98 research outputs found

    A Survey on Facilities for Experimental Internet of Things Research

    Get PDF
    International audienceThe initial vision of the Internet of Things (IoT) was of a world in which all physical objects are tagged and uniquelly identified by RFID transponders. However, the concept has grown into multiple dimensions, encompassing sensor networks able to provide real-world intelligence and goal-oriented collaboration of distributed smart objects via local networks or global interconnections such as the Internet. Despite significant technological advances, difficulties associated with the evaluation of IoT solutions under realistic conditions, in real world experimental deployments still hamper their maturation and significant roll out. In this article we identify requirements for the next generation of the IoT experimental facilities. While providing a taxonomy, we also survey currently available research testbeds, identify existing gaps and suggest new directions based on experience from recent efforts in this field

    RIOT OS Paves the Way for Implementation of High-Performance MAC Protocols

    Get PDF
    Implementing new, high-performance MAC protocols requires real-time features, to be able to synchronize correctly between different unrelated devices. Such features are highly desirable for operating wireless sensor networks (WSN) that are designed to be part of the Internet of Things (IoT). Unfortunately, the operating systems commonly used in this domain cannot provide such features. On the other hand, "bare-metal" development sacrifices portability, as well as the mul-titasking abilities needed to develop the rich applications that are useful in the domain of the Internet of Things. We describe in this paper how we helped solving these issues by contributing to the development of a port of RIOT OS on the MSP430 microcontroller, an architecture widely used in IoT-enabled motes. RIOT OS offers rich and advanced real-time features, especially the simultaneous use of as many hardware timers as the underlying platform (microcontroller) can offer. We then demonstrate the effectiveness of these features by presenting a new implementation, on RIOT OS, of S-CoSenS, an efficient MAC protocol that uses very low processing power and energy.Comment: SCITEPRESS. SENSORNETS 2015, Feb 2015, Angers, France. http://www.scitepress.or

    Link-layer Security in TSCH Networks: Effect on Slot Duration

    Get PDF
    International audienceThe IEEE802.15.4e-2012 standard is widely used in multi-hop wireless Industrial Internet of Things (IIoT)applications. In the Time-Slotted Channel Hopping (TSCH) mode, nodes are synchronized, and time iscut into timeslots. A schedule orchestrates all communications, resulting in high reliability and low poweroperations. A timeslot must be long enough for a node to send a data frame to its neighbor, and for thatneighbor to send back an acknowledgment. Shorter timeslots enable higher bandwidth and lower latency, yetthe minimal timeslot duration is limited by how long link-layer security operations take. We evaluate theoverhead of link-layer security in TSCH networks in terms of minimal timeslot length, memory footprint,and energy consumption. We implement full link-layer security on a range of hardware platforms, exploringdierent hardware/software implementation strategies. Through an extensive measurement campaign, wequantify the advantage of hardware accelerations for link-layer security, and show how the minimal durationof a timeslot varies between 9 ms and 88 ms for the most common conguration, depending on hardwaresupport. Furthermore, we also highlighted the impact that the timeslot duration has on both high-levelapplication design and energy consumption

    IETF standardization in the field of the Internet of Things (IoT): a survey

    Get PDF
    Smart embedded objects will become an important part of what is called the Internet of Things. However, the integration of embedded devices into the Internet introduces several challenges, since many of the existing Internet technologies and protocols were not designed for this class of devices. In the past few years, there have been many efforts to enable the extension of Internet technologies to constrained devices. Initially, this resulted in proprietary protocols and architectures. Later, the integration of constrained devices into the Internet was embraced by IETF, moving towards standardized IP-based protocols. In this paper, we will briefly review the history of integrating constrained devices into the Internet, followed by an extensive overview of IETF standardization work in the 6LoWPAN, ROLL and CoRE working groups. This is complemented with a broad overview of related research results that illustrate how this work can be extended or used to tackle other problems and with a discussion on open issues and challenges. As such the aim of this paper is twofold: apart from giving readers solid insights in IETF standardization work on the Internet of Things, it also aims to encourage readers to further explore the world of Internet-connected objects, pointing to future research opportunities

    Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems

    Get PDF
    The deployment of security services over Wireless Sensor Networks (WSN) and IoT devices brings significant processing and energy consumption overheads. These overheads are mainly determined by algorithmic efficiency, quality of implementation, and operating system. Benchmarks of symmetric primitives exist in the literature for WSN platforms but they are mostly focused on single platforms or single operating systems. Moreover, they are not up to date with respect to implementations and/or operating systems versions which had significant progress. Herein, we provide time and energy benchmarks of reference implementations for different platforms and operating systems and analyze their impact. Moreover, we not only give the first benchmark results of symmetric cryptography for the Intel Edison IoT platform but also describe a methodology of how to measure energy consumption on that platform

    Indoor localization in wireless sensor network using fingerprintin method

    Get PDF
    La tesi ha avuto come oggetto l'implementazione e la valutazione delle performance di un metodo per la localizzazione geografica indoor sfruttando reti di sensori. Tale metodo, chiamato Fingerprinting, è stato usato solo in reti WI-FI, mai in reti di sensor
    corecore