuses on a seldom-investigated identity attack—the Clone ID attack—directed at the Routing Protocol for Low Power and Lossy Networks (RPL), the underlying technology for most IoT devices. Hence, a robust Artificial Intelligence-based protection framework is proposed, in order to tackle major identity impersonation attacks, which classical applications are prone to misidentifying. On this basis, unsupervised pre-training techniques are employed to select key characteristics from RPL network samples. Then, a Dense Neural Network (DNN) is trained to maximize deep feature engineering, with the aim of improving classification results to protect against malicious counterfeiting attempts

    Enhanced priority-based adaptive energy-aware mechanisms for wireless sensor networks

    Get PDF
    Wireless Sensor Networks (WSN) continues to find its use in our lives. However, research has shown that it has barely attained an optimal performance, particularly in the aspects of data heterogeneity, data prioritization, data routing, and energy efficiency, all of which affects its operational lifetime. The IEEE 802.15.4 protocol standard, which manages data forwarding across the Data Link Layer (DLL) does not address the impact of heterogeneous data and node Battery-Level (BL) which is an indicator for node battery life. Likewise, mechanisms proposed in the literature – TCP-CSMA/CA, QWL-RPL and SSRA have not proffered optimal solution as they encourage excessive computational overhead which results in shortened operational lifetime. These problems are inherited on the Network Layer (NL) where data routing is implemented. Mitigating these challenges, this research presents an Enhanced Priority-based Adaptive Energy-Aware Mechanisms (EPAEAM) for Wireless Sensor Networks. The first mechanism is the Optimized Backoff Mechanism for Prioritized Data (OBMPD) in Wireless Sensor Networks. This mechanism proposed the Class of Service Traffic Priority-based Medium Access Control (CSTP-MAC). The CSTP-MAC is implemented on the DLL. In this mechanism, unique backoff period expressions compute backoff periods according to the class and priority of the heterogeneous data. This approach improved network performances which enhanced network lifetime. The second mechanism is the Shortest Path Priority-Based Objective Function (SPPB-OF) for Wireless Sensor Networks. SPPB-OF is implemented across the NL. SPPB-OF implements a unique shortest path computation algorithm to generate energy-efficient shortest path between the source and destination nodes. The third mechanism is the Cross-Layer Energy-Efficient Priority-based Data Path (CL-EEPDP) for Wireless Sensor Networks. CL-EEPDP is implemented across the DLL and NL with considerations for node battery-level. A unique mathematical expression, Node Battery-Level Estimator (NBLE) is used to estimate the BL of neighbouring nodes. The knowledge of the BL together with the priority of data are used to decide an energy-efficient next-hop node. Benchmarking the EPAEAM with related mechanisms - TCP-CSMA/CA, QWL-RPL and SSRA, results show that EPAEAM achieved improved network performance with a packet delivery ratio (PDR) of 95.4%, and power-saving of 90.4%. In conclusion, the EPAEAM mechanism proved to be a viable energy-efficient solution for a multi-hop heterogeneous data WSN deployment with support for extended operational lifetime. The limitations and scope of these mechanisms are that their application is restricted to the data-link and network layers, moreover, only two classes of data are considered, that is; High Priority Data (HPD) and Low Priority Data (LPD)

    Kommunikation und Bildverarbeitung in der Automation

    Get PDF
    In diesem Open-Access-Tagungsband sind die besten Beiträge des 9. Jahreskolloquiums "Kommunikation in der Automation" (KommA 2018) und des 6. Jahreskolloquiums "Bildverarbeitung in der Automation" (BVAu 2018) enthalten. Die Kolloquien fanden am 20. und 21. November 2018 in der SmartFactoryOWL, einer gemeinsamen Einrichtung des Fraunhofer IOSB-INA und der Technischen Hochschule Ostwestfalen-Lippe statt. Die vorgestellten neuesten Forschungsergebnisse auf den Gebieten der industriellen Kommunikationstechnik und Bildverarbeitung erweitern den aktuellen Stand der Forschung und Technik. Die in den Beiträgen enthaltenen anschaulichen Beispiele aus dem Bereich der Automation setzen die Ergebnisse in den direkten Anwendungsbezug

    Service Embedding in IoT Networks

    Get PDF

    Recurrent Pregnancy Loss:immunological risk factors and immunomodulatory treatments

    Get PDF
    This PhD thesis aimed to explore the role of the immune system in recurrent pregnancy loss (RPL) pathogenesis and the effect of immunomodulatory treatments. The thesis contains four original research articles investigating the association between specific immune biomarkers and RPL and one randomized controlled trial protocol for an ongoing placebo-controlled trial that aims to examine the clinical and immunomodulatory effects of intravenous immunoglobulin combined with low-dose oral glucocorticoid treatment as well as the presence of immune biomarkers among women with RPL undergoing artificial reproductive technology treatment.The introduction includes a description of the epidemiology and etiology of RPL. Furthermore, a brief description of the current knowledge of the immunological role in normal pregnancy and the immune system aberrations found in patients with RPL is given. Finally, treatments recommended for patients with RPL and immunomodulatory treatments under investigation are presented

    The design and implementation of a relational programming system.

    Get PDF
    The declarative class of computer languages consists mainly of two paradigms - the logic and the functional. Much research has been devoted in recent years to the integration of the two with the aim of securing the advantages of both without retaining their disadvantages. To date this research has, arguably, been less fruitful than initially hoped. A large number of composite functional/logical languages have been proposed but have generally been marred by the lack of a firm, cohesive, mathematical basis. More recently new declarative paradigms, equational and constraint languages, have been advocated. These however do not fully encompass those features we perceive as being central to functional and logic languages. The crucial functional features are higher-order definitions, static polymorphic typing, applicative expressions and laziness. The crucial logic features are ability to reason about both functional and non-functional relationships and to handle computations involving search. This thesis advocates a new declarative paradigm which lies midway between functional and logic languages - the so-called relational paradigm. In a relationallanguage program and data alike are denoted by relations. All expressions are relations constructed from simpler expressions using operators which form a relational algebra. The impetus for use of relations in a declarative language comes from observations concerning their connection to functional and logic programming. Relations are mathematically more general than functions modelling non-functional as well as functional relationships. They also form the basis of many logic languages, for example, Prolog. This thesis proposes a new relational language based entirely on binary relations, named Drusilla. We demonstrate the functional and logic aspects of Drusilla. It retains the higher-order objects and polymorphism found in modern functional languages but handles non-determinism and models relationships between objects in the manner of a logic language with notion of algorithm being composed of logic and control elements. Different programming styles - functional, logic and relational- are illustrated. However, such expressive power does not come for free; it has associated with it a high cost of implementation. Two main techniques are used in the necessarily complex language interpreter. A type inference system checks programs to ensure they are meaningful and simultaneously performs automatic representation selection for relations. A symbolic manipulation system transforms programs to improve. efficiency of expressions and to increase the number of possible representations for relations while preserving program meaning
    • …
    corecore