177 research outputs found

    Serverless protocols for inventory and tracking with a UAV

    Get PDF
    It is widely acknowledged that the proliferation of Unmanned Aerial Vehicles (UAVs) may lead to serious concerns regarding avionics safety, particularly when end-users are not adhering to air safety regulations. There are, however, domains in which UAVs may help to increase the safety of airplanes and the management of flights and airport resources that often require substantial human resources. For instance, Paris Charles de Gaulle airport (CDG) has more than 7,000 staff and supports 30,000 direct jobs for more than 60 million passengers per year (as of 2016). Indeed, these new systems can be used beneficially for several purposes, even in sensitive areas like airports. Among the considered applications are those that suggest using UAVs to enhance safety of on-ground airplanes; for instance, by collecting (once the aircraft has landed) data recorded by different systems during the flight (like the sensors of the Aircraft Data Networks - ADN) or by examining the state of airplane structure. In this paper, our proposal is to use UAVs, under the control of the airport authorities, to inventory and track various tagged assets, such as luggage, supplies required for the flights, and maintenance tools. The aim of our proposal is to make airport management systems more efficient for operations requiring inventory and tracking, along with increasing safety (sensitive assets such as refueling tanks, or sensitive pieces of luggage can be tracked), thus raising financial profit.Comment: 11 pages, Conference, The 36th IEEE/AIAA Digital Avionics Systems Conference (DASC'17

    Internet of things: Vision, applications and research challenges

    Get PDF
    The term “Internet-of-Things” is used as an umbrella keyword for covering various aspects related to the extension of the Internet and the Web into the physical realm, by means of the widespread deployment of spatially distributed devices with embedded identification, sensing and/or actuation capabilities. Internet-of-Things envisions a future in which digital and physical entities can be linked, by means of appropriate information and communication technologies, to enable a whole new class of applications and services. In this article, we present a survey of technologies, applications and research challenges for Internet-of-Things

    A security-and quality-aware system architecture for Internet of Things

    Get PDF
    Internet of Things (IoT) is characterized, at the system level, by high diversity with respect to enabling technologies and supported services. IoT also assumes to deal with a huge amount of heterogeneous data generated by devices, transmitted by the underpinning infrastructure and processed to support value-added services. In order to provide users with valuable output, the IoT architecture should guarantee the suitability and trustworthiness of the processed data. This is a major requirement of such systems in order to guarantee robustness and reliability at the service level. In this paper, we introduce a novel IoT architecture able to support security, privacy and data quality guarantees, thereby effectively boosting the diffusion of IoT services

    Utilising Digital Twins for Increasing Military Supply Chain Visibility

    Get PDF
    The dynamic and complex nature of the military supply chain (MSC) requires effective monitoring of supplies and timely decisions to ensure success in combat operations, particularly in the face of unexpected disruptions such as inclement weather conditions and terrorist attacks. Although, existing technologies such as RFIDs, Next-Generation Wireless Communication (NGWC) and RuBees are applied MSC, they are not sufficient in ensuring end-to-end visibility across the entire SC. However, digital technologies such as the internet of things, cloud computing, Application Programming Interface (APIs), machine learning, augmented and virtual reality, big data, analytics and pervasive computing play a critical role in improving visibility to ensure effective SC management. Hence, the introduction of the concept of digital twin enabled by these technologies creates a digital replica of the whole supply chain operations, ensuring adequate end-to-end visibility through real-time data that ensures effective tracking, monitoring and reporting of all SC activities. The focus of this paper is to explore the enabling technologies of digital twin and its implementation to achieve end-to-end visibility in the military supply chain. In this paper, the authors identify the digital twin's tracking and monitoring capability, which will improve supply chain management by enabling a cycle of continuous adjustment of the SC against unexpected disruptions

    QoS Aware Transmit Beamforming for Secure Backscattering in Symbiotic Radio Systems

    Full text link
    This paper focuses on secure backscatter transmission in the presence of a passive multi-antenna eavesdropper through a symbiotic radio (SR) network. Specifically, a single-antenna backscatter device (BD) aims to transmit confidential information to a primary receiver (PR) by using a multi-antenna primary transmitter's (PT) signal, where the received symbols are jointly decoded at the PR. Our objective is to achieve confidential communications for BD while ensuring that the primary system's quality of service (QoS) requirements are met. We propose an alternating optimisation algorithm that maximises the achievable secrecy rate of BD by jointly optimising primary transmit beamforming and power sharing between information and artificial noise (AN) signals. Numerical results verify our analytical claims on the optimality of the proposed solution and the proposed methodology's underlying low complexity. Additionally, our simulations provide nontrivial design insights into the critical system parameters and quantify the achievable gains over the relevant benchmark schemes

    Smart Technologies for Environmental Safety and Knowledge Enhancement in Intermodal Transport

    Get PDF
    International concerns about security in transport systems are leading to a new international regulation in this field. This introduces new requirements for operators and authorities as well as it opens new challenges, in particular when referred to seaports and maritime transport in the Mediterranean area, where many seaport terminals and infrastructures are affected by a noteworthy technological divide from North European contexts. In such contexts, the adoption of the new regulations can represent the right chance for upgrading the local operative standards, increasing latu sensu the quality of maritime transport performances, while conferring a greater level to security and safety checks. This paper explores the chances for increasing the level of Mediterranean seaport competitiveness allowed by technological innovations in transport systems, both in operations and organization of these infrastructures. The aim of the work is to study the effects of the adoption of technological solutions such as wireless communications and radiofrequency identification on the competitiveness of Mediterranean seaport infrastructures. Technological solutions designed to identify good items help operators in organizing activities in terminals and make maritime transport faster in delivering goods, by cutting the handling time and costs in seaport terminals. Seaports that adopt this kind of technologies, and the surrounding economic areas connected to seaports, have a greater attractiveness on shipping companies and operators, since they allow faster handling activities and easier checks on goods. Besides, the analysis of direct and indirect effects of the use of such technologies specifically focuses on the contribution that the use of these solutions gives in ensuring higher security levels, by increasing the level of information and knowledge associated to goods. The different types of security provided (e.g. for people, environment and goods) and the extreme flexibility of the technologies involved give the overall worth of the challenge. It seems to be a great chance of growth for the Mediterranean area, more than a mere compliance to the international security regulations.

    Implementation of Middleware for Internet of Things in Asset Tracking Applications: In-lining Approach

    Get PDF
    ThesisInternet of Things (IoT) is a concept that involves giving objects a digital identity and limited artificial intelligence, which helps the objects to be interactive, process data, make decisions, communicate and react to events virtually with minimum human intervention. IoT is intensified by advancements in hardware and software engineering and promises to close the gap that exists between the physical and digital worlds. IoT is paving ways to address complex phenomena, through designing and implementation of intelligent systems that can monitor phenomena, perform real-time data interpretation, react to events, and swiftly communicate observations. The primary goal of IoT is ubiquitous computing using wireless sensors and communication protocols such as Bluetooth, Wireless Fidelity (Wi-Fi), ZigBee and General Packet Radio Service (GPRS). Insecurity, of assets and lives, is a problem around the world. One application area of IoT is tracking and monitoring; it could therefore be used to solve asset insecurity. A preliminary investigation revealed that security systems in place at Central University of Technology, Free State (CUT) are disjointed; they do not instantaneously and intelligently conscientize security personnel about security breaches using real time messages. As a result, many assets have been stolen, particularly laptops. The main objective of this research was to prove that a real-life application built over a generic IoT architecture that innovatively and intelligently integrates: (1) wireless sensors; (2) radio frequency identification (RFID) tags and readers; (3) fingerprint readers; and (4) mobile phones, can be used to dispel laptop theft. To achieve this, the researcher developed a system, using the heterogeneous devices mentioned above and a middleware that harnessed their unique capabilities to bring out the full potential of IoT in intelligently curbing laptop theft. The resulting system has the ability to: (1) monitor the presence of a laptop using RFID reader that pro-actively interrogates a passive tag attached to the laptop; (2) detect unauthorized removal of a laptop under monitoring; (3) instantly communicate security violations via cell phones; and (4) use Windows location sensors to track the position of a laptop using Googlemaps. The system also manages administrative tasks such as laptop registration, assignment and withdrawal which used to be handled manually. Experiments conducted using the resulting system prototype proved the hypothesis outlined for this research

    User-centric IoT: challenges and perspectives

    Get PDF
    International audienceThe Internet of Things (IoT), this emerging technology connecting everyone, and everyone’s things’, is not about objects, gadgets, databases, applications and profits to be made from it, but about people, it enriches. Researchers, developers, industries, telecommunication companies, and scientific communities have been interested in this paradigm and have proposed different solutions from different perspectives. They are mainly focused on the technical level, like performance, interoperability, integration, etc. However, whenever use cases are targeting human users, the focus must not be merely on these sides, but on human factors as well. Thus, it is essential to apply a user-centric approach allowing identification of application-specific features and understanding users needs, motivations and beliefs. This survey aims at encouraging other IoT system developers and researchers to pay attention to the relationship between people and IoT systems. We emphasize the value of adopting a user-centric vision. The goal is not to provide solutions, but rather to raise the right issues
    • …
    corecore