17 research outputs found

    Synchronous LoRa mesh network to monitor processes in underground infrastructure

    Get PDF
    Collecting precise real-time information on urban drainage system performance is essential to identify, predict, and manage critical loading situations, such as urban flash floods and sewer overflows. Although emerging low-power wireless communication techniques allow efficient data transfers with great above-ground performance, for underground or indoor applications in a large coverage range are difficult to achieve due to physical and topological limitations, particularly in dense urban areas. In this paper, we first discuss the range limitations of the LoRaWAN standard based on a systematic evaluation of a long-term operation of a sensor network monitoring in-sewer process dynamics. Analyses reveal an-on average-five-fold higher data packet loss for sub-surface nodes, which steadily grows with increasing distance to the gateway. Second, we present a novel LPWAN concept based on the LoRa technology that enhances transmission reliability, efficiency, and flexibility in range-critical situations through meshed multi-hop routing and ensures a precise time-synchronization through optional GPS or DCF77 long-wave time signaling. Third, we illustrate the usefulness of the newly developed concept by evaluating the radio transmission performance for two independent full-scale field tests. Test results show that the synchronous LoRa mesh network approach clearly outperforms the standard LoRaWAN technique with regard to the reliability of packet delivery when transmitting from range-critical locations. Hence, the approach is expected to generally ease data collection from difficult-to-access locations such as underground areas

    Integration and characterisation of the performance of fifth-generation mobile technology (5g) connectivity over the University of Oulu 5g test network (5gtn) for cognitive edge node based on fractal edge platform

    Get PDF
    Abstract. In recent years, there has been a growing interest in cognitive edge nodes, which are intelligent devices that can collect and process data at the edge of the network. These nodes are becoming increasingly important for various applications such as smart cities, industrial automation, and healthcare. However, implementing cognitive edge nodes requires a reliable and efficient communication network. Therefore, this thesis assesses the performance of direct cellular (5G) and IEEE 802.11-based Wireless Local Area Network (WLAN) technology for three network architectures, which has the potential to offer low-latency, high-throughput and energy-efficient communication, for cognitive edge nodes. The study focused on evaluating the network performance metrics of throughput, latency, and power consumption for three different FRACTAL-based network architectures. These architectures include IEEE 802.11-based last mile, direct cellular (5G) backbone, and IEEE 802.11-based last mile over cellular (5G) backbone topologies. This research aims to provide insights into the performance of 5G technology for cognitive edge nodes. The findings suggest that the power consumption of IEEE 802.11-enabled nodes was only slightly higher than the reference case, indicating that it is more energy-efficient than 5G-enabled nodes. Additionally, in terms of latency, IEEE 802.11 technology may be more favourable. The throughput tests revealed that the cellular (5G) connection exhibited high throughput for communication between a test node and an upper-tier node situated either on the internet or at the network edge. In addition, it was found that the FRACTAL edge platform is flexible and scalable, and it supports different wireless technologies, making it a suitable platform for implementing cognitive edge nodes. Overall, this study provides insights into the potential of 5G technology and the FRACTAL edge platform for implementing cognitive edge nodes. The results of this research can be valuable for researchers and practitioners working in the field of wireless communication and edge computing, as it sheds light on the feasibility and performance of these technologies for implementing cognitive edge nodes in various applications

    LoRaWAN Physical Layer-Based Attacks and Countermeasures, A Review

    Get PDF
    As LoRaWAN is one of the most popular long-range wireless protocols among low-power IoT applications, more and more focus is shifting towards security. In particular, physical layer topics become relevant to improve the security of LoRaWAN nodes, which are often limited in terms of computational power and communication resources. To this end, e.g., detection methods for wireless attacks improve the integrity and robustness of LoRaWAN access. Further, wireless physical layer techniques have potential to enhance key refreshment and device authentication. In this work, we aim to provide a comprehensive review of various vulnerabilities, countermeasures and security enhancing features concerning the LoRaWAN physical layer. Afterwards, we discuss the impact of the reviewed topics on LoRaWAN security and, subsequently, we identify research gaps as well as promising future research directions

    Towards an Autonomous Industry 4.0 Warehouse: A UAV and Blockchain-Based System for Inventory and Traceability Applications in Big Data-Driven Supply Chain Management

    Get PDF
    [Abstract] Industry 4.0 has paved the way for a world where smart factories will automate and upgrade many processes through the use of some of the latest emerging technologies. One of such technologies is Unmanned Aerial Vehicles (UAVs), which have evolved a great deal in the last years in terms of technology (e.g., control units, sensors, UAV frames) and have significantly reduced their cost. UAVs can help industry in automatable and tedious tasks, like the ones performed on a regular basis for determining the inventory and for preserving item traceability. In such tasks, especially when it comes from untrusted third parties, it is essential to determine whether the collected information is valid or true. Likewise, ensuring data trustworthiness is a key issue in order to leverage Big Data analytics to supply chain efficiency and effectiveness. In such a case, blockchain, another Industry 4.0 technology that has become very popular in other fields like finance, has the potential to provide a higher level of transparency, security, trust and efficiency in the supply chain and enable the use of smart contracts. Thus, in this paper, we present the design and evaluation of a UAV-based system aimed at automating inventory tasks and keeping the traceability of industrial items attached to Radio-Frequency IDentification (RFID) tags. To confront current shortcomings, such a system is developed under a versatile, modular and scalable architecture aimed to reinforce cyber security and decentralization while fostering external audits and big data analytics. Therefore, the system uses a blockchain and a distributed ledger to store certain inventory data collected by UAVs, validate them, ensure their trustworthiness and make them available to the interested parties. In order to show the performance of the proposed system, different tests were performed in a real industrial warehouse, concluding that the system is able to obtain the inventory data really fast in comparison to traditional manual tasks, while being also able to estimate the position of the items when hovering over them thanks to their tag’s signal strength. In addition, the performance of the proposed blockchain-based architecture was evaluated in different scenarios.Xunta de Galicia; ED431C 2016-045Xunta de Galicia; ED431G/01Agencia Estatal de Investigación de España; TEC2016-75067-C4-1-

    Efficient Key Management Schemes for Smart Grid

    Get PDF
    With the increasing digitization of different components of Smart Grid by incorporating smart(er) devices, there is an ongoing effort to deploy them for various applications. However, if these devices are compromised, they can reveal sensitive information from such systems. Therefore, securing them against cyber-attacks may represent the first step towards the protection of the critical infrastructure. Nevertheless, realization of the desirable security features such as confidentiality, integrity and authentication relies entirely on cryptographic keys that can be either symmetric or asymmetric. A major need, along with this, is to deal with managing these keys for a large number of devices in Smart Grid. While such key management can be easily addressed by transferring the existing protocols to Smart Grid domain, this is not an easy task, as one needs to deal with the limitations of the current communication infrastructures and resource-constrained devices in Smart Grid. In general, effective mechanisms for Smart Grid security must guarantee the security of the applications by managing (1) key revocation; and (2) key exchange. Moreover, such management should be provided without compromising the general performance of the Smart Grid applications and thus needs to incur minimal overhead to Smart Grid systems. This dissertation aims to fill this gap by proposing specialized key management techniques for resource and communication constrained Smart Grid environments. Specifically, motivated by the need of reducing the revocation management overhead, we first present a distributed public key revocation management scheme for Advanced Metering Infrastructure (AMI) by utilizing distributed hash trees (DHTs). The basic idea is to enable sharing of the burden among smart meters to reduce the overall overhead. Second, we propose another revocation management scheme by utilizing cryptographic accumulators, which reduces the space requirements for revocation information significantly. Finally, we turn our attention to symmetric key exchange problem and propose a 0-Round Trip Time (RTT) message exchange scheme to minimize the message exchanges. This scheme enables a lightweight yet secure symmetric key-exchange between field devices and the control center in Smart Gird by utilizing a dynamic hash chain mechanism. The evaluation of the proposed approaches show that they significantly out-perform existing conventional approaches

    Internet of Things From Hype to Reality

    Get PDF
    The Internet of Things (IoT) has gained significant mindshare, let alone attention, in academia and the industry especially over the past few years. The reasons behind this interest are the potential capabilities that IoT promises to offer. On the personal level, it paints a picture of a future world where all the things in our ambient environment are connected to the Internet and seamlessly communicate with each other to operate intelligently. The ultimate goal is to enable objects around us to efficiently sense our surroundings, inexpensively communicate, and ultimately create a better environment for us: one where everyday objects act based on what we need and like without explicit instructions
    corecore