3 research outputs found

    LoRa Enabled Smart Inverters for Microgrid Scenarios with Widespread Elements

    Get PDF
    The introduction of low-power wide-area networks (LPWANs) has changed the image of smart systems, due to their wide coverage and low-power characteristics. This category of communication technologies is the perfect candidate to be integrated into smart inverter control architectures for remote microgrid (MG) applications. LoRaWAN is one of the leading LPWAN technologies, with some appealing features such as ease of implementation and the possibility of creating private networks. This study is devoted to analyze and evaluate the aforementioned integration. Initially, the characteristics of different LPWAN technologies are introduced, followed by an in-depth analysis of LoRa and LoRaWAN. Next, the role of communication in MGs with widespread elements is explained. A point-by-point LoRa architecture is proposed to be implemented in the grid-feeding control structure of smart inverters. This architecture is experimentally evaluated in terms of latency analysis and externally generated power setpoint, following smart inverters in different LoRa settings. The results demonstrate the effectiveness of the proposed LoRa architecture, while the settings are optimally configured. Finally, a hybrid communication system is proposed that can be effectively implemented for remote residential MG management

    Firmware Development of a LoRaWAN Multi-Sensor Generic Node : an Industrial IoT Empirical Study

    Get PDF
    Connectivity is the defining property of the Internet of Things (IoT). Multiple technologies and techniques allow embedded devices to transmit and receive data. The intersection between connectivity demands, physical and environmental limitations is what triggers the use of a specific technology. Low Power Wide Area (LPWA) wireless communication technologies such as LoRa and LoRaWAN are showing practicality and ease of the use in the field of IoT. LoRa modulation ability to provide devices with longer communication ranges make it an attractive choice in multiple IoT use cases. The energy efficiency and scalability aspects of LoRaWAN protocol trigger the research curiosity around the challenges and opportunities of using the technology. In this study, we provide an extensive overview of the firmware development of an industrial LoRaWAN device. An empirical analysis of the device capabilities provides a deeper understanding of the technology potential and the possible areas of improvements. Energy-efficient firmware design practices are explored, analysed and implemented to provide a foundation for future developments in the field. Furthermore, we propose and evaluate a new LoRaWAN application design that explores over the air firmware configuration in runtime a novel micro update scheme. We devise a simple LoRaWAN energy estimation model and apply it to the proposed application. The same model is used to get an indication of LoRaWAN firmware updates over the air (FUOTA) practicality. The applied model highlighted useful energy optimisation techniques for an improved LoRaWAN firmware development

    Data privacy, security and trust in "consumer internet of things" assemblages and associated mobile applications in South Africa

    Get PDF
    The Internet of Things (IoT) brings with it opportunities and challenges. IoT technology makes it possible to connect all of a person’s devices to create a smart eco-system or assemblage. Various stakeholders share personal data with companies in the consumer IoT space for marketing, tracking and assessment of the IoT products. In a world where cybercriminals have increased enormously, people need to be aware of the advantages, and the risks that come with these technological advances. The purpose of this study was to explore the data privacy, security and trust issues faced by consumers of IoT in South Africa, to propose an integrated and holistic framework that promotes safer adoption of consumer Internet of Things (CIoT). The researcher explained the difference between Industrial IoT (IIoT) and consumer CIoT in the study and focused the research on the latter. This study utilized a qualitative narrative inquiry and Delphi technique to explore the challenges that come with CIoT assemblages and associated mobile applications in South Africa. The researcher’s original contribution was to develop a holistic framework that all stakeholders may use to protect consumers of IoT. The proposed framework addresses the challenges of CIoT from a legal, technical and social context viewpoint. The study looked at legal instruments around the world and compared them to the South African existing legal instruments. The researcher established that South Africa has various pieces of legislation such as the Protection of Personal Information Act 4 of 2013, the Consumer Protection Act 68 of 2008, the Electronic Communications Act 36 of 2005, and the Electronic Communications and Transactions Act 25 of 2002, that law enforcers may use to deal with the challenges IoT. However, the researcher ascertained that these laws do not necessarily address IoT specifically as they are; in fact, they are either outdated or fragmented. In addition to the background literature, the research sought expert opinions to address the technical viewpoints of the CIoT assemblage. The technical approach looked at the existing technologies, design and development considerations, and the overall architecture of CIoT. The researcher generated theme and sub-themes using thematic analysis. There main themes were regarding regulatory frameworks, privacy of personal information, security concerns, trust issues, and convenience and benefits. The study further established that consumers enjoy the convenience and benefits that IoT technology brings. The study suggested an integrated and holistic framework that promote safer adoption of CIoT and associated mobile apps. The conclusion is that for CIoT to thrive, safety is crucial, and all the stakeholders in the IoT assemblage need to ensure the protection of consumers. The suggested framework may assist in the protection of consumers of IoT. The researcher recommends a further study that covers the regulators such as ICASA in detail and the enforcement of the POPI Act.Information ScienceD. Phil (Information Science
    corecore