3 research outputs found

    Practical packet combining for use with cooperative and non-cooperative ARQ schemes in wireless sensor networks

    Get PDF
    Although it is envisaged that advances in technology will follow a "Moores Law" trend for many years to come, one of the aims of Wireless Sensor Networks (WSNs) is to reduce the size of the nodes as much as possible. The issue of limited resources on current devices may therefore not improve much with future designs as a result. There is a pressing need, therefore, for simple, efficient protocols and algorithms that can maximise the use of available resources in an energy efficient manner. In this thesis an improved packet combining scheme useful on low power, resource-constrained sensor networks is developed. The algorithm is applicable in areas where currently only more complex combining approaches are used. These include cooperative communications and hybrid-ARQ schemes which have been shown to be of major benefit for wireless communications. Using the packet combining scheme developed in this thesis more than an 85% reduction in energy costs are possible over previous, similar approaches. Both simulated and practical experiments are developed in which the algorithm is shown to offer up to approximately 2.5 dB reduction in the required Signal-to-Noise ratio (SNR) for a particular Packet Error Rate (PER). This is a welcome result as complex schemes, such as maximal-ratio combining, are not implementable on many of the resource constrained devices under consideration. A motivational side study on the transitional region is also carried out in this thesis. This region has been shown to be somewhat of a problem for WSNs. It is characterised by variable packet reception rate caused by a combination of fading and manufacturing variances in the radio receivers. Experiments are carried out to determine whether or not a spread-spectrum architecture has any effect on the size of this region, as has been suggested in previous work. It is shown that, for the particular setup tested, the transitional region still has significant extent even when employing a spread-spectrum architecture. This result further motivates the need for the packet combining scheme developed as it is precisely in zones such as the transitional region that packet combining will be of most benefit

    Routing and Mobility on IPv6 over LoWPAN

    Get PDF
    The IoT means a world-wide network of interconnected objects based on standard communication protocols. An object in this context is a quotidian physical device augmented with sensing/actuating, processing, storing and communication capabilities. These objects must be able to interact with the surrounding environment where they are placed and to cooperate with neighbouring objects in order to accomplish a common objective. The IoT objects have also the capabilities of converting the sensed data into automated instructions and communicating them to other objects through the communication networks, avoiding the human intervention in several tasks. Most of IoT deployments are based on small devices with restricted computational resources and energy constraints. For this reason, initially the scientific community did not consider the use of IP protocol suite in this scenarios because there was the perception that it was too heavy to the available resources on such devices. Meanwhile, the scientific community and the industry started to rethink about the use of IP protocol suite in all IoT devices and now it is considered as the solution to provide connectivity between the IoT devices, independently of the Layer 2 protocol in use, and to connect them to the Internet. Despite the use of IP suite protocol in all devices and the amount of solutions proposed, many open issues remain unsolved in order to reach a seamless integration between the IoT and the Internet and to provide the conditions to IoT service widespread. This thesis addressed the challenges associated with the interconnectivity between the Internet and the IoT devices and with the security aspects of the IoT. In the interconnectivity between the IoT devices and the Internet the problem is how to provide valuable information to the Internet connected devices, independently of the supported IP protocol version, without being necessary accessed directly to the IoT nodes. In order to solve this problem, solutions based on Representational state transfer (REST) web services and IPv4 to IPv6 dual stack transition mechanism were proposed and evaluated. The REST web service and the transition mechanism runs only at the border router without penalizing the IoT constrained devices. The mitigation of the effects of internal and external security attacks minimizing the overhead imposed on the IoT devices is the security challenge addressed in this thesis. Three different solutions were proposed. The first is a mechanism to prevent remotely initiated transport level Denial of Service attacks that avoids the use of inefficient and hard to manage traditional firewalls. It is based on filtering at the border router the traffic received from the Internet and destined to the IoT network according to the conditions announced by each IoT device. The second is a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. The third is a network admission control framework that prevents IoT unauthorized nodes to communicate with IoT authorized nodes or with the Internet, which drastically reduces the number of possible security attacks. The network admission control was also exploited as a management mechanism as it can be used to manage the network size in terms of number of nodes, making the network more manageable, increasing its reliability and extending its lifetime.A IoT (Internet of Things) tem suscitado o interesse tanto da comunidade académica como da indústria, uma vez que os campos de aplicação são inúmeros assim como os potenciais ganhos que podem ser obtidos através do uso deste tipo de tecnologia. A IoT significa uma rede global de objetos ligados entre si através de uma rede de comunicações baseada em protocolos standard. Neste contexto, um objeto é um objeto físico do dia a dia ao qual foi adicionada a capacidade de medir e de atuar sobre variáveis físicas, de processar e armazenar dados e de comunicar. Estes objetos têm a capacidade de interagir com o meio ambiente envolvente e de cooperar com outros objetos vizinhos de forma a atingirem um objetivo comum. Estes objetos também têm a capacidade de converter os dados lidos em instruções e de as comunicar a outros objetos através da rede de comunicações, evitando desta forma a intervenção humana em diversas tarefas. A maior parte das concretizações de sistemas IoT são baseados em pequenos dispositivos autónomos com restrições ao nível dos recursos computacionais e de retenção de energia. Por esta razão, inicialmente a comunidade científica não considerou adequado o uso da pilha protocolar IP neste tipo de dispositivos, uma vez que havia a perceção de que era muito pesada para os recursos computacionais disponíveis. Entretanto, a comunidade científica e a indústria retomaram a discussão acerca dos benefícios do uso da pilha protocolar em todos os dispositivos da IoT e atualmente é considerada a solução para estabelecer a conetividade entre os dispositivos IoT independentemente do protocolo da camada dois em uso e para os ligar à Internet. Apesar do uso da pilha protocolar IP em todos os dispositivos e da quantidade de soluções propostas, são vários os problemas por resolver no que concerne à integração contínua e sem interrupções da IoT na Internet e de criar as condições para a adoção generalizada deste tipo de tecnologias. Esta tese versa sobre os desafios associados à integração da IoT na Internet e dos aspetos de segurança da IoT. Relativamente à integração da IoT na Internet o problema é como fornecer informação válida aos dispositivos ligados à Internet, independentemente da versão do protocolo IP em uso, evitando o acesso direto aos dispositivos IoT. Para a resolução deste problema foram propostas e avaliadas soluções baseadas em web services REST e em mecanismos de transição IPv4 para IPv6 do tipo pilha dupla (dual stack). O web service e o mecanismo de transição são suportados apenas no router de fronteira, sem penalizar os dispositivos IoT. No que concerne à segurança, o problema é mitigar os efeitos dos ataques de segurança internos e externos iniciados local e remotamente. Foram propostas três soluções diferentes, a primeira é um mecanismo que minimiza os efeitos dos ataques de negação de serviço com origem na Internet e que evita o uso de mecanismos de firewalls ineficientes e de gestão complexa. Este mecanismo filtra no router de fronteira o tráfego com origem na Internet é destinado à IoT de acordo com as condições anunciadas por cada um dos dispositivos IoT da rede. A segunda solução, é uma framework de network admission control que controla quais os dispositivos que podem aceder à rede com base na autorização administrativa e que aplica políticas de conformidade relativas à segurança aos dispositivos autorizados. A terceira é um mecanismo de network admission control para redes 6LoWPAN que evita que dispositivos não autorizados comuniquem com outros dispositivos legítimos e com a Internet o que reduz drasticamente o número de ataques à segurança. Este mecanismo também foi explorado como um mecanismo de gestão uma vez que pode ser utilizado a dimensão da rede quanto ao número de dispositivos, tornando-a mais fácil de gerir e aumentando a sua fiabilidade e o seu tempo de vida

    Diagnostic Significance of Exosomal miRNAs in the Plasma of Breast Cancer Patients

    Get PDF
    Poster Session AbstractsBackground and Aims: Emerging evidence that microRNAs (miRNAs) play an important role in cancer development has opened up new opportunities for cancer diagnosis. Recent studies demonstrated that released exosomes which contain a subset of both cellular mRNA and miRNA could be a useful source of biomarkers for cancer detection. Here, we aim to develop a novel biomarker for breast cancer diagnosis using exosomal miRNAs in plasma. Methods: We have developed a rapid and novel isolation protocol to enrich tumor-associated exosomes from plasma samples by capturing tumor specific surface markers containing exosomes. After enrichment, we performed miRNA profiling on four sample sets; (1) Ep-CAM marker enriched plasma exosomes of breast cancer patients; (2) breast tumors of the same patients; (3) adjacent non-cancerous tissues of the same patients; (4) Ep-CAM marker enriched plasma exosomes of normal control subjects. Profiling is performed using PCR-based array with human microRNA panels that contain more than 700 miRNAs. Results: Our profiling data showed that 15 miRNAs are concordantly up-regulated and 13 miRNAs are concordantly down-regulated in both plasma exosomes and corresponding tumors. These account for 25% (up-regulation) and 15% (down-regulation) of all miRNAs detectable in plasma exosomes. Our findings demonstrate that miRNA profile in EpCAM-enriched plasma exosomes from breast cancer patients exhibit certain similar pattern to that in the corresponding tumors. Based on our profiling results, plasma signatures that differentiated breast cancer from control are generated and some of the well-known breast cancer related miRNAs such as miR-10b, miR-21, miR-155 and miR-145 are included in our panel list. The putative miRNA biomarkers are validated on plasma samples from an independent cohort from more than 100 cancer patients. Further validation of the selected markers is likely to offer an accurate, noninvasive and specific diagnostic assay for breast cancer. Conclusions: These results suggest that exosomal miRNAs in plasma may be a novel biomarker for breast cancer diagnosis.link_to_OA_fulltex
    corecore