14 research outputs found

    Contributions to energy-aware demand-response systems using SDN and NFV for fog computing

    Get PDF
    Ever-increasing energy consumption, the depletion of non-renewable resources, the climate impact associated with energy generation, and finite energy-production capacity are important concerns worldwide that drive the urgent creation of new energy management and consumption schemes. In this regard, by leveraging the massive connectivity provided by emerging communications such as the 5G systems, this thesis proposes a long-term sustainable Demand-Response solution for the adaptive and efficient management of available energy consumption for Internet of Things (IoT) infrastructures, in which energy utilization is optimized based on the available supply. In the proposed approach, energy management focuses on consumer devices (e.g., appliances such as a light bulb or a screen). In this regard, by proposing that each consumer device be part of an IoT infrastructure, it is feasible to control its respective consumption. The proposal includes an architecture that uses Network Functions Virtualization (NFV) and Software Defined Networking technologies as enablers to promote the primary use of energy from renewable sources. Associated with architecture, this thesis presents a novel consumption model conditioned on availability in which consumers are part of the management process. To efficiently use the energy from renewable and non-renewable sources, several management strategies are herein proposed, such as the prioritization of the energy supply, workload scheduling using time-shifting capabilities, and quality degradation to decrease- the power demanded by consumers if needed. The adaptive energy management solution is modeled as an Integer Linear Programming, and its complexity has been identified to be NP-Hard. To verify the improvements in energy utilization, an optimal algorithmic solution based on a brute force search has been implemented and evaluated. Because the hardness of the adaptive energy management problem and the non-polynomial growth of its optimal solution, which is limited to energy management for a small number of energy demands (e.g., 10 energy demands) and small values of management mechanisms, several faster suboptimal algorithmic strategies have been proposed and implemented. In this context, at the first stage, we implemented three heuristic strategies: a greedy strategy (GreedyTs), a genetic-algorithm-based solution (GATs), and a dynamic programming approach (DPTs). Then, we incorporated into both the optimal and heuristic strategies a prepartitioning method in which the total set of analyzed services is divided into subsets of smaller size and complexity that are solved iteratively. As a result of the adaptive energy management in this thesis, we present eight strategies, one timal and seven heuristic, that when deployed in communications infrastructures such as the NFV domain, seek the best possible scheduling of demands, which lead to efficient energy utilization. The performance of the algorithmic strategies has been validated through extensive simulations in several scenarios, demonstrating improvements in energy consumption and the processing of energy demands. Additionally, the simulation results revealed that the heuristic approaches produce high-quality solutions close to the optimal while executing among two and seven orders of magnitude faster and with applicability to scenarios with thousands and hundreds of thousands of energy demands. This thesis also explores possible application scenarios of both the proposed architecture for adaptive energy management and algorithmic strategies. In this regard, we present some examples, including adaptive energy management in-home systems and 5G networks slicing, energy-aware management solutions for unmanned aerial vehicles, also known as drones, and applicability for the efficient allocation of spectrum in flex-grid optical networks. Finally, this thesis presents open research problems and discusses other application scenarios and future work.El constante aumento del consumo de energía, el agotamiento de los recursos no renovables, el impacto climático asociado con la generación de energía y la capacidad finita de producción de energía son preocupaciones importantes en todo el mundo que impulsan la creación urgente de nuevos esquemas de consumo y gestión de energía. Al aprovechar la conectividad masiva que brindan las comunicaciones emergentes como los sistemas 5G, esta tesis propone una solución de Respuesta a la Demanda sostenible a largo plazo para la gestión adaptativa y eficiente del consumo de energía disponible para las infraestructuras de Internet of Things (IoT), en el que se optimiza la utilización de la energía en función del suministro disponible. En el enfoque propuesto, la gestión de la energía se centra en los dispositivos de consumo (por ejemplo, electrodomésticos). En este sentido, al proponer que cada dispositivo de consumo sea parte de una infraestructura IoT, es factible controlar su respectivo consumo. La propuesta incluye una arquitectura que utiliza tecnologías de Network Functions Virtualization (NFV) y Software Defined Networking como habilitadores para promover el uso principal de energía de fuentes renovables. Asociada a la arquitectura, esta tesis presenta un modelo de consumo condicionado a la disponibilidad en el que los consumidores son parte del proceso de gestión. Para utilizar eficientemente la energía de fuentes renovables y no renovables, se proponen varias estrategias de gestión, como la priorización del suministro de energía, la programación de la carga de trabajo utilizando capacidades de cambio de tiempo y la degradación de la calidad para disminuir la potencia demandada. La solución de gestión de energía adaptativa se modela como un problema de programación lineal entera con complejidad NP-Hard. Para verificar las mejoras en la utilización de energía, se ha implementado y evaluado una solución algorítmica óptima basada en una búsqueda de fuerza bruta. Debido a la dureza del problema de gestión de energía adaptativa y el crecimiento no polinomial de su solución óptima, que se limita a la gestión de energía para un pequeño número de demandas de energía (por ejemplo, 10 demandas) y pequeños valores de los mecanismos de gestión, varias estrategias algorítmicas subóptimos más rápidos se han propuesto. En este contexto, en la primera etapa, implementamos tres estrategias heurísticas: una estrategia codiciosa (GreedyTs), una solución basada en algoritmos genéticos (GATs) y un enfoque de programación dinámica (DPTs). Luego, incorporamos tanto en la estrategia óptima como en la- heurística un método de prepartición en el que el conjunto total de servicios analizados se divide en subconjuntos de menor tamaño y complejidad que se resuelven iterativamente. Como resultado de la gestión adaptativa de la energía en esta tesis, presentamos ocho estrategias, una óptima y siete heurísticas, que cuando se despliegan en infraestructuras de comunicaciones como el dominio NFV, buscan la mejor programación posible de las demandas, que conduzcan a un uso eficiente de la energía. El desempeño de las estrategias algorítmicas ha sido validado a través de extensas simulaciones en varios escenarios, demostrando mejoras en el consumo de energía y el procesamiento de las demandas de energía. Los resultados de la simulación revelaron que los enfoques heurísticos producen soluciones de alta calidad cercanas a las óptimas mientras se ejecutan entre dos y siete órdenes de magnitud más rápido y con aplicabilidad a escenarios con miles y cientos de miles de demandas de energía. Esta tesis también explora posibles escenarios de aplicación tanto de la arquitectura propuesta para la gestión adaptativa de la energía como de las estrategias algorítmicas. En este sentido, presentamos algunos ejemplos, que incluyen sistemas de gestión de energía adaptativa en el hogar, en 5G networkPostprint (published version

    Location Privacy in VANETs: Improved Chaff-Based CMIX and Privacy-Preserving End-to-End Communication

    Get PDF
    VANETs communication systems are technologies and defined policies that can be formed to enable ITS applications to provide road traffic efficacy, warning about such issues as environmental dangers, journey circumstances, and in the provision of infotainment that considerably enhance transportation safety and quality. The entities in VANETs, generally vehicles, form part of a massive network known as the Internet of Vehicles (IoV). The deployment of large-scale VANETs systems is impossible without ensuring that such systems are themselves are safe and secure, protecting the privacy of their users. There is a risk that cars might be hacked, or their sensors become defective, causing inaccurate information to be sent across the network. Consequently, the activities and credentials of participating vehicles should be held responsible and quickly broadcast throughout a vast VANETs, considering the accountability in the system. The openness of wireless communication means that an observer can eavesdrop on vehicular communication and gain access or otherwise deduce users' sensitive information, and perhaps profile vehicles based on numerous factors such as tracing their travels and the identification of their home/work locations. In order to protect the system from malicious or compromised entities, as well as to preserve user privacy, the goal is to achieve communication security, i.e., keep users' identities hidden from both the outside world and the security infrastructure and service providers. Being held accountable while still maintaining one's privacy is a difficult balancing act. This thesis explores novel solution paths to the above challenges by investigating the impact of low-density messaging to improve the security of vehicle communications and accomplish unlinkability in VANETs. This is achieved by proposing an improved chaff-based CMIX protocol that uses fake messages to increase density to mitigate tracking in this scenario. Recently, Christian \etall \cite{vaas2018nowhere} proposed a Chaff-based CMIX scheme that sends fake messages under the presumption low-density conditions to enhance vehicle privacy and confuse attackers. To accomplish full unlinkability, we first show the following security and privacy vulnerabilities in the Christian \etall scheme: linkability attacks outside the CMIX may occur due to deterministic data-sharing during the authentication phase (e.g., duplicate certificates for each communication). Adversaries may inject fake certificates, which breaks Cuckoo Filters' (CFs) updates authenticity, and the injection may be deniable. CMIX symmetric key leakage outside the coverage may occur. We propose a VPKI-based protocol to mitigate these issues. First, we use a modified version of Wang \etall's \cite{wang2019practical} scheme to provide mutual authentication without revealing the real identity. To this end, a vehicle's messages are signed with a different pseudo-identity “certificate”. Furthermore, the density is increased via the sending of fake messages during low traffic periods to provide unlinkability outside the mix-zone. Second, unlike Christian \etall's scheme, we use the Adaptive Cuckoo Filter (ACF) instead of CF to overcome the effects of false positives on the whole filter. Moreover, to prevent any alteration of the ACFs, only RUSs distribute the updates, and they sign the new fingerprints. Third, mutual authentication prevents any leakage from the mix zones' symmetric keys by generating a fresh one for each communication through a Diffie–Hellman key exchange. As a second main contribution of this thesis, we focus on the V2V communication without the interference of a Trusted Third Party (TTP)s in case this has been corrupted, destroyed, or is out of range. This thesis presents a new and efficient end-to-end anonymous key exchange protocol based on Yang \etall's \cite{yang2015self} self-blindable signatures. In our protocol, vehicles first privately blind their own private certificates for each communication outside the mix-zone and then compute an anonymous shared key based on zero-knowledge proof of knowledge (PoK). The efficiency comes from the fact that once the signatures are verified, the ephemeral values in the PoK are also used to compute a shared key through an authenticated Diffie-Hellman key exchange protocol. Therefore, the protocol does not require any further external information to generate a shared key. Our protocol also does not require interfacing with the Roadside Units or Certificate Authorities, and hence can be securely run outside the mixed-zones. We demonstrate the security of our protocol in ideal/real simulation paradigms. Hence, our protocol achieves secure authentication, forward unlinkability, and accountability. Furthermore, the performance analysis shows that our protocol is more efficient in terms of computational and communications overheads compared to existing schemes.Kuwait Cultural Offic

    Emerging Trends in Mechatronics

    Get PDF
    Mechatronics is a multidisciplinary branch of engineering combining mechanical, electrical and electronics, control and automation, and computer engineering fields. The main research task of mechatronics is design, control, and optimization of advanced devices, products, and hybrid systems utilizing the concepts found in all these fields. The purpose of this special issue is to help better understand how mechatronics will impact on the practice and research of developing advanced techniques to model, control, and optimize complex systems. The special issue presents recent advances in mechatronics and related technologies. The selected topics give an overview of the state of the art and present new research results and prospects for the future development of the interdisciplinary field of mechatronic systems

    Energy Management of Distributed Generation Systems

    Get PDF
    The book contains 10 chapters, and it is divided into four sections. The first section includes three chapters, providing an overview of Energy Management of Distributed Systems. It outlines typical concepts, such as Demand-Side Management, Demand Response, Distributed, and Hierarchical Control for Smart Micro-Grids. The second section contains three chapters and presents different control algorithms, software architectures, and simulation tools dedicated to Energy Management Systems. In the third section, the importance and the role of energy storage technology in a Distribution System, describing and comparing different types of energy storage systems, is shown. The fourth section shows how to identify and address potential threats for a Home Energy Management System. Finally, the fifth section discusses about Economical Optimization of Operational Cost for Micro-Grids, pointing out the effect of renewable energy sources, active loads, and energy storage systems on economic operation

    Future Transportation

    Get PDF
    Greenhouse gas (GHG) emissions associated with transportation activities account for approximately 20 percent of all carbon dioxide (co2) emissions globally, making the transportation sector a major contributor to the current global warming. This book focuses on the latest advances in technologies aiming at the sustainable future transportation of people and goods. A reduction in burning fossil fuel and technological transitions are the main approaches toward sustainable future transportation. Particular attention is given to automobile technological transitions, bike sharing systems, supply chain digitalization, and transport performance monitoring and optimization, among others

    Coordination on Systems of Multiple UAVs

    Get PDF
    Esta tesis trata acerca de métodos para coordinar las trayectorias de un sistema de Vehículos Aéreos no Tripulados y Autónomos (en adelante UAVs). El primer conjunto de técnicas desarrolladas durante la tesis se agrupan dentro de las técnicas de planificación de trayectorias. En este caso, el objetivo es generar planes de vuelo para un conjunto de vehículos coordinadamente de forma que no se produzcan colisiones entre ellos. Además, este tipo de técnicas puede usarse para modificar el plan de vuelo de un subconjunto de UAVs en tiempo real. Entre los algoritmos desarrollados en la tesis podemos destacar la adaptación de algoritmos evolutivos como los Algoritmos Genéticos y el Particle Swarm (Enjambre de Partículas), la incorporación de nuevas formas de muestreo del espacio para la aplicación del algoritmo Optimal Rapidly Exploring Random Trees (RRT*) en sistemas multi-UAV usando técnicas de muestreo novedosas. También se ha estudiado el comportamiento de parte de estos algoritmos en situaciones variables de incertidumbre del estado del sistema. En particular, se propone el uso del Filtro de Partículas para estimar la posición relativa entre varios UAVs. Además, se estudia la aplicación de métodos reactivos para la resolución de colisiones en tiempo real. Esta tesis propone un nuevo algoritmo para la resolución de colisiones entre múltiples UAVs en presencia de obstáculos fijos llamado G-ORCA. Este algoritmo soluciona varios problemas que han surgido al aplicar el algoritmo ORCA en su variante 3D en sistemas compuestos por vehículos reales. Su seguridad se ha demostrado tanto analíticamente, como empíricamente en pruebas con sistemas reales. De hecho, durante esta tesis numerosos experimentos en sistemas multi-UAV reales compuestos hasta por 4 UAVs han sido ejecutados. En dichos experimentos, se realiza una coordinación autónoma de UAVs en las que se asegura la ejecución de trayectorias libres de colisiones garantizando por tanto la seguridad del sistema. Una característica reseñable de esta tesis es que los algoritmos desarrollados han sido probados e integrados en sistemas más complejos que son usados en aplicaciones reales. En primer lugar, se presenta un sistema para aumentar la duración del vuelo de planeadores aprovechando las corrientes ascendentes de viento generadas por el calor (térmicas). En segundo lugar, un sistema de detección y resolución de colisiones coordinado para sistemas con múltiples UAVs reactivo ha sido diseñado, desarrollado y probado experimentalmente. Este sistema ha sido integrado dentro de un sistema automático de construcción de estructuras mediante múltiples UAVs.The aim of this thesis is to propose methods to coordinately generate trajectories for a system of Autonomous Unmanned Aerial Vehicles (UAVs). The first set of proposed techniques developed in this thesis can be defined as trajectory planning techniques. In this case, the objective is to generate coordinated flight plans for a system of UAVs in such a way that no collision are produced among each pair of UAVs. Besides, these techniques can be applied online in order to modify the original flight plan whenever a potential collision is detected. Amongst the developed algorithms in this thesis we can highlight the adaptation of evolutionary algorithms such as Genetic Algorithms and Particle Swarm, and the application of Optimal Rapidly Exploring Random Trees (RRT*) algorithm into a system of several UAVs with novel sampling techniques. In addition, many of these techniques have been adapted in order to be applicable when only uncertain knowledge of the state of the system is available. In particular, the use of the Particle Filter is proposed in order to estimate the relative position between UAVs. The estimation of the position as well as the uncertainty related to this estimation are then taken into account in the conflict resolution system. All techniques proposed in this thesis have been validated by performing several simulated and real tests. For this purpose, a method for randomly generating a huge test batch is presented in chapter 3. This will allow to test the behavior of the proposed methods in a great variety of situations. During the thesis, several real experimentations with fleets composed by up to four UAVs are presented. In these experiments, the UAVs in the system are automatically coordinated in order to ensure collision-free trajectories and thus guarantee the safety of the system. The other main topic of this thesis is the application of reactive methods for real-time conflict resolution. This thesis proposes a novel algorithm for collision resolution amongst multiple UAVs in the presence of static obstacles, which has been called Generalized-Optimal Reciprocal Collision Avoidance (G-ORCA). This algorithm overcomes several issues that have been detected into the algorithm 3D-ORCA in real applications. A remarkable characteristic of this thesis is that the developed algorithms have been applied as a part of more complex systems. First, a coordinated system for flight endurance extension of gliding aircrafts by profiting the ascending wind is presented. Second, a reactive collision avoidance block has been designed, developed and tested experimentally based in the aforementioned G-ORCA algorithm. This block has been integrated into a system for assembly construction with multiple UAVs
    corecore