43 research outputs found

    A Collaborative Mobile Crowdsensing System for Smart Cities

    Get PDF
    Nowadays words like Smart City, Internet of Things, Environmental Awareness surround us with the growing interest of Computer Science and Engineering communities. Services supporting these paradigms are definitely based on large amounts of sensed data, which, once obtained and gathered, need to be analyzed in order to build maps, infer patterns, extract useful information. Everything is done in order to achieve a better quality of life. Traditional sensing techniques, like Wired or Wireless Sensor Network, need an intensive usage of distributed sensors to acquire real-world conditions. We propose SenSquare, a Crowdsensing approach based on smartphones and a central coordination server for time-and-space homogeneous data collecting. SenSquare relies on technologies such as CoAP lightweight protocol, Geofencing and the Military Grid Reference System

    Napredna (edge computing) softverska arhitektura za upravljanje resursima i unutrašnje pozicioniranje

    Get PDF
    In Part I, this thesis aims to shed light on IoT and edge com-puting systems and accompanying computing and architectural paradigms, their definition, areas of application, and common use-cases, as well as operational, business, economical, social challenges and benefits. It illustrates modern needs and requests in building IoT systems and current State-of-The-Art (SoTA) approaches to designing them. Additionally, it discusses the security and privacy topics of IoT and edge computing systems. It also encompasses research, design, and implementation of an MQTT-based Resource Management Framework for Edge Com-puting systems that handle: resource management, failover detection and handover administration, logical and physical workload balancing and protection, and monitoring of physical and logical system resources designed for a real-world IoT platform. The thesis offers insights into modern requests for such frameworks, current SoTA approaches, and offer a solution in the form of a software framework, with minimal implementation and communication overhead. In Part II, the thesis elaborates on IPS, their definition, deploy-ment types, commonly used positioning techniques, areas of application, and common use-cases, as well as operational, business, economic, social challenges, and benefits. It specifically discusses designing IPS for the typical IoT infrastructure. It offers insights to modern IPS requests, current SoTA in solving them, and under-line original approaches from this thesis. It elaborates on the research, design and authors’ implementation of an IPS for the IoT – Bluetooth LowEnergyMicrolocation Asset Tracking (BLEMAT), including its software engines (collections of software components) for: indoor positioning, occupancy detection, visualization, pattern discovery and prediction, geofencing, movement pattern detection, visualization, discovery and prediction, social dynamics analysis, and indoor floor plan layout detection.Deo I teze ima je za cilj da rasvetli IoT i edge computing računarske sisteme i prateće računarske paradigme softverskih arhitektura, njihovu definiciju, područja primene i slučajeve uobičajene upotrebe, kao i operativne, poslovne, ekonomske, i socijalne izazove i koristi. Teza ilustruje savremene potrebe i zahtevi u izgradnji IoT sistema i najsavremeniji pristupi u njihovom dizajniranju. Raspravlja se o temama bezbednosti i privatnosti u IoT i edge computing računarskim sistemima. Kao još jedan glavni zadatak, teza je obuhvata istraživanje, dizajn i implementaciju softverske arhitekture za upravljanje resursima zasnovanim na MQTT komunikacionom protokolu za edge computing računarske sisteme koja se bavi: upravljanjem resursima, detekcijom prestanka rada upravljačkih algoritama i administracijom primopredaje tj. transporta upravljačkih algoritama, i logičkim i fizičkim balansiranjem i zaštitom radnog opterećenja sistema. Diskutuju se savremeni zahtevi za takve softverske arhitekture, trenutni pristupi. Na kraju, prikazuje se rešenje sa minimalnim troškovima implementacije i  komunikacije. Deo II teze ima za cilj da objasni sisteme za unutrašnje pozicioniranje, njihovu definiciju, vrste primene, najčešće korišćene tehnike pozicioniranja, područja primene i uobičajene slučajeve upotrebe, kao i operativne, poslovne, ekonomske, i socijalne izazove i koristi. Posebno se diskutuje o dizajniranju ovakvih sistema za tipičnu IoT infrastrukturu. Nudi se uvid u savremene zahteve sisteme za unutrašnje pozicioniranje, trenutne pristupe u rešavanju istih, i naglašeni su originalni pristupe iz ove teze. Dalje je fokus na istraživanju, dizajniranju i implementaciji sistema za unutrašnje pozicioniranje (BLEMAT), uključujući njegove softverske podsisteme (kolekcije softverskih komponenti) za: pozicioniranje u zatvorenom prostoru, detekciju zauzeća prostorija, vizualizaciju, otkrivanje i predviđanje obrazaca kretanja, geofencing, vizualizaciju i analizu društvene dinamike i detekciju rasporeda prostorija unutrašnjeg prostora

    Privacy protection in location based services

    Get PDF
    This thesis takes a multidisciplinary approach to understanding the characteristics of Location Based Services (LBS) and the protection of location information in these transactions. This thesis reviews the state of the art and theoretical approaches in Regulations, Geographic Information Science, and Computer Science. Motivated by the importance of location privacy in the current age of mobile devices, this thesis argues that failure to ensure privacy protection under this context is a violation to human rights and poses a detriment to the freedom of users as individuals. Since location information has unique characteristics, existing methods for protecting other type of information are not suitable for geographical transactions. This thesis demonstrates methods that safeguard location information in location based services and that enable geospatial analysis. Through a taxonomy, the characteristics of LBS and privacy techniques are examined and contrasted. Moreover, mechanisms for privacy protection in LBS are presented and the resulting data is tested with different geospatial analysis tools to verify the possibility of conducting these analyses even with protected location information. By discussing the results and conclusions of these studies, this thesis provides an agenda for the understanding of obfuscated geospatial data usability and the feasibility to implement the proposed mechanisms in privacy concerning LBS, as well as for releasing crowdsourced geographic information to third-parties

    Towards the Next Generation of Location-Aware Communications

    Get PDF
    This thesis is motivated by the expected implementation of the next generation mobile networks (5G) from 2020, which is being designed with a radical paradigm shift towards millimeter-wave technology (mmWave). Operating in 30--300 GHz frequency band (1--10 mm wavelengths), massive antenna arrays that provide a high angular resolution, while being packed on a small area will be used. Moreover, since the abundant mmWave spectrum is barely occupied, large bandwidth allocation is possible and will enable low-error time estimation. With this high spatiotemporal resolution, mmWave technology readily lends itself to extremely accurate localization that can be harnessed in the network design and optimization, as well as utilized in many modern applications. Localization in 5G is still in early stages, and very little is known about its performance and feasibility. In this thesis, we contribute to the understanding of 5G mmWave localization by focusing on challenges pertaining to this emerging technology. Towards that, we start by considering a conventional cellular system and propose a positioning method under outdoor LOS/NLOS conditions that, although approaches the Cram\'er-Rao lower bound (CRLB), provides accuracy in the order of meters. This shows that conventional systems have limited range of location-aware applications. Next, we focus on mmWave localization in three stages. Firstly, we tackle the initial access (IA) problem, whereby user equipment (UE) attempts to establish a link with a base station (BS). The challenge in this problem stems from the high directivity of mmWave. We investigate two beamforming schemes: directional and random. Subsequently, we address 3D localization beyond IA phase. Devices nowadays have higher computational capabilities and may perform localization in the downlink. However, beamforming on the UE side is sensitive to the device orientation. Thus, we study localization in both the uplink and downlink under multipath propagation and derive the position (PEB) and orientation error bounds (OEB). We also investigate the impact of the number of antennas and the number of beams on these bounds. Finally, the above components assume that the system is synchronized. However, synchronization in communication systems is not usually tight enough for localization. Therefore, we study two-way localization as a means to alleviate the synchronization requirement and investigate two protocols: distributed (DLP) and centralized (CLP). Our results show that random-phase beamforming is more appropriate IA approach in the studied scenarios. We also observe that the uplink and downlink are not equivalent, in that the error bounds scale differently with the number of antennas, and that uplink localization is sensitive to the UE orientation, while downlink is not. Furthermore, we find that NLOS paths generally boost localization. The investigation of the two-way protocols shows that CLP outperforms DLP by a significant margin. We also observe that mmWave localization is mainly limited by angular rather than temporal estimation. In conclusion, we show that mmWave systems are capable of localizing a UE with sub-meter position error, and sub-degree orientation error, which asserts that mmWave will play a central role in communication network optimization and unlock opportunities that were not available in the previous generation

    Context Aware Application Using Beacons

    Get PDF
    With the growing popularity of mobile computing, as well as the increasing demand for location-based services, this paper introduces a design and implementation of a location-aware system using Beacons. This project comprises three parts: a web application, backend server and a mobile application client. The web application serves as a content management system by allowing users to manage projects, input data and create associations between Beacons and data. The backend server contains application logic and a database. The mobile application client interacts with the Beacons and provides location-specific services

    Advanced Location-Based Technologies and Services

    Get PDF
    Since the publication of the first edition in 2004, advances in mobile devices, positioning sensors, WiFi fingerprinting, and wireless communications, among others, have paved the way for developing new and advanced location-based services (LBSs). This second edition provides up-to-date information on LBSs, including WiFi fingerprinting, mobile computing, geospatial clouds, geospatial data mining, location privacy, and location-based social networking. It also includes new chapters on application areas such as LBSs for public health, indoor navigation, and advertising. In addition, the chapter on remote sensing has been revised to address advancements

    Blockchain-based secure Unmanned Aerial Vehicles (UAV) in network design and optimization

    Get PDF
    Unmanned Aerial Vehicles (UAVs) have emerged as transformative technologies with wide ranging applications, including surveillance, mapping, remote sensing, search and rescue, and disaster management. As sophisticated Unmanned Aerial Vehicle (UAV) increasingly operate in collaborative swarms, joint optimization challenges arise, such as flight trajectories, scheduling, altitude, Aerial Base Stations (ABS), energy harvesting, power transfer, resource allocation, and power consumption. However, the widespread adoption of UAV networks has been hindered by challenges related to optimal Three-Dimensional (3D) deployment, trajectory optimization, wireless and computational resource allocation, and limited flight durations when operating as ABSs. Crucially, the broadcast nature of UAV-assisted wireless networks renders them susceptible to privacy and security threats such as Distributed Denial-of-Service (DDoS) replay, impersonation, message injection, spoofing, malware infection, eavesdropping, and line of-interference attacks. This study aims to address these privacy and security challenges by leveraging blockchain technology’s potential to secure data and delivery in UAV communication networks. With amalgamation of blockchain, this study seeks to harness its inherent immutability and cryptographic properties to ensure secure and tamper-proof data transmission, promote trust and transparency among stakeholders, enable automated Smart Contract (SC) for secure delivery, and facilitate standardization and interoperability across platforms. Specifically, blockchain can secure UAV network privacy and security through data privacy and integrity, secure delivery and tracking, access control, identity management, and resilience against cyber-attacks. Furthermore, this study explores the synergies among blockchain, UAV networks, and Federated Learning (FL) for privacy-preserving intelligent applications in healthcare and wireless networks. FL enables collaborative training of Machine Learning (ML) models without sharing raw data, ensuring data privacy. By integrating FL with blockchain-assisted UAV networks, this study aims to revolutionize future intelligent applications, particularly in time-sensitive and privacy-critical domains. Overall, this thesis contributes to the field by providing a comprehensive analysis of integrating blockchain, FL, and UAV networks, beyond Fifth-Generation (5G) communication networks. It addresses privacy and security concerns related to data and delivery, thereby enabling secure, reliable, and intelligent applications in various sectors

    Drone deep reinforcement learning: A review

    Get PDF
    Unmanned Aerial Vehicles (UAVs) are increasingly being used in many challenging and diversified applications. These applications belong to the civilian and the military fields. To name a few; infrastructure inspection, traffic patrolling, remote sensing, mapping, surveillance, rescuing humans and animals, environment monitoring, and Intelligence, Surveillance, Target Acquisition, and Reconnaissance (ISTAR) operations. However, the use of UAVs in these applications needs a substantial level of autonomy. In other words, UAVs should have the ability to accomplish planned missions in unexpected situations without requiring human intervention. To ensure this level of autonomy, many artificial intelligence algorithms were designed. These algorithms targeted the guidance, navigation, and control (GNC) of UAVs. In this paper, we described the state of the art of one subset of these algorithms: the deep reinforcement learning (DRL) techniques. We made a detailed description of them, and we deduced the current limitations in this area. We noted that most of these DRL methods were designed to ensure stable and smooth UAV navigation by training computer-simulated environments. We realized that further research efforts are needed to address the challenges that restrain their deployment in real-life scenarios
    corecore