476 research outputs found
A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks
In recent years, Industrial Wireless Sensor Networks (IWSNs) have emerged as an important research theme with applications spanning a wide range of industries including automation, monitoring, process control, feedback systems and automotive. Wide scope of IWSNs applications ranging from small production units, large oil and gas industries to nuclear fission control, enables a fast-paced research in this field. Though IWSNs offer advantages of low cost, flexibility, scalability, self-healing, easy deployment and reformation, yet they pose certain limitations on available potential and introduce challenges on multiple fronts due to their susceptibility to highly complex and uncertain industrial environments. In this paper a detailed discussion on design objectives, challenges and solutions, for IWSNs, are presented. A careful evaluation of industrial systems, deadlines and possible hazards in industrial atmosphere are discussed. The paper also presents a thorough review of the existing standards and industrial protocols and gives a critical evaluation of potential of these standards and protocols along with a detailed discussion on available hardware platforms, specific industrial energy harvesting techniques and their capabilities. The paper lists main service providers for IWSNs solutions and gives insight of future trends and research gaps in the field of IWSNs
IETF standardization in the field of the Internet of Things (IoT): a survey
Smart embedded objects will become an important part of what is called the Internet of Things. However, the integration of embedded devices into the Internet introduces several challenges, since many of the existing Internet technologies and protocols were not designed for this class of devices. In the past few years, there have been many efforts to enable the extension of Internet technologies to constrained devices. Initially, this resulted in proprietary protocols and architectures. Later, the integration of constrained devices into the Internet was embraced by IETF, moving towards standardized IP-based protocols. In this paper, we will briefly review the history of integrating constrained devices into the Internet, followed by an extensive overview of IETF standardization work in the 6LoWPAN, ROLL and CoRE working groups. This is complemented with a broad overview of related research results that illustrate how this work can be extended or used to tackle other problems and with a discussion on open issues and challenges. As such the aim of this paper is twofold: apart from giving readers solid insights in IETF standardization work on the Internet of Things, it also aims to encourage readers to further explore the world of Internet-connected objects, pointing to future research opportunities
Keberkesanan program simulasi penapis sambutan dedenyut terhingga (FIR) terhadap kefahaman pelajar kejuruteraan elektrik
Kefahaman merupakan aset bagi setiap pelajar. Ini kerana melalui
kefahaman pelajar dapat mengaplikasikan konsep yang dipelajari di dalam dan di
luar kelas. Kajian ini dijalankan bertujuan menilai keberkesanan program simulasi
penapis sambutan dedenyut terhingga (FIR) terhadap kefahaman pelajar kejuruteraan
elektrik FKEE, UTHM dalam mata pelajaran Pemprosesan Isyarat Digital (DSP)
bagi topik penapis FIR. Metodologi kajian ini berbentuk kaedah reka bentuk kuasi�eksperimental ujian pra-pasca bagi kumpulan-kumpulan tidak seimbang. Seramai 40
responden kajian telah dipilih dan dibahagi secara rawak kepada dua kllmpulan iaitu
kumpulan rawatan yang menggunakan program simulasi penapis FIR dan kumpulan
kawalan yang menggunakan kaedah pembelajaran berorientasikan modul
pembelajaran DSP UTHM. Setiap responden menduduki dua ujian pencapaian iaitu
ujian pra dan ujian pasca yang berbentuk kuiz. Analisis data berbentuk deskriptif
dan inferens dilakllkan dengan menggunakan Peri sian Statistical Package for Social
Science (SPSS) versi 11.0. Dapatan kajian menunjukkan kedua-dua kumpulan
pelajar telah mengalami peningkatan dari segi kefahaman iaitu daripada tahap tidak
memuaskan kepada tahap kepujian selepas menggunakan kaedah pembelajaran yang
telah ditetapkan bagi kumpulan masing-masing. Walaubagaimanapun, pelajar
kumpulan rawatan menunjukkan peningkatan yang lebih tinggi sedikit berbanding
pelajar kumpulan kawalan. Namun begitu, dapatan kajian secara ujian statistik
menunjukkan tidak terdapat perbezaan yang signifikan dari segi pencapaian markah
ujian pasca di antara pelajar kumpulan rawatan dengan pelajar kumpulan kawalan.
Sungguhpun begitu, penggunaan program simulasi penapis FIR telah membantu
dalam peningkatan kefahaman pelajar mengenai topik penapis FIR
IETF standardization in the field of the internet of things (IoT): a survey
Smart embedded objects will become an important part of what is called the Internet of Things. However, the integration of embedded devices into the Internet introduces several challenges, since many of the existing Internet technologies and protocols were not designed for this class of devices. In the past few years, there have been many efforts to enable the extension of Internet technologies to constrained devices. Initially, this resulted in proprietary protocols and architectures. Later, the integration of constrained devices into the Internet was embraced by IETF, moving towards standardized IP-based protocols. In this paper, we will briefly review the history of integrating constrained devices into the Internet, followed by an extensive overview of IETF standardization work in the 6LoWPAN, ROLL and CoRE working groups. This is complemented with a broad overview of related research results that illustrate how this work can be extended or used to tackle other problems and with a discussion on open issues and challenges. As such the aim of this paper is twofold: apart from giving readers solid insights in IETF standardization work on the Internet of Things, it also aims to encourage readers to further explore the world of Internet-connected objects, pointing to future research opportunities.The research leading to these results has received funding from the European Union’s Seventh Framework Programme (FP7/2007-2013) under grant agreement no 258885 (SPITFIRE project), from the iMinds ICON projects GreenWeCan and O’CareCloudS, a FWO postdoc grant for Eli De Poorter and a VLIR PhD scholarship to Isam Ishaq
Wireless communication technologies for the Internet of Things
Internet of Things (IoT) is the inter-networking paradigm based on many processes such as identifying, sensing, networking and computation. An IoT technology stack provides seamless connectivity between various physical and virtual objects. The increasing number of IoT applications leads to the issue of transmitting, storing, and processing a large amount of data. Therefore, it is necessary to enable a system capable to handle the growing traffic requirements with the required level of QoS (Quality of Service). IoT devices become more complex due to the various components such as sensors and network interfaces. The IoT environment is often demanding for mobile power source, QoS, mobility, reliability, security, and other requirements. Therefore, new IoT technologies are required to overcome some of these issues. In recent years new wireless communication technologies are being developed to support the development of new IoT applications. This paper provides an overview of some of the most widely used wireless communication technologies used for IoT applications
A security architecture for IPv6 enabled wireless medical sensor networks.
We present the design of an IPv6 enabled wireless sensor network based on the IEEE 802.15.4 standard for medical monitoring. We design a routing mechanism for efficient flooding, a hop-by-hop error recovery and congestion control mechanism for reliable packet delivery and a lightweight security architecture for the medical monitoring system. We extend the widely used Extensible Authentication Protocol (EAP) to employ the Generalized Pre-shared Key (GPSK) authentication method with some optimizations for securing the system. We use the 3-party EAP model with the Personal Area Network Coordinator (PAN coordinator) of IEEE 802.15.4 standard as the EAP authenticator for authenticating sensor nodes within the radio range of the PAN coordinator. In order to use EAP authentication for a sensor node several hops away from the PAN coordinator, we define a new role (relay authenticator) for its coordinator which tunnels EAP messages to the PAN coordinator securely. We define EAP message encapsulation for IEEE 802.15.4 networks and a key hierarchy for the security architecture. We have simulated the system and shown that EAP based authentication is feasible in wireless sensor networks.The original print copy of this thesis may be available here: http://wizard.unbc.ca/record=b136235
An Overview on Wireless Sensor Networks Technology and Evolution
Wireless sensor networks (WSNs) enable new applications and require non-conventional paradigms for protocol design due to several constraints. Owing to the requirement for low device complexity together with low energy consumption (i.e., long network lifetime), a proper balance between communication and signal/data processing capabilities must be found. This motivates a huge effort in research activities, standardization process, and industrial investments on this field since the last decade. This survey paper aims at reporting an overview of WSNs technologies, main applications and standards, features in WSNs design, and evolutions. In particular, some peculiar applications, such as those based on environmental monitoring, are discussed and design strategies highlighted; a case study based on a real implementation is also reported. Trends and possible evolutions are traced. Emphasis is given to the IEEE 802.15.4 technology, which enables many applications of WSNs. Some example of performance characteristics of 802.15.4-based networks are shown and discussed as a function of the size of the WSN and the data type to be exchanged among nodes
- …